How To Check Your Websiite Security
10:27 AM | Author: IT Blog
At the time you / your institution is to take a decision (presense) reputation on the Internet then you will also specify the image by you on the Internet. Of course, concepts of public relations (PR), known in the old world old-economy also apply in the cyber world, the difference in the world's cyber infrastructure is able to interact for two (2) direction to make things become more interesting. Of course, the ability of infrastructure interaction two (2) direction is only useful if we want to interact with many people on the internet, speed & ability to respond to our mayarakat who eventually became an important part in the various aspects of social relationships in humans.

Aspects that are not less important is the ability of our defense against the attack site cracker want to disrupt the site. Imagine if the information on the site was changed by the hacker/cracker malunya how the site has a more shameful is owner of the site because of its effects to be very bad. Imagine if the site is the site of a bank or store will be very difficult for us to reach the public so that it will spread to many as there will be no trade transactions. How can we believe that these transactions do not akan intip in by other people? What can we believe that the credit card number will not be on the steal?

One of the most simple way is to ask the help of colleagues expert in the field of network security to help secure the Internet sites that we have. There are several services on the Internet that can provide services for mencheck and secure the site that we have. Examples are secure-me.net is the Internet service that can secure the minimum or if the settings that we use the Internet quite well & not perforated by cracker. Example of this service is http://www.secure-me.net/.



Secure-Me (http://www.secure-me.net) is a service on the Internet that some may get in free to see if the network system that we have enough safe & does not have holes that are open. Indeed, the scanning complex is not provided free of charge. Appear in the image is http://www.secure-me.net we do at the time of registration to request help for the system we have in the scan.

Secure-Me is not just a normal scan. After initial scanning, Secure-Me akan evaluate results and to detect the various weaknesses in the system. Because of their experience in conducting various scanning system, the secure-every week like me does not want to have to try many new things. Appear in the image on the queue are also many machines that mengantri for the scan. Indeed, for the basic scan only take 3-4 minutes for each machine. For a complete scan required approximately 30-60 minutes.

Is your system secure enough? Statistics obtained from colleagues in the secure-me from the moment they start scanning in the July and run more than 32,000 scans only 3% of the machine that is getting a good score. 97% of the engine on the Internet that they have a scan that one or more weaknesses. Including the services have a network that does not need to, the name public, guest accounts, protection configuration, the printer is open to all people and so on. Clearly you need to ask yourself again whether you truly secure?

More mad again Secure-Me have facilities to keep the system setup network/computer in a way that we can only ask if the Secure-Me service to run the scan repeated continuously to maintain the alert in case there are people who change the system setup that we use .

Another way that can also be located is friends with the hackers have in the group have some colleagues from hackers and their age average is still very young. Some of them include topnotch Wenas like that in Singapore adili in court because the break site in Singapore at the age of 15 years. They were not even in the hit-age that is still very young in fact have a remarkable ability outside their ability to much older veterans & on the Internet.

In fact, if only we can adequately interact with colleagues hackers is the fact that they are good also. Like usual there are a kind of bond between friends, this is a flock kesetia interesting if we enter the field of Internet security network. Often we would in bantu by friends who are informal help secure the Internet in Indonesia.
To run the application-application below:
Open command prompt and type the program's name (example: cleanmgr.exe) or click Start -> Run and type the program's name (example: cleanmgr.exe).
1. Disk Cleanup = cleanmgr.exe
Used for disk cleanup

