tag:blogger.com,1999:blog-74254954662238840032024-03-08T05:09:44.660-08:00Exclusive TipsIt is easy to get fun with internet. You can find funny tricks, web development related tips, mini-tutorials and other resources. These pages present a series of notes about how to use the internet to your best advantage. Here are the internet tips and secrets - your livelihood, your happiness and your future is at stake. We are helping people by giving them sure internet tips!Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.comBlogger17125tag:blogger.com,1999:blog-7425495466223884003.post-81901184347880595792008-05-15T22:31:00.000-07:002008-11-13T04:04:54.166-08:00Login Without Registration<a href="http://1.bp.blogspot.com/_WqdqBzs8i6w/SC0d1hkHsdI/AAAAAAAAARQ/VoC_gV_D7kU/s1600-h/Domain.gif"><img id="BLOGGER_PHOTO_ID_5200845950062932434" style="CURSOR: hand" alt="" src="http://1.bp.blogspot.com/_WqdqBzs8i6w/SC0d1hkHsdI/AAAAAAAAARQ/VoC_gV_D7kU/s400/Domain.gif" border="0" /></a><br /><p></p><br /><p>Go to</p><p>-http://bugmenot.com/</p><p><br />and type the URL of the website you want to log into.Examples:-http://www.nytimes.com/, -http://www.winnetmag.com/etcetera.</p><p><br />Another (and better) way is changing the user agent of your browser to:Googlebot/2.1+<br />-http://www.googlebot.com/bot.html</p><p><br />This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from<br />-http://www.chrispederick.com/work/firefox/useragentswitcher/and add the Googlebot user agent.</p>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-50431957218858951952008-05-09T08:00:00.000-07:002008-11-13T04:04:54.284-08:00Strong Password<a href="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCRoAi7WNJI/AAAAAAAAARI/IgIIiyNSiKQ/s1600-h/passwordCircle.gif"><img id="BLOGGER_PHOTO_ID_5198394228477408402" style="CURSOR: hand" alt="" src="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCRoAi7WNJI/AAAAAAAAARI/IgIIiyNSiKQ/s400/passwordCircle.gif" border="0" /></a><br /><div align="justify"></div><br /><div align="justify">The passwords are the keys we use to access personal information that we've stored on our computer and in our online accounts.</div><br /><div align="justify"><br />What makes a strong password?</div><br /><div align="justify"><br />To an attacker, a strong password should appear to be a random string of characters. The following criteria can help our passwords do so:</div><br /><div align="justify"><br />Make it lengthy</div><br /><div align="justify"><br />Each character that we add to our password increases the protection that it provides many times over.</div><br /><div align="justify"><br />The passwords should be 8 or more characters in length; 14 characters or longer is ideal.</div><br /><div align="justify"><br />Many systems also support use of the space bar in passwords, so we can create a phrase made of many words (a "pass phrase"). A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess.</div><br /><div align="justify"><br />Combine letters, numbers, and symbols:</div><br /><div align="justify"><br />The greater variety of characters that we have in our password, the harder it is to guess. Other important specifics include:<br />Use words and phrases that are easy for US to remember, but difficult for others to guess.<br /></div><br /><div align="justify">The easiest way to remember our passwords and pass phrases is to write them down.<br />Contrary to popular belief, there is nothing wrong with writing passwords down, but they need to be adequately protected in order to remain secure and effective.</div><br /><div align="justify"><br />In general, passwords written on a piece of paper are more difficult to compromise across the Internet than a password manager, Web site, or other software-based storage tool, such as password managers.</div><br /><div align="justify"><br />E.g.: Phrase Creates this password<br />Jack and Jill went up the hill to fetch a pail of water = J&Jwuth2fapow<br />I spent too much at the fair last night = Is2matfln<br />I like Cars = <a href="mailto:IL1k3c@rs">IL1k3c@rs</a></div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-12311000061868291572008-05-09T07:19:00.000-07:002008-11-13T04:04:54.457-08:00Network Commands<a href="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCRegi7WNII/AAAAAAAAARA/aAu0tS7PdMk/s1600-h/linux_user_314103.png"><img id="BLOGGER_PHOTO_ID_5198383783116944514" style="CURSOR: hand" alt="" src="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCRegi7WNII/AAAAAAAAARA/aAu0tS7PdMk/s400/linux_user_314103.png" border="0" /></a><br /><div></div><br /><div>Net:<br />Displays various properties like Accounts, Statistics, etc.<br /></div><br /><div>Syntax:<br />net [parameter]<br /><br />Net Start:<br />Starts a service. Used without parameters, net start displays a list of services that are currently operating.<br /><br />Syntax:<br />net start [service name]<br /><br />Net Stop:<br />Stops a service.<br /><br />Syntax:</div><br /><div>net stop [service name]<br /><br />NbtStat:<br />Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. Nbtstat allows a refresh of the NetBIOS name cache and the names registered with Windows Internet Name Service (WINS). Used without parameters, nbtstat displays help.<br /></div><br /><div>Syntax:<br />nbtstat [parameters]<br /><br />NetStat:<br />Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP connections.<br /><br />Syntax:</div><br /><div>netstat [parameters]<br /><br />TraceRt:<br />Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time to Live (TTL) field values. The path displayed is the list of near-side router interfaces of the routers in the path between a source host and a destination. The near-side interface is the interface of the router that is closest to the sending host in the path. Used without parameters, tracert displays help.<br /><br />Syntax:</div><br /><div>tracert [parameters]<br /><br />IPConfig:<br />Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.<br /><br />Syntax:<br />ipconfig [parameters]<br /><br />ARP:<br />Displays and modifies entries in the Address Resolution Protocol (ARP) cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your computer. Used without parameters, arp displays help.<br /><br />Syntax:</div><br /><div>arp [parameters]<br /><br />NsLookUp:<br />Displays information that you can use to diagnose Domain Name System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The Nslookup command-line tool is available only if you have installed the TCP/IP protocol.<br /><br />Syntax:<br />nslookup [parameters]<br /><br />Finger:<br />Displays information about a user or users on a specified remote computer (typically a computer running UNIX) that is running the Finger service or daemon. The remote computer specifies the format and output of the user information display. Used without parameters, finger displays help.<br /><br />Syntax:<br />finger [parameters]<br /><br />Ping:<br />Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along with round-trip times. Ping is the primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution. Used without parameters, ping displays help.<br /><br />Syntax:<br />ping [parameters]<br /><br />FTP:<br />Transfers files to and from a computer running a File Transfer Protocol (FTP) server service such as Internet Information Services. Ftp can be used interactively or in batch mode by processing ASCII text files.<br /><br />Syntax:<br />ftp [parameters]<br /><br />HostName:<br />Displays the host name portion of the full computer name of the computer.<br /><br />Syntax:</div><br /><div>hostname<br /><br />RCP:<br />Copies files between a Windows XP computer and a system running rshd, the remote shell service (daemon). Windows XP and Windows 2000 do not provide rshd service. Used without parameters, rcp displays help.<br /><br />Syntax:<br />rcp [parameters]<br /><br />REXEC:<br />Runs commands on remote computers running the Rexec service (daemon). The rexec command authenticates the user name on the remote computer before executing the specified command. Windows XP and Windows 2000 do not provide the Rexec service. Used without parameters, rexec displays help.<br /><br />Syntax:<br />rexec [parameters]<br /><br />Route:<br />Displays and modifies the entries in the local IP routing table. Used without parameters, route displays help.<br /><br />Syntax:<br />route [parameters]<br /><br />LPQ:<br />Displays the status of a print queue on a computer running Line Printer Daemon (LPD). Used without parameters, lpq displays command-line help for the lpq command.<br /><br />Syntax:<br />lpq [parameters]<br /><br />RSH:<br />Runs commands on remote computers running the RSH service or daemon. Windows XP and Windows 2000 do not provide an RSH service. An RSH service called Rshsvc.exe is provided with the Windows 2000 Server Resource Kit. Used without parameters, rsh displays help.<br /><br />Syntax:<br />rsh [parameters]<br /><br />LPR:<br />Sends a file to a computer running Line Printer Daemon (LPD) in preparation for printing. Used without parameters, lpr displays command-line help for the lpr command.<br /><br />Syntax:<br />lpr [parameters]<br /><br />TFTP:<br />Transfers files to and from a remote computer, typically a computer running UNIX, that is running the Trivial File Transfer Protocol (TFTP) service or daemon. Used without parameters, tftp displays help<br /><br />Syntax:<br />tftp [parameters]<br /><br />TELNET (CLIENT):<br />The telnet commands allow you to communicate with a remote computer that is using the Telnet protocol. You can run telnet without parameters in order to enter the telnet context, indicated by the Telnet prompt (telnet>). From the Telnet prompt, use the following commands to manage a computer running Telnet Client.<br /><br />Syntax:<br />telnet [parameter]<br /><br />TELNET (ADMINISTRATOR):<br />The telnet administrative commands.<br /><br />Syntax:<br />tlntadmn [parameter] </div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-70769666563753339242008-05-09T06:48:00.000-07:002008-11-13T04:04:54.620-08:00Malware Codes Glossary<a href="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCRc_S7WNHI/AAAAAAAAAQ4/fpIklj3syPo/s1600-h/virus.jpg"><img id="BLOGGER_PHOTO_ID_5198382112374666354" style="CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCRc_S7WNHI/AAAAAAAAAQ4/fpIklj3syPo/s400/virus.jpg" border="0" /></a><br /><div align="justify"><strong><span style="color:#cc0000;"></span></strong></div><br /><div align="justify"><strong><span style="color:#cc0000;">ActiveX:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">It's a type of Browser Plug-in. ActiveX is a set of technologies from Microsoft that enables interactive content for the World Wide Web. As ActiveX security settings in Internet Explorer can allow web pages to automatically and secretly install ActiveX controls, they can be a significant security threat. ActiveX controls can access files on your hard drive.</div><br /><div align="justify"><br /><strong><span style="color:#cc0000;">Adware:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A type of Advertising Display Software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as Tracking Technologies. Some consumers may want to remove Adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.<br />On the other hand, some users may wish to keep particular adware programs if their presence subsidizes the cost of a desired product or service or if they provide advertising that is useful or desired, such as ads that are competitive or complementary to what the user is looking at or searching for.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Alternate Data Stream:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">An extension to Microsoft's Windows NT File System (NTFS) that provides compatibility with files created using Apple's Hierarchical File System (HFS). Applications must write special code if they want to access and manipulate data stored in an alternate stream. Some applications use these streams to evade detection. </div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Backdoor:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Backdoors are remote administration utilities that open infected machines to external control via the Internet or a local network.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Bluetooth-Worm:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A type of Worm that uses Bluetooth technology as its spreading vector. Bluetooth is a wireless communications technology. See also Worm.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Botnet:</span></strong> Botnet is a term formed from two words â€" Robot and Network. A Bot, sometimes referred to as Zombie, is a computer that has been infected with malware that allows a remote malicious user access to the computer. With that remote access, the malicious user can control and harness the power of all such Bots into a powerful network used for criminal activity. Botnets have been used for sending spam remotely, installing more malware without consent, and other illicit purposes.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Browser Helper Object (BHO):</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Browser Helper Object (BHO) is a program that runs automatically every time that the Internet Explorer browser is launched. It is meant to extend the functionality of the browser, but it can also track how you use the Internet. Toolbars are a common form of BHO.