Delete blog or change URL: What happens then?

Previously, bloggers are strongly advised against deleting blogs and what happens to the blog URL blog URL if you delete the blog. For reasons, see Why you should not delete a blog and what to do if you change the URL of a blog.

However, because Blogger has been informed of spammers grabbing deleted blog URL for spamming purposes, the practice of releasing a blog URL the moment the blog is deleted has been discontinued. Now if any Google Blogger blogger delete his or her blog, the blog URL is no longer released for others to register, but is kept for the original creator to claim back later.

The reason for this post is because of many questions and requests for help related to the above, and rather that repeating the same thing, if I ever get another question related to this, all I need to do is to point them to this post.

The most recent one is about a very fortunate blogger who wanted a particular blogspot URL which had already been registered by someone else who didn't do anything or didn't do much with the blog and the blog had been left neglected. In this particular very rare case, the blogger was able to contact that blog owner who is very cooperative. The blog owner deleted the blog so the intended new owner can claim it. As expected, she could not do so.

However, not all is lost provided the previous owner is willing to cooperate. All she has to do to to contact the previous owner again, requesting him or her to register that deleted blog again, and then invite the intended new owner to become co-author via Dashboard > Settings > Permissions. Once she has accepted the invitation, the cooperative old owner can make her administrator, and then remove himself or herself. Once this is all done, the blog have found a new, loving owner.
Selengkapnya.....

Posted in Labels: |

Architecture

Imagine with us that you are the engineering director of a large company and you are interviewing candidates for a position as your software security architect. You ask the three main candidates, "Just how secure will you be able to make my software?"

If one of the candidates answers, "I can make your software secure against any attack," we hope you'll show him the door. If another candidate answers, "I will make your software as secure as it can possibly be," we hope you'll give her a failing grade as well.

In our opinion, the winning response is, "How secure do you want it to be?" That's because designing in too much security drains away resources, frustrates people, and can complicate matters so much that intelligent software maintenance is impeded.[2] Superfluous security controls can actually diminish the overall safety of an enterprise.

[2] By the way, we'd give extra credit to any candidate who asked his own question: "What do you mean by `secure'?"

The process of selecting design elements and principles to match a defined security need is what we mean by security architecture. In this chapter, we'll examine the role of architecture and how it applies throughout the development process, and we'll introduce the security engineering principles we believe are key to the development of secure software. Finally, at the end of the chapter, we'll discuss how some of these ideas were not followed in the design of the TCP stack with regard to our SYN flood example.


(Many of our points, as you will see, apply to any complex human enterprise.)

Returning to our interview example for a moment, what would your answer be to the question, "How secure do you want it to be?" Our suggested answer is, "Just secure enough." Throughout this book, we'll help you figure out what that would mean for your company. We also aim to teach you how to select, from many possible technical solutions, a set of complementary tools and procedures to ensure that your software is just that secure.
Selengkapnya.....

Posted in Labels: |

No Straight Thing

In late 1996 there were approximately 14,000,000 computers connected to the Internet. Nearly all of them relied on the Transmission Control Protocol (TCP), one of the fundamental rule sets underlying communication between computers, and the one used for most common services on the Internet. And although it was known to have security weaknesses, the protocol had been doing its work quietly for nearly two decades without a major attack against it.

But on September 1 of that year, the online magazine Phrack published the source code for a network attack tool that exploited the trusting way the protocol handled connection requests (see the sidebar A Fractured Dialogue). Suddenly, the majority of those 14,000,000 computers were now vulnerable to being taken offline—in some cases, crashed—at the whim of any malcontent capable of compiling the attack program.
A Fractured Dialogue
What happens when you call someone on the phone and they hang up before you do—and you decide not to hang up yourself? Until a few years ago (in the U.S., at least), it was possible to tie up the other person's telephone line for a long time this way.

Today we might call this trick a denial of service attack. It's an example of what can happen when one party to a conversation decides not to play by the rules. In the network world, a set of such rules is called a protocol. And the network attack known as a TCP SYN flood is an example of what can happen when an attacker controlling one side of a computer dialogue deliberately violates the protocol.


The Transmission Control Protocol (TCP) is used many billions of times a day on the Internet. When email is exchanged, for example, or when someone visits a web site, the dialogue between the sending and receiving computers is conducted according to these rules. Suppose that computer A wants to initiate a connection with computer B. Computer A offers to "synchronize" with computer B by sending a set of ones and zeros that fit a special pattern. One feature of this pattern is that a particular bit (the SYN flag) is set. Computer B agrees to the exchange by replying in an equally specific bit pattern, setting both the SYN flag and the ACK ("acknowledge") flag. When computer A confirms the connection by replying with its own ACK, the TCP session is open, and the email or other information begins to flow. (Figure 1-1 shows this exchange.)