2. Character Map = charmap.exe
Is used to find characters that are not public

3. Dr Watson = drwtsn32.exe
Used for troubleshooting on the PC.

4. DirectX diagnosis = dxdiag.exe
Used for diagnosis audio your video card

5. Private character editor = eudcedit.exe
Used to create a new character in your windows

6. IExpress Wizard iexpress.exe = Used to create self-extracting / self-installing package. such as Zip files

7. Microsoft Synchronization Manager = mobsync.exe Used to create sincronisasi.

8. Clipboard Viewer = clipbrd.exe
Used to view the content of the Windows clipboard

9. Windows Media Player 5.1 = mplay32.exe
Used to open Windows Media Player version 5.1

10. ODBC Data Source Administrator = odbcad32.exe
Used for database

11. Object Packager = packager.exe
Used to insert the object into the file.

12. System Configuration Editor = sysedit.exe
Used to change the system.ini and win.ini

13. Syskey = syskey.exe
Used to configure the account in windows.

14. Microsoft Telnet Client = telnet.exe
Used to connect the internet before the browser.

15. Driver Verifier Manager = verifier.exe
Used for monitoring the driver in your windows

16. Windows for Workgroups Chat = winchat.exe
Used to chat sec

17. System configuration = msconfig.exe
Used to control the startup program

18. System Monitor = perfmon.exe
Used to monitor your PC.

19. Program Manager = progman.exe
It is a heritage from the Windows 3.x desktop shell

20. gpedit.msc
Used to set the group policy and the authorization, if you use Active Directory.

21. Remote Access phone book = rasphone.exe
It is applications such as phone book

22. Registry Editor = regedt32.exe [also regedit.exe]
Used for editing and tweaking the windows registry

23. Network shared folder wizard = shrpubw.exe
Used to create shared folders in network

24. File siganture verification tool = sigverif.exe
Used for signature verification

25. Volume Control = sndvol32.exe
Used to display the sound control in the System Tray
Tricks About Windows OS
6:49 AM | Author: IT Blog
Speed up loading windows
Disable windows logo start early
• Open Windows Explorer
• "tools | folder options | view" Remove Attribute "Read-only"
• confirm "ok"
• Double click msdos.sys open the file with the "text editor"
• Add part in the
• "option" with the "logo = 0" when using the write window 95 "logo = off"
• Save the file
• Aktive back with the attribute "read-only"


Stop the search floppy disk drive
• Right-click on the "My Computer | Properties | Performance | File System"
• Select the tab "Floopy Disk"
• Deaktivasition option "Search for new floppy disk drives each time your computer start"
• confirm "ok"
• Turn off the automatic Scandisk
• Start menu | run
• Type "msconfig"
• Open the "Configuration Utility system" with the Enter
• Tab "General" click "Advanced"
• Enable the "Disable Scandisk after bad shutdown"
• Confirm "ok"
• Restart back
• Mode "Hibernation"

Turn off the Windows Sound events
• Control Panel>> "Sound your Multimedia"
• Select the Sound tab
• In the Scheme select
• "No Sound" by selecting items
• in the event in the sound and pull down to choose "none"
• confirm "ok"
• Determining the size of the swap file
• Right click "My Computer"
• Properties
• Tab "Performance"
• Click on "Virtual Memory"
• Enable the option "Use personalized settings for virtual memory"
• specified under "Minimum and Maximum" a value of at least 200 MB
• Ok
• Yes
• Restart

Startup program does not start automatically
Start | Run
Type "msconfig" in the tab "Startup" enable non-program that does not need to confirm Ok
Restart

Reboot without load bios Press shift key when restarting the Virtual Memory Add the file config.sys device = C: WindowsCommandRamDrive.Sys
1024 512
in the Autoexec.bat and set Temp = F: if the ram is in the drive F: Commands for a long

Keyboard buffer can only handle a maximum of 127 characters, but sometimes we give
command that is longer than that, the solution is added to the config.sys: shell = c: windowscommand.com / u: 255 / p, so grow the buffer into maximum 255

Instant Shut Down or Restart win98

With 1 click you can restart and shutdown

1. Right-click the desktop and select new> shortcut

2. in the command box type c: \ windows \ rundll.exe user.exe, ExitWindows (for Shutdown)

3. c: \ windows \ rundll.exe user.exe, ExitWindowsExec
(for Shutdown

4. Press Next, give a name the shortcut and click finish.
This is the Acer Aspire Z5600 PC - HP product output newest "All-in-One Entertainment PC with 24 inch" touch screen with integrated TV Tuner, Blu-Ray recorder, hard disk 2 terabyte (TB) or equivalent to 2000 GB, along with the unique device the back of its LCD screen.


acer-aspire-z5600-pc

Religious parties in the executive authorities in the UK confirm the date of the official launch of one of the first product that uses the operating system is Windows 7, which is dated 23 October 2009.

