• The Best Ways to Create High Quality Natural Backlinks in 2016

    The Best Ways to Create High Quality Natural Backlinks in 2016

    With so many algorithm changes that have taken place over the past few years, some SEO professionals have declared that traditional backlinks are dead. Although link building has experienced massive changes, it is still alive and kicking. The manner in which backlinks are to be built, however, has to be modernized.What does it take to build quality, whitehat, natural backlinks in 2016? Several SEO strategies will deliver the best possible results.

    Quality Content

    Natural backlinks are the ones that other websites use to point their audience to your content. Why would other websites want to do that? The answer is simple. Your site features quality content that their audience is going to benefit from.

    Thus, the best 2016 SEO link building strategy does not focus on links at all. It focuses on having a good content strategy.

    Come up with a content plan and get in the habit of updating your website on a regular basis. Stick to very specific, well-researched and unique topics. The more original your content is, the more others will be willing to share links.

    On top of making it easier to obtain quality backlinks, a good content strategy will boost exposure and help you establish your website’s online reputation. This is essential for getting your articles and other types of content to go viral. Thus, good content will also play a role in your social media marketing strategy.Boost Social Media Marketing Efforts

    Social media sites are considered high authority websites. This is the main reason why social media marketing can impact your link building strategy.

    Many social networks do not provide do-follow links. This means that links coming from such websites are not going to have an impact on your link building strategy. Facebook is one such website. Still, sharing content through Facebook makes sense because it impacts your online reputation. It also boosts audience engagement, which will have an indirect impact on your SEO efforts.

    Focus on content sharing via a big number of social channels. Use both social networking and social bookmarking websites.


  • 10 Forums Web Designers Must Know About

    There are loads of forums on the internet today, ranging from about every kind of niche you can think of, many forums of which are to do with web design / graphic design. Some stand out, and others don’t. We decided to make things easier for you and search for the best forums for web designers.

    What makes a forum great in our opinion is:

    • Having a great, friendly and knowledgeable community.
    • The users need to be active (sign on daily / every few days).
    • Needs to have a very targeted user base. In other words, most of the members need to have signed up to be members and become active in the community, not just sign up to gain access to a few things, not post, then forget about the community entirely.

    We could be here all day listing off factors. Of course, the forum needs to have a decent amount of traffic so designers get heard, and it needs to have a user-friendly design so web designers can use the forum with ease. Anyway enough talking, here’s the list of 10 forums web designers must know about.

    #Launch is a community of designers, developers, entrepreneurs, and marketers. Its homepage boasts of members who are “Y-Combinator founders, entrepreneurs, and investors.

    Your Content Here
    #frontendDevelopers is a great place to find new gigs. You can also get feedback from other developers, learn the latest trends and share ideas.

    CoffeeCup Software was started in 1996. The forum helps web designers create better websites.

    Designer Hangout is a great web designers’ community and you can join 9,700+ UX designers and researchers from around the world to discuss user experience in the UX Slack community.

    This forum may not be just about web design, but it has one of the largest forum communities on the internet with over 290,000 registered members! You can buy, sell and trade services on there, so it’s the perfect place for web designers. You can also pick up a lot of work on there, and clients too!

    This forum has a really nice simple layout, and their forums are always buzzing with new threads. They have many forum categories that are split in to more a less everything you can think of. They cover web 2.0, graphic design, flash, illustration, advertising, marketing, typography and much more.

    Although this forum is hosted on a .co.uk domain (it doesn’t mean it is just for UK people), and even though they only have around 10,000 registered members (compared to some big boy forums), they have an awesome community for web designers. Their forum categories cover all aspects of web design and I love the header design on their website.

    This forum covers web design and other webmaster aspects such as promotion and search engine optimization. Their nice simple forum design is very easy to navigate round. They have nearly 90,000 registered members, and there are always people online.

    This forum is insane! All web designers must be registered at this forum! It’s simply beautiful! They have a small user base of around 11,000 members, but there are always web designers online. Their forum covers many aspects of web design, and it’s worth checking out.

