Share Your File Here

Selasa, 12 Juli 2011

Search Engine Optimize (SEO)

Insert keywords within the title tag so that search engine robots will know what your page is about. The title tag is located right at the top of your document within the head tags. Inserting a keywoard or key phrase will greatly improve your chances of bringing targeted traffic to your site or blog.

Make sure the title tag contains text which a human can relate to. The text within the title tag is what shows up in a search result. Treat it like a headline.

Use the same keywords as anchor text to link to the page from different pages on your site/blog. This is especially useful if your site or blog contains many pages. The more keywords that link to a specific page the better.

Make sure that the text within the title tag is also within the body of page. It is unwise to have keywords in the title tag which are not contained within the body of page.

Adding the ecact same for your h1 tag will tell the reader who clicks on your page from a search engine result that they have clicked on the correct link anda have arrived at the page where they intended to visit. Robots like this too becouse now there is a relation between the title of your page and the headline.
Also, sprinkle your keywords throughout your article. The most important keywords can be bolded or colored in red. A good place to do this is once or twice in the body at the top of your article and in the sub-headings.

Do not use the exact same title tag on every page on your website. Search engine robots might determine that all your pages are same if all your title tags are the same. If this happens, your pages might not get indexed.

Use the headline of pages as the title tag to help the robots know exactly what the page is about. A good place to insert the headline is within the h1 tag. So the headline is the same as the title tag text.

Do not spam the description or keyword meta tag by stuffing meaningless keywords or even spend too much time on this tag. SEO pros all agree that these tags are not as important today as they once were. I just place my headline once within the keywords and description tags.

Do not link to link-farms or other search engine unfriendly neighborhoods

Do not use doorway pages. Doorway pages are designed for robots only, not humans. Search engines like to index human friendly pages which contain content which is relevant to the search

Title tags for text links. Insert the title tag within the HTML of your text link to add weight to the link and the page where the link resides. This is like the alt tag for images

Describe your images with the use of the alt tag. This will help search engines that index images to find your pages and will also help readers who use text only web browsers

Submit to the search engines yourself. Do not use a submission service or submission software. Doing so could get your site penalized or even banned



Adrian™

How to Remove Viruses in Computer

If you suspect you have a virus (or any other malware), you should take steps immediately. The following procedures work for most viruses or malware (except perhaps for completely new, unknown or unusually malignant strains). It is better to complete all steps, so you can be (reasonably) sure that all traces have been removed.

Signs to look out for (infections may cause one or several of the following) :
  • Slow computer, and/or slow internet connection. Strange pop-ups or web browser redirections (beyond those expected from dodgy websites).
  • Program failure, or inexplicable errors (even after a fresh install).
  • System functions unavailable (eg: Control Panel, Task Manager, Internet Explorer).
  • System giving a "RPC error", giving a window with a 30 second countdown to a restart.
  • Excessive internet cap usage, i.e high internet traffic on your computer.
Steps :
  1. Confirmation and Preliminary Action: Make a list of ways yourcomputer is showing signs of abnormal operation. Satisfy yourself that these signs are not due to hardware failure or problems with attached equipment. Sometimes people misdiagnose software problems (such as bugs in Outlook Express or printer drivers) as virus activity. Also, problems with the Registry can be a source of errors, this happens if you install and uninstall lots of programs.
    • Run your virus-scanner, but beware, many modern viruses can circumvent (or hide from) common anti-virus programs. Norton Antivirus and Mcafee have both been seen to exhibit this weakness, or seem unable to remove certain strains.
  2. Check access to System Restore & the Internet.
    1. Check computer for system access - Try to disable System Restore - right-click My Computer and select properties. Turn off System Restore on all drives.
    2. Download and install new Anti-Virus. Both AVG Free Edition and Avast! are highly acclaimed programs. Install one of them (see External Links). Update the program's virus definitions. Don't scan for viruses yet.
    3. Install Spybot Search & Destroy or Webroot Spysweeper (see External Links), and update its definitions. Don't scan for malware yet.
    4. Install Adaware Personal Edition (see External Links) and update its definitions. Don't scan for malware yet.
  3. Reboot into Safe Mode - Restart your computer and press F8 before Windows loads. Press F8 several times if you need to. Select Safe Mode from the resulting menu. Safe Mode disables much of the startup routine (including some common Malware hiding places).
  4. Run your Anti-Virus - Run the freshly installed Anti-Virus. And Heal or Delete any references to Malware.
  5. Run your Malware Scanners - Run both the scanners sequentially, deleting any references found.
  6. Reboot and turn System Restore back on.
  7.  Enjoy your sanitised computer

adrian™

How To Schedule Automatic Updates

Want your computer more protection from spyware, virus you must to shedule automatic updates for your windows operating system.

