make website search engine friendly

Website Submission the most important  process of web promotion of any website.


Facebook, Twitter, Pinterest, YouTube, and Google+,facebook page creation,dmoz listing-
This is increase traffic and  visitors to the targeted key place.


Add  Content to article Network.

Make  provide quality content to  improve your rankings.

Make a beautiful website and friendly interface.

Add small images for less loading time.

Add sitemap for the website.

Additional SEO tips-increase traffic,ranking

quality content
Search engines see quality contentand love it.

Keyword research
Keyword research helps you strategically create your site fast listing.
keyword research can help you tremendously.You are a messenger for the
search engines, and therefore, keyword research tools,directory listings,
traffic analysis software that is  price the core range of the small/big business.

Add  an alt tag on every image.

Make LinkedIn profiles -That can be optimized the search.
Make Facebook Pages -That can be optimized for search.
Google+ It helps for getting  visitors.



Article exchanges-
You publish  article on  many site. your article on the top
ten website, with a link back to your site.

Make Each page has a good  meta tag.


Find relevant text & links which Helps engines to indexing.

GET Linls and visitors
Review Posting
Blog commenting
Social Bookmarking Submission
Article directories
Video Submission
Forum posting
Rss Feed Submission
Article submission sites list
Fast Load time
internet users  feel frustrated as they wait for page to load.
Add smaller images for fast load.

built  a powerful Networks
connect with many ppl,website,add Twitter as Twitter tool.

Twitter tools-seo techniques

Twitter tools is very nice seo techniques today.
It  help you find more followers, manage private messages, sends alerts,sharing photos

Twitter Search 
http://search.twitter.com
Twitter search engine 

TweetGrid
http://tweetgrid.com/
Twitter search dashboard

Hashtags
http://hashtags.org/
Directory of hash tags on Twitter

GroupTweet
http://grouptweet.com
Send private messages to a group

TweetBeep
http://tweetbeep.com
This site sends alerts when people are tweeting about you .

TweetDeck
http://tweetdeck.com/beta
 This app allows integrated Twitter and Facebook activities

TweetMeme
http://tweetmeme.com
Tool that tracks most popular links on Twitter

Twellow
http://www.twellow.com
Twitter directory, search etc

Twitpic
http://twitpic.com
This is  for sharing photos on Twitter

MySQL Server Performance

To make things  easier for administrators.
  • Minimal memory, relatively infrequent MySQL usage: my-small.cnf
  • Minimal memory combined with reliance on MySQL, or larger memory for a multipurpose system: my-medium.cnf
  • Large memory server dedicated primarily to MySQL: my-large.cnf
  • Very large memory server completely dedicated to MySQL: my-huge.cnf
It's worth your time to review these files, if for no other reason than to gain some ideas on the optimal ratios between the various server settings.

  • Connectivity
  • Memory management
  • Application control
  • User resource control

PHP variable-related functions

  • Cast a value from one type to other type:- doubleval(), intval(), strval()
  • Set  type of a variable:- settype()
  • Verify  the type of a variable:- is_array(), is_bool(), is_double(), is_float(), is_int(), is_integer(), is_long(), is_null(), is_numeric(), is_object(), is_real()is_scalar(), is_string(),gettype()
  • Destroy variables:- unset()
  • Get info of variables:- empty(), get_defined_vars(), isset(), print_r(), var_dump()

TCP/IP Firewall

The combined set of protocols is called the Transmission Control Protocol and Internet Protocol TCP/IPprotocol suite.

As a network administrator, it is important that you understand the nature of potential attacks on computer security. We'll briefly describe the most important types of attacks so that you can better understand precisely what the Linux IP firewall will protect you against. You should do some additional reading to ensure that you are able to protect your network against other types of attacks. Here are some of the more important methods of attack and ways of protecting yourself against them:

Unauthorized access
This simply means that people who shouldn't be allowed to use your computer services are able to connect to and use them. For example, people outside your company might try to connect to your company accounting host or to your NFS server.
There are various ways to avoid this attack by carefully specifying who can gain access through these services. You can prevent network access to all except the intended users.


A malicious person who gains access to a computer system may guess system passwords or exploit the bugs and idiosyncratic behavior of certain programs to obtain a working account on that host.

Network Security Configuration

Installed your Linux system, you should keep some basic security measures to protect your system
    Firewalls, intrusion protection, encryption, data integrity, and authentication are ways of protecting against such attacks.
    • A firewall prevents any direct unauthorized attempts at access.
    • Intrusion detection checks the state of your system files to see if they have been tampered with by someone who has broken in.
    • Encryption protects transmissions by authorized remote users, providing privacy.
    • Integrity checks such as modification digests guarantee that messages and data have not been intercepted and changed or substituted en route.
    • Authentication methods such as digital signatures can verify that the user claiming to send a message or access your system is actually that person.


      system is also a gateway for a private network, the system's firewall capability can effectively protect the network from outside attacks.

      Linux security- the ones with which every user has experience are passwords and file permissions.

    Linux Software websites

     Linux Software websites
    Internet Sites
    Description
    Red Hat distribution RPM packages
    RPM package repository
    Source Forge open source software repository and development site
    New Linux software
    KDE software applications
    GNOME software applications

    Advanced Database Techniques

    PEAR DB is the database primitives shown earlier; it provides several shortcut functions for fetching result rows, as well as a unique row ID system and separate prepare/execute steps that can improve the performance of repeated queries.

    $result_set = $db->query(SQL, values);
     
     Pass the query( ) function SQL with 
     in place of specific values, and add a second parameter consisting of 
    the array of values to insert into the SQL 
    
    
    When issuing the same query repeatedly, it can be more efficient to compile the query once and then execute it multiple times, using the prepare( ) , execute( ), and executeMultiple( ) methods.

    $com = $db->prepare(SQL);

    This returns a com query object. The execute( ) method fills in any placeholders in the query.

    PEAR DB gives a lot of methods that perform a query and fetch the results in one step:  
    getOne( ) , getRow( ), getCol( ), getAssoc( ), and getAll( )

    $value-set = $db->getOne(SQL [, values ]);

    php-static variables

    A static variable retains its value between calls to a function but is visible only within that function.
    IT declare a variable static with the static keyword.

    function test_counter (  ) {
      static $counter = 0;
      $counter++;
      echo "Static counter is now $counter\n";
    }
    $counter = 5;
    test_counter(  );
    test_counter(  );
    echo "Global counter is $counter\n";
    Static counter is now 1
    Static counter is now 2
    Global counter is 5
     
    Variables declared outside a function are global.
     That is, they can be accessed from any part of the script. By default, 
    they are not available inside functions.