the Factors to Affect the Blog Rank in Google Search Rank

the Factors to Affect the Blog Rank in Google Search Rank

Improve the quality scores that is factors of improving the google search rank

Blog popularity: blog RSS is mainly reflected in the number of visits, the reason is simple, the more popular blog has more subscriptions.

The potential prevalence of blog:derived by analyzing user behavior in blog search, for example how many users click the blog on the search results page. Read more

the First Computer Virus and the Most Powerful Virus in History?

the First Computer Virus and the Most Powerful Virus in History?

A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. Read more

China’s First Self-Developed Petaflop Super Computer Launchs into Applications

China's first self-developed petaflop super computer launchs into applications

After three months of trial operation, all domestic CPU and system software to build China's first petaflop super computer, the three-meter-tall machines are actually part of a single working unit, the Sunway-Bluelight super computer, installed in the super computer center which indicates that China, following the United States, Japan,being the world's third country using self-CPU to build a petaflop super computer. Read more

2011 Annual Summary of Exciting Design Google Graffiti(Google Doodles)

2011 Annual Summary of Exciting Design Google Graffiti(Google Doodles)

Google Graffiti (Google Doodles) is Google shows a customized version of Google icon  on the home page at festivals and other anniversaries. It is a application of  Top Ten Most Popular Google’s Applications in 2011 .After  10 years lobbying,on March 23, 2011 Google  obtained the patent of Google Graffiti(Google Doodles) functions .  Google Graffiti(Google Doodles) patent name  is " the system and method to attract users to log on." This patent also describes a way of transformation home page,let it show a story. Collected here in 2011,some of the most exciting design  Google Graffiti(Google Doodles) for appreciation.Most of them are very interesting.You would like them. Read more

Create a USB Boot Disk for Windows 7

Create a USB Boot Disk for Windows 7

If you want to create a USB boot disk for Windows 7, make sure that you backup the files that you have saved on the USB flash drive that you will use. You would need to reformat the drive and all of the files on it will be lost. Also check the BIOS to find out whether your computer is capable of booting from a USB flash drive.Now we can use the tool Diskpart brought by Windows 7 self.You will found it's very easy to create such a USB boot disk.

1.The USB flash drive must have more than 4 GB of available space on it.Click the "Start" button on the taskbar and select the option "All Programs" from the menu list. Select "Accessories" and scroll down the list until you see "Command Prompt" and right-click on it. Click on "Run as Administrator". Read more

What Is a Super-Computer ?

What Is a Super-Computer ?

Super-computer usually means buildup by hundreds and thousands or even more processors , and can calculate the large and complex computer issues the ordinary PC and the server can not complete.To help you better understand the computational speed of super-computers we compared the normal computer operation speed of the adults' walking speed, then the super-computer reached the rocket speed. In such a computing speed of the premise that people through the numerical simulation can predict and explain the natural phenomena previously inaccessible experiments. Read more

Computer Basics : Whats My Ip Address ?

Whats my ip address ? What is an IP address?

Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.

Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location. Read more

Naked Woman Captured by Google Street View

naked woman captured by google street view

Google Street View, the search engine’s ground-level mapping service that gives the user a 360-degree view of buildings and public thoroughfares, has captured a potentially embarrassing photo.

“Doesn’t Google supposedly use some high-tech program that supposedly pixellated the faces of unsuspecting individuals caught by its invasive Street View cameras?” asks The Smoking Gun in posting this image of a  naked woman caught by Google’s cameras standing outside her home naked. Read more

Can You Believe? Let Your Website Gain Optional Google Page Rank

Can You Believe? Let Your Website Gain Optional Google Page Rank

If you want to gain optional Google PR, you just add the following codes(PHP code) to you homepage.

Fill a web address with Optional Google PR which you want after "Location:".For example if you fill Google.com,the Google PR is 10,if you fill msn.com ,the Google PR is 9.So you can choose a web address has the Google PR you want.Then in several days your web site will display the corresponding Google PR. Read more

Computer Failure Caused by CPU Problems

Computer Failure Caused by CPU Problems

Computer failure caused by CPU is although varied, but also summed up in nothing less than the frequent crashes, POST displays the operating frequency of repeated changes, and can not boot due to excessive overclocking, and system power-up without any reaction of several way.Of course,we should cope them in different ways.

1.Frequent crashes


This computer failure are quite common, mainly due to generally poor work by the cooling system,

Read more

Solution of Windows 7 Can Not Wake Up after Sleep

Solution of Windows 7 Can Not Wake Up after Sleep

Windows 7 won't wake up ? The general circumstance of dead sleep is related to drivers, or to the motherboard's BIOS settings. If the motherboard BIOS and hardware drivers are updated, the proposed update to the latest, and then run Window Update to upgrade system to the latest.

