Saturday, October 24, 2015

Get Google Adsense Approval within 3 days – Top 12 Working Strategies

Google AdSense! One of the most easiest, trusted and professional way of earning money by showing your passion towards writing and sharing the knowledge. Google AdSense is trusted by many advertisers and publishers from the past few years, and usually they never accept anyone randomly who is trying to apply for an account. You need to show them the most professional approach of getting your account accepted, else Google will simply throw your application aside.
Get Google Adsense Approval within 3 days
Statistics say that Google AdSense accepts only 3 accounts of every 1000 applications they receive each day. If you are trying to get onto the account or has been rejected earlier, follow these simple guidelines to get your own AdSense account in just 3 simple days. Though these below tips won’t get you the account approved instantly, but will surely work if you try inheriting each step mentioned below. I’m sure it worked for 60% of people who commented here and mailed me from the past couple of years.

Get Google AdSense Approval Within 3 Days:

So before getting started, make sure you follow these guidelines without fail, else your application will be rejected without any further pending approval. Remember that everything which I mentioned below counts. Don’t compromise on number of posts, own domain, good design and other metrics, else the chances of rejection is higher at your end. So here we go, the 15 most important guidelines to follow before applying to Google AdSense.
how to get google adsense approved

Minimum Posts/Articles/Pages:

If you are using WordPress, make sure your website/blog has at least 40 quality articles which are not copied from anywhere else. Your content on the articles should be extremely rich and make sure you use relevant images where ever required. Try to include two lengthy articles of 2000 words each, which should be absolutely stunning while anyone reads them on your website. If you are using HTML website or any other non CMS version of blog, make sure you have atleast 50 pages on your website in form or articles or landing pages.
If you miss providing this any of the above information on your website, Google might reject your application saying Insufficient Content or Unacceptable Site Content. So make sure they see enough content on your website before applying the program. The more the content, the better chances of approval.

Prohibited Website Niches:

Statistics show that your account will go through a faster approval process if you have more quality articles on Health, Internet Marketing, Business, Law, Technology, Entrepreneurship, Travel, Lifestyle and Social Media. Google will take your application as a serious offense if your website contain any of the prohibited content mentioned in this link here.
Some studies have also proved that Google AdSense might reject your approval if your website is on event blogging and micro niche blogging. In this particular blogging, you limit your blog content to only one particular subject and create a spam domain around it to rank higher. Eg: www.mayweathervspacquiaomatchonline.com (Mayweather vs Pacquiao Match Online). In some cases, if you have observed Google Ads in these of websites, probably they have applied the account through an another account and placed the ads in this event niche blogging to earn quick money.

No Third Party Ads or Programs:

Before applying to AdSense, make sure you don’t allow or place any other third party banner ad code on your website. Google (employees) will strictly look into your website manually and they hate seeing some third party ads installed in your website. Stay away from Infolinks, Chitika, Yahoo Ads or any other third party network to get the first impression clean on your website. Make sure you put only the fresh content and some regular widgets on the website.
Also, stay away from affiliate links such as hosting programs, Amazon affiliates, Clickbank or anyother until your account is approved.

Website Design and User Experience:

Google always want their users to get the best experience while browsing through any website they refer. Maintaining a clean design with good navigation and user experience will boost your chances of getting AdSense approved in the first attempt itself. This is one of the major guidelines where lot of people miss the basics. Google believes that if you maintain professional color scheme on your website, the user might be willing to come back and click on the relevant ads which are displayed under your content.
So make sure you maintain a neat and clean design before applying to AdSense. I would recommend you to buy one professional template anywhere and get it installed on your website without effecting the loading speed or easy navigation.

Google Analytics Code:

Adding Google Analytics code on your website is a trusted factor for the approval. Adding Analytics onto your website show that you are actively tracking your visitors and is much serious about the statistics of your users who visit your website. If you haven’t created one, click here to register the program. Once registered, get your tracking code by creating new account under the accounts tab and enter your website name, URL and other required details. Place the code on each page of your website to track the data instantly.

