Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

Seo Master present to you: If you use Google Code's open source project hosting service, you're probably already familiar with the standard features: the issue tracker, the wiki, the downloads-area, and the browseable version-control repository.

But the project hosting service is also full of cool bells and whistles that you may not have noticed before. We've compiled a fun list of these things which you can show off at your next, um, project hackathon. In this first post, we'll look at some version control gems.

Web-based Code Reviews

  • What: browse a committed change, then make comments right in the browser.
  • Example: here's a brief sample review of a changeset.
  • How to do it: Bring up a changeset in the source browser and click the "start a code review" link in the right-side bubble. Double-click on lines of code to enter comments, then click "publish your comments" when done. An email will be sent to the changeset author, and then they can reply to the comments through the same web interface.

Make Stuff Happen after a Commit

  • What: after a commit, you can automatically fire off a continuous build, make an IRC bot speak... even notify an AppEngine instance!
  • How to do it: Look for the "web hooks" section in the Administer->Source page. If you provide a URL to your server, we'll ping it with commit information after every code change. Follow the links for full details and documentation.


Descriptive Wiki Commit Logs

  • What: The wiki is stored in version control; when saving a wiki page, use a more descriptive commit message than the default "Edited wiki page through web user interface".
  • Example: Here's a wiki change with a useful description.
  • How to do it: When editing a wiki page, expand and fill out the "Commit Log" textfield.

Of course, one of the most exciting new features on our project hosting service is our nascent support for the Mercurial distributed version control system. If you're coming to Google I/O, be sure to come hear our talk about Mercurial on Bigtable!

2013, By: Seo Master
Seo Master present to you:
Protecting Your Privacy in the Cloud
Creative Commons image source

Safety in the Stratosphere

There is no doubt that cloud technology is revolutionizing the digital sphere. It's efficient, it permits employees to work from almost anywhere, and reduces the amount of money needed to be spent on data storage hardware. However, with the sheer proliferation of cloud-based computing, the question of privacy arises. How do you ensure that your information remains protected when it is stored online?

IT Advice

  • Encrypt personal data: When saving personal information to an online storage source, it is best to encrypt the data. Identity theft and fraud are rampant on the internet, and as the old mantra goes, it's better to be safe than sorry. The kind of information that should be encrypted includes copies of personal documents, bank statements, medical records, property deeds, etc. Confidential business information should also undergo this process. There are numerous simple encryption programmes available to help you protect your data.
  • Back up your info: Cloud technology is not infallible. In the worst case scenario, hackers can erase all your valuable information. The golden rule is to back up everything you don't want to lose on a hard drive or two.
  • Passwords: Don't use the same password for all your accounts. It may be easier for you to remember, but it also makes it easier for nefarious hackers to access all of your accounts. So remember to diversify! Use date combinations that mean something to you. Save the password combinations in your phone contact list under a false name– that way, it looks like just another number to someone who happens to glance at your screen.
  • Two-factor authentication: Simply put, this refers to the use of two methods to confirm your identity. This usually includes a password which you type in, and then an authentication code that is sent to your cellular device. This helps to prevent your social media accounts from unauthorised access, particularly if you are logging in from an unfamiliar device.
  • No daisy chains: Refrain from linking all of your accounts together, for example, using your Facebook login details to sign into other websites. In the event of a hack, all of your interlinked accounts could be accessed. It's better to register social media accounts with a separate email address each time.
  • Choose your devices wisely: Be careful when choosing where to log in. Try to avoid computers that everybody else uses, and if you do end up logging in from someone else's device, remember to clear the cache afterwards. And of course, don't forget to log out. This may seem obvious, but it's amazing how many people completely skip this step.
  • Antivirus Software: Both antivirus and anti-spy software can add an extra layer of protection when browsing the net and accessing your personal data. This makes it a lot more difficult for people to access your system, and as a result, your online information.

So there you have it. Whether you use virtual desktop infrastructure, or even online storage sites such as Dropbox or Google Drive, implement a few of these tips and safeguard your data.




