I am very happy to introduce myself as a web promotion expert. I am sure & confident that I can promote any website. After my promotion techniques, your website will be available on first page in Google within 7 days...that’s for sure.
I look forward to promote your website…

Friday, June 24, 2011

आपकी प्रोफाइल से पैसे कमा रहा है फेसबुक

क्या आप विश्वास करेंगे की जिस फेसबुक का इस्तेमाल आप सोशल नेटवर्किंग लिए करते हैं वो आपकी प्रोफाइल से ही पैसे कमा रही है। दुनिया की प्रसिद्ध नेटवर्किंग साइट फेसबुक आप संबंधित सूचनाओं, आपकी प्रोफाइल वगैरह से पैसे कमा रहा है। वह इन सभी को विज्ञापनदाताओं को बेच रहा है जिससे उसे अच्छी आय हो रही है।



फेसबुक अपने यूजर की हर सूचना विज्ञापन कंपनियों को दे रहा है जो अपनी जरुरत के हिसाब से उन तक पहुंच रहे हैं मसलन अगर किसी यूजर की सगाई हो गई और उसने इस खबर को फेसबुक पर जाला तो उसे वेडिंग प्लानर से लेकर कैटरर तक के मैसेज स्वत: आ जाएंगे। इसी तरह अपनी हॉबी के बारे में लिखने वालों को उसके अनुरुप मैसेज आएंगे।



लॉस एंजिलिस टाइम्स के मुताबिक फेसबुक इस तरह से मार्केटिंग का बहुत बड़ा जरिया बन जाएगा।लेकिन आलोचक फेसबुक की इस पहल को पसंद नहीं कर पा रहे हैं। उनका कहना है कि यूजर की अनुमति के बिना ऐसा करना गलत है।

Kids Online Internet

Not so long ago, kids climbed trees, played on lawns and read books and the risks they largely faced were bruised knees. Now, they're glued to iPads and browse the internet for almost one to two hours every day. The risks? Extremely alarming. They tell unknown "friends" their parents' credit card numbers and almost one-fourth are exposed to adult content.

Meet the Facebook generation that's becoming increasingly vulnerable in faceless webscape.

According to the findings of a McAfee-Synovate survey among 500 children across ten cities, 42% kids spend 1-2 hours online every day. The survey was conducted in 10 cities among children between 9 and 17 years.

As many as 64% of the 9-12 age group are part of social networking sites. And the information they share there is rather scary -- 12% shared their parents' credit card details, 30% videos, 40% photographs and 57% their school details and 58% their home address.

Bangalore ranks second among the ten cities on exposure to adult content. While 40% in Mumbai had browsed adult content, in Bangalore it was 28%. On an average, 80% had a personal computer (except in Hyderbad, Ahmedabad and Pune).

The awareness among parents on the threats the children are exposed to is varied -- 42% of children don't share with their parents their online activities and 20% were not happy with parents advising them on what to see online.

Sunday, June 19, 2011

"What is a .cc (dot cc) domain?

Answer: The .cc domain suffix is the top-level domain (TLD) for the Cocos Islands. However, it is commonly used as an alternative to the '.com' suffix for commercial Web sites.

The .cc suffix is convenient because it is short and easy to say. However, not all Web hosting companies support .cc domains and they are not offered by many domain name registrars. Therefore, it is usually better to use an alternate domain name with a .com, .net, or .org suffix instead of selecting a .cc domain name."

Saturday, June 18, 2011

"Spyware, adware, and internet cookies. What's good and what's bad. Privacy and removal tips and help.

What is spyware? What is adware?

Spyware is simply a program (or multiple programs) that run on your pc and spy on your activities, most often displaying you advertisements based on your activities. This is also known as adware. Many times you will see popups, or ads on webpages that are really only displayed to you because you have been browsing these types of items and they are now displaying ads related to this. Many ads are just random ads also from the adware, as you may think a site is full of popups or that a site is slow loading, but its really just your pc and all the spyware and adware programs running on it.
What are web cookies?

Web cookies are simply bits of software placed on your computer when you browse websites. Not all websites have these, but many do, especially the large well-known websites. Websites use cookies so they can track what you are viewing, and although they won't necessarily know you by name (lets hope it never gets to that point), the website will recognize your computer when you come back to visit again.

What is bad about cookies?

People do not like being tracked. Even if some companies mean no harm, people still do not like the fact they are being monitored while they browse. Cookies can also show links in them if someone happens to look at them on your pc. For example, if you wife is on the pc and happens to browse any cookies (they are just viewable text files with other mumbled garbage which the websites can interpret), she may not like the fact that you have been viewing sex sites (or vice versa). Most of the websites that store the cookies, will have the site name or link visible in the cookie on your machine, so its normally easy to tell where the cookie came from.

What good are cookies?

Cookies have some beneficial things. For example, when you log on to certain sites, did you ever notice that when you return again you do not have to sign on the next time? Thats because it stored your password and id on your machine in a cookie. The same holds true when you purchase goods online, you can return later and your goods are still in your shopping cart (in a cookie!). Cookies are also very beneficial to websites trying to market to you. (Some consider this bad for the consumer as many do not want websites tracking what you like to view online!). For example, if you go to one of the major search engines, like yahoo.com, google.com, search.aol.com, etc. and search for 'web cookies', the next time you come back to the website to search again, you may see a large picture or cookie advertisement at the top of your screen. This is NOT what everyone sees, only you! They know you like this alot because you searched for it last time you were there, so they now show you advertisements because it may be something targeted towards your buying habits.

How do I get rid of cookies?

There is an option in your browser to ask if you want to accept cookies, but that is a real pain because you constantly are clicking buttons saying 'no'. It makes browsing very difficult when you spend all your time answering 'no' to every cookie, since they are all over the net on most websites. I recommend downloading the software program 'Complete Cleanup' at this site. This is the easiest program to use and the best program I have found for safely removing all the cookies on your machine (also cleans up many other things).

What are cache files? Are these related to cookie files?

Cache files help your browser go faster since it caches the files to be used. These are also left behind on your pc and includes everything, including pictures, sound files, video files, and text that you have browsed. If you share your pc in any way, you probably want to keep these cleaned when you get done browsing (see previous paragraph for removing these).

How does spyware or adware get on my pc?

Most spyware or adware occurs because of downloading freebie software (when something is totally free, you have to figure people have to make money somewhere), so that when you install it there are hidden programs installed with it that show you the ads. Normally this doesn't happen with shareware as shareware is free to try, then either expires or stops working, so you have to pay a small fee. Shareware usually comes with support for any questions you have also, as freeware does not, so if you get spyware or adware from a freeware installation then you are stuck trying to find it and remove it yourself. Many spyware or adware programs also can be installed by visiting rogue webpages that have security flaws, allowing these programs to be installed on your pc without your knowledge. This is typically done through ActiveX or Java security holes, but thats a more technical issue that we won't get into here, this is just to inform you where adware and spyware come from.

How do I track and find spyware or adware?

There are many programs on the internet that will attempt to find this for you, some work and some don't. The best way is to track what is really running on your pc when you reboot your machine, everything needs a way to startup when you reboot so you can find and kill it there. There are also browser objects that run when you open your web browser. Look for for a program named Spy Guardian Pro, it will track these for you and allow you remove them (they will also evaluate your system for free if you are a registered user of this program, but this is a shareware program). Many of the spyware programs out there that look for program names to remove simply are not accurate, so get used to viewing your programs that run in your browser and in your startup lists, and you will be way ahead of most people. Its actually fairly simple to do and can eliminate spyware or adware at the root.

Is it safe to buy stuff online? Are cookies used for this?

I have done a ton of shopping online, for clothes, cd's, books, and I have even bought groceries with my credit card online. I have never had a problem, and I personally feel it is safer than handing the credit card to a waiter at a restaurant. Cookies are used alot during internet shopping also, but in a good way. They often are used to store (for example, your clothes you have added to the shopping cart) your order on your machine. If you logoff and back on, your order is still there and you can continue shopping. They can of course, be used to market banners and advertisements towards you based upon what you were shopping or looking for.

What is the best way to keep my information private? How do I keep my email from getting spammed?

Most websites today that sell anything online are pretty good about keeping your information confidential (obviously not all of them though). Many even state this when you are ordering, as there is normally a link saying that they keep information private. You can help limit your information by not filling in information on sites that are NON-ordering sites. For example, you know those sites that want to send you a free magazine by just filling in your information and clicking ok? Many of those sites are giving you free stuff so they can get your information. If you wish to keep the cookie and history information left behind on your pc cleaned up, then you can use the software that I listed above in the previous paragraphs above. If you would like to keep you email from getting spammed, you can do a few things. First, send them a nice email and tell them not to email you again, or if you have an AOL account, there is blocking features on the email that you can set to block specific emails, or only allow specific emails. This can save you the trouble of even asking someone to stop, just simply shut them off! You can also get one of many free email services if you don't want to give anyone your main email, so there is alot of options for you to choose."

Spyware, adware, and internet cookies. What's good and what's bad. Privacy and removal tips and help.

What is spyware? What is adware?

Spyware is simply a program (or multiple programs) that run on your pc and spy on your activities, most often displaying you advertisements based on your activities. This is also known as adware. Many times you will see popups, or ads on webpages that are really only displayed to you because you have been browsing these types of items and they are now displaying ads related to this. Many ads are just random ads also from the adware, as you may think a site is full of popups or that a site is slow loading, but its really just your pc and all the spyware and adware programs running on it.

What are web cookies?

Web cookies are simply bits of software placed on your computer when you browse websites. Not all websites have these, but many do, especially the large well-known websites. Websites use cookies so they can track what you are viewing, and although they won't necessarily know you by name (lets hope it never gets to that point), the website will recognize your computer when you come back to visit again.