And if you have Windows Vista in the last 30 days before dirilisnya Windows 7, you can upgrade the free to Windows 7.

The first release candidate of Windows 7 available for download next week, if the program is already in the MSDN and TechNet sites.
The Future Wireless Internet
6:53 AM | Author: IT Blog
Around 1992, India built an Internet-based packet radio technology, the speed 1200bps. Indeed, very slowly but akan Internet radio technology (wireless) has proven its self as an alternative can not be made the play. This slightly smelly technical, with the objective of friends that readers get the picture to build its own wireless Internet network high-speed 2-11Mbps not something impossible - bakan is easier & far better than telkom existing infrastructure at this time.

On this day (towards the end of 2000), wireless Internet technology alternatives that need to be calculated by telkom & operator Indosat. Today telkom 2Mbps lease line its worth Rp. 10 million / month - when using wireless Internet equipment on the market, we can operate the channel speed 11Mbps with investment of Rp. 20 million-a licensed frequency for the cost of about Rp 2 million per year-an. Even on this more and more WARNET in various cities (Bandung, Medan, Jogya etc.) start to build networks between WARNET its use technologies are wireless. Not to mention the inclusion of various satellite operator (also wireless) Internet stage in Indonesia, such as Pacific Satellite Nusantara (PSN), Melesat (from Infocom), PalapaNet (from Satelindo), TelkomNet Turbo (from Telkom) add flare wireless Internet infrastructure in India - the ultimately enable us to build the cheaper Internet access for the people of Indonesia.

Key equipment required is a WaveLAN card on the day that is generally shaped like PCMCIA cards appear in the image on the side. In the picture card ORINICO made by Lucent, who works at a frequency of 2.4GHz speed 11Mbps IEEE 802.11b protocol using the dimodulasi use CDMA (Code Division Multiple Access) so that the frequency of the same work several channels at once.


If there are problems in the link, do Orinoco akan speed automatically fallback to 5.5Mbps, 2Mbps & 1 Mbps in order to keep good performance. Orinoco follow standard WECA (Wireless Ethernet Compatibility Alliance) Wi-Fi 'wireless fidelity' standard. Scattered power from the card-WaveLAN card is usually very low only about 25mW.


To increase the distance to reach the required emission WaveLAN external antenna (which is placed outside the building). Generally, for the distance-distance 5-10 km can be achieved by using external antenna tersebut.Masalah major-general, card because it is powerless wavelan low around 25 MW-an, the distance between the antenna card wavelan it can not be too far so that the signal does not lost in the coax cable connecting the card with the antenna wavelan
it. Usually connecting cable (50 ohm coax as well), limited to less than 10 meters distance. So do not surprised if we see akan computer (PC) in the roof letakan WARNET-WARNET the related media wavelan use this, because it would not be in the PC letakan in the roof so that the distance between the antenna to the card can be created in under 10 may be minimal meters.

After WaveLAN Card & Antenna is wrong, the next strategy is to find out how we can use the PC that many dipasaran to be able to function as a router. Usually when we buy a card in wavelan provide software drivers for its Windows operating system. Sialnya if Windows is not good to use for the Internet router in the network, different from both the UNIX Linux & FreeBSD much better for applications in the Internet router. On this router we pair two (2) network interface, which is a form of card wavelan 2-11Mbps for long distance communication are another form of ethernet card to connect local area network (LAN) from WARNET, school or the local office in the building / room

Art is how to persuade the ISP to connect so that we are willing to be associated with WaveLAN. Some ISPs are willing to be happy to connect using the WaveLAN, but some ISPs, especially from the telecommunications monopoly that is not willing to connect with WaveLAN. The problem is actually only a problem licensing frequency & to pay the ISP for access to dedicated high-speed 24 hours.


