Website Security Tips

March 29, 2012 Add Comment

Website Security Tips


The number of services that provide security to a website does give a distinct advantage for website owners. This of course must receive attention so that the services provided by web security to provide protection to the fullest. You may often find it difficult to choose the best service that you often find. If a website is well protected, then this is the goal of all owners of the website, where security is guaranteed with all data and files on the website can be spared from a "cracker" is often done by people who are not responsible.

How to choose a web security services that provide many benefits for you? Surely we should really find out what kind of services they provide, whether it is in accordance with the criteria that we have web or not. As some of the features and services provided by www.trendmicro.com. Some of the services it has become a standard that must be considered in providing the required level of security on a website. With some of the features and facilities, then the web will remain secure and less prone to virus attack or some other threats, such as malware, spyware, Trojans, and a few other things.

Of some types of services related to the security of a website, we should get to choose the right service is required, thus providing a true optimal benefit. But to get the right service, you can compare some of these services, and then choose one of the services with the most complete. In addition, one important thing to consider is the costs for using such services, because the full features offered, the price of such services will also be more expensive. For some types of websites, like service with a good enough standard features to be used.

Scheduling meetings with Outlook

March 28, 2012 Add Comment

Scheduling meetings with Outlook


Remember the old days of scheduling meetings? Depending on the number of people involved, it might have taken weeks of email back and forth, with people listing available times that were no longer available by the time you'd heard from everyone else.  Generally a big pain.  Well, Outlook can make this so much easier!

If all meeting attendees use Exchange AND if attendees actually maintain an accurate online calendar (a big "if" sometimes, depending on your group) then it's easy to see what times are available to meet.  No need to grant special access to your calendar.  Schedulers don't need to be able to see what you are doing, only if you are free or busy.  

Here are the steps for creating a meeting using Outlook and viewing free/busy times:

  1. Open your Outlook calendar and choose File -> New -> Meeting Request
  2. Enter names or email address of all attendees in the "to" line.  Be sure the name resolves to the correct email address.  Some folks have @email.uky.edu addresses, others use @uky.edu addresses, and others have set up a Universal Email Address.  All may work for receiving email, but not for scheduling info.  If you have trouble finding scheduling info for one style address, try another.
  3. Set the date/time for an approximate meeting date.
  4. Click the "Scheduling Assistant" button to view free/busy times:





Busy times show up with a purple bar, free times are open, and tentative appointments are hashed.  If you do have access to view a person's calendar details, you will see appointment details (text in the bars). Otherwise, just shaded bars to indicate free/busy times.


  • Use the "Suggested Times" pane to see which time blocks are available to most attendees, or just scan the free/busy times on the grid until you find a good time.  If you use the grid, you can click on the time you want to set it for the meeting. Hover over the red end time line and click/drag to adjust the meeting duration.
  • Once you've selected a time, click the "Appointment" button to get back to the message screen to add text to the meeting request and send the invitation.




Tip:  Sometimes, even if I'm not going to use Outlook to create a meeting request, I might still use this method to just see if someone is available!  Go through steps 1-5 and just look at the free/busy grid but don't actually send the meeting request.

Another Tip: If you have a meeting across campus and need travel time, you might add a "meeting buffer" to your calendar, since that is time that you are unavailable for other appointments.

Yet Another Tip:  Attendees don't use their online calendars, or some attendees are not from UK and don't have access to Exchange?  Try Doodle!  Doodle is a free web-based scheduling assistant.  Specify possible meeting times and generate an email link attendees can use to fill in their availability.  Doodle even has time-zone support, to convert to local times.

Final Tip:  If you're a UK person, please use your Outlook calendar!  You'll find it useful personally, and it's also a real time-saver for people you collaborate with.

what happen with updated Penguin: Google Software

March 21, 2012 Add Comment

what happen with updated Penguin: Google Software


Since April 24th for many website owner and web masters the World has com tumbling down. The cause is the Penguin Update that Google has implemented in order to cut down web spam. Earlier Panda Update was a major update many versions of which have been implemented. 

From time to time Google unleashes these changes in order to improve the quality of sites on the top for the users. Most of these changes have come about through the algorithms but the Penguin Update is not one of them. It is more like a filter which checks for the web spam and qualifies or disqualifies the site, or on some instances lowered ranking may be the outcome.       

Though the update has created lot of flutter especially from those who have been hit badly. But there have been lot of instances where good sites have been hit as well. Well this could be due to that one or the other element on their web page which may have been qualified as spam albeit it may have been in place unintentionally.   