What is bad about cookies?

People do not like being tracked. Even if some companies mean no harm, people still do not like the fact they are being monitored while they browse. Cookies can also show links in them if someone happens to look at them on your pc. For example, if you wife is on the pc and happens to browse any cookies (they are just viewable text files with other mumbled garbage which the websites can interpret), she may not like the fact that you have been viewing sex sites (or vice versa). Most of the websites that store the cookies, will have the site name or link visible in the cookie on your machine, so its normally easy to tell where the cookie came from.

What good are cookies?

Cookies have some beneficial things. For example, when you log on to certain sites, did you ever notice that when you return again you do not have to sign on the next time? Thats because it stored your password and id on your machine in a cookie. The same holds true when you purchase goods online, you can return later and your goods are still in your shopping cart (in a cookie!). Cookies are also very beneficial to websites trying to market to you. (Some consider this bad for the consumer as many do not want websites tracking what you like to view online!). For example, if you go to one of the major search engines, like yahoo.com, google.com, search.aol.com, etc. and search for "web cookies", the next time you come back to the website to search again, you may see a large picture or cookie advertisement at the top of your screen. This is NOT what everyone sees, only you! They know you like this alot because you searched for it last time you were there, so they now show you advertisements because it may be something targeted towards your buying habits.

How do I get rid of cookies?

There is an option in your browser to ask if you want to accept cookies, but that is a real pain because you constantly are clicking buttons saying "no". It makes browsing very difficult when you spend all your time answering "no" to every cookie, since they are all over the net on most websites. I recommend downloading the software program "Complete Cleanup" at this site. This is the easiest program to use and the best program I have found for safely removing all the cookies on your machine (also cleans up many other things).

What are cache files? Are these related to cookie files?

Cache files help your browser go faster since it caches the files to be used. These are also left behind on your pc and includes everything, including pictures, sound files, video files, and text that you have browsed. If you share your pc in any way, you probably want to keep these cleaned when you get done browsing (see previous paragraph for removing these).

How does spyware or adware get on my pc?

Most spyware or adware occurs because of downloading freebie software (when something is totally free, you have to figure people have to make money somewhere), so that when you install it there are hidden programs installed with it that show you the ads. Normally this doesn't happen with shareware as shareware is free to try, then either expires or stops working, so you have to pay a small fee. Shareware usually comes with support for any questions you have also, as freeware does not, so if you get spyware or adware from a freeware installation then you are stuck trying to find it and remove it yourself. Many spyware or adware programs also can be installed by visiting rogue webpages that have security flaws, allowing these programs to be installed on your pc without your knowledge. This is typically done through ActiveX or Java security holes, but thats a more technical issue that we won't get into here, this is just to inform you where adware and spyware come from.

How do I track and find spyware or adware?

There are many programs on the internet that will attempt to find this for you, some work and some don't. The best way is to track what is really running on your pc when you reboot your machine, everything needs a way to startup when you reboot so you can find and kill it there. There are also browser objects that run when you open your web browser. Look for for a program named Spy Guardian Pro, it will track these for you and allow you remove them (they will also evaluate your system for free if you are a registered user of this program, but this is a shareware program). Many of the spyware programs out there that look for program names to remove simply are not accurate, so get used to viewing your programs that run in your browser and in your startup lists, and you will be way ahead of most people. Its actually fairly simple to do and can eliminate spyware or adware at the root.

Is it safe to buy stuff online? Are cookies used for this?

I have done a ton of shopping online, for clothes, cd's, books, and I have even bought groceries with my credit card online. I have never had a problem, and I personally feel it is safer than handing the credit card to a waiter at a restaurant. Cookies are used alot during internet shopping also, but in a good way. They often are used to store (for example, your clothes you have added to the shopping cart) your order on your machine. If you logoff and back on, your order is still there and you can continue shopping. They can of course, be used to market banners and advertisements towards you based upon what you were shopping or looking for.

What is the best way to keep my information private? How do I keep my email from getting spammed?

Most websites today that sell anything online are pretty good about keeping your information confidential (obviously not all of them though). Many even state this when you are ordering, as there is normally a link saying that they keep information private. You can help limit your information by not filling in information on sites that are NON-ordering sites. For example, you know those sites that want to send you a free magazine by just filling in your information and clicking ok? Many of those sites are giving you free stuff so they can get your information. If you wish to keep the cookie and history information left behind on your pc cleaned up, then you can use the software that I listed above in the previous paragraphs above. If you would like to keep you email from getting spammed, you can do a few things. First, send them a nice email and tell them not to email you again, or if you have an AOL account, there is blocking features on the email that you can set to block specific emails, or only allow specific emails. This can save you the trouble of even asking someone to stop, just simply shut them off! You can also get one of many free email services if you don't want to give anyone your main email, so there is alot of options for you to choose.

Saturday, May 7, 2011

Google: India Has 100M Internet, 40M Mobile Internet Users; India Search Trends..

“Search queries originating from India have grown 20 times in the last five years, Rajan Anandan, VP-Sales & Operations at Google India, adding that for Google, India is the third biggest Internet market in terms of users, with over 100 million internet user base, adding that 40 million people in India access the Internet from work, and 30 million from Cafes, apart from 11 million households that have a broadband connection installed. Anandan, speaking at the VC Circle E-Commerce Forum, held in Delhi last week, made a strong pitch for the Internet, saying that the amount of time that an average user in India spends online is now on par to TV viewing time at 16 hours in a week.

On the Mobile Internet, Anandan said that more than (according to Google estimates) 40 million Internet users in India access it through their mobile phones and there are 30 million app downloads in one week. The number of search queries originating from mobile phones have grown four times in the last 12 months and 50 times since 2007. Anandan predicted that more than 300 million people in India would be hooked on to mobile internet by the year 2015.

Segment Specific Search Trends

Anandan emphasized on the fact that Indians go online to search for product information and believe in Research Online and Buy offline. He gave an estimated breakup for various product categories:

- Auto – 33% Research online Buy Offline and 3% Research and Buy Online
- Healthcare- 39% Research online Buy Offline and 5% Research and Buy Online
- Media and Entertainment- 26% Research online Buy Offline and 16% Research and Buy Online
- Retail – 65% Research online Buy Offline and 19% Research and Buy Online
- Technology Products- 72% Research online Buy Offline and 21% Research and Buy Online
- Internet Banking: Google also found that the weekly queries for Internet banking have gone up 200 times in the last 18 months, which shows a lot of Indians want to bank online.

Travel Search

- 40% Research online Buy Offline and 29% Research and Buy Online
- 50% searches in India were for budget hotels that offered sub Rs 5000 a night tariff. He said that this was an indication about potential of the segment and the need for building more ‘Ginger’ like hotels.
- This was followed by Air travel queries at 27%
- Holidays at 10%
- Bus and rail at 7.42%
- Car rentals at 1.97%.

Local Search Opportunity

Anandan pointed out that there was a massive untapped opportunity in local searches, which have increased five times over the last year and out of the total, 50% are made from mobile phones. Only 45% of those local search queries are covered by Indian businesses and the rest remain unresolved. He advocated the Microtransaction payment model, keeping in mind the sheer volume of users in the country.

E-Commerce Payment Issues

Anandan felt that E-Commerce companies in India are not doing enough to address the segment and payment hiccups, lack of awareness and trust and a good online experience were the barriers in the growth of e-commerce in the country. He mentioned that most companies were using outsourced Internet marketing, which should be avoided beyond a point. Each should have a designated CTO and Technology team to avoid hiccups.

He said that e-commerce companies need to focus on the website design to make it clean, fast and give the user a great online experience by doing things like avoiding pop-ups to register when the user lands on the site. They need to integrate social and search elements but at the same time keep it relevant and cover the entire customer landscape.

On the payment side, he stressed on the need for cash on delivery as a viable payment option, saying that players who don’t want to do cash on delivery should not get into e-commerce.

www.rajeshgoutam.com

in reference to: Google (view on Google Sidewiki)

New Updates.......

Face-book and Google consider buying or partnering with Skype, report says

in reference to: Google (view on Google Sidewiki)

Thursday, April 14, 2011

How to find? Your computer is running a 32-bit version or 64-bit version of the Windows operating system.

Windows Vista or Windows 7
If you have Windows Vista or Windows 7, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System window in Control Panel

1. Click Start
Collapse this imageExpand this image
Start button
, type system in the Start Search box, and then click system in the Programs list.
2. The operating system is displayed as follows:
* For a 64-bit version operating system: 64-bit Operating System appears for the System type under System.
* For a 32-bit version operating system: 32-bit Operating System appears for the System type under System.

Method 2: View System Information window

1. Click Start
Collapse this imageExpand this image
Start button
, type system in the Start Search box, and then click System Information in the Programs list.
2. When System Summary is selected in the navigation pane, the operating system is displayed as follows:
* For a 64-bit version operating system: x64-based PC appears for the System type under Item.
* For a 32-bit version operating system: x86-based PC appears for the System type under Item.

If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.

Windows XP
If you have Windows XP, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel

1. Click Start, and then click Run.
2. Type sysdm.cpl, and then click OK.
3. Click the General tab. The operating system is displayed as follows:
* For a 64-bit version operating system: Windows XP Professional x64 Edition Version < Year> appears under System.
* For a 32-bit version operating system: Windows XP Professional Version appears under System.
Note is a placeholder for a year.

Method 2: View System Information window

1. Click Start, and then click Run.
2. Type winmsd.exe, and then click OK.
3. When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
* If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
* If the value that corresponds to Processor starts with ia64 or AMD64, the computer is running a 64-bit version of Windows.

