December 23, 2009

10 Tips for Web Designers to Ensure Client Satisfaction

Maybe you're in the small percentage of web designers who has never had a problem client, always turns everything in on time, and has never run into issues during a project. For the rest of you, these 10 tips for web designers will make your lives easier, whether you are just starting out in this field (or still in school), or you're a veteran web design ninja.



1. Set realistic goals, expectations, and deadlines


This one is probably the hardest for most web designers. We all want to say "Yeah, I can do that, it'll be awesomely high-tech, and it'll be done tomorrow." but the harsh reality is we often have many projects going, things come up, servers go down, and life sometimes gets in the way of our work (as does Internet Explorer...)


To avoid unhappy clients, overestimate your deadlines, downplay your design and coding skills, and be honest when you run into problems or things aren't happening on schedule. In general, underpromise and overdeliver to make your clients happy. They'll like you more if that new website has extra bells and whistles than if you have to leave things out that were on the project plan (or worse, the whole project is delayed).


2. Keep your files organized


Web designers and developers tend to have a million files of a thousand different types - HTML documents, CSS stylesheets, Javascripts, PHP files, database descriptions, keyword lists, sales copy, images, Flash files, and so on - that are all easy to lose track of. Which version of that default.css is most current? Why did I make this change? Where the %&*$ did I download those product images to?


To avoid a whole lot of hair-pulling, make a "Projects" folder on your local drive (if you don't have one, do it now, otherwise you'll forget), and make a separate client folder for each of your projects. I tend to use the domain name without the extension (so, for www.absurdhuman.com I have an "absurdhuman" folder in my Projects directory) which makes it pretty easy to track everything. Inside that folder, I usually keep the following folders:



  • info - a description of the project, relevant login information, client questionnaires with answers, contact info, and other information about the project. Scans of sketches, audio / video of client meetings, photos of whiteboard sessions, deployment checklists, proposals, and contracts (scan a signed copy!) can all go in here.

  • mockups - I keep my .psd or .jpg mockups separate. Once a client approves a specific design I usually move the selected mockup to /working/ so I can refer to it easily.

  • current - an up-to-date listing of the files deployed or ready to deploy, and nothing else. This is where minified Javascript and CSS, gzipped XML sitemaps, HTML with meta tags, and a current robots.txt file reside.

  • working - a whole mess of html, css, scripts, versioned by date and annotated with recent changes. This is the folder I work in.

  • backup - the most recent set of files I deem reasonable to keep a complete backup of

  • marketing - keyword lists, sales copy, banners, etc.

  • fromftp - I use this to download a backup of files before moving them to /working/ and working there. That way I can always revert to the last live site if I screw something up.

  • downloads - Mostly things sent by clients, including /images/ (usually uncropped large images from a digital camera that I need to edit before moving to working/images). I also keep software packages for a project (such as a gzipped recent download of jQuery or osCommerce) here before editing and moving to /working/.

  • testing - Sometimes I'll include this folder to try out major changes to a design before moving to /working/, this way I can also have /testing/layouts/abstract/ or /testing/jQuery/12082009/

  • snippets - I often find or write cool snippets of code or text that I want to incorporate into a project, but I'm not sure how or that part of the project is not done yet. I'll put text files of sales copy, code snippets, and even lists of images I'd like to use in here before putting it together in the working folder.


Feel free to modify this directory structure to your own design and coding needs, but the above is what I use and it helps me keep track of all 30+ projects I'm usually working on. Inside /working/ and /current/ you'll find the usual directories css, images, and scripts, as well as the planned directory structure of the actual site, which varies by project.


3. Backup!


You'd think I wouldn't have to list this here, but I've heard horror stories of accidental changes and deletions, and I've met many designers who can't tell me when the last backup was made of their Projects folder (if they have one). Back it up daily to an external hard drive or secure online virtual backup drive. Also make backups before you make major changes. Always knowing that you can "undo" changes from the last 10 minutes, few hours, or few days if necessary provides job security and peace of mind for a web designer.


4. Contracts are important


Most web designers don't have an MBA or a law degree, but contracts are the most important part of a web designers repertoire. If you don't have a lawyer, get a contract template online and have a lawyer look over your modified version of it. A good web design contract will include a project plan, provisions for payment, clauses for what happens if the client doesn't pay, copyright transfer information, and a whole lot more. This is what protects your digital assets, so for your pocketbook's sake, get a solid web design contract and use it with all of your clients (even friends and friends-of-friends).


5. Listen to your clients


Yes, web designers do crazy cool things with code and images that most people just don't understand, or even care to. But that doesn't work both ways. You, as the designer, have to take an interest in your client's business, their objectives, and their ideas. It is not your website, you are simply a glorified copywriter as far as most clients are concerned. Your job is to make their ideas shine on the Internet and present their information in a way that their clients and visitors will understand. If you don't listen very carefully, and ask the right questions, you will very likely end up with a problem client.


Examples of good questions to ask a potential or existing client:



  • Who buys / uses your product / service?

  • Who will be updating the website? Are they technically savvy?

  • Why do you want a website?

  • What is the primary goal of your website?

  • Do you want visitors from this city, this country, or all over the world?

  • What languages do your clients/buyers/potential site visitors speak?

  • Who are your biggest competitors? Do they have websites? Do you like any of them?

  • Are there any specific features you would like your website to have?

  • What colors do you like to see on other websites? What colors do you NOT want to see?


And many other similar questions. Take notes when they answer, do more research on your own based on their answers, then go back and ask some more questions. Only after that are you really ready to write a project plan and begin work on their new website - which will be exactly what they wanted if you listened carefully and asked enough questions.


6. Keep up with new technology


If technology advances quickly, the web is like a cheetah (or maybe more like a tasmanian devil) in a world of gazelles. Make it a part of your daily routine to check up on new technologies - Is that cool new software out of beta yet? Are there new versions of any of the libraries you usually use? What new web technology are people Twittering about?


Check up on your competitors - are they using CSS3 or HTML5 to enhance their sites, while you're stuck using transitional HTML4? How do they ensure their sites degrade nicely? Do they have any new tricks up their sleeves as far as animation, IE fixes, or backend programming (e.g. Ruby on Rails, Scala)? What did they add to their websites during recent updates?


Keep track of W3C standards and drafts - W3C compliance is one of your major web design goals, so go straight to the source and find out what you need to do now, and what you'll need to do in the future to make sure all of your websites are compliant.


7. Breathe


We all do it - you're on a code binge, so into your current project that before you know it, the sun's gone up and down twice, you haven't slept, you're out of coffee, and as you look over the last few hundred lines of code and text you wrote, you notice misspellings and mistakes everywhere.


Don't forget to take breaks during long design / code sessions, get some sleep regularly (ok, so sometimes a 15 minute walk has to suffice, but at least do that), and have someone else look over at least the text you've written before turning it over to a client.