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Browser Plug-in:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A software component that interacts with a Web browser to provide capabilities or perform functions not otherwise included in the browser. Typical examples are plug-ins to display specific graphic formats, to play multimedia files or to add toolbars which include search or antiphishing services. Plug-ins can also perform potentially unwanted behaviors such as redirecting search results or monitoring user browsing behavior, connections history, or installing other unwanted software like nuisance or harmful adware.</div><br /><div align="justify"></div><br /><div align="justify">Types of Browser plug-ins include:<br /></div><br /><ul><br /><li><div align="justify">ActiveX Controls: Microsoft Internet Explorer</div></li><li><div align="justify">Browser Helper Object (BHOs): Microsoft Internet Explorer</div></li><li><div align="justify">Mozilla Firefox Extensions: Mozilla Firefox</div></li></ul><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Cookie:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A piece of data that a Web site or a third party that was commissioned or approved by the website â€" saves on users' computers' hard drives and retrieves when the users revisit that Web site. Some cookies may use a unique identifier that links to information such as logon or registration data, online "shopping cart" selections, user preferences, Web sites a user has visited, et cetera. See also Tracking Cookies.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Data Miner:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Data Miner is a program that can collect information on how you browse and use websites. The collected information can include data gathered from forms you fill and submit. Usually data miners work without your knowledge.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Dialer:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Dialer is a program which tries to connect to an expensive pay-per-minute phone number using the computer's modem. Most malicious dialers work without your awareness or permission.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Distributed Denial-of-Service (DDoS):</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Attack A means of burdening or effectively shutting down a remote system by bombarding it with traffic from many other computers. DDoS attacks are often launched using the compromised systems of Internet users, often using botnets. An attacker will exploit a vulnerability in one computer system and make it the DDoS master using Remote Control Software. Later, the intruder will use the master system to identify and manage zombies that can perform the attack. Email-Worm A type of Worm that uses E-mail as its spreading vector.<br />See also Worm.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">HackTool:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A utility designed to penetrate remote computers.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Hoax:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Hoax is a type of chain letter that contains false information, often spreading a false virus warning. Do note that we generally only focus on virus-related hoaxes. We can not evaluate whether non-computer related folklore stories are urban legends or true stories</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Hosts File:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">The Hosts File is a lot like an address book. When you type an address into your web browser, the address is translated into a numeric IP address. If the address can be found from the Hosts file, your computer will use it. If not, your computer will connect to the DNS service of your Internet Service Provider. Some malware can edit your Hosts file to hijack and redirect a web connection to a completely different site on the Internet/World Wide Web.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">IM-Worm:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A type of Worm that uses Instant Messaging (IM) software as its spreading vector. MSN Messenger, AOL Instant Messenger (AIM), and Yahoo Messenger are examples of IM applications. See also Worm.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Intended:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">When malware is typed as Intended, it is software that contains bugs or other problems that prevent it from functioning as the author intended. It would have been malware, and future versions still might be, but the current version is defective.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">IRC-Worm:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A type of Worm that uses Internet Relay Chat (IRC) as its spreading vector. IRC is a form of real-time Internet chat. It is mainly designed for group communication in discussion forums known as channels. See also Worm.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Joke:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Joke is a program with annoying or funny functionality, but it is not destructive.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Macro:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Malware that is encoded as a macro embedded in a document.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Malware:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Malware is a common name for all kinds of unwanted software such as viruses, worms, trojans and jokes.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Monitor:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Monitoring Tool can monitor and record all computer activities, including each keystroke you type on the keyboard.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Multipartite Virus:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Multipartite Virus is a virus composed of several parts. Every part of a multipartite virus needs to be cleaned away, to give assurance of non-infection.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Net-Worm:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Network Worm is a program that can replicate itself by sending copies in e-mail messages or over a network. </div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">On-Access Scanner:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Real-time scanner, a background process that provides a constant guard against viruses.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">On-Demand Scanner:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">An On-Demand Scanner is a virus scanner which is started manually.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">P2P-Worm:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A type of Worm that uses Peer-to-peer networking software as its spreading vector. See also Worm.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Pharming:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Pharming (pronounced farming) is a scam technique that is similar to phishing. It is an attempt to steal personal information using false web sites. Pharming attacks seed false information on Internet DNS servers that provide location information. The result is that individuals are directed to web sites to seem to be genuine, but are actually false.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Phishing:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">In a computing context, Phishing is an impersonation of a corporation or other trusted institution. The goal of the impersonation is to extract passwords or other sensitive information from the victim. It is a form of criminal activity that utilizes social engineering techniques. Phishing is typically done using e-mail or an instant messaging program. The attempt of the message is to appear to be from an authentic source so that victim will either directly respond, or will open a URL link to a fake web site run by the criminals. Phishing (pronounced fishing) is a scam technique using e-mail that links to false, but genuine looking web sites, most often of Banks, that attempt to steal personal information. The spam bait is used with the odds that it will be ignored by most, because it will be out of context, but with the hope that some will be hooked.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Polymorphic Virus:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Polymorphic Virus is a virus which changes itself (<em>mutates</em>) as it passes through host files, making disinfection a serious challenge.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Real-Time Scanner:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Real-Time Scanner is a scanner that operates in the background, allowing a user to continue working at normal speed, with no significant slowing.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Replication Mechanism:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Replication Mechanisms are a mandatory part of every virus and worm. If it doesn't have a replication mechanism, it's by definition not a virus or worm.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Riskware:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Riskware is software that can pose a security risk that is not malicious by its nature. Such software has usefulness that can assist a knowledgeable user, but can also be bundled and used by malicious software. Examples include: FTP servers, IRC clients, Network Sniffers, overeager DRM software, and Remote Administration. Additionally, this category includes software that cannot be included in other malware categories. Some software is not malicious, but does not provide the functionality claimed. If the functionality of software is suspect, it may be added to the riskware category.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Rogue:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A suspect antispyware application that engages in doubious practices such as false positives. Illegal advertisements are sometimes used and trojans are sometimes installed to provide an infection to "clean". Rogue antispyware is often not malicious itself, but it does not provide the functionality claimed. Also known as Scareware.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Rootkit:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Rootkits are a technique that allows malware to hide from computer operating systems and from computer users. Rootkit techniques create stealth programs that run at a "lower" level than the user can see with normal software utilities. Malware attempts to use this method to avoid detection by security software.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Spyware:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Spyware is software that performs actions such as creating unsolicited pop-ups, hijacks home/search pages, or redirects browsing results. The term Spyware has been used in two ways: In its narrow sense, Spyware is a term for Tracking Software deployed without adequate notice, consent, or control for the user. In its broader sense, Spyware is used as a synonym for Spyware (narrow) and Other Potentially Unwanted Technologies.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Stealth Virus:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Stealth Virus is a virus that hides itself by intercepting disk access requests. When an antivirus program tries to read files or boot sectors to find the virus, the stealth virus feeds the antivirus program a clean image of file or boot sector.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Time Bomb:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Time Bomb is a destructive action triggered at some specific date or time.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Toolbar:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Toolbars are add-on applications for Web browser software. They provide additional functionality that is often not included within the browser. Toolbar software can be used for Tracking users' online behavior.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Tracking Cookies:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Tracking Cookies track your web browsing habits. They can collect information about pages and advertisements you have seen or any other activity during browsing. Different websites can share tracking cookies, and each website with the same tracking cookie can read the information and write new information into it. A Tracking Cookie is any cookie used for tracking users' surfing habits. Tracking Cookies are a form of Tracking Technology. They are typically used by advertisers wishing to analyze and manage advertising data, but they may be used to profile and track user activity more closely. However, tracking cookies are simply a text file, and far more limited in capability than executable software installed on users' computers. While installed software can potentially record any data or activity on a computer, cookies are simply a record of visits or activity with a single Website or its affiliated sites. See also Cookie.