If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.
Windows Server 2003
If you have Windows Server 2003, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel

1. Click Start, and then click Run.
2. Type sysdm.cpl, and then click OK.
3. Click the General tab. The operating system is displayed as follows:
* For a 64-bit version operating system: Windows Server 2003 Enterprise x64 Edition appears under System.
* For a 32-bit version operating system: Windows Server 2003 Enterprise Edition appears under System.

Method 2: View System Information window

1. Click Start, and then click Run
2. Type winmsd.exe, and then click OK.
3. When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
* If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
* If the value that corresponds to Processor starts with EM64T or ia64, the computer is running a 64-bit version of Windows.

in reference to: Google (view on Google Sidewiki)

Friday, April 1, 2011

E-commerce vs M-commerce

E-commerce vs M-commerce

In today’s fast developing technological world, businesses are usually transacted online. These online transactions are called m-commerce and e-commerce. E-commerce is a term that has been around for a long time already. This term is about conducting business online, and everybody knows about that. However, with the rise of m-commerce, certain confusions also rose. Both of them are about transacting business online, but there is still a significant difference between the two. To clear these confusions, it is best to define and differentiate these terms.

The meaning of commerce means, conducting a business transaction, whether it is promotional or selling products, goods, and services. The “m” in the term m-commerce means mobile. M-commerce then, is a type of business transaction done on your mobile phone; providing your mobile phone has Internet access. Lately, phones have Internet access, like 4G, which makes these transactions more accessible. With the rise of phones with Internet access, this kind of business transaction has become very popular. M-commerce has become a booming business lately.

With the use of m-commerce, there are plenty of products and promotional items that can finally be transacted. Movie tickets can be bought via your phone with Internet access. Not only that, you can also avail coupons, loyalty cards, and discount cards through you mobile phone with the help of m-commerce. M-commerce can also let you do mobile banking, and let you use your money in different companies. Just like using a laptop or a desktop, as long as your phone has Internet access, so too can you shop until you drop using m-commerce.

E-commerce, on the other hand, is an abbreviation of electronic commerce. This means that e-commerce is a way of doing business transactions through the Internet as well. If you have a laptop or a desktop then you can easily shop online. It has become very popular in these modern days. Not only can it help you do transactions online, it is also very convenient with all the swipe machines where you can swipe your credit card for payment. People can do a business-to-business transaction via e-commerce called B2B. It can also do a company to consumer transaction called B2C. This is where your orders will be received via shipments and deliveries. You can use credit cards when doing these transactions. One of the best examples for this is when amazon.com do business with their clients. Another popular online shopping site is eBay.

SUMMARY:

1.

M-commerce means using mobile phone with Internet access, while e-commerce needs a laptop or desktop, but both are performed online.
2.

You can pay an e-commerce transaction through swipe machines where you swipe you credit cards, m-commerce does not have this yet.
3.

M-commerce is more portable compared to e-commerce, because mobile phones are easy to carry.
4.

The “m” in m-commerce means mobile phone, while the “e” in e-commerce means electronic.

Read more: Difference Between E-commerce and M-commerce | Difference Between | E-commerce vs M-commerce http://www.differencebetween.net/business/difference-between-e-commerce-and-m-commerce/#ixzz1IGhRjOIz

in reference to: Google (view on Google Sidewiki)

Wednesday, February 16, 2011

DNS Records (NS, A, MX, CNAME, SPF) Explained!

Your domain name has a DNS zone which consists of the following records:

* NS - specifies which are the DNS servers for your domain;
* A - specifies IP addresses corresponding to your domain and its sub domains;
* MX - specifies where the emails for your domain should be delivered;
* CNAME - specifies redirects from your domain's subdomains to other domains / subdomains;
* SPF - Sender Policy Framework (SPF) is an attempt to control forged e-mail.

in reference to: Google (view on Google Sidewiki)

Sunday, February 13, 2011

Online Market Is Growing..... Americans watching more videos online

As many as 49 percent of all Americans now incorporate online video into their everyday lives. They are also watching more videos online per day, with 66 percent of respondents indicating that they view more videos than they did 12 months ago.

in reference to: Google (view on Google Sidewiki)

B2B online marketing proves to be resilient in 2010

With many Americans increasingly turning to online communication channels in 2010, firms are seeing more return on their B2B online marketing initiatives, comScore reports.

According to comScore's 2010 U.S. Digital Year in Review report, several online marketing channels are seeing more use from Americans. For example, one out of every eight minutes spent online is now devoted to social media platforms, with 90 percent of Americans visiting social networks every month.

Further, the number of people who conducted search queries increased by 4 percent in 2010. Meanwhile, the overall volume of searches performed by Americans rose by 12 percent over the course of the year.

"2010 was a very positive year for the digital media industry, highlighted by ... significant innovation and increased demand for online advertising" said comScore chairman Gian Fulgoni. "As we embark on a promising 2011, marketers must have a sound understanding of the digital media landscape and how it is changing if they hope to capitalize on key trends that can drive their business into the future."

While the number of queries conducted in 2010 rose, the search landscape is growing increasingly more complex. According to Experian Hitwise, Bing is gaining more market share each month, with a growth of 21 percent in January.

Thanks

http://www.rajeshgoutam.com

in reference to: Google (view on Google Sidewiki)

Friday, February 11, 2011

Online Market Updates!!!

Online marketing industry size to touch Rs 2k crore by 2013...

As rules of the advertising game change rapidly, online or digital marketing market size in India is estimated to touch close to Rs 2,000 crore in the next two years from a Rs 1,400 crore now, say management experts.

in reference to: Google (view on Google Sidewiki)

Saturday, February 5, 2011

Hey want to know more about Port's???

FTP: 20, 21,
SMTP: 28,
HTTP: 80,
SSL:443,
DNS: 53
POP3:110
SMTP:25
NNTP:119
IMAP:142

SSL port no:

HTTP: 443
SMTP:456
POP3:995
IMAP:993
NNTP:563
LDAP:636

>>>>>>

in reference to: Google (view on Google Sidewiki)

Shared Web Hosting - The best small business hosting solution

Shared Web Hosting is ideal if:
• You want your site online within 24 hours!
• You have little or no technical experience
• Want low cost hosting solutions
Yes, in a nutshell, that shared web hosting is a crucial key that can get web startups up and moving in a very short time. Lets find out how it works.

For small businesses entering into the web domain, shared web hosting is proving to be an ideal launch vehicle. We all know that for any startup in any business sector, it is vitally important to find the right partners to get a kickstart.

More so in the case of web business. If you choose the right web-partners, you are likely to get the right solutions at the right time from them. In fact, if you get your web partnerships to form the ideal synergy, even a small-web business start-up of yours can experience skyrocketing growth bringing in high ROI.

Vital steps towards building up a successful small web business

Right from designing your small-business website to hosting it over the net, the success of your small-business web site depends a lot on how you choose partners at each step of its development.

The right web partners will help you boost your business prospects, be it in terms of building your brand image and presence, search engine optimization or providing a small business hosting solution.

Right from website designing to hosting it over the net, the whole process of building a successful web business is completed in the following stages:
1. Buying a Domain
2. Choosing a Host
3. Designing your website
4. Promoting your website
5. Generating Revenue from your website

Rajesh Goutam....Online Marketing / Web Solution Expert

in reference to: Google (view on Google Sidewiki)

Friday, February 4, 2011

"Access is Denied" error message when you try to open a folder

To resolve this issue, you must turn off Simple File Sharing, and then take ownership of the folder:

1. Turn off Simple File Sharing:
1. Click Start, and then click My Computer.
2. On the Tools menu, click Folder Options, and then click the View tab.
3. Under Advanced Settings, click to clear the Use simple file sharing (Recommended) check box, and then click OK.
2. Right-click the folder that you want to take ownership of, and then click Properties.
3. Click the Security tab, and then click OK on the Security message, if one appears.
4. Click Advanced, and then click the Owner tab.
5. In the Name list, click your user name, Administrator if you are logged in as Administrator, or click the Administrators group.

If you want to take ownership of the contents of that folder, click to select the Replace owner on subcontainers and objects check box.
6. Click OK.

You may receive the following error message, where Folder is the name of the folder that you want to take ownership of:
You do not have permission to read the contents of directory Folder. Do you want to replace the directory permissions with permissions granting you Full Control? All permissions will be replaced if you press Yes.
7. Click Yes.
8. Click OK, and then reapply the permissions and security settings that you want for the folder and the folder contents.

in reference to: Google (view on Google Sidewiki)

Monday, January 31, 2011

Updates...

After Email Service Facebook Going to Launch Calling VOIP Service

in reference to: Google (view on Google Sidewiki)

Monday, January 10, 2011

Will Facebook shut down March 15th?

NO.....Rajesh Goutam

in reference to: Google (view on Google Sidewiki)

Wednesday, January 5, 2011

AJAX is nor supported by search engines.

Search Engines and AJAX Do Not Mix, spiders do not run JavaScript. Search engiens cant see AJAX delivered content. AJAX created navigation wont be crawled.

Every page must be HTML, every page must have its content on the page, all links must already be in the HTML, and test this by turning off JavaScript in your browser.

Web developers can use (non-AJAX_ JavaScript to update the anchors on the page, and change the functionality to AJAX calls. This ensures that the AJAX will work, we know it will work because AJAX calls were set up by the JavaScript, which search engines are not capable of...

Ensure baseline application is built first and then you can take AJAX to take the user experience one step forward.

AJAX breaks the normal browser refresh - This means content not necessarily corresponding to URL - No addition to the browser history - No history, no back button

in reference to: Google (view on Google Sidewiki)

Tuesday, January 4, 2011

QR Code :

QR code : Quick Response code technology

in reference to: Google (view on Google Sidewiki)

Goutam Updates.....

