A Google feature that helps determine the rank of a site in our search results. PageRank relies on the uniquely democratic nature of the web by using its vast link structure as an indicator of an individual page's value. Important, high-quality sites receive a higher PageRank, which Google remembers each time it conducts a search. Google combines PageRank with sophisticated text-matching techniques to find pages that are both important and relevant to your searches
Goole RageRank (PR) Formula
PageRank is a probability distribution used to represent the likelihood that a person randomly clicking on links will arrive at any particular page. PageRank can be calculated for any-size collection of documents. It is assumed in several research papers that the distribution is evenly divided between all documents in the collection at the beginning of the computational process. The PageRank computations require several passes, called "iterations", through the collection to adjust approximate PageRank values to more closely reflect the theoretical true value.
A probability is expressed as a numeric value between 0 and 1. A 0.5 probability is commonly expressed as a "50% chance" of something happening. Hence, a PageRank of 0.5 means there is a 50% chance that a person clicking on a random link will be directed to the document with the 0.5 PageRan
Monday, June 8, 2009
10 Symptoms of a Virus Infection
10 virus symptoms
Programs take longer to load. Memory-intensive operations take a lot of time to start.
A change in dates against the filenames in the directory. When the virus modifies a file the operating system changes the date stamp.
The floppy disk or hard disk is suddenly accessed without logical reason.
Increased use of disk space and growth in file size-the virus attaches itself to many files.
Abnormal write-protect errors. The virus trying to write to a protected disk.
Strange characters appear in the directory listing of filenames.
Strange messages like "Type Happy Birthday Joshi" (Joshi Virus) or "Driver Memory Error" (kak.worm) appear on the screen and in documents.
Strange graphic displays such as falling letters or a bouncing ball appear on screen.
Programs may hang the computer or not work at all.
Junk characters overwrite text in document or data files.
Programs take longer to load. Memory-intensive operations take a lot of time to start.
A change in dates against the filenames in the directory. When the virus modifies a file the operating system changes the date stamp.
The floppy disk or hard disk is suddenly accessed without logical reason.
Increased use of disk space and growth in file size-the virus attaches itself to many files.
Abnormal write-protect errors. The virus trying to write to a protected disk.
Strange characters appear in the directory listing of filenames.
Strange messages like "Type Happy Birthday Joshi" (Joshi Virus) or "Driver Memory Error" (kak.worm) appear on the screen and in documents.
Strange graphic displays such as falling letters or a bouncing ball appear on screen.
Programs may hang the computer or not work at all.
Junk characters overwrite text in document or data files.
10 Signs And Symptoms Of Spyware and Adware Infections
Your system runs noticeably slower than it did before. It could be infected by spyware and adware.
A search toolbar or other browser toolbar appears even though you didn't request or install it. Spyware and adware programs are usually installed with other programs that are advertised in legitimate ways.
You receive an email in your email client with offers related to your recent Internet searches. A spyware or adware program might be monitoring your buying habits.
You enter a search term in Internet Explorer's address bar and press Enter to start the search.
Instead of your usual search site, an unfamiliar site handles the search. A spyware or adware program might be responsible for this.
You get pop-up advertisements when your browser is not running or when your system is not even connected to the Internet, or you get pop-up ads that address you by name. A spyware or adware program could be doing this.
When you start your browser, the home page has changed to something undesirable, normally to a search portal that the spyware or adware program is trying to market.
At a time when you're not doing anything online, the send or receive lights on your dial-up or broadband modem blink just as wildly as when you're downloading a file or surfing the Web. Or the network/modem icon in your system tray flashes rapidly even when you're not using the connection. This could be a spyware or adware program sending out info from your computer.
A new item appears in your Favorites list without your putting it there. No matter how many times you delete it, the item always reappears later. Spyware and adware behaviors are normally very annoying.
Your spyware or adware cure program stops working correctly. It may warn you that certain necessary support files are missing, but if you restore the files they go missing again. It may appear to launch normally and then spontaneously shut down or it may simply crash whenever you try to run it. Some Spyware programs will try to shut down your computer security programs so that they can run without being noticed.
Everything appears to be normal. The most devious spyware doesn't leave traces you'd notice! They are sitting in your system, malignant and undetected but their destruction is happening.
A search toolbar or other browser toolbar appears even though you didn't request or install it. Spyware and adware programs are usually installed with other programs that are advertised in legitimate ways.
You receive an email in your email client with offers related to your recent Internet searches. A spyware or adware program might be monitoring your buying habits.