    Now Kirupa is usually for flash design and development, but as the years have gone on they have extended their forums to cope with web design. You can post your designs for critique, and you can also talk about HTML, css, and styling web design.

    Continue reading  Post ID 3734


  • 11 networking commands every Windows admin should use

    11 networking commands every Windows admin should use

    The Windows operating system contains numerous built-in, command line networking utilities. These tools range from the obscure to the commonplace. However, there are 11 built-in networking tools that Windows networking administrators should be familiar with.

    Ping

    I am guessing that the ping command is probably the most familiar, and most widely used of the utilities being discussed in this article, but that does not make it any less essential.

    Ping is used to test the ability of one network host to communicate with another. Simply enter the Ping command, followed by the name or the IP address of the destination host. Assuming that there are no network problems or firewalls preventing the ping from completing, the remote host will respond to the ping with four packets. Receiving these packets confirms that a valid and functional network path exists between the two hosts.

    networking utilities

    NetStat

    If you are experiencing problems with network communications, then network statistics can sometimes help point you toward the root cause of the problem. That’s where the aptly named NetStat command comes into play. This command has a number of different functions, but the most useful of these is to display network summary information for the device. To see this type of summary information, just type NetStat -e.

    ARP

    The ARP command corresponds to the Address Resolution Protocol. Although it is easy to think of network communications in terms of IP addressing, packet delivery is ultimately dependent on the Media Access Control (MAC) address of the device’s network adapter. This is where the Address Resolution Protocol comes into play. Its job is to map IP addresses to MAC addresses.

    Windows devices maintain an ARP cache, which contains the results of recent ARP queries. You can see the contents of this cache by using the ARP -A command. If you are having problems communicating with one specific host, you can append the remote host’s IP address to the ARP -A command.

    networking utilities

     

    NbtStat

    As I am sure you probably know, computers that are running a Windows operating system are assigned a computer name. Oftentimes, there is a domain name or a workgroup name that is also assigned to the computer. The computer name is sometimes referred to as the NetBIOS name.

    Windows uses several different methods to map NetBIOS names to IP addresses, such as broadcast, LMHost lookup, or even using the nearly extinct method of querying a WINS server.

    Of course, NetBIOS over TCP/IP can occasionally break down. The NbtStat command can help you to diagnose and correct such problems. The NbtStat -n command for example, shows the NetBIOS names that are in use by a device. The NbtStat -r command shows how many NetBIOS names the device has been able to resolve recently.

    Like what you’re reading? Get the latest updates and tech guides in your inbox.

    Hostname

    The previously discussed NbtStat command can provide you with the host name that has been assigned to a Windows device, if you know which switch to use with the command. However, if you’re just looking for a fast and easy way of verifying a computer’s name, then try using the Hostname command. Typing Hostname at the command prompt returns the local computer name.

    Tracert

    Contrary to what a rather infamous YouTube video might lead you to believe, Tracert isn’t pronounced “Tracer T,” nor can it show you how many people are using Google right this second. Instead, Tracert, or “Trace Route,” is a utility for examining the path to a remote host.

    Functionally, Tracert works similarly to Ping. The major difference is that Tracert sends a series of ICMP echo requests, and the request’s TTL increased by 1 each time. This allows the utility to display the routers through which packets are passing to be identified. When possible, Windows displays the duration and IP address or fully qualified domain name of each hop.

    IpConfig

    One utility that I find myself using constantly is IPConfig. At its simplest, the IPConfig command will display basic IP address configuration information for the device. Simply type IPConfig at the Windows command prompt, and you will be presented with the IP address, subnet mask, and default gateway that the device is currently using.

    networking utilities

    If you would like to see more detailed information, then type IPConfig /all. Doing so causes Windows to display IP address configuration that is much more verbose. This is also the command that you will have to use if you want to see which DNS server the Windows device is configured to use.

    The IPConfig command can do much more than just display IP address configuration information. It also contains options that can help you to troubleshoot problems related to DNS and DHCP. For example, entering the IPConfig /FlushDNS command purges the contents of the computer’s DNS resolver cache.

