Wednesday, April 4, 2012

Intersting and Usefull Articles

Article No 1 .What happens on the Internet every 60 seconds

Let's say that it takes you exactly one minute to read through this post. In that time, over 6,600 photos will be uploaded to Flickr, about 70 new domains will be registered, over 1,200 new ads will be created on Craigslist, and more. Here's what happens on the Internet every 60 seconds.

Now keep in mind that the data below and the infographic above come from the Shanghai Web Designers team. We have done our best to confirm that the statistics provided line up with known data, but you should still take everything with a hefty serving of salt.

That disclaimer aside and without further ado, here's what's happening each minute:
        * Search engine Google serves more that 694,445 queries
        * 6,600+ pictures are uploaded to Flickr
        * 600 videos are uploaded to YouTube, amounting to 25+ hours of content
        * 695,000 status updates, 79,364 wall posts and 510,040 comments are published on social networking site Facebook
        * 70 new domains are registered
        * 168,000,000+ emails are sent
        * 320 new accounts and 98,000 tweets are generated on social networking site Twitter
        * iPhone applications are downloaded more than 13,000 times
        * 20,000 new posts are published on micro-blogging platform Tumblr
        * Popular web browser FireFox is downloaded more than 1,700 times
        * Popular blogging platform WordPress is downloaded more than 50 times
        * WordPress Plugins are downloaded more than 125 times
        * 100 accounts are created on professional networking site LinkedIn
        * 40 new questions are asked on YahooAnswers.com
        * 100+ questions are asked on Answers.com
        * 1 new article is published on Associated Content, the world’s largest source of community-created content
        * 1 new definition is added on UrbanDictionary.com
        * 1,200+ new ads are created on Craigslist
        * 370,000+ minutes of voice calls done by Skype users
        * 13,000+ hours of music streaming is done by personalized Internet radio provider Pandora
        * 1,600+ reads are made on Scribd, the largest social reading publishing company.

Impressive? Scary? Overwhelming? We're not sure. But we do know that a lot happened in the few moments it took to look at this blog post — so you better rush to catch up.

Source:- 


http://www.technolog.msnbc.msn.com/technology/technolog/what-happens-internet-every-60-seconds-122741

Article No2:- 50 Traffic Strategies for your site

YOU SHOULD CHOOSE 5 OF THE BELOW STRATEGIES WHICH YOU FIND THE EASIEST TO IMPLEMENT AND WORK ON THEM FOR 5 DAYS (1 DAY EACH). THEN CHOOSE THE NEXT 5 AND IMPLEMENT.
IMPLEMENTATION IS THE KEY HERE, WORK UNTIL YOU HAVE EXECUTED ATLEAST 30 OF THE STRATEGIES AND YOU WILL HAVE QUALITY TRAFFIC FOR A LONG TIME. love love

1. Trade an adequate amount of Stumbles to improve your site’s Stumble Ranking. StumbleUpon is a feasible option, where-in better the content, higher the hits. Also, Diggs can be utilised to get your site indexed quickly.

2. Backlinks can be substantially incremented through sites such as Propeller, OnlyWire and SocialMarker, which serve the purpose of improving indexing and rankings.

3. A suitable press release publicizing your site can be submitted directly to PRWeb.com to attain a good flow of traffic and even rankings.

4. If a competitor with high traffic-site uses Ad Sense, then you can use Google’s Site Targeting Program to get your ad directly to your competitor’s site, evading hassles of contacting the owner.

5. Advertise your site with certified and commonly visited classifieds such as the centralized network on CraigsList.org.

6. Posting quality content through constant offerings on groups, communities and forums with common interests will help attract a good amount of traffic.
7. LinkedIn.com has a widespread online business social networking forum which effectively helps increase your contacts and repo amongst other online marketers.

8. It is essential to keep updating and modifying your site in order to make it seem more dynamic. This will attract more visits from popular search engines.

9. Publishing brochures or even a mini-book based on what your site is all about can assist in creating huge publicity spreads.

10. Posting regularly on your blog and then pinging each time you write in is of great help. Also, each post must contain apt keywords concerned with the business in order to initiate better search results.

11. Writing eye-grabbing reviews about products that belong to the same niche as yours on blogs in your own niche with a link back to your site.

12. Helpful suggestions or comments can be left on other people’s blogs, with a backlink to your site attached at the bottom.

13. Options such as social bookmarking, Refer to a Friend and other such viral techniques will enable a widespread of your site’s popularity.

14. Sites such as OnlyWire.com help in automating social book marking, which enables you to generate more backlinks automatically, thus resulting in traffic from affiliated sites.

15. Offering free items on your site, such as free courses, affiliate products or e-books will help gain a higher number of subscribers and repeat traffic.

16. Attaining membership to the Better Business Bureau will not only help you develop marketing skills, but also enable you to have your site’s link posted on their website.


