the Factors to Affect the Blog Rank in Google Search Rank
Improve the quality scores that is factors of improving the google search rank
Blog popularity: blog RSS is mainly reflected in the number of visits, the reason is simple, the more popular blog has more subscriptions.
The potential prevalence of blog:derived by analyzing user behavior in blog search, for example how many users click the blog on the search results page. Read more
the First Computer Virus and the Most Powerful Virus in History?
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. Read more
China's first self-developed petaflop super computer launchs into applications
After three months of trial operation, all domestic CPU and system software to build China's first petaflop super computer, the three-meter-tall machines are actually part of a single working unit, the Sunway-Bluelight super computer, installed in the super computer center which indicates that China, following the United States, Japan,being the world's third country using self-CPU to build a petaflop super computer. Read more
2011 Annual Summary of Exciting Design Google Graffiti(Google Doodles)
Google Graffiti (Google Doodles) is Google shows a customized version of Google icon on the home page at festivals and other anniversaries. It is a application of Top Ten Most Popular Google’s Applications in 2011 .After 10 years lobbying,on March 23, 2011 Google obtained the patent of Google Graffiti(Google Doodles) functions . Google Graffiti(Google Doodles) patent name is " the system and method to attract users to log on." This patent also describes a way of transformation home page,let it show a story. Collected here in 2011,some of the most exciting design Google Graffiti(Google Doodles) for appreciation.Most of them are very interesting.You would like them. Read more
Create a USB Boot Disk for Windows 7
If you want to create a USB boot disk for Windows 7, make sure that you backup the files that you have saved on the USB flash drive that you will use. You would need to reformat the drive and all of the files on it will be lost. Also check the BIOS to find out whether your computer is capable of booting from a USB flash drive.Now we can use the tool Diskpart brought by Windows 7 self.You will found it's very easy to create such a USB boot disk.
1.The USB flash drive must have more than 4 GB of available space on it.Click the "Start" button on the taskbar and select the option "All Programs" from the menu list. Select "Accessories" and scroll down the list until you see "Command Prompt" and right-click on it. Click on "Run as Administrator". Read more
What Is a Super-Computer ?
Super-computer usually means buildup by hundreds and thousands or even more processors , and can calculate the large and complex computer issues the ordinary PC and the server can not complete.To help you better understand the computational speed of super-computers we compared the normal computer operation speed of the adults' walking speed, then the super-computer reached the rocket speed. In such a computing speed of the premise that people through the numerical simulation can predict and explain the natural phenomena previously inaccessible experiments. Read more
Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.
Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location. Read more
naked woman captured by google street view
Google Street View, the search engine’s ground-level mapping service that gives the user a 360-degree view of buildings and public thoroughfares, has captured a potentially embarrassing photo.
“Doesn’t Google supposedly use some high-tech program that supposedly pixellated the faces of unsuspecting individuals caught by its invasive Street View cameras?” asks The Smoking Gun in posting this image of a naked woman caught by Google’s cameras standing outside her home naked. Read more
Can You Believe? Let Your Website Gain Optional Google Page Rank
If you want to gain optional Google PR, you just add the following codes(PHP code) to you homepage.
Fill a web address with Optional Google PR which you want after "Location:".For example if you fill Google.com,the Google PR is 10,if you fill msn.com ,the Google PR is 9.So you can choose a web address has the Google PR you want.Then in several days your web site will display the corresponding Google PR. Read more
Computer Failure Caused by CPU Problems
Computer failure caused by CPU is although varied, but also summed up in nothing less than the frequent crashes, POST displays the operating frequency of repeated changes, and can not boot due to excessive overclocking, and system power-up without any reaction of several way.Of course,we should cope them in different ways.
This computer failure are quite common, mainly due to generally poor work by the cooling system,
Solution of Windows 7 Can Not Wake Up after Sleep
Windows 7 won't wake up ? The general circumstance of dead sleep is related to drivers, or to the motherboard's BIOS settings. If the motherboard BIOS and hardware drivers are updated, the proposed update to the latest, and then run Window Update to upgrade system to the latest.
If you still have problems, then see if the computer installed the Read more
LIBYA/DEATH OF MOAMMAR GADHAFI
To those from the outside, revolution seemed to have a domino effect in the Middle East. But while long-suppressed dissatisfaction brought startling turnarounds in Tunisia and Egypt, the uprising in Libya amounted to a bloody civil war.
