01 Apr

Google Webmaster Tools : Cleanup needed?

google webmaster tools

Spring is really close and on this April 1st, it would be time to ask yourself when the last time you visited the Google Webmaster Tools. Why? Well because there’s lot of statistics and informations to help you out manage your site’s ranking in the Google’s index.

If you have never heard of these tools, I highly recommend you create a Google account if you have not already one and to register your site to Webmaster Tools. If it’s been a few weeks or a few months, it might be time to do some cleanup too!

 

Key aspects

The main aspects to consider is:

– Check the Sitemaps

– Check crawl errors

– Check the robots.txt file

– Read personalized messages sent by Google

 

Check Sitemaps

The sitemap contains all the links of your site. You can have only one sitemap or a combination of sitemaps. Making sure there are no read errors on your sitemap, ensure you that Google bots are able to properly index your website.

 

Check crawl errors

Crawl errors are often erroneous links that lead to pages 404 (error not found). By clicking on the “Exploration” tab and then “Error of exploration”, you will find them.

Correcting errors 404, increase your ranking by valuable backlinks to your site. With Google Webmaster Tools, the referring websites are visible and this allows you to correct the error on your side or to modify the information of your referrer.

 

Check ROBOTS.TXT file

Make sure Google can navigate comfortably on your website without been blocked by a line of code in the robots.txt file. If Google is partially blocked or completely blocked, your pages will not be indexed.

Alweys in the “Exploration” tab, click “Test Tool for robots.txt”. Google will analyze the file for you and you can fix it then.

For your information, often ROBOTS.TXT file is causing a conflict in representing a site that is “mobile friendly”. In other words, if your robots.txt file is not optimized, it can tell Google that your site is not compatible with mobile devices. On 21st of April, your site will be greatly penalized in Google is that robots.txt file is not fixed.

 

Read personalized messages sent by Google

Consider all the communications that Google sent to you in your dashboard. You will receive useful tips that will help you better rank your website

Have a look at Google Webmasters Tools and not just once a year! The ideal is to visit it every week or several times a week depending on your interest to have a better ranking!

Share this
31 Mar

April Fools Day

april fools day nicolas cage nicholas cage

The 1st of April is the only day we can play tricks (soft ones) openly. So, it is time to have fun!

Obviously, we’ll see good jokes to do to your friends and colleagues on their computer. Then you have to be creative to capture their passwords or distract them long enough to do your MISSION!

 

1. Change Google’s Language

Go at : https://www.google.fr/preferences?hl=fr#languages ​​and change the language preference on Google.

 

2. Control the mouse of your colleague

A computer can manage multiple mouses. Ideally, get a wireless mouse and move the cursor of your colleague. You can add more than 1 in case you get caught!

 

3. Reverse the mouse buttons

Go to the hardware options, mouse, and reverse the order of mouse buttons. Frustration guaranteed with the modal window options!

 

4. A blue screen

If your friend uses Windows, place a blue screen wallpaper and hide all desktop icons. The blue screen is available for download available here.

 

5. Change your friends’ favorites (Animation)

Go to options of the browser and change the browser URL pages of the favorites of your friends by adding http://nyanit.com/ before the “www” like : http://nyanit.com/www.thewebsiteurl.com

Cats will walk on the screen with a fairly assaultive song … This is like a virus! It’s more fun if all the favorites are changed!

 

6. False declaration of love to a colleague via email

Oh yes … It is necessary to know well the colleagues! A small but well proportioned email showing love for another, it’s a winner prank! It takes a few seconds if you prepare your shot and save your message on a USB key. Laughter guaranteed!

 

7. False Tweets

If you use Twitter, then you can use the tweets generator and to say things by people they never say!

Whatever you do, do it with respect and also with restraint. A good joke goes, but if it is too long, insistent and serious this can jeopardize your friendship and your reputation. Play softly!

Share this
30 Mar

GitHub under DDOS Attack since 4 days…

github under ddos attack since 4 days

GitHub, the web platform for teamwork on software development (sharing of source code for GPL or private rights, review and collaboration), has managed to keep its website accessible despite a DDOS attack that continues to fall on their servers since last Friday.

This seems to be Chinese hackers who have set their sights on the platform in order to show their dissatisfaction with the current development  of projects.

A DDOS attack is a denial of service attack, by sending thousands of requests to a server in order to render it inoperative in its ability to distribute the content. DDOS attacks are incredibly more complex and now requires a thorough approach to prepare for and manage the crisis when it happens.

 

How a DDOS attack take place?

A hacker or a group of hackers through several techniques take ownership of computers that have been infected by code (viruses). They divert the joint force of all these computers to a specific point and execute an attack. Like a crowd would take control of a traffic artery, heavy traffic slows the ability to run on it.

 

How to prevent DDOS attacks?

I do not think you can “avoid” a DDOS attack. This is something that may or may not happen to a business. These attacks are planned and designed a target for a reason more or less obvious. Let’s compare the DDOS attack as a terrorist attack, a way to be seen and heard of the mass by an unlawful act in order to harm, to cause damage and fear.

 

The tools available

Fortunately there is some tools available to better prepare for a DDOS attack. These tools must be combined with  some talent of the network managers and be part of an effective action plain against hackers.

The goal is to “filter” the data to determine between good and bad requests and to separate them. The management of these “data packets” is then now possible. We need several layers of protection, to sucessfully filter the data packets.

 

The material

At the hardware level, there are routers such as CISCO, which are able to accurately identify the traffic in the network and assign them some rules. Management is facilitated  for simple attacks by this equipment, but DDOS attacks are rarely simple as they were several years ago.

The use valid protocols  makes detection more difficult to identify. As a first line of defense, these kind of routers do a good job anyway.

Firewalls play a vital role in the security of a company but not in the prevention of a DDOS attack. They will play their role by closing a specific access but are not able to handle and filter the data packets one by one.

 

The strategy

DDOS attacks are not easy to handle and some gaps in the layers of protection must be filled by another layer of protection. This is why a simple equipment will not effectively help you.

The Internet provider is expected to play its role and provide some protection and act as the first layer of protection. Next comes your router, firewall, the internal configuration of your server, the web application management (load balancer), memory management and cache, filtering protection on the root of the website etc.

 

Website Root Protection

Good management of the base of your website is often a step that you are able to do. Be sure to read our first article on the .htaccess file if your server operates under Apache. We defined in this article several important points for the safety of your website set up. There are others, and a specialist like our employees at the technical support, will help you with this.

If your site is under “WordPress”, make sure it will not be hijacked by a gap in its code, by adding to your .htaccess file the following bit of extra code:


# XML RPC BLOCKING
<Files xmlrpc.php>
Order Deny,Allow
Deny from all
</Files>
# /XML RPC BLOCKING

 

Otherwise, your web designer and web hosting company should provide you the layers of protection needed or the protection options to deal with such threats.

Share this

© 2018-2023 Internet Cloud Canada.Tous droits réservés. (Sitemap).