Google/Bing Webmasters Verification Page:

Friday, October 23, 2015

How to Set Up a Virtualization Server

If there's one technology that can greatly improve computing environments of any size, it's virtualization. By using a single physical server to run many virtual servers, you can decrease operational costs and get far more bang for your buck. Whether your company is a 2-server or 2000-server shop, you can benefit from server virtualization in a variety of ways. The best part? You can do it cheaply and easily.
The reasons to virtualize even a small infrastructure come down to ease of administration and cost reductions. Cost reductions come from cutting down the number of physical servers, thus reducing the power and cooling requirements, but they also come in the form of greatly reduced expansion. Rather than having to purchase new hardware to support a new business application, all you need to do is add a new virtual server.
If your business has only a single server, virtualization isn't likely to buy you much, but if you have more than two servers or if you plan on expanding anytime soon, virtualization can likely make a difference.
It's impossible to purchase a server today that isn't multicore, but many small-business server requirements simply don't call for that much horsepower. The end result is a relatively expensive server that does very little but still consumes power and generates heat. That's why using a multicore server--that is, a server that has 4, 6, or 12 processing cores on a single CPU--to host several virtual servers makes sense, no matter what size your company is.

The Host Server

The key to successfully virtualizing servers in a smaller environment starts with the physical host server, the box that will run multiple virtual servers. Even though this one server will be responsible for hosting possibly dozens of virtual servers, it will require far fewer CPU resources than you might assume.
Depending on the virtualization software in use--VMware, Microsoft's Hyper-V, Citrix XenServer, or another package--you will likely be able to run a surprising number of virtual servers on a four- or six-core CPU. The reason is that generally most servers run near idle a significant portion of the time. When they are tasked with work, their resources tend to be spread out among the RAM, CPU, disk, and network input/output, with only a subset of the virtual servers actually requiring significant CPU resources. By taking advantage of this law of averages, you can consolidate a considerable number of physical servers onto a single host server.
That isn't a hard and fast rule, however. Some servers, such as database servers, run heavier loads on a more consistent basis, and may not be suitable candidates for virtualization in a smaller infrastructure. It all depends on the hardware resources available to the host server, on the virtualization software features, and on the requirements of the virtual server. Fortunately, setting up and testing these requirements beforehand isn't difficult.
The first order of business when approaching a small virtualization project is to choose the hardware. Generally you'll start out with only a single server, so try to get the best mix of resources possible within budget.
A good rule of thumb is that having more cores in the host server trumps higher clock speeds, so if you have a choice between a 4-core CPU running at 2.93GHz and a 6- or 12-core CPU running at 2.4GHz, you'll be better off with the latter option. That's because the capability to spread the virtual-server load across more CPU cores typically translates into faster, more consistent performance across all the virtual machines. Think of it as needing a dump truck (which isn't that fast) instead of a sports car (which is faster but can haul far less than the dump trunk can).

RAM and Storage

Once you make the CPU decision, the next area to consider is RAM. Virtualization host machines can always use more RAM, so get as much as you can, and select the fastest RAM possible. It's relatively straightforward to oversubscribe CPU resources--or allocate more virtual CPUs to the virtual servers than physically exist within the host server--but it's far more difficult to oversubscribe RAM. The more RAM you have available, the more virtual machines you'll be able to run.
That's especially true if you're running certain hypervisors (which are responsible for managing all virtual servers) that do not offer shared memory features. Some require that a fixed amount of RAM be presented to each virtual server, and that the RAM is allocated in its entirety. Other, more advanced setups can determine when identical memory segments are present in multiple virtual servers and map that memory accordingly, allowing more RAM to be allocated to the virtual servers than exists within the host. Either way, always go for more RAM when possible.
The third factor to consider is storage. In smaller environments you may not have astorage area network (SAN) or a network attached storage (NAS) device to hold the virtual server images, so the host server will be responsible for the task. In that case, more disks are better, within reason. For general purposes, SATA drives in a RAID 5 or RAID 6 array will suffice, although SAS drives will always provide increased performance. If at all possible, ensure that the physical server has a RAID controller that supports RAID 5 or RAID 6, and plan your storage accordingly.