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Trackware:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A software that monitors user behavior, or gathers information about the user, sometimes including personally identifiable or other sensitive information.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Trojan:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Trojan or Trojan House is a software application with hidden destructive functionality. It is a program that appears to do one thing but actually does another.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Trojan-Downloader:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Downloads and installs new malware or adware on the targeted computer.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Trojan-Dropper:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Used to install other malware on a computer without the computer user's knowledge.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Trojan-Proxy:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">These Trojans function as a proxy server and provide anonymous access to the Internet from infected machines.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Trojan-PSW:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">This type of Trojan is designed to steal passwords.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Trojan-Spy:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A type of Trojan that includes a variety of spy programs and keyloggers.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Virus:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">As you know, a Virus is a computer program that replicates by attaching itself to another object and/or program.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Vulnerability:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Vulnerabilities open security holes that can allow other applications to connect to the computer system without your authorization or knowledge.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">W32:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">W32 is a Platform designator for 32-bit versions of Microsoft Windows. 32-bit refers to the chip architecture that the version of Windows is designed for.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Worm:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">A Worm is a computer program that replicates independently by sending itself to other systems.<br />Worms are "<em>network viruses</em>", primarily replicating on networks. Usually a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user. Multiple vectors of spreading result in malware being typed as "Worm". A single vector of spreading will result in a more specific type. Examples: "Net-Worm", "IM-Worm", or "Bluetooth-Worm".</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Zombie:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">See 'Botnet'.</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-83444363586969161392008-05-09T06:40:00.000-07:002008-11-13T04:04:54.784-08:00MS Excel Shortcuts<a href="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCRVwS7WNGI/AAAAAAAAAQw/XD4QELSPodw/s1600-h/Excel.png"><img id="BLOGGER_PHOTO_ID_5198374158095234146" style="CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCRVwS7WNGI/AAAAAAAAAQw/XD4QELSPodw/s400/Excel.png" border="0" /></a><br /><br /><div align="justify"></div><br /><br /><ul><li><div align="justify">Apply the outline border to the selected cells. [ Ctrl-Shift-& ]</div></li><li><div align="justify">Apply the Date format with the day, month, and year.[ Ctrl-Shift-# ]</div></li><li><div align="justify">Apply the Time format with the hour and minute, and AM or PM. [ Ctrl-Shift-@ ]</div></li><li><div align="justify">Enter the current time. [ Ctrl-Shift-: ]</div></li><li><div align="justify">Enter the current date. [ Ctrl-; ]</div></li><li><div align="justify">Hide the selected rows. [ Ctrl-9 ]</div></li><li><div align="justify">Hide the selected columns. [ Ctrl-0 ]</div></li><li><div align="justify">Alternate between displaying cell values and displaying formulas in the worksheet.[ Ctrl-` ]</div></li><li><div align="justify">Display the Find and Replace dialog box, with the Replace tab selected. [ Ctrl-H ]</div></li><li><div align="justify">Display the Insert Hyperlink dialog box for new hyperlink. [ Ctrl-K ]</div></li><li><div align="justify">Display the Print Preview window. [ Ctrl-F2 ]</div></li><li><div align="justify">Switch to the next workbook window. [ Ctrl-F6 ]</div></li><li><div align="justify">Display the Macro dialog box to create, run, edit, or delete a macro. [ Alt-F8 ]</div></li></ul>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-13161694523176708012008-05-09T04:38:00.000-07:002008-11-13T04:04:54.898-08:00Photoshop Shortcut Keys<a href="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQ5lS7WNFI/AAAAAAAAAQo/2jgqgQo5gIo/s1600-h/PSCS3_beta_Presentation_FINAL-30%5B1%5D.png"><img id="BLOGGER_PHOTO_ID_5198343182791095378" style="CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQ5lS7WNFI/AAAAAAAAAQo/2jgqgQo5gIo/s400/PSCS3_beta_Presentation_FINAL-30%5B1%5D.png" border="0" /></a><br /><div><strong><span style="color:#cc0000;"></span></strong></div><br /><div><strong><span style="color:#cc0000;">Main Toolbar:<br /></span></strong><br />· m Marquee Tool Move Tool v<br />· l Lasso Tool Magic Wand Tool w<br />· j Airbrush Tool Paintbrush Tool b<br />· s Rubber Stamp Tool History Brush Tool y<br />· e Eraser Tool Pencil Tool n<br />· r Blur Tool Dodge Tool o<br />· p Pen Tool Type Tool t<br />· u Measure Tool Linear Gradient Tool g<br />· k Paint Bucket Tool Eyedropper Tool i<br />· h Hand Tool Zoom Tool z<br />· d Default foreground and background colors.<br />· x Switches between foreground and background colors.<br />· q Switches between standard mode or quick mask mode.<br />· f Switches between screen modes.<br />· TAB Hides/Unhides open tools.<br /><br /><strong><span style="color:#cc0000;">File Menu:</span></strong><br /><br />· CTRL + N New<br />· CTRL + O Open<br />· CTRL + ALT + O Open As<br />· CTRL + W Close<br />· CTRL + S Save<br />· CTRL + SHIFT + S Save As<br />· CTRL + ALT + S Save a Copy<br />· CTRL + SHIFT + P Page Setup<br />· CTRL + P Print<br />· CTRL + K Preferences > General<br /><br /><strong><span style="color:#cc0000;">Edit Menu:</span></strong><br /><br />· CTRL + Z Undo<br />· CTRL + X Cut<br />· CTRL + C Copy<br />· CTRL + SHIFT + C Copy Merged<br />· CTRL + V Paste<br />· CTRL + SHIFT + V Paste Into<br />· CTRL + T Free Transform<br />· CTRL + SHIFT + T Transform > Again<br /><br /><span style="color:#cc0000;"><strong>Image Menu:</strong><br /></span><br />· CTRL + L Adjust > Levels<br />· CTRL + SHIFT + L Adjust > Auto Levels<br />· CTRL + ALT + SHIFT + L Adjust > Auto Contrast<br />· CTRL + M Adjust > Curves<br />· CTRL + B Adjust > Color Balance<br />· CTRL + U Adjust > Hue/Saturation<br />· CTRL + SHIFT + U Adjust > Desaturate<br />· CTRL + I Adjust > Invert<br />· CTRL + ALT + X Extract<br /><br /><strong><span style="color:#cc0000;">Layer Menu:</span></strong><br /><br />· CTRL + SHIFT + N New > Layer<br />· CTRL + J New > Layer Via Copy<br />· CTRL + SHIFT + J New > Layer Via Cut<br />· CTRL + G Group with Previous<br />· CTRL + SHIFT + G Ungroup<br />· CTRL + SHIFT + ] Arrange > Bring to Front<br />· CTRL + ] Arrange > Bring Forward<br />· CTRL + [ Arrange > Send Backward<br />· CTRL + SHIFT + [ Arrange > Send to Back<br />· CTRL + E Merge Down<br />· CTRL + SHIFT + E Merge Visible<br /><br /><strong><span style="color:#cc0000;">Select Menu:</span></strong><br /><br />· CTRL + A All<br />· CTRL + D Deselect<br />· CTRL + SHIFT + D Reselect<br />· CTRL + SHIFT + I Inverse<br />· CTRL + ALT + D Feather<br /><br /><strong><span style="color:#cc0000;">Filter Menu:</span></strong><br /><br />· CTRL + F Last Filter<br />· CTRL + SHIFT + F Fade<br /><br /><strong><span style="color:#cc0000;">View Menu:</span></strong><br /><br />· CTRL + Y Preview > CMYK<br />· CTRL + SHIFT + Y Gamut Warning<br />· CTRL + + Zoom In<br />· CTRL + - Zoom Out<br />· CTRL + 0 Fit on Screen<br />· CTRL + SHIFT + 0 Actual Pixels<br />· CTRL + H Hide Edges<br />· CTRL + SHIFT + H Hide Path<br />· CTRL + R Show Rulers<br />· CTRL + ; Hide Guides<br />· CTRL + SHIFT + ; Snap To Guides<br />· CTRL + ALT + ; Lock Guides<br />· CTRL + " Show Grid<br />· CTRL + SHIFT + " Snap To Grid<br /><br /><strong><span style="color:#cc0000;">Help Menu:</span></strong><br /><br />· F1 Contents<br /><br /><strong><span style="color:#cc0000;">Other Shortcuts:</span></strong><br /><br />· Page Up/Down Move view up/down 1 screen.<br />· SHIFT + Page Up/Down Nudge view up/down.<br />· CTRL + Page Up/Down Move view left/right 1 screen.<br />· CTRL + SHIFT + Page Up/Down Nudge screen left/right.<br />· CTRL + SHIFT + Z Previous History entry.<br />· CTRL + ALT + Z Next History entry.<br />· SHIFT + - Previous blending mode.<br />· SHIFT + + Next blending mode</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-26296150070689213612008-05-09T04:22:00.000-07:002008-11-13T04:04:55.055-08:00MS Word Shortcuts<a href="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQ0pS7WNEI/AAAAAAAAAQg/2yVjC3h-lMU/s1600-h/MS+Word+Shortcuts.jpg"><img id="BLOGGER_PHOTO_ID_5198337753952433218" style="CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQ0pS7WNEI/AAAAAAAAAQg/2yVjC3h-lMU/s400/MS+Word+Shortcuts.jpg" border="0" /></a><br /><div></div><br /><br />1<br />Ctrl + Shift + A<br />AllCaps<br />Makes the selection all capitals (toggle)<br /><br />2<br />Alt + Ctrl + 1<br />ApplyHeading1<br />Applies Heading 1 style to the selected text<br /><br />3<br />Alt + Ctrl + 2<br />ApplyHeading2<br />Applies Heading 2 style to the selected text<br /><br /><br />4<br />Alt + Ctrl + 3<br />ApplyHeading3<br />Applies Heading 3 style to the selected text<br /><br /><br />5<br />Ctrl + Shift + L<br />ApplyListBullet<br />Applies List Bullet style to the selected text<br /><br /><br /><br />6<br />Alt + F10<br />AppMaximize<br />Enlarges the application window to full size<br /><br /><br />7<br />Alt + F5<br />AppRestore<br />Restores the application window to normal size<br /><br /><br />8<br />Ctrl+B<br />Bold<br />Makes the selection bold (toggle)<br /><br /><br />9<br />Ctrl + PgDn<br />BrowseNext<br />Jump to the next browse object<br /><br /><br />10<br />Ctrl + PgUp<br />BrowsePrev<br />Jump to the previous browse object<br /><br /><br />11<br />Alt + Ctrl + Home<br />BrowseSel<br />Select the next/prev browse object<br /><br />12<br />Esc<br />Cancel<br />Terminates an action<br /><br />13<br />Ctrl+E<br />CenterPara<br />Centers the paragraph between the indents<br /><br />14<br />Shift+F3<br />ChangeCase<br />Changes the case of the letters in the selection<br /><br />15<br />Left arrow<br />CharLeft<br />Moves the insertion point to the left one character<br /><br /><br /><br />16<br />Shift + Left arrow<br />CharLeftExtend<br />Extends the selection to the left one character<br /><br />17<br />Rt arrow<br />CharRight<br />Moves the insertion point to the right one character<br /><br />18<br />Shift + Rt arrow<br />CharRightExtend<br />Extends the selection to the right one character<br /><br />19<br />Alt + Shift + C<br />ClosePane<br />Closes the active window pane (if you are in Normal View and have, for example, the Footnote pane open)<br /><br />20<br />Alt+Drag (or press Ctrl + Shift + F8 and drag, but Alt + Drag is far easier!)