Let me say something in Indonesian.
Aku selama ini belajar tentang SEO untuk membuat web-ku menjadi nomor satu di urutan mesin pencari, baik itu Google, Yahoo, MSN atau mesin pencari lainnya.
Setelah belajar beberapa lama, kini aku ingin membuktikan pelajaran itu dalam 'pertarungan' yang sesungguhnya dengan mengikuti kontes SEO bertajuk Kampanye Damai Pemilu Indonesia 2009.
Bukan karena khawatir tidak menang atau karena alasan lain yang membuatku mengikutsertakan tiga web yang terdiri dari domain utamaku di www.ovan.info, sub domainnya di kampanyedamaipemiluindonesia2009.ovan.info, dan sub folder di ovan.info/kampanye-damai-pemilu-indonesia-2009.html
Selain untuk berpartisipasi dalam ajang kontes SEO ini, aku juga ingin turut dalam menyukseskan program Kampanye Damai Pemilu di Indonesia, seperti yang kutuliskan dalam web-ku aku menulis tentang pelaksanaan kampanye damai di web utamaku.
Sedangkan di subdomainku banyak bercerita tentang pernak-pernik seputar pemilu yang aku saksikan dalam keseharian.
Web yang ketiga, lebih banyak aku isi tentang kegiatanku saat mengikuti persiapan Pemilu di Gedung Komisi Pemilihan Umum.
Thursday, March 19, 2009
Tuesday, March 10, 2009
New Link to Computs.blogspot.com
1. Dating Tips for Adults
Are you an adult and are experiencing difficulties in dating? Do you have problems with speaking to potential partners? Dating can be easy! Find many dating advices here.
2. Scuba diving equipment, gear, and accessories for all diver
Best Scuba diving system with cheapest price
3. HelmetsUp - Motorcycle DOT helmet, goggle, glove, and accessories
Offering a full line of DOT helmets, Goggle, Glove, accessories, and apparel for the motorcycle.
4.
Are you an adult and are experiencing difficulties in dating? Do you have problems with speaking to potential partners? Dating can be easy! Find many dating advices here.
2. Scuba diving equipment, gear, and accessories for all diver
Best Scuba diving system with cheapest price
3. HelmetsUp - Motorcycle DOT helmet, goggle, glove, and accessories
Offering a full line of DOT helmets, Goggle, Glove, accessories, and apparel for the motorcycle.
4.
Are your Computer is Save?
I was most annoyed if my property computer experienced the disturbance. Because that could hinder my work. The disturbance to the computer only was not caused by damage or the technical fault to hardware and software. The virus and Spyware were the disturbance to the computer that was caused by the external side with the heterogenous aim like to steal our data, damaging hardware we, removed file, eliminated the certain function, took over the control over our computer et cetera.
The virus and spyware the computer could attack our computer was good that often online and that had not been online to the internet even. The computer that was connected with flashdisk then could tertular the virus from software that diinstall if not carefully.
How him so that our computer could be safe from the viruses? That was first, carried out the prevention with:
1. Install Security Software that was newest
Try to installing 3 kinds software the main security and was installed with setting that was automatic pacified our computer without must be stirred up before. They were anti the virus to ward off the virus, anti spyware to ward off spyware, and firewall to ward off as well as block the attack hacker as well as the connection from outside. To that the free and high-quality version good we could use AVG Antivirus to anti the virus, Ad-Aware to anti spyware and the Alarm zone for the program firewall. Ascertain all software this terupdate with definition and patch newest that reduced the virus opportunity and spyware the variant just carried out the infection in the our computer.
2. Be careful to Attachment Email
Don't had been opened file attachment in the email that you received although from the person who was known by you if attachment this contained file the program with extension or the suffix .exe, .pif, .bat, et cetera. Read thoroughly the email that was sent, the style of the email be the same as that normally is sent. Occasionally the email that we received came from the Local person, but used English, Russia, China, et cetera in his email.
3. Be careful to intalling new software
Be careful against software that you install, good that was bought by you from cd hardened in shops cd, from download in the internet, from the friend, et cetera. The virus and spyware could hid in the program that you rose without being realised by you. Make accustomed to back up all file important you periodically in flash drive, cd or dvd so that when your fatal matter happening will not lose your data.