Don't burn yourself out on a project - you are much more likely to make mistakes without ever noticing if you've been working for over 12 hours. If the deadline is tomorrow and you have to stay up all night to get it done, move the deadline and wake up early in the morning to work on the project. Trust me, the client will be happier with a well done website tomorrow than a website filled with poor grammar or bad code today.


8. Comment, comment, comment


In every language, including HTML and CSS, there is a semantic construct for adding comments to your code. It's there for a reason - please use comments liberally. Good comments are the difference between easily being able to re-design a site next year and having to start over from scratch. Add comments for things like: last modified, major changes, author, contact information, and description of this file at the beginning of each file. Then comment each section with what that section does, and add specific comments for anything that might not make sense to someone not familiar with your code (if you're not sure, comment it anyway).


9. If at first you don't succeed...


Don't get discouraged by failures, mistakes, or problem clients. Learn from your experiences, good and bad, and remember that there will always be other people and businesses who need websites. Every designer looks back at their early work and thinks "What was I doing?" - just know you will get better at design and dealing with clients with time, and keep doing what you do best. Someday you'll be able to hand-code fluid CSS layouts in your sleep. Until then, practice, practice, practice. Work on your own pet projects, build websites for friends, and go back to improve previous projects even if you never deploy your changes.



10. Have fun!



Design is fun, that's why we do what we do. None of us would deal with the crap we put up with if we didn't absolutely love making our clients happy, and showing off our cool designs and code. If design is not fun for you, try these tips and get organized. If you continue to experience frustration and just can't get ahead, take a few design classes or get a professional designer to mentor you for a while. Then build a few websites about subjects you are interested in for no other reason than to practice web design. If you're still not having fun, it may be time for a career change.


Happy designing!


Useful resources for web designers


Here is a list of websites, articles, and software packages I refer to and use regularly in my web design and development work:



Some more places to find useful SEO, web design, and web development resources:



My Twitter page often has more web design resource, so be sure to follow me to keep up with new web design tips and tutorials!



"10 Tips for Web Designers to Ensure Client Satisfaction" continued here...

April 13, 2009

Is Google Trying to Squash Twitter?

After hearing of the talks between Google and Twitter, I thought one of three things would happen: 1) Google makes an offer to buy Twitter; 2)Google buys, or re-develops Twitter Search; or 3) Google and Twitter work together, likely Google using a limitless Twitter API key to include real-time Twitter Search results. Well, I was very wrong. Google, being too big to fail and too powerful to care, decided to pick d) build an "enhanced" Twitter that gets Google even more data and control over the public. First the AdSense "enhanced" user tracking and targeting, then the "enhanced" local search results, and now:

Google Latitude - Twitter for Stalkers?

Google has released a service called Google Latitude that allows you to not only send "status messages" to your friends (sound familiar?) but also adds stalking - er, sorry, location-awareness capabilities:


Why does this bother me? Well, consider the sheer amount of your data that Google has - do you have a Gmail account? There's some. AdSense DoubleClick cookie? There's some more. And now, why not give them your cell phone number, location, picture, and directions to where you sleep? Even mainstream media is willing to admit that stalkers are a serious problem on Twitter, MySpace, and Facebook - how much better can it get when a stalker can use Google Latitude to get Google Maps and even directions to their target on their cell phone?

Also consider that Google's main moneymaker is advertising. They can already make certain types of ads "follow" you around the Internet with the new permanent AdSense cookies; Soon they will be able to change the billboards around you based on the number of people around that like Pepsi vs. Coke. Or worse. Google is clearly driven 100% by profit margin and the need to grow with no concern for privacy, safety, or freedom - just like our economy, our cars, and our egos.

How to UnGoogle Google:

  • Stop using Google services - no search, no maps, no AdWords, AdSense, Gmail, everything. Don't click or publish AdSense ads, get the anti-cookie. Whatever you do, avoid Google Latitude like the plague. Switch to competitors - yes, Google still has a few competitors left, and some of them make pretty good products. Start by giving some of these semantic search engines a try.

  • Talk and write about anything and everything you find about Google: blog, Tweet, text, email, write letters, call people - expose Google and what they are trying to do, and make people aware of the reasons to UnGoogle! (Hint: you can start by simply clicking the ShareThis button below!)

  • Start your own company - compete with Google! Especially in markets where Google is the only player. And this is the important part: Don't let Google buy you out! Google would never have gotten where it is without a lot of willing company builders that wanted a way to get rich and get out.

  • Finally - let Google know you are not happy! Tell Google technicians, sales reps, support people, executives, anyone - several people have left Google recently, and the company can only stand so much attrition before they lose power and control over the people.

Be careful out there - happy unGoogling!

"Is Google Trying to Squash Twitter?" continued here...

April 11, 2009

7 Features of Usable Apps

We use many applications these days, often simultaneously. No more web browser and email client, now we have multiple browsers, chat clients, social media widgets and toolbars and icons in the system tray - web apps and desktop apps and things in between, all pinging and chatting and tweeting and chirping. What makes an application practical, fun, and easy to use? Here are 7 features of a usable application:

Application Usability Tips

  1. Focus! What happens when you type the name of your favorite search engine into your address bar and press [Enter], then start typing? Input! Look at that! Put the first element on the page in focus to make your users happy. If you are developing a web application, here is a way to automatically put the first element in focus using jQuery.

  2. Labels. Be clear about what you expect from users and what they are getting in return. Data alone is meaningless without context - be sure to provide enough information to use the data presented, and make it clear what everything visible means.

  3. Icons. Don't assume your users know what the squiggly line with the hole in it means - use a standard set of icons, or at least explain what your icons do (use tooltips!).

  4. Tooltips. Again, at least some of your users might not know what "Reverse Proxy Address" means, so take a few minutes to add meaningful tooltips that pop up on mouseover for all of your form labels, icons, and anything else that may be even slightly ambiguous.

  5. Spacing. You may remember the days when all applications were presented as 80 (or 100) green characters on a black terminal. These days, your users may be using a screen size of a few inches or several feet, and you have hundreds of fonts to choose from. Keep the font readable, make sure elements are ordered and spaced in a logical manner, and keep the "eye flow" of the application in mind as you design to make your spacing user-friendly.

  6. Colors. What is the very first thing you notice about an application, or even a website? You may think it's the layout or the banner, but go to a website with bad colors and I think you will see what I mean. Choose a "soft" set of default colors, and maybe offer some wilder templates or skins.

  7. Choices. Users use applications to save time (whether they are successful is another story). Let them. I know this is tough, after all that thought about colors and spacing, but you have to let your users view their data how they choose. That means they can apply their favorite mauve/brown/khaki color scheme and make your pretty font so big it breaks your whole layout, then move all of the icons to the bottom right corner. Your application will not be "user-friendly" to all users, so let them change everything and avoid a lot of headaches down the road.
This is by no means an exhaustive list of application usability tips - and there are "recommended" features specific to web applications and desktop applications - but keeping these usability tips in mind as you design your next application will go a long way toward keeping your users happy!


