Tuesday, 31 January 2012

All about Spiders, Crawlers, and Robots


In my first post of Seo sevices i am going to reveal some important terms related to SEO like Spiders, Crawlers and Robots. In my this creation i will provide a huge and deep detail of above terms. So lets start with Spiders


What are Website Spiders? 
Website crawling by website spiders is comparable to what a spider is real life does.  Google, and search engines like it, index your website by using these website crawlers which periodically come to your site.
 How do they relate to websites?      
SEO Spider Search engines use these website spiders to find your website and index it for future searches by search engine users. There a couple different ways a search engine may find your website and its pages to index.  One key to allow your site to be found is by having fresh new content and/or content rich pages.  Search engines don’t want to index old and irrelevant information.  A second key to get your website on Google is providing related article links, and good ones, on your page.  Providing good links to sites with a good reputation is very important, because those sites will provide you with positive linking to your own site.
Google, for instance, begins the website indexing process by using previous lists of URLs which had been generated from previous crawls.  Starting from these previously known sites, the crawlers continue on links from these sites.  Links which are shorter in length are the ones most likely to be followed, as crawlers deem those to be the most important. As you can see, links are the basis in web crawling and therefore a key for directing web spiders.
General Process of Web Crawling:
 Search engine spiders come to your site:
  • via links from other sites
  • your site’s previous relevance in the web directory of the search engine
  • due to the freshness of your site
Once on your website, the website spiders will read the content of each page.  The website crawlers site meta tags as well, and then follow the links that the internet site connects with if allowed.  The website spiders then return back to the depository, where the information is indexed.  Those links which are on your page will be indexed as well, unless meta tags prevent them.  This process is discussed in the Follow/No Follow blog by Vivek Creations .  Website spiders return periodically to check for any changes in information.  Regulatory of this depends on the moderators of the search engine, and it is something you can’t control.  Crawl frequency and depth are things which you can control.
Submitting a sitemap to the search engine is a major influence on the engines ability to better crawl your site.  The sitemap allows the engine to understand your website once the web spiders come to your website, and helps provide changes on the site to be indexed quicker.
What is a Robot.txt (robot text files)?
Robot.txt files are a website tool which can tell the spiders which pages to index.  By placing a robot.txt on the website server with either allow or disallow tag, it provides a set of instructions to the web crawlers which visit the page.  Essentially, robots.txt files are used to map out your site to the crawlers for what they can and cannot index.
The benefits of using a robot text file:                                                                                                                                    SEO Robots
  • Avoids wastage of server resources
  • Prevent website crawler access to pages which you don’t want to be indexed such as login pages
  • Prevent search engines from indexing pages which are still being built
One item to consider is if you want your entire website to be readily available to website spiders placing the robot.txt in your server isn’t necessary; not even one which allows everything.  Leaving the file out completely is the best decision to go with.
By knowing your website and providing search engines with quality pages will allow your site to get to the top of Google, and by properly using robot.txt files will help to improve website navigation.

In my next post of seo services i will explain about Meta Tags in well explained way.
Thanks for reading my post.
If you want to ask or having any doubt regarding my post than you can mention in your comments.

Monday, 30 January 2012

How to convert a Facebook profile to a Page

Facebook new page

I am going to share a awesome trick to converting a profile into a page.
So whats new in it ?
Ok let me tell you a very interesting thing in it, If you have a facebook profile with friends 2,000 or 3,000 and you convert it into a page. Then

The number of FANS in page = Number of friends in profile  (This is the trick)

We know its a great idea to make a huge fans facebook page. Do you like this creation ?
Hmm.. Now how to convert a profile in a page. Lets read here and keep yourself updated on Vivek Creation


  1. Click Here
  2. When you convert your profile (timeline) to a Facebook Page, Fb will transfer your profile pictures and add all of your friends and subscribers as people who like your page. 
No other content Facebook will be carried over to your new page, so be sure to save any important content before beginning your migration.


To avoid losing important content, we recommend taking these steps before you convert your profile (timeline):

  1.  Download your profile (timeline) information. You can download a file that contains all of your sent and received messages and all of the photos and videos you’ve uploaded to Facebook.
    