Unlike Hosni Mubarak or Zine El Abidine Ben Ali, Colonel Moammar Gadhafi was a military man, and a brutal one at that. The de facto leader of Libya since 1969, Gadhafi was known beyond his borders for his roles in terrorist acts, such as the Lockerbie bombing. Read more
Tag:2011, APPLE CO-FOUNDER STEVE JOBS DIES AT 56, DEATH OF MOAMMAR GADHAFI, DEBT CRISES IN EUROPE, DPRK TOP LEADER KIM JONG IL PASSES AWAY, GLOBAL POPULATION EXCEEDS 7 BILLION, IRANIAN NUCLEAR CRISIS WORSENS, NUCLEAR LEAK AFTER POWERFUL EARTHQUAKE IN JAPAN, OSAMA BIN LADEN KILLED BY U.S., review, ROYAL WEDDING, SOUTH SUDAN DECLARES INDEPENDENCE, top ten, U.S. HIT WORLD ECONOMY
What is the NTLDR file?
NTLDR file is a Windows NT/Windows XP boot file,when this file is missing starting the system will prompt "NTLDR is missing ... " and asked to press any key to restart,then can not correctly enter the system. So we should backup the correct system.And what is the NTLDR file ? How to fix the NTLDR file type malfunction?
NTLDR file is a hidden, read-only system file, Read more
Strictly follow the six to make your site unique
1.Site requirements analysis and plan
User requirements analysis, also known as site plan, which is the website design and development of the basis functions. Needs analysis in the preparation of sites prior to the general work is to conduct in-depth communication with the user, and in-depth understanding of user needs analysis of groups of users browsing the main site. Then the user groups, site requirements and the positioning of the trades, some suggestions to the user. Web site needs analysis generally includes the structure and function Read more
Chrome and Firefox fight for the second position of internet browsers
Google Inc. entered the Internet browser market just in 2008, but the free Chrome software has become the second-ranked browser behind Internet Explorer of Microsoft Corp.. Read more
What is the difference between BIOS and CMOS
In the daily operation and maintenance of computer process, often hear a number of statements about the BIOS settings and CMOS settings , many people often confuse the BIOS and CMOS. This article describes the CMOS settings and BIOS settings of distinction between the basic concepts and linkages.
What is BIOS?
The BIOS, is actually a computer's Basic Input-Output System, its content integrated in the computer a ROM chip on the motherboard, the main computer system holds the most important basic input and output procedures, system information set , turn the power on self test procedures and systems bootstrap procedures.
Function of the BIOS
BIOS ROM chip can not only see on the motherboard, and the BIOS management board to a large extent determines whether the performance is superior. BIOS management features include:
1. BIOS interrupt service routine
BIOS interrupt service routine is essentially a programmable interface between the hardware and software in the computer system, mainly used a interface between hardware and software . For example, DOS and Windows operating system on floppy disks, hard drives, optical drives, keyboards, monitors and other peripheral equipment management, are built directly into the system BIOS interrupt service routine basis, and the operator can also access the INT 5, INT 13 other breakpoints directly to call BIOS interrupt service routine.
2.BIOS system setup
Computer components configuration records are placed in the CMOS RAM chip, mainly preserved in the basic situation of the system, CPU features, soft and hard drives, monitors, keyboards and other parts of the information. In the BIOS ROM chip with "System Setup", mainly used to set the parameters of the CMOS RAM. This program in boot time by pressing a particular key enter setup mode, and provides a good interface for the operator to use. In fact, this set the CMOS process parameters also called "BIOS settings." Once the CMOS RAM chip on the computer configuration information is incorrect, the light will make the system to reduce the overall operating performance, soft and hard drives and other components can not be identified, which will lead to a serious system hardware and software failures.
3. POST Power On Self Test
Computer power on, the system first by POST (Power On Self Test) procedure to check each device on the internal. Usually complete POST will include the CPU, 640K base memory, 1M or more extended memory, ROM, motherboard, CMOS memory, serial and parallel, video card, keyboard, harddisk subsystems for testing, once the self-test problems are detected, the system will give a message or a warning whistle.
4. BIOS boot bootloader
After system completed POST, ROM BIOS on the first follow the system CMOS settings stored in the boot sequence search for soft and hard drives and CD-ROM, network servers effectively boot drive, read into the operating system boot record, then gives the system control to the boot record,and lets boot record to complete the system by a smooth start.
This address is http://www.computerites.com/computers-history/2012/01/what-is-the-difference-between-bios-and-cmos-296.html
Wireless encryption WEP, WPA, WPA2 which anti-rub network better and more secure?
