Tutorial Seputar Ilmu Komputer
Tampilkan postingan dengan label seo. Tampilkan semua postingan
Tampilkan postingan dengan label seo. Tampilkan semua postingan

23 Desember 2012

2 About Alexa


How To Get Alexa Index..?

http://www.alexa.com/siteinfo/tutor-kompi.blogspot.com
Alexa is a site that provides information about the traffic of a blog. Alexa Page Rank can be used as an overview of the number of visitors who come to the blog and recorded by Alexa. Keep in mind, that the ranking of a blog, Alexa Page Rank and Google Page Rank is different. the smaller Alexa page rank ,the blog is getting better and if a blog Rank Alexa rank is high, then the worse. While Google Page Rank is the opposite than the Alexa Page Rank, the bigger ranking Google Page Rank of a blog, the blog was quite nice blog.
Now you know what is meant by Alexa Page Rank and Alexa Page Rank of usability, so your next step is to enter the Alexa Page Rank to the blog so that you can know the ratings your blog in the eyes of Alexa (weve all people wearing eye) ..LoL.. To enter the Alexa Page Rank to your blog, you can follow the steps below:

1. Visit these URL: http://www.alexa.com/
2. Click Create an Account
3. Fill Form Registration
4. Click For Site Owner
5. Click Site Widgets
6. There are 3 choices alexa, select the one that fits on your blog
7. Enter the URL of your blog and then click Build Widget
8. Copy and then Paste the HTML code into your blog.
9. Completed.

You already have the Alexa HTML code to be inserted into the blog, the next step you can enter the code in your blog.

22 Desember 2012

2 How To Claim Blog on Technorati


submit blog to technorati search engine
How to claim your blog at Technorati directory, previously let us discuss what is Technorati? Definitely have to know right? Okey .. Technorati is a search engine (search engine) specifically for the popular blog created by Dave Sifry, launched in November 2002. We have had a lot of even millions of blogs in the world listed on the site, as a large community site is one source to get visitors / traffic, the reason why we have to register our blog on Technorati as well as to attract visitors of this site as well can be used as a tool to seek links from other blogs that have the theme (niche) of the same. Technorati is also a fairly popular blog directory and a directory of favorite bloggers to improve pagerank and traffic, well now the question is how to claim your blog in Technorati? exactly how its spelled claim tricky but if you want a really serious and conscientious certainly be fine.
How to Claim Blog on Technorati
  • Log in Technorati, I have not got an account please make first
  • Enter the address of your blog in order to claim and complete the necessary data
  • Technorati will then send a reply email to your email containing the claim token, see example below

This is an automatically-generated email.
"Thank you for submitting your blog claim on Technorati. Technorati will need to verify that you are an author of the site http://tutor-kompi.blogspot.com by looking for a unique code. We have just assigned the claim token 5ZBPTKPB7U7K to this claim. Please visit http://technorati.com/account/ for more details, Including how to use the claim token. Thank you."

  • Then go to your blog and make a new post on Technorati to include a token code (eg token: code red)
  • Publish your new post
  • Back to site Technorati and click "Verify Claim Token"
  • Then wait a few moments and then Technorati will to claim your blog by sending email to your inbox
This is an automatically-generated email.Thank you for submitting your blog claim on Technorati. We have successfully crawled your blog and found the claim token, and your claim is now awaiting review."
After claim then your blog will be reviewed by Technorati and the blog will be entered in the directory

2 TECHNORATI SEARCH ENGINE


technorati is an internet search engineHow to get PageRank and speed "blog traffic", only for my friend who wanted a higher PageRank and are very much blog traffic instantly. How to increase PageRank fast speed or traffic blog is a way to spread links using Multi Level Marketing system? Sounds weird huh? But potent know .. do not believe? These tips prove for you .. "How to Increase Pagerank" or another language SEO Techniques
This time I want my friends tried it invites all to take advantage of the awesomeness factor of time and the speed of the spread of this in the form of TECHNORATI.

Technorati is an Internet search engine for searching blogs. By June 2008, Technorati was indexing 112.8 million blogs and over 250 million pieces of tagged social media.[3] The name Technorati is a blend of the words technology and literati, which invokes the notion of technological intelligence or intellectualism.
Technorati was founded by Dave Sifry, with its headquarters in San Francisco, California, USA. Tantek Çelik was the site's Chief Technologist.
Technorati uses and contributes to open source software. Technorati has an active software developer community, many of them from open-source culture. Sifry is a major open-source advocate and was a founder of LinuxCare and later of Wi-Fi access point software developer Sputnik. Technorati includes a public developers' wiki, where developers and contributors collaborate, also various open APIs.
The site won the SXSW 2006 awards for Best Technical Achievement and Best of Show.[4] It was nominated for a 2006 Webby Award for Best Practices, but lost to Flickr and Google Maps.[5] Technorati was recognized as one of the “2010 Hottest San Francisco Companies” by Lead411
Technorati was founded to help bloggers succeed by collecting, highlighting, and distributing the global online conversation.Well I will show you how to index your blog at Technorati at next posting 5ZBPTKPB7U7K

0 When The Legend Say about Security

Security tips from a legendary hacker

Kevin Mitnick was once the "most wanted" computer hacker in the world. After being nabbed by the FBI and doing his time, Mitnick became one of the good guys, helping businesses understand and address information security weaknesses and threats.