Viscera Broadband Wireless Internet Access

WLAN technology 2.4GHz, 5.8GHz, 5GHz is growing rapidly, especially because the exemption permits the frequency bands in the ISM band and UNII (Unlicensed National Information Infrastructure) by the United States government. Data communications standard that is generally used IEEE 802.11 family, IEEE 802.11b which has a maximum speed of 11Mbps, while the IEEE 802.11a has a maximum speed of 54Mbps.

Few descriptions of IEEE 802.11a technology works on the 5GHz akan seems to be the future of technology, high-speed Internet world. One of the breakthrough technology that happens is done by Radiata www.radiata.com that build the chip set that consists of a modem-based band (R-M11a) and a transceiver (R-RF5) in the 5GHz UNII band is based on IEEE 802.11a, especially created for anticipate that in the WLAN market estimasikan reach U.S. $ 5.6 billion in 2004 by Cahners In-Stats Group. How much it costs? Chipset R-M11a baseband modem & R-RF5 radio transceiver that can work up to 54Mbps is worth U.S. $ 35 in the amount of 100,000 units. Is still in the raft must be packaged in a PCMCIA for use in computers, fell to its per PCMCIA card could reach U.S. $ 200-3000 / card.

In the IEEE 802.11b is currently a lot of use 2.4GHz band for Bluetooth and HomeRF equipment widely used technology uses spread spectrum technology, Direct Sequence Spread Spectrum (DSSS) and hoping Frequency Spread Spectrum (FHSS) technique is a part of the access-based Code Division Multiple Access ( CDMA).

Unlike the IEEE 802.11b is now widely used, in the IEEE 802.11a modulation techniques used Coded Orthogonal Frequency Division Multiplexing (COFDM), which enables us to obtain such a connection is no different with cable connection in the indoor environment (in space).

Baseband modem is compliant with the IEEE 802.11a standard is usually implemented with the path transmits & receive the same once independent, allowing for simultaneous operation in full duplex. Alternative modulation BPSK, QPSK, 16-QAM & 64-QAM is possible to work at various speeds as well as the obligatory circumcision based on IEEE 802.11a. Power used is very low with the work on the 2.5V voltage.

Equipment 5GHz UNII band transceiver based on IEEE 802.11a standard was developed that usually have a wide dynamic range with minimal components that may be. Use of external filter is reduced by the use of mixer and on-chip filters, which in turn reduces the cost of the system. Receiver (Rx) is linear with the bypass switch to the Low Noise Amplifier (LNA). Noise figure receiver (Rx) around 6dB, power transmitter (Tx) of the chip 0dBm (can be reinforced if needed), 20MHz IF Filter, Programmable 70dB Rx gain control, 60 dB Programmable TX power control.
Canada Robot
6:15 AM | Author: IT Blog
If in Japan, people make a robot for diadu, then this company in Canada to create robots to help humans seukuran chore day. Is Dr. Robot, dilansir authorized drrobot.com from the site, creating a "hawk", the well-automated, wireless, and of course handsome. Hawk form adapted to the human body anatomy. Have a head and two hands. However, to move the Hawk still use the form of wheels.

To complete the work assigned you, a second arm with the joint 6 is able to lift the burden seberat 800g (up to 1 kg), On the chest there is a monitor that plays video and menamoilkan image. With 802.11g wireless, hawk is able to connect with the network so that you can memerintahkannya of distance through the internet connection. Even hawk equipped GPS system that you can create a mutually monitor one another. Although the speed is only 0.5 m / s he will not go far wide.