4. Supervise the other person who used your computer
If your computer was used by the other person, confirmed he did not do matters that could damage your computer. You could make the account special for the guest with certain limitations that you could setting personally. Someone that possibly not you guessed could menginstall the program, mencolokkan usb or put the diskette that contained the virus or spyware. Moreover could put on with sengagja software the spy for them all of your activities and password that normally is used by you.
5. Always was on the alert
If at one time you felt that there is something that did not freeze to your computer, immediately broke and cavbut continuation to the internet connection or the network network other. Afterwards undertook anti the virus, anti spyware and the cheque firewall whether going well and should. If you got the question to menginstall software from the unclear site, ignored. Follow the development update patch or tambalan the security hole in every time software that was installed and got access the internet in the program firewall you.
The virus and spyware the computer could attack our computer was good that often online and that had not been online to the internet even. The computer that was connected with flashdisk then could tertular the virus from software that diinstall if not carefully.
How him so that our computer could be safe from the viruses? That was first, carried out the prevention with:
1. Install Security Software that was newest
Try to installing 3 kinds software the main security and was installed with setting that was automatic pacified our computer without must be stirred up before. They were anti the virus to ward off the virus, anti spyware to ward off spyware, and firewall to ward off as well as block the attack hacker as well as the connection from outside. To that the free and high-quality version good we could use AVG Antivirus to anti the virus, Ad-Aware to anti spyware and the Alarm zone for the program firewall. Ascertain all software this terupdate with definition and patch newest that reduced the virus opportunity and spyware the variant just carried out the infection in the our computer.
2. Be careful to Attachment Email
Don't had been opened file attachment in the email that you received although from the person who was known by you if attachment this contained file the program with extension or the suffix .exe, .pif, .bat, et cetera. Read thoroughly the email that was sent, the style of the email be the same as that normally is sent. Occasionally the email that we received came from the Local person, but used English, Russia, China, et cetera in his email.
3. Be careful to intalling new software
Be careful against software that you install, good that was bought by you from cd hardened in shops cd, from download in the internet, from the friend, et cetera. The virus and spyware could hid in the program that you rose without being realised by you. Make accustomed to back up all file important you periodically in flash drive, cd or dvd so that when your fatal matter happening will not lose your data.
4. Supervise the other person who used your computer
If your computer was used by the other person, confirmed he did not do matters that could damage your computer. You could make the account special for the guest with certain limitations that you could setting personally. Someone that possibly not you guessed could menginstall the program, mencolokkan usb or put the diskette that contained the virus or spyware. Moreover could put on with sengagja software the spy for them all of your activities and password that normally is used by you.
5. Always was on the alert
If at one time you felt that there is something that did not freeze to your computer, immediately broke and cavbut continuation to the internet connection or the network network other. Afterwards undertook anti the virus, anti spyware and the cheque firewall whether going well and should. If you got the question to menginstall software from the unclear site, ignored. Follow the development update patch or tambalan the security hole in every time software that was installed and got access the internet in the program firewall you.
Labels:
computer,
Computer software,
firewall,
Malicious Software,
virus
Sunday, January 18, 2009
Wanna Save Your Notebook?
I just reading article about saving our notebook from theft. There is two way for saving your notebook.
First, Prevention. In this section we must know that's our notebook theft protection plan should first concentrate on preventing uanauthorized acces to our sensitive or critical data.
We must awareness of who is around us and what they are doing.
Two, Recovery. In this section we must know even with the most stringent measures to preven theft of our notebook, it can still accour.
A good way to make sure your notebook is recovered is to have a built in tracking device for the computer so that anytime the thief or finder uses it to access the internet.
We must record of the IP location is registered.
I read this article from goarticles.com and want to share it with you all. I hope this article usefull.
First, Prevention. In this section we must know that's our notebook theft protection plan should first concentrate on preventing uanauthorized acces to our sensitive or critical data.
We must awareness of who is around us and what they are doing.
Two, Recovery. In this section we must know even with the most stringent measures to preven theft of our notebook, it can still accour.
A good way to make sure your notebook is recovered is to have a built in tracking device for the computer so that anytime the thief or finder uses it to access the internet.
We must record of the IP location is registered.
I read this article from goarticles.com and want to share it with you all. I hope this article usefull.
Subscribe to:
Posts (Atom)