<br />ColumnSelect<br />Selects a columnar block of text<br /><br /><br /><br />21<br />Ctrl +Shift+C<br />CopyFormat<br />Copies the formatting of the selection<br /><br />22<br />Shift + F2<br />CopyText<br />Makes a copy of the selection without using the clipboard (press Return to paste)<br /><br />23<br />Alt + F3<br />CreateAutoText<br />Adds an AutoText entry to the active template<br /><br />24<br />Ctrl+ Backspace<br />DeleteBackWord<br />Deletes the previous word without putting it on the Clipboard<br /><br />25<br />Ctrl + Del<br />DeleteWord<br />Deletes the next word without putting it on the Clipboard<br /><br /><br /><br />26<br />Ctrl+W, Ctrl+F4<br />DocClose<br />Prompts to save the document and then closes the active window. (But doesn't intercept the menu command)<br /><br />27<br />Ctrl + F10<br />DocMaximize<br />Enlarges the active window to full size<br /><br />28<br />Ctrl + F7<br />DocMove<br />Changes the position of the active window<br /><br />29<br />Ctrl + F5<br />DocRestore<br />Restores the window to normal size<br /><br />30<br />Ctrl + F8<br />DocSize<br />Changes the size of the active window<br /><br /><br />31<br />Alt + Ctrl + S<br />DocSplit<br />Splits the active window horizontally and then adjusts the split<br /><br />32<br />Alt + Shift + F9<br />DoFieldClick<br />Executes the action associated with macrobutton fields<br /><br />33<br />Ctrl + Shift + D<br />DoubleUnderline<br />Double underlines the selection (toggle)<br /><br />34<br />Alt R, G<br />DrawGroup<br />Groups the selected drawing objects<br /><br />35<br />Alt R, I<br />DrawSnapToGrid<br />Sets up a grid for aligning drawing objects<br /><br /><br /><br />36<br />Alt R, U<br />DrawUngroup<br />Ungroups the selected group of drawing objects<br /><br />37<br />Ctrl+Shift+F5 (Or: Alt I, K)<br />EditBookmark<br />Brings up the bookmark dialog<br /><br />38<br />Del<br />EditClear<br />Performs a forward delete or removes the selection without putting it on the Clipboard<br /><br />39<br />Ctrl+C<br />EditCopy<br />Copies the selection and puts it on the Clipboard<br /><br />40<br />Ctrl+X<br />EditCut<br />Cuts the selection and puts it on the Clipboard<br /><br /><br /><br />41<br />Ctrl+F<br />EditFind<br />Finds the specified text or the specified formatting<br /><br />42<br />F5, Ctrl+G<br />EditGoTo<br />Jumps to a specified place in the active document<br /><br />43<br />Alt E, K<br />EditLinks<br />Allows links to be viewed, updated, opened, or removed<br /><br />44<br />Ctrl+V<br />EditPaste<br />Inserts the Clipboard contents at the insertion point<br /><br />45<br />Alt E, S<br />EditPasteSpecial<br />Inserts the Clipboard contents as a linked object, embedded object, or other format<br /><br />46<br />Alt + Shift + Backspc<br />EditRedo<br />Redoes the last action that was undone<br /><br />47<br />F4<br />EditRedoOrRepeat<br />Repeats the last command, or redoes the last action that was undone (unfortunately, doesn't work for as many commands in Word 2000 as in Word 97 and below, but this is still one of Word's most useful shortcuts, if not the most useful)<br /><br />48<br />Ctrl+H<br />EditReplace<br />Finds the specified text or the specified formatting and replaces it<br /><br />49<br />Ctrl+A<br />EditSelectAll<br />Selects the entire document<br /><br />50<br />Ctrl+Z<br />EditUndo<br />Reverses the last action<br /><br /><br /><br />51<br />Alt + PageDn (to select to end of column, use Alt + Shift + PgDn)<br />EndOfColumn<br />Moves to the last cell in the current table column<br /><br />52<br />Ctrl+Shift+End<br />EndOfDocExtend<br />Extends the selection to the end of the last line of the document<br /><br />53<br />Ctrl+End<br />EndOfDocument<br />Moves the insertion point to the end of the last line of the document<br /><br />54<br />End<br />EndOfLine<br />Moves the insertion point to the end of the current line<br /><br />55<br />Shift+End<br />EndOfLineExtend<br />Extends the selection to the end of the current line<br /><br /><br /><br />56<br />Alt+End<br />EndOfRow<br />Moves to the last cell in the current row<br /><br />57<br />Alt + Ctrl + PgDn<br />EndOfWindow<br />Moves the insertion point to the end of the last visible line on the screen<br /><br />58<br />Shift + Alt + Ctrl + PgDn<br />EndOfWindowExtend<br />Extends the selection to the end of the last visible line on the screen<br /><br />59<br />F8 (press Esc to turn off)<br />ExtendSelection<br />Turns on extend selection mode and then expands the selection with the direction keys<br /><br />60<br />Alt + F4 (<9>)<br />FileCloseOrExit<br />Closes the current document, or if no documents are open, quits Word. Horrible command, as it makes it a long winded business to quit Word. But there's a simple solution - assign Alt+F4 to FileExit instead.<br /><br /><br />61<br />Alt + F4 (Word 97)<br />FileExit<br />Quits Microsoft Word and prompts to save the documents (does intercept the menu item, but not the keyboard shortcut, or the x button. An AutoExit macro is usually a better way of intercepting this).<br /><br />62<br />NOT Ctrl+N!!<br />FileNew<br />Creates a new document or template (brings up the dialog). Note that: Word pretends that Ctrl+N is assigned to FileNew but it isn't, it's assigned to FileNewDefault You can fix this in Word 2000 by assigning Ctrl+N to the FileNewDialog command. In Word 97 the only way to fix it is to create a macro called FileNew (to do this, press Alt + F8, type "FileNew" without the quotes and Click "Create". The macro will automatically contain the code needed to make it work).<br /><br />63<br />Ctrl+N<br />FileNewDefault<br />Creates a new document based on the Normal template.<br /><br />64<br />Ctrl+O<br />FileOpen<br />Opens an existing document or template<br /><br />65<br />Alt F, U<br />FilePageSetup<br />Changes the page setup of the selected sections<br /><br /><br />66<br />Ctrl + P<br />FilePrint<br />Prints the active document (brings up the dialog)<br /><br />67<br />Ctrl+F2<br />FilePrintPreview<br />Displays full pages as they will be printed<br /><br />68<br />Alt F, I<br />FileProperties<br />Shows the properties of the active document<br /><br />69<br />Ctrl+S<br />FileSave<br />FileSave<br /><br />70<br />Alt F, A (or F12)<br />FileSaveAs<br />Saves a copy of the document in a separate file (brings up the dialog)<br /><br /><br /><br />71<br />Ctrl+Shift+F<br />Font<br />Activates the Fonts listbox on the formatting toolbar<br /><br />72<br />Ctrl+Shift+P<br />FontSizeSelect<br />Activates the Font Size drop-down on the formatting toolbar<br /><br />73<br />Alt + Ctrl + K<br />FormatAutoFormat<br />Automatically formats a document (or sometimes, automatically screws it up)<br /><br />74<br />Alt O, B<br />FormatBordersAndSha ding<br />Changes the borders and shading of the selected paragraphs, table cells, and pictures<br /><br />75<br />Alt O, E<br />FormatChangeCase<br />Changes the case of the letters in the selection<br /><br /><br /><br />76<br />Alt O, C<br />FormatColumns<br />Changes the column format of the selected sections (brings up the dialog)<br /><br />77<br />Alt O, D<br />FormatDropCap<br />Formats the first character of current paragraph as a dropped capital (must select it first)<br /><br />78<br />Ctrl+D<br />FormatFont<br />Brings up the Format + Font dialog<br /><br />79<br />Alt + Shift + R<br />FormatHeaderFooterL ink<br />Links the current header/footer to the previous section (but does not intercept the button on the Header Footer toolbar)<br /><br />80<br />Alt O, P<br />FormatParagraph<br />Brings up the Format Paragraph dialog<br /><br /><br /><br />81<br />Alt O, S<br />FormatStyle<br />Applies, creates, or modifies styles<br /><br />82<br />Alt O, T<br />FormatTabs<br />Brings up the Format Tabs dialog<br /><br />83<br />Shift + F5<br />GoBack<br />Returns to the previous insertion point (goes back to up to 3 points, then returns to where you started; this is one of the most useful shortcuts of them all. Also useful when opening a document, if you want to g straight to where you were last editing it)<br /><br />84<br />Ctrl + ><br />GrowFont<br />Increases the font size of the selection<br /><br />85<br />Ctrl + ]<br />GrowFontOnePoint<br />Increases the font size of the selection by one point<br /><br /><br /><br />86<br />Ctrl + T (or drag the ruler)<br />HangingIndent<br />Increases the hanging indent<br /><br />87<br />F1<br />Help<br />Microsoft Word Help<br /><br />88<br />Shift + F1<br />HelpTool<br />Lets you get help on a command or screen region or examine text properties<br /><br />89<br />Ctrl + Shift + H<br />Hidden<br />Makes the selection hidden text (toggle)<br /><br />90<br />Click on it<br />HyperlinkOpen<br />Connect to a hyperlink's address<br /><br /><br /><br />91<br />Ctrl + M (or drag the ruler)<br />Indent<br />Moves the left indent to the next tab stop<br /><br />92<br />Alt + Ctrl + M (or Alt I, M)<br />InsertAnnotation<br />Inserts a comment<br /><br />93<br />F3<br />InsertAutoText<br />Replaces the name of the AutoText entry with its contents<br /><br />94<br />Alt I, B<br />InsertBreak<br />Ends a page, column, or section at the insertion point<br /><br />95<br />Alt I, C<br />InsertCaption<br />Inserts a caption above or below a selected object<br /><br /><br /><br />96<br />Ctrl + Shift + Return<br />InsertColumnBreak<br />Inserts a column break at the insertion point<br /><br />97<br />Alt + Shift + D<br />InsertDateField<br />Inserts a date field<br /><br />98<br />Alt + Ctrl + D<br />InsertEndnoteNow<br />Inserts an endnote reference at the insertion point without displaying the dialog<br /><br />99<br />Alt I, F<br />InsertField<br />Inserts a field in the active document<br /><br />100<br />Ctrl+F9<br />InsertFieldChars<br />Inserts an empty field with the enclosing field characters<br /><br /><br /><br />101<br />Alt I, L<br />InsertFile<br />Inserts the text of another file into the active document<br /><br />102<br />Alt I, N<br />InsertFootnote<br />Inserts a footnote or endnote reference at the insertion point<br /><br />103<br />Alt + Ctrl + F<br />InsertFootnoteNow<br />Inserts a footnote reference at the insertion point without displaying the dialog<br /><br />104<br />Ctrl + K<br />InsertHyperlink<br />Insert Hyperlink<br /><br />105<br />Alt I, D<br />InsertIndexAndTable s<br />Inserts an index or a table of contents, figures, or authorities into the document<br /><br /><br /><br />106<br />Alt + Ctrl + L<br />InsertListNumField<br />Inserts a ListNum Field<br /><br />107<br />Alt + Shift + F<br />InsertMergeField<br />Brings up a dialog to insert a mail merge field at the insertion point. (It does not intercept the button on the Mail merge. toolbar)<br /><br />108<br />Ctrl + Return<br />InsertPageBreak<br />Inserts a page break at the insertion point<br /><br />109<br />Alt + Shift + P<br />InsertPageField<br />Inserts a page number field<br /><br />110<br />Ctrl + Shift + F3<br />InsertSpike<br />Empties the spike AutoText entry and inserts all of its contents into the document<br /><br /><br /><br />111<br />Alt + Shift + T<br />InsertTimeField<br />Inserts a time field<br /><br />112<br />Ctrl + I<br />Italic<br />Makes the selection italic (toggle)<br /><br />113<br />Ctrl + J<br />JustifyPara<br />Aligns the paragraph at both the left and the right indent<br /><br />114<br />Ctrl + L<br />LeftPara<br />Aligns the paragraph at the left indent<br /><br />115<br />Down arrow<br />LineDown<br />Moves the insertion point down one line<br /><br /><br /><br />116<br />Shift + down arrow<br />LineDownExtend<br />Extends the selection down one line<br /><br />117<br />Up arrow<br />LineUp<br />Moves the insertion point up one line<br /><br />118<br />Shift + up arrow<br />LineUpExtend<br />Extends the selection up one line<br /><br />119<br />Ctrl + F11<br />LockFields<br />Locks the selected fields to prevent updating<br /><br />120<br />Alt + Shift + K<br />MailMergeCheck<br />Checks for errors in a mail merge<br /><br /><br /><br />121<br />Alt+Shift+E<br />MailMergeEditDataSo urce<br />Lets you edit a mail merge data source<br /><br />122<br />Alt + Shift + N<br />MailMergeToDoc<br />Collects the results of the mail merge in a document<br /><br />123<br />Alt Shift + M<br />MailMergeToPrinter<br />Sends the results of the mail merge to the printer<br /><br />124<br />Alt + Shift + I<br />MarkCitation<br />Marks the text you want to include in the table of authorities<br /><br />125<br />Alt + Shift + X<br />MarkIndexEntry<br />Marks the text you want to include in the index<br /><br /><br /><br />126<br />Alt + Shift + O<br />MarkTableOfContents Entry<br />Inserts a TC field (but it is far better to use Heading Styles to generate your Table of Contents instead)<br /><br />127<br />Alt or F10<br />MenuMode<br />Makes the menu bar active<br /><br />128<br />Alt + Shift + F11<br />MicrosoftScriptEdit or<br />Starts or switches to Microsoft Development Environment application, allowing you to view the HTML/XML source code that would be behind the document if it were in ..htm format (or that is behind it if it already is in .htm format).<br /><br />129<br />Alt + Ctrl + F1<br />MicrosoftSystemInfo<br />Execute the Microsoft System Info application<br /><br />130<br />F2<br />MoveText<br />Moves the selection to a specified location without using the clipboard (press Return to execute the more)<br /><br /><br /><br />131<br />Tab<br />NextCell<br />Moves to the next table cell<br /><br />132<br />F11<br />NextField<br />Moves to the next field<br /><br />133<br />Alt + F7<br />NextMisspelling<br />Find next spelling error<br /><br />134<br />Alt + down arrow<br />NextObject<br />Moves to the next object on the page<br /><br />135<br />Ctrl + F6<br />NextWindow<br />Switches to the next document window, equivalent to selecting a document from the Window menu.<br /><br /><br /><br />136<br />Ctrl+Shift+N<br />NormalStyle<br />Applies the Normal style<br /><br />137<br />Ctrl + 0<br />OpenOrCloseUpPara<br />Sets or removes extra spacing above the selected paragraph<br /><br />138<br />F6<br />OtherPane<br />Switches to another window pane in Normal View (for instance, if you have if you have a Footnotes pane open in Normal view and want to switch to the main document and back without closing the pane).