Thursday, 25 October 2012

Best Antivirus for Online Gaming




You’ve spent time and money fine-tuning your gaming rig, so your PC should perform at its peak. Because peer-to-peer connections cause your system to become more vulnerable, cybercriminals specifically target gamers with malware like keylogging and Trojans. Rather than turning off antivirus protection before logging on to squeeze extra performance from your machine.  But when protection interferes with online gaming, it can be sorely tempting to disable that protection in favor of uninterrupted play. These antivirus scanners tackle the unique problems of gamers so you can play without sacrificing performance or protection.

Online gamers will do pretty much anything to minimize lag and ensure stable game performanance. This includes shutting down antivirus scanners or firewalls if it interferes with gameplay. Fortunately, there are a few scanners and firewalls that enable gameplay and security to peacefully coexist.
(Source:  http://antivirus.about.com/od/antivirussoftwarereviews/tp/Antivirus-for-Gamers.htm)



1. AVG Internet Security

AVG Internet Security 9.0 features a firewall gaming mode to minimize disruptions while playing online games. AVG Internet Security 9.0 protected against a 3 month average of 88.7% for new malware delivered via the Web and email. However, while AVG Internet Security 9.0 demonstrated solid ability in the Web/email protection category, it fared less well with removing existing malware, scoring only 4.0 out of a possible 6. While detection of rootkit-enabled/stealth malware was 100%, it's ability to remove existing rootktis/stealth malware was only 57%. Overall usability was good; AVG Internet Security 9.0 scored a 5.0 out of possible 6 in the performance and usability category.
http://www.avg.com.au/



2. Eset Smart Security

Eset Smart Security 4.0 boasts customized gamer controls to streamline file scanning, eliminate pop-up warnings, and postpone updates to off hours. With a 5.0 score in overall usability and performance, Eset Smart Security 4.0 has the smaller system footprint critical to a successful gaming experience. AV-Test Report (PDF)    http://www.eset.com/us/home/products/smart-security/




3,  ZoneAlarm Extreme Security 2010/2011

ZoneAlarm Extreme Security 2010 offers Game Mode, a simple right click option on the system tray icon that will put ZoneAlarm in 'auto pilot' so it will silently make most decisions and you can play uninterrupted. The small trade-off in performance is a bit of extra protection. In addition to the standard fare of antivirus, firewall, and spyware protection, ZoneAlarm Extreme Security 2010 uses the Kaspersky antivirus engine which performed well on each category of the AV-Test 2Q10 analysis. For details on those test results, view the AV-Test report on Kaspersky (link below). AV-Test Report (PDF)Read Review
 http://www.zonealarm.com/security/en-us/zonealarm-extreme-security.htm












Wednesday, 24 October 2012

Cara Mengubah Halaman Judul Blogger





Setiap blogger tentu ingin membuat blog nya menjadi unik jika dilihat orang lain, tentu jika kamu dapat membuat sendiri halaman judul blogger (perpaduan antara gambar dan tuliasan).

Mengubah  Judul Blogger tidak sulit ,  yang perlu kamu lakukan cuma mengikuti langkah yang sederhana
di bawah ini:

1. Mengubah photo atau membuat gambar sendiri, tentukan warna dasar, dan tulisan judul
    (tulisan bisa bermacam-macam gaya dan animasi), ubah ukuran lebar sesuaikan dengan lebar blog,
    Gunakan gambar dengan format gif, jpg atau png terus simpan di komputer.
   (Untuk meng-edit tulisan dan gambar gunakan Photo Editor cari di Google Search)

2. Untuk tahu berapa lebar blog pada halaman layout  Klik Template Terus Klik Customise
     Selanjutnya Klik  Adjust Widths

3. Log in dulu di blogger dashboard jika belum log in
4. Klik  Layout
5. Klick Edit  pada Halaman Judul  (Header)
    Perhatikan Gambar Blogger Layout



6. Setelah Klik Edit pada Header maka akan muncul halaman berikut

 

7. Upload Image/phot dari komputer

8. Pilih salah satu untuk Penempatan/Placements gambar
     Placement jika nantinya tidak cocok bisa diedit, caranya sama dengan membuka  Layout

9. Save/Simpan


Good Luck !!