"7 Features of Usable Apps" continued here...

April 9, 2009

5 Advanced Twitter Tips

I know, I should post more often - I've got requests for posts about RSS and some Twitter basics, but in true absurd human fashion, I will give you some juicy advanced Twitter tidbits (twidbits?) instead. If you need a basic overview of Twitter, please see Twitter Blog Marketing Tactics, leave a comment, or contact me directly. Please add your favorite advanced Twitter tips in the comments! Here are my top 5 Advanced Twitter Tips for Twitter Power Users, in no particular order:

  • Be retweetable. The best ways to do this are: 1) say something funny and somewhat random (keep it related to your "primary topic"), or b) bring the news - tweet breaking articles within a few hours of them being posted to get lots of retweets! Tip: leave really good tweets up overnight - remember how your latest tweet is in nice big attention-getting font? Great place to leave a joke, quote, tip or link to your awesome product/service for 6-12 hours (if you can stay away from Twitter that long).

  • Timing is everything. Morning in the US (or your local market) is a great time to Tweet, especially if you want people to act today. Based on some of my analytics, Twitter may be up to twice as "active" on weekends, so if you Tweet once a week, make it on Saturday.

  • Pay attention to your following. Try to follow most of the people you expect (want) to be your customers. Note things like tone (casual/professional), "style" (lots of RT's? Do they recommend or buy other products? What attracts them to people/products/companies?), what time of day their tweets are the most dense (hint: check the difference in timestamps of the first and last posts on your home page - closer together = good time to engage your followers).

  • Give stuff away, at the right time, to the right people. People are attracted to Twitter specials - try pre-releasing a product on Twitter, or giving a discount to your followers!

  • When you @reply, make at least some of your @replies such that anyone will benefit. An @reply can be a powerful recommendation for a product or service - just remember to add a description (e.g. Don't just say "This will work", say "Robo2112 widget will help you add that spark you need to your website")

  • DMs can help - or hurt - you significantly. DM's (and @replies) are the bread-and-butter of Twitter. Carefully crafted direct messages can create strong personal relationships and quickly convert a follower into a loyal follower, or even a paying client. I would recommend staying away from auto-DM's, at least until you are over, say, 100,000 followers. I do understand there is a point at which marketing this way makes sense, but while you have the ability to enjoy close reciprocal relationships with your most targeted followers, take that opportunity. Use the above tips to write powerful DM's that make your point in a concise and memorable way and you will be able to literally pick the clients you want to work with - a powerful edge in any industry!

  • Last but not least, timing is everything (paying attention?). By now you should have a target market of several specific niches and some understanding of your followers' Twitter habits (twabits). When they are online - DM them, @reply them, follow the people they are chatting with (who are also online and should follow you back), and follow some of their followers. Hint: Twitter followers are listed in chronological order by when they followed that user (most recent first). The first page of users, especially for popular users in your target niches, should be online currently - follow them to get more targeted followers.

Disclaimer: None of these techniques are likely to get you tens of thousands of followers in 90 days or whatever it is everyone is DM-ing around lately, nor will they shoot you to the top of the Twitter celebrities. These 5 advanced Twitter techniques may, however, help you use Twitter within your overall marketing strategy as an effective tool to build a community of close-knit, engaged followers who may become your best clients!

Bonus - Cool Free Twitter Tools!


  • Twitterator lets you follow a bunch of people at once

  • TweetCube lets you share files (<10MB) on Twitter for free! Remember the "give stuff away" tip? Here you go...

  • Twits Like Me helps you find people to follow who share some of your interests. Targeted marketing, and such.

  • If that's not enough Mashable has a list of over 140 Twitter tools

  • Last, there's the older Twitter Toolbox - some of these may no longer work, but there are still some good Twitter apps and tools there!

Happy Twittering and remember to Retweet!

UPDATE: Thanks to everyone tweeting this post!

@IgorFomichev @seanometer @MarjyMeechan @MonicaPortugfan @mabsmith @CodeSucker @zygbot @EdwinKersten @hsbcnews @julianpettit @TracyGazzard @twitme101 @AnthonyMcMurray @kdburnett @briankurtz @Marenda @foolsprogress @thewildjoker @Jan_Geronimo @fpalattao @mparent77772 @sillyaudrey @twitte_r_tips

Want to get even more Twitter followers? Just Tweet these 5 Twitter tips, and I will put your Twitter link on this page! Feel free to leave comments to remind me!


"5 Advanced Twitter Tips" continued here...

March 29, 2009

Twitter Blog Marketing Tactics

So you've chosen your topic, written some great content, and made a blog. Hopefully you used some of the blog SEO tips I discussed in my last post to get indexed and ranked for at least some of your target keywords. Maybe you're even starting to see some traffic trickle in, but... wouldn't it be great if you could send interested visitors to your blog as soon as you post? Even better, I'll show you blog marketing tactics that can get targeted visitors to come to your blog whenever you choose!

How to drive traffic to your blog using Twitter

First things first, you have to sign up for Twitter if you do not have an account. You can check out my Twitter profile here: absurd_human on Twitter. Now, here's the key - don't blindly follow people, even though some "pros" will tell you to do so. And definitely do not use any sort of autofollow tool. Find people relevant to what you are doing, and follow them. Be active with a good balance of @replies, direct messages, and public tweets. Try to restrict your Tweets to your area of expertise or the topic of your blog or site. If you are using Twitter as a personal tool to communicate with friends, you may want to create a separate Twitter account for your "brand" - even if it is just a small blog or website right now. Hint: find someone who is interested in the topic of your site (try a Twitter search) that follows say around 1,000 people, and look through the people they are following (not the people who follow them) for interesting people whose updates you might be interested in. Follow between 50 and 100 people per day, but don't let your ratio of followers / following get too out of hand.

How to get followers on Twitter

  • Make a bio! People generally skim follower lists, so they only see your bio as it pops up in the tooltip. Most people make their decision to follow people on Twitter based on just the image, username, and bio. If you have these three things, and they attract attention, you will get more followers.

  • Customize your Twitter page! This one is a little more difficult, but worth it. Check out my Twitter background. Spiffy, no? To upload your own, click "Settings"->"Design"->"Change Background Image" - make sure your image is large enough for most resolutions (1024px x 768px) or use the "tile" option

  • Post meaningful tweets, with a good balance as described above.

  • Retweet things you find truly interesting or funny, but don't go overboard.

  • Tweet the right amount: don't tweet every 3 seconds or every 3 months, somewhere in between should be good.

  • Offer something useful in exchange for following you: software, services, friendship, something of value.

  • Don't auto-anything. Scheduling tweets for later using Tweetlater is ok, but I don't think anyone really likes getting auto-DMs or spam

  • Make it easy for people to interact with you through Twitter: put a Twitter widget on your blog, add Tweetmeme buttons to your posts - they work!