Follow this steps to shedule automatic updates.

You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure.

Open System, and then click the Automatic Updates tab.
– or –
If you are running Windows 2000, click Start, point to Settings, click Control Panel, and then double-click Automatic Updates.



Click Automatic (recommended).
Under Automatically download recommended updates for my computer and install them, set the time and day you want Windows to install updates, and then click Apply.
Notes

To open System, click Start, click Control Panel, click Performance and Maintenance, and then click System.
Scheduled updates are automatically installed at the scheduled time, regardless of who is logged on to the computer. If you choose to be notified before updates can be installed, you must be logged on as an administrator to get notifications and to install updates.

Some updates require you to restart your computer before they can take effect. Windows will notify any user who is logged on to the computer before restarting; however, only members of the local Administrators group can stop the computer from restarting. Make sure you save your work before restarting your computer and remind other users to save their work, especially before scheduled installation times.

Adrian™

Blogging for Dollars (archive)

Last week, the blog search engine Technorati released its 2008 State of the Blogosphere report with the slightly menacing promise to "deliver even deeper insights into the blogging mind." Bloggers create 900,000 blog posts a day worldwide, and some of them are actually making money. Blogs with 100,000 or more unique visitors a month earn an average of $75,000 annually—though that figure is skewed by the small percentage of blogs that make more than $200,000 a year. The estimates from a 2007 Business Week articleare older but juicier: The LOLcat empire rakes in $5,600 per month;Overheard in New York gets $8,100 per month; and Perez Hilton, gossip king, scoops up $111,000 per month.

With this kind of cash sloshing around, one wonders: What does it take to live the dream—to write what I know, and then watch the money flow?

From the perspective of someone who doesn't blog, blogging seems attractive. Bloggers such as Jason Kottke ($5,300/month) and theFug girls ($6,240/month) pursue what naturally interests them without many constraints on length or style. While those two are genuine stars of the blogging world, there are plenty of smaller, personal blogs that bring in decent change with the Amazon Associates program (you receive a referral fee if someone buys a book, CD, etc. via a link from your blog) and search ads from Google. (The big G analyzes your site and places relevant ads; you get paid if people click on them.) Google-ad profiteering is an entire universe in and of itself—one blogger by the name of Shoemoney became famous (well, Digg-famous) when he posted a picture of himself with a check from Google for $132,994.97 for one month of clicks.

Blogs with decent traffic and a voice are also getting snapped up by blog-ad networks, which in turn package them as niche audiences to advertisers. On Blogads, advertisers can choose the "Blogs for Dudes!" hive or the "Jewish Republican Channel." Federated Mediagroups blogs into subjects such as "Parenting" and "News 2.0"; there is also a boutique network for blogs that don't want to cover themselves with ads called The Deck. These networks present blogs as "grassroots intellectual economy" and describe their audiences as loyal, engaged, and likely to see ads as not just ads, but useful bits of information. This may be a comfort to squeamish indie bloggers since it hints that putting ads on your site is not selling out but helping out.
While monetizing your blog may be easier than ever, all of this comes with an ever-present hammer: the need to drive traffic. This month, the writer/blogger/productivity thinker Merlin Mann opened a window onto his angst with an anniversary postMann is best-known as the creator of the Hipster PDA (index cards clipped together by a binder clip)* and his Inbox Zero talk (turn your e-mail into actions). In a post titled "Four Years," Mann sketches out how his site, 43 Folders, grew from a personal dumping ground for his "mental sausage" into a full-featured destination for productivity nerds and life-hackers. In 2005, he experienced a key transition:
At some point that year, 43f became the surreal and unexpected circus tent under which my family began drawing an increasing amount of its income. This was weird, but it was also exactly as gratifying as it sounds. Which is to say, "very." But, my small measure of something like success did not go unnoticed. In fact, the popularity of small blogs like 43 Folders contributed to the arrival of a gentrifying wagon train of carpetbaggers, speculators, and confidence men, all eager to pan the web's glistening riverbed for easy gold. And, brother, did these guys love to post and post and post.
Mann's problem was especially acute. His income was partially dependent on advertising, and ads are sold on a cost-per-impression basis. That is, the more traffic you have, the more ads you can sell (and also the more chances that someone will click on one of the Google ads or affiliate links on your site). But a site that teaches you how to streamline your tasks and free your time yet constantly shovels new posts, lists, and information at you is oxymoronic—and also kind of moronic.
Mann could have overlooked this contradiction, but he chose instead to live his advice. Declaring an end to "productivity pr0n," Mann has promised fewer, better posts and rolled out a new mission statement: "43 Folders is Merlin Mann's website about finding the time and attention to do your best creative work." The further irony here is that Mann's less-is-more strategy may prove to be more profitable. The usability guru Jakob Nielsen has long recommended that experts "write articles, not blog postings," with the idea that demonstrating expertise is the best way to distinguish yourself from Internet amateurs and ultimately persuade someone to pay you for your insights. In Mann's case, that might mean less ad revenue but more speaking engagements.