  2. Appoint a new group admin or a new Facebook Page admin to any groups or pages that you manage. The account you’re converting will lose these admin rights during the conversion process. 

Enjoy :)

For more Facebook Tricks Click Here 

Thursday, 26 January 2012

How to Prevent a website from SQL Injection Attack | Full Tutorial


A SQL injection is a common programming error the consequences of which can be really devastating. Many successful hacking attacks start when a hacker discovers a vulnerability that gives an opportunity to inject SQL code.

When an SQL injection occurs, the structure of an SQL query is compromised and as a result you are left at the mercy of the potential hackers. If there is a vulnerability found, hackers can exploit it to gain access not only to your site and database but in extreme cases also to your corporate network. When hackers can inject their code in your code, they can do what they want.

Why do SQL injections happen so often?


The shortest answer is that SQL injections are so popular because of poor programming. Hackers know about the potential of a successful SQL injection attack and they search for vulnerabilities. Unfortunately, very often they don’t have to search hard – vulnerabilities pop right in their face. On the other hand, the risk for a hacker from executing an SQL injection is minor, while the potential rewards are lucrative. What else could a criminal ask for?
Therefore, don’t rely that hackers won’t bother with your site and don’t leave the door widely open. Nobody says that each vulnerability of this type will turn into an attack but it’s not wise to take any chances. The good news is that fortunately, SQL injections are also relatively easy to prevent.

Steps to prevent a SQL injection attack


Basically, there are two fire-proof ways to make an SQL injection impossible:


  • Don’t use dynamic database queries.
  • Don’t accept user input in queries.

However, obviously these two steps can’t be done because if you follow them, then the sites you can create will be very static and in today’s Web this is not a solution. What you can do, is minimize the risks when using dynamic queries and user input. Here are some basic principles that apply to any programming language:

1. Patch your SQL server regularly


Before we get into the coding part of the advice how to prevent an SQL injection, we need to start with the fundamental issues. SQL injections might be a frequent programming error but they aren’t the only way for a hacker to break into. If your underlying software – i.e. the database and the operating system have vulnerabilities, then your efforts to secure your code become obsolete. This is why you should always patch your system, especially your SQL server.

2. Limit the use of dynamic queries

As I already mentioned, dynamic queries are the door to SQL injections. Of course, it might not be realistic to expect that all dynamic queries can be trashed right away but some of the ways out are stored procedures, parameterized queries, and above all – prepared statements. The exact approaches vary from one programming language to the other but basically any programming language offers good substitutes of dynamic queries.

For instance, the PreparedStatement() with bind variables in Java, or the SqlCommand() and OleDbCommand() with bind variables in PHP, or strongly typed parameterized queries with bindParam() in PHP are all possibilities to explore.

3. Escape user input


The second biggest evil for SQL injections is user input. While you can’t always avoid user input completely, the next best thing is to escape it. Escaping user input doesn’t do as good job as limiting dynamic queries but still it can stop many SQL injection attacks. For instance, if you are using PHP, for GET and POST, use htmlspecialchars() to escape XSS characters and addslashes(), in case you using database. Alternatively, you can escape user input from inside your database but since the exact code varies from one database to the next, you should check with the docs of your database for the exact syntax to use.

4. Store database credentials in a separate file

In order to minimize the damage in case of an SQL injection attack, always store database credentials in a separate file. This way even if a hacker manages to break in, he or she won’t benefit much.

5. Use the principle of least privilege

The principle of least privilege is a security cornerstone and it applies to SQL injections as well. For instance, when you grant a user access only to the tables he or she needs rather to the whole database; this drastically reduces the damage potential.

6. Turn magic quotes off

Turning the magic_quotes_gpc variable off can also stop some SQL injection attacks. Unfortunately, this isn’t always a reliable measure because sometimes magic quotes might be off and you are unaware of this but still it is better than nothing. In any case, you need to have code to substitute quotes with slashes. Here is the simplest way to do it:

if (!get_magic_quotes_gpc()) {
$username = addslashes($username);
$password = addslashes($password);
}

7. Disable shells


Many databases offer shell access which essentially is what an attacker needs. This is why you need to close this door. Consult your DB’s documentation about how to disable shell access for your particular database.