Yo Belajar Ngeblog

 Beginner Guide



Beda Blogger dengan  Blogspot 
Blogger itu alat yang berbasis web yang gunanya untuk publikasi ke web, sedangkan Blogspot itu layanan blog hosting Blogger menyediakan cara yang mudah untuk berkolaborasi, berdiskusi, atau berbagi pikiran dengan orang lain bahkan tuk mencari uang lewat blog.

Sesungguhnya selain blogspot banyak sekali blog hosting gratisan, yang bisa kita pilih sesuai dengan
tujuannya seperti community, education etc, tuk lebih jelas klik aza  link di bawah ini
http://www.gpp0407.info/2012/07/free-blog-hosting.html

Panduan ini punya tujuan memandu Gimana sih cara buat blog, dan mengenalkan fitur-fitur yang ada pada blogger secara sederhana

1. Cukup sign in dengan Account Google. (Gmail, Google Groups, atau orkut,)
    Tuk Sign in gunakan account gmail.com
 misal     nama pengguna               xxxxx@gmail.com
             Password                        aaaabbb12

Klo loe ga punya Google Account, loe dapat bikin sekarang, Klik aza link di bawah ini
Bikin akun Google atau bisa juga tulis  gmail,com signup di Pencarian Google



Setelah loe punya akun google, sekarang kita bisa terus mulai bikin blog Untuk mulai bikin blog dengan Blogger, kita harus kunjungi  Homepage Blogger

masukkan username dan password, dan klik Sign in

- Masukkan nama layar yang akan di publish  (boleh name kecil)
- Terima  Syarat Layanan Blogger.
- Kemudian klik link Buat Blog dan memulai!

Pilih  alamat (URL) dan judul blog. Alamat url dan judul sebaiknya sinkron

Judul (Title)                     Kue Tradisional
Alamat (Address)           kuetradisional    .blogspot.com

Jika alamat url  "kuetradisional" tidak tersedia maka loe harus mengubah alamat, tambahin aja angka
di belakangnya jadi kuetradisional2013, atau dengan menambahkan tanda strip seperti
"kue-tradisional" dan ubah terus sampai alamat url tersedia.


Kemudian, pilih dan klik template blog favorit anda (ini adalah bagaimana blog Anda akan terlihat ketika Anda mempublikasikannya). Template klo tidak cocok dapat di ubah lagi kapan aja.
 lihat contoh template dibawah.

                                                              Simple Template


Mulai berkreatif
Tambahkan informasi ke profil pribadi (jika perlu), dan sesuaikan tampilan blog yang ingin terlihat, jika merasa cocok , Yo kita mulai blogging sekarang!
Perhatian halaman posting berikut


Menulis Posting
Setelah mendaftar ke Blogger, maka akan terlihat dashboard dengan daftar blog.  Inilah yang perlu kita lakukan:

- Klik ikon pensil oranye untuk menulis posting baru, lalu masukkan tulisan apapun yang Anda inginkan untuk berbagi dengan dunia, tentu tulisan sesuai dengan judul blog, dan judul post
Berikutnya, Anda akan melihat halaman Post Editor. Mulai dengan memberikan judul pada posting (opsional), kemudian masukkan posting sendiri: Jika udah selesai klik Preview, JIka dah merasa puas dan pas silahkan klik Publish tuk berbagi dengan teman-teman. Tentu kita dapat meng edit nya suatu saat,
Pilih post yang akan di edit lalu klik edit (dibawah tulisan judul post)


Cara Menambahkan Gambar/Photo Untuk memasukan gambar/photo ke dalam blog post, gambar dapat diambil dari file document di komputer , alamat web URL, bisa juga dikirim via email dan ponsel

 Pada Ikon diatas pilih insert image, dan kemudian pilih gambar dikomputer, lalu open
Gambar dapat ditempatkan disebelah kiri, tengah atau kanan Sesuaikan Tata Letak (Layout)

Saat pertama kita bikin blog baru kita dimnita untuk memilih template default sebagai design dasar blog,
pilih salah satu yang sesuai dengan selera. Selanjutnya sesuaikan disain blog dengan intuitif drag and drop interface. Tambahkan Gadget seperti tayangan video, slide, iklan dsb

1. Klik link layout pada drop-down menu gambar diatas untuk customize



2. Disini kita dapat meng edit gadget atau menambahkan/menghapus gadget Lihat gambar Gadget



3. Jangan lupa jika dah selesai klik Save arrangement
Langkah selanjutnya, kita tinggal meng edit atau menambah post-post baru semakin banyak semakin baik.