India is currently the 2nd largest Mobile Market in the world after China, adding nearly 10-12 million subscribers on average monthly.

in reference to: Google (view on Google Sidewiki)

Wednesday, December 29, 2010

Triggers in SQL :

Triggers are special kind of stored procedures that get executed
automatically when an INSERT, UPDATE or DELETE operation takes place
on a table.

in reference to: sql interview questions and answers - Google Search (view on Google Sidewiki)

ACID

ACID stands for Atomicity, Consistency, Isolation, Durability

in reference to: Google (view on Google Sidewiki)

Goutam SQL Guide:

What's the maximum size of a row?

8060 bytes.
-------------------------------------------------------

Question : What's the difference between DELETE TABLE and TRUNCATE TABLE commands?

Ans : DELETE TABLE is a logged operation, so the deletion of each row gets
logged in the transaction log, which makes it slow. TRUNCATE TABLE
also deletes all the rows in a table, but it won't log the deletion of
each row, instead it logs the deallocation of the data pages of the
table, which makes it faster. Of course, TRUNCATE TABLE can be rolled
back.

in reference to: Google (view on Google Sidewiki)

Friday, December 10, 2010

Jaipur Website Promotion Experts at JaipurSEO

RajeSh GoutaM -Jaipur Website Promotion Experts at : www.jaipurseo.comEdit

SEO Jaipur,jaipur seo, Web promotion Jaipur,web site promotion jaipur, online marketing solution jaipur, Internet Marketing Jaipur

Jaipur SEO is a full website promotions and Internet Marketing Consulting company based in Jaipur, Rajasthan. Jaipur seo specializes in website promotion and online marketing services....
http://www.jaipurseo.com

in reference to: Google (view on Google Sidewiki)

Friday, November 26, 2010

Online Imp. Information...

1. Facebook to patent the word 'face'
2. Interesting : Kanpur police open Facebook account
3. Facebook founder's first website sold at auction : 30000 dollars

in reference to: csc - Google Search (view on Google Sidewiki)

Wednesday, November 24, 2010

Important Facts For Your Cell Phone : Rajesh Goutam

1) Emergency number the Emergency Number worldwide for Mobile is 112. If you find yourself out of coverage area of your mobile network and there is an emergency, dial 112and the mobile will search any existing network to establish the emergency number for you, and interestingly …this number 112 can be dialed even while the keypad is locked. Try it out.

2) Locked the keys in the car? Your car has remote keys? This may come in handy someday. Good reason to own a cell phone: If you happen to lock your keys in the car and the spare keys are home, call someone on your cell phone. Hold your cell phone about a foot from your car door and have the other person at your home press the unlock button, holding it near the phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).Editor’s Note: *It works fine! We tried it out and it unlocked our car over a cell phone!”

3) Hidden Battery power imagine your cell battery is very low, u r expecting an important call and u don’t have a charger. Nokia instrument comes with reserve battery. To activate, press the keys *3370#Your cell will restart with this reserve and the instrument will show 50% increase in battery. This reserve will get charged when u charge your cell next time.

4) How to disable a STOLEN mobile phone?
To check your Mobile phone’s serial number, key in the following digits on your phone:
* # 0 6 #
A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. when your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless.

You probably won’t get your phone back, but at least you know that whoever stole it can’t use/sell it either.

5) Be careful while using your mobile phone
when you try to call someone through mobile phone, don’t put your mobile closer to your ears until the recipient answers. Because directly after dialing, the mobile phone would use it’s maximum signaling power, which is: 2 watts = 33dbi, Plz Be Careful, Message as received (Save your brain) Please use left ear while using cell (mobile), because if you use the right one it will affect brain directly. This is a true fact.


www.rajeshgoutam.com

Friday, November 19, 2010

Rajesh Goutam

Online Marketing Expert!!!

in reference to: Google (view on Google Sidewiki)

Thursday, November 18, 2010

Domain Name Protection Rules In India

The original role of a domain name was to provide an address for computers on the Internet. The Internet has, however, developed from a mere means of communication to a mode of carrying on commercial activity.

With the increase of commercial activity on the Internet, a domain name is also used as a business identifier. Therefore, the domain name not only serves as an address for Internet communication but also identifies the specific Internet site. In the commercial field, each domain name owner provides information/services, which are associated with such domain names. Domain names are used in various networking contexts and application-specific naming and addressing purposes.

A domain name is an identification label to define a realm of administrative autonomy, authority, or control in the Internet, based on the Domain Name System (DNS). The Domain Name Systems (DNS) is a hierarchical naming system for computers, services or any resource participating in the internet. It associates different information with domain names assigned to each of the participants. Domain names are also used as simple identification labels to indicate ownership or control of a resource. Such examples are the realm identifiers used in the Session Initiation Protocol (SIP), the Domain keys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).

An important purpose of domain names is to provide easily recognizable names to numerically addressed Internet resources. This abstraction allows any resource (e.g., website) to be moved to a different physical location in the address topology of the network, globally on the internet or locally in an intranet.

In simple terms, Domain name is the address of a web site that is intended to be easily identifiable and easy to remember, such as yahoo.com. These user-friendly addresses for websites help connect computers and people on the Internet. Because they are easy to remember and use, domain names have become business identifiers and, increasingly, even trademarks themselves, such as amazon.com. By using existing trademarks for domain names – sony.com, for example – businesses attract potential customers to their websites.

Domain Name & Intellectual Property Rights

Now, the question that arises is that, “how are Domain Names and Intellectual Property rights (IPR) inter-related?” The answer lies in the understanding of Intellectual property rights. So what are these rights? Intellectual property (IP) is legal property right over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. The intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.

Originally, Domain Names were conceived and intended to function as an address, but with an increasing number of cases of registered domain names being illegally occupied (cyber squatting), it has posed additional problems in how to handle trademark disputes in cyberspace. Cyber squatting as an offence relates to the registration of a domain name by an entity that does not have an inherent right or a similar or identical trademark registration in its favour, with the sole view and intention to sell them to the legitimate user in order to earn illegal profits. An address in the cyber-space is imperative in the new e-economy for companies and individuals to be easily traceable by their consumers with the emergence of the Internet as an advertising forum, recruiting mechanism, and marketplace for products and services whereby companies doing business have a strong desire to register domain names akin to their products, trade names or trademarks. For example, owners of famous trademarks, such as Haier, typically register their trademarks as domain names, such as www.haier.com. Domain names may be valuable corporate assets, as they facilitate communication with a customer base. With the advancement of Internet communication, the domain name has attained as much legal sanctity as a trademark or trade name and, therefore, it is entitled to protection.

Another issue is the registration of names of popular brands with a slight spelling variation like pesi.com and radiff.com for the sole purpose of diverting traffic to their website through typing errors. ‘A significant purpose of a domain name is to identify the entity that owns the website.’ A domain name should not confuse the consumers as to the origins of the services or products defeating the principal of trademark law. In Rediff Communications Ltd. v. Cybertooth & Another the Bombay High Court while granting an injunction restraining the defendants from using the domain name ‘RADIFF’ or any other similar name, held that when both domain names are considered there is every possibility of internet users being confused and deceived into believing that both domain names belong to one common source and connection although the two belong to two different persons. Again the website using the domain name, ‘Naukari.com’ was held to be confusingly similar to that of the plaintiff, ‘naukri.com’, with a different spelling variant establishing prima facie inference of bad faith.

Domain name protection: Legal aspect

As stated earlier, the constant increase in the use of internet for commercial purposes has greatly increased the level of cyber crimes and other internet related offences. Thus, the legal protection of such domain names is a serious issue which must be dealt with. In order to do so, the Internet Corporation for Assigned Names and Numbers (‘ICANN’), a domain name regulatory authority, adopted a Uniform Domain Name Dispute Resolution Policy (‘UDRP’), which is incorporated into the Registration Agreement, and sets forth the terms and conditions in connection with a dispute between the registrant and any party other than the registrar over the registration and use of an Internet domain name registered. Upon entering into the Core Registration Agreement with ICANN while registering a domain name, one agrees to submit to proceedings commenced under ICANN’s Uniform Domain Name Dispute Resolution Policy. According to the ICANN policy, the registration of a domain name shall be considered to be abusive when all the following conditions are met:

(a) The domain name is identical or misleadingly similar to a trade or service mark in which the complainant has rights.


(b) The holder of the domain name has no rights or legitimate interests in respect of the domain name; and


(c) The domain name has been registered in bad faith.

The term ‘bad faith’ does not simply mean bad judgment but it implies the conscious doing of a wrong with a dishonest purpose. In order to prove bad faith, the following circumstances, if found, are sufficient evidence of bad faith registration:

(a) When there is an offer to sell, rent or otherwise transfer the domain name to the owner of the trademark or service mark, or to a competitor of the complainant for valuable consideration.

(b) When the respondent registers the domain name in order to prevent the owner of the trademark or service mark from reflecting the mark in a corresponding domain name, provided that you have engaged in a pattern of such conduct.

(c) When by using the domain name, a party has intentionally attempted to attract, for commercial gain, internet users to its website or other online location by creating a likelihood of confusion with the trade or service mark of the complainant.

INTA has consistently sought to protect domain names in the cyberspace in the same way as in any other media as these domain names can and often do work as trade marks. For the very same reason, INTA seeks to achieve the following six objectives:

(a) establishment of specific minimum standards for domain name registration;


(b) a publicly accessible domain name database, which contains up-to-date and accurate contact information;


(c) a uniform and easy-to-use dispute resolution policy which renders administrative – not legal – decisions;


(d) a reasonable mechanism whereby exclusions can be obtained and enforced for famous marks;


(e) a “go-slow” approach on the addition of new generic top-level domains (“gTLDs”); and


(f) a voice for trademark owners in the formulation of domain name policy.