8. Disable any other DB functionality you don’t need

In addition to the shells there are many other functions in a database you don’t need. While not all of them are a security risk, the general rule here is that less is more. Just remove or at least disable any functionality you can do without.

9. Test your code

Finally, the last step to ensure your code is SQL injections-proofed is to test it. There are automated tools you can use to do this and one of the most universal is the SQL Inject Me Firefox extension. This tool has many options and many tests the best is if you have the time to run all of them.

All these steps to prevent an SQL injection are relatively easy to implement but failing to do so could make a huge difference. If you stick to these rules, you will drastically reduce the risk of your site being compromised via a SQL injection. Still, you can never be 100 per cent sure that you are completely protected against such an attack (or any other type of attack, to be more precise) and this is why you need to keep an eye on your logs so if a breach occurs, you will know it right away and react appropriately to minimize the damage.

For more about website security you can visit my all posts on WebSite Security
Thanks for reading this creation.
Be updated always here :)

Wednesday, 25 January 2012

How to Change Windows7 Login Screen.


Hello Friends, Thanks for watching my first post on How to make folders as CON,AUX,NUL etc. in windows .Keep appreciating like this,it makes me more enthusiastic to share more tricks with you guys.
Today i am going to share a trick on “How to Change Windows7  login screen” . Well commonly we have login screen as below —

   logonscreen_previous






Well if want to customize it,you just have to follow simple steps below–
Go to Start >Run >Type Regedit . i.e open registry editor.
Now Go toHKEY_LOCAL_MACHINESOFTWAREMICROSOFTWINDOWSCURRENTVERSIONAUTHENTICATIONLogOnUIBackground
Make a DWORD Value with the name OEMBackground and set its value to 1 .

Then,Go to “SystemDrive:WindowsSystem32oobe” .
Create a folder named “info”
In ‘info’ create a folder named as ‘backgrounds”
In ‘backgrounds’ put your desired login-screen file (better be in ‘.jpeg’ format ) with the name‘backgroundDefault’.
One thing you need to keep in mind that size of this file should be less than ’256 kb’ otherwise windows won’t accept it as log-in screen.
Now whole path should be as as C: is System Drive –
“C:WindowsSystem32oobeinfobackgroundsbackgroundDefault.jpeg”
loginscreen_filelocation






Now the login screen changed to below one–
logonscreen_new







If you like this creation then you can share it with your friends. And for support you can ask in comments.

How to Track your lost mobile

Did you ever lost your mobile and found no help from police or mobile operator in tracking your mobile? Well now you don’t need to be worried about it. Now a days each one of us carry Mobile devices and always fear that it may be stolen. Each mobile carries a unique IMEI i.e International Mobile Identity No which can be used to track your mobile anywhere in the world.

This is how it works!!!!!!

1. Dial *#06# from your mobile.
2. Your mobile shows a unique 15 digit .
3. Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft.
4. Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net
5. No need to go to police.
6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS and internet.
7. You will find where your hand set is being operated even in case your no is being changed.

PASS ON THIS VERY IMP MESSAGE TO ALL YOUR FRIENDS AND RELATIVES.

If u lost your mobile, send an e-mail to cop@vsnl.net with the following info.

Your name:
Address:
Phone model:
Make:
Last used No.:
E-mail for communication:
Missed date:
IMEI No.:


Share this creation with your all friends, If in future they lost their mobile or you lost your mobile phone then it will be surely helpful.
Thanks for reading, Keep yourself updated here :)

How to lock a Folder without software

We all know about the many folder lock software which are available on huge internet market. But they all are not much successful because of memory management but also if any of your friend just uninstall the soft then your all files will be open or will be currept.
Todays i am going to share a creation which can hide a folder without software.
Now whats new in this.
Ok let read out the features :P

Features

  • Free of Cost
  • Only a simple script it is
  • fast access
  • The special thing is, if you lock a folder with this and make the files hide. Then even DOS will be failed to seach your files ;)
Yeah i know the last feature is much more intersting.
Now how to use this creation.