Good Luck!!!











Monday, 22 October 2012

12 Best Website Scanners





Website and Blog Protection
Everyone knows that the Internet is huge, there are many online threats like viruses, phishing, and spyware, and there's a lot of unsavory Web sites out there—Web sites that will try to deceive you, steal your credit card numbers or passwords, or even crash your computer. By the time you visit a Web site it's usually too late The damage has been done, you've been had. So, how can you find out if a Web site is a safety risk before you visit it? Site Scanner checks your website daily for malware links, phishing exploits and more than 3,000 common vulnerabilities These free online tool allows you to scan for any suspicious link that might lead you to harmful threats which can attack your computer or lets you check the safety of individual web pages you are about to visit. Configuring Site Scanner is easy and it takes about a minute.  — just copy the URL (web page address) and drop it into the box scanner then Website Scanner  will examine the web page



1.  AVG Online Webpage Scanner
Why use the AVG LinkScanner  Drop Zone Online Scanner? Cyber criminals use "lure" sites to attract web users to sites they have invisibly infected with exploit code. This exploit code is then used to infect users' PCs with drive-by downloads of spyware, rootkits, and other malware. Just because you click a link doesn't mean you'll land on the site you thought you would Just because a site looks innocent doesn't mean the underlying code is harmless
http://www.avg.com.au/resources/web-page-scanner/



2.  Norton Web Safe

Norton Safe Web is a new reputation service from Symantec. Our servers analyze Web sites to see how they will affect you and your computer. Then, using the Norton Toolbar installed on your PC, we let you know how safe a particular Web site might be before you view it. If you need to find out more about how a Web site might behave, we provide more detailed information right here on Norton Safe Web.
http://safeweb.norton.com/

Web site owners, please visit our Site Owner page.
http://safeweb.norton.com/help/site_owners



3. Virustotal
VirusTotal is a free virus, malware and URL online scanning service. File checking is done with more than 40 antivirus solutions,  quick detection of viruses, worms, Trojans, and all kinds of malware.
https://www.virustotal.com/





4. Securi SiteCheck

Free Website Malware ScannerSucuri SiteCheck Home Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software. Sucuri scanners use the latest in fingerprinting technology allowing you to determine if your web applications are out of date, exploited with malware, or even blacklisted. Our Scanner also monitors your DNS, SSL certs & WhoIs records.
 http://sitecheck.sucuri.net/scanner/





5. Comodo Siteinspector

Website Monitor & Scanning Tool - Malware Detector Website Monitor Tool from Comodo. Cloud based malware detection and notifications for website. SiteInspector thoroughly scans your website for malware ...detection and inspection for websites
                                                      http://siteinspector.comodo.com/



6. skipfish

Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap (image) for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.

Key features:
- High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets.
- Ease of use: heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly wordlist creation, and form autocompletion.
- Cutting-edge security logic: high quality, low false positive, differential security checks, capable of spotting a range of subtle flaws, including blind injection vectors. The tool is believed to support Linux, FreeBSD, MacOS X, and Windows (Cygwin) environments.
http://code.google.com/p/skipfish/wiki/SkipfishDoc



7. Online Link Scan

Millions of computer owners over the world are affected by this major violation and unethical practice by offending links. Protection through early detection by scanning for harmful threats hidden behind innocuous looking links such as 301/302 header redirects is what Online Link Scan - Free Anti-Virus, PageRank, Alexa Rank Check. Free Virus, Trojan, Adware and Malware Scanner has come up with. It will save and ultimately protect the computer and the data of the user from getting unethically violated. So if you are worried about constant violation of your personal space while your surf or go to your chosen links by being redirected to harmful threats, we at Online Link Scan - Free Anti-Virus, PageRank, Alexa Rank Check. Free Virus, Trojan, Adware and Malware Scanner take the problem off you and offer safeguards like detection of hidden links that are not possible for you to notice. We detect an impending danger to your computer by allowing you to scan for suspicious links that might gets infected with viruses, trojan horses, spyware and other malware.
http://onlinelinkscan.com/