<br /><br />139<br />Alt + _<br />OutlineCollapse<br />Collapses an Outline in Outline View by one level<br /><br />140<br />Alt+Shift+rt arrow<br />OutlineDemote<br />Demotes the selected paragraphs one heading level<br /><br /><br /><br />141<br />Alt + +<br />OutlineExpand<br />Expands an Outline in Outline View by one level<br /><br />142<br />Alt+Shift+down arrow<br />OutlineMoveDown<br />Moves the selection below the next item in the outline<br /><br />143<br />Alt+Shift+up arrow<br />OutlineMoveUp<br />Moves the selection above the previous item in the outline<br /><br />144<br />Alt+Shift+left arrow<br />OutlinePromote<br />Promotes the selected paragraphs one heading level<br /><br />145<br />Alt + Shift + L<br />OutlineShowFirstLin e<br />Toggles between showing the first line of each paragraph only or showing all of the body text in the outline<br /><br /><br /><br />146<br />Ins<br />Overtype<br />Toggles the typing mode between replacing and inserting<br /><br />147<br />PgDn<br />PageDown<br />Moves the insertion point and document display to the next screen of text<br /><br />148<br />Shift+ PgDn<br />PageDownExtend<br />Extends the selection and changes the document display to the next screen of text<br /><br />149<br />PgUp<br />PageUp<br />Moves the insertion point and document display to the previous screen of text<br /><br />150<br />Shift + PgUp<br />PageUpExtend<br />Extends the selection and changes the document display to the previous screen of text<br /><br /><br /><br />151<br />Ctrl + down arrow<br />ParaDown<br />Moves the insertion point to the beginning of the next paragraph<br /><br />152<br />Shift + Ctrl + down arrow<br />ParaDownExtend<br />Extends the selection to the beginning of the next paragraph<br /><br />153<br />Ctrl + up arrow<br />ParaUp<br />Moves the insertion point to the beginning of the previous paragraph<br /><br />154<br />Shift + Ctrl + up arrow<br />ParaUpExtend<br />Extends the selection to the beginning of the previous paragraph<br /><br />155<br />Ctrl+Shift+V<br />PasteFormat<br />Applies the previously copied formatting to selection<br /><br /><br /><br />156<br />Shift + Tab<br />PrevCell<br />Moves to the previous table cell<br /><br />157<br />Shift + F11<br />PrevField<br />Moves to the previous field<br /><br />158<br />Alt + up arrow<br />PrevObject<br />Moves to the previous object on the page<br /><br />159<br />Ctrl + Shift + F6<br />PrevWindow<br />Switches back to the previous document window<br /><br />160<br />Sfift+F4<br />RepeatFind<br />Repeats Go To or Find to find the next occurrence<br /><br /><br /><br />161<br />Ctrl+Spacebar<br />ResetChar<br />Makes the selection the default character format of the applied style<br /><br />162<br />Ctrl+Q<br />ResetPara<br />Makes the selection the default paragraph format of the applied style<br /><br />163<br />Ctrl +R<br />RightPara<br />Aligns the paragraph at the right indent<br /><br />164<br />Ctrl + *<br />ShowAll<br />Shows/hides all nonprinting characters<br /><br />165<br />Alt + Shift + A<br />ShowAllHeadings<br />Displays all of the heading levels and the body text in Outline ViewAnonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-74313120481189634212008-05-09T04:12:00.000-07:002008-11-13T04:04:55.197-08:00101 Run XP Commands<a href="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQy9S7WNDI/AAAAAAAAAQY/LD_fQtG0rKA/s1600-h/Command%2BPrompt.png"><img id="BLOGGER_PHOTO_ID_5198335898526561330" style="CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQy9S7WNDI/AAAAAAAAAQY/LD_fQtG0rKA/s400/Command%2BPrompt.png" border="0" /></a><br /><div align="justify"></div><br /><div align="justify">Nearly all of the Run Commands Correspond to a particular Control Panel Item or a Utility, Tool or Task that can be accessed through Windows. There are, however, tools and utilities that I bet you never knew you had that can be accessed through the Run feature. The main reason most people don't use the Run feature is because they don't know the Commands. So, to solve that problem, I decided to put together the following listing, which lists 101 Run Commands and what they correspond too.<br /></div><br /><div align="center"><strong><u><span style="color:#3333ff;">Go to Start Button ===>> Run & try this below commands >></span></u></strong></div><br /><div align="justify"></div><br /><ul><br /><li>Accessibility Controls access.cpl</li><br /><li>Add Hardware Wizard hdwwiz.cpl</li><br /><li>Add/Remove Programs appwiz.cpl </li><br /><li>Administrative Tools control.exe admintools </li><br /><li>Automatic Updates wuaucpl.cpl </li><br /><li>Bluetooth Transfer Wizard fsquirt </li><br /><li>Calculator calc </li><br /><li>Certificate Manager certmgr.msc </li><br /><li>Character Map charmap </li><br /><li>Check Disk Utility chkdsk </li><br /><li>Clipboard Viewer clipbrd </li><br /><li>Command Prompt cmd </li><br /><li>Component Services dcomcnfg </li><br /><li>Computer Management compmgmt.msc </li><br /><li>Date and Time Properties timedate.cpl </li><br /><li>DDE Shares ddeshare </li><br /><li>Device Manager devmgmt.msc </li><br /><li>Direct X Control Panel (if installed)* directx.cpl </li><br /><li>Direct X Troubleshooter dxdiag </li><br /><li>Disk Cleanup Utility cleanmgr </li><br /><li>Disk Defragment dfrg.msc </li><br /><li>Disk Management diskmgmt.msc </li><br /><li>Disk Partition Manager diskpart </li><br /><li>Display Properties control.exe desktop </li><br /><li>Display Properties desk.cpl </li><br /><li>Display Properties (w/Appearance Tab Preselected) control.exe color </li><br /><li>Dr. Watson System Troubleshooting Utility drwtsn32 </li><br /><li>Driver Verifier Utility verifier </li><br /><li>Event Viewer eventvwr.msc </li><br /><li>File Signature Verification Tool sigverif </li><br /><li>Findfast findfast.cpl </li><br /><li>Folders Properties control.exe folders </li><br /><li>Fonts control.exe fonts </li><br /><li>Fonts Folder fonts </li><br /><li>Free Cell Card Game freecell </li><br /><li>Game Controllers joy.cpl </li><br /><li>Group Policy Editor (XP Prof) gpedit.msc </li><br /><li>Hearts Card Game mshearts </li><br /><li>Iexpress Wizard iexpress </li><br /><li>Indexing Service ciadv.msc </li><br /><li>Internet Properties inetcpl.cpl </li><br /><li>Java Control Panel (if installed) jpicpl32.cpl </li><br /><li>Java Control Panel (if installed) javaws </li><br /><li>Keyboard Properties control.exe keyboard </li><br /><li>Local Security Settings secpol.msc </li><br /><li>Local Users and Groups lusrmgr.msc </li><br /><li>Logs You Out Of Windows logoff </li><br /><li>Mcft Chat winchat </li><br /><li>Minesweeper Game winmine </li><br /><li>Mouse Properties control.exe mouse </li><br /><li>Mouse Properties main.cpl </li><br /><li>Network Connections control.exe netconnections </li><br /><li>Network Connections ncpa.cpl </li><br /><li>Network Setup Wizard netsetup.cpl </li><br /><li>Nview Desktop Manager (if installed) nvtuicpl.cpl </li><br /><li>Object Packager packager </li><br /><li>ODBC Data Source Administrator odbccp32.cpl </li><br /><li>On Screen Keyboard osk </li><br /><li>Opens AC3 Filter (if installed) ac3filter.cpl </li><br /><li>Password Properties password.cpl </li><br /><li>Performance Monitor perfmon.msc </li><br /><li>Performance Monitor perfmon </li><br /><li>Phone and Modem Options telephon.cpl </li><br /><li>Power Configuration powercfg.cpl </li><br /><li>Printers and Faxes control.exe printers </li><br /><li>Printers Folder printers </li><br /><li>Private Character Editor eudcedit </li><br /><li>Quicktime (If Installed) QuickTime.cpl </li><br /><li>Regional Settings intl.cpl </li><br /><li>Registry Editor regedit </li><br /><li>Registry Editor regedit32 </li><br /><li>Removable Storage ntmsmgr.msc </li><br /><li>Removable Storage Operator Requests ntmsoprq.msc </li><br /><li>Resultant Set of Policy rsop.msc </li><br /><li>Resultant Set of Policy (XP Prof) rsop.msc </li><br /><li>Scanners and Cameras sticpl.cpl </li><br /><li>Scheduled Tasks control.exe schedtasks </li><br /><li>Security Center wscui.cpl </li><br /><li>Services services.msc </li><br /><li>Shared Folders fsmgmt.msc </li><br /><li>Shuts Down Windows shutdown </li><br /><li>Sounds and Audio mmsys.cpl </li><br /><li>Spider Solitare Card Game spider </li><br /><li>SQL Client Configuration cliconfg </li><br /><li>System Configuration Editor sysedit </li><br /><li>System Configuration Utility msconfig </li><br /><li>System File Checker Utility sfc </li><br /><li>System Properties sysdm.cpl </li><br /><li>Task Manager taskmgr </li><br /><li>Telnet Client telnet </li><br /><li>User Account Management nusrmgr.cpl </li><br /><li>Utility Manager utilman </li><br /><li>Windows Firewall firewall.cpl </li><br /><li>Windows Magnifier magnify </li><br /><li>Windows Management Infrastructure wmimgmt.msc </li><br /><li>Windows System Security Tool syskey </li><br /><li>Windows Update Launches wupdmgr </li><br /><li>Windows XP Tour Wizard tourstart </li><br /><li>Wordpad write</li></ul>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-56419941425247284122008-05-09T04:02:00.000-07:002008-11-13T04:04:55.335-08:00Add-ons for IE<a href="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQxRS7WNCI/AAAAAAAAAQQ/8bm6z084fMQ/s1600-h/ie8+image.bmp"><img id="BLOGGER_PHOTO_ID_5198334043100689442" style="CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCQxRS7WNCI/AAAAAAAAAQQ/8bm6z084fMQ/s400/ie8+image.bmp" border="0" /></a><br /><div><br /><div align="justify"></div><br /><br /><div align="justify">Mozilla Firefox is the most popular browser in terms of extensions and Add-ons and this is the reason why its the most preferred browser among bloggers. But Internet Explorer users, need not worry as IE too have some good add-ons to customize the features. Here is the list of top 8 useful and popular add-ons for Internet Explorer.</div><br /><br /><div align="justify"></div><br /><br /><div align="justify"><span style="color:#cc0000;"><strong>1.</strong> <strong>IE7Pro:</strong></span> IE7Pro is an add-on for IE 7 which adds lots of features and extras to make your IE easier, more useful, secure and customizable. IE7Pro includes Tabbed Browsing Management, AD Blocker, Flash Block, Super Drag Drop, Crash Recovery, Proxy Switcher, Mouse Gesture, Tab History Browser, Inline Search, User Agent Switcher, Webpage Capturer, Greasemonkey like User Scripts platform, User Plug-ins and many more power packed features. You can customize not just internet Explorer, but even your favorite web site according to your need and taste using IE7Pro.</div><br /><br /><div align="justify"><br /><strong><span style="color:#cc0000;">2. IE Spell:</span></strong> IESpell is a add-on for Internet Explorer v6 and v7. It checks the spelling of almost any text that you enter in IE, whether it be Web-based email, blog entries, forums, dairies and so on. The add-on also lets you look up the meaning of a word in your choice of several online dictionaries. This add-on is especially useful for bloggers composing and publishing posts through IE. Firefox has an in-build spell checker.</div><br /><br /><div align="justify"><br /><strong><span style="color:#cc0000;">3. Inline Search:</span></strong> Inline Search is an add-on which allows you to easily find words or phrases within a web page. This is similar to the Firefox’s search behavior which searches for the word as you type. The keyboard shortcut for search is CTRL+F, which brings up a toolbox in the status bar.</div><br /><br /><div align="justify"><br /><strong><span style="color:#cc0000;">4. Google Preview IE:</span></strong> GooglePreviewIE is a toolbar for Internet Explorer which inserts thumbnail images of web sites directly into both Google and Yahoo search results. It also features a pop-up blocker and enhanced search functionality, the toolbar lets you easily preview the look and feel of a site without actually visiting it.</div><br /><br /><div align="justify"><br /><strong><span style="color:#cc0000;">5. IE7 Open Last Closed Tab:</span></strong> IE7 Open Last Closed Tab is a plug-in for Internet Explorer 7 that makes “Alt-X” reopens the last closed tab. This is very useful when you accidentally close a tab that you didn’t mean to close. Instead of trying to find it in your browser history, you hit “Alt-X” and it automatically reopens in a new tab. Alt-Q will give you thumbnails of the previous tabs you’ve closed.</div><br /><br /><div align="justify"><br /><strong><span style="color:#cc0000;">6. Stumble Upon:</span></strong> Stumble Upon is a toolbar for IE which allows you to discover thousands of web sites that match your interests. You can also write reviews about the websites, recommend and share sites with your friends network. It has been a great hit among bloggers. Stumble Upon also supports IE6.</div><br /><br /><div align="justify"><br /><strong><span style="color:#cc0000;">7. Add Search Providers:</span></strong> Add Search Providers allows you to add search engines to the default search in IE. You can also create your own search toolbar (just follow the instructions on the page) if the desired search engine is not featured in the list.</div><br /><br /><div align="justify"><br /><strong><span style="color:#cc0000;">8. Convert & download Youtube:</span></strong> Convert and Download YouTube add-on helps you to batch download and convert Youtube video in a click. With this you can download and convert Youtube flash video (FLV file), flash to AVI (divx, mp3), flash to MOV, flash to MP4 (iPod, PSP), flash to 3GP (mobile), flash to mp3 (audio only), converts FLV to MPEG4 more faster.</div></div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-2005838771484522762008-05-09T03:55:00.000-07:002008-11-13T04:04:55.563-08:00ActiveX<a href="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCQu6i7WNAI/AAAAAAAAAQA/W2iGo1n-caw/s1600-h/Empire+of+Microsoft.png"><img id="BLOGGER_PHOTO_ID_5198331453235409922" style="CURSOR: hand" alt="" src="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCQu6i7WNAI/AAAAAAAAAQA/W2iGo1n-caw/s400/Empire+of+Microsoft.png" border="0" /></a><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">What is ActiveX?