    NSLookup

    NSLookup is a great utility for diagnosing DNS name resolution problems. Just type the NSLookup command, and Windows will display the name and IP address of the device’s default DNS server. From there, you can type host names in an effort to see if the DNS server is able to resolve the specified host name.

    Route

    IP networks use routing tables to direct packets from one subnet to another. The Windows Route utility allows you to view the device’s routing tables. To do so, simply type Route Print.

    The cool thing about the Route command is that it not only shows you the routing table, it lets you make changes. Commands such as Route Add, Route Delete, and Route Change allow you to make routing table modifications on an as needed basis. The changes that you make can be persistent or nonpersistent, depending on whether you use the -P switch.

    PathPing

    Earlier, I talked about the Ping utility and the Tracert utility, and the similarities between them. As you might have guessed, the PathPing tool is a utility that combines the best aspects of Tracert and Ping.

    Entering the PathPing command followed by a host name initiates what looks like a somewhat standard Tracert process. Once this process completes however, the tool takes 300 seconds (five minutes) to gather statistics, and then reports latency and packet loss statistics that are more detailed than those provided by Ping or Tracert.

    networking utilities

    NetDiag

    Perhaps the most useful of the network utilities that are built into Windows is NetDiag. The NetDiag command is designed to run a battery of tests on the computer in order to help the technician figure out why the computer is experiencing networking problems.

    One of the things that I really like about this tool is that although there are a number of optional switches that you can use, you don’t have to use any of them unless you want to. Entering the NetDiag command by itself will cause all of the available tests to be run.

    In some cases, NetDiag can not only identify problems, but can also fix those problems. Obviously, NetDiag cannot automatically correct every problem that it finds, but appending the /Fix parameter to the command will tell NetDiag to attempt to fix the problem automatically.

    The Windows operating system is jam packed with command line utilities. Many of these utilities are left over from operating systems that were introduced decades ago. Even so, the utilities that I have discussed in this article are every bit as useful today as they were when they were first introduced.

    Continue reading  Post ID 3734


  • What’s the Difference Between a “Trojan Horse”, a “Worm”, and a “Virus”?

    There’s no shortage of confusing terminology in the computer biz. With the advent of malicious software, more terminology has been created that only make things less clear.

    The good news is that it’s not really that difficult; in fact, you needn’t understand most of the details (besides, not everyone agrees on the exact meaning of each definition).

    Let’s run down a few terms.

    Malware

    The most important term to know is malware, which is short for malicious software.

    The name says it all: malware is any software that has malicious intent — destroy data, send spam, hold your data for ransom, steal your information — it doesn’t matter. It’s all malicious, it’s all software; thus, it’s all malware.

    You’ll find malware used as a catch-all term for all flavors and varieties of software that intend some kind of harm.

    Virus

    In the human body, a virus is an organism that replicates, or makes copies of, itself and overwhelms the body’s defenses, making it sick.

    When applied to computers, the term “virus” is very similar.

    • A computer virus replicates itself in some way so as to spread within the computer, usually injecting itself into other programs within the computer.
    • A computer virus makes the infected computer “sick”. In the computer sense, “sick” can mean poor performance, crashes, lost files and data, or more.

    Very technically, the term virus does not necessarily imply that a piece of malicious software will replicate itself to other systems. In general use, it’s assumed.

    Spyware

    Spyware is a type of malicious software intended not to do damage, but to collect information, or “spy”, on you. Spyware might monitor and report back on your browsing habits and the programs you run, or access and send other information stored on your machine. One canonical form of spyware is the keystroke logger, which, as its name implies, records your keystrokes (and often more) and uploads this information to a third party.

    Worm

    A worm is a program that replicates itself to other computers. It does so by infecting media, such as USB drives, that make contact with multiple systems, transmitting itself over a network somehow, or otherwise copying itself from one computer to another.

    Very technically, again, the term worm does not necessarily imply malicious intent or behavior, other than the replication. In practice, malicious intent is generally assumed.

    Trojan Horse

    A Trojan horse — often just a “trojan” — is a program that claims to be one thing but is, in fact, another. It uses that deception to gain access to a system that would not be given, were the true intent known.