Mitnick, now a leading consultant and speaker on the subject of information security, and author of the New York Times best-seller Ghost in The Wires, spoke with me about the most serious threats of which every business should be aware. Mitnick says that these issues aren't just concerns for large corporations -- small companies face the same challenges, and dealing with them effectively doesn't require massive resources or IT departments. Here are the top threats, and some tools small businesses can use to address them:

Attacks are becoming more complex

The threat: Attackers have become more sophisticated, and it's often extremely difficult to detect an intrusion until after the damage is done. "Hacker gangs," often operating overseas, have acquired online banking credentials and wired funds out of corporate accounts, or stolen intellectual property, with little or no detection.

The solution: There are several solutions on the market for small- and medium-sized businesses. Cisco (CSCO) and others offer integrated services routers (ISR), which integrate routing, firewalling, intrusion detection, VoIP solutions and wireless networking, at a low cost (entry level models run around $1,000). There are more robust systems for larger enterprises, but ISR provides good baseline protection for smaller businesses.

The risk landscape is increasingly difficult to understand

The threat: Attacks are evolving every day, making it crucial -- and difficult -- to keep up with current hacker methodologies. As a result, thousands of systems are compromised every week. We often hear about distributed-denial-of-service (DDoS) attacks carried out by "botnets" of compromised computers. Hackers use similar techniques to gain access to small business computers, where they can access financial and other information, perpetrate theft and do all kinds of other damage.

The solution: Small businesses are increasingly putting many of their system functions in "the Cloud," where they can be kept up-to-date in real time. In these situations, it is critical to clearly outline expectations regarding application and data security in the Service Level Agreement (SLA).

If the necessary technical expertise is not available in-house, enlist the services of a security consultant or qualified IT specialist. Companies like Mitnick's offer advisory services and implementation of the best practices and solutions for keeping up-to-date on threats. For many companies, a modest investment in this kind of expertise can save them from far more costly problems down the road.

Outgoing network traffic can be as dangerous as inbound

The threat: Most businesses have some type of firewall for incoming traffic, but few address potentially risky outgoing connections from their own workstations. This is a major shortcoming, because a user's computer may become infected with malware that connects back to the attacker. According to Mitnick, antivirus software is only 60 percent effective at detecting and eliminating malicious code.

The solution: Reduce the number of services a user can connect to outside the company by configuring the firewall to restrict outgoing traffic to what's necessary for business operations. The ISR solutions mentioned above facilitate this type of configuration.

Desktop software is often out of date

The threat: Hackers used to focus solely on exploiting security flaws at the server level, but this has changed, and individual desktops are now common targets. One of the reasons this is appealing to hackers is that businesses rarely update the client application software that resides on individual workstations. Small businesses can be particularly easy marks for these kinds of attacks.

The solution: Products like Secunia's Corporate Software Inspector automate software updates on user desktops. These updates are as important as applying software and security patches for the operating system, as out-of-date software significantly increases the risk of a security breach. Products like the Secunia application can cost a couple-thousand dollars, but again, the investment has to be weighed against the risk.

Humans can be the biggest problem

The threat: The biggest risks to information security are people. Studies have shown that most security incidents start from within, and are usually accidental. Sophisticated attacks use "social engineering" (predicting or manipulating human behavior) to trigger the exploitation of desktop application security flaws.

The solution: Constantly reinforce to employees the dangers of opening attachments and clicking links sent in email, messenger applications and posts on social networking sites. All it takes is one person making a bad decision to compromise the entire business. One clever and effective strategy for keeping employees on their toes is simulating attacks (similar to a surprise military drill), using an Internet Security Awareness Training program, which costs about $15 per person per year.

Of course, these are just quick snapshots of key threats and tools. It's a big and complex subject (Mitnick has filled three books on it so far), but these are great starting steps for most small companies. As Mitnick says, "The most important point is that computer and information security is not, and can never be, a one-size-fits all-solution."


By : MICHAEL HESS / MONEYWATCH/ December 19, 2011/
 

Tutorial Seputar Ilmu Komputer Copyright © 2011 - |- Powered by Blogger Templates