Earn money from your non-professional websites

Commercial organizations tend to have their own websites as a part of their product’s marketing, cataloging, display or information sharing purposes. Some websites do provide web services and earn money from those services. But some sites are there which neither belong to any commercial organizations nor provide any web services. For example: Photo sharing site, personal websites, blogs, forums etc. Although the purpose is not anything commercial, still the author of the sites can earn some money if their sites are really popular and have some good traffic. I know many people don’t like the idea of having advertisements in their website for various reason. First of all the ads really disrupts the theme of the  site and secondly it is not easy to influence someone to put their advertisement in your site. Both the problems are solved now a days. Some third party advertisement agencies have solved these problems. They collect advertisements from the advertisers and puts those ads on your site. They just don’t put anything in your site, rather they have algorithms which selects random ads that matches the content ant theme of your site. For example, if your site specializes on photography, then the ads that will appear in your site will be something related to photography. The doubt that you might be having is something whether you’ll be paid or not and how… The third parties are some companies like google, yahoo, msn, adbrite which really do have some value with their name upon which you can rely on. Moreover, this advertising system is getting so popular now a days that you should really rely on the ad agencies.

Let’s consider some popular sites like facebook and HI5. Now let’s consider some E-mail address providers like GMAIL, HOTMAIL, YAHOO. I’ll not believe if you say that you are not part of these social networking sites or don’t use above mentioned free email addresses. Did you pay anything to these sites? or do they have any offer which requires you to pay to get those? No…. You don’t have to pay anything to get those services. Still those sites are growing in terms of their asset and revenue earning… Where do they earn from?  Yes, advertisements… Some other things are ofcourse there- like a big network of people and their information. But still their major portion of revenue do come from the advertisement they serve in their pages.

You might not earn that much, but you’ll definitely feel the urge to develop your site and enrich content of your site which will increase traffic or visitors to your site ultimately resulting more clicks on the advertisements that you’ll serve in your website. More visitor, more clicks, more earning- really interesting when you apply those to your site. Yahoo Publishers Network/ Adbrite  / Google adsense do have some easy and convenient way of payment which definitely gives you a chance add something to your wallet, and If you can ensure a great number of visitors, you can expect the amount to be a decent one.

Look at the right side bar in my blog, and there are numbers of advertisements there. If you click there, I’ll get about 4 cent per click. These are advertisements from Adbrite network. Adbrite’s advertisements do have something interesting like- If you want to provide a portion of our site for advertisement you can have ad from advertisers for continuous display of which for a fixed time you can earn a fix money regardless of if someone is clicking on the ad or not. Moreover you can your own bid as well as allow advertisers to put their bid and you get the power to choose whose ads to approve. I’ll write an individual post on Adbrite’s advertisement policy. Till then try these advertisement system in your site, and if you don’t have a website  but would like to have one at very low cost, you may try offers by BDWEBTECH .

Website hosting in Bangladesh- Less Formality, Better Service, Best Value

SHUVO NOBO BORSHO Boishakhi Offer by BDWEBTECH Get your website hosted spending a very nominal price and with lesser efforts.

Packages:

Package 1:

100 MB Webspace + 1 Domain Name* + Lot more Features = 1000 Taka only

Package 2:

200 MB Webspace + 1 Domain Name* + Lot more Features = 1700 Taka only

Package 3:

300 MB Webspace + 1 Domain Name* + Lot more Features = 2200 Taka only

Package 4:

500 MB Webspace + 1 Domain Name* + Lot more Features = 3000 Taka only

* Get the .info domain name (www.yourdomain.info) free with the packages, for other TLDs (com/net/org) please add taka 500 with the above price.

50+ pre-installed scripts: CMS (like joomla/drupal/Xoops/Typo3 etc), BLOG (WordPress/Nucleus etc), Forum (phpBB/Invision etc), E-commerce (Oscommerce/phpAuction etc), Photo Galleries (Coppermine/4Images gallery) and many more… now start your site with these through a few clicks.

Click Here for the Feature List available with the hosting plans as well as other web development offers.