  • Tweet your posts, but don't spam. It's ok to tweet about the same post later, but don't let your profile start to fill with only links to your own stuff.

  • Use cli.gs or another URL shortening service that comes with analytics. See what works and what doesn't!

Is marketing on Twitter worth the trouble?

You might think "Why don't I save myself all that time and just use PPC advertising to drive some quick traffic to my blog. That seems to work for all the marketing pros." Yes, PPC can give you targeted blog traffic (if you do your keyword research), and it should be a part of your overall marketing strategy. However, I would recommend waiting until you've made money from your free marketing efforts, then put that money into PPC marketing - that way you are not taking on any risk and have the luxury of being able to lose money finding the best PPC strategy for your site.

If you still don't think it is worth your time to build a targeted network of followers, consider the fact that a "good" CTR for Pay-Per-Click advertising is around 1-5%. Earlier this week, when I had a mere 100 Twitter followers, I sent out a link to my post about the new AdSense privacy policy requirements. Here are the results:


Twitter Marketing | 12 hits out of 100 followers

Notice the little pop-up box that says "12"? That's the number of hits on the first day I sent it out. So, just over 100 followers, 12 immediate clicks. 10% CTR. Ok, sure, I can get 10% on one link one day, you say... Good, you should be skeptical, especially about Internet marketing. Let's see what happens next.

I keep diligently finding Twitter followers who share my interests in technology, music, and above all, humanity. Friday I was over 600 followers. I sent out another link, this time to these blog SEO tips. Let's see what happened:


Twitter Marketing | 63 hits out of 600 followers

Again, notice the pop-up box: 63 hits the day I sent that link. 63 / 600 ~ 10% close enough for me to assume there could be a positive correlation (I know the Twitter box says 723 followers - I procrastinated a bit). Now, I obviously can't guarantee that you will get x% CTR or that people will buy from you if you market your blog on Twitter. What I can tell you is that this is one of my blog marketing tactics, and I'm seeing a consistent 10% click through ratio and gathering attentive readers who often become return visitors. If you follow the steps above, you will probably have a much smoother Twitter experience than if you choose the path of the "pro marketer" and use auto-follow tools and buy any Twitter marketing tool when it comes out.

Follow me and you just might build a super-targeted network of followers who share your interests, engage in meaningful discussions, and eagerly wait for you to show them the next cool new thing on Twitter!

Thanks for reading - Please ReTweet!

"Twitter Blog Marketing Tactics" continued here...

March 26, 2009

Blog SEO Tips

Here are a few neat blog SEO tips to help your blog rank a little higher in search engines. Why should you listen to me about blog SEO? Granted this blog is fairly new, and PageRank 0, but most of my posts get listed in Google for the keyword I want within minutes, and I am actually on the first page right now for "adsense privacy" and "adsense cookies" (depends on your browsing history now).

Now, it is not very difficult to get into the first page as a "recent" result, even without much SEO - these are blog posts and other news items within the last few hours that show up in Google search results. Try it - if you search Google for relevant news when it happens (try Googling a Twitter trend) you will see a few blogs and sites with lower "authority" but when you search for them a few hours later they will be lower. Often, these "fresh results" seem to completely drop out of the search results before going into the "main" index. Remember: now that Google uses your web history to refine results, you may need to clear cookies, clear web history, and change your Google search settings to see the "default" results, and you have less control over your position for your target keyword phrases in actual visitor searches.

Google "adsense privacy" - see my post about adsense privacy there on the first page? This blog was created in February of this year, it should not even be out of the sandbox - and is PageRank 0 still, but it is there on the front page. Want to know how I do it?


I generally start with the content - I'll pick a somewhat specific topic to write about (in this case the new adsense email), and I'll write the post. Then I go back and figure out how to market it. Occassionally, if I don't feel a particular inclination to write about something, I do use the Google Suggest (now built into Google front page) to pick a topic to write about. Either way, I almost always use this functionality to refine my keywords when I am finished with the post. How?

Simply go to the front page of Google (not inside of a search, or gmail, etc.) and start typing - see the list of words that pops up? Those are popular search terms that start with what you've typed (note: exactly what is in the box will not appear in the results). Look for words higher in the list - meaning more often searched, but with a lower number of results - meaning less competition. The less letters you type in (the more you can backspace) and still see your "target keyphrase" high in the list, the higher the "value" of the keyword. This does not mean you will get tons of traffic, it just means you will have an easier time getting to the front page of Google.

In the case of "adsense privacy" - it is a keyword that is not searched as often, but also has little competition, so I felt confident of my ability to rank. It does bring in some traffic, and I have a feeling people may start searching for it more after Google's deadline about the new AdSense privacy policy requirements on April 8. When I saw that my blog SEO ninja magic had worked, I decided to go for a keyword phrase with higher competition - "adsense privacy" has 7,000,000 results and shows up in the search suggestion list (unlike "adsense cookie"). And the blog SEO ninja magic works there too.

What is the blog SEO ninja magic?

  • Stay focused on the key phrase you picked. You may pick 2-5 key terms for your tags and blog post, but stay focused primarily on one of them.

  • Basic HTML blog SEO - when appropriate, use the acronym tag, h1 and h2 tags (hint: use CSS to make them smaller if they are too big!), bold and italics (through CSS styling, if possible), and link out with your primary keyword phrase as anchor text.

  • Optimize the post title - this might be the most important thing, as it also affects the permalink. Use your key phrase first, with something to draw your audience in (like "AdSense Privacy? - Need a New Ad Provider") and make it memorable. You will want to set your blog title to [key phrase] | [blog title] (with the | symbol as a separator) if your blog is relatively new also.

  • Valid HTML - Don't kill yourself over it, but try to take care of obvious errors. Run your post page through the keyword density tool and peruse the other fine free SEO tools at SEOChat

  • Tags or labels - these are the SEO goldmine of blogging, as long as you use them correctly. I see many bloggers stuffing the tags full of keywords and never using the same tag for different posts. Generally, you want to label posts with between 2 and 6 tags of 2 to 3 words each. Hint: use the Google search suggestions to find $$$ keywords, then use those as tags!

  • While we're on tags, how about some meta tags? Use those tags or labels as the meta keyword tag of that post, and make sure to add a meta description (usually the "teaser" part of the post, or make one up under 160 characters) and the title of the post as the meta title. Note: Blogger and Wordpress offer plugins to do this, but I would recommend doing it manually before using a plugin. You will want to tweak the results when you use a plugin, so you may as well learn to do on-page blog SEO from scratch.

    Update: I found a site that shows you how to optimize Blogger meta tags with the new Blogger templates.

  • Don't fall for the trap. Many people think "adsense cookie" and "adsense cookies" (and similar variations, tenses, etc.) are the "same" key phrase, because they are generally aggregated as such during a search. However, when you are trying to rank, there is a difference between these keyword phrases. There is also a difference between quad core laptop and quad-core laptop (dash vs. no dash) and many other search terms people might expect to be the same - you can often see this in the suggestion box e.g. number of results changes when you add an "s" at the end.

