Aug 312011

Beginning early this year, google made some changes to their search ranking,   the reason cited is that google wanted to provide more relevant results, google engineers published blog post which indicated there were 11.8% organic search results will be affected, in another word, almost 12% of google search results are useless or of low quality. They planned and started the update about one year ago, no wonder I saw a few of my keywords’ ranks dropped like a rock, the good thing is that those keywords promoted by content rich links are not affected, some of the keywords even ranked better than before, it’s obvious that linking campaign the old way is the thing of past, probably due to link spamming sites being de-indexed by google.

What is old way of link building any way? a large percentage of SEO firms will do this,  they add your links to those linking websites without context, the only updates on those websites are the new links, it’s safe to assume all of them are trash, the name link spamming are just for these sites. New google algorithm most likely will punish these link spammers,  any links on them will be affected too. 

Maybe a few examples will make it clear. It was quite some time ago, I started with this keyword, reflective collars, it was old way of link building all the way, almost all the sites I got link from had too many links, and those sites had only links, no real content at all. In the beginning, the ranking of the keyword in question rise pretty fast, lately the keyword link stayed on the first page for a while, the party was over when google updated it’s algorithm. Here is another keyword, chain puller , we put the link in relevant context, not too many plain links have been built, now we have really good ranking for this keyword. Old and outdated linking campaign lost to content linking, what’s next? In fact the only thing matters here is content, as long as you dole out high quality content, not only people will love to read your stuff, so do the search engines. It’s never too late to build good blogs for business purpose, take a look at this blog, top smartphone 2011 , I didn’t put too much effort into it from start, but I never stopped posting, the result? I got nice ranking for a few realy nice keywords now. As we can see, blog marketing with great content is the way to go. Say you’re building your own bogging network, for instance tire chains, then you will have a powerful weapon in your SEO arsenal.

At the end of day all you have to do is to create quality content, get people to enjoy and share your stuff, promote your business with the content, this strategy will prevail in short or long term. Persistence and patience are the keys to success, you shouldn’t expect things to improve overnight, be it your business or search rankings, keep writing, publishing, sharing and creating, you will see the day of success. Ezine is one of the best article directories out there, google will index a new article on ezine promptly, of course your posts on some blogs will be indexed real fast as well, I believe you should see for yourself, say this ratchet tie down, quality content, nice presentation, indexed by google, this article is a good example of article marketing. 

Last but not least, if you don’t take social media account, you’re lost. One thing you can do for your blogs is to install twitter tools, then go ahead register a new twitter account and app, set up API credentials in your twitter tools option, then every new post on your blog will show up in your twitter page, it’s real easy and useful, no one should miss this tool out.

Technorati Tags: ,

Aug 292011

0 Josephine Teo commented on SMRT security breach   20Aug2011SINGAPORE: Minister of State for Transport Josephine Teo has said the Land Transport Authority (LTA) will not hesitate to penalise SMRT following a second security breach at its train depot.

She said the government adopts a zero-tolerance attitude of such incidents in order to ensure the security of Singapore’s transport system and commuters.

Mrs Teo was speaking to reporters on the sidelines of a joint emergency preparedness exercise at the Circle Line’s (CCL’s) yet-to-be opened stations on Saturday morning.

It was the morning peak hour and more than 400 passengers were packed on a train heading between one-north and Buona Vista stations.

A fire broke out and smoke started to fill the air. Help arrived within minutes and commuters were evacuated, while casualties were attended to promptly.

It was all part of a simulated exercise to test the ability of the CCL Operations Control Centre (OCC) and emergency personnel to manage a crisis situation efficiently.

Mrs Teo said such scenarios stressed the importance of being prepared.

This mindset must be reinforced given the recent intrusion at Bishan Depot where a train was vandalised with graffiti, she said.

“Like many Singaporeans, I was very disturbed by the security breach at SMRT’s Bishan Depot. Although no one was hurt, it is a very serious incident which should not have happened. Things that have to do with human error can always be prevented,” she added.

She said “any breach is one too many”.

SMRT said the intrusion went undetected as CCTV recordings revealed that the security guards did not carry out night-time patrols near the fences as required.

The operator was slapped with the maximum fine of S$50,000 after a similar incident took place at Changi Depot in May last year.

It was also asked to beef up security as recommended by the Public Transport Security Committee.

Meanwhile, structural works at Changi Depot have been delayed.