Next design architecture Hawk.

hawk_detail

Dr.Robot is a company in the field of creating human robots parlormaid work. To this Dr. Robots have been making about 25 robots and the latest version of Hawk is the most perfect in terms of form and most feature complete. So do not wonder if the price offered by the "most" incredible. You must dive pocket of U.S. 5000 to order for you to Hawk
How to Hack Deep Freeze
1:11 AM | Author: IT Blog
1. Download XDeepFreeze

2. Extract to C: \ XDeepfreeze

3. Run Run_Me.exe akan generate a file mcr.bat and XDeepFreeze.exe akan terload.

4. On XDeepFreeze, DeepFreeze Press Stop to stop the frzstate.exe

5. On XDeepFreeze, Press Clean Registry, to clean the registry created during the install deepfreeze.

6. To go to MS-Dos Mode, Run command.com (Already included in the xdeepfreeze.zip)

7. Run mcr.bat (Contains commands that will delete files persifrz.vxd)

8. Type Exit to go back to Windows.
DeepFreeze .. and does not work anymore.

Please re-install DeepFreeze, remember and record good password that you use.
If you forget again how to do over again.

Note:
XDeepFreeze.exe has been successful in ditest and DeepFreeze v.332SE
XDeepFreeze.exe created using Visual Basic 6.0, as is usually required to run it Msvbvm60.dll

Hopefully Helping.
12:56 AM | Author: IT Blog
Although Google provides many search features, I am sure not many of us use it at the time to search for information. Finally, we get information from the tsunami waves that Google eventually make our own confusion. We go ahead, search for effective techniques that you should like what.

In general, the type of search on Google there are two: Basic Search and Advanced Search. Basic Search is a search feature that is common when we use the direct access google.com.







While the Advanced Search feature provides a variety of search options for both the basic service, a file format that we want to search, language, region, etc..









In fact still very much a search feature that we can use, but there is no menu option on the Advanced Search. In other words we must memasukannya query in the search form directly in the Basic Search. Nah perm

ainan query and search operators that this will in fact we in this article.

BASIC FEATURES SEARCH

1. AND: Search for information that contains both the word search. Can use one of the following three alternatives:
Jepara carving
Jepara carving AND
Jepara carving +

2. OR: Search for information that contains one of the two words. Can use one of two alternatives follows:
OR know where
know | Tempe

3. Phrases: Search for information containing phrase to search using the sign "." Example:
"Software"

4. NOT: The search results contain that word in front of, but not behind the minus (-). Example below will search for information that contain the word fish, but not milk.
fish-milk
5. Synonyms (~): Search for the word beser
ta-sinonimnya synonyms. The examples below will bring results: vehicle (car) and the synonym

6. ASTERIK (*): The character of the word. From the examples below, the results can be obtained: grilled spicy chicken, spicy fried chicken, baked chicken, spicy, etc. * spicy chicken

7. ALERTS TITIK (.): The characters of letters, numbers and single characters. From the examples below, the results can be obtained: coffee, chef, score, etc.
ko.i
8.

CASE insensitive: Search on Google and not the capital stock as the same thing. So, Romi Satria Wahono, Romi Satria Wahono, or Romi SATRIA Wahono will bring the same results
9.

NEGLIGENCE PREFACE: Google ignores keyword form of single characters and words: a, about, an, and, are, as, at, b, by, from, how, i, in, is, it, of, on, or , that, the, this, to, we, what, when

, Where, which, with. If we still want the search word, we can use the + character in front of the word search (example: Star Wars Episode + I), or can be also considered as a phrase (example: "Star Wars Episode I")
10.