  • Pepper in related keywords - see the "search terms" and "keyword phrases" in the above bullet? I just went back to replace "these" and "terms" - making the post suddenly more relevant as far as Google is concerned, even though it did not really affect the readability to a human. Remember: write for humans first, then feed the robots what they need to see.

  • Sitemap - Good news! If you have an RSS feed, you can just use that as your sitemap. Just submit it to Google Webmaster Tools, follow the instructions to verify, and you will be that much closer to being indexed! You can also check your index stats from here. Don't forget to submit to Yahoo! and MSN also. (How to submit your sitemap.

  • Blogroll - This one is important; Get relevant bloggers and add their blogs to your blogroll. This increases how often your blog is 'updated', which will generally help the searchbots crawl your blog more often, and give you more "authority". As a side effect, many of those webmasters will also find your blog and link to you (It's ok to email them asking what they would like for the anchor text).

  • Then just contact people - webmasters of similar sites and blogs, people interested in the topic of your blog. Don't be afraid to ask for [primary keyword phrase] [Blog name] as anchor text (instead of just the blog name), or ask people to comment on posts or your site (please comment on my site and this post in the comment area below). Leave relevant comments where you can tie in your post (don't spam). Email, Twitter, Facebook, IM, etc. Promote your blog or site in person. The greatest thing is that these people already share some of your interests, so you are making lasting relationships rather than getting people on your site for a few minutes so they can click an ad that gets you maybe a few dollars.

  • Make it easy for visitors to share your blog with others - you don't want to waste all of that on-page blog SEO that you just did up there ^ (you are doing this stuff, right?) As an example, on your right you can see the user-friendly Tweetmeme, StumbleUpon, and Digg buttons, and below you will find the ShareThis button, which allows you to bookmark, blog, snip, buzz, and share this post just about anywhere on the 'net including Facebook, MySpace, Reddit, Sphinn, Mixx, and more - feel free to try them out and see how they work! If you need help getting these buttons working on your blog contact me.

That list of blog SEO tips should get you started, it might even get you to the first page of the search results (if it does remember who got you there!), and even if not you will have better ability to choose keywords and work them into your post. Let me know if anything is unclear, and please feel free to list other website and blog SEO tips that work for you in the comments.


Thanks for reading! Please share if you enjoyed these blog SEO tips.

"Blog SEO Tips" continued here...

March 22, 2009

Howto: Disable SELinux on Centos

How to Disable SELinux in Centos Linux

Occasionally, you will have trouble with selinux on Centos and need to temporarily disable selinux. Here is how you change selinux settings in centos and other red hat linux distributions:

  • Edit /etc/selinux/config (e.g. $sudo vi /etc/selinux/config)

  • Find the line:

    SELINUX=enforcing

    • a) If you simply want to set selinux to permissive mode - which will still warn you when something would have been denied

      change to

      SELINUX=permissive

    • b) If you are sure you want to completely disable selinux

      change to

      SELINUX=disabled


    and save (in vi type [Esc] :wq)

    centos disable selinux


  • SELinux will be disabled after reboot. To turn selinux off immediately, without rebooting use:

    $ sudo setenforce 0

  • If everything works, edit your /etc/grub.conf and change it from this:

    etcgrubconf


  • To this:

    completely disable selinux


That is how to disable selinux on Centos. Note: there is no way to uninstall selinux from Centos. This is as disabled as selinux gets.

You usually will not need to disable selinux completely. This may be useful for troubleshooting, but I would recommend trying to disable IPv6 and disable your firewall first (service ip6tables stop; service iptables stop) and see if you have another problem. Disabling selinux can come in handy for various testing environments and may solve a few obscure problems with certain software.




"Howto: Disable SELinux on Centos" continued here...

March 19, 2009

Toshiba Qosmio gets major upgrade: Quad-core laptop from Toshiba!

Update: There are less than 5 Quad-core Qosmio laptops remaining! Order today if you don't want to wait!

Click Here to Get Your Quad-Core Laptop Now!

My Toshiba Qosmio is an awesome, unbelievably powerful laptop. With a subwoofer. It might not be the only one out there, but this one also happens to leave most desktops, and even many servers in the dust as far as power. And I just found out Toshiba is sneaking in an upgraded version of my trusty Qosmio: They made a quad-core laptop! Sure it's not the first, but it's definitely the one that makes the most sense. The Qosmio line is the pinnacle of performance - I have the old Q701 and it's still better than most laptops released today. Except, of course, the quad-core Qosmio...

You can buy the quad-core Toshiba Qosmio X305-Q720 now!


Most Qosmio's have:


  • 4 GB of DDR3 PC3-8500 (!) so I can have over 400 tabs in 40+ windows open (3 or 4 different browsers), while listening to music (on the subwoofer!), and the thing doesn't blink.

  • Mostly because of the 7200rpm Hard Drive that opens my documents and even does the silly AutoSearches quick.

  • 4 Speakers plus Subwoofer, Dolby Digital Surround Emulation that actually works!

The new Toshiba Qosmio X305-Q720 ups the ante by adding:

  • 2.0 Ghz Core2 Quad 9000 CPU for those who think instant coffee isn't fast enough

  • The GeForce 9800M GTS with 1GB GDDR3! HDMI output at 1080p.

It just blows me away that a laptop can do this. I thought I would have to immediately ditch Vista when I got this laptop, but I haven't had a single problem with it. Everything loads quickly, the search works, and yeah UAC is annoying but it's great for users who really don't know why they clicked there (and offers other protection), and most sysadmins know how to disable UAC on Vista anyway.

Everything about this laptop is great. The fact that it's very shiny is appealing, but the fact that the CD drive is in the front just makes sense, the amount of USB ports (5 USB + 1 eSATA) is impressive, the built-in multi-card reader is convenient, and the media strip is low profile and works well. The only negatives are the size and the fact that it only lasts about 2-3 hours on battery (pretty good for this much raw power). If you're looking at this laptop, you probably know this already. So just get it - do you really anticipate needing your laptop for more than an hour or two without a plug nearby? You won't find a better machine for games, system administration, CAD, or anything else for the price.

The two things that really surprised and impressed me about the Toshiba Qosmio were the lack of sound and heat. You see, when computers compute really fast, generally there are electronics wasting a lot of energy and outputting this as noise and heat; This computer runs nearly silent and runs much cooler than I expected, even when I do many things at once, which indicates some pretty serious attention to efficiency and stability. I honestly haven't gotten the thing to crash even though I probably should have.

Until somebody hands me a netbook with 2 Core i7's in it, this is the machine I will use to quickly navigate and process the vast seas of the Internet:





Not what you were looking for? Search here:


"Toshiba Qosmio gets major upgrade: Quad-core laptop from Toshiba!" continued here...