INTA believes that when the above-mentioned six objectives are achieved, it would safeguard the trademark rights, which in this case would be the domain names.

Dispute Resolution

INTA believes that a reasonable administrative dispute resolution policy is an essential element of any plan for the administration of domain names on the Internet. Discretion for domain name policy should neither reside with the domain name registrars, nor with the registries. Any dispute policy needs to be consistent across the gTLD space. A lack of uniformity and specificity will only lead to confusion on the part of trademark and domain name holders, fundamental unfairness in the unequal treatment of rights in domain names and therefore inconsistent policies and precedent, chaos in the Internet community. If the goal is to create a system which is fair and predictable, and a relief to the current confusion and uncertainty, there can only be a single uniform system. There is no division among trademark holders on this point. A global marketplace and community requires a single set of global rules.

Therefore, any dispute resolution policy should be limited, at least during an appropriate interim period, to alleged instances of bad-faith activity by the domain name registrant.

Situation in India

Domain Name Issues


With the advancement of e-commerce, the domain names have come to acquire the same value as a trademark or the business name of a company. The value attached to domain names makes it lucrative for cyber criminals to indulge in domain name infringements and the global nature and easier and inexpensive procedure for registering domain names further facilitates domain name infringements. When a person gets a domain name registered in bad faith, i.e. in order to make huge profits by registering a domain name corresponding to a trademark of another person, with an intent to sell the domain name to the trademark owner at a higher price, such activities are known as cyber squatting. The IT Act does not deal with the domain name issues. In India the domain name infringement cases are dealt with according to the trademark law. The issue concerning protection of domain names came up before the Supreme Court of India in the case of Satyam Infoway Ltd. vs. Sifynet Solutions P. Ltd (2004(28) PTC 566). The court, in an authoritative decision has held that internet domain names are subject to the same legal norms applicable to other Intellectual Properties such as trademarks. It was further held by the Supreme Court of India that:

“The use of the same or similar domain name may lead to a diversion of users which could result from such user mistakenly accessing one domain name instead of another. This may occur in e-commerce with its rapid progress and instant (and theoretically limitless) accessibility to users and potential customers and particularly so in areas of specific overlap. Ordinary consumers/users seeking to locate the functions available less than one domain name may be confused if they accidentally arrived at a different but similar website which offers no such services. Such users could well conclude that the first domain name owner had misrepresented its goods and services through its promotional activities and the first domain owner would thereby lose their custom. It is apparent therefore that a domain name may have all the characteristics of a trade mark and could found an action for passing off.”

The court further held that there is no legislation in India which explicitly refers to dispute resolution in connection with domain names. The operation of the Trade Marks Act, 1999 is also not extra territorial and may not allow for adequate protection of domain names. This does not mean that domain names are not to be protected legally to the extent possible under laws of passing off.

However, with most of the countries providing for specific legislations for combating and curbing cyber squatting, India also needs to address the issue and formulate legal provisions against cyber squatting. For settlement of Disputes, WIPO has introduced a new mechanism called ICANN (Internet Corporation for Assigned Names and Numbers) for settlement of disputes relating to domain names. As the parties are given the right to file the case against the decision of ICANN in their respective jurisdictions, the decisions of ICANN is having only persuasive value for the domain users.

We know that a domain name is easy to remember and use, and is chosen as an instrument of commercial enterprise not only because it facilitates the ability of consumers to navigate the internet to find websites they are looking for, but also at the same time, serves to identify and distinguish the business itself, or its goods or services, and to specify its corresponding online internet location. Consequently where a domain name is used in connection with a business, the value of maintaining an exclusive identity becomes critical. As more and more commercial enterprises trade or advertise their presence on the web, domain names have become more and more valuable and the potential for dispute is high. Whereas a large number of trademarks containing the same name can comfortably co-exist because they are associated with different products, belong to business in different jurisdictions etc, the distinctive nature of the domain name providing global exclusivity is much sought after. The fact that many consumers searching for a particular site are likely, in the first place, to try and guess its domain name has further enhanced this value.

The law does not permit any one to carry on his business in such a way as would persuade the customers or clients in believing that the goods or services belonging to someone else are his or are associated therewith. It does not matter whether the latter person does so fraudulently or otherwise. The reasons are:

Honesty and fair play are, and ought to be, the basic policies in the world of business.When a person adopts or intends to adopt a name in connection with his business or services, which already belongs to someone else, it results in confusion and has propensity of diverting the customers and clients of someone else to himself and thereby resulting in injury

Thus, a Domain Name requires a strong, constant and instant protection under all the legal systems of the world, including India. This can be achieved either by adopting harmonization of laws all over the world or by jealously protecting the same in the municipal spheres by all the countries of the world.

Trademarks vs. Domain names

There is a distinction between a trademark and a domain name, which is not relevant to the nature of the right of an owner in connection with the domain name, but is material to the ’scope of the protection’ available to the right. The distinction lies in the manner in which the two operate.

A trademark is protected by the laws of a country where such trademark may be registered. Consequently, a trademark may have multiple registrations in many countries throughout the world.

On the other hand, since the internet allows for access without any geographical limitation, a domain name is potentially accessible irrespective of the geographical location of the consumers. The outcome of this potential for universal connectivity is not only that a domain name would require world wide exclusivity but also that national laws might be inadequate to effectively protect a domain name.

The defense available to such a complaint has been particularized “but without limitation”, in Rule 4 (c) as follows:


(i) Before any notice to the domain name owner/registrant, the use of, or demonstrable preparations to use, the domain name or a name corresponding to the domain name in connection with bona fide offering of goods or services; or


(ii) The domain name owner/registrant (as an individual, business, or other organization) has been commonly known by the domain name, even if it has acquired no trademark or service mark rights; or


(iii) The domain name owner/registrant is making a legitimate non-commercial or fair use of the domain name, without intent for commercial gain to misleadingly divert consumers or to tarnish the trademark or service mark at issue.

These rules indicate that the disputes may be broadly categorized as:

Disputes between trademark owners and domain name owners andBetween domain name owners inter se.

A prior registrant can protect its domain name against subsequent registrants. Confusing similarity in domain names may be a ground for complaint and similarity is to be decided on the possibility of deception amongst potential customers. The defenses available to a complaint are also substantially similar to those available to an action for passing off under trademark law.

As far as India is concerned, there is no legislation, which explicitly refers to dispute resolution in connection with domain names. But although the operation of the Trade Marks Act, 1999 itself is not extra territorial and may not allow for adequate protection of domain names, this does not mean that domain names are not to be legally protected to the extent possible under the laws relating to passing off

In India, the Trademarks Act, 1999 (Act) provide protection to trademarks and service marks respectively. A closer perusal of the provisions of the Act and the judgments given by the Courts in India reveals that the protection available under the Act is stronger than internationally required and provided.


Rule 2 of the UDNDR Policy requires the applicant to determine that the domain name for which registration is sought, does not infringes or violates someone else’s rights. Thus, if the domain name, proposed to be registered, is in violation of another person’s “trademark rights”, it will violate Rule 2 of the Policy.


In such an eventuality, the Registrar is within his right to refuse to register the domain name. This shows that a domain name, though properly registered as per the requirements of ICANN, still it is subject to the Trademarks Act, 1999 if a person successfully proves that he has ‘rights’ flowing out of the Act.

Conclusion

The protection of domain name under the Indian legal system is standing on a higher footing as compared to a simple recognition of right under the UDNDR Policy. The ramification of the Trademarks Act, 1999 are much wider and capable of conferring the strongest protection to the domain names in the world.

The need of the present time is to harmoniously apply the principles of the trademark law and the provisions concerning the domain names. It must be noted that the moment a decision is given by the Supreme Court and it attains finality, then it becomes binding on all the person or institutions in India.

It cannot be challenged by showing any ’statutory provision’ to the contrary. This is so because no statutory provision can override a ‘Constitutional provision’ and in case of a conflict, if any, the former must give way to the latter. This settled legal position becomes relevant when we consider the decision of the Supreme Court in Satyam case (supra) in the light of the above discussion. The various landmark judgments of the Supreme Court have conferred the ’strongest protection’ to the domain names in the world.

www.rajeshgoutam.com

Wednesday, September 1, 2010

For SEO:

Be careful when using instant approve directories. Instant approve means no moderation. So the directory will be full of spam stuff. Better to go for moderated directories.

in reference to: Google (view on Google Sidewiki)

Want to know for Website Promotion

check my website for free tips, tricks, latest updated for SEO and all

in reference to: Google (view on Google Sidewiki)

Thursday, July 22, 2010

Domain Name Extensions List : Rajesh Goutam

Domain Name Extensions List

.com = Pronounced "dot com." A top-level domain name used for commercial Internet sites
.org = A top-level domain name for organizational Internet sites.
.Net = A top-level domain name used for Internet administrative sites.
.Edu = A top-level domain name used for educational sites.
.Firm = an ending of an address for an Internet site for a business.
.Gov = A top-level domain name used for a U.S. government site on the Internet.
.Int = A top-level domain name used for international institutions.
.Mil = A top-level domain name for a U.S. military site on the Internet.
.Mobi = A top-level domain name for a sites made for mobile phones.
.NATO = A top-level domain name used for NATO sites.
.Nom = an ending of an address for a personal site on the Internet.
.Store = an ending of an address for an Internet site that is for a retail business.
.Web = an ending of an address for an Internet site that is about the World Wide Web


