Thursday, 14 March 2013

TIPS FOR BLOGGERS


Tips regarding blogging for shopping:
1. Choose a theme for which you have to write about:
The content writer needs to determine a theme for the shopping blog. While he or she is free to blog about any kind of shopping under the sun, it is good if the author selects a particular class. The categories may vary from buying for apparel to buying for electronics. Zeroing in on a specific subject will help in attracting a niche audience who will be involved in most of your blog applications. Informative content will not suffice. The topic desires to percussion instrument up the interest of the people.
2. Select a catchy name for blog:
Choose a memorable name for your shopping blog. A blog with a catchy name like “The Fashion Diva” is more expected to draw readers than a blog called “I like clothes”. Glimpse to it that your blog name reflects the shopping theme that forms the aim of your blog.
Browse the websites for blogs similar to the blog you desire to compose. Proceed through these blogs and find out their strengths and flaws. The content author desires to find out whether there is a specific shopping related theme that is popular and evokes an allotment of consideration. Such topics can include the cyclic latest trend tendencies. You can furthermore select a topic that has not been much highlighted and thus, has the scope of being farther explored.
3. Do some research
This kind of blog writing may furthermore need you to visit trade displays and other events associated to your area of shopping know-how. For instance, fabric shows will help you get well known with the newest fabric tendencies in newest trend. You can use a combine of informative content and images from these displays to drag in your readers and rivet their vigilance.
4. Use of images
Use illustration and photographs to back your shopping considerations. Using images not only apprehensions the vigilance of your readers but also assists you get your issue over.
5. Knowledge
Study is a must for any content writer and should pattern the basis of all informative content. Locate a few shopping-related causes which you can confer on a regular cornerstone for fresh ideas. Fashion publications, for instance, can be a good source for particular types of shopping blogs.
6. Revise your blog content
Revise your blog at normal gaps. Check and cross ascertain your blogs before posting them. Update your blog on the identical day each week so that readers know in accelerate when to visit your blog.

Wednesday, 13 March 2013

How To Protect Your VPS From Hacker Attacks ?


Virtual Private Server
A VPS server is run on a server that is hosted by another computer. The software that is used allows the computer to perform as if it is on a dedicated server. In actuality, many different virtual private server users are on the same server. By sharing a server, users will have the dedicated server options without the price associated with dedicated servers. Protection software needs to be run on the virtual server so hackers cannot attack your web site.
Control of Your Web Site
People are now aware that they want more control over both the front and back ends of their web site. Web owners want to be able to run their own programs and set up everything the way they want. The only way to have full control over the server is to run a VPS solution. Renting out a server box gives you an unmanaged dedicated server in which everything that happens is up to you. You choose the operating system and the security that goes onto the server.
Linux based VPS Protection
Hackers can attack a virtual server the same way they attack a normal server, so protective software must be run the same as if it were a real machine. Before you make your server public, you will want to set up a couple of things for protection. Do not use root access when making changes on the server. With a Linux system you would use sudo, if you are using Ubuntu, then you must use su. Some people also feel safer just to eliminate the root access altogether. Check the security of your folders. Make sure that the public can only see those folders that are intended for their viewing. The only folder that the public should see is the one that contains your web site.
Passwords
User accounts on the Linux server should have strong and intricate passwords. Never use simple words, family or pets names, street addresses or basic words directly out of the dictionary for a password. Using a strong password with a combination of numbers, upper and lower case letters and even special characters will be harder for hackers to break. Your password should also be a minimum of eight characters.
Firewall Protection
Firewalls should be run on the machine to keep your ports protected. Ports are the easiest way for hackers to get into your information. Make sure that all your software including your operating system is upgraded constantly. When your software and operating system is upgraded, your security will also upgrade, giving you the maximum protection on your server. Virtual Private Servers will give the user the power and flexibility that are in dedicated server but cost a lot less. Maintaining the security of your VPS is the most important function that needs to be handled.
Disabling any unneeded services, ports will be closed making it harder for hackers to gain access. The user will also get better performance out of the server when unnecessary programs are closed.

Sunday, 10 March 2013

FACT

OVERFact : 
                   Studies show that Music with a strong beat can stimulate brain waves which improve concentration, even after you’ve stopped listening.

Monday, 4 March 2013

COPY PEN DRIVE TO SYSTEM IN HIDDEN FORM


PEN DRIVE TO SYSTEM

                   We sometime wish that if someone insert his/her pendrive or Dvd Into your pc then its data automatically copy in to your system in hidden Form. There is no need of software in this. we will make it possible with the help of some Dos commands.
lets get started, Follow the below steps.

1. open cmd
3. type copy con filename.bat
3. now type "xcopy 
i: f:\copied /h /s /c /q /i" remove " "
4. type Exit
4. press f6
5. now it will create a batch file named filename.bat


here
xcopy is a command which is used to copy file and folder
i: is the name of your pen-drive drive name replace with your drive name
f:\copied is the name of folder where you wish to copied data is to be placed replace
with your own folder or path
/h is used to copy hidden files also

now copy this file into desktop now whenever someone insert his/her pendrive into your system then click on this file his data is automatically copied into the folder specified by you.

Sunday, 3 March 2013

Get an Email Alert (with Picture) When Someone Tries to Log into your Computer...?


You have a feeling that someone else used your computer (or at least made an attempt to login) while you were out for a quick coffee break. Maybe that colleague with whom you share the cubicle knows your password or he made a few guesses before finally giving up.
How do you get notified when such an attempt is made to intrude into your computer?
Email alert with a webcam picture of the intruder.
A new website (made in Turkey) called MouseLock.co may have a simple solution here. They will send you an email alert as well as a picture of the intruder as soon as someone tries to use your computer.
Here’s how Mouse Lock works.
You sign-in with your Google Account (they’ll send the alert to your Gmail address) and then select a secret pin on the screen. Next, put your mouse cursor in a designated area on the Mouse Lock website and leave the machine.
Now when someone moves the mouse, they will also have to enter the original pin. If they fail to do that in the first few seconds, Mouse Lock will send you an email and, if the computer has a webcam, it will use that to also snap a picture of the intruder.
Mouse Lock won’t prevent the intrusion but will at least notify you the minute it happens. And best of all, this a web app and thus requires no installation.
Internally, the site uses jQuery (mouseLeaveEvent) to detect mouse movements while the webcam photographs are captured using the getUserMedia() API currently supported in Chrome and Firefox. The alerts, possibly due to a bug, are triggered even when any of the keys are pressed and that makes it a little less useful since there’s no way to lock the computer after setting up the monitor.

You Can Accept Your Failure But not Accept Not doing...!


Use gmail via offline

Use Gma¡l ¡n offline connection :
~Login your gmail & follow this steps below~


1. Click Settings and click the Labs tab.
2. Select Enable next to Offline Gmail.
3. Click Save Changes.
4. After your browser reloads,you’ll see a new “Offline0.1″ link in the upper right hand corner of your account, next to your username. 

#Click this link to start the offline set up process and download Gears if you don’t already have it.
When you hit save, Gmail will synchronize new messages you didn’t have downloadedbefore and remove the ones you’re not planning to read from your hard drive.
Thats it, now you can browse your gmail in offline connection!!