March 17, 2009

Internet Privacy? Another Google EPIC Fail

If you were concerned about Google and your Internet privacy after hearing about the doubleclick dart cookie (aka adsense tracking cookie), the doubleclick spyware, or the fact that Google AdSense may include popups, please sit down and remain calm. Oh, and delete your Gmail account.

The privacy group EPIC asked the FTC to investigate Google for their privacy practices on the cloud, among other things.
I hate to say it, but I told you so - it is extremely difficult to have privacy and security on the cloud.

UPDATE: Here is a link that explains this better: Privacy activist asks FTC to halt Google apps.


And the government likes Google - all your data are belong to Google.

Hmmm... Just noticed this isn't the first Google Epic Fail this year, either. Marking all search results as malware for an hour. Good one.

Enjoy your cookies!

Nothing further.


"Internet Privacy? Another Google EPIC Fail" continued here...

Will the Internet survive Conficker?

The Conficker worm - also known as Downandup, Kido, and Downup - has become a serious threat on the Internet in the last several months. Microsoft is offering a reward of $250,000 if you find the creator, and Internet security professionals have been scrambling to keep up. Conficker.A was pretty bad, then Conficker.B infected over 1 million computers in 24 hours. Now there is a third, even more robust version, called Conficker.C, which does not focus as much on spreading itself, but significantly increases the worm's hold on an infected system.
Here is what the Internet security community knows about what Conficker does and how it interacts:
  • Conficker supposedly does not spread through downloading or email, but installs itself when you plug in a USB drive or insert a CD, and it can even hack your whole network using brute force password cracking (especially if you have weak passwords). So if one system on your network is missing security updates, all networked computers could be compromised.

  • Conficker disables system services and antivirus, and adds services to listen for traffic.

  • Conficker pings common sites to test for Internet connectivity, gets the date from search engines, and gets your IP address using online tools.

  • Conficker can lockout accounts, change user settings, and send user information out over the Internet.

  • Conficker.B and Conficker.C can also block access to Windows Updates, antivirus websites, and many removal tools

  • Conficker has the ability to download new code and update itself.
Conficker's signature move is downloading updated code - not the first worm to do this, sure, but certainly the most effective so far. The worm randomly connects to one of several domains and tries to receive instructions. Conficker.B could connect to 32 domains out of a list of 500. Now we have Conficker.C that can connect to 500 random domains out of a list of millions. Conficker's download dates that I've seen referenced are March 8, March 13, March 18, and March 31. Supposedly, Conficker.C will initiate another attack sequence on April 1 - please ensure you are patched by that date.

Conficker Cleaning and Removal

Download the Microsoft patch at http://support.microsoft.com/kb/962007 and then do the steps here

Bitdefender has released a removal tool that can remove Conficker versions Conficker.A and Conficker.B, but may not remove Conficker.C. Download and run BitDefender's removal tool to check for and try to remove Conficker.

Symptoms of a machine or network infected with Conficker*:
*Please note you may be infected even if no symptoms appear.
  • 1. You are unable to install Windows Updates

  • 2. You are unable to view security websites or download antivirus and anti-malware products

  • 3. It takes a long time to log in to your computer.

  • 4. You see strange popups or programs running.

  • 5. Unusual entries in Task Manager, Services, Event Viewer, %Windir%\System32, or the registry

  • 6. Strange network traffic, especially relating to network logins by administrator accounts

Conficker may be a decoy?

In case the existence of this worm is not bad enough for sysadmins and IT professionals everywhere, some Internet security professionals think that this whole mess might just be a distraction for a much more serious attack. Until recently, most security professionals assumed that the end-game for Conficker was just another botnet - a network of computers under a hacker's control. However, “We think this is a wide-scale distraction to hide data breaches,” said Ryan Sherstobitoff, chief corporate evangelist for Panda Security. “It does not appear in the variants of Conficker that they are building a botnet, but that wouldn’t surprise us, either. This is an attack we have not seen in some time and is certainly a warning sign for something more to come.”

I agree that this is likely a distraction for a major Internet attack - think about the possibilities. It's April fool's day, they could even send out a link that says "This is a virus" to everyone's contact list and they would still get a bunch of clicks. Network admins would be slow to react to the flood of "server down" notices also. And your customers might not feel the need to let you know that your website now just displays Lolcats (and spreads malware).

Please get the word out about this problem - share this article (using ShareThis below), blog or write about this on your website, talk about it in forums, and tell your friends. Update Windows systems (or switch to Linux), update your Antivirus and anti-malware (you do have both, right?), use strong passwords, and read Internet security news sites regularly.


What do you think - will the Internet survive Conficker?



"Will the Internet survive Conficker?" continued here...

March 15, 2009

Internet Security: Are we losing to "Malware 2.0"?

Have you noticed an increase in Internet threats and "noise" lately? It seems like there has been a surge of malicious activity on the web in recent months. Since I wrote the post about the AdSense DoubleClick tracking cookie a few days ago, I have come across quite a bit of recent unusual activity related to malware and Internet security - the Google DoubleClick network itself has recently shown malware on multiple publisher sites.

Google responded by blocking the sites - not just the ads - and displaying a blatant "This site contains malware" warning to visitors. This decreases the publisher's reputation and costs the publisher time, money, and customers - but keeps Google looking like the hero that responded quickly to an outside threat...

A Google spokesman said: "Our scanners have found a few instances of these malware ads in the DoubleClick network. As such, we've added these domains to our malware list and are in the process of removing any offending ads from our ad network."
- From The Register - DoubleClick distributes malware (emphasis mine)

It seems to me that many recent hacks and threats exploit the things we all like about Web 2.0:
  • it's connected
  • it's fast
  • it's everywhere
  • it's personal, and
  • it's always on
This is troublesome, because it is practically impossible to continuously monitor all of the data aggregated, repeated, mashed up, linked, regurgitated, and spewed into the massive expanse that is the Internet through new applications and websites by new people and robots every hour.
Here are just a few examples of recent web 2.0 threats and other Internet incidents:
I think the scariest part is this:

"...no new malware variants introduced in the Top 10 for two consecutive months."
- Pro Security Zone, based on Fortinet threatscape report. Super-Worm emerges in Fortinet threatscape report for February

combined with this:

"BitDefender’s list of top threats for February dominated by the drive-by variant of malware activated during website visits"
- Pro Security, based on BitDefender's threat list: Auto-downloads dominate February threat list

Basically, in addition to the usual email, file, download, and popup malware you now must watch out for auto-download attacks and malware that "activates" when you visit a reputable site, look at AdSense or Doubleclick ads, Twitter, Facebook, or simply open your browser.

It might be time to slow down, Internet (especially Web 2.0). We are developing applications too fast. We are neglecting Internet security and online privacy to a point that it is getting difficult to tune out the Internet "background noise" and focus on productivity. We would rather give the users the fully connected always-logged-in remember-me target-my-ads ooh-thats-pretty just-tell-me-where-to-click Internet.