.ac Top-level domain name for an educational network (same as .edu)
.ad Andorra
.ae United Arab Emirates
.af Afghanistan
.ag Antigua and Barbuda
.ai Anguilla
.al Albania
.am Armenia
.an Netherlands Antilles
.ao Angola
.aq Antarctica
.ar Argentina
.as American Samoa
.at Austria
.au Australia
.aw Aruba
.az Azerbaijan
.ba Bosnia/Herzegovinia
.bb Barbados
.bd Bangladesh
.be Belgium
.bf Burkina Faso
.bg Bulgaria
.bh Bahrain
.bi Burundi
.bj Benin
.bm Bermuda
.bn Brunei Darussalam
.bo Bolivia
.br Brazil
.bs Bahamas
.bt Bhutan
.bv Bouvet Island
.bw Botswana
.by 1. Belarus 2. Byelorussia
.bz Belize
.ca Canada
.cc Cocos Islands - Keelings
.cf Central African Republic
.cg Congo
.ch Switzerland
.ci Cote D’Ivoire, or Ivory Coast
.ck Cook Islands
.cl Chile
.cm Cameroon
.cn China
.co Colombia
.cr Costa Rica
.cs Czechoslovakia (former)
.cu Cuba
.cv Cape Verde
.cx Christmas Island
.cy Cyprus
.cz Czech Republic
.de Germany
.dj Djibouti
.dk Denmark
.dm Dominica
.do Dominican Republic
.dz Algeria
.ec Ecuador
.ee Estonia
.eg Egypt
.eh Western Sahara
.er Eritrea
.es Spain
.et Ethiopia
.eu European Union
.fi Finland
.fj Fiji
.fk Falkland Islands/Malvinas
.fm Micronesia
.fo Faroe Islands
.fr France
.fx Metropolitan France
.ga Gabon
.gb Great Britain
.gd Grenada
.ge Georgia
.gf French Guiana
.gh Ghana
.gi Gibraltar
.gl Greenland
.gm Gambia
.gn Guinea
.gp Guadeloupe
.gq Equatorial Guinea
.gr Greece
.gs South Georgia and South Sandwich Islands
.gt Guatemala
.gu Guam
.gw Guinea-Bissau
.gy Guyana
.hk Hong Kong
.hm Heard and McDonald Islands
.hn Honduras
.hr Croatia/Hrvatska
.ht Haiti
.hu Hungary
.id Indonesia
.ie Ireland
.il Israel
.in India
.io British Indian Ocean Territory
.iq Iraq
.ir Iran
.is Iceland
.it Italy
.jm Jamaica
.jo Jordan
.jp Japan
.ke Kenya
.kg Kyrgyzstan
.kh Cambodia
.ki Kiribati
.km Comoros
.kn Saint Kitts and Nevis
.kp North Korea
.kr South Korea
.kw Kuwait
.ky Cayman Islands
.kz Kazakhstan
.la Laos
.lb Lebanon
.lc Saint Lucia
.li Liechtenstein
.lk Sri Lanka
.lr Liberia
.ls Lesotho
.lt Lithuania
.lu Luxembourg
.lv Latvia
.ly Libya
.ma Morocco
.mc Monaco
.md Moldova
.mg Madagascar
.mh Marshall Islands
.mk Macedonia
.ml Mali
.mm Myanmar
.mn Mongolia
.mo Macau
.mp Northern Mariana Islands
.mq Martinique
.mr Mauritania
.ms Montserrat
.mt Malta
.mu Mauritius
.mv Maldives
.mw Malawi
.mx Mexico
.my Malaysia
.mz Mozambique
.na Namibia
.nc New Caledonia
.ne Niger
.nf Norfolk Island
.ng Nigeria
.ni Nicaragua
.nl Netherlands
.no Norway
.np Nepal
.nr Nauru
.nt Neutral Zone
.nu Niue
.nz New Zealand (Aotearoa)
.om Oman
.pa Panama
.pe Peru
.pf French Polynesia
.pg Papua New Guinea
.ph Philippines
.pk Pakistan
.pl Poland
.pm St. Pierre and Miquelon
.pn Pitcairn
.pr Puerto Rico
.pt Portugal
.pw Palau
.py Paraguay
.qa Qatar
.re Reunion
.ro Romania
.ru Russian Federation
.rw Rwanda
.sa Saudi Arabia
.sb Solomon Islands
.sc Seychelles
.sd Sudan
.se Sweden
.sg Singapore
.sh Saint Helena
.si Slovenia
.sj Svalbard and Jan Mayen Islands
.sk Slovakia
.sl Sierra Leone
.sm San Marino
.sn Senegal
.so Somalia
.sr Suriname
.st Sao Torme and Principe
.su Former USSR
.sv El Salvador
.sy Syria
.sz Swaziland
.tc Turks and Caicos Islands
.td Chad
.tf French Southern Territory
.tg Togo
.th Thailand
.tj Tajikistan
.tk Tokelau
.tm Turkmenistan
.tn Tunisia
.to Tonga
.tp East Timor
.tr Turkey
.tt Trinidad and Tobago
.tv Tuvalu
.tw Taiwan
.tz Tanzania
.ua Ukraine
.ug Uganda
.uk United Kingdom
.um U.S. Minor Outlying Islands
.us United States
.uy Uruguay
.uz Uzbekistan
.va Vatican City State
.vc Saint Vincent and the Grenadines
.ve Venezuela
.vg British Virgin Islands
.vi U.S. Virgin Islands
.vn Viet Nam
.vu Vanuatu
.wf Wallis and Futuna Islands
.ws Samoa
.ye Yemen
.yt Mayotte
.yu Yugoslavia
.za South Africa
.zm Zambia
.zr Zaire
.zw Zimbabwe

You can find more about domain name info. on my website : www.rajeshgoutam.com

Saturday, July 17, 2010

Epic Browser New Launched By Indians For Indians : Rajesh Goutam

There are tons of Internet Browsers available including Internet Explorer, , Firefox, and Safari, however, the Epic Browser is a bit different in the sense that it has been created specifically with Indians in mind.

















A Bangalore based startup called Hidden Reflex has made available a browser called as the "Epic Browser". Epic Browser is a Internet web browser which is based on Mozilla Firefox, which taps into several services to serve content which is useful and relevant to Indian users.

For example you can get cricket match score updates, share market updates, video streams and more. Epic Browser also has a built in Antivirus solution to keep the bad malware and Trojans out of your PC. Currently Epic browser has over 1500 applications

and also supports . Read our earlier review of Epic Browser here or download Epic Browser from here.

Know more about : www.rajeshgoutam.com

Thursday, July 15, 2010

Rajesh Goutam : how to set password on outlook 2007

Set a password for your Personal Folders file

1. On the File menu, click Data File Management to open the Account Settings dialog box.
2. On the Data Files tab, click the Personal Folders file (.pst) for which you want to create a password, and then click Settings to open the Personal Folders dialog box.
3. Click the Change password button.

Note This button does not appear if your e-mail account runs on Microsoft Exchange. Your Outlook folders are already protected by your Exchange password.

4. In the New password box, type your new password. The password can be up to 15 characters long and case-sensitive.


Know more about in details : www.rajeshgoutam.com

Thursday, July 8, 2010

how to reset IIS ?

Stop and start IIS

There are two ways you can stop and restart IIS: from a DOS command line or from Windows.

from a DOS command line

* To stop IIS, at the DOS command prompt, type,

iisreset /stop

* To restart it, type

iisreset /start

from Windows

1. Click Start and point to Programs. Point to Administrative Tools, and then click Computer Management.
2. Expand Services and Applications.
3. Expand Internet Information Services.
4. Right click Default Web Site, and select Stop or Start.

Sunday, June 27, 2010

Hack's Gmail account : Save your Gmail Account....Rajesh Goutam

Know, Hack's Gmail account

If your Gmail account is opened to anyone without your knowledge and e-mail sent, so now you can get this information. This new feature of Gmail will now tell you where and when your account was opened?

However, this feature already exists in Gmail, but rarely had to Users on the eye. Users of Google on why the recent attention to the information banner as decided.

And also security options: If you are doing Mentoen Gmail account, then on top of your inbox in no time you will see this information as banner. This feature also
Will tell which browser to open the account and IP address has been used.

In addition, Google's other security features will be increasingly active. These features from Google was getting increasingly popular social networking a purpose of fighting, the second of its Users to avoid fraud.

Know where Open Account: IT Experts believe that this will definitely increase in the number of Users of Google. Also it will benefit both user and company. Experts said the same country every day if you are accessing the account. Anytime, any place and any other by the account is opened there is a change, in the event that your Gmail account window will show a Aornig message. The user will know it's easy to hack their account is going nowhere. With that option to click on Details as well as user will know what IP address the account was open Ug.

Keep in mind also: Google with this feature - along Users should always remember that your e-mail after logout Czech and short - a little time to keep changing your password. Ug addition to a password that can not be easily known. Users Baratkara Such precautions can keep your account safe.