</span></strong></div><br /><div align="justify"><br />ActiveX is a set of technologies from Microsoft that enables interactive content for the World Wide Web. Before ActiveX, Web content was static, 2-dimensional text and graphics. With ActiveX, Web sites come alive using multimedia effects, interactive objects, and sophisticated applications that create a user experience comparable to that of high-quality CD-ROM titles. ActiveX provides the glue that ties together a wide assortment of technology building blocks to enable these "active" Web sites.</div><br /><div align="justify"><br />A control using ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java.</div><br /><div align="justify"><br />An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments. Related to ActiveX is a scripting language called VBScript that enables Web authors to embed interactive elements in HTML documents.</div><br /><div align="justify"></div><br /><div align="justify">The BarCode-ActiveX Control has all the features necessary to easily add professional quality barcodes to any Windows application including Web pages, database reporting and labeling, product packaging, document tracking, postal bar coding and special purpose barcode labeling applications. It is an extremely easy and powerful tool that will work flawlessly with any Windows application that supports ActiveX technology including Visual Basic, Visual FoxPro, C++, Internet Explorer Web pages, Microsoft Word, Excel, Access, etc. Simply insert the Bar Code ActiveX Control into your application and specify a few properties in the properties window and your desired bar codes will be generated automatically.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Primary Benefits:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">Active Web Content with Impact that will attract and retain users. Open, Cross-Platform Support on Macintosh®, Windows® and UNIX® operating systems. Familiar Tools from a wide assortment of tools and programming language vendors, including Visual Basic®, Visual C++®, Borland® Delphi®, Borland C++, Java, and Java-enabled tools. Developers can use what they know and be productive immediately. Existing Inventory of ActiveX controls available today for immediate use by Web producers. Industry Standards, with built-in support for key industry and de-facto marketplace standards, including HTML, TCP/IP, Java, COM, and others.</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-8946613344333704562008-05-09T03:44:00.000-07:002008-11-13T04:04:55.650-08:00Keyword Importance<a href="http://4.bp.blogspot.com/_WqdqBzs8i6w/SCQs7y7WM_I/AAAAAAAAAP4/-_RZdSv-wHc/s1600-h/keywords.jpg"><img id="BLOGGER_PHOTO_ID_5198329275686990834" style="CURSOR: hand" alt="" src="http://4.bp.blogspot.com/_WqdqBzs8i6w/SCQs7y7WM_I/AAAAAAAAAP4/-_RZdSv-wHc/s400/keywords.jpg" border="0" /></a><br /><p align="justify"></p><p align="justify">Google results are generally based on 4 major criteria:</p><br /><ul><br /><li><div align="justify">Keyword Density</div></li><li><div align="justify">Keyword Prominence</div></li><li><div align="justify">Page Rank (Back Links)</div></li><li><div align="justify">Content</div></li></ul><p align="justify"><br /><strong><span style="color:#cc0000;"><u>Keyword Density</u>:</span></strong></p><br /><p align="justify"><strong></strong><br />The density of keyword affects the ranking of your page. The higher the keyword density the higher is your rank so one should always include a 30-40 word paragraph containing key-word rich content, thus increasing the keyword density.<br /></p><br /><p align="justify"><strong><span style="color:#cc0000;"><u>Keyword Prominence</u>:</span></strong></p><br /><p align="justify"><br />The keywords you have chosen should appear in title, Meta and H tags with some occurrence in the body also. So you should not define Google without putting the word Google in the body of the definition. This means H and P tags should go hand shaking with each other.</p><br /><p align="justify"><br /><strong><span style="color:#cc0000;"><u>Page Rank</u> (<u>Back Links</u>):</span></strong></p><p align="justify"><br />The more site links to your site better is the page rank of your site and more relevant your site is. Google also takes into consideration the words [or Anchor text] that appear in your back links.</p><p align="justify"><br /><strong><span style="color:#cc0000;"><u>Content</u>:</span></strong></p><p align="justify"><br />Some say that the Content of your site is the king, but for me it’s actually the crown which the webmaster wears if his site has the right content. Build the content and users will be interested just be reading it. The best proof of it is you are reading till the last line of this post because it has the content for you to help you.</p>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-20280192286235556602008-05-08T22:27:00.000-07:002008-11-13T04:04:55.803-08:00Tips for Web Domain<a href="http://1.bp.blogspot.com/_WqdqBzs8i6w/SCPkkS7WM-I/AAAAAAAAAPs/YwmHcy-v8kg/s1600-h/Mongolia_domain_name1_com%5B1%5D.jpg"><img id="BLOGGER_PHOTO_ID_5198249707122865122" style="CURSOR: hand" alt="" src="http://1.bp.blogspot.com/_WqdqBzs8i6w/SCPkkS7WM-I/AAAAAAAAAPs/YwmHcy-v8kg/s400/Mongolia_domain_name1_com%5B1%5D.jpg" border="0" /></a><br /><div align="justify"><strong></strong></div><br /><div align="justify"><strong>Annual Service Fee:</strong> The fee you pay to receive Domains or Custom Mailbox service for one year. This fee is paid at the beginning of the term and no refunds are available if you choose to stop using your domain name before the year is over.</div><br /><div align="justify"><strong>A Record:</strong> Short for address record, it maps a domain name or hostname to an IP address. You would set an A record if you wanted all traffic for a domain or hostname (pets.domain.com) to go to a specific machine, which is identified by an IP address.</div><br /><div align="justify"><strong>Catch-All Address:</strong> With this feature selected, any email that is sent to your domain name is forwarded to an email address. This allows you to have email addresses for yourself, departments (<a href="mailto:sales@yourcompany.com">sales@yourcompany.com</a>), promotions and other needs all forwarded to one<br />mailbox. It also ensures that misspelled email addresses (<a href="mailto:salse@yourcompany.com">salse@yourcompany.com</a>) still reach you. Please realize that this is only email forwarding. If you try to reply to a message, the address shown in "reply from" will be the address for your mail account. For full-featured domain mail, which enables you to reply using your new domain name address, you'll need to upgrade to Custom Mailbox.<br /><strong>CNAME Record:</strong> A CNAME record maps a hostname to another hostname. For example, you could set up store.widget-designs.com to map to store.wd.com. This means that users will always end up at store.wd.com no matter which hostname they enter in the browser.</div><br /><div align="justify"><strong>DNS Management:</strong> DNS stands for Domain Name System. It is an Internet service that translates domain names into IP addresses, which is how the Internet identifies unique hosts or computers on the network. For example, the domain name <a href="http://www.widget-designs.com/">http://www.widget-designs.com/</a> might<br />translate to 198.105.232.4.DNS files control the functionality of domain names and are made of records including MX, A, and CNAME. Information in these records helps to direct your personal computer to a specific web site and helps deliver email messages to the correct mail server.<br /><strong>Domain Extensions:</strong> Domain extensions or TLDs are the necessary suffixes that complete your domain address. At small business, you can choose from the following TLDs: .com, .net, .org, .biz, .us and .info.<br /><strong>Domain Forwarding:</strong> Domain forwarding allows you to point a domain name to any other destination web address or URL, which can be a domain name, a hostname, or even a file within a folder. The result is that when a visitor enters your domain name in their browser, they are automatically sent to the destination you've chosen. This feature is often used when customers purchase multiple domain names and then direct them all to the same web site.<br /><strong>Domain Locking:</strong> Domain locking is a security feature that prevents your domain name from being transferred to another domain registrar and ensures that no one can modify your name servers without your permission. When you sign up for a domain name, your domain is automatically locked.<br /><strong>Domain Name:</strong> The "xyz.com" portion of the URL <a href="http://www.xyz.com/">http://www.xyz.com/</a> is the domain name. It is a unique web address that can be registered to an organization or individual. It's like having your own personal street name on the Internet. In the same way people can find your home at 1234 ABC Street, they can find you online by typing in your domain name. If you purchase one of our Business Email, Web Hosting or Merchant Solutions plans when you order your domain, your domain name registration and annual renewal fee are included at no charge.<br /><strong>Email Forwarding:</strong> Email forwarding will send email messages addressed to your domain name to a free mail address. For example, an email message addressed to <a href="mailto:you@yourcompany.com">you@yourcompany.com</a> will be delivered to <a href="mailto:you@xyz.com">you@xyz.com</a>.<br /><strong>Hostname:</strong> A hostname is usually composed of a string of letters and numbers, a dot and then a domain name. For example, you might choose to set up a hostname for the shoe department within your online store, e.g. shoes.yourstore.com so that visitors have an easier URL to remember or bookmark (versus <a href="http://www.yourstore.com/pets/">www.yourstore.com/pets/</a>).<br /><strong>ICANN:</strong> An ICANN (Internet Corporation for Assigned Names and Numbers) is the governing body for the Internet. As a public service to Internet users, ICANN requires that every new domain must be added to the public WHOIS database, which lists detailed information about each domain owner, including your postal address, email address, and phone number. Anyone can use this database to search for a domain name and discover who owns it. With Private Domain Registration, you can replace your private contact information in the public WHOIS database with generic contact information that points to the offices of our domain name registration partner, Melbourne IT.<br /><strong>IP Address:</strong> An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address.<br /><strong>Masking:</strong> Masking is an option that small business offers when you choose to forward your domain name. Forwarding your domain name means that when visitors click on a link or type a url into a browser, they are automatically directed to another site. In standard forwarding, visitors will not see the original domain name they clicked or typed in the address box at the top of their browser when they reach the destination site. Rather, the destination domain will be displayed. When you choose masked forwarding, the visitor will see the original domain name they clicked or typed in the address box at the top of their browser when they reach the destination. You may use this feature when you want to "mask" a web address that may not be user-friendly.</div><br /><div align="justify"><strong>MX Record:</strong> Short for mail exchange record, it is an entry in a domain name database that identifies the mail server or servers that are responsible for handling email messages for that domain name. You would modify this record if you would like another server, other than one managed by small business, to handle email sent to your domain name.<br /><strong>Name Server:</strong> The name server translates a domain name into an IP address. The whois listing for your domain includes the name servers that host your domain name.<br /><strong>Name Server Modification (<em>Redelegation</em>):</strong> When you choose to use an existing domain name with small business services, we ask you to contact your current registrar to<br />change your name servers to small business's name servers. This allows us to host your domain name. Modifying your name servers to small business's doesn't mean that your domain name is managed by our registrar. If you change your name servers, your domain is still managed by your original registrar and you will continue to pay your annual registration renewal fees to them. With the Domains product, we also allow you to modify your name servers so that you can continue managing your domain name through us, but have your domain hosted elsewhere.<br /><strong>Private Domain Registration:</strong> When you register a domain using regular domain registration, your contact information automatically appears in a public database of domain owners, called WHOIS. Anyone can look up this information in WHOIS and use it to send you spam. You can help protect your privacy and reduce the likelihood of receiving spam with Private Domain Registration.<br /><strong>Starter Web Page:</strong> A starter web page is a bonus feature that you receive when you purchase a small business plan that includes a domain. The starter web page can replace the default "Under Construction" page and act as a placeholder until you decide to build a full web site or store at your domain. A starter web page allows you to post a short, customized message about yourself or your business and choose from a set of standard page templates. You cannot edit these templates, add pages, or include your own graphics.