If you still have problems, then see if the computer installed the Read more

Review 2011

No.1

LIBYA/DEATH OF MOAMMAR GADHAFI

To those from the outside, revolution seemed to have a domino effect in the Middle East. But while long-suppressed dissatisfaction brought startling turnarounds in Tunisia and Egypt, the uprising in Libya amounted to a bloody civil war.

Unlike Hosni Mubarak or Zine El Abidine Ben Ali, Colonel Moammar Gadhafi was a military man, and a brutal one at that. The de facto leader of Libya since 1969, Gadhafi was known beyond his borders for his roles in terrorist acts, such as the Lockerbie bombing. Read more

What Is the NTLDR File ?

What is the NTLDR file?

NTLDR file is a Windows NT/Windows XP boot file,when this file is missing starting the system will prompt "NTLDR is missing ... " and asked to press any key to restart,then can not correctly enter the system. So we should backup the correct system.And what is the NTLDR file ? How to fix the NTLDR file type malfunction?

NTLDR file is a hidden, read-only system file, Read more

Strictly Follow the Six to Make Your Site Unique

Strictly follow the six to make your site unique

1.Site requirements analysis and plan
User requirements analysis, also known as site plan, which is the website design and development of the basis functions. Needs analysis in the preparation of sites prior to the general work is to conduct in-depth communication with the user, and in-depth understanding of user needs analysis of groups of users browsing the main site. Then the user groups, site requirements and the positioning of the trades, some suggestions to the user. Web site needs analysis generally includes the structure and function Read more

Chrome and Firefox Fight for the Second Position of Internet Browsers

Chrome and Firefox fight for  the second position of internet browsers
Google Inc. entered the Internet browser market just in 2008, but the free Chrome software has become the second-ranked browser behind Internet Explorer of Microsoft Corp.. Read more

What Is the Difference Between BIOS and CMOS ?

What is the difference between BIOS and CMOS

In the daily operation and maintenance of computer process, often hear a number of statements about the BIOS settings and CMOS settings , many people often confuse the BIOS and CMOS. This article describes the CMOS settings and BIOS settings of distinction between the basic concepts and linkages.

What is BIOS?

The BIOS, is actually a computer's Basic Input-Output System, its content integrated in the computer a ROM chip on the motherboard, the main computer system holds the most important basic input and output procedures, system information set , turn the power on self test procedures and systems bootstrap procedures.

Function of the BIOS

BIOS ROM chip can not only see on the motherboard, and the BIOS management board to a large extent determines whether the performance is superior. BIOS management features include:

1. BIOS interrupt service routine

BIOS interrupt service routine is essentially a programmable interface between the hardware and software in the computer system, mainly used a interface between hardware and software . For example, DOS and Windows operating system on floppy disks, hard drives, optical drives, keyboards, monitors and other peripheral equipment management, are built directly into the system BIOS interrupt service routine basis, and the operator can also access the INT 5, INT 13 other breakpoints directly to call BIOS interrupt service routine.

2.BIOS system setup

Computer components configuration records are placed in the CMOS RAM chip, mainly preserved in the basic situation of the system, CPU features, soft and hard drives, monitors, keyboards and other parts of the information. In the BIOS ROM chip with "System Setup", mainly used to set the parameters of the CMOS RAM. This program in boot time by pressing a particular key enter setup mode, and provides a good interface for the operator to use. In fact, this set the CMOS process parameters also called "BIOS settings." Once the CMOS RAM chip on the computer configuration information is incorrect, the light will make the system to reduce the overall operating performance, soft and hard drives and other components can not be identified, which will lead to a serious system hardware and software failures.

3. POST Power On Self Test

Computer power on, the system first by POST (Power On Self Test) procedure to check each device on the internal. Usually complete POST will include the CPU, 640K base memory, 1M or more extended memory, ROM, motherboard, CMOS memory, serial and parallel, video card, keyboard, harddisk subsystems for testing, once the self-test problems are detected, the system will give a message or a warning whistle.

4. BIOS boot bootloader

After system completed POST, ROM BIOS on the first follow the system CMOS settings stored in the boot sequence search for soft and hard drives and CD-ROM, network servers effectively boot drive, read into the operating system boot record, then gives the system control to the boot record,and lets boot record to complete the system by a smooth start.

This address is http://www.computerites.com/computers-history/2012/01/what-is-the-difference-between-bios-and-cmos-296.html

Wireless Encryption WEP, WPA, WPA2 Which Anti-Rub Network Better and More Secure?

Wireless encryption WEP, WPA, WPA2 which anti-rub network better and more secure?
Two common encryption WEP, WPA

Currently, the wireless network already exists in several encryption technology, the most commonly used is WEP and WPA encryption. The first wireless LAN security protocol -802.11 Wired Equivalent Privacy (WEP), has been doubtful of most people. While WEP can prevent snoopers into the wireless network, but there was reason to doubt its safety, because WEP is very easy to crack, like a plastic lock on the door.

WEP security encryption. WEP feature uses the algorithm rc4 prng developed by rsa data Read more

Why the Web Security Is so Frail ?