8. Dr.Web online scanners
Scan files                 Scan a link (URL)                         For web-site owners

Scan your computer for viruses and other malicious and unwanted programs here for FREE. The files submitted for online scanning will be checked by the latest version of the Dr.Web Anti-virus and the hottest add-on to the Dr.Web virus database. Upon scanning completion, a scan report will be displayed. How do I scan a file or files with Dr.Web Online Scanner? To scan a file hosted on your local or network drive, choose it by pressing "Browse...". To start scanning press "Scan online!". To send several files for scanning, place them into an archive (WinZip, WinRar or ARJ) and upload this archive by pressing "Browse...". To start scanning, press "Scan online!". The scan protocol will include a report on every file within the archive. Important! Dr.Web Online Scanner can only tell you whether or not the file(s) you submitted are infected. But scanning files will not tell you whether or not your PC is infected. To completely check your system hard drive and system memory, use the FREE Dr.Web CureIt! utility which is armed with the most up-to-date virus database add-ons (updated twice per hour). You can also check your local network using centrally administrated network utility Dr.Web CureNet!

No registration required for using Dr.Web file scanner for viruses.
It is very useful for scanning a file for Mac or Linux users who are sending certain types of files to Windows users which might be defined as malware or suspicious.

http://vms.drweb.com/online/?lng=en



9. F-Secure
How can you find out if a Web site is a safety risk before you visit it?
To the best of my knowledge, F-Secure doesn't work well if you put a web page address F-Secure will tell you, but you can try it at
http://browsingprotection.f-secure.com/swp/


This site is: Unknown
We will provide a recommendation of this web site soon.











10 .QualysGuard  Malware Detection Service

Thousands of web sites, including those of larger, well-established companies, are infected with malware daily, often without their knowledge. The malware can disrupt operations for the web site or its users, or gain unauthorized access to information and computer systems. In addition, with the emergence of third-party content services such as ad networks, malware often doesn’t need to reside on a web site to infect its users.
Free Trials
http://www.qualys.com/forms/trials/stopmalware/



11 novirusthanks

Multi-Engine Antivirus Scanner
If you have a suspicious file you can submit it in the form below and our system will analyze your file with multiple AntiVirus engines and will report back the analysis result.
 http://vscan.novirusthanks.org/




12.VirusClhief

VirusChief offers a free service for online virus scan suspicious files (which *could* contain a computer virus) using several antivirus online virus scan engines. Use the upper textbox (Quick scan) to select and send any file to VirusChief for a scan.
VirusChief does not substitute any antivirus software installed in a PC, as it only scans individual files on demand. It does not offer permanent protection for the user's system either. Although the detection rate afforded by the use of our online virus scan antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file.

Pretty much like NoVirusThanks, Simply upload any file from a computer and scan it
It uses multiple anti-virus scanners for scanning a file like AVG, AntiVir, Avast, Bit Defender and others. VirusChief also requires no registering to scan a file and it a free service.
http://www.viruschief.com/



Note
Currently, There is not any solution that offer a 100% effectiveness rate for detecting viruses and
malware. You may become a victim of misleading advertising, if you buy such a product under
those premises.








Sunday, 14 October 2012

WEBMASTER Technical Guide



Blogger
We know that having a healthy and well-performing website is important to you. To keep you informed about your site's status Webmaster Tools will now automatically send you a notification email if there are critical or important issues that we detect with your site. Google will only send you email for issues that we think have significant impact on your site's health or search performance which have clear actions that you can take to address. For example, Google will  email you if we detect  mailware on your site or see a significant increase in errors while crawling your site.

For most sites these kinds of issues will occur rarely. If your site does happen to have an issue Google cap the number of emails Google send over a certain period of time to avoid flooding your inbox. If you don't want to receive any email from Webmaster Tools you can change your email delivery preferences at https://www.google.com/webmasters/tools/preferences.

We hope that you find this change a useful way to stay up-to-date on critical and important issues regarding your site's health. If you'd like more information about Webmaster Tools and building Google-friendly websites please visit http://www.google.com/webmasters.


