Popular Posts

Wednesday, December 1, 2010

for pay per post experiment

Why am I getting strange traffic to my blog after I publish changes?

for pay per post experiment

CSMA/CD
There is no central control management when computers transmit on Ethernet.



Exponential Back Off:
Even with random delays, collision may occur especially likely with busy segments. 


Bit Stuffing
Byte stuffing refers stuffing with character  oriented hardware and bit stuffing refers to bit oriented hardware.

 The modified record may be written into an overflow
area, forcing either multiple read operations at query time or reorganizing and rewriting the
previous area.


Columnar database column-based structure
The newer column structure has gained interest as the indexing and data transfer
problems associated with record structures have proved problematic for analytics
applications. 


small that the entire set of all data values can frequently stay in memory, affecting I/O
bandwidth only when the system is started.


Relational Database (RDBMS)

There are many commercial variations of record-based databases available.


In VBS, each unique data value is stored only once,
making the database extremely compact and fast.

Conclusion
Despite their limitations, rrecord-based relational databases have long been the prevailing
data structure used in data warehouse systems

that are impractical or impossible with other data structures

56k Modems

Uploading

Downloading

Result
Mode

Multimode     Step-index          Graded-index

Single Mode


LECTURE # 4


Performance of Medium:
  Throughput
   Propagation Speed
   Propagation Time


Types of Digital Services


LECTURE #  21

Internet


Press
To
CTRL+C
Copy.
CTRL+X
Cut.
CTRL+V
Paste.
CTRL+Z
Undo.
DELETE
Delete.

SHIFT when you insert a CD into the CD-ROM drive
Prevent the CD from automatically playing.



F1
Display Help.
F4
Display the items in the active list.
BACKSPACE
Open a folder one level up if a folder is selected in the Save As or Open dialog box.

Search for computers.

Accessibility keyboard shortcuts


RIGHT ARROWDisplay current selection if it's collapsed, or select first subfolder

A computer running Windows XP Professional ("remote" computer) with a connection to a Local Area Network or the Internet.

Ensure that Remote Desktop Web Connection is installed and running on the Web server. For more information, see Setting up Remote Desktop Web Connection.

You can now make free calls from your pc to any mobile in the world


very Excelent Result of AVG 9.0 proofed.


When you publish to your blog, your blog goes into a huge database, listing blogs just updated. You can see a replica of this database in the Recently Updated Blogs list

More Traffic To Our Blogs?

AVG virus database


When you publish to your blog, your blog goes into a huge database, listing blogs just updated.

Sunday, November 28, 2010

Randomly generated sentance

When you publish to your blog, your blog goes into a huge database, listing blogs just updated.

AVG virus database

AVG virus database. Via the update process, these new definitions are downloaded to your computer so that you are always reliably protected even against the latest threats.
Online Threats

More Traffic To Our Blogs?

More Traffic To Our Blogs?

Recently, we see periodic queries about strange visitors to our blogs.
Why does my StatCounter log show odd links into my blog?
What is "www.blogger.com/navbar.g?targetBlogID=", and why do I see traffic from that link?
Why am I getting strange traffic to my blog after I publish changes?

Monday, November 1, 2010

More Traffic To Our Blogs?


More Traffic To Our Blogs?

Recently, we see periodic queries about strange visitors to our blogs.
Why does my StatCounter log show odd links into my blog?
What is "www.blogger.com/navbar.g?targetBlogID=", and why do I see traffic from that link?
Why am I getting strange traffic to my blog after I publish changes?



All of these questions, until Mid November 2009, were related to the same thing - the "Next Blog" link in the Navbar. Now, all of this is changed.


When you publish to your blog, your blog goes into a huge database, listing blogs just updated. You can see a replica of this database in the Recently Updated Blogs list. The RUB list is huge - it shows a 10 minute slice of Blogger publishing, and at any time, will have from 4,000 - 8,000 entries, with new entries constantly being added (just as old ones drop off the list).

The RUB database is important to the Blogosphere. When anybody clicks on the "Next Blog" link in the Navbar, an entry from that database results in the link leading to someone's blog. Ifyour blog was just updated, chances are that someone will land on your blog, and your visitor meter will show another entry.

In the recent past, there were hundreds of thousands of illegal blogs, created by spammers and being constantly published. Until January 2008, many people clicking on "Next Blog" would have landed on such a blog, which was created for the sole purpose of hacking your computer, and delivering spam to your desktop, and to other peoples email.