Once a blog hobbyist goes pro, he or she faces a daily pressure to churn out new material. In the wrong mind, that can lead to top-10 lists, recycled ideas, half-baked notions, lots of viral videos, and a general increase in information pollution. Is there any way out of this scenario? In 2005, Jason Kottke announced that he had quit his job to blog full-time and asked his readers to become "micropatrons" at a suggested rate of $30. He received $39,900 from 1,450 people butabandoned the experiment after a year. Kottke is vague about the reasons why he swore off micropatronage, but he suggests that he was worried that people wouldn't donate year after year. In order to build a bigger audience and potential new donors, he would have had to do some of the cheesy things to drive traffic (i.e., "Top Five Best" posts) and/or become a cult of personality (overshare, start flame wars, social network relentlessly). These days, he accepts ads as part of the Deck network.
The bloggers at the vanguard of the post-quality-vs.-post-quantity debate are those who work for Nick Denton's Gawker media. This year, Denton introduced a new pay system that gave his bloggers a base salary and also paid them a quarterly bonus based upon the amount of page views their items receive. Or to oversimplify, they were being paid by popularity. (To follow the complicated ins and outs of the "blogonomics" of the Gawker pay structure, read Felix Salmon's Portfolio blog.) The memo explains the decision as an effort to reward and encourage more original, scoopy items, but, as Denton's writers and ex-writers quickly pointed out, there's not an obvious correlation between quality and page views. Despite a few exceptions, such as the Tom Cruise Scientology video, no one can predict a Web hit.
Do we get the blogs we deserve? We vote by click, after all. Perhaps we shouldn't look at all those top 10 lists and Britney Spears photos. Successful blogs, such as Zen Habits, tend to balance the more fast-food type posts with longer, more complex ideas that will presumably keep readers coming back—although there are plenty of people who make a living posting dubious crap. Perhaps the escape route out of a hit-driven blogosphere is all of our newfound "friends." The Internet has always been very good at counting page views but not so great at assigning value to what's actually in those pages. Facebook,FriendFeed, StumbleUpon, and the sharing feature of Google Readerhave their annoying, nudgy aspects, but they allow us to rely on one another to sort out what is interesting and worthy. Put it on a T-shirt: Friends Don't Let Friends Read Bad Content.
Adrian™

How to Speed Up Your Computer

How to make your computer fast ? 

By following a few simple guidelines, you can maintain your computer and keep it running smoothly.

Free up disk space

By freeing disk space, you can improve the performance of your computer. The Disk Cleanup tool helps you free up space on your hard disk. The utility identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.
Use Disk Cleanup to:

1. Remove temporary Internet files.
2. Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).
3. Empty the Recycle Bin.
4. Remove Windows temporary files.
5. Remove optional Windows components that you don't use.
6. Remove installed programs that you no longer use.

Speed up access to data
Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.

Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter

In addition to running Disk Defragmenter at regular intervals—monthly is optimal there are other times you should run it too, such as when:

1. You add a large number of files.
2. Your free disk space totals 15 percent or less.
3. You install new programs or a new version of Windows.

Detect and repair disk errors
In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

http://www.microsoft.com/atwork/getstarted/speed.mspx

Credit By : Adrian

Minggu, 10 Juli 2011

Perintah Dos (Disk Operating System Command)

Nih Semuanya !!