17. Submitting articles with qualitative contents to popular article directories and blogs and forums.

18. Business cards are also an effective method to create contacts and expand networks.

19. At times, you can get to advertise your site on the Thank You and Reference pages of other Sales websites in return of a nominal charge for the site owner.

20. Personal profiles on popular social networking sites such as Facebook, MySpace and Twitter can prove heavily beneficial to circulate your site’s information and backlinks.

21. A video-clip containing informative footage regarding your site can be uploaded on common video hosting sites such as YouTube. The link to your site must be included primarily in the About Video/Information section of the clip.

22. Buying advertisements on EBay or using PPC techniques is a way of spending your way into luring customers.

23. Some local Radio stations often accept advertisements at relatively affordable costs. So, investing some amount in advertisements on Radios in another medium of mass-communication with a large reach.

24. Also, sponsoring a small segment on a local News channel is a viable long-term option to spread word about your site.

25. Niches impact traffic flows heavily. Picking the correct niches to venture into and combining them with properly researched keywords thus becomes important for long term traffic.

26. If the content is able to generate enough heat, encouraging people to subscribe to your RSS feeds will become easy, which is an efficient method of building a loyal base of visitors.

27. Many readers who use backlinks to reach your site may not necessarily enter your index page. Hence, each standalone page of the site must be intriguing and attractive enough to make them navigate further and read on.

28. Multiple blogs can be created with one parent site to backlink to. Since all of these blogs act as channels leading to the same parent site, continuous traffic inflow is ensured.


29. Giving out attractive bloggers’ awards or rewarding the best blog entries in cash or kind can prove to be a healthy way of attracting a constant inflow of bloggers.

30. Posting backlinks on websites in similar niches and higher Page-Rank will assist in getting your site’s ranking up. Higher the Page-Rank, better the rankings on Search Engines.

31. If you use Yahoo, then it is a common trick to set up a feed on MyYahoo. This will help Yahoo keep automated track of the updates on your site and blogs.

32. Web campaigns either earn money or cost money. Thus, it becomes vital to keep track of your site’s campaigns from time to time through effective tests of their feasibility.

33. An effective offline strategy, which is slightly expensive and lesser known, involves bringing forth your advertisements in front of the common public via modes such as posters, t-shirts, publishing in magazines etc.

34. Also, public places such as alleys, bus stations, cafes etc. are apt sites where you can put up paper Stick-Ons to promote your URL amongst the common masses.

35. The Alexa Tool Bar is an efficient tool to monitor traffic reports and acquire traffic rankings after searching profitable niche keywords on search engines like Google.

36. Hosting Tele-seminars or Webinars with other marketers of your niche can prove to be critical tools in enlightening members of your network with information about your site.
37. If you can’t get famous, get infamous. A trick to attract more eyes is to generate a controversial idea, against the popular beliefs common in the market, and then spread it around through articles and e-books.

38. There could be sites with misspellings or variations of your domain name floating on the web. Try and purchase some space on them in order to forward your URL.

39. Buying an authoritative site and getting high powered people to use it adds to your reputation. Following that up with a few press releases helps attain publicity.

40. Every time you make a presentation to a club, forum or local society, it is highly advisable to mention your site as many times as possible and expand your contacts amongst other online marketers.

41. Write articles and submit to E-zine articles and build backlinks to them if necessary(for quick google rankings), link back to your main page.

42. Use twitter to direct traffic, use automation software to add followers.

43. Add valuable articles to forums in your niche and have a link in your signature.

44. Write guest posts on high traffic blogs in your niche. Do a domain whois search for getting the details of the owner or write a comment telling that you have an offer that can be of mutual benefit.

45. Build a list and send them quality information once a week, soon you can have them come to your site just by requesting.

46. Build relationships in your niche. With fellow webmasters and more importantly the traffic. Make lists and satisfy them with good information.

47. Make video files watermarked with your URL and upload to torrent sites and other sharing hubs (mediafire,rapidshare). Give links to these download pages in forums.

48. Make linkwheels and keep at it consistently.

49. Ping, social bookmark and submit your RSS feeds to rss feed aggregators to get a steady source of traffic each time you update your site.

50. GET TO WORK AND STOP DAY DREAMING.

Source:-

http://www.dl4all.com/useful-articles/364793-50-traffic-strategies-for-your-site.html


Desktop shortcut for locking your computer


Creating a desktop shortcut for locking your comp!

If you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here’s a recipe for a desktop shortcut that will lock your computer in two easy clicks:

Right click on an empty area of the desktop and choose ‘new’ then ’shortcut.’ The create shortcut wizard will open; in the first text box, type ‘%windir%\System32\rundll32.exe user32.dll,Lock Workstation’ and then give your shortcut an appropriate name on the next page, and hit ‘finish.’