The finger clearly points out at duplicate content and too much formatting. Some on page factors like excessive use of H1 tag, bold tag, and  yes keyword stuffing. Websites that do not pass through a good seo may contain lot of search terms, which most of the web designers add out of impulse or lack of knowledge. Many web designing companies do not have content writers, hence the site contents are usually palmed off from a similar site on the net. Improper contents arise due to bad quality and cheap content writers. 

The Solutions


Hence the cleaning process would involve removing duplicate content, H1, H2 tags if too many and excessive internal links. Changing anchor text of internal links to natural and such that similar anchor text is not repeatedly used. There are many finer points to writing contents but that is for experts. You can write simple meaningful contents yourself which should be original and readable.

Ads: This is another issue that has come up in recent times. Your advertisements should be placed as such that they do not obstruct the contents or distract visitors in any way. The focus should not be selling advertisements or affiliate links but on creating a good website first.   

After you have worked extensively on your website then wait for Penguin Refresh or the spiders to do their work and improve rankings. 

What to do? recover emails does not work !

March 17, 2012 Add Comment
What to do? recover emails does not work !


I am aware of the fact that keeping unnecessary files on Outlook mailbox only increases the size of the PST file which leads to problems like slow performance of Outlook, PST file corruption, etc. Therefore, I delete all the unwanted emails permanently from the mailbox of my MS Outlook 2007 on a regular basis. Another day while deleting emails, I accidentally deleted some most important emails. I realized the problem after giving command for hard (permanent) deletion of the selected emails. Though I performed some measures to over come this situation but none of them worked. However, I didn’t lose hope and used third-party deleted email recovery software and recovered all my deleted emails.

Let me explain the entire episode by which I learnt about software to recover deleted emails. That time attending an important client call was more important than concerning the deleted email issue thus I kept this matter of email loss from Outlook mailbox aside for sometime. The client call stretched to three long hours and soon after its completion, I forgot about email loss and rushed to home as it was already too late. Coming next day to office, while I was opening my system recalled that I deleted some important emails yesterday. I searched over the Internet for some inbuilt utility of Microsoft by which we can recover deleted emails and I was right, there was a way to recover recently deleted emails.

Though this procedure works only for recently deleted emails but still I tried below mentioned Microsoft prescribed steps to recover deleted emails:
Start MS Outlook 2007
Select the folder from which you have deleted the emails as I selected the Inbox folder from the left pane of my Outlook mailbox.
Go to Tools → Recover Deleted Items. A window that displays the deleted emails from the selected folder appears. I didn’t get this window. So, I terminated the process. However, if you are getting this window then select the emails which you want to recover and click ‘Recover Selected Items’ option.
All the selected emails will be selected to its original location as soon as you select ‘Recover Deleted Items’ option.

Since, I didn’t delete the mails recently and also got so many emails after the deletion thus aforementioned steps didn’t work for me. In such situation, without losing hope I searched over the Internet for some resolution by which I can recover deleted emails and learnt that there are third-party tools which can recover emails which are deleted long ago.

One of the awards winning and user recommended tools which I found in this category was Stellar Phoenix Deleted Email Recovery. This software efficiently recovers deleted emails, attachments, notes, and contacts and has very interactive user interface. Therefore, I used this software and recovered all the deleted emails.

DO you have heat problem with iPad 2 ?

March 16, 2012 Add Comment

DO you have heat problem with iPad 2 ?


Heat has come up as an issue with previous generations of iPads. So, that's not news. But the new iPad may have, in select cases, its own unique heat problems.

User forum postings (here and here) and a report seem to point to heat as an issue for select users.
The problem area--based on forum links above--seems to be a hot-spot in the corner of the unit.
In the worst case, the iPad shuts down and a message pops up, saying "the iPad needs to cool down," according to a Next Web report (link above).

That seems to be extremely rare, however. And one user who claimed to have the problem was using it in direct sunlight. Let's be clear: that can cause problems for any electronic device.
The third-generation iPad integrates both a larger battery and a faster (and reportedly larger) chip. Those are significant differences from the iPad 2. So, it inevitably gets warm. And like all Apple iOS mobile products it does not have a fan.