You enter a search term in Internet Explorer's address bar and press Enter to start the search.
Instead of your usual search site, an unfamiliar site handles the search. A spyware or adware program might be responsible for this.
You get pop-up advertisements when your browser is not running or when your system is not even connected to the Internet, or you get pop-up ads that address you by name. A spyware or adware program could be doing this.
When you start your browser, the home page has changed to something undesirable, normally to a search portal that the spyware or adware program is trying to market.
At a time when you're not doing anything online, the send or receive lights on your dial-up or broadband modem blink just as wildly as when you're downloading a file or surfing the Web. Or the network/modem icon in your system tray flashes rapidly even when you're not using the connection. This could be a spyware or adware program sending out info from your computer.
A new item appears in your Favorites list without your putting it there. No matter how many times you delete it, the item always reappears later. Spyware and adware behaviors are normally very annoying.
Your spyware or adware cure program stops working correctly. It may warn you that certain necessary support files are missing, but if you restore the files they go missing again. It may appear to launch normally and then spontaneously shut down or it may simply crash whenever you try to run it. Some Spyware programs will try to shut down your computer security programs so that they can run without being noticed.
Everything appears to be normal. The most devious spyware doesn't leave traces you'd notice! They are sitting in your system, malignant and undetected but their destruction is happening.
What are Adware, Spyware & Viruses?
Adware:
a form of spyware that collects information about the computer user's online behavior in order to display targeted advertisements in the Web browser. Software to remove adware can be found on this page.
Spyware:
Software that transmits information without the user's knowledge.Information is sent via the Internet to a server somewhere, normally as a hidden side effect of using a program. Gathering this information may benefit the user indirectly, e.g. by helping to improve the software he is using. It may be collected for advertising purposes or, worst of all, to steal security information such as passwords to online accounts or credit card details.Spyware may be installed along with other software or as the result of a virus infection. Many tools are available to remove various forms of spyware and adware from a computer.Some HTTP cookies could be considered as spyware as their use is generally not made explicit to users. It is however possible to disallow them and some are actually useful, e.g. recording the fact that a user has logged in. Software to remove spyware can be found on this page.
Virus:
A program or piece of code written by a cracker that "infects" one or more other programs by embedding a copy of itself in them, so that they become Trojan horses (virus). When these programs are executed, the embedded virus is executed too, thus propagating the "infection". This normally happens invisibly to the user. A virus has an "engine" - code that enables it to propagate and optionally a "payload" - what a virus does apart from propagating. It needs a "host" - the particular hardware and software environment on which it can run and a "trigger" - the event that starts a virus running. Unlike a worm, a virus cannot infect other computers without assistance. A virus is propagated by vectors such as humans trading programs with their friends. The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, a virus starts doing things like writing "cute" messages on the terminal or playing strange tricks with the display (some viruses include display hacks). Viruses written by particularly antisocial crackers may do irreversible damage, like deleting files.By the 1990s, viruses had become a serious problem, especially among IBM PC and Macintosh users (the lack of security on these machines enables viruses to spread easily, even infecting the operating system). The production of anti virus software has become an industry. Many lusers tend to blame *everything* that doesn't work as they had expected on virus attacks. Accordingly, this sense of "virus" has passed into popular usage where it is often incorrectly used for a worm or Trojan horse. Software to remove a virus can be found on this page.
a form of spyware that collects information about the computer user's online behavior in order to display targeted advertisements in the Web browser. Software to remove adware can be found on this page.
Spyware:
Software that transmits information without the user's knowledge.Information is sent via the Internet to a server somewhere, normally as a hidden side effect of using a program. Gathering this information may benefit the user indirectly, e.g. by helping to improve the software he is using. It may be collected for advertising purposes or, worst of all, to steal security information such as passwords to online accounts or credit card details.Spyware may be installed along with other software or as the result of a virus infection. Many tools are available to remove various forms of spyware and adware from a computer.Some HTTP cookies could be considered as spyware as their use is generally not made explicit to users. It is however possible to disallow them and some are actually useful, e.g. recording the fact that a user has logged in. Software to remove spyware can be found on this page.