Feel free to contact us: 01714071454, 01714071460, 01713363061

email us at: info@bdwebtech.com , sales@bdwebtech.com

 

Offer Valid for a limited time.

 

http://www.bdwebtech.com

Search Engine Optimization ( Part-3)

As the Internet dependency for getting information trend is widening everyday, optimizing your site is also becoming important. It’s obvious that you would like to see your site’s link in top position for your site’s relevant searches in the Search Engines like Google, Yahoo or others. Most search engines employ methods to rank the results to provide the “best” results first. Because, Search Engine users like to go through only first few links in the result page. Therefore, it is also important to know some techniques used by the search engines and tweaking your site as per search engines techniques.

The White Hat SEO are the methods which are according to how search engines allow you to optimize. White hat advice is generally summed up as creating content for users, not for search engines, and then making that content easily accessible to the spiders, rather than attempting to trick the algorithm from its intended purpose. White hat SEO is in many ways similar to web development that promotes accessibility.

On the other hand, Black Hat SEO are methods which might bring you some desired improved result but are not approved methods by the search engines. Search engines may penalize sites they discover using black hat methods, either by reducing their rankings or eliminating their listings from their databases altogether. Such penalties can be applied either automatically by the search engines’ algorithms, or by a manual site review.

Greyhat SEO tactics are those which have some genuine use however are subject to abuse by unethical SEOs and webmasters. Again there is a chance that search engines may penalize for implementing some of grey hat SEO tactics.

However, the following are some of the tactics of White Hat, Black Hat and Grey Hat SEO:

Black Hat SEO Tactics:

  • Keyword Stuffing

This is probably one of the most commonly abused forms of search engine spam. Essentially this is when a webmaster or SEO places a large number of instances of the targeted keyword phrase in hopes that the search engine will read this as relevant. In order to offset the fact that this text generally reads horribly it will often be placed at the bottom of a page and in a very small font size. An additional tactic that is often associated with this practice is hidden text which is commented on below.

  • Hidden Text

Hidden text is text that is set at the same color as the background or very close to it. While the major search engines can easily detect text set to the same color as a background some webmasters will try to get around it by creating an image file the same color as the text and setting the image file as the background. While undetectable at this time to the search engines this is blatant spam and websites using this tactic are usually quickly reported by competitors and the site blacklisted.

  • Doorway Pages

Doorway pages are pages added to a website solely to target a specific keyword phrase or phrases and provide little in the way of value to a visitor. Generally the content on these pages provide no information and the page is only there to promote a phrase in hopes that once a visitor lands there, that they will go to the homepage and continue on from there. Often to save time these pages are generated by software and added to a site automatically. This is a very dangerous practice. Not only are many of the methods of injecting doorway pages banned by the search engines but a quick report to the search engine of this practice and your website will simply disappear along with all the legitimate ranks you have attained with your genuine content pages.

  • Redirects

Redirecting, when used as a black-hat tactic, is most commonly brought in as a compliment to doorway pages. Because doorway pages generally have little or no substantial content, redirects are sometime applied to automatically move a visitor to a page with actual content such as the homepage of the site. As quickly as the search engines find ways of detecting such redirects, the spammers are uncovering ways around detection. That said, the search engines figure them out eventually and your site will be penalized. That or you’ll be reported by a competitor or a disgruntled searcher.

  • Duplicate Sites

A throwback tactic that rarely works these days. When affiliate programs became popular many webmasters would simply create a copy of the site they were promoting, tweak it a bit, and put it online in hopes that it would outrank the site it was promoting and capture their sales. As the search engines would ideally like to see unique content across all of their results this tactic was quickly banned and the search engines have methods for detecting and removing duplicate sites from their index. If the site is changed just enough to avoid automatic detection with hidden text or the such, you can once again be reported to the search engines and be banned that way.

  • Interlinking

As incoming links became more important for search engine positioning the practice of building multiple websites and linking them together to build the overall link popularity of them all became a common practice. This tactic is more difficult to detect than others when done “correctly” (we cannot give the method for “correct” interlinking here as it’s still undetectable at the time of this writing and we don’t want to provide a means to spam engines). This tactic is difficult to detect from a user standpoint unless you end up with multiple sites in the top positions on the search engines in which case it is likely that you will be reported.