Author Bio:
Grace Matthews is a London-based lifestyle blogger who makes uses of Nasstar VDI so that she can travel and work from anywhere in the world.
2013, By: Seo Master
Seo Master present to you:

Odesk Seo Test Questions And Answers|Odesk Seo Test Answers 2013-2014 

. Some words, when followed by a colon, have special meanings to yahoo. What is perfermed by the link:Operator?

a. it shows all the outbound links from the url
b. It shows how many pages of the site yahoo is pointing to
c*It shows all the pages that point to that url
d. It show url's with broken links

2. Which blackhat Seo techniques is characterized by a method to decieve search engine, by detecting the search engine bot and "feeding" it with a different HTML code than the HTML actually served to users?

a.Coaling
b.Foisting
c.Slighting
d*Cloaking

3. Why is it bad idea from SEO perspective to host free articles and write ups that are very common on the internet?

a.Because they will not lead to fresh traffic
b*Because you could be penalize by search engine for using duplicate contents
c.Because you will not get the benefits of proper keyword targeting
d.because people could turn up claiming copyright infirigement

4. What will happen if you type the word 'Certification-Networking' in the google search box?

a.Google will find the web pages about "certification" and also containing the word "networking"
b.Google will find ALL the web pages containing the word word "Certification" and "Networking"
c.*Google will find ALL the web pages in which the words "Certification" and "Networking" appear together.
d.Google will find the web pages about Certification that do not contain the word Networking

5. Which of the following factors does google take into account while accessing whether or not a website is an authority website?

a. The frequency with which the contents of the website is updated
b. the number of web pages containing relevant information on the main theme of the website
c.*The number of in-bound natural links related to the website's theme (or keywords)
d. None of the above

6. What is keyword density?

a.The number of times the keyword is used / (divided by) the total word count on page - (minus) the total words in HTML on the page
b.The number of times the keyword is used x (multiply by) the total word count on page.
c.The number of times the keyword is used in the page description
d.The number of times the keyword is used in the page title
e*The number of times the keyword is used / (divided by) the total word count on the page.

7. Which of the following statement about FFA pages are true?

a.They are greatly beneficial to SEO
b.They are also called Link Farms
c.They are Paid Listings
d*They contain numerous inbound links

8. What is the illegal act of copying of a page by unauthorized parties in order to filter off traffic to another site called?

a.Traffic jacking
b.Visitors Jacking
c.View Jacking
d* Page Jacking

9. What is the most likely time period required for getting a google page ranking?

a.1 week
b. 3 weeks
c. 1 month
d.* More than 3 months

10. Which of the following can be termed as a good keyword selection and placement strategies?

a* Targeting synonyms of the main keyword, A & D
b.Targeting the highest searched keywords only
c.Copying competitor keywords
d.Optimizing 5 or more keywords per page (check)

11. Some words, when followed by a colon, have special meanings to yahoo. What is perfermed by the link:Operator?

a. it shows all the outbound links from the url
b. It shows how many pages of the site yahoo is pointing to
c. It shows all the pages that point to that url
d. It show url's with broken links

12. Which blackhat Seo techniques is characterized by a method to decieve search engine, by detecting the search engine bot and "feeding" it with a different HTML code than the HTML actually served to users?

a.Coaling
b.Foisting
c.Slighting
d*Cloaking

13. Why is it bad idea from SEO perspective to host free articles and write ups that are very common on the internet?

a.Because they will not lead to fresh traffic
b*Because you could be penalize by search engine for using duplicate contents
c.Because you will not get the benefits of proper keyword targeting
d.because people could turn up claiming copyright infirigement

14. What will happen if you type the word 'Certification-Networking' in the google search box?

a.Google will find the web pages about "certification" and also containing the word "networking"
b.Google will find ALL the web pages containing the word word "Certification" and "Networking"
c.*Google will find ALL the web pages in which the words "Certification" and "Networking" appear together.
d.Google will find the web pages about Certification that do not contain the word Networking