    A trojan horse is not a virus per se, but it may carry them. For example, there are trojans that claim to be patches for various problems, but instead (or in addition) install malware. Software obtained from many download sites is often a type of trojan, using the promise of the software that is desired to install additional malicious software that is not.

    Phishing

    I think of phishing as a kind of email-based trojan horse. It’s email that looks like it comes from some official site, such as your bank, PayPal, or eBay, but actually comes from someone pretending to be them. They typically use some technique to fool you into thinking they are an official site of some sort, so you hand over sensitive information, like your username and password. Once you do so, they steal your other information, often leading to hacked accounts, identity theft, or worse.

    Regardless of the terms used, protect yourself

    The terms are important, but they’re less important than being aware that malicious software — malware — exists, and taking the steps you need to take to keep yourself safe.

    We shouldn’t have to, of course. Hackers shouldn’t exist, and operating systems and other software should be designed to perfectly protect us. The pragmatic reality, however, is that it remains our responsibility to keep our guard up.

    What does that mean? As outlined in what I consider my most important article — Internet Safety: 7 Steps to Keeping Your Computer Safe on the Internet — it all boils down to using common sense, keeping your software as up-to-date as possible, and running up-to-date anti-malware tools regularly.


  • What’s the Best Antivirus for Windows 10? (Is Windows Defender Good Enough?)

    What’s the Best Antivirus for Windows 10? (Is Windows Defender Good Enough?)

    Windows 10 won’t hassle you to install an antivirus like Windows 7 did. Since Windows 8, Windows now includes a built-in antivirus called Windows Defender (which used to be available separately as Microsoft Security Essentials). But is it really the best for protecting your PC–or even just good enough?

    Run Malwarebytes Alongside Your Antivirus for Maximum Protection

    screenshot.1

    Running antivirus is still very important, but these days the really active threats are from spyware, adware, crapware, and the worst of all: ransomware. That’s where Malwarebytes comes in.

    Malwarebytes not only protects your computer from malware, but does a better job of cleaning up an infected computer than anything else on the market. And it doesn’t just work on PCs — they have a Mac version too.

    And to protect your browser against zero-day exploits, Malwarebytes also includes Anti-Exploit and Anti-Ransomware features, which can stop drive-by attacks cold. And best of all, you can run Malwarebytes alongside your existing antivirus to keep yourself fully protected.

    Download Malwarebytes Today

    A One-Two Punch: Antivirus and Anti-Malware

    Here’s the short version: you need antivirus software on your computer, no matter how “carefully” you browse. Being smart isn’t enough to protect you from threats, and security software can help act as another line of defense.

    However, antivirus itself is no longer adequate security on its own. We recommend you use a good antivirus program and a good anti-malware program. Together, they will protect you from most of the biggest threats on the internet today: viruses, spyware, ransomware, and even potentially unwanted programs (PUPs)—among many others.

    So which ones should you use, and do you need to pay money for them? Let’s start with the first part of that combo: antivirus.

    Is Windows Defender Good Enough?

    When you install Windows 10, you’ll have an antivirus program already running. Windows Defender comes built-in to Windows 10, and automatically scans programs you open, downloads new definitions from Windows Update, and provides an interface you can use for in-depth scans. Best of all, it doesn’t slow down your system, and mostly stays out of your way—which we can’t say about most other antivirus programs.

    For a short while, Microsoft’s antivirus fell behind the others when it came to comparative antivirus software tests—way behind. It was bad enough that we recommended something else, but it’s since bounced back, and now provides very good protection.

    So in short, yes: Windows Defender is good enough (as long as you couple it with a good anti-malware program, as we mentioned above—more on that in a minute).

    But Is Windows Defender the Best Antivirus? What About Other Programs?

    If you look at that antivirus comparison we linked to above, you’ll notice that Windows Defender, while good, does not get the highest ranks in terms of raw protection scores. So why not use something else?

    First, let’s look at those scores. AV-TEST found that it still caught 99.9% of the “widespread and prevalent malware” in April 2017, along with 98.8% percent of the zero-day attacks. Avira, one of AV-TEST’s top rated antivirus programs, has the exact same scores for April—but slightly higher scores in past months, so its overall rating is (for some reason) much higher. But Windows Defender isn’t nearly as crippled as AV-TEST’s 4.5-out-of-6 rating would have you believe.