I think we should step back, re-examine user goals, and clean up the junk floating around in the World Wide Web.

How to (hopefully, maybe, sometimes) stop popups, trojans, worms, and other malware while surfing:
  • Get a good virus scanner and spyware blocker
  • Run full scans regularly
  • Keep your operating system, browser, and all other programs up to date
  • Turn your computer off regularly
  • Never allow sites to keep you logged in, remember your password, or log you in to any other site
  • Clean up your temporary files, and remove as many unused programs and links as possible
  • Check your system files and folders, as well as running processes regularly. Know what should be there so you will quickly see when something is wrong
  • Do not assume https is safe
  • Avoid typing your Bank account, Routing, Credit Card, Driver License, Social Security Number, or any other "severly identifying" information into a text box, form, widget, email, chat, or any other application online or even on your computer as much as possible
  • Use safe surfing browser extensions like AdBlock Plus for Firefox
  • Observe symptoms and get help if your computer or browser does something suspicious or unusual
  • Regularly check security sites such as those linked in this post for threats
  • Use Scroogle to search
  • Use Privacy Choice to opt out of all ad networks
  • Clear your cache and cookies when you close your browser, and manually after you see ads
  • Consider disabling cookies altogether, along with JavaScript and all popups.
  • Block ads using your hosts file. Doing this sets the "location" of each ad network in the list to your local computer, so you will only see errors instead of ads from those providers, and never connect to them (note: some malware modifies the hosts file, circumventing this protection). This technique allows you to allow some ads if you choose. Here is a regularly updated ad-blocking hosts file in plain text. Try to avoid the ones that want you to download a .bat file or other executable. Your hosts file is usually in C:\Windows\System32\drivers\etc in Windows XP and has no extension. Back it up before changing or overwriting!
  • In general, never ever ever download files with funny names, lots of special characters, and never run a program from the Internet
  • Similarly, never ever pass things on to your whole contact list, reply to chain letters or forwarded mail, or click anything even slightly suspicious
  • Most importantly, think before you click!


Please add your thoughts, ideas, questions, or comments below.


"Internet Security: Are we losing to "Malware 2.0"?" continued here...

March 14, 2009

Contact Me

Contact me using the form below if you need assistance with your technology, or simply say hello. I can give you advice and help with your computer, network, web site, blog, device, code, ideas, marketing, and more.




























Your Name :
Your Email :
Subject :
Message :
Image (case-sensitive):



"Contact Me" continued here...

AdSense Privacy 2 - Google PopUp?

Related to AdSense Privacy? - Need New Ad Provider. I dug a bit more, and found the FAQ page for DoubleClick - the provider responsible for the new Google AdSense tracking cookies, and apparently also for 1 x 1 pixel image "tracking beacons". But are they really saying, essentially that Google AdSense may include popups?

This is from the DoubleClick FAQ (emphasis mine throughout):

"DoubleClick provides its ad-serving clients with a means of choosing and reporting on ads. It is the website owners or the advertisers with whom they contract that make the decisions about the format of the ads. The advertisers choose whether they want to have banner ads or pop ups delivered, and they use our technology to make it happen. The website owners and advertisers choose the size and frequency of pop-up ads. DoubleClick has no control over which ad format website publishers or their advertisers choose.

Generally, there are a couple of different ways that you might receive pop up advertising:
  • 1. The site you are currently visiting has sold an advertising opportunity to a marketer and that marketer has chosen to create an advertisement that opens a new browser window. This is a form of “traditional” Internet advertising.

  • 2. You have some kind of ad-delivery software installed (intentionally or unintentionally, knowingly or unknowingly) on your computer. This type of software often comes bundled with freeware such as P2P (Peer-to-Peer) music sharing applications. It may track the sites you visit and scan their contents looking for triggers that match criteria identified by advertisers that purchased space from the software manufacturer. The software program will then display advertisements on your monitor."

...Ok, so AdSense will be: tracking users across all sites using a 'perma-cookie'; targeting ads based on what the user saw before your site, not what is on your site; requires you as the publisher to maintain a compliant privacy policy; and there could be popups in there too;

Where do I sign? Check is in the mail (for $1.73), right?

Fortunately, many others have realized the necessity to act. People have created ad-free search and a universal ad tracking opt-out tool that make the web feel just a little cleaner.



"AdSense Privacy 2 - Google PopUp?" continued here...

March 12, 2009

AdSense Privacy? - Need New Ad Provider

I got an interesting email from AdSense. They are introducing "interest-based advertising". Seems harmless, right? Well, maybe. But if it is, why does this "enhancement" have anything to do with a publisher's privacy policy?

"We're writing to let you know about the upcoming launch of interest-based advertising, which will require you to review and make any necessary changes to your site's privacy policies. ...make any necessary changes by April 8, 2009."

Ok, sure. Like the sitemaps... where do I get the template/code/widget/whatever? How do I comply?

"...we're unfortunately unable to suggest specific privacy policy language."

Hmm... Ok, the link in the email for "AdSense Help" (link below) was a little more helpful:

Your posted privacy policy should include the following information about Google and the DoubleClick DART cookie:

  • Google, as a third party vendor, uses cookies to serve ads on your site.

  • Google's use of the DART cookie enables it to serve ads to your users based on their visit to your sites and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy. (link below)


EDIT: These guys have more info on the cookie technology:
SEO Book - Google Phorm Behavioral Ad Targeting

I found an AdSense privacy policy generator(link below).

...but I'm pretty sure I am going to remove the AdSense. I have until April 8th to decide. What would you like to see? Leave a comment if you know of an ad network, advertisers, or some other (preferably monetized) widget, gadget, network, group, exchange, etc. that would provide good technology-related content, and would actually add to the site, leave a comment, Twitter, email, smoke signal...



"AdSense Privacy? - Need New Ad Provider" continued here...

How to Recover from a Hard Drive Crash

The day we all dread finally came - your (or your client's) hard disk crashed. The disk might be making funny noises or simply throwing errors when you boot. There is usually a whole bunch of data that hasn't been backed up, but it's not so important that you're willing to spend $4000+ to recover it (yes, data recovery does really cost thousands of dollars. If it doesn't, they probably won't go beyond what I show you how to do below, so you may as well try it yourself). Here is what you should do when you need to recover data from a crashed hard disk. Note: in many cases, the disk actually works fine (corrupt MBR or MFT, system file corruption, etc) - if you are lucky, you can literally "clone" the failed disk to a new one and boot into your old system!

Stop! Don't open, click, type, or touch anything. Turn off the computer by holding the power button or unplugging it. Unplug the computer.

Get a hard drive that is identical (preferable) or larger than the crashed hard disk.*

We are going to try recovering the data from the failed hard disk to the new one by using a bootable rescue CD. You can either add a second hard disk to the affected PC, or use another computer. If you use another computer, I would recommend you still plug in only the new disk and the one you are recovering data from, to avoid confusion.