Two common encryption WEP, WPA
Currently, the wireless network already exists in several encryption technology, the most commonly used is WEP and WPA encryption. The first wireless LAN security protocol -802.11 Wired Equivalent Privacy (WEP), has been doubtful of most people. While WEP can prevent snoopers into the wireless network, but there was reason to doubt its safety, because WEP is very easy to crack, like a plastic lock on the door.
WEP security encryption. WEP feature uses the algorithm rc4 prng developed by rsa data Read more
Why the Web Security Is so Frail ?
Recently U.S. security think tank Strategic Forecasting Inc said its website had been hacked and some names of corporate subscribers had been made public.
Stratfor said the breach came from an unauthorized party, while activist hacker group Anonymous claimed responsibility.
And as a result of this incident the operation of Stratfor's servers and email have been suspended.
Hackers claiming to be the group Anonymous said they had obtained around 4,000 credit card details, Read more
the Difference between Sleep and Wait in Java Multithread
Sleep is used for thread control, and Wait is used for the communication between threads, and the methods to cooperate Wait are also notify and notifyAll.
Difference one: Read more
Six Skills of Browsing Webs safely
I believe the Internet security affects every Internet user, how can we ensure our own security from external attack, and then, here are eight skills to share for everyone, I hope you can add and discuss.
1.Ensure the Internet environment is safe
Access Internet in our own homes. Because we can not confirm the other computer is safe,but we can ensure our family's computer security. Read more
Can Not Remember the Blue Screen Error Code? Teach You to See the Blue Screen log
Through the error code of blue screen,we can judge the problem of the computer.But it disappeared soon, most people can not remember the error code.
In fact, windows system error every time, there will be a corresponding log is recorded, just find the log to analyze,we can find the reason of blue screen easily. Read more
Six Benefits of Installing Windows XP Windows 7 Dual Operating System
First, it is beneficial for both systems to compare real-time performance.
Second, it is beneficial to ensure the operating system safe and stable (install different Anti-virus softwares in the two different systems ). Read more
the Computer Skill to Solve Cannot Delete File and Folder in Window 7
Many friends have encountered the problem.If in Windows 7 a process is calling the file, then the file will not be deleted.Such the problems are common.For example,before you use Word to open the "d:\a.doc" file, now delete the file, but found it impossible to remove.Pop up a dialog box that prompts the operation can not be completed,you cannot delete the file.We can solve this as follows. Read more
What is my IP address? Google recently adds a new skill: to tell you what the IP address you own is. It is also very simple to use. Read more
Top Ten Most Popular Google's Applications in 2011
Google's innovative spirit is well-known, then, in the about to pass 2011,which Google's applications has won the majority of users love it. The following content will offer you the top ten applications most popular among users.In 2011 Google spent a lot of effort to tease and please the readers, such as Easter eggs, fake video and Web pages, of course, the famous interactive graffiti. Read more
Tag:applications, Chromercise, do a barrel roll, gay rainbow, google, google street view, most popular, popular, top, top tem, Turkey eggs
Solve a Strange Problem of HTTP Error 404.17 - Not Found
Today,i install the PHP on a x64 Windows 7,when i debug the program inthe localhost it is wrong with
HTTP Error 404.17 - Not Found
The requested content appears to be script and will not be served by the static file handler.
Detailed Error Information:
Error Code 0x80070032
PYONGYANG—North Korea on Monday urged its 24 million people to rally behind 20-something heir-apparent Kim Jong Un as the nation mourned the death of supreme leader Kim Jong Il.
South Korea, meanwhile, put its military on high alert, while people in the streets of Pyongyang broke into tears as they learned the news that Kim had died at the age 69 of heart failure. The United States said it was in close contact with allies South Korea and Japan. Read more
HTTP Error 403 Forbidden
When you visit a Web site if you receive a following error message 403 :
Server Error in Application "<application name>"
HTTP Error 403.1 - Forbidden
Description of HRESULT: You have attempted to run a CGI, ISAPI or other executable program from a directory that does not allow executables to run.
Many user install dual operating system on their computer,even after Windows 7 appeared.Most of them will install Windows 7 Windows XP dual system right now.But how to install dual system?Now let us to see the procedures below: Read more
The solution of the boot files and the boot option Menu are lost after Windows XP Windows 7 dual operating systems reinstalled:
1.Install Windows XP in Windows 7 to make up of a dual system.
2.Windows XP Windows 7 dual system, reinstall Windows XP.