Technical Guidelines
Use a text browser such as Lynx to examine your site, because most search engine spiders see your site much as Lynx would. If fancy features such as JavaScript, cookies, session IDs, frames, DHTML, or Flash keep you from seeing all of your site in a text browser, then search engine spiders may have trouble crawling your site. Allow search bots to crawl your sites without session IDs or arguments that track their path through the site. These techniques are useful for tracking individual user behavior, but the access pattern of bots is entirely different. Using these techniques may result in incomplete indexing of your site, as bots may not be able to eliminate URLs that look different but actually point to the same page. Make sure your web server supports the If-Modified-Since HTTP header. This feature allows your web server to tell Google whether your content has changed since we last crawled your site. Supporting this feature saves you bandwidth and overhead. Make use of the robots.txt file on your web server. This file tells crawlers which directories can or cannot be crawled. Make sure it's current for your site so that you don't accidentally block the Googlebot crawler. Visit http://code.google.com/web/controlcrawlindex/docs/faq.html to learn how to instruct robots when they visit your site. You can test your robots.txt file to make sure you're using it correctly with the robots.txt analysis tool available in Google Webmaster Tools.

Make reasonable efforts to ensure that advertisements do not affect search engine rankings. For example, Google's AdSense ads and DoubleClick links are blocked from being crawled by a robots.txt file. If your company buys a content management system, make sure that the system creates pages and links that search engines can crawl. Use robots.txt to prevent crawling of search results pages or other auto-generated pages that don't add much value for users coming from search engines. Test your site to make sure that it appears correctly in different browsers. Monitor your site's performance and optimize load times. Google's goal is to provide users with the most relevant results and a great user experience. Fast sites increase user satisfaction and improve the overall quality of the web (especially for those users with slow Internet connections), and we hope that as webmasters improve their sites, the overall speed of the web will improve.

Google strongly recommends that all webmasters regularly monitor site performance using Page Speed, YSlow, WebPagetest, or other tools. For more information, tools, and resources, see Let's Make The Web Faster. In addition, the Site Performance tool in Webmaster Tools shows the speed of your website as experienced by users around the world.


Quality guidelines
These quality guidelines cover the most common forms of deceptive or manipulative behavior, but Google may respond negatively to other misleading practices not listed here. It's not safe to assume that just because a specific deceptive technique isn't included on this page, Google approves of it. Webmasters who spend their energies upholding the spirit of the basic principles will provide a much better user experience and subsequently enjoy better ranking than those who spend their time looking for loopholes they can exploit. If you believe that another site is abusing Google's quality guidelines, please let us know by filing a spam report. Google prefers developing scalable and automated solutions to problems, so we attempt to minimize hand-to-hand spam fighting. While we may not take manual action in response to every report, spam reports are prioritized based on user impact, and in some cases may lead to complete removal of a spammy site from Google's search results. Not all manual actions result in removal, however. Even in cases where we take action on a reported site, the effects of these actions may not be obvious. Quality guidelines - basic principles Make pages primarily for users, not for search engines. Don't deceive your users. Avoid tricks intended to improve search engine rankings. A good rule of thumb is whether you'd feel comfortable explaining what you've done to a website that competes with you, or to a Google employee. Another useful test is to ask, "Does this help my users? Would I do this if search engines didn't exist?" Think about what makes your website unique, valuable, or engaging.

Make your website stand out from others in your field. Quality guidelines - specific guidelines Avoid the following techniques: Automatically generated content Participating in link schemes Cloaking Sneaky redirects Hidden text or links Doorway pages Scraped content Participating in affiliate programs without adding sufficient value Loading pages with irrelevant keywords Creating pages with malicious behavior, such as phishing or installing viruses, trojans, or other badware Abusing rich snippets markup Sending automated queries to Google Engage in good practices like the following: Monitoring your site for hacking and removing hacked content as soon as it appears Preventing and removing user-generated spam on your site
(Source Google Webmaster Tools)

SEO Checklist





Below is a keyword checklist to ensure that you follow the basic top tips to optimize your pages correctly including existing, main pages and secondary ones so to present them to the search engines in a acceptable manner, generally accepted search engine algorithm rules.