Grey-Hat SEO Tactics:
The following tactics fall in the grey area between legitimate tactics and search engine spam. They include tactics such as cloaking, paid links, duplicate content and a number of others. Unless you are on the correct side of this equation these tactics are not recommended. Remember: even if the search engines cannot detect these tactics when they are used as spam, your competitors will undoubtedly be on the lookout and report your site to the engines in order to eliminate you from the competition.
It is definitely worth noting that, while it may be tempting to enlist grey-hat and black-hat SEO tactics in order to rank well, doing so stands a very good chance of getting your website penalized. There are legitimate methods for ranking a website well on the search engines. It is highly recommended that webmasters and SEO’s put in the extra time and effort to properly rank a website well, insuring that the site will not be penalized down the road or even banned from the search engines entirely.

  • Cloaking

There are times when cloaking is considered a legitimate tactic by users and search engines alike. Basically, if there is a logical reason why you should be allowed to present different information to the search engines than the visitor (if you have content behind a “members only” area for example) you are relatively safe. Even so, this tactic is very risky and it is recommended that you contact each search engine, present your reasoning, and allow them the opportunity to approve it’s use.
Arguably, another example of a site legitimately using cloaking, is when the site is mainly image-based such as an art site. In this event, provided that the text used to represent the page accurately defines the page and image(s) on it, this could be considered a legitimate use of cloaking. As cloaking has often been abused, if other methods such as adding visible text to the page is possible it is recommended. If there are no other alternatives it is recommended that you contact the search engine prior to adding this tactic and explain your argument.
There is more information on cloaking on our black-hat SEO tactics page.

  • Paid Links

The practice of purchasing link on websites solely for the increase in link-popularity that it can mean has grown steadily over the last year-or-so with link auction sites such as LinkAdage making this practice easier. (You can read more about LinkAdage on our SEO resources page.
When links are purchased as pure advertising the practice is considered legitimate, while the practice of purchasing links only for the increase in link-popularity is considered an abuse and efforts will be made to either discount the links or penalize the site (usually the sellers though not always).
As a general rule, if you are purchasing links you should do so for the traffic that they will yield and consider any increase in link-popularity to be an “added bonus”.

  • Duplicate Content

Due primarily to the increase in popularity of affiliate programs, duplicate content on the web has become an increasingly significant problem for both search engines and search engine users alike with the same or similar sites dominating the top positions in the search engine results pages.
To address this problem many search engines have added filters that seek out pages with the same or very similar content and eliminate the duplicate. Even at times when the duplicate content is not detected by the search engines it is often reported by competitors and the site’s rankings penalized.
There are times when duplicate content is considered legitimate by both search engines and visitors and that is on resource sites. A site that consists primarily as an index of articles on a specific subject-matter will not be penalized by posting articles that occur elsewhere on the net, though the weight it may be given as additional content will likely not be as high as a page of unique content.
White-Hat SEO Tactics:

  • Internal Linking

By far one of the easiest ways to stop your website from ranking well on the search engines is to make it difficult for search engines to find their way through it. Many sites use some form of script to enable fancy drop-down navigation, etc. Many of these scripts cannot be crawled by the search engines resulting in unindexed pages.
While many of these effects add visual appeal to a website, if you are using scripts or some other form of navigation that will hinder the spidering of your website it is important to add text links to the bottom of at least your homepage linking to all you main internal pages including a sitemap to your internal pages.