Why the Web Security Is so Frail ?

Recently U.S. security think tank Strategic Forecasting Inc said its website had been hacked and some names of corporate subscribers had been made public.

Stratfor said the breach came from an unauthorized party, while activist hacker group Anonymous claimed responsibility.
And as a result of this incident the operation of Stratfor's servers and email have been suspended.

Hackers claiming to be the group Anonymous said they had obtained around 4,000 credit card details, Read more

the Difference between Sleep and Wait in Java Multithread

the Difference between Sleep and Wait in Java Multithread

Sleep is used for thread control, and Wait is used for the communication between threads, and the methods to cooperate Wait are also notify and notifyAll.

Difference one: Read more

Six Skills of Browsing Webs safely

Six Skills of Browsing Webs safely
I believe the Internet security affects every Internet user, how can we ensure our own security from external attack, and then, here are eight skills to share for everyone, I hope you can add and discuss.

1.Ensure the Internet environment is safe

Access Internet in our own homes. Because we can not confirm the other computer is safe,but we can ensure our family's computer security. Read more

Can Not Remember the Blue Screen Error Code? Teach You to See the Blue Screen log

Can Not Remember the Blue Screen Error Code? Teach You to See the Blue Screen log

Through the error code of blue screen,we can judge the problem of the computer.But it disappeared soon, most people can not remember the error code.
In fact, windows system error every time, there will be a corresponding log is recorded, just find the log to analyze,we can find the reason of blue screen easily. Read more

Six Benefits of Installing Windows XP Windows 7 Dual Operating System

Six Benefits of Installing Windows XP Windows 7 Dual Operating System

First, it is beneficial for both systems to compare real-time performance.

Second, it is beneficial to ensure the operating system safe and stable (install different Anti-virus softwares in the two different systems ). Read more

the Computer Skill of Solving Cannot Delete File and Folder in Window 7

the Computer Skill to Solve Cannot Delete File and Folder in Window 7

Many friends have encountered the problem.If in Windows 7 a process is calling the file, then the file will not be deleted.Such the problems are common.For example,before you use Word to open the "d:\a.doc" file, now delete the file, but found it impossible to remove.Pop up a dialog box that prompts the operation can not be completed,you cannot delete the file.We can solve this as follows. Read more

Using Google Search Query Your IP Address Easily

What is my IP address? Google recently adds a new skill: to tell you what the IP address you own is. It is also very simple to use. Read more

Top Ten Most Popular Google’s Applications in 2011

Top Ten Most Popular Google's Applications in 2011

Google's innovative spirit is well-known, then, in the about to pass 2011,which Google's applications has won the majority of users love it. The following content will offer you the top ten applications most popular among users.In 2011 Google spent a lot of effort to tease and please the readers, such as Easter eggs, fake video and Web pages, of course, the famous interactive graffiti.  Read more

Solve a Strange Problem of HTTP Error 404.17 – Not Found

Solve a Strange Problem of HTTP Error 404.17 - Not Found

Today,i install the PHP on a x64 Windows 7,when i debug the program inthe localhost it is wrong with

HTTP Error 404.17 - Not Found
The requested content appears to be script and will not be served by the static file handler.
Detailed Error Information:
Module StaticFileModule
Notification ExecuteRequestHandler
Handler StaticFile
Error Code 0x80070032

Read more

North Koreans rally around Kim Jong Il’s heir

PYONGYANG—North Korea on Monday urged its 24 million people to rally behind 20-something heir-apparent Kim Jong Un as the nation mourned the death of supreme leader Kim Jong Il.

South Korea, meanwhile, put its military on high alert, while people in the streets of Pyongyang broke into tears as they learned the news that Kim had died at the age 69 of heart failure. The United States said it was in close contact with allies South Korea and Japan. Read more

Solve the Problem of HTTP Error 403 Forbidden

HTTP Error 403 Forbidden
When you visit a Web site if you receive a following error message 403 :
Server Error in Application "<application name>"
--------------------------------------------------------------------------------
HTTP Error 403.1 - Forbidden
HRESULT: 0x80070005
Description of HRESULT: You have attempted to run a CGI, ISAPI or other executable program from a directory that does not allow executables to run.

Read more

Windows XP Windows 7 Dual Operating System Simple Installation Procedures and Attentions

Many user install dual operating system on their computer,even after Windows 7 appeared.Most of them will install Windows 7 Windows XP dual system right now.But how to install dual system?Now let  us to see the procedures below: Read more

Solution of the Boot Files and the Boot Option Menu are Lost after Windows XP Windows 7 Dual System Reinstalled

The solution of the boot files and the boot option Menu are lost after Windows XP Windows 7 dual operating systems reinstalled:

1.Install Windows XP in Windows 7 to make up of a dual system.
2.Windows XP Windows 7 dual system, reinstall Windows XP.

Read more