APPEND : Causes MS-DOS to look in other directories when editing a file or running a command.
ARP : Displays, adds, and removes arp information from network devices
ASSIGN : Assign a drive letter to an alternate letter
ASSOC : View the file associations
AT : Schedule a time to execute commands or programs.
ATMADM : Lists connections and addresses seen by Windows ATM call manager.
ATTRIB : Display and change file attributes.
BATCH : NRecovery console command that executes a series of commands in a file.
BOOTCFG : Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK : Enable / disable CTRL + C feature.
CACLS : View and modify file ACL's.
CALL : Calls a batch file from another batch file.
CD : Changes directories.
CHCP : Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK : Check the hard disk drive running FAT for errors.
CHKNTFS : Check the hard disk drive running NTFS for errors.
CHOICE : Specify a listing of multiple options within a batch file.
CLS : Clears the screen.
CMD : Opens the command interpreter.
COLOR : Easily change the foreground and background color of the
MS-DOS window.
COMP : Compares files.
COMPACT : Compresses and uncompress files.
CONTROL : Open control panel icons from the MS-DOS prompt.
CONVERT : Convert FAT to NTFS.
COPY : Copy one or more files to an alternate location.
CTTY : Change the computers input/output devices.
DATE : View or change the systems date.
DEBUG : Debug utility to create assembly programs to modify hardware settings.
DEFRAG : Re-arrange the hard disk drive to help with loading programs.
DEL : Deletes one or more files.
DELETE : Recovery console command that deletes a file.
DELTREE : Deletes one or more files and/or directories.
DIR : List the contents of one or more directory.
DISABLE : Recovery console command that disables Windows system services or drivers.
DISKCOMP : Compare a disk with another disk.
DISKCOPY : Copy the contents of one disk
DOSKEY : Command to view and execute commands that have been run in the past.
DOSSHELL : A GUI to help with early MS-DOS users.
DRIVPARM : Enables overwrite of original device drivers.
ECHO : Displays messages and enables and disables echo.
EDIT : View and edit files.
EDLIN : View and edit files.
EMM386 : Load extended Memory Manager.
ENABLE : Recovery console command to enable a disable service or driver.
ENDLOCAL : Stops the localization of the environment changes
enabled by the setlocal command.
ERASE : Erase files
EXPAND : Expand a Microsoft Windows file back to it's original format.
EXIT : Exit from the command interpreter.
EXTRACT : Extract files from the Microsoft Windows cabinets.
FASTHELP : Displays a listing of MS-DOS commands and information about them
FC : Compare files.
FDISK : Create the partitions on the hard disk drive.
FIND : Search for text within a file.
FINDSTR : Searches for a string of text within a file.
FIXBOOT : Writes a new boot sector.
FIXMBR : Writes a new boot record to a disk drive.
FOR : Boolean used in batch files.
FORMAT : Command to erase and prepare a disk drive.
FTP : Command to connect and operate on a FTP server.
FTYPE : Displays or modifies file types used in file extension
asociations.
GOTO : Moves a batch file to a specific label or location.
GRAFTABL : Show extended characters in graphics mode.
HELP : Display a listing of commands and brief explanation.
IF : Allows for batch files to perform conditional processing.
IFSHLP.SYS : 32-bit file manager.
IPCONFIG : Network command to view network adapter settings and assigned values.
KEYB : Change layout of keyboard.
LABEL : Change the label of a disk drive.
LH : Load a device driver in to high memory.
LISTSVC : Recovery console command that displays the services and drivers.
LOADFIX : Load a program above the first 64k.
LOADHIGH : Load a device driver in to high memory.
LOCK : Lock the hard disk drive.
LOGON : Recovery console command to list installations and enable administrator login.
MAP : Displays the device name of a drive.
MD : Command to create a new directory.
MEM : Display memory on system.
MKDIR : Command to create a new directory.
MODE : Modify the port or display settings.
MORE : Display one page at a time.
MOVE : Move one or more files from one directory to another DIRECTORY
MSAV : Early Microsoft Virus scanner.
MSD : Diagnostics utility.
MSCDEX : Utility used to load and provide access to the CD-ROM.
NBTSTAT : Displays protocol statistics and current TCP/IP connections using NBT
NET : Update, fix, or view the network or network settings
NETSH : Configure dynamic and static network information from MS-DOS.
NETSTAT : Display the TCP/IP network protocol statistics and information.
NLSFUNC : Load country specific information.
NSLOOKUP : Look up an IP address of a domain or host on a network.
PATH : View and modify the computers path location
PATHPING : View and locate locations of network latency
PAUSE : command used in batch files to stop the processing of a command.
PING : Test / send information to another network computer or network device .
POPD : Changes to the directory or network path stored by the pushd command.
POWER : Conserve power with computer portables.
PRINT : Prints data to a printer port.
PROMPT : View and change the MS-DOS prompt.
PUSHD : Stores a directory or network path in memory so it can be returned to at any time.
QBASIC : Open the QBasic.
RD : Removes an empty directory.
REN : Renames a file or directory.
RENAME : Renames a file or directory.
RMDIR : Removes an empty directory.
ROUTE : View and configure windows network route tables.
RUNAS : Enables a user to execute a program on another
computer.
SCANDISK : Run the scandisk utility.
SCANREG : Scan registry and recover registry from errors.
SET : Change one variable or string to another.
SETLOCAL : Enables local environments to be changed without affecting anything else.
SHARE : Installs support for file sharing and locking capabilities.
SETVER : Change MS-DOS version to trick older MS-DOS programs.
SHIFT : Changes the position of replaceable parameters in a batch program.
SHUTDOWN : Shutdown the computer from the MS-DOS prompt.
SMARTDRV : Create a disk cache in conventional memory or extended memory.
SORT : Sorts the input and displays the output to the screen.
START : Start a separate window in Windows from the MS-DOS prompt.
SUBST : Substitute a folder on your computer for another drive letter.
SWITCHES : Remove add functions from MS-DOS.
SYS : Transfer system files to disk drive.
TELNET : Telnet to another computer / device from the prompt.
TIME : View or modify the system time.
TITLE : Change the title of their MS-DOS window.
TRACERT : Visually view a network packets route across a network.
TREE : View a visual tree of the hard disk drive.
TYPE : Display the contents of a file.
UNDELETE : Undelete a file that has been deleted.
UNFORMAT : Unformat a hard disk drive.
UNLOCK : Unlock a disk drive.
VER : Display the version information.
VERIFY : Enables or disables the feature to determine if files have been written properly.
VOL : Displays the volume information about the designated drive.
XCOPY : Copy multiple files, directories, and/or drives from one location to another.
TRUENAME : When placed before a file, will display the whole directory in which it exists
TASKKILL : It allows you to kill those unneeded or locked up applications