Google+ 
Google+ is an SEO game changer. To quickly point out just three areas that bloggers need to be aware of: Rel=Author links associate a page of content with the author’s Google+ profile. Authors with high authority on Google+ have the potential to rank well for content even if it lives on a lower authority domain. Google+ content is indexed by Google and displayed prominently in SERPs. This has led some bloggers to produce lengthy, optimized, original content directly onto Google+. Google’s continuing shift toward personalized search means it will display content from one’s Google+ community in SERPs. This favors bloggers with Google+ influence (however that is determined) and who are in a lot of Circles. Old Method: We just do SEO Now: Need to do Social SEO Google values social shares not only on Google+, but on Facebook, Twitter and other platforms as well. Whereas in the past SEO could be divorced from social media marketing, this is getting to be less and less the case. A few years ago, if a blogger had slick SEO-social integration, it was a competitive advantage. Today, in many niches, it’s a requirement.


Before you start
Decide on your goals for your SEO effort
Brainstorm a list of potential keywords
Use keyword research tools (link to KW article) to narrow down the keyword list
Choose 1-5 keywords per page
Optimize tags and headings
Keyword in title tag
The title tag must be short (6 or 7 words at most) and the the keyword must be near the beginning.

Keyword in URL
Get your primary keyword as close to the beginning of the URL as possible.

Keyword in Meta tags
It makes sense that you should include all of your keywords in the keyword meta tag. Do not include any words that don’t appear in the body of your text.

Keyword in ALT tags
Include your keyword at least once in the Alt tag of any images. Ensure that the text is relevant to the image and gives some information.

Description Tag
Use the metatag to write the description of your site. Besides the fact that metatags still rock on Bing and Yahoo!, the metatag has one more advantage – it sometimes pops in the description of your site in search results. (40-140 characters long)

Edit content
Keyword density in document 3-7 % for major keywords is best, 1-2 for minor. Keyword density of over 10% is suspicious and looks more like keyword stuffing, than a naturally written text.

Keyword in H1 and H2 headings
More weight is given to keywords that appear within H1 tags, then H2 tags and so on. Keyword in the beginning of document The closer you can get your keywords to the beginning of your page content the better. Try to include your primary keyword within the first sentence or two and also within the last paragraph.

Unique Content
Having more content (relevant content, which is different from the content on other sites both in wording and topics) is a real boost for your site’s rankings. (300-500 words per page)

Optimize Links
Anchor text of inbound links It is best if you have a keyword in the anchor text but even if you don’t, it is still OK. Origin of inbound links Besides the anchor text, it is important if the site that links to you is a reputable one or not. Generally sites with greater Google PR are considered reputable.


Links from Similar Sites
Having links from similar sites is very, very useful. It indicates that the competition is voting for you and you are popular within your topical community.

Number of backlinks
Generally the more, the better. But the reputation of the sites that link to you is more important than their number. Also important is their anchor text, is there a keyword in it, how old are they, etc.



Other factors
Site accessibility
Another fundamental issue, which that is often neglected. If the site (or separate pages) is inaccessible because of broken links, 404 errors, password-protected areas and other similar reasons, then the site simply can’t be indexed.
Sitemap
It is great to have a complete and up-to-date sitemap, spiders love it, no matter if it is a plain old HTML sitemap or the special Google sitemap format.


Thursday, 11 October 2012

Cleaning Emailbox





How about cleaning your mailbox, too?
Here are three quick and easy solutions on how to clean your inbox and keep your e-mail account well-organized throughout the year: It's Spring Cleaning Time.


1. Folders Prevent Your Inbox from Over-Flowing
In case you're like most e-mail users who receive large amounts of e-mails every day it can be quite a hassle to keep track of all them. Important messages may even disappear or get lost.

Solution:
Use folders to organize all your messages by recipient or subject. And if you use the Free Mail Collector, you can even set up individual folders for each of your accounts. To create a folder, simply click Actions and select New Folder.

Advantages:
With folders, your inbox will remain clean. You'll always keep track of messages and find just the e-mail you are looking for much faster.

2. Create Filter Rules for Sorting E-Mails Automatically 
Although, folders help you to organize your mailbox, they don't prevent new messages from cluttering your inbox. Thus, it might still be difficult to spot some really important messages.

Solution:
Set up filter rules. These will automatically route all e-mails to the designated folder. Access your Settings and select Filter Rules to create a rule that will move all e-mails from a particular e-mail address or a company's domain straight to the right folder.

Advantages: 
 By using filter rules, you will save a lot of time and won't miss important messages – since your mailbox will be automatically organized.




3. Get All the Messages You Want – and Only the ones You Want
We employ superior spam protection tools, which sort out all e-mails that fit certain criteria, i. e. a cryptic subject line or the use of specific catch phrases. However, you might miss some e-mails, especially from new contacts, because they will be marked as spam.