<br /><strong>Under Construction Page:</strong> When you register a domain name, we automatically create a placeholder web page for you. Your visitors will see this default "Under Construction" page when they go to your domain until you replace it. This page lets visitors know that you have not yet begun building your site and includes links to advertising-supported search results. When you're ready, you can create your own placeholder page by adding your own text and contact information to one of our predesigned templates. This starter web page is a bonus feature of your small business plan.<br /><strong>WHOIS:</strong> WHOIS refers to the public databases that store contact and technical information for domain names. Each domain registrar is required to maintain a WHOIS database for the domains they "host." These databases are accessible by anyone, 24 hours a day, and include information such as the date the domain name was registered, the date the domain name expires, the name servers, and the domain name holder's name, address, phone number, and email address.</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-70146434855872688252008-05-08T05:31:00.000-07:002008-11-13T04:04:55.981-08:00Tips for Secure Site<a href="http://4.bp.blogspot.com/_WqdqBzs8i6w/SCL0xBEv_5I/AAAAAAAAAPY/YAOH94_dhPg/s1600-h/time_spent_per_site_b2b_example%5B1%5D.png"><img id="BLOGGER_PHOTO_ID_5197986042878099346" style="CURSOR: hand" alt="" src="http://4.bp.blogspot.com/_WqdqBzs8i6w/SCL0xBEv_5I/AAAAAAAAAPY/YAOH94_dhPg/s400/time_spent_per_site_b2b_example%5B1%5D.png" border="0" /></a><br /><div align="justify"></div><br /><div align="justify">At the very least, an attack could disable your Website and embarrass your company. At the very worst, an intruder could shut down your online store and make off with your customers´ credit card numbers and personal data. No site is absolutely safe from attacks; if you're plugged into the Internet, there's always a chance that an intruder will find a way into your Web server.</div><br /><div align="justify"></div><br /><div align="justify">There are some simple, commonsense steps you can take to help deter attacks and limit damages:<br /></div><br /><div align="justify">1. Use a firewall to shield your network. This is perhaps the single most important step you can take to protect yourself against crackers. If you don't know what a firewall is, or if you don't know how to select and configure one, hire someone who does. Many administrators keep their companies' Web servers separate from the rest of the network to provide extra protection against break-ins.</div><br /><div align="justify"></div><br /><div align="justify">2. Require good passwords. As a rule, people shouldn't use dictionary words, names or other personal data for their passwords--they're too easy for an intruder to guess.</div><br /><div align="justify"></div><br /><div align="justify">3. Limit server access. Only people who really need it should have access to the server. Even then, carefully control each user's level of access. And make sure you delete inactive users as quickly as possible.</div><br /><div align="justify"></div><br /><div align="justify">4. Turn off unused services on your Web server. Consider getting rid of FTP, SendMail, gopher, NFS, finger and any other services that might help an intruder break into your server. Also remove shells and interpreters you don't need and delete unnecessary directories. For example, if you don't run Perl-based CGI scripts, remove the Perl interpreter from your server. Keep a complete backup of your website. And keep it on a separate, secure computer. If a vandal does manage to destroy or deface your Website, you'll be able to get a backup version up more quickly.</div><br /><div align="justify"></div><br /><div align="justify">5. Check your system and Web logs for suspicious activity. Programs such as Tripwire for Unix systems and Internet Security Scanner for Windows NT can monitor your log files and alert you to any unusual behavior. Unusual log file activity might be the first--and only--warning that an intruder is trying to break into your system.</div><br /><div align="justify"></div><br /><div align="justify">6. Keep your software up to date. Microsoft and all of the Unix vendors periodically issue updates and security patches to their operating systems and Web servers. Understand that different operating systems and Web servers offer different levels of security, and even the best software might not be secure when you buy it off the shelf.</div><br /><div align="justify"></div><br /><div align="justify">7. Understand how to maintain your server and network. If you don't, hire someone who does or contract with a professional hosting service.</div><br /><div align="justify"></div><br /><div align="justify">8. Get the right equipment and advice before opening an e-store. E-commerce sites require special protection because they handle customer credit card numbers and other sensitive information. If you open an online store, you'll need a server that supports encrypted connections and additional security measures. When you set up a commerce site, hire a consultant who specializes in Web security issues or pay for a hosting service to do the job for you.</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-27079428554159521822008-05-08T05:22:00.000-07:002008-11-13T04:04:56.302-08:00Web Host<a href="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCLyehEv_4I/AAAAAAAAAPQ/oo6QX-oCUuc/s1600-h/isp.entry%5B1%5D.gif"><img id="BLOGGER_PHOTO_ID_5197983526027263874" style="CURSOR: hand" alt="" src="http://2.bp.blogspot.com/_WqdqBzs8i6w/SCLyehEv_4I/AAAAAAAAAPQ/oo6QX-oCUuc/s400/isp.entry%5B1%5D.gif" border="0" /></a><br /><div align="justify"><strong><span style="color:#cc0000;">ISP:</span></strong></div><br /><div align="justify"></div><br /><div align="justify">To create a website for your business, you need to find a place to store your files. One choice is to let your Internet Service Provider (ISP) host your Website--most ISPs provide some amount of server space as part of a standard dialup Internet access account. An advantage to this is that you won't have to pay extra for hosting services, although some ISPs can't provide the bandwidth or the reliability needed for a fully functional business site.</div><br /><div align="justify"><br />True Web hosting companies resemble ISPs in that they also provide servers connected to the Internet. But good Web hosts invest in more powerful servers and faster, more direct connections to the Internet. A Web hosting service is also likely to offer other features that you can't get from a regular ISP, such as special commerce servers that provide additional security<br />for online transactions.</div><br /><div align="justify"></div><br /><div align="justify"><strong><span style="color:#cc0000;">Choose Web Host:</span></strong></div><br /><div align="justify"><br />Server space. Initially, 10MB of disk space on a server should be enough for a typical business site. If your site has lots of graphics or multimedia files, you may need much more room; many hosts offer 100MB or more of disk space at reasonable rates. Also, find out whether email, log files and other "overhead" files count against your space limit--once you exceed your disk quota, the hosting service will charge a penalty. It's always better to have too much space than too little.</div><br /><div align="justify"></div><br /><div align="justify"><strong>1.</strong> <strong><span style="color:#cc0000;">Traffic.</span></strong> Your host may impose a limit on how much traffic your site can attract each month before you have to pay a surcharge. You don't want an increasingly popular site to suddenly become a financial liability, so look for a plan that offers unlimited traffic or at least low over-limit charges.</div><br /><div align="justify"></div><br /><div align="justify"><strong>2. <span style="color:#cc0000;">Support</span></strong><span style="color:#cc0000;">.</span> Make sure you can get technical support during the hours you're most likely to need it. When you evaluate a hosting service, call its support lines a few times to see how long it takes to get through.</div><br /><div align="justify"></div><br /><div align="justify"><strong>3. <span style="color:#cc0000;">Other Features.</span></strong> Make sure you can get your own domain name (<a href="http://www.yourbusiness.com/">http://www.yourbusiness.com/</a>) rather than one incorporating the name of your host (<a href="http://www.hostname.com/yourbusiness">www.hostname.com/yourbusiness</a>). Most hosting sites will register a domain name for you at no extra charge (<em>although you'll still have to pay the standard registration fee</em>). Also check into how many email addresses you get and<br />whether they support aliases, which allow you to set up addresses such as <a href="mailto:sales@yourbusiness.com">sales@yourbusiness.com</a>. Ask about programs for managing mailing lists and generating automatic email responses.</div><br /><div align="justify"><br />You want to find out about the visitors to your site--what links they followed to get there, which pages they view most often--so make sure that your host is equipped to track and provide that information. If you or your Web developer uses Web authoring and management software (such as Microsoft FrontPage) that offers nonstandard features, look for a host that can support that software. And if your site provides interactive functions such as forms or surveys, or if you allow online transactions, you need to ask about features such as CGI script and e-commerce support.</div><br /><div align="justify"><br /><strong><span style="color:#cc0000;"><u>Buyer Beware</u>:</span></strong></div><br /><div align="justify"><br />Just as you need to make sure your host can provide the features you need, you want to be equally careful not to pay for ones you don't. If you don't plan to take credit card orders online, for example, you don't need to pay for secure socket layer (<strong>SSL</strong>) or other special security features. Once you've narrowed your list of Web hosting candidates, ask each service you're considering for a list of the sites it houses. Visit those sites to see how quickly the pages load, especially sites with pages of similar size and complexity to yours. You can also try sending email to the Webmasters at the sites to ask for their opinions of the hosting company. Internet mailing lists, computer user groups and professional associations are other good sources of information on finding the right Web host for your business.</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-7741986648824651772008-05-08T05:13:00.000-07:002008-11-13T04:04:56.434-08:00Web Hosting Glossary<a href="http://1.bp.blogspot.com/_WqdqBzs8i6w/SCLwWREv_3I/AAAAAAAAAPI/iJIvZMn-3q0/s1600-h/SmallGlobe%5B1%5D.jpg"><img id="BLOGGER_PHOTO_ID_5197981185270087538" style="CURSOR: hand" alt="" src="http://1.bp.blogspot.com/_WqdqBzs8i6w/SCLwWREv_3I/AAAAAAAAAPI/iJIvZMn-3q0/s400/SmallGlobe%5B1%5D.jpg" border="0" /></a><br /><p align="justify"><strong><span style="color:#3333ff;"><u>Glossary Terms for Web Hosting</u>:</span></strong></p><br /><p align="justify"></p><br /><ol><br /><li>Application Server: A type of computer program that provides some basic functionality that can be called upon by customized applications.</li><br /><li>Bandwidth: Refers to the amount of data that can be transferred during a given period of time. </li><br /><li>Bulletin Board: An online application that supports threaded conversations among users. Users can browse through previously posted messages or add their own messages.</li><br /><li>Burstable: Term used to indicate the maximum amount of bandwidth that can be supported during a short period of time. </li><br /><li>Cage: An enclosed area found at some Web hosting companies that is used to host the computer equipment needed to maintain a Website. </li><br /><li>Chat: Community software that allows users to message instantly to one another. </li><br /><li>Cold Fusion: A brand of application software used to develop interactive Websites. Cold Fusion is produced by Allaire Corp. </li><br /><li>Co-located Server: Type of site hosting where high speed Internet access is provided for a Web server that you provide and set up. Generally, the ISP is responsible for making sure the connection is up, while you are responsible for making sure the site works. </li><br /><li>Common Gateway Interface Script (CGI Script): A type of script that results in an action based on the user's input. </li><br /><li>Cookie: A type of file that is deposited onto a user's computer and used to track a user's activities on the Website. </li><br /><li>Database Server: A computer that is designed to store and run a database. </li><br /><li>Data Center: A building used to house all the equipment and telecommunications lines necessary to support Websites. </li><br /><li>Dedicated Line: A type of telecommunications service that involves allocating a specified amount of bandwidth to a given location. </li><br /><li>Dedicated Server: A type of Website hosting where the service provides site hosting equipment for the exclusive use by the customer. It may or may not include the appropriate software as well.