As early as the mid-1980s, researchers realized that if the initiating computer never completed the connection by sending that final acknowledgment, the second computer would be in a situation similar to that of the hapless telephone user whose caller never hung up. To be sure, in each case the computer programs implementing the dialogue can break the connection after a suitable period of time, freeing up the telephone line or network connection. But suppose that an attacker writes software capable of sending dozens or hundreds of false connections requests per second. Wouldn't the receiving computer be overwhelmed, keeping track of all those half-open connections? That turns out to be the foundation for a TCP SYN flood attack; and in 1996, it was deadly.[1]
It was a time when new vulnerabilities were being disclosed daily, and the article at first went unnoticed by most security professionals. It was, however, read carefully in some quarters. Within days, an ISP in New York City named Panix was repeatedly savaged using the technique. Day after day, bombarded by tens of thousands of false connection requests—known as a SYN flood , after the protocol element that was misapplied—Panix was helpless to service its paying customers. The security community took notice and began to mobilize; but before experts could come up with an effective defense, the attacks spread. The Internet Chess Club was clobbered several times in September. Scattered attacks troubled several more sites, mostly media outlets, in October. In November, on election night, the New York Times web site was disabled, and the resulting publicity opened the floodgates. By the time an effective defense had been devised and widely deployed some weeks later, hundreds of sites around the world had been victimized. Tens of thousands more were affected, as experts and laypersons alike struggled to cope with the practical impact of this first widespread denial of service attack.
Selengkapnya.....

Posted in Labels: |

Make Money With Google AdSense

What is AdSense?
Google.com earns most of its revenue by allowing other website owners to advertise on their search result pages. All this is managed through a program they call AdWords.

Now you can earn a share of the revenue that Google earns from AdWords by placing these same text ads on your site. In other words, you're helping Google advertise and they pay you a percentage of what they earn.
This program is called AdSense.

Every website owner should be involved in this
. It's just too good of an opportunity to pass up. Even if your site is just for information purposes, you can still participate and make decent money with AdSense -- or at least enough to fund your website.
So if you are one of those people that don't like the idea of paying for a site, this is an excellent way to earn your money back and then some.

Even if you earned as little as $10 in a month, it would more than likely cover some or all of the costs for your web site. Perhaps you are simply looking for ways to add additional revenue to your website, then it's perfect for that situation too.
This program is getting so popular, people are creating websites just to display the ads and profit from Google's AdSense alone.
I don't usually like to use the term "easy money" because there really is no such thing. You still have to create your own website and learn how to bring in traffic in order to make good money with this program.
I certainly don't want to make it sound like you get something for doing absolutely nothing. There's no such thing.
However, I've got to say that AdSense is probably the closest you'll ever come to fast money on the Internet -- especially if you already have a website that gets a good amount of traffic.
What's even better...the program is completely free. You can also use it on multiple websites and there is no limit to the amount you can earn.
Selengkapnya.....

Posted in Labels: |

Best color for Google Adsense

Before now I guest that blending Google Adsense color with our site will give best income than the other color. For example if the site background is white, black for font and blue for hyperlink so we choose set color for Adsense with white backgroun and border, black for font and blue for hyperlink. If you use this trick your Adsense code will looks like part of your site and not the ads. So people will enjoy click if the interest with the adsense content. Remember almost all users are lazy to click ads even less banner.

But some people also said that the best color is blue. User will assume if blue is hyperlink and hyperlink can be clicked. Let's compare if the link have black color. User will assume that this is not link it just regulary font not linked to other page. Except they move their mouse to the link.
Some people also said if the best color is catch attention color that different with your site color. For example if your site color is standar you can use red color for your adsense. The catch attention color is more attractive so user will click the adsense.

There are many best color for adsense, which one is the best?

After reading on some blog I make a conclucion that best adsense color that can give more click is different for each site. But there are main choises ie blending, blue, and catch attention.

* Use blending if you want your adsense looks like part of your site.
* Use blue if you want use user minded if blue is link.
* Use catch attention if you want show your adsense to user so they interest to click it.

What is the best for your site can be found by experimental. You can use adsense channel for this.

Create adsense code with your color format choises than give a channel that can be show what color that use are using. For example blue color on site A give channel siteA_blue. Then put your adsense code on your site and let it for several days or weeks.

After several days or weeks change to the other color format or you can combine the color for all adsense on your site. For example use blue for adsense code on sidebar and blending for adsense code on main bar.

Then you can compare earning for each channel and use what color that give you more income to your site for a long time as long as you don't change your site template.
Selengkapnya.....

Posted in Labels: |

Spend Your Money to Gain Success

You can't gain your success with Google Adsense or another affiliates program without spend your money. It's wrong opinion if you just need to work a little and spend little money to gain success.

If you read some promotion book, it looks you don't need working hard. You just need to build website, put adsense looks like part of your site, and submit it to google, yahoo, or live. After that you just update your site periodically. It seems you aren't necessary to spend a lot of time to update your site. You just need to use small time in a week then let the website work for you.
But you are wrong! The right opinion is you must working to gain your success.

To gain success with Google Adsense, your website must have many visitor. To get more visitor or make people know about your website so you must advertise your website. To advertise so you must spend your money.

There are no real free advertising, include submit your website into google, yahoo, or live. You must spend your money to pay internet connection. It's really free if someone pay your internet connection.

To improve your site and earn more visitor you can buy some service like adwords. To do this you must spend your money too.

Besides that you must learn your site some case like:
- How long your site loading. People don't like to waste time to wait for site finish loading.
- Which adsense (or affiliates) that be liked by your visitor.
- What is the popular content on your site
- Where is your visitor come from
- What function you think will make people visit your site.
- etc

After learn some case you can make your website better than the old one. So many visitor will come to your site. You can buy some useful tools to analize your website.

So the right opinion is you can't gain success with adsense just by spend litlle money and time.
Selengkapnya.....

Posted in Labels: |