    Furthermore, security is about more than raw protection scores. Other antivirus programs may occasionally do a bit better in monthly tests, but they also come with a lot of bloat, like browser extensions that actually make you less saferegistry cleaners that are terrible and unnecesaryloads of unsafe junkware, and even the ability to track your browsing habits so they can make money. Furthermore, the way they hook themselves into your browser and operating system often causes more problems than it solves. Something that protects you against viruses but opens you up to other vectors of attack is not good security.

    Just look at all the extra garbage Avast tries to install alongside its antivirus.

    Windows Defender does not do any of these things—it does one thing well, for free, and without getting in your way. Plus, Windows 10 already includes the various other protections introduced in Windows 8, like the SmartScreen filter that should prevent you from downloading and running malware, whatever antivirus you use. Chrome and Firefox, similarly, include Google’s Safe Browsing, which blocks many malware downloads.

    If you hate Windows Defender for some reason and want to use another antivirus, we recommend Avira. It has a free version that works well, a pro version with a few extra features, and it provides great protection scores and only has the occasional popup ad. Just be sure to uninstall the browser extension it tries to force on you.

    Antivirus Isn’t Enough: Use Malwarebytes, Too

    screenshot.1

    Antivirus is important, but these days, it’s almost more important that you use a good anti-exploit program to protect your web browser and plug-ins, which are the most targeted by attackers. Malwarebytes is the free program we recommend here.

    Unlike traditional antivirus programs, Malwarebytes is good at finding “potentially unwanted programs” (PUPs) and other junkware. As of version 3.0, it also contains an anti-exploit feature, which aims to block common exploits in programs, even if they are zero-day attacks that have never seen before—like those nasty Flash zero-day attacks. It also contains anti-ransomware, to block extortion attacks like CryptoLocker. The latest version of Malwarebytes combines these three tools into one easy-to-use package for $40 per year.

    Malwarebytes claims to be able to replace your traditional antivirus, but we disagree with this. It uses completely different strategies for protecting you: antivirus will block or quarantine harmful programs that find their way to your computer, while Malwarebytes attempts to stop harmful software from ever reaching your computer in the first place. Since it doesn’t interfere with traditional antivirus programs, we recommend you run both programs for the best protection.

    Note that you can get some of Malwarebytes’ features for free, but with caveats. For example, the free version of Malwarebytes program will only scan for malware and PUPs on-demand—it won’t scan in the background like the premium version does. In addition, it doesn’t contain the anti-exploit or anti-ransomware features of the premium version—though you can get the beta version of Malwarebytes Anti-Exploit for free, if you’re willing to deal with a few bugs.

    You can only get all three features in the full $40 version of Malwarebytes, which we recommend. But if you’re willing to forego anti-ransomware and always-on malware scanning, the free versions of Malwarebytes and Anti-Exploit are better than nothing, and you should definitely use them.


    There you have it: with a combination of a good antivirus program, Malwarebytes, and some common sense, you’ll be pretty well protected. Just remember that antivirus is only one of the standard computer security practices you should be following. Good digital hygenie isn’t a replacement for antivirus, but it is essential to making sure your antivirus can do its job.

    Continue reading  Post ID 3734


  • 10 Rules to Create a Modern Web Design

    10 Rules to Create a Modern Web Design

     

     

    Creating a website that has a design which is keeping up with the times and is to the convenience of all those who use it is no longer optional in this world. The designs that are trending lately are much different from what they used to be just a couple of years ago. Popular websites are being updated every now and then.

    There are no specific rules that you absolutely must use for designing a website. There are just some considerations that you must keep in mind before starting with or finalizing a design. You may find some helpful web design tips below:

    Create a layout

    You may think that you are making the best design ever for your website, but, when you finalize it, you may realize it looks clunky and awkward. This is because you only see your work with full perspective when you are done with it.

    To avoid this, make it a rule to create a layout for the design you have in mind. Do this on a paper with a pencil, or use PhotoShop to attain a clearer perspective on what your design should look like. This should certainly be the first step in designing any website.