Source :http://www.pcworld.com/article/201408/how_to_build_a_virtualization_server.html

Understanding BGP Routing

The Border Gateway Protocol (BGP) is the routing protocol of the Internet, used to route traffic across the Internet. For that reason, it's a pretty important protocol, and it can also be the hardest one to understand.

From our overview of Internet routing, you should realize that routing in the Internet is comprised of two parts: the internal fine-grained portions managed by an IGP such as OSPF, and the interconnections of those autonomous systems (AS) via BGP.

Who needs to understand BGP?

BGP is relevant to network administrators of large organizations which connect to two or more ISPs, as well as to Internet Service Providers (ISPs) who connect to other network providers. If you are the administrator of a small corporate network, or an end user, then you probably don't need to know about BGP.

BGP basics

The current version of BGP is BGP version 4, based on RFC4271.
BGP is the path-vector protocol that provides routing information for autonomous systems on the Internet via its AS-Path attribute.
BGP is a Layer 4 protocol that sits on top of TCP. It is much simpler than OSPF, because it doesn’t have to worry about the things TCP will handle.
Peers that have been manually configured to exchange routing information will form a TCP connection and begin speaking BGP. There is no discovery in BGP.
Medium-sized businesses usually get into BGP for the purpose of true multi-homing for their entire network.
An important aspect of BGP is that the AS-Path itself is an anti-loop mechanism. Routers will not import any routes that contain themselves in the AS-Path.

Why do you need to understand BGP?

When BGP is configured incorrectly, it can cause massive availability and security problems, as Google discovered in 2008 when its YouTube service became unreachable to large portions of the Internet. What happened was that, in an effort to ban YouTube in its home country, Pakistan Telecom used BGP to route YouTube's address block into a black hole. But, in what is believed to have been an accident, this routing information somehow got transmitted to Pakistan Telecom's Hong Kong ISP and from there got propagated to the rest of the world. The end result was that most of YouTube's traffic ended up in a black hole in Pakistan.

Best and Top 5 Free Firewall Software for Windows

If you use Internet in your computer system, your computer is always at risk of getting virus infection. Whenever we browse on Internet, some data is downloaded on our system and some data is uploaded from our system. That's why we always need a good firewall software for our computer system.
Firewall is a security software which regularly monitors the incoming and outgoing data when you are online and it automatically blocks or prompts you whenever it detects suspicious activities.
Recently we posted about top 5 free antivirus and anti-spyware software for Windows:
Now its turn of Firewall software for Windows because only antivirus or anti-spyware software is not enough for your computer. If you want complete security, you should also install a firewall software in your PC.
Today in this article, we are going to share top 5 free firewall software for Windows operating system. We have selected the best firewall programs available for Windows which are absolutely free to download and use.
So without wasting time, lets share the list:
1. Zone Alarm Free Firewall
Zone Alarm is one of the most popular and widely used firewall software for Windows. It blocks hackers and prevents viruses & spyware from stealing your personal data and sending it out to the Internet. It works great with almost all antivirus software. Its a 2-way firewall so it also prevents your personal information to be sent on Internet.
Its absolutely free for private use. You can download it using following link:
2. Comodo Firewall
Comodo is another popular free firewall software for Windows. Its very lightweight program which comes with simple and easy to use interface. Just like any other firewall, it defends your PC from Internet attacks and prevents malware from being installed on your PC.