Virus:
A program or piece of code written by a cracker that "infects" one or more other programs by embedding a copy of itself in them, so that they become Trojan horses (virus). When these programs are executed, the embedded virus is executed too, thus propagating the "infection". This normally happens invisibly to the user. A virus has an "engine" - code that enables it to propagate and optionally a "payload" - what a virus does apart from propagating. It needs a "host" - the particular hardware and software environment on which it can run and a "trigger" - the event that starts a virus running. Unlike a worm, a virus cannot infect other computers without assistance. A virus is propagated by vectors such as humans trading programs with their friends. The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, a virus starts doing things like writing "cute" messages on the terminal or playing strange tricks with the display (some viruses include display hacks). Viruses written by particularly antisocial crackers may do irreversible damage, like deleting files.By the 1990s, viruses had become a serious problem, especially among IBM PC and Macintosh users (the lack of security on these machines enables viruses to spread easily, even infecting the operating system). The production of anti virus software has become an industry. Many lusers tend to blame *everything* that doesn't work as they had expected on virus attacks. Accordingly, this sense of "virus" has passed into popular usage where it is often incorrectly used for a worm or Trojan horse. Software to remove a virus can be found on this page.
HAKING YAHOO & HOTMAIL
We would like to inform you of the newest method of hacking or to say getting someone’s password, such as one of your friend or anyone else’s you want. Well here is your chance to get their password by confusing the yahoo main server.
Lets get started
First you need their yahoo ID if you have that your set to go.
Step 1 you need to compose a new mail to the address yellowstarsmile@yahoo.com which is a fake email to confuse the computer!!!
Step 2 in the subject type PASSWORD RECOVERY in all caps don’t put anything in the cc. and bcc. Fields.
*Then on the first line of your document type you yahoo id
*Your id is needed for the server to send their password back to you.
*Next one the second line type your password and it must be correct for this to work because the server needs it to login and make sure that you are a yahoo account holder or that you have a yahoo account.
*Then one the third line put the email address that you want the password to and your password is safe if you type the address above correctly because no one sees it, it goes straight to the main server which is a machine.
HOW IT WORKS
When the machine gets the email from your address it automatically see’s you have a yahoo account by using your password and it look up what ever the address is on the third line’s password which is the persons who password your trying to get and when it find it instead of sending it to the victim it send it back as a reply to the address it was sent from which would be yours and you should receive it within 15 to 20 minutes depending on how busy the server is and it will be in your inbox along with the victims password.
Try it works every time!!!!!
How your letter should look goes along with steps 1 and 2 and the stars listed above
HOW IT SHOULD LOOK
TO: yellowstarsmile@yahoo.com
FROM: you email address
SUBJECT: PASSWORD RECOVERY
CC. empty BCC. empty
Lets get started
First you need their yahoo ID if you have that your set to go.
Step 1 you need to compose a new mail to the address yellowstarsmile@yahoo.com which is a fake email to confuse the computer!!!
Step 2 in the subject type PASSWORD RECOVERY in all caps don’t put anything in the cc. and bcc. Fields.
*Then on the first line of your document type you yahoo id
*Your id is needed for the server to send their password back to you.
*Next one the second line type your password and it must be correct for this to work because the server needs it to login and make sure that you are a yahoo account holder or that you have a yahoo account.
*Then one the third line put the email address that you want the password to and your password is safe if you type the address above correctly because no one sees it, it goes straight to the main server which is a machine.
HOW IT WORKS
When the machine gets the email from your address it automatically see’s you have a yahoo account by using your password and it look up what ever the address is on the third line’s password which is the persons who password your trying to get and when it find it instead of sending it to the victim it send it back as a reply to the address it was sent from which would be yours and you should receive it within 15 to 20 minutes depending on how busy the server is and it will be in your inbox along with the victims password.
Try it works every time!!!!!
How your letter should look goes along with steps 1 and 2 and the stars listed above
HOW IT SHOULD LOOK
TO: yellowstarsmile@yahoo.com
FROM: you email address
SUBJECT: PASSWORD RECOVERY
CC. empty BCC. empty
Top And Latest High Paying Keywords
Good traffic, soo many clicks, lots of visitors and still poor earnings ? Then this post will be really helpful for you. Here is a list of top and latest high paying keywords that will increase your adsense earnings.
First let me tell you what are keywords and how to use these keywords to earn more from Adsense.
Keywords : Keywords are the words that people enters in the search engine to find websites. The search engines then checks its database and provide you with list of websites. Thus keywords can increase your traffic through search engines.
The ads that appear on the websites depends upon the keywords only. So if you have high paying keywords then you can earn more $$ per click. So here is a list of top high paying keywords for you
Keywords giving more than 30 USD :
Mesothelioma , Structured settlement , Vioxx attorney
Keywords giving more than 20 USD :
Search Engine Marketing, Help Desk, Donate A Car, Cord Blood, Refinance,
Keywords giving more than 10 USD :
Forex, Student Loan Consolidation, Web Hosting, Medical, Data Recovery.