I'm Feeling Lucky: It will take us directly to the first search results of queries we

SEARCH FEATURES NEXT

1. Define: Search for a definition of a terminology. From the examples below, the results obtained are various definitions of e-learning from various sources
define: e-learning

2. Cache: Showing a web site that has been indexed by Google already, although no longer active. Example below will generate a word search on the php site ilmukomputer.com in the Google index. cache: ilmukomputer.com php

3. LINK: Displays a list of links that point to a site. Example below will display a list of links that to the site ilmukomputer. link: ilmukomputer.com

4. RELATED: Displays a list of similar sites, or have a similar relationship with a related: romisatriawahono.net

5. INFO: Displays the information that Google know about a site info: romisatriawahono.net

6. SITE: Showing special searches in a site designated java site: ilmukomputer.com

7. Filetype: Displays search results as a type (extension) files. Types of files that can be are: doc, xls, rtf, swf, ps, lwp, wri, ppt, pdf, mdb, txt, etc.. Example below will display search results as PDF file that contains the keyword software engineering software engineering filetype: pdf

8. ALLINTITLE: Displays all the search words in the TITLE page. Example below will produce page that has a title java programming. allintitle This can not be combined with operator others. Intitle use for such purpose. allintitle: java programming

9. Intitle: Showing a word sought in the TITLE page. Example below will produce a page that a title and contents of the java page that contains the word enterprise intitle: java enterprise.

10. ALLINURL: Displays all the search words in the URL. Example below will generate a list of that contain the word java and programming. allinurl This can not be combined with operator (syntax) others. Inurl use for such purpose. allinurl: java programming

11. Inurl: Displaying a word is searched in the URL. Example below will generate a list of URLs that contain the word java and content of the page that contains the word enterprise inurl: java enterprise .
That we do will be more effective when we try to combine some of your service both in the search feature and basic information. For example, we want to search PDF files on the site www.pdii.lipi.go.id. Then we combine the two into the service:
filetype: pdf site: www.pdii.lipi.go.id
Effective Search Techniques with Google
12:56 AM | Author: IT Blog
Although Google provides many search features, I am sure not many of us use it at the time to search for information. Finally, we get information from the tsunami waves that Google eventually make our own confusion. We go ahead, search for effective techniques that you should like what.

In general, the type of search on Google there are two: Basic Search and Advanced Search. Basic Search is a search feature that is common when we use the direct access google.com.







While the Advanced Search feature provides a variety of search options for both the basic service, a file format that we want to search, language, region, etc..









In fact still very much a search feature that we can use, but there is no menu option on the Advanced Search. In other words we must memasukannya query in the search form directly in the Basic Search. Nah perm

ainan query and search operators that this will in fact we in this article.

BASIC FEATURES SEARCH

1. AND: Search for information that contains both the word search. Can use one of the following three alternatives:
Jepara carving
Jepara carving AND
Jepara carving +

2. OR: Search for information that contains one of the two words. Can use one of two alternatives follows:
OR know where
know | Tempe

3. Phrases: Search for information containing phrase to search using the sign "." Example:
"Software"

4. NOT: The search results contain that word in front of, but not behind the minus (-). Example below will search for information that contain the word fish, but not milk.
fish-milk
5. Synonyms (~): Search for the word beser
ta-sinonimnya synonyms. The examples below will bring results: vehicle (car) and the synonym

6. ASTERIK (*): The character of the word. From the examples below, the results can be obtained: grilled spicy chicken, spicy fried chicken, baked chicken, spicy, etc. * spicy chicken

7. ALERTS TITIK (.): The characters of letters, numbers and single characters. From the examples below, the results can be obtained: coffee, chef, score, etc.
ko.i
8.

CASE insensitive: Search on Google and not the capital stock as the same thing. So, Romi Satria Wahono, Romi Satria Wahono, or Romi SATRIA Wahono will bring the same results
9.

NEGLIGENCE PREFACE: Google ignores keyword form of single characters and words: a, about, an, and, are, as, at, b, by, from, how, i, in, is, it, of, on, or , that, the, this, to, we, what, when

, Where, which, with. If we still want the search word, we can use the + character in front of the word search (example: Star Wars Episode + I), or can be also considered as a phrase (example: "Star Wars Episode I")
10.