How Does Google Make Its Money: The 20 Most Expensive Keywords in Google AdWords

How does Google make its money? On the heels of Google's blow-out Q2 2011 earnings announcement last week, we wanted to find out the most expensive keywords - what keywords demand the highest costs per click and are most competitive in terms of high search volume.
The 20 most expensive keywords categories with the highest search volume (i.e. the most used keywords) and highest costs per click, thereby netting Google the most money, are:
  1. Insurance (example keywords in this category include "buy car insurance online" and "auto insurance price quotes")
  2. Loans (example keywords include "consolidate graduate student loans" and "cheapest homeowner loans")
  3. Mortgage (example keywords include “refinanced second mortgages” and “remortgage with bad credit”)
  4. Attorney (example keywords include “personal injury attorney” and “dui defense attorney”)
  5. Credit (example keywords include “home equity line of credit” and “bad credit home buyer”)
  6. Lawyer ("personal  injury lawyer," "criminal defense lawyer)
  7. Donate ("car donation centers," "donating a used car")
  8. Degree ("criminal justice degrees online," "psychology bachelors degree online")
  9. Hosting ("hosting ms exchange," "managed web hosting solution")
  10. Claim ("personal injury claim," "accident claims no win no fee")
  11. Conference Call ("best conference call service," "conference calls toll free")
  12. Trading ("cheap online trading," "stock trades online")
  13. Software ("crm software programs," "help desk software cheap")
  14. Recovery ("raid server data recovery," "hard drive recovery laptop")
  15. Transfer ("zero apr balance transfer," "credit card balance transfer zero interest")
  16. Gas/Electricity ("business electricity price comparison," "switch gas and electricity suppliers")
  17. Classes ("criminal justice online classes," "online classes business administration")
  18. Rehab ("alcohol rehab centers," "crack rehab centers")
  19. Treatment ("mesothelioma treatment options," "drug treatment centers")
  20. Cord Blood ("cordblood bank," "store umbilical cord blood")
We found that that 97% of Google's revenue comes from advertising on Google sites. In the last four quarters alone (Q3 2010-Q2 2011), Google brought in $32.2 billion in total advertising revenue.

Google CPC: Google's Highest Cost Per Click Keywords

Thursday, October 22, 2015

Microsoft Office Visualization Tool Available

The Microsoft Office Visualization Tool is an integral part of the Redmond company's security strategy, adapted to counteract the evolution of the threat environment, specifically the increasing focus attackers place on file format-based vulnerabilities and exploits. In this sense, OffVis is designed to equip IT professionals, but also security researchers and security product vendors with the resources necessary to get an insight into the Microsoft Office binary file format. Microsoft explained that the tool enables users to deconstruct .doc-, .xls- and .ppt-based targeted attacks.

Monday, June 9, 2014

Khmer Unicode in SQL 2014

We need to have our database
  . Collation as SQL_Latin1_General_CP850_BIN
  . Defined fields as NChar, NVarchar, ...


When insert we need to use such syntax as :



insert into tblUser(Name) VALUES(N'សួស្តី')
insert into tblUser(Name) VALUES(N'វាសនា')
insert into tblUser(Name) VALUES(N'ស្រីអៀប')

And When we do some search we need to applied : 



select * from tblUser
where Name LIKE N'%សន%'

Friday, June 6, 2014

Keys for Windows Server 2012 R2 Automatic Virtual Machine Activation (AVMA)

Q: What keys should I use in my Windows Server 2012 R2 virtual machines (VMs) to use Automatic Virtual Machine Activation (AVMA)?
A: Windows Server 2012 R2 introduces a new feature, AVMA, which allows VMs running Windows Server 2012 R2 to automatically activate, provided the Hyper-V host they're running on is Windows Server 2012 R2 Datacenter and is itself activated. To tell the VM to use AVMA, you need to give the VM a specific key (this acts very similar to the keys used to tell machines to use Key Management Service--KMS).
The keys to use for Windows Server 2012 R2 can be found at the Microsoft site and are shown below:
  • Server Standard - DBGBW-NPF86-BJVTX-K3WKJ-MTB6V
  • Server Datacenter - Y4TGP-NPTV9-HTC2H-7MGQ3-DV4TW
  • Server Essentials - K2XGM-NMBT3-2R6Q8-WF2FK-P36R2