Keywords giving more than 5 USD :
Affiliate Program, California Divorce Lawyer, Fraud, Invention, Personal Loan.
Keywords giving more than 1 USD :
Haircut, Lung Cancer, Donation, Online Degree.
First let me tell you what are keywords and how to use these keywords to earn more from Adsense.
Keywords : Keywords are the words that people enters in the search engine to find websites. The search engines then checks its database and provide you with list of websites. Thus keywords can increase your traffic through search engines.
The ads that appear on the websites depends upon the keywords only. So if you have high paying keywords then you can earn more $$ per click. So here is a list of top high paying keywords for you
Keywords giving more than 30 USD :
Mesothelioma , Structured settlement , Vioxx attorney
Keywords giving more than 20 USD :
Search Engine Marketing, Help Desk, Donate A Car, Cord Blood, Refinance,
Keywords giving more than 10 USD :
Forex, Student Loan Consolidation, Web Hosting, Medical, Data Recovery.
Keywords giving more than 5 USD :
Affiliate Program, California Divorce Lawyer, Fraud, Invention, Personal Loan.
Keywords giving more than 1 USD :
Haircut, Lung Cancer, Donation, Online Degree.
Five ways to increase the traffic on your website
You might be one of the website or blog owners who have serious problems with drawing more traffic toward your sites. There are some simple tricks, which will help you to build your online business and to attract more traffic and respectively clients to you. Here are some tips you can take advantage of, if you want to receive the constant traffic to your website:
1. Pick up good and useful software for your blog. The correct program for content management in your blog can change everything! You can make an order, so the software could be completely adjusted according your needs. In most cases Wordpress, MovableType or Blogger will be enough, but if you begin from the very beginning, at you will have an opportunity for creativity and blog editing.
2. Place the blog on your own domain. Placing on another domain, which has been not connected with a site, is the greatest error many people do. The blog on your domain will involve references, attention, advertising, trust and a search rating.
3. Write headings! The first and the most important thing is to create tags to headings for people who will visit your site or will subscribe for dispatches. An indispensable condition is the short, remembered tags devoted to one theme.
4. Think about the web search engines, when you create headings for the articles as search systems will help you to increase the traffic.
5. Partake in related forums and blogs! It is possible to find a set of already operating blogs, forums and online communities in every sphere or niche. It is an excellent possibility to get acquainted with people, who are already experts in that niche or with people, who might eventually be your clients.
Some more methods to increase the traffic!
If you have problems with the traffic to your website or blog, then pay attention to some rules, which will help you to overcome the existing problem and to draw bigger traffic to your site.
1. Insert keywords in the Alt tag - it is the most important part of the pictures optimisation. Include a keyword or a phrase, which is related to the picture and to your site.
2. Give substantial titles to the pictures of your site. If you have a picture of money, name it "money.jpg" instead of something like "123.jpg".
3. Use the relevant text around the pictures. It is desirable because this text with your keywords will be located directly before or after the picture. If you search in Google, you will see the short description under each picture. Also you will probably notice that the keyword is written with a bold type.
4. Use Adsense for an estimation of content relevance. Insert Adsense code into the page with your pictures and see what advertising from Adsense is shown. It will show you how Google perceives your page. Change the content while advertising from Adsense will correspond to the keywords necessary to you. This method is useful not only to pictures, but for improvement of relevance of the whole site or blog.
5. Optimize the tags Title and Meta. It should be a part of the general strategy of optimisation and will raise visibility for Google as well as Adsense does it.
Be in leading positions - increase your traffic
To be in leading positions in the search engines is a dream of every blogger or the website owner? But is it possible? In order to have a successful site, which will attract more and more visitors, try to use these simple tricks to increase your traffic.
1. Do not limit the post only to the plain text. It is difficult to read a blog, in which there is nothing more except a text. It is so boring to read it. If you want to attract the interest of the readers, include illustrations, interactive elements, multimedia content, sensible tables and schedules.
2. Even if it is difficult to make changes of your content now, think of how it is possible to format the text, having added square brackets, spaces, numbering etc. Thus your blog will become visibly more attractive, and it will be easier to read and percept the text.
3. Write about something that is worthy to be read. In each niche or group there are themes and questions, which often are set, however seldom find concrete answers. Inform your readers, clear the interesting for them questions. Choose your target group and create relevant to them content.