A bit over a week ago, Google put a stop to this. Now, owners of many (but not all) genuine blogs, like yours and mine, are seeing more traffic, when we publish changes. The traffic comes from the "Next Blog" link, which is seen in visitor logs as originating from "www.blogger.com/navbar.g".

If you see the new traffic in your logs, don't be alarmed. It's not somebody trying to hack you, or to steal blog content. It's ordinary bloggers, and bloggers readers, surfing to random blogs, using "Next Blog". It's what the "Next Blog" link was created for.

Enjoy the traffic to your blog. Publish more, and enjoy more. More readers for you, which is why you blog, right? Having said all of that, I will advise you that, if your blog contains any questionable content, particularly interesting pictures that you wouldn't want your kids to see, you need to be aware of, and you may need to use, the Content Warning setting in Settings - Basic. Or, you can block traffic from "Next Blog", if you really feel the need.


Note that this post is about the "Next Blog" link in the navbar. It's not here so you can get more traffic to your blog, by posting
Great post!
Here's my blog: http://mypimpedblog.blogspot.com
If that's your intent, go away.



(Update 2009/11/12): The next generation of "Next Blog" is here, and it's totally different.

Sunday, October 31, 2010

very Excelent Result of AVG 9.0 proofed.

The AVG virus database contains known virus definition. AVG virus experts work hard to identify and explain the latest viruses as soon as these become known (which happens every day), and add the definition to the AVG virus database. Via the update process, these new definitions are downloaded to your computer so that you are always reliably protected even against the latest threats.
Online Threats
Nowadays, there are far more threats out there than plain viruses. You have probably come across the term spyware as well, however, authors of hateful codes and dangerous websites are very modern, and new kinds of threats emerge quite often, the vast majority of which are on the Internet. Here are some of the most common:
Exploit is a malicious code that takes advantage of a flaw or vulnerability in an operating system, Internet browser, or other essential program.
Social engineering is a common term for various techniques used to trick people into giving away their personal information (passwords, bank account details, credit card numbers etc.). A typical example of social engineering is phishing – an attempt to acquire sensitive personal data by shamming a trustworthy and well-known organization. Usually, the potential victims are contacted by a bulk e-mail asking them to e.g. update their bank account details. In order to do that, they are invited to follow the link provided which then leads to a fake website of the bank.
Scam can be also considered a kind of social engineering; it includes false job offers, or ones that will abuse the workers for illegal activities, summons to withdraw a large sum of money, fraudulent lotteries and the like.
Hoax is a bulk e-mail containing dangerous, alarming or just bothering and useless information. Many of the above threats use hoax e-mail messages to spread.

Finally, malicious websites are ones that deliberately install malicious software on your computer, and hacked sites do just the same, only these are legitimate websites that have been compromised into infecting visitors.

To protect you from all of these different kinds of threats, AVG includes these specialized components:
·
Anti-Virus to protect your computer from viruses,
·
Anti-Spyware to protect your computer from spyware,

·
Online Shield (only in AVG Professional) to protect you from both viruses and spyware when surfing the Internet,
·
Link Scanner to protect you from other online threats mentioned in this chapter.




I am recommend you that daily update the AVG virus Database. To keep protected from the latest virus. And you very comfortable when you daily update the avg antivirus against the latest threats.







AVG Interface
System plate Icon
AVG 9.0 Free Edition launches automatically upon Windows startup, and you can see its icon in the system tray (right floor part of the screen). The icon indicates the current Security Status, i.e. whether AVG is working properly or not.

The purpose of the Security Status is to warn you instantly if there is a problem:
The AVG icon in the system tray (usually right bottom corner of your screen, see picture) shows an exclamation mark, and warning bubbles pop up above the system tray.
How do I fix error Security Status?

Main Screen
The main screen is the front of the AVG application, offering an overview of all installed mechanism and allowing you to access all functions. To display the Main Screen, either:
·
Double-click the AVG icon (on the desktop, or in the system tray), or
·
Use the Start menu -> Programs -> AVG 9.0 Free Edition -> AVG User Interface
What can I see on the Main Screen?

To shut down AVG Interface, use the Main Screen -> Main Menu File -> Exit.
Please note that you only close the interface indeed; the AVG system keeps running in the computer memory at all times.


minute workers Web Hosting