I'm Feeling Lucky: It will take us directly to the first search results of queries we

SEARCH FEATURES NEXT

1. Define: Search for a definition of a terminology. From the examples below, the results obtained are various definitions of e-learning from various sources
define: e-learning

2. Cache: Showing a web site that has been indexed by Google already, although no longer active. Example below will generate a word search on the php site ilmukomputer.com in the Google index. cache: ilmukomputer.com php

3. LINK: Displays a list of links that point to a site. Example below will display a list of links that to the site ilmukomputer. link: ilmukomputer.com

4. RELATED: Displays a list of similar sites, or have a similar relationship with a related: romisatriawahono.net

5. INFO: Displays the information that Google know about a site info: romisatriawahono.net

6. SITE: Showing special searches in a site designated java site: ilmukomputer.com

7. Filetype: Displays search results as a type (extension) files. Types of files that can be are: doc, xls, rtf, swf, ps, lwp, wri, ppt, pdf, mdb, txt, etc.. Example below will display search results as PDF file that contains the keyword software engineering software engineering filetype: pdf

8. ALLINTITLE: Displays all the search words in the TITLE page. Example below will produce page that has a title java programming. allintitle This can not be combined with operator others. Intitle use for such purpose. allintitle: java programming

9. Intitle: Showing a word sought in the TITLE page. Example below will produce a page that a title and contents of the java page that contains the word enterprise intitle: java enterprise.

10. ALLINURL: Displays all the search words in the URL. Example below will generate a list of that contain the word java and programming. allinurl This can not be combined with operator (syntax) others. Inurl use for such purpose. allinurl: java programming

11. Inurl: Displaying a word is searched in the URL. Example below will generate a list of URLs that contain the word java and content of the page that contains the word enterprise inurl: java enterprise .
That we do will be more effective when we try to combine some of your service both in the search feature and basic information. For example, we want to search PDF files on the site www.pdii.lipi.go.id. Then we combine the two into the service:
filetype: pdf site: www.pdii.lipi.go.id
Sign up on the Way Blog Eearch Engine
12:26 AM | Author: IT Blog
Many ways can we do so we can blog in the known and visited, among others, is to rajinnya we blogwalking visit to a blog or another property, register to various Aggregator, and the most effective is through search engines or search engine.

For the beginner blogger may berangggapan that when we create a website or blog will be automatically indexed, or are on the list the various search engines, and the fact is not so. For the beginner blogger may berangggapan that when we create a website or blog will be automatically indexed, or are on the list the various search engines, and the fact is not so. As well as a school, so we registered the name in the book list of students, of course we have to register first to the school. As well as a school, so we registered the name in the book list of students, of course we have to register first to the school. Similar to a search engine, so that our blog indexed in search engines, then we must first register on our blog site owned by search engine owners. Similar to a search engine, so that our blog indexed in search engines, then we must first register on our blog site owned by search engine owners.