Solution:
Use a white list. Simply add the e-mail address of a sender you trust to your white list and you will always receive all their messages, regardless of subjects, attachments etc. In addition to your white list, you can also manage a black list for senders who clutter your inbox with unwanted e-mails. You can easily mark such messages as spam and therefore adding the sender's address to your black list. You can manage both your white and black list manually, under Settings > Spam Protection.

Advantages:
By using black and white lists, you'll get only the messages you want while also making sure that you'll get all the messages you want to receive. With folders, filter rules and black and white lists, your mail account will always be well-organized and keeping your e-mail tidy is like a spring breeze.



Monday, 8 October 2012

Site Health



This post's written because I want to share my experience with you, some time ago,   some of my blogs that have a high ranks on google searc,  but suddenly google rank dropped drastically, even if we write the url in Google Search  the site does not appear anymore, only an explanation of other websites such as pageinsider, webstatsdomain  and others, after I check it turns out some of my blogs are unhealthy.


To help you identify and prioritize the most important issues on your site, Webmaster Tools will display the Site Health alert Google Webmaster Tools Site Health alert icon next to your site on the Webmaster Tools home page whenever we detect certain problems or events that prevent us from crawling or indexing your site. The following events can trigger a Site Health alert: Google detects malware on your site. An important page is removed from your site. If you've intentionally removed a page that was previously generating traffic to your site, you can ignore this alert. An important page is blocked by robots.txt. If you've intentionally blocked a page (because you don't want it to appear in search results), you can ignore this alert.


                                                                   Site Health Homepage



Cloaking refers to the practice of presenting different content or URLs to human users and search engines. Cloaking is considered a violation of Google’s Webmaster Guidelines because it provides our users with different results than they expected. Some examples of cloaking include: Serving a page of HTML text to search engines, while showing a page of images or Flash to users Inserting text or keywords into a page only when the User-agent requesting the page is a search engine, not a human visitor If your site uses technologies that search engines have difficulty accessing, like JavaScript, images, or Flash, see our recommendations for making that content accessible to search engines and users without cloaking. If a site gets hacked, it’s not uncommon for the hacker to use cloaking to make the hack harder for the site owner to detect.


Sneaky Redirects are conditionally redirecting users based upon their country. This means that some of your visitors are redirected to other sites instead of being able to view your site's content, and these other sites have little relevance to the content of your site's pages.  It's may be caused by an affiliate program on your site through an iframe tag ending in seo.php, and wanted to bring this to your attention in case you did not know about this behavior.  If you make changes to your site so that it is no longer in violation of Google quality guidelines,  Google will  discover these changes as we re-crawl your pages and update Google index. 


Hacked content is any content that is placed on your site without your permission due to vulnerabilities in your site’s security. In order to protect our users and to maintain the integrity of our search results, Google tries its best to keep hacked content out of our search results. Hacked content gives our users results that are not useful and can potentially install malicious content on their machines. We recommend that you keep your site secure, and clean up hacked content when you find it. Some examples of hacking include: Injected content When hackers gain access to your website, they may try to inject malicious content into existing pages on your site. This often takes the form of malicious JavaScript injected directly into the site, or into iframes. Added content Sometimes, due to security flaws, hackers are able to add new pages to your site that contain spammy or malicious content. These pages are often meant to manipulate search engines. Your existing pages may not show signs of hacking, but these newly-created pages could harm your site’s visitors or your performance in search results. Hidden content Hackers may also try to subtly manipulate existing pages on your site. Their goal is to add content to your site that search engines can see but which may be harder for you and your users to spot. This can involve adding hidden links or hidden text to a page by using CSS or HTML, or it can involve more complex changes like cloaking.



Can your  web site get banned by Google for cloaking?
If that was true, then your competitor would hire us to build thousands of cloaked domains and point them to your primary web site so that it would be banned from the Google Search!