4. Do not be lazy and spend enough time and forces on researches, documentation and placing of materials and useful references to your content. Thus, the attraction of new visitors and subscribers is potentially guaranteed.
5. Pay attention to your statistics. The necessary software will show you which of your posts are most pleasant to your readers and which of them nobody has seen. Use this help operatively to react and improve your own strategy.
1. Pick up good and useful software for your blog. The correct program for content management in your blog can change everything! You can make an order, so the software could be completely adjusted according your needs. In most cases Wordpress, MovableType or Blogger will be enough, but if you begin from the very beginning, at you will have an opportunity for creativity and blog editing.
2. Place the blog on your own domain. Placing on another domain, which has been not connected with a site, is the greatest error many people do. The blog on your domain will involve references, attention, advertising, trust and a search rating.
3. Write headings! The first and the most important thing is to create tags to headings for people who will visit your site or will subscribe for dispatches. An indispensable condition is the short, remembered tags devoted to one theme.
4. Think about the web search engines, when you create headings for the articles as search systems will help you to increase the traffic.
5. Partake in related forums and blogs! It is possible to find a set of already operating blogs, forums and online communities in every sphere or niche. It is an excellent possibility to get acquainted with people, who are already experts in that niche or with people, who might eventually be your clients.
Some more methods to increase the traffic!
If you have problems with the traffic to your website or blog, then pay attention to some rules, which will help you to overcome the existing problem and to draw bigger traffic to your site.
1. Insert keywords in the Alt tag - it is the most important part of the pictures optimisation. Include a keyword or a phrase, which is related to the picture and to your site.
2. Give substantial titles to the pictures of your site. If you have a picture of money, name it "money.jpg" instead of something like "123.jpg".
3. Use the relevant text around the pictures. It is desirable because this text with your keywords will be located directly before or after the picture. If you search in Google, you will see the short description under each picture. Also you will probably notice that the keyword is written with a bold type.
4. Use Adsense for an estimation of content relevance. Insert Adsense code into the page with your pictures and see what advertising from Adsense is shown. It will show you how Google perceives your page. Change the content while advertising from Adsense will correspond to the keywords necessary to you. This method is useful not only to pictures, but for improvement of relevance of the whole site or blog.
5. Optimize the tags Title and Meta. It should be a part of the general strategy of optimisation and will raise visibility for Google as well as Adsense does it.
Be in leading positions - increase your traffic
To be in leading positions in the search engines is a dream of every blogger or the website owner? But is it possible? In order to have a successful site, which will attract more and more visitors, try to use these simple tricks to increase your traffic.
1. Do not limit the post only to the plain text. It is difficult to read a blog, in which there is nothing more except a text. It is so boring to read it. If you want to attract the interest of the readers, include illustrations, interactive elements, multimedia content, sensible tables and schedules.
2. Even if it is difficult to make changes of your content now, think of how it is possible to format the text, having added square brackets, spaces, numbering etc. Thus your blog will become visibly more attractive, and it will be easier to read and percept the text.
3. Write about something that is worthy to be read. In each niche or group there are themes and questions, which often are set, however seldom find concrete answers. Inform your readers, clear the interesting for them questions. Choose your target group and create relevant to them content.
4. Do not be lazy and spend enough time and forces on researches, documentation and placing of materials and useful references to your content. Thus, the attraction of new visitors and subscribers is potentially guaranteed.
5. Pay attention to your statistics. The necessary software will show you which of your posts are most pleasant to your readers and which of them nobody has seen. Use this help operatively to react and improve your own strategy.
HACKING XP PASSWORD
1. Open command prompt (Start->Run->cmd),
2. Enter the followin command, then press ENTER: compmgmt.msc
This should open the computer management console.
3. Go to local users & groups->users. Right click on any user and select "set password".
If you get a "access denied" do the following:
start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)
and use net user command to reset your admin. password
Alternative
What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)
// for e.g. : net user HOME *(press enter)
[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types..
the blinking pointer will b there at the same place.. but it still works
// for e.g. : password changed successfully
2. Enter the followin command, then press ENTER: compmgmt.msc
This should open the computer management console.
3. Go to local users & groups->users. Right click on any user and select "set password".
If you get a "access denied" do the following:
start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)
and use net user command to reset your admin. password
Alternative
What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)
// for e.g. : net user HOME *(press enter)
[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types..
the blinking pointer will b there at the same place.. but it still works
// for e.g. : password changed successfully
Subscribe to:
Posts (Atom)