  • Reciprocal Linking

Exchanging links with other webmasters is a good way (not the best, but good) of attaining additional incoming links to your site. While the value of reciprocal links has declined a bit over the past year they certainly still do have their place.
A VERY important note is that if you do plan on building reciprocal links it is important to make sure that you do so intelligently. Random reciprocal link building in which you exchange links with any and virtually all sites that you can will not help you over the long run. Link only to sites that are related to yours and who’s content your visitors will be interested in and preferably which contain the keywords that you want to target. Building relevancy through association is never a bad thing unless you’re linking to bad neighborhoods (penalized industries and/or websites).
If you are planning or currently do undertake reciprocal link building you know how time consuming this process can be. An useful tool that can speed up the process is PRProwler. Essentially this tool allows you to find related sites with high PageRank, weeding out many of the sites that would simply be a waste of time to even visit. You can read more about PRProwler on our search engine positioning tools page.

  • Content Creation

Don’t confuse “content creation” with doorway pages and the such. When we recommend content creation we are discussing creating quality, unique content that will be of interest to your visitors and which will add value to your site.
The more content-rich your site is the more valuable it will appear to the search engines, your human visitors, and to other webmasters who will be far more likely to link to your website if they find you to be a solid resource on their subject.
Creating good content can be very time-consuming, however it will be well worth the effort in the long run. As an additional bonus, these new pages can be used to target additional keywords related to the topic of the page.

  • Writing For Others

You know more about your business that those around you so why not let everyone know? Whether it be in the form of articles, forum posts, or a spotlight piece on someone else’s website, creating content that other people will want to read and post on their sites is one of the best ways to build links to your website that don’t require a reciprocal link back.

  • Site Optimization

The manipulation of your content, wording, and site structure for the purpose of attaining high search engine positioning is the backbone of SEO and the search engine positioning industry. Everything from creating solid title and meta tags to tweaking the content to maximize it’s search engine effectiveness is key to any successful optimization effort.
That said, it is of primary importance that the optimization of a website not detract from the message and quality of content contained within the site. There’s no point in driving traffic to a site that is so poorly worded that it cannot possibly convey the desired message and which thus, cannot sell. Site optimization must always take into account the maintenance of the scalability and solid message of the site while maximizing it’s exposure on the search engines.

Nokia Codes

  • *3370# This Nokia Code activates Enhanced Full Rate Codec (EFR) – Your Nokia cell phone uses the best sound quality but talk time is reduced my approx. 5%
  • #3370# Deactivate Enhanced Full Rate Codec (EFR) .
  • *#4720# Activate Half Rate Codec – Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
  • *#4720# With this Nokia code you can deactivate the Half Rate Codec.
  • *#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type .
  • *#9999# Phones software version if *#0000# does not work.
  • *#06# For checking the International Mobile Equipment Identity (IMEI Number) .
  • #pw+1234567890+1# Provider Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
  • #pw+1234567890+2# Network Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) .
  • #pw+1234567890+3# Country Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
  • #pw+1234567890+4# SIM Card Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) .
  • *#21# This phone code allows you to check the number that “All Calls” are diverted to.
  • *#2640# Displays phone security code in use .
  • *#30# Lets you see the private number.
  • *#43# Allows you to check the “Call Waiting” status of your cell phone.
  • *#61# Allows you to check the number that “On No Reply” calls are diverted to .
  • *#62# Allows you to check the number that “Divert If Unreachable (no service)” calls are diverted to .
  • *#67# Allows you to check the number that “On Busy Calls” are diverted to
  • *#67705646# Phone code that removes operator logo on 3310 & 3330
  • *#73# Reset phone timers and game scores.
  • *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible .
  • *#7760# Manufactures code.
  • *#7780# Restore factory settings.
  • *#8110# Software version for the nokia 8110.
  • *#92702689# Displays – 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again.
  • *#94870345123456789# Deactivate the PWM-Mem.
  • **21*number# Turn on “All Calls” diverting to the phone number entered.
  • **61*number# Turn on “No Reply” diverting to the phone number entered .
  • **67*number# Turn on “On Busy” diverting to the phone number entered .
  • 12345 This is the default security code .
  • press and hold # Lets you switch between lines.