15. Which of the following factors does google take into account while accessing whether or not a website is an authority website?

a. The frequency with which the contents of the website is updated
b. the number of web pages containing relevant information on the main theme of the website
c.*The number of in-bound natural links related to the website's theme (or keywords)
d. None of the above

16. What is keyword density?

a.The number of times the keyword is used / (divided by) the total word count on page - (minus) the total words in HTML on the page
b.The number of times the keyword is used x (multiply by) the total word count on page.
c.The number of times the keyword is used in the page description
d.The number of times the keyword is used in the page title
e*The number of times the keyword is used / (divided by) the total word count on the page.

17. Which of the following statement about FFA pages are true?

a.They are greatly beneficial to SEO
b*They are also called Link Farms
c.They are Paid Listings
d*They contain numerous inbound links

18. What is the illegal act of copying of a page by unauthorized parties in order to filter off traffic to another site called?

a.Traffic jacking
b.Visitors Jacking
c.View Jacking
d* Page Jacking

19. What is the most likely time period required for getting a google page ranking?

a.1 week
b. 3 weeks
c. 1 month
d.* More than 3 months

20. Which of the following can be termed as a good keyword selection and placement strategies?

a* Targeting synonyms of the main keyword (ans) A & D
b.Targeting the highest searched keywords only
c.Copying competitor keywords
d*Optimizing 5 or more keywords per page (check)

21. Google displays up to ------------------------ characters of a web pages title tag

a.56
b.60 * B & C
c.66
d.80

22. Which of the following fact about Alexa are correct ?

a.*Alexa provides free data on relative website visitors traffic
b. Alexa and Quancast provide information on visitors household income
c.Alexa is baised towards US based traffic
d.Quantcast only track people who have installed the quantcast toolbar


23. What is the name of the search engine technology due to which a query for the word "actor" will aslo show search result for related word such as actress, acting or act?

a.Spreading
b.Dilating
c.RSD (real time synonyms detection)
d.Stemming
e.Branching

24.Do search engine such as google detect unnatural linking patterns by checking the class C IP address of the page where the link to the website originates

a* Yes
b No

25. Which of the following conditions will google treat favorably from the "Relevancy" perspective.

a.The website offering product and services to the visitors country
b.*A website that provides Free content for related keywords
c.Hidden keywords on the homepage matching search term
d.Image alt tag on the homepage matching search term

26. Which of the following website design guideline has been recommended by google?

a*Having a clear hierachy and text links
b.Every page should be reachable from atleast one static text link
c.If the sitemap is larger than 100 or so links, you should break the sitemap into separate pages
d.Keep the links on a given page to a reasonable number (fewer than 100)
e. Use less than 30 images or graphics per page

27. What is the main reason for the effectiveness of Optimizing a web page towards a long tails keyword search? Recheck

a.There are more long tail searches than shorter keyword queries
b.*Search engine often pass on long tail searches to lesser or new website
c.Search engine do not pass on long tail search traffic to website that rank high for shorter keyword searches (check)
d*There are fewer webvsite that have targeted such keyword's


28 Which of the following statement is correct with regard's to the images within a web page?

a.Images can not be spidered by the search engine (check)
b*Important keywords related to the image should be plcaed in the ALT text
c.Images should always be kept close to the top of a web page
d. Image maps should be used while including the images

29. What does the 302 server Response Code signify?

a.It signifies conflict, too many people wanting the same file at the same time
b.The page has been permanently removed
c.The method you are using to access the file is not allowed
d*The page has temporarily moved
e.What you requested is just too big to process

30. State whether the following statement is true or false. A sitemap provide a list of natural links to user accessible pages on a website

a.True
b*False

31.  State whether true or false. 
The Yahoo Directory listing is a free service for commercial site?

a*True
b.False

 
2013, By: Seo Master
Powered by Blogger.