Steps:

1. Open notepad and paste the following code in it.
2. Change the password in code.

On following ( Type your password here )
Enter your password here.

3. Save the notepad as: Locker.bat
4. At first time start it will create folder with Locker automatically for u.
5. After creation of Locker folder again click on the Locker.bat
6. It will ask.press Y then Locker folder will be disappeared.
7. Again to get it click on locker.bat. and give ur password u will get the folder again.


Code:

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
attrib +h +s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
ren "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
11/19/07
*Vicky verma
See the 13th line from below.
It is as follow

if NOT %pass%==type your password here goto FAIL

Enjoy Friends keep yourself updated for more this type of creations :)


Tuesday, 24 January 2012

Meta Tags Expanded Full Tutorial | SEO

seo services

In my previous (All about Spiders, Crawlers, and Robots) post i have already explained about Spiders, Crawlers and Robots and its uses in seo serivces. Now today i am going to share another important part of SEO. As title of post shows that this post is well labeled about Meta tags. We are going on same path..
So lets start reading about another important part of SEO.

First of all, don't let me mislead you, meta tags are not the "magic bullet" that will skyrocket your site to the top of all search page listings. They are a tool that will help improve your standings in search engines that use them. Use them with other marketing strategies to garner more page views.

Another thing to remember: most search engines look at the body of text on your pages, as well as the page title. They take this information as higher relevance than any meta tags. So, be sure to always have a relevant <TITLE> on your pages, and relevant content in the body of the page. This will improve your rankings more than just meta tags alone.


What is a Meta Tag?


A meta tag is a hidden tag that lives in the <HEAD> of an HTML document. It is used to supply additional information about the HTML document. The meta tag has three possible attributes content,http-equiv, andname. Meta tags always provide information in a name/value pair. The name and http-equivattributes provide the name information and thecontentprovides the value information. Meta tags do not have a closing tag.


content
This attribute will always be found in a well formed meta tag. It provides the value information in the name/value pair. It can be any valid string, which you should enclose in quotes.

name
This is the name portion in the name value pair. You can use any name that you would like or that might be useful to you. Some common names are:


  • keywords - words that identify what the page is about, usually used in search engines

<meta name="keywords" content="HTML, HTML help, meta tags, promotion, web sites">
  • description - a short description of the page
<meta name="description" content="Boost your marketing strategy with meta tags">
  • author - the author's name and possibly email address

<meta name="author" content="Jennifer Kyrnin">

  • robots - to allow or disallow indexing by robots

<meta name="robots" content="noindex">

  • copyright - the copyright date of the page

<meta name="copyright" content="August 1999">

http-equiv
This attribute is also a name for the name/value pair, but it is used by the server to include that name/value pair in the MIME document header passed to the Web browser before sending the actual HTML document. Some common http-equiv types are:



  • charset - defines the character set used in the page
<meta http-equiv="charset" content="iso-8859-1">


  • expires - when the document will be out of date
<meta http-equiv="expires" content="31 Dec 99">


  • refresh - sets the number of seconds to reload the page or reload to a new page
Reload the page every 10 seconds:
<meta http-equiv="refresh" content="10">
Reload to a new page after 10 seconds:
<meta http-equiv="refresh" content="10;url=http://webdesign.about.com/">

How to Use a Meta Tag

Meta tags are included in the <HEAD> of an HTML document. If you are using meta tags to improve your standing in search engines, then you should focus on your description and keywords.

The description tag
Use the description tag to describe what your page is about. Engines that use it will supply the content of this tag when displaying a list of links. For example, if you do a search on About.com, you will see the description listed on the search results page.

The keywords tag
Keywords help search engines to categorize your site, and to allow people to find your pages more quickly. However, most search engines have limits as to how many meta keywords are viewed. It is a good idea to review your keywords and make sure that they are as concise and specific as possible.

Wait for the next part linked with my topic seo services. In my next post i will provide a full tutorial on Sitemap. How to build and how to submit it..