Anecdotal reports on launch day have pointed out that the new iPad can get a little toasty.
But this issue has come up with both the iPad 1 (here) and iPad 2 (here). There were reports of the "cool down" message on the iPad 2 also.
Moreover, note that user comments sometimes confuse overheating with the unit just getting warm.
At a suburban Los Angeles Apple store, a staffer confirmed that the new iPad gets warmer than the iPad 2. He attributed that to the battery.
The operating temperature range is listed on the iPad's spec page as 32 degrees to 95 degrees F (0 degrees to 35 degrees C).
Apple representatives did not immediately respond to a request from comment.
Updated at 7:15 p.m. PDT: clarifying "all iPads" to mean previous generations of iPads. In other words, the topic of heat has come up with each previous generation of iPad. And adds comments from staffer at Apple store. Also clarifies that the warm area is "a corner" of the unit instead of a specific corner, as that is not clear at this time.

Google play store v/s Apple Store

March 10, 2012 Add Comment

Google play store v/s Apple Store


Google is setting Apple on notice as it is preparing to dominate the mobile broadband market. With the rebranding of its Google Music as Google Play, Google is not just copying Apple’s store, but rather they want to drive it out of the online marketplace.

The Android market has always felt as it was the ignored little sister to Apple and its Apple store. With the Android platform taking over on smartphones and tablets, Google now believes it is the right time to jump in and take over the mobile broadband market.

Now, that Android has established itself as a legitimate platform for mobile devices from phones to tablets, it should now continue to evolve by proving itself as a viable service provider as well. With Apple’s death-like grip on its OS, Android is an open source platform that has and will continue to receive Google’s full support in the development area.

With Google Play store, Google is now combining its music business along with its ebook store into the ever growing Android marketplace. This is a clear and direct attack on Apple, its flagship device IPad and the Apple Store. Google’s grand scheme in rebranding the Android market is to have the Google Play store to be the one stop online shop in which users can use any Android powered device from smartphone to tablets to be able to download content that is tailored made for them.

Another difference between Google Play store and ITunes is that the Google store is browser based. What this means is that in order to access and use the Apple store and ITunes, you have to install an application unto your device. Usually that is fine however, software applications have been known to cause more than one computer problem. As a result, Apple’s users are tied to Apple’s software installing correctly and not causing any issues with either their computer or smartphone. That is not the case with the Google Play store. Since it is browser based, there is no installation needed. All that you need is an internet connection and you will be browsing the Google Play store at your leisure.

To help promote their rebranding of the Android market Google is offering “The Seven days to play sale.” During this promotion, users are able to try out the Google Play store and all of its features and if they are not satisfied they can cancel their accounts free of charge. Google is confident enough that its entry into the mobile broadband market will be a success that more users will love its new service than not.

Google with its well deserved history and reputation of pushing the envelope is nothing new. The Google Play store is another example of this as they are ready to take on the industry leader in downloadable content, Apple. Will they succeed? Only time will tell as Google is putting all of its support behind this venture. Needless to say, Google is putting Apple and the rest of the world on notice that they are in this fight for the long haul.

Operating System Story

March 04, 2012 Add Comment

Operating System Story.




Peripherals and system parts are a collection of electronics that work together in order to perform a specific task. The program that every computer uses to control and manage all these parts is called the operating system (OS).

For example, a user that wants to write a document and print it out on a network printer needs an application like Microsoft Word to accomplish this job. Microsoft Word works with the OS in order to accomplish all the word processing tasks. The operating system controls all the input and output functions. All the personal computers, the servers and the handheld devices require an OS in order to function.

The operating system works like an interpreter between software applications and the hardware. An individual interacts with the computer hardware through an application, like Microsoft Excel, Adobe Photoshop, etc. Software applications are made for a particular purpose. On the other hand the OS is responsible for the communication between the software application and the computer's hardware.

When a PC is powered on it loads the operating system from the hard disk into RAM. The part of the operating system that interacts directly with the hardware is called kernel. The part of the operating system that it is visible to the user is called shell. The user can use the shell from the command line interface (CLI) or from the graphical user interface (GUI).

The user that uses the CLI interacts directly with the OS in a text-based environment by typing commands at a command prompt. The computer executes the command and provides textual output. The user can also use the GUI and control the computer from an environment that uses graphical images, multimedia, as well as text. This is more user-friendly and requires less knowledge than CLI. Therefore, most users work with GUI environments. Microsoft Windows and Linux operating systems offer both GUI and CLI.

All the modern operating systems allow the user to multitask. The OS keeps track of which resources are used by which software program.

In order to work with devices that are not directly attached to the PC, a special software application must be installed that allows a device to send and receive data from the net. This is called redirector and usually it is an integral part of the OS but sometimes you need to install it separately as a network client. After you install it, the OS becomes a network OS (NOS).