Windows V/S Linux Hosting Server: Rajesh Goutam

Windows V/S Linux Hosting Server: Rajesh Goutam

The Basics of Linux & Windows :
Linux (and its close relation Unix) and Windows 2000 (and its close cousin Windows NT) are types of software (known as operating systems) that web servers use to do the kind of things that web servers do. You do not need to know any real detail of either to make a decision as to which you need but here a few guidelines.
Just because you use a windows desktop PC doesn't mean you have to opt for Windows web hosting (and the reverse is true as well). The operating system you use on your desktop has little to do with your choice of web hosts. As long as you understand how to use your FTP or web publishing software, your can use either operating system.
But what is important is that you know what you want your website to do and what you want to offer on it. This is what will ultimately help determine the type of web hosting that will work best for you. As mentioned earlier, interactive websites usually rely on ASP, PHP, or Perl type languages.
Linux Web Hosting or Windows 2000 Web Hosting ? Make your Choice !
When it comes to Web hosting, Linux has, for some time, been widely considered the best OS for Web servers. It's typically found to be the most reliable, stable and efficient system and, as such, it's commonly used for the demanding environment of Web and mail servers. Indeed, aalphanet.com runs on the Linux OS precisely because of this traditional stability.
The million-dollar question is what application are you looking to use for your hosting? Consider the tools and scripting languages you plan to use – if you use PHP, Perl or MySQL, Linux is the way forward. If apps are Microsoft-specific, then Windows is what you need.
If your site, like most web sites, is what might be termed "brochure-ware" then Linux servers are ideal. By brochure-ware I mean a site that offers the kind of information that in the past might have been provided on paper in the form of brochures, newsletters or data sheets. Brochure-ware sites will offer some interaction through enquiry forms and can certainly incorporate online purchasing and other routine e-commerce functions.
If however your site incorporates an online searchable database or interactive chat facilities then Windows 2000 or NT will be a better bet in most cases. It will cost a bit more but you'll get that back in reduced development time and simply better functionality.
The following are the advantages of using Linux based web server compared to Windows based web server :
Stable: Linux/Unix operating systems has traditionally been believed to be very stable and robust. A web site housed on a Linux operating system will have very high up-time (of the order of 99.9%). Of course, other factors such as power supply, network admin skills, and network load etc. also matter when it comes to maintaining the system uptime.
Low cost of ownership: The Linux OS comes free of cost (or at very insignificant cost, usually cost of distribution). Also, it has full fledged server, and desk top applications that comes free along with the OS. These server applications (such as FTP, Web Server, DNS Server, File Server etc.) being free, are also very stable.
Ease of use : When it comes to web hosting, it is easy to host on Linux web servers. The process of uploading and hosting is almost same for both Linux and Windows web servers. If you want to use a Windows based tool such as Front Page for uploading a web site on to a Linux based web server, make sure that the Front Page extensions are enabled. This is only required if you are uploading using HTTP feature (http://www.yourwebsite.com) of Front Page. Front Page also makes it possible to upload a web site using FTP. You need to select ftp://www.yourwebsite.com for up loading using front page FTP option. Note that if you select "Front Page Extensions" during web site design, you must enable Front Page extensions on a Linux web server also. These days, all Linux web servers are coming with installable Front Page extensions, and this should pose no problem for hosting on a Linux platform.
You can use almost all types of file extensions (or scripts) when using Linux web server. Commonly, the following extensions are supported:
.cgi, .html, .htm, .pl, .php, .shtml, .xml, and others.
Basically it means that you can host web sites that use different types of server side scripts including .cgi, .pl, .php, and .asp (with plug-in).
Easy to move between hosts : A web site designed to be hosted on a Linux based web server can be hosted on a Windows web server easily, where as the reverse is not always true.
Most widely used : Linux/Unix based web hosting is most widely used compared to Windows based web hosting.
Scalability : A web site is dynamic. Usually, a web site starts with a few pages of html and grows over a period of time to suit the customers requirements. It is preferable to design a web site keeping this requirements in mind. A web site designed for compatibility with a Linux/Unix based web server meets the scalability requirement easily without making any site wide design changes.
On the downside, Linux based web server is not fully compatible with Microsoft technologies. If you are using any specialized applications or VB for development of your web site, it is preferable to host with a Windows based web server.

Webmaster guidelines

Following these guidelines will help Google find, index, and rank your site. Even if you choose not to implement any of these suggestions, we strongly encourage you to pay very close attention to the "Quality Guidelines," which outline some of the illicit practices that may lead to a site being removed entirely from the Google index or otherwise penalized. If a site has been penalized, it may no longer show up in results on Google.com or on any of Google's partner sites.

Design and content guidelines

Learn more...

Technical guidelines

Learn more...

Quality guidelines

Learn more...

When your site is ready:

Design and content guidelines

  • Make a site with a clear hierarchy and text links. Every page should be reachable from at least one static text link.
  • Offer a site map to your users with links that point to the important parts of your site. If the site map is larger than 100 or so links, you may want to break the site map into separate pages.
  • Create a useful, information-rich site, and write pages that clearly and accurately describe your content.
  • Think about the words users would type to find your pages, and make sure that your site actually includes those words within it.
  • Try to use text instead of images to display important names, content, or links. The Google crawler doesn't recognize text contained in images. If you must use images for textual content, consider using the "ALT" attribute to include a few words of descriptive text.
  • Make sure that your elements and ALT attributes are descriptive and accurate.
  • Check for broken links and correct HTML.
  • If you decide to use dynamic pages (i.e., the URL contains a "?" character), be aware that not every search engine spider crawls dynamic pages as well as static pages. It helps to keep the parameters short and the number of them few.
  • Keep the links on a given page to a reasonable number (fewer than 100).
  • Review our image guidelines for best practices on publishing images.

With image search, just as with web search, Google's goal is to provide the best and most relevant search results to our users. Following the best practices listed below (as well as our usual webmaster guidelines) will increase the likelihood that your images will be returned in those search results.

Don't embed text inside images

Search engines can't read text embedded in images. If you want search engines to understand your content, keep it in regular HTML.

Tell us as much as you can about the image

Give your images detailed, informative filenames

The filename can give Google clues about the subject matter of the image. Try to make your filename a good description of the subject matter of the image. For example, my-new-black-kitten.jpg is a lot more informative than IMG00023.JPG. Descriptive filenames can also be useful to users: If we're unable to find suitable text in the page on which we found the image, we'll use the filename as the image's snippet in our search results.

The alt attribute is used to describe the contents of an image file. It's important for several reasons:

  • It provides Google with useful information about the subject matter of the image. We use this information to help determine the best image to return for a user's query.
  • Many people—for example, users with visual impairments, or people using screen readers or who have low-bandwidth connections—may not be able to see images on web pages. Descriptive alt text provides these users with important information.

Not so good:

Better:

puppy

Best:

Dalmatian puppy playing fetch 

To be avoided

dog pup pups puppies doggies pups litter puppies dog retriever 
 labrador wolfhound setter pointer puppy jack russell terrier 
puppies dog food cheap dogfood puppy food"/>

Filling alt attributes with keywords ("keyword stuffing") results in a negative user experience, and may cause your site to be perceived as spam. Instead, focus on creating useful, information-rich content that uses keywords appropriately and in context. We recommend testing your content by using a text-only browser such as Lynx.

Anchor text

External anchor text (the text pages use to link to your site) reflects how other people view your pages. While typically webmasters can't control how other sites link to theirs, you can make sure that anchor text you use within your own site is useful, descriptive, and relevant. This improves the user experience and helps the user understand the link's destination. For example, you might link to a page of vacation photos like this: Photos of our June 2008 trip to Ireland.

Provide good context for your image

The page the image is on, and the content around the image (including any captions or image titles), provide search engines with important information about the subject matter of your image. For example, if you have a picture of a polar bear on a page about home-grown tomatoes, you'll be sending a confused message to the search engines about the subject matter of polarbear.jpg.

Wherever possible, it's a good idea to make sure that images are placed near the relevant text. In addition, we recommend providing good, descriptive titles and captions for your images.

Think about the best ways to protect your images

Because images are often copied by users, Google often finds multiple copies of the same image online. We use many different signals to identify the original source of the image, and you can help by providing us with as much information as you can. In addition, the information you give about an image tells us about its content and subject matter.

Webmasters are often concerned about the unauthorized use of their images. If you prevent users from using your images on their site, or linking to your images, you'll prevent people from using your bandwidth, but you are also limiting the potential audience for your images and reducing their discoverability by search engines.

One solution is to allow other people to use your images, but require attribution and a link back to your own site. There are several ways you can do this. For example, you can:

  • Make your images available under a license that requires attribution, such as a Creative Commons license that requires attribution.
  • Provide a HTML snippet that other people can use to embed your image on their page while providing attribution. This snippet can include both the link to the image and a link to the source page on your site.

Similarly, some people add copyright text, watermarks, or other information to their images. This won't impact your image's performance in search results, but may not provide the kind of user experience you are looking for.

If you don't want search engines to crawl your images, we recommend using a robots.txt file to block access to your images.

Create a great user experience

Great image content is an excellent way to build traffic to your site. We recommend that when publishing images, you think carefully about creating the best user experience you can.

  • Good-quality photos appeal to users more than blurry, unclear images. In addition, other webmasters are much more likely to link to a good-quality image, which can increase visits to your site. Crisp, sharp images will also appear better in the thumbnail versions we display in our search results, and may therefore be more likely to be clicked on by users.
  • Even if your image appears on several pages on your site, consider creating a standalone landing page for each image, where you can gather all its related information. If you do this, be sure to provide unique information—such as descriptive titles and captions—on each page. You could also enable comments, discussions, or ratings for each picture.
  • Not all users scroll to the bottom of a page, so consider putting your images high up on the page where it can be immediately seen.
  • Consider structuring your directories so that similar images are saved together. For example, you might have one directory for thumbnails and another for full-size images; or you could create separate directories for each category of images (for example, you could create separate directories for Hawaii, Ghana, and Ireland under your Travel directory). If your site contains adult images, we recommend storing these in one or more directories separate from the rest of the images on your site.
  • Specify a width and height for all images. A web browser can begin to render a page even before images are downloaded, provided that it knows the dimensions to wrap non-replaceable elements around. Specifying these dimensions can speed up page loading and improve the user experience.