The number of search engines is very much, and at this the most famous in the world is Google, Yahoo, and Msn. The number of search engines is very much, and at this the most famous in the world is Google, Yahoo, and Msn. If we want to blog indexed on their search engine, it is our obligation to register the URL of our blog on their search engine. If we want to blog indexed on their search engines, it is our obligation to register the URL of our blog on their search engine. When there is not need to know where to register the blog, then please see any posts following: When there is not need to know where to register the blog, then please see any posts below:
# Register Google To sign up to google, please visit http://www.google.com/addurl/ buddy, when already there are on the registration page there are several steps that need to be doing, that is fill in the form provided: Google To register Register to google, please visit our COMRADE http://www.google.com/addurl/, when there already are on the registration page there are several steps that need to be doing, that is fill in the form provided:
# URL -> Content with blog URL comrade. URL -> Content with blog URL COMRADE.
# Comments -> Content with the keyword or keywords that are related to the blog sobat Comments -> Fill in the keyword or keywords that are related to the blog buddy
# Fill in the blank with the verification letter is available Fill in the blank with the verification letter is available
# Click the Add button Click the Add URL button URL
# Finish. After comrade registering to Google, it does not necessarily blog indexed comrade on its search engine, but will require 3 to 4 days a new blog buddy can be indexed. COMRADE Selesai.Setelah registering to Google, it does not necessarily blog indexed COMRADE on its search engine, but will require 3 to 4 days a new blog buddy can be indexed. If you have 3 to 4 weeks, then try typing the address on the blog buddy google search engine, is already indexed or not? If you have 3 to 4 weeks, then try typing the address on the blog buddy google search engine, is already indexed or not? if not, try waiting a few weeks more, and write back address blog buddy, If that is not yet as well, try again deh daftarin blog to google it like the above steps. if not, try waiting a few more weeks, and write back address blog buddy, If that is not yet as well, try again daftarin deh blog to google it like the above steps. Comrade or may not want to fast forward indexed, this could actually happen, only in 3 or 4 days only blog buddy can already indexed in google. Comrade or may not want to fast forward indexed, this could actually happen, only in 3 or 4 days only blog buddy can already indexed in google. Want to know how? Want to know how? see ya next posting only, may be one to two days before I make the finished article. see ya next posting only, may be one to two days before I make the finished article.
# List of Yahoo! To sign up to yahoo! Register Yahoo! To sign up to yahoo! buddy please visit https: / / siteexplorer.search.yahoo.com / submit. buddy please visit https: / / siteexplorer.search.yahoo.com / submit. However, to register to yahoo, comrade must first have a yahoo account, because the need to first log in to yahoo account. However, to register to yahoo, COMRADE must first have a yahoo account, because the need to first log in to yahoo account. For those who do not have my account (email on yahoo) please make first, for those who already have, comrade living login with the username and password buddy. For those who do not have my account (email on yahoo) please make first, for those who already have, COMRADE living login with the username and password buddy. If already logged in, it is available later in the column to fill, please fill in the field with the URL comrade, and then click the Add button URL, complete. If already logged in, it is available later in the column to fill, please fill in the field with the URL COMRADE, and then click the Add URL button, complete. If you want to enter your feed address, can memasukannya comrade. If you want to enter your feed address, can memasukannya COMRADE. Remember, feed address in blogger only add atom.xml blog URL on the back comrade, for example: for my blog has a feed address as follows: Remember, feed address in blogger only add atom.xml blog URL on the back COMRADE, for example : my blog has a feed address as follows:

http://Merito.wordpress.com.com/atom.xml http://Merito.wordpress.com.com/atom.xml

or use the www is the same: or use the www is the same:

http://www.merito.wordpress.com/atom.xml http://www.merito.wordpress.com/atom.xml
# To Register to Msn Msn to list, please visit http://search.msn.com/docs/submit.aspx?FORM=WSDD2 comrade comrade please fill in the verification letter and comrade URL in the box provided and click the Submit URL done. To list to the list to Msn Msn, please visit our COMRADE http://search.msn.com/docs/submit.aspx?FORM=WSDD2 buddy please fill COMRADE verification letter and a URL in the box provided and click the Submit URL finished.

If the buddy has more desire, the blog URL in the tens of comrade indexed search engine, use the buddy can help the site submitter. If the buddy has more desire, the blog URL in the tens of COMRADE indexed search engines, use the buddy can help the site submitter. Try to just click the banner below: Try to just click the banner below:

Submit Your Site To The Web's Top 50 Search Engines for Free!

The task of filling sobat only own blog URL address, email address and write it, and then click the Submit Your Site. The task of filling comrade only own blog URL address, email address and write it, and then click the Submit Your Site.

If you want more quickly famous try to do ping bebagai Aggregator, please click the banner below: If you want more quickly dont try to do ping bebagai Aggregator, please click the banner below:



Live comrade fill in the form provided. Live COMRADE fill in the form provided.

Have buddy blog indexed in google? Have buddy blog indexed in google? try to enter an address on the blog buddy google search engine which is available under this posting try to enter an address on the blog buddy google search engine which is available under the posting this