You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit ‘properties.’ In the ’shortcut’ tab, click the ‘change icon’ button.

In the ‘look for icons in this file’ box, type ‘%SystemRoot%\system32\SHELL32.dll’ then click ‘ok’ to see a range of icons for your new shortcut. Choose an appropriate icon. Your desktop locking shortcut is now ready for use. Test it out.

Source:-
http://www.dl4all.com/useful-articles/665584-desktop-shortcut-for-locking-your-computer.html


 Automatically Lock Your Computer


If you've ever worked with pranksters, you've probably come across this classic office prank. First, the unsuspecting victim leaves his computer and goes to lunch or a long meeting and doesn't lock his screen. The prankster then takes a screenshot of his current desktop, hides all the desktop icons and any taskbars, and sets the background to be the screenshot the prankster just took. When the victim gets back to his computer, none of the icons work, and no programs will open, yet when he inevitably reboots, even that doesn't fix it. Around the time he calls the desktop support team, the prank is revealed and everyone has a good laugh about it—except maybe the victim, who vows from that day on always to lock his screen.

Good Locks Make Good Neighbors

I don't know about you, but even though I've never been the victim of a prank like that, I've always tried to be good about locking my screen when I'm away. I imagine some of this just stems from trying to be thoughtful about security, but also, if you are a sysadmin, you often have access to a lot of sensitive systems and data. Although you'd like to extend trust to your coworkers, an unlocked sysadmin computer would be a great source for sensitive information if you were a disgruntled employee. In this article, I discuss a simple program I've found that works great to lock your screen automatically when you walk away. At the end of the article, I also discuss some ideas for how to hack in to a system protected by this software.
Traditionally on any desktop environment I've used, I would configure a Ctrl-Alt L keybinding that locked my screen. It was so committed to muscle memory, that the moment I was about to stand up, my fingers automatically would lock my desktop without thinking about it. Although this method works great, I've recently discovered just how easy it is to set up your desktop to lock automatically when you leave, and even better, to unlock automatically when you return.
The solution to proximity-based desktop locking has been around for a while. I remember Linux Journal's own Bill Childers demonstrating such a thing to me with Bluetooth on a Mac more than six years ago, but I've never felt like messing around with the Bluez tools on Linux to write my own script. It turns out these days there's a simple program you can use to lock your screen via Bluetooth that takes only a minute to set up: BlueProximity.

How BlueProximity Works

Essentially, BlueProximity works on the notion that most of us carry around a Bluetooth device with us—our cell phone. Because Bluetooth works only over a limited range, with a bit of tuning, you can make some assumptions about how close a device is to your computer based on the strength of its signal. BlueProximity works via these assumptions to decide when to lock or unlock your screen. When you leave your computer, the Bluetooth signal gets weaker until it crosses a threshold, and your desktop is locked. When you return to your computer, the signal gets stronger until it crosses a different threshold, and the computer automatically unlocks.

Install BlueProximity

You install BlueProximity much like any other Linux program: with your package manager. In my case, the package simply was called blueproximity. Alternatively, if your distribution doesn't package it, you can download and build the software from the source available at the BlueProximity SourceForge page. Once installed, you either can type blueproximity in a terminal to launch the program or click on it in your applications menu (on my system, it showed up under the Accessories category).
Once you start the program, you will get a new icon in your panel and also see a window much like the one shown in Figure 1. BlueProximity requires that the device you set up already has been paired with your computer, so if you haven't yet paired your phone (or other Bluetooth device you wish to use), you need to go through the steps to pair your Bluetooth device first. In my case (on an Ubuntu system), I first made sure Bluetooth was enabled and visible on my phone, next I clicked System→Preferences→Bluetooth, then clicked Set up new device, and after that I just followed through the wizard that appeared.

Figure 1. The Default BlueProximity Tab
After you pair the Bluetooth device, go back to the main BlueProximity screen and click on Scan for devices. It may take a bit for the scan to complete, but afterward, you should see your Bluetooth device on the list. At that point, just select it, click Use selected device, and your device will be configured and ready to use. You can safely click the close button at the bottom of the window, as BlueProximity will still stay in your panel.

Fine-Tune Your Settings

Out of the box, BlueProximity tries to use reasonable settings to determine when to lock your screen; however, each Bluetooth device is different, and I've personally seen that different Bluetooth devices can have much different antenna strengths. If you notice that your screen doesn't lock as soon as you'd like, or worse, if it locks while you are still at your desk, click on the Proximity Details tab where you can edit thresholds (Figure 2). In this window, you will find a number of different sliders. The Distance slider for both Locking and Unlocking lets you control how close you need to be to the computer. The Measured atm slider updates every second or so and shows the current distance BlueProximity reads, so you can get a sense of how sensitive your equipment is. The Duration sliders let you control how long the device needs to be at a certain distance before it locks or unlocks the screen. This is useful in particular when tuning the Locking section so that one bad reading doesn't lock your screen when you don't want it to.