SMRT said the works were delayed as a water pipe had to be relaid after four PUB high-tension cables were discovered during the installation of the fence. Works are expected to be completed by the end of next month.

At the Bishan Depot, works are slated to begin only this month. They include a steel-welded mesh fencing and a Fence Intrusion Detection System (FIDS). Together with CCTVs, these will reduce the reliance on manned patrols and act as an additional layer of defence.

When asked if LTA should impose a specific timeline on SMRT to complete all security recommendations, Mrs Teo said she expects SMRT to fill any gaps in security immediately. After investigations are complete, authorities will decide on the next course of action.

Addressing concerns that the vandalism act could have been linked to the recent announcement of a fare hike which will take effect this October, Mrs Teo dismissed it, saying “it’s quite far-fetched to draw a link” between the two.

Duration : 0:2:28

Continue reading »

Technorati Tags: , , , , , , , , , , , , ,

Aug 292011

0 Remove PC Security Guardian in 4 Easy Steps

PC Security Guardian is spreading rapidly and infecting thousands of computers.

If your computer has become infected with PC Security Guardian then follow the 4 steps to remove PC Security Guardian:

Step 1: Bookmark this video to easily return and reboot your computer into safe mode.

Step 2: Go to and download the removal tool.

Step 3: Install the removal tool and run a full scan in “Safe Mode with Networking”. Press F8 repeatedly while your computer is rebooting, then use the down arrow key to select “Safe Mode with Networking”.

Step 4: Click Fix Checked after Registering the software and finally remove PC Security Guardian.

Still having problems? Leave a comment below and we will try our best to help you remove PC Security Guardian.

Duration : 0:1:30

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Aug 262011

0 Fresh Ideas in Home SecurityThe film clip for the single ‘Fresh Ideas in Home Security’.. from the album ‘Constellations’.. released 2nd September 2011.

Duration : 0:3:27

Continue reading »

Technorati Tags: , , , , , , , , , , , , ,

Aug 262011

0 CompTIA Security+ SY0 301: 6.2   Transport Encryption AlgorithmsSee our entire index of CompTIA Security+ videos at – Transporting information across the networks requires a high level of security. In this video, you’ll learn how SSL/TLS, HTTPS, and IPsec allow the transmission of encrypted data to anyone in the world.

Duration : 0:9:13

Continue reading »

Technorati Tags: , , , , , , , ,

Aug 262011

0 Computer Security
01…pcAnywhere Host and Remote 12.5, 1 User

02..Norton 360 Premier 5.0 1-User/3PCs

03..Norton Antivirus 2011 – 10 User

04..Microsoft Windows XP Home Edition SP2B for System Builders [OLD VERSION]

05..Norton Internet Security 2011 – 10 User

Duration : 0:2:1

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , ,

Aug 242011

0 Columbus Home Security, Alarm System   Westerville, New Albany, Bexley, Worthington

suretyCAM security and automation brings you the finest in home security and smart-home automation without the overpriced hype. We give you real security, real convenience and real value. We’re simply better.

Elegance and aesthetics matter as much as functionality. Nobody wants their home to look like a prison. At suretyCAM we deliver effective solutions that don’t conflict with your existing decor.

suretyCAM is a modern company focused on mobility, remote control and your everyday lifestyle. Everything we do is easy to use and is Internet accessible providing you with the ultimate in convenience and control.

suretyCAM gives you the tools and training you need to protect your life, your loved ones, and your valuables. suretyCAM is not a security alarm company, we are a security engineering company. We don’t just slap in a one-size-fits-all alarm that only tells you when you’re being attacked, we give you the tools you need to prevent it from happening and teach you how to use them correctly. Check out suretyCAM’s exclusive D Fence program.

Serving Columbus, New Albany, Westerville, Dublin, Worthington, Hilliard, Powell, Lewis Center, Delaware, Bexley, Upper Arlington, Gahanna, Pickerington, Blacklick, Reynoldsburg, Cincinnati and most locations in Ohio.

suretyCAM, security and automation for piece of mind living
Call Today Toll Free 855-787-3891

Duration : 0:3:20

Continue reading »

Technorati Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Aug 242011

0 SAP Security Training How to do a SAP
When you want to move the SAP Roles from one system to another you need to do SAP Transport.You will be using SE10 to release the transport. The transport will have task and request. You need to provide request number when you move the transport

Duration : 0:5:32

Continue reading »

Technorati Tags: , , , , , , , , , , , , , ,