(Codes may not work for some specific models and might only work for some certain models)

20 things you didn’t know about Windows XP

1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type ‘systeminfo’. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type ‘systeminfo > info.txt’. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run… and type ‘gpedit.msc’; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care — some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter ‘rundll32.exe user32.dll,LockWorkStation’ in the location field. Give the shortcut a name you like. That’s it — just double click on it and your computer will be locked. And if that’s not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word ‘hide’ and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include ‘eventcreate’ and ‘eventtriggers’ for creating and watching system events, ‘typeperf’ for monitoring performance of various subsystems, and ‘schtasks’ for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options — they’re all far too baroque to go into here.

6. XP has IP version 6 support — the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type ‘ipv6 install’ into Run… (it’s OK, it won’t ruin your existing network setup) and then ‘ipv6 /?’ at the command line to find out more. If you don’t know what IPv6 is, don’t worry and don’t bother.

7. You can at last get rid of tasks on the computer from the command line by using ‘taskkill /pid’ and the task number, or just ‘tskill’ and the process number. Find that out by typing ‘tasklist’, which will also tell you a lot about what’s going on in your system.

8. XP will treat Zip files like folders, which is nice if you’ve got a fast machine. On slower machines, you can make XP leave zip files well alone by typing ‘regsvr32 /u zipfldr.dll’ at the command line. If you change your mind later, you can put things back as they were by typing ‘regsvr32 zipfldr.dll’.

9. XP has ClearType — Microsoft’s anti-aliasing font display technology — but doesn’t have it enabled by default. It’s well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who’s using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum’s real IP address — they can find this out by going to www.whatismyip.com — and get them to make sure that they’ve got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As… and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run… from the start menu and type ‘control userpasswords2’, which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options… and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can’t see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You’ll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By… Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks — if it found the picture on the Internet when you copied the tracks from the CD. If it didn’t, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, was out on early 2003 and wasn’t much to write home about. The next big release was codenamed Blackcomb and was out in 2003/2004, I don’t think either of these was a successful project.

Source: Collected from another website

Web Analytics – An important section of Web development

Now a days, most of the commercial institutions have their own website which are used in several ways. Some of the commercial websites perform the role of product featuring, order placement and share company information and other details with potential customers. On the other hand some companies run on commercial websites by providing different services to the customers through their websites (eg. yahoo, msn, bdjobs etc). Even personal sites can be a source of revenue earning for individuals ( implementation of google adsense, yahoo publishers, msn AdCenter). Therefore it is very important for any website publisher to understand the usability, visitor characteristics and effectiveness of different sections of their websites.

Web Analytics is the study of the usability or effectiveness of a website. It actually deals with the data collected from a website to determine which aspects of the website work towards the business objectives. Data collected almost always includes web traffic reports. It may also include e-mail response rates, direct mail campaign data, sales and lead information, user performance data such as click heat mapping, or other custom metrics as needed.

There are two main ways in which web analytics data can be collected:

  • Log file analysis
  • Page Tagging

Log File Analysis:

The web servers has some application software where information for the hosted websites are stored. For example, linux servers have cPanel and windows servers have Plesk control panels where there are tools for analyzing website traffic, bandwidth transfer, landing pages, referral pages, requested files and etc etc. This reports can be collected in daily basis or even monthly basis to analyze the visitors, most viewed sections/files/forlders/sub domains, emails, unique visitors, visitor’s IP addresses, geographical location of the visitors and even errors occurred during browsing.

Page Tagging:

This method uses JavaScript on each page to notify a third-party server when a page is rendered by a web server. Concerns about the accuracy of logfile analysis in the presence of caching, and the desire to be able to perform web analytics as an outsourced service, led to this data collection method. The web analytics service also manages the process of assigning a cookie to the user, which can uniquely identify them during their visit and in subsequent visits. With the increasing popularity of Ajax-based solutions, an alternative to the use of an invisible image, is to implement a call back to the server from the rendered page. In this case, when the page is rendered on the web browser, a piece of Ajax code would call back to the server and pass information about the client that can then be aggregated by a web analytics company. This is in some ways flawed by browser restrictions on the servers which can be contacted with XmlHttpRequest objects.

There are advantages and disadvantages of both the methods but both are equally important and are used in different web analytics processes depending upon necessity. Even there are some web analytics program which implements both the methods together as a hybrid method. There is another method which are not widely used now a days which integrates the web analytics program into the web server, and collecting data by sniffing the network traffic passing between the web server and the outside world.