Figure 2. The Proximity Details Tab
If you do notice that the screen locks on you often while you are at your desk, increase the Distance slider for locking. Alternatively, if you notice when you come back to your desk you have to sit there for some time before it unlocks, you may want to increase the Distance slider for Unlocking and decrease the Duration slider if it's higher than one. Just make sure that your unlocking distance isn't higher than your locking distance.

Use Your Own Locking Program

By default, BlueProximity is configured to trigger gnome-screensaver commands. If you use GNOME, that might be fine, but if you use another desktop environment, click the Locking tab (Figure 3) where you can change what command gets run to lock and unlock the screen. By default, you can choose between gnome-screensaver and xscreensaver from the drop-down list, but you could really put any script you want in here. For instance, you might want to create a locking bash script that not only calls gnome-screensaver but also uses a DBUS signal to pause your music. Then you could write a similar script to unpause your music and unlock the screen when you return.

Figure 3. The Locking Tab

Hack BlueProximity

Security is often a trade-off for convenience. BlueProximity is interesting in that it tries to increase your security (by automatically locking your screen), and it also tries to increase your convenience (by automatically unlocking your screen when you return). It is this convenience that may possibly open you up to an attack. That said, BlueProximity and the Bluetooth protocol do make attacking this method rather difficult, because BlueProximity allows only one device to unlock it at a time. You may think you could hack this setup simply by cloning the MAC address of a person's phone on your Bluetooth device. Although this is possible, unfortunately, during the pairing process, keys are shared between the two devices that they will use for secure communication later on, so even if you can clone a phone's MAC address, it still will not necessarily accept your device, because you don't have the shared secret. That having been said, Andrew Y. Lindell released a paper for Blackhat 2008 demonstrating that if you could sniff the pairing procedure, the password potentially could be leaked to you. Even if you weren't there when the devices were paired, the paper demonstrated how you might be able to get a device to re-run the pairing procedure.
Of course, such an attack is quite sophisticated and might be difficult to pull off. An easier approach simply would be to borrow the person's phone to make a phone call or check out an app when he isn't at his desk and then sneak over there. Along with that attack, BlueProximity naturally would be vulnerable to knocking the person out and stealing the phone, but then we are talking about office security here, and if you have to worry about coworkers beating you over the head and robbing you, maybe you should look into another line of work.

Source:-
http://www.stumbleupon.com/su/1c8jfL/:LLA!Qygk:Q!wHCfRg/www.linuxjournal.com/

Download 
http://sourceforge.net/projects/blueproximity/


How To Design A Website

Designing a web site is an important part in advertising a business. Anyone can make a website. Designing a web site is a perfect combination of creativity & technical expertise and both are equally important. The quality and positioning of the graphics contained in your website are essential for it to look both attractive and professional. Design for Specific Search Engine -While designing your website, aim to get a high ranking in the top three search engines. That you like and you’re in the process of designing your website. A major source of traffic for most sites on the Internet is search engines like Google, Yahoo!, MSN, and Altavista and so on. Hence, by designing a search engine friendly site, you will be able to rank easily and obtain more visitors.

Well for those who think website design is not important, have to understand that a website is not just a web page with some information about some products and services. In today’s time it is like the face of a business. Nowadays before availing or buying anything people tends to visit website to know what variety of services a business provides and what they can expect from a business. So it becomes extremely important for a business to pay attention towards web design of its website. The more the people find the website design appealing the more frequently they will visit the website.

Major search engines use programs called crawlers or robots to index websites to list on their search result pages. They follow links to a page, read the content of the page and record it in their own database, pulling up the listing as people search for it. There are a number of different reasons why making sure your website experiences the best website designing can be very important to its overall success. Simply put, designing an awesome content rich website is not enough. It’s easy to get caught up in the day to day mechanics of designing and maintaining a website and poor organization just makes the job harder. A web designer needs to consider a variety of online selling principles while designing an eCommerce website.

After you completes your all features regarding designing a web site, now you starts to do business from your web site but no one knows about your business site in web world, now what? There is one solution for this is SEO (Search Engine Optimization) means promote your web site in net through using SEO Services. SEO is one of the best methods to generate targeted traffic to your website. Traffic comes from organic search engine listings and from my own experience, this traffic is the most targeted and hence valuable. So if you are planning to make your business online then it is advised that you should avail the services of professional website designer who knows how to design a website and how to write unique content for your website.

This is the reason that today more and more businesses are opting for the online mode and are searching for expert web design and content writing services for their website.


Source:-
http://www.stumbleupon.com/su/2DGtUs

No comments:

Post a Comment