With image search, just as with web search, our goal is to provide the best and most relevant search results to our users. Following the best practices listed above will increase the likelihood that your images will be returned in those search results.

Technical guidelines

  • Use a text browser such as Lynx to examine your site, because most search engine spiders see your site much as Lynx would. If fancy features such as JavaScript, cookies, session IDs, frames, DHTML, or Flash keep you from seeing all of your site in a text browser, then search engine spiders may have trouble crawling your site.
  • Allow search bots to crawl your sites without session IDs or arguments that track their path through the site. These techniques are useful for tracking individual user behavior, but the access pattern of bots is entirely different. Using these techniques may result in incomplete indexing of your site, as bots may not be able to eliminate URLs that look different but actually point to the same page.
  • Make sure your web server supports the If-Modified-Since HTTP header. This feature allows your web server to tell Google whether your content has changed since we last crawled your site. Supporting this feature saves you bandwidth and overhead.
  • Make use of the robots.txt file on your web server. This file tells crawlers which directories can or cannot be crawled. Make sure it's current for your site so that you don't accidentally block the Googlebot crawler. Visit http://www.robotstxt.org/faq.html to learn how to instruct robots when they visit your site. You can test your robots.txt file to make sure you're using it correctly with the robots.txt analysis tool available in Google Webmaster Tools.
  • If your company buys a content management system, make sure that the system creates pages and links that search engines can crawl.
  • Use robots.txt to prevent crawling of search results pages or other auto-generated pages that don't add much value for users coming from search engines.
  • Test your site to make sure that it appears correctly in different browsers.

Quality guidelines

These quality guidelines cover the most common forms of deceptive or manipulative behavior, but Google may respond negatively to other misleading practices not listed here (e.g. tricking users by registering misspellings of well-known websites). It's not safe to assume that just because a specific deceptive technique isn't included on this page, Google approves of it. Webmasters who spend their energies upholding the spirit of the basic principles will provide a much better user experience and subsequently enjoy better ranking than those who spend their time looking for loopholes they can exploit.

If you believe that another site is abusing Google's quality guidelines, please report that site at https://www.google.com/webmasters/tools/spamreport. Google prefers developing scalable and automated solutions to problems, so we attempt to minimize hand-to-hand spam fighting. The spam reports we receive are used to create scalable algorithms that recognize and block future spam attempts.

Quality guidelines - basic principles

  • Make pages primarily for users, not for search engines. Don't deceive your users or present different content to search engines than you display to users, which is commonly referred to as "cloaking."
  • Avoid tricks intended to improve search engine rankings. A good rule of thumb is whether you'd feel comfortable explaining what you've done to a website that competes with you. Another useful test is to ask, "Does this help my users? Would I do this if search engines didn't exist?"
  • Don't participate in link schemes designed to increase your site's ranking or PageRank. In particular, avoid links to web spammers or "bad neighborhoods" on the web, as your own ranking may be affected adversely by those links.
  • Don't use unauthorized computer programs to submit pages, check rankings, etc. Such programs consume computing resources and violate our Terms of Service. Google does not recommend the use of products such as WebPosition Gold™ that send automatic or programmatic queries to Google.

Quality guidelines - specific guidelines

  • Avoid hidden text or hidden links.
  • Don't use cloaking or sneaky redirects.
    • Cloaking, sneaky Javascript redirects, and doorway pages
    • Cloaking
    • Cloaking refers to the practice of presenting different content or URLs to users and search engines. Serving up different results based on user agent may cause your site to be perceived as deceptive and removed from the Google index.
    • Some examples of cloaking include:
    • Serving a page of HTML text to search engines, while showing a page of images or Flash to users.
    • Serving different content to search engines than to users.
    • If your site contains elements that aren't crawlable by search engines (such as rich media files other than Flash, JavaScript, or images), you shouldn't provide cloaked content to search engines. Rather, you should consider visitors to your site who are unable to view these elements as well. For instance:
    • Provide alt text that describes images for visitors with screen readers or images turned off in their browsers.
    • Provide the textual contents of JavaScript in a noscript tag.
    • Ensure that you provide the same content in both elements (for instance, provide the same text in the JavaScript as in the noscript tag). Including substantially different content in the alternate element may cause Google to take action on the site.

Sneaky JavaScript redirects

    • When Googlebot indexes a page containing JavaScript, it will index that page but it cannot follow or index any links hidden in the JavaScript itself. Use of JavaScript is an entirely legitimate web practice. However, use of JavaScript with the intent to deceive search engines is not. For instance, placing different text in JavaScript than in a noscript tag violates our webmaster guidelines because it displays different content for users (who see the JavaScript-based text) than for search engines (which see the noscript-based text). Along those lines, it violates the webmaster guidelines to embed a link in JavaScript that redirects the user to a different page with the intent to show the user a different page than the search engine sees. When a redirect link is embedded in JavaScript, the search engine indexes the original page rather than following the link, whereas users are taken to the redirect target. Like cloaking, this practice is deceptive because it displays different content to users and to Googlebot, and can take a visitor somewhere other than where they intended to go.
    • Note that placement of links within JavaScript is alone not deceptive. When examining JavaScript on your site to ensure your site adheres to our guidelines, consider the intent.
    • Keep in mind that since search engines generally can't access the contents of JavaScript, legitimate links within JavaScript will likely be inaccessible to them (as well as to visitors without Javascript-enabled browsers). You might instead keep links outside of JavaScript or replicate them in a noscript tag.

Doorway pages ( Pages created just for search engines )

    • Doorway pages are typically large sets of poor-quality pages where each page is optimized for a specific keyword or phrase. In many cases, doorway pages are written to rank for a particular phrase and then funnel users to a single destination.
    • Whether deployed across many domains or established within one domain, doorway pages tend to frustrate users, and are in violation of our webmaster guidelines.
    • Google's aim is to give our users the most valuable and relevant search results. Therefore, we frown on practices that are designed to manipulate search engines and deceive users by directing them to sites other than the ones they selected, and that provide content solely for the benefit of search engines. Google may take action on doorway sites and other sites making use of these deceptive practice, including removing these sites from the Google index.
    • If your site has been removed from our search results, review our webmaster guidelines for more information. Once you've made your changes and are confident that your site no longer violates our guidelines, submit your site for reconsideration.
  • Don't send automated queries to Google.
  • Don't load pages with irrelevant keywords.
  • Don't create multiple pages, subdomains, or domains with substantially duplicate content.
  • Don't create pages with malicious behavior, such as phishing or installing viruses, trojans, or other badware.
  • Avoid "doorway" pages created just for search engines, or other "cookie cutter" approaches such as affiliate programs with little or no original content.
  • If your site participates in an affiliate program, make sure that your site adds value. Provide unique and relevant content that gives users a reason to visit your site first.

If you determine that your site doesn't meet these guidelines, you can modify your site so that it does and then submit your site for reconsideration.

Google Basics

When you sit down at your computer and do a Google search, you're almost instantly presented with a list of results from all over the web. How does Google find web pages matching your query, and determine the order of search results?

In the simplest terms, you could think of searching the web as looking in a very large book with an impressive index telling you exactly where everything is located. When you perform a Google search, our programs check our index to determine the most relevant search results to be returned ("served") to you.

The three key processes in delivering search results to you are:

Crawling: Does Google know about your site? Can we find it?

Learn more...

Indexing: Can Google index your site?

Learn more...

Serving: Does the site have good and useful content that is relevant to the user's search?

Learn more...

Crawling

Crawling is the process by which Googlebot discovers new and updated pages to be added to the Google index.

We use a huge set of computers to fetch (or "crawl") billions of pages on the web. The program that does the fetching is called Googlebot (also known as a robot, bot, or spider). Googlebot uses an algorithmic process: computer programs determine which sites to crawl, how often, and how many pages to fetch from each site.

Google's crawl process begins with a list of web page URLs, generated from previous crawl processes, and augmented with Sitemap data provided by webmasters. As Googlebot visits each of these websites it detects links on each page and adds them to its list of pages to crawl. New sites, changes to existing sites, and dead links are noted and used to update the Google index.

Google doesn't accept payment to crawl a site more frequently, and we keep the search side of our business separate from our revenue-generating AdWords service.

Indexing

Googlebot processes each of the pages it crawls in order to compile a massive index of all the words it sees and their location on each page. In addition, we process information included in key content tags and attributes, such as Title tags and ALT attributes. Googlebot can process many, but not all, content types. For example, we cannot process the content of some rich media files or dynamic pages.

Serving results

When a user enters a query, our machines search the index for matching pages and return the results we believe are the most relevant to the user. Relevancy is determined by over 200 factors, one of which is the PageRank for a given page. PageRank is the measure of the importance of a page based on the incoming links from other pages. In simple terms, each link to a page on your site from another site adds to your site's PageRank. Not all links are equal: Google works hard to improve the user experience by identifying spam links and other practices that negatively impact search results. The best types of links are those that are given based on the quality of your content.

In order for your site to rank well in search results pages, it's important to make sure that Google can crawl and index your site correctly. Our Webmaster Guidelines outline some best practices that can help you avoid common pitfalls and improve your site's ranking.

Google's Related Searches, Spelling Suggestions, and Google Suggest features are designed to help users save time by displaying related terms, common misspellings, and popular queries. Like our google.com search results, the keywords used by these features are automatically generated by our web crawlers and search algorithms. We display these suggestions only when we think they might save the user time. If a site ranks well for a keyword, it's because we've algorithmically determined that its content is more relevant to the user's query.

Verify that your site ranks for your domain name = Google search for www.[yourdomain].com

Check your site is in the Google index = A search for site:google.com


Rajesh Goutam

www.rajeshgoutam.com

Rajesh Goutam Google Group

My website: