Saturday , 20 July 2024
Breaking News

Hati-hati dengan keywords korban SEO

Sebagai tambahan artikel sebelumnya tentang bagaimana memilih keywords yang baik, kali ini saya akan coba mengulas bagaimana sebuah keywords bisa menjadi korban seo. Untuk mempermudah, saya langsung ambil contoh kasus yang saya temukan. Kemaren sudah dibahas kalau lebih baik memilih keywords yang berhubungan dengan apa produk atau jasa yang dicari orang dan bukan terfokus pada …

Read More »

Pengaruh jumlah halaman terhadap google pagerank

Tulisan ini masih merupakan lanjutan dari tulisan-tulisan tentang google pagerank sebelumnya. Dimana algoritma pagerank memiliki pengaruh terhadap beberapa aspek dalam website yang kita buat. Yang akan saya coba bahas kali ini adalah pengaruh dari jumlah halaman dari sebuah website terhadap google pagerank. Sebelumnya kembali perlu diperhatikan adalah, pagerank ditentukan untuk setiap halaman akumulasi pagerank berbanding lurus dengan jumlah halaman (dengan catatan website tidak mendapat kontibusi ke/dari halaman lain). variabel penting dari pengaruh konsep jumlah halaman ini dan akan dijelaskan di bawah.

Read More »

Keponakan dari Desa

Suatu kali keponakan saya datang dari desa dengan motor dan tas penuh meninggi di punggungnya, isinya adalah hasil kebun kakak saya: buah petai! Buah yang baunya jauh lebih menggemparkan dibanding rasanya. Jumlahnya membuat saya terpana dan karena banyaknya saya berencana membagi-bagikan juga ke tetangga. Ada banyak alasan, pertama menyenangkan tetangga adalah pekerjaan yang menggembirakan. Kedua, makan petai enaknya harus bersama-sama. Ini baru adil. Karena jika engkau makan, aku cuma kena baunya, ini kejahatan, karena bau petai ini memang jahat sekali. Saya bukan penggemar petai, tetapi juga tidak anti sama sekali. Tapi intinya ialah bahkan bau pesing pun kalau itu hasil produksi bersama pasti jauh dari pertengkaran. Tetapi bukan soal petai itu yang akan saya ceritakan, melainkan kedatangan keponakan yang salah waktu itu, meskipun ia datang hendak membagi kegembiraan. Tetapi itulah waku yang saya sedang diburu-buru pekerjaan. Komputer baru saja menyala dan sebuah tulisan buru-buru harus dirampungkan. Pada saat seperti ini, …

Read More »

Creating Networks with ISA 2004 (Part 2)

In part one of this article series we focused on network creation and network relationships. In this article we will focus on advanced network design and network flow within ISA 2004. We have already established in the previous article that the ISA server is used to divide networks and that networks are able to be defined and policies assigned to each network in form of a defined rule base for each network. Contrary to sensationalist belief, the DMZ and networks like it are still alive and well and have a place in networking. In fact the very people that say that the DMZ is dead are the ones that are paranoid about publishing servers that reside on the internal network and for this reason prefer to have an extremely secure back to back firewall scenario in place that offers highly secure access. This in itself is an advanced type of …

Read More »

Creating Networks with ISA 2004 (Part 1)

Most organizations have started to realize the true benefit of ISA 2004 as an enterprise grade firewall and I have noticed a trend emerging among numerous enterprises moving towards using ISA to protect critical information assets. ISA is also being used to replace competitive products that do not offer similar application level protection for Microsoft networks. For this reason the creation and segmentation of networks is pertinent within ISA. ISA Server 2004 is built to provide a multi-networking model that affords granular control of network traffic between networks. These networks can be defined within the network objects in the ISA Server Management; by configuring these options, advanced configurations of multiple networks with intricate relationships can be achieved. ISA networks ISA networks are designed or created depending on the location of ISA server in relation to the other network elements within the network. For example if a DMZ is required and …

Read More »

Cisco and Microsoft Unveil Joint Architecture for NAC-NAP Interoperability

Security architecture to enable customers and partners to deploy interoperable Cisco Network Admission Control and Microsoft Network Access Protection. BOSTON — Sept. 6, 2006 — Cisco Systems Inc. and Microsoft Corp. are delivering on their previously stated commitment to provide customers and partners with clear guidance on how Cisco Network Admission Control (NAC) and Microsoft® Network Access Protection (NAP) will interoperate. The two companies are demonstrating the new interoperable architecture at The Security Standard conference (http://www.thesecuritystandard.net), which opened today in Boston. A technical white paper released today by the two companies describes how Cisco NAC and Microsoft NAP interoperate for security policy enforcement and health assessment. The white paper describes the architecture and provides details on how to integrate the embedded security capabilities of Cisco’s network infrastructure with those of Microsoft Windows Vista™ and the future version of Windows Server®, code-named “Longhorn.” The white paper can be downloaded at http://www.cisco.com/go/nac …

Read More »

Getting Started with ISA Server

If you’re just getting started with ISA Server you might find that its hard to tell where the place is to start. One place you could start is by using the Getting Started Wizard. You can access the Wizard by opening the ISA Management console and clicking the topmost node in the left pane. Be sure that you have Taskpad view enabled by right clicking on an object in the left pane, then going to View and then click on Taskpad. If you’re just getting started with ISA Server you might find that its hard to tell where the place is to start. One place you could start is by using the Getting Started Wizard. You can access the Wizard by opening the ISA Management console and clicking the topmost node in the left pane. Be sure that you have Taskpad view enabled by right clicking on an object in …

Read More »

Introduction to Exchange 2007 Server Roles

Exchange 2007 introduces a new concept to Exchange organizations, the concept of server roles. Similar to how a Windows server can host one or more roles, this type of configuration has been implemented in Exchange Server 2007. Introduction Server roles allow an administrator to split the functions of an Exchange server and place each role, or a combination of roles, on different servers in the organization. This can be done for performance reasons, management reasons, or any other reason deemed necessary by the organization’s policies.

Read More »

Installing Exchange 2007 (Part 2)

Introduction Installing Exchange 2007 is just as easy as previous versions, and once you have prepped AD, the rest is pretty straight-forward. That doesn’t mean you should throw in the CD and start clicking Next! Be sure to review the prerequisites in the first part of this series to reduce any confusion that may lead to errors or worse. GUI Installation With all the prerequisites taken care of we can begin the Exchange 2007 installation. The GUI-based installation is pretty straightforward. Insert the CD and run Setup.exe from the root of the disc. You will need certain permissions depending on your current configuration and how you prepared the domain. You will need Enterprise and Local Administrator privileges, and if you have not already prepared the domain you will also need Schema Administrator permissions as well. If you already have an Exchange 2007 server in the domain you will also need …

Read More »