Web Analytics are often necessary for internet advertising and promotion which involves Search Engine Marketing ( SEM ) and Search Engine Optimization ( SEO ). I hope to write more on the advantages and disadvantages of the Web Analytics methods and try to share something regarding SEO and SEM also.

This article is also available at : http://community.nsuers.com/showthread.php?p=102627#post102627

Search Engine Optimization ( SEO – Part2)

I remember I wrote an article in this blog on the same topic. I tried to illustrate the importance of Search Engine Optimization ( SEO ). The knowledge and information is spreading through Internet several times quicker than any other mean. And people are getting more and more dependent on information search using Internet. Internet is infact making a bridge between the information seeker and publishers. This is why it is equally important to know how to reach the information seeker as well as to know how to get desired information. If any one wants to draw more and more attention to his/her site he/she should provide the relevant information with adequacy and also make a proper plan to reach the right people. Therefore, I believe that the most important thing for a successful website is to be rich in terms of content or information. It really doesn’t matter that much if your site is on top of the search result, unless there are plenty of things which will attract people to get back to your site at a later time. The more the contents (the more the keywords) the more it is likely to be searched and viewed by the people. So I will conclude here saying that increase the amount with diversified information, the search engines are waiting to link those to the people.

4 THINGS YOU PROBABLY NEVER KNEW YOUR MOBILE PHONE COULD DO

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it:

FIRST

Emergency

The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile; network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. Try it out.

SECOND

Have you locked your keys in the car?
Does your car have remote keyless entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their mobile phone from your cell phone.

Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).

Editor’s Note: It works fine! We tried it out and it unlocked our car over a mobile phone!”

THIRD

Hidden Battery Power (May not be applicable for new model handsets)

Imagine your mobile battery is very low. To activate, press the keys *3370# Your mobile will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.

FOURTH

How to disable a STOLEN mobile phone?

To check your Mobile phone’s serial number, key in the following digits on your phone: *#06#

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won’t get your phone back, but at least you know that whoever stole it can’t use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.

Problem with “Show Hidden Files & Folders” in windows Folder Option – WORM_AUTORUN.RW

I encountered a very tricky problem with hidden files and the option in the “Folder Option” menu in Windows. A virus spreaded from and external pen drive and ultimately slowed down the windows so much and at a certain point the windows wasn’t even starting and eventually I had to reinstall the Windows. But the problem wasn’t over even after reinstalling the windows. Another symptom was that when I double clicked on any of the Drives a new window opened everytime, and later on double clicking was’t working at all. I had to navigate through the browser. Later I had to follow a set of instruction to get rid of this problem:

PART: A (Removing the Virus/worm/trojan) 

1. Install AVG antivirus solution and update it.

2. I  had NC (Norton commander)a very old dos based explorer, . I opened NC from the command prompt, and through it I could browse through my drives and could see what damages the virus did. There was a file named u.bat  and also autorun.ini in all my drives. I deleted those. Then I made sure that the file named amvo.exe (C:\windows\system32\amvo.exe) was deleted (stop it from the taskbar if it is running in the process tree). Then I deleted almost all the files in the “system volume information” folder (restore point files). Remember, I used NC to do the above jobs as the files I mentioned above were in hidden format and wasn’t visible through normal explorer. But through NC you can browse and delete these.

The above method worked in my case, but cannot be guaranteed in all the cases.

PART: B (Fixing “Show Hidden Files & Folder” problem)

Go to the following registry key: (go to Start >> Run >> type “regedit” and then press “ok”)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL

DELETE the value CheckedValue in the right window. (Its type should be REG_SZ and data should be 2.)

Now create a new DWORD value called CheckedValue (same as above, except that the type is REG_DWORD). Modify the value data to 1 (0x00000001).

This should let you change the “Show Hidden Files and Folders” option now.

Be safe, be careful, use protections, ensure prevention and avoid cure hassles. 😉 😉