Can Google penalize or “ban” your site because of the traffic that your Affiliates or other blackhat Internet Marketer sends your way?
If that was true, you would well expect the world’s top 1000 web properties to disappear from Google’s index, and where would that leave them, loss of advertising revenue aside? Cloaked domains have nothing to do with your core web site. In fact, we build cloaked domains for clients on an entirely separate server which is completely independent from the client web site or server. This ensures total arms length association between your core web site and your traffic generating campaign. ip delivery






Tips
If your site has been compromised and you need help cleaning up the hacked content, see our tips here. Remember, the most effective way to combat hacking is to prevent it from happening in the first place.
Here are some Tips of Prevention.

Cleaning Your Site
If Google detects that your site has been compromised, we'll tell you about it in Webmaster Tools (to ensure that you're notified quickly, you can have your Message Center messages forwarded to your email account). If the hacker inserted malware into your site, we'll also identify your site as infected in our search results to protect other users. If your site has been hacked or infected with malware, you should act quickly to repair the damage. Google recommends reviewing the recommendations provided by the organization antiphishing.org. Whatever your platform or type of infection.




Clean Up Content
Clean up your content, removing any pages that were added, any spammy content, and any suspicious code identified by virus scanners or the Malware Details tool. If you have backups of your content, consider deleting your content entirely and replacing it with your last known good backup (once you've checked to make sure it's clean and free of hacked content). You can check whether you've completely cleaned out the hacked content by using the Fetch as Google tool in Webmaster Tools. If you have access to your server, Google recommends the following steps: Update any software packages to the latest version. Google recommends doing a complete reinstall of your OS from a trusted source to be sure that you've removed everything the hacker may have done. Also make sure to reinstall or update blogging platforms, content management systems, or any other type of third-party software installed. Once you feel confident that your site is clean, change your passwords again. Get your system back online. Change your server's configuration so that it no longer returns a 503 status code and perform any other necessary steps to make your site publicly available. If you used the URL Removal tool to request removal of any URLs that are now clean and ready to appear again in search results, use the same tool to revoke your request.


                                                                  Google Search Engine


Preventing Mailware Infection
The price of freedom from malware is eternal vigilance. This article contains tips and pointers for preventing malware infection. However, it is by no means exhaustive, and Google encourages encourage webmasters to conduct more thorough research as well. Monitoring your site health Many of the features of Webmaster Tools can help you identify potential problems. For example: Try a Google site: search to see what's indexed. It's always a good idea to do a sanity check and make sure things look normal. If you're not already familiar with the site: search operator, it's a way for you to restrict your search to a specific site. For example, the search site:googleblog.blogspot.com will return results only from the Official Google Blog. The Search Queries page lists significant keywords Google found on your site. If unexpected keywords  appear in the list, it's a signal that your pages have probably been compromised.  The Malware page (under Health) lists sample URLs from your site that have been identified as containing malicious code. Where possible, the page will also include samples of the problem code. The Fetch As Google tool lets you see a page the same way Google's crawlers do. If you suspect a page is infected, you can use the tool to detect what Googlebot will see. If Google detects malware on your site, we'll notify you on the Webmaster Tools home page, and send a message to your Message Center. (To ensure that you're notified quickly, you can have your Message Center messages forwarded to your email account.) Security checklist In addition to monitoring your site regularly, we also recommend the following:

All webmasters Choose good passwords. 
The Gmail guidelines are helpful. Pick third-party content providers very carefully. If you're considering installing an application provided by a third party, such as a widget, counter, or ad network, be sure to exercise due diligence.

Ad Space
Ad space is often syndicated to other parties who are not known to the website owner. While there are many great third-party content on the web, it's also possible for providers to use these applications to push exploits, such as dangerous scripts, towards your visitors. Make sure the application is from a reputable source. Do they have a legitimate website with support and contact information? Have other webmasters used the service? Contact your hosting company or publishing platform for support. Most companies have helpful and responsive support groups and/or security pages. If a security page or site has an RSS feed, subscribe to it to make sure you stay up to date.

Keep all of your computers safe. 
Especially when working on a website, make sure that your local workstation has up-to-date software, is clean from viruses, trojans or similar malware and has recently updated anti-virus software installed. Webmasters with server access Check your server configuration. Apache has some security configuration tips on their site and Microsoft has some tech center resources for IIS on theirs. Some of these tips include information on directory permissions, server-side includes, authentication and encryption. Make a backup copy of your .htaccess file (or other access control mechanisms depending on your website platform). Use your backup file to recover if the following fails. Be sure to delete the backup file once you are finished. Stay up-to-date with the latest software updates and patches.