Tips Merawat PC Desktop

Tips merawat PC Desktop


Komputer saat ini bukan lagi merupakan kebutuhan barang mewah, tetapi sudah menjadi kebutuhan sehari-hari. Bayangkan saja ketika listrik padam, semua karyawan pada bingung harus berbuat apa karena semua harus dilakukan dengan menggunakan komputer, jadi komputer merupakan sarana kerja yang sangat dibutuhkan saat ini dan saat mendatang.
Sebegitu pentingnya komputer untuk membantu pekerjaan kita sehingga posting kali ini saya mencoba memberikan tips agar merawat pc (personal computer) bisa lebih panjang umurnya.

Tips Perawatan Hardware
- Penempatan Casing tidak berada di depan pemakai komputer untuk menghindari kaki si pemakai komputer (jika tidak memiliki meja khusus komputer)
- Bagi anda yang sering boangkar pasang casing, memori, harddisk, prosesor dan lain-lain yang berada di dalam CPU, agar selalu memasang kabel-kabel penghubung antar dvice dengan benar dan terpasang dengan baik.
- Baut-baut pengancing card-card agar dipasang dan dikencangkan, ini sangat berpengaruh terhadap kerusakan pada card-card yang terpasang apabila baut-baut pengancing card tidak terpasang atau tidak dikencangkan.
- Baut untuk mengancing hard disk agar dipasang lengkap untuk menghindari getaran yang berlebihan pada hard disk karena hard disk merupakan salah satu komponen komputer yang sangat sensitif terhadap getaran.
-Bersihkan Bagian dalam casing (CPU) dari debu kurang lebih 3 bulan sekali
- Apabila anda adalah pengguna komputer insidentil atau tidak setiap hari atau kadang-kadang saja, maka sebaiknya anda meluangkan waktu sedikit untuk menghidupkan komputer anda sekitar 15 menit agar tidak terjadinya kelembaban berlebihan di dalam CPU sehingga suatu saat nanti digunakan komputer tersebut tidak terjadi hubungan pendek (korslet).

Tips perawatan software
berikut tips-tips untuk merawat software
- Lakukan defrag setiap akhir pekan, agar semua program dan data tersimpan dengan baik
- Install anti virus yang selalu di update agar terhindar dari virus yang mengganggu aktifitas kita dalam menggunakan komputer
- Bila sering menyewa Warnet untuk mendapatkan informasi dari internet sebaiknya anda lebih waspada terhadap virus karena virus lebih banyak beredar melalui jarul internet, apalagi warnet merupakan tempat umum yang bisa dipakai oleh siapa saja yang berpotensi menyebarkan virus.
- Shutdown komputer secara benar apabila anda tidak menggunakan komputer lagi.

Begitulah sedikit tips dari saya untuk merawat pc kita dirumah agar selalu bsia menemani kita dalam bekerja. Tips ini berdasarkan pengalaman saya dalam merawat pc saya sejak tahun 1988.
Semoga tips-tips yang saya sajikan disini bisa bermanfaat bagi pengunjung blog Belajar Ilmu Komputer.

Selamat berjelajah

credit By : Adrian