</li><br /><li>Domain Name: A text-based address used to identify a Website. Domain names provide a user-friendly way to access Websites rather than having to enter in an IP address. </li><br /><li>File Transfer Protocol (FTP): A standard that allows for the transfer of files between two computers. FTP programs are often used to manage file transfers to Websites.</li><br /><li>Firewall: A software - or hardware - based solution that is designed to prevent unauthorized access to the Website.</li><br /><li>Internet Service Provider (ISP): A company that provides Internet access. </li><br /><li>IP Address: A code used to identify the location of a computer on a network. IP addresses consist of four sets of numbers that are separated by periods, with each number ranging from 0 to 255. The domain name system translates domain names into these addresses, which are represented by a series of numbers looking something like this: 123.123.23.2. </li><br /><li>Point of Presence (POP): A physical location maintained by an Internet service provider to provide a local connection to the Internet. </li><br /><li>Rack: Equipment used to house computing equipment. </li><br /><li>Secure Pages: A type of Web page that has been protected so that the information entered or being displayed on that page can only be viewed by the visitor to that page. </li><br /><li>Secure Server: A type of Web server that can protect the display and transmission of information over the Internet by supporting major security standards like SSL. </li><br /><li>Shared Hosting: A type of Website hosting where the hosting service provides all the hardware and software necessary to connect to the Internet. </li><br /><li>Shopping Cart: A commerce technology that allows users to purchase a specified item from a Website.</li><br /><li>Simple Mail Transfer Protocol (SMTP): A standard used to send e-mail. </li><br /><li>Solaris: A UNIX based operating environment developed by Sun Microsystems. </li><br /><li>Static Page: A web page that consists of a distinct file that resides on a web server. </li><br /><li>T1, T3 Lines: High-speed telecommunications links. T1 lines convey data at speeds up to 1.544 Megabits per second. T3 lines support data speeds of 43 Megabits per second. They can be used to connect a user to an Internet service provider (typically T1), or to connect an Internet service provider to other locations on the Internet (T3). </li><br /><li>Telnet: A type of computer program that provides access to remotely located computers. Control of that remote computer occurs through commands entered via text. </li><br /><li>UNIX: A type of operating system often used in environments requiring robust applications such as site hosting. Multiple versions of UNIX, including Linux, exist. </li><br /><li>Virtual Domain Name: A shared hosting service feature that allows companies to utilize a domain name as their Website address. Companies that do not offer this will require that the hosting company's domain name be part of your Website address. </li><br /><li>Web Server: A computer that has been set up to deliver Web pages. </li><br /><li>Website A discrete collection of pages that can be accessed via the World Wide Web. Websites consist of multiple files that can either be viewed by a browser or provide some back-end functionality.</li></ol>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-92168260465117453492008-05-08T05:04:00.000-07:002008-11-13T04:04:56.566-08:003 Steps SEO<a href="http://4.bp.blogspot.com/_WqdqBzs8i6w/SCLt8BEv_2I/AAAAAAAAAPA/a23thPAtN0Y/s1600-h/Seo_Placement%5B1%5D.jpg"><img id="BLOGGER_PHOTO_ID_5197978535275265890" style="CURSOR: hand" alt="" src="http://4.bp.blogspot.com/_WqdqBzs8i6w/SCLt8BEv_2I/AAAAAAAAAPA/a23thPAtN0Y/s400/Seo_Placement%5B1%5D.jpg" border="0" /></a><br /><div align="justify"></div><br /><div align="justify">SEO is really divided into three main phases:<br />* Identifying the best keyphrases to optimize a page for (Phase I)<br />* Inserting the keyphrases in places in the page that the engines use to determine what your pages are focused on (Phase II)<br />* Getting incoming links from other sites. The links must use the keyphrase for which your page is optimized (Phase III)</div><br /><div align="justify"><br />Engines rank a page by looking through their database and returning all the pages that match a searchers query. In order to do that the engine needs to work out what keyphrase each page of your site is focused on. That's what Phase II does. Then the engines (especially Google) look at all the pages that are focused on a searchers query and sort (or rank) them according to which of the matching pages have the most incoming links. Phase III works on this aspect of optimization.<br />What follows is a detailed description of each phase.</div><br /><div align="justify"><br /><strong><span style="color:#cc0000;">Phase 1:</span></strong></div><br /><div align="justify"><br />The trick in Phase 1 SEO is to cast as wide a net (number of keyphrases) as possible in order to capture the maximum amount of traffic. In order to do that a site has to be built whose structure and pages use all the keywords/phrases possible whilst retaining usability and intuitive/logical navigation paths. So a big part of the Keyword analysis phase of SEO involves<br />identifying all the possible keyphrases and working out the navigation of the site so that they are are leveraged without impacting usability. Every navigation level (category/sub-category) you create in a site is an opportunity to create another page that you can optimize to target another keyword and therefore get more traffic. The way we do this is to collect every keyphrase we can find that is ACTUALLY used by a potential customer looking for your services. The next step is to map the identified keyphrases against the existing (or desired) navigation structure of your site. If we build brand new navigation for your site then we begin to look for logical groupings which then start to form the navigation categories and sub-categories of your site. If we must retain the navigation you already have then our job is to match the actual navigation and pages of you existing site with some of the keyphrases we have identified. Where no match is possible, we either create additional navigational structures that allow you to leverage the keyphrases, or we build things like a glossary or other devices that give us an excuse to build and optimize a page for those keywords.</div><br /><div align="justify"><br /><strong><span style="color:#cc0000;">Phase 2:</span></strong></div><br /><div align="justify"><br />Phase II is where we actually get to work and build/modify the pages in your site to include the keyphrases we have identified. These keyphrases are inserted in strategic places within each page, such as Title (most important), H1 tags, Visible link text (all other pages in your site should link to each other using the keyphrases the target page is optimized for). It is important to note that the content created for each page in this phase should be of high enough quality that visitors to the page would feel they were gaining useful knowledge. In other words writing a few junk paragraphs is not probably not going to cut it. This is because if you have much competition the only way you can compete is to have more incoming links to your site than the completion...and the only reason for anyone to link to you is if they think your content is valuable to their visitors<br />Phase III also includes building pages with Style Sheets to get all the formatting out of the HTML. This means when a search engine sends its spider to "suck" up your content it gets mostly content instead of miles of formatting code and JavaScript.</div><br /><div align="justify"><br /><strong><span style="color:#cc0000;">Phase 3:</span></strong></div><br /><div align="justify"><br />About 1 month after the site is built/optimized and the engines have indexed all your new pages we can start to see where you are ranking for each keyphrase. This is where we decide whether or not you need to get incoming links to your site in order to compete, and this is where the<br />quality of your content really counts. If you do need incoming links, WorkingTraffic will identify directories that cater to your market. These directories will include a link to your site sometimes for free but usually for a nominal fee. Only reputable directories that are really providing a good service to their customers will be selected. Getting links from rubbish sites is no help at all and getting links from "dodgy" sites will actually reduce your ranking with the search engines. It is the quantity and quality of all inbound links that Google and other major search sites use to judge how useful your site is, and therefore how high to rank it in comparison to other competing sites optimized for the same keywords.</div><br /><div align="justify">Remember, you can never have too many incoming links as each one either increases your ranking, makes your existing positions safer and less likely to fluctuate (as competitors work on their sites and new players enter the market) and of course each link is yet another potential stream of targeted traffic from the source site. One caveat though is that you CAN have too many links created too quickly, Google appears to penalize you very serverely if your site suddenly gets 100 links from a bunch of dodgey directories.</div><br /><div align="justify"><br /><strong><span style="color:#cc0000;">Summary:<br /></div></span></strong><br /><div align="justify">As you can see SEO done thoroughly is not a "quick fix" kind of job but rather an ongoing process, especially if you have strong enough competition (which means enough sites optimized well enough for the same keyphrases as you). However if you are ranking well at the end of Phase II you may not need Phase III. The best way to look at SEO is that it WILL increase your traffic, how much it will increase is dependant upon all the factors discussed above and how well each phase is performed. The really great thing about SEO is that every web page that is optimized for a specific keyphrase is actually a trickle, stream or flood of traffic depending upon how many searches are done and how many other sites are competing for that keyphrase. Once you build the page you will continue to get traffic for it as long as that page remains online, this makes SEO one of the most cost effective means of generating new business that is available to business today. So there it is in an oversimplified nutshell. However you now probably have a better understanding of the ground work behind SEO than most, which should be a help whatever course of action you decide on, even if it is evaluating another SEO or Online<br />Marketing Service Provider.</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0tag:blogger.com,1999:blog-7425495466223884003.post-4905880465397714852008-05-08T05:00:00.000-07:002008-11-13T04:04:56.688-08:00SEO<a href="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCLr8xEv_1I/AAAAAAAAAO4/rshNNE1geh4/s1600-h/process-seo%5B1%5D.png"><img id="BLOGGER_PHOTO_ID_5197976349136912210" style="CURSOR: hand" alt="" src="http://3.bp.blogspot.com/_WqdqBzs8i6w/SCLr8xEv_1I/AAAAAAAAAO4/rshNNE1geh4/s400/process-seo%5B1%5D.png" border="0" /></a><br /><div align="justify"></div><br /><div align="justify">In the present internet era, the millions of websites are there to promote the businesses. Every day millions of people use search engines such as Google and Yahoo to find what they are looking for. Business can no longer afford to ignore this outlet. Brands can be eaten by competitors, upstarts or even irate customers nearly overnight, if they are not found on relevant keywords. How credible can a company appear if it does not come up in five minutes of research? Would you invest in, buy from or write about a business that is nearly invisible online?</div><br /><div align="justify"><br />Search engine optimization is a long term website strategy because success builds upon success. SEO works continually and its benefits compound over time. The key benefit of SEO is excellent return on investment (ROI). Increased brand visibility, targeted traffic, and higher sales are the other major benefits of SEO services. Many companies have the staff to handle the marketing their website, but usually it is the 'know how' that they lack. If this sounds relevant to you and your business, you must care to see how web marketing services can provide the knowledge you need. There are so many qualified experts in search engine optimization ready to provide you a great change in your business. All SEO services get focus on careful analysis of rankings and competitors. Achieve breathtaking success for your company by listing your website at top in search engines such as Yahoo, Google, MSN and AOL.</div><br /><div align="justify"><br />You can decide very easily by reading the experiences of some of the most responsible corporates on the web. To get your website listed at top in Google and other search engines, just set your website with effective and relevant keywords on which you would prefer your website to be on top. Get ready to take committed step to build your success.</div>Anonymoushttp://www.blogger.com/profile/09410454915457524002noreply@blogger.com0