  • 0. Before you do anything, discharge your static well away from the computer, and put on a static wrist strap.

  • 1. First, download and burn SystemRescueCD, or your favorite computer recovery toolkit. There are several others - in fact, most Linux LiveCDs will work, and you can easily make your own rescue cd also.

  • 2. With all of your disks unplugged - unplug power and data cable - turn the computer on and go into Setup (look for the "Press DEL to enter Setup..." when the computer boots and press that key). Look for the "Boot Order" or similar option, and use the + and - keys (or PgUp/PgDn, it should tell you in the sidebar) to remove "hard disk" from the boot order, or at least move it to the bottom. Make sure CD or DVD is listed - preferably first.
 
  • 3. Add a second hard drive  (as "primary" for IDE)
                  Note: If your hard disk is physically damaged, making noise, or emitting smoke, do not leave it in the computer. While the computer is unplugged, very carefully place the disk on a static-free surface (like rubber - a mousepad might work), plug it in (may need a longer cable), get a powerful fan or an icepack (DO NOT cover up the little tiny air intake hole on top of the drive, or get the drive wet) and try to keep the crashed hard drive cool. In this case, you may have to make many short passes with long (hour+) breaks in between to let the drive cool down. Remember to turn off and unplug everything when you are not actively recovering data.

  • 4. Power on the computer, quickly insert the Systemrescuecd, and Press a Key if prompted to boot to the CD. 

  • 5. Identify the failed hard drive and the new disk that will hold the recovered data. Usually these will be sda and sdb (SATA) or hda and hdb (IDE), but make sure to check - you don't want to move the blank space from the new hard disk and wipe out the failed hard drive!
  • 6. Use ddrescue to move the contents of the failed hard disk to the new hard disk.
            Note: this process is different depending on your kernel (and ddrescue) version. I am only listing instructions for 2.6.3 and later. These instructions will work for the latest Systemrescuecd. If you have to use an earlier kernel, please visit the Forensics Wiki for instructions. (-d is the same as --direct, and -v is the same as --verbose)

              First pass: get the data that is still intact (no retries, don't split)
    ddrescue --no-split --verbose /dev/sda /dev/sdb rescue.log
              Second pass: Retry errors 3 times, don't use the disk cache
    ddrescue --direct -v --max-retries=3 /dev/sda /dev/sdb rescue.log
              Third pass: Add retrim which will retry reads in a different order
    ddrescue -d -v --retrim --max-retries=3 /dev/sda /dev/sdb rescue.log
  •    
  • 7. If you have successfully recovered the whole disk, you will want to check the disk for errors. Most operating systems will do this if you simply boot to the new disk containing the recovered data (unplug the old disk completely), but to be sure you may want to run the appropriate file system checker from the rescue disk (after rebooting with only the new hard disk in the system):
        FAT / NTFS         chkdisk /F /R C:\
        Ext2 / Ext3          e2fsck  /dev/sda1

  • 8. If you haven't recovered all of your data, you can still try to mount partitions from the failed disk. The ro indicates "read only", while the noexec prevents anything on the disk from being executed, and the noatime prevents the file access time from being updates, so there really should be no disk writes.
    Try: mkdir /mnt/data; mount -o ro noexec noatime /dev/sdb /mnt/data
    If that doesn't work, try a partition at a time:

               mount -o ro noexec noatime /dev/sdb1 /mnt/data1
               mount -o ro noexec noatime /dev/sdb2 /mnt/data2
                 ...

  • 9. Then you should be able to see at least some of your files and copy them elsewhere using cp /mnt/data1/* /backup/folder/or/mounted/network/drive/ 

If you have not yet been successful, then you probably have to pay for professional data recovery or forget about that data. If you are feeling adventurous, or the data is extremely important but you can't afford to pay, you might want to try some forensic recovery tools. A good open source tool is The Sleuth Kit (make sure you get Autopsy with it). For a professional tool, consider EnCase

If your disk is damaged because of "Head-to-Disk Interference" or HDI, there is little chance of data recovery. This relatively uncommon drive failure is when the platters and/or head become off balance and the head physically grinds across the platters, "scratching" the disk much like a CD. If you experienced this you would know by the metal-on-metal grinding noise coming from the drive as soon as it tries to spin. That's data being completely destroyed. If you have a few hundred thousand dollars, you can recover the data on the non-damaged parts of the disk platters using various advanced electron microscopy techniques, but realistically you should probably move on with a fresh operating system on a new disk - why not give Linux a try?




"How to Recover from a Hard Drive Crash" continued here...

March 11, 2009

Computing in a Weak Economy - Cut Costs to Stay Afloat

Times are changing. Companies are losing money on deals that were once profitable. We are cutting back on spending, laying off employees, eliminating projects, raising prices, and losing morale daily. Many are starting to worry that the quick recovery might not be quick, and the consumer outlook doesn't look good. What can a company do to stay afloat in a recession?

Well, we do need to take a look at spending patterns and cut some spending, and we might need to adjust pricing as well as creatively improve morale around the office. But we can use the simple fact that technology is always advancing to our advantage.

Now is the time to upgrade your hardware, improve software and process efficiency, and renegotiate contracts. Why? Well, the technology has improved, companies know about the recession, and they will give you a deal to get your business. It works both ways - in a recession, more than ever, your customer loyalty will matter. Help your customers get through this now, and they will return the favor.

Looking for specific examples to help you cut costs using new technologies? Consider the following ways to save money and improve the efficiency of your business:
  • Virtualization. With many companies still entering this market, and some established players going strong, this is a technology that is here to stay. Check out Xen or VMWare to download a free virtualization solution today!

  • Open source software, especially Linux, has come a long way in terms of features, ease-of-use, and stability. Consider replacing some development or web servers with Centos or Ubuntu. And remember, open source does not mean "unsupported" - if you get stuck, there are enterprise level support options for most products. Check out Sourceforge for an up-to-date list of many open source projects.

  • Consolidate workloads. The above two solutions will help with this, but the important step is determining exactly what your technical people and your technology products are doing, and evaluating whether these tasks can be done with less. You may need to refactor code, restructure or eliminate projects, and even optimize business processes. Server optimization, network redesign, and in-house technical experience will help you here.

  • Cut expenses. Renegotiating contracts is important - your bandwidth and hosting costs could drop significantly. Re-evaluate whether you really need all those licenses. Consider short projects that will show a return, or at least savings, within a year.

  • Rethink your power usage. Track the cost of your power. Turn computers (even some server) off at night. Use super-efficient 1U Twin servers to cut your power use. Decrease the resources necessary for your applications. Increase the temperature in your datacenter. Maybe even use the heat generated by your equipment to heat your office.


Feel free to add your own suggestions on how a business can save money in a recession - we could all use the tips!


"Computing in a Weak Economy - Cut Costs to Stay Afloat" continued here...