শনিবার, ৬ এপ্রিল, ২০১৩

Is Your PC Affected by Spyware?

The main problem that most people notice with either kind of program is that they cause performance issues with their computers. For example, Internet Explorer might not work properly any more, your computer might hang more frequently, or your computer might slow down significantly. Removing spyware successfully is difficult enough to make preventing it in the first place a priority.
Unauthorized adware and spyware usually install on your computer covertly by using one of two methods:

Tricking you into clicking a link that installs it. Links to spyware can be deceptive. For example, a Web site that's trying to push spyware onto your computer might open a window that looks like a Windows dialog box, and then trick you by installing when you click a Cancel button to close the dialog box. Sometimes, spyware pushers will put a fake title bar in an empty window, and then install spyware when you try closing the window.
Installing freeware that includes it. For example, you might install a free file-sharing program that surreptitiously installs spyware on your computer. File-sharing programs can be a major conveyor of adware.
Once installed, spyware can transmit your personal information and download advertisements 24 hours a day. It can also hijack your browser settings, such as your home page or search page.

শুক্রবার, ৫ এপ্রিল, ২০১৩

Learn about SEO

content providers began optimizing sites for search engines in the mid-1990s, as the first search engines were cataloging the early web Initially, all webmasters needed to do was to submit the address of a page, or URL, to the various engines which would send a "Spider" to "crawl" that page, extract links to other pages from it, and return information found on the page to be index The process involves a search engine spider downloading a page and storing it on the search engine's own server, where a second program, known as an indexers, extracts various information about the page, such as the words it contains and where these are located, as well as any weight for specific words, and all links the page contains, which are then placed into a scheduler for crawling at a later date.
Site owners started to recognize the value of having their sites highly ranked and visible in search engine results, creating an opportunity for both white hat and black hat SEO practitioners. According to industry analyst Danny sullivan , the phrase "search engine optimization" probably came into use in 1997. The first documented use of the term Search Engine Optimization was John Audette and his company Multimedia Marketing Group as documented by a web page from the MMG site from August, 1997.
Early versions of search algorithms relied on webmaster-provided information such as the keyword meta tag, or index files in engines like AlIWEB. Meta tags provide a guide to each page's content. Using meta data to index pages was found to be less than reliable, however, because the webmaster's choice of keywords in the meta tag could potentially be an inaccurate representation of the site's actual content. Inaccurate, incomplete, and inconsistent data in meta tags could and did cause pages to rank for irrelevant searches Web content providers also manipulated a number of attributes within the HTML source of a page in an attempt to rank well in search engines.
By relying so much on factors such as Keyword which were exclusively within a webmaster's control, early search engines suffered from abuse and ranking manipulation. To provide better results to their users, search engines had to adapt to ensure their result pages showed the most relevant search results, rather than unrelated pages stuffed with numerous keywords by unscrupulous webmasters. Since the success and popularity of a search engine is determined by its ability to produce the most relevant results to any given search, allowing those results to be false would turn users to find other search sources. Search engines responded by developing more complex ranking algorithms, taking into account additional factors that were more difficult for webmasters to manipulate. Graduate students at Stanford University , developed "Backrub," a search engine that relied on a mathematical algorithm to rate the prominence of web pages. The number calculated by the algorithm, PR is a function of the quantity and strength of inbound link PageRank estimates the likelihood that a given page will be reached by a web user who randomly surfs the web, and follows links from one page to another. In effect, this means that some links are stronger than others, as a higher PageRank page is more likely to be reached by the random surfer.
Page and Brin founded google in 1998. Google attracted a loyal following among the growing number of Internet users, who liked its simple design.[ Off-page factors (such as PageRank and hyperlink analysis) were considered as well as on-page factors (such as keyword frequency, , headings, links and site structure) to enable Google to avoid the kind of manipulation seen in search engines that only considered on-page factors for their rankings. Although PageRank was more difficult to game, webmasters had already developed link building tools and schemes to influence the  search engine, and these methods proved similarly applicable to gaming PageRank. Many sites focused on exchanging, buying, and selling links, often on a massive scale. Some of these schemes, or involved the creation of thousands of sites for the sole purpose of 
By 2004, search engines had incorporated a wide range of undisclosed factors in their ranking algorithms to reduce the impact of link manipulation. In June 2007, The New York Times' Saul

About cybernauts history

Hammond, a middle-aged man, is attacked at home by an unseen intruder who forces his way though the door with the force of a battering ram and appears to be immune to bullets. Steed and Mrs Peel investigate. The intruder strikes again, this time a businessman named Lambert in his office, smashing his way in in the same way. On the scene, Mrs Peel notices the way Lambert's neck has been broken without bruising to the face by the angle of the head and surmises that he was killed by a type of advanced karate blow known as inku, of which there are very few expert exponents in Europe. Lambert's company, like Hammond's, is on a list of firms competing for the European rights to Japanese businessman Mr Tusamo's new circuit elements that will replace the transistor.
Mrs Peel visits a karate dojo seeking an inku specialist and is lectured by the bald sensei. After Mrs Peel proves her skill by defeating the female karate student Oyuka ("the immovable one"), the sensei allows her to join the dojo.
Steed, in place of Lambert, visits Mr Tusamo, a Japanese electronics manufacturer involved in the production of the new circuit elements to replace the transistor. Mrs Peel visits Jephcott Products, a toy factory that specializes in manufacturing electronic toys. At the karate dojo, Oyama ("the tall mountain"), a 5th dan at Judo and a 4th dan at karate, demonstrates his skill to a packed room, and fits the description of the tall killer, by his height and explosive strike. Mrs Peel recognizes the man as Jephcott, the head of the toy company.
Steed visits United Automation and meets the wheelchair-bound ex-ministry scientist Dr. Clement Armstrong, owner of the factory. After Steed explains his interest in computers, Armstrong's sidekick Benson contacts the scientist via two-way videophone and mentions that someone replaced Lambert at Tusamo's office. Armstrong shows his visitor to Benson, who recognizes Steed as the false Lambert. Armstrong gives Steed a parting gift: a gadget pen containing solid ink which liquefies only in the heat of the hand, thus reducing the danger of leaks.
Steed and Mrs Peel visit the toy factory and discover that Jephcott has been killed by something with the force of a ten-ton truck, leaving a hole in the wall in the shape of a tall man.
Steed revisits United Automation, this time covertly, and discovers that Armstrong has been using a robot Cybernaut named Roger to kill off his rivals for the Tusamo concession. The Cybernaut is programmed via computer to home in on a radio transmitter concealed in the gadget pen given to Steed – the same method used to kill Hammond, Lambert and Jephcott. But Steed's pen is in the possession of Mrs Peel, so the Cybernaut will attack her rather than Steed. Dr. Armstrong discovers Steed is an intruder in the building when the thermostat in the factory is altered. Steed attempts to phone Mrs Peel to warn her but, before the Cybernaut arrives, she leaves her flat to look for him at United Automation as Steed has not returned at the pre-arranged time. Steed is then attacked by another Cybernaut in the factory and presented to Armstrong.
Mrs Peel arrives at Armstrong's factory, with the Cybernaut still following the pen she carries. Steed escapes and enters the warehouse room in which the Cybernaut has cornered Mrs Peel, and tells Mrs Peel to throw him the pen. Another Cybernaut (the first with a "brain of its own") arrives with Armstrong. Steed plants the pen on the second Cybernaut and they attack each other and accidentally kill Armstrong as he attempts to stop his automata. Roger, the first Cybernaut, then destroys the other by smashing its "brain" out of its head and destroys the pen. Having completed its mission it becomes inert, and Mrs Peel can push it over with a finger.