    Use a Style Guide

    A great way to achieve uniformity throughout your web design and not make it look awkward is by using Style Guides. You can find them on the web anywhere, or even design your own! Save in it a template for your design with all the proper fonts you will be using.

    Use big, simple fonts

    Fonts have gained much hype in web design recently. Unique typography is very pleasing to the eyes of the viewer. Using glittery and loud fonts, however, is thoroughly discouraged, unless you’re designing a website endorsing something that requires such design.

    Modern fonts are usually quite simple. They must always contrast with the background so that they are visible. They should also be big enough, so as to not make the viewer look around too much or strain his eyes to read what you are trying to convey. It should be such that as soon as the website is opened, the viewer should be greeted by whatever the website is endorsing.

    Use big, responsive images

    Make sure that all the imagery on the site is big enough to catch the viewer’s eye and is pleading his attention. Use high resolution images and make sure they are placed appropriately. Many websites start by placing big images on the top of the screen, just above the menu.

    These images are very often responsive as well. Clicking on an image instead of words to be taken to a certain part of the website is a very modern tactic. Be sure to not overuse this tactic, though, since as explanatory as an image may be, they could never replace the convenience that’s given by words.

    Make the rest of the design responsive too

    Back when programmers first realized how to make a web design responsive, it was considered very cool and amazing. Now, that is no longer the case. A responsive design is quite necessary when designing a website nowadays.

    Make sure that the website is able to function in its optimum form, not only on a computer screen, but also on a mobile phone screen. No viewer likes a website that is non-responsive in this day and age.

    Feature videos

    Many website make it a point to include a short video that features the product they are endorsing on the homepage. An auto-play option for this video is ideal as most users tend to not click on feature videos on their own.

    This video, if included, must explain the product in simple words along with its merits. This is to the benefit of the user since he will hesitate to use the product if he feels that it is complex.

    Appropriate Menus

    Hamburger menus were quite trendy for web designing for a while. They saved a lot of screen space and were quite handy. But, web designers soon realized all the inconvenience they caused.

    Hamburger menus were difficult to locate. Even when viewers finally located them, most of them had no idea how to get to the appropriate page they are looking for with their help. Hamburger menus are still very popular with app developers as mobile phone screens are considerably smaller than computer screens, but they are not quite as popular with websites.

    Back in web design fashion are now old school menus, that are easier to locate by the viewer and gives him all the appropriate information he needs to get to the page he wants. Other than these menus, phase-out side bars are also very trendy as they save considerable screen space.

    The Color Scheme

    Make it a point to use a vibrant color scheme for any website you are designing. Vibrant does not mean too bright or too loud. The colors of any website must be in contrast with the font of that website and also with the imagery. They should not strain the eyes too much. Also, the color scheme of a website must be appropriate with whatever the website is certifying.

    Live Chat

    Most good websites these days come with live chat support. These are quickly replacing the “Contact us” pages on most websites where it is extremely rare to get a response at all.

    Live chats require an employee of the main center of the website to stay online at all times, this is usually done in shifts, so he could listen to anything the viewer has to say and provide an appropriate response accordingly.

    Simple Navigation

    A viewer should be able to view any part of a website without feeling as if he is stuck with no idea where to go.

    For this purpose, it is imperative to use words in appropriate places, which easily direct people to what lies beyond.


  • Windows 7 – How to Delete Files Protected by TrustedInstaller

    Windows 7 – How to Delete Files Protected by TrustedInstaller

    Did you know that a lot of files in Windows 7 are not owned by you, even if you are the Administrator? They are instead owned by an entity called the “Trusted Installer”. Such a wonderful sounding name eh!

    So that’s not a problem most of the time, unless you need to delete certain system files and folders. You’ll end up getting a message like:

    You do not have permission to perform this action.

    or something like:

    You need authorization from TrustedInstaller in order to perform this action.

    Thanks Windows! So in order to delete a file that is owned by TrustedInstaller, you have to first take ownership of the files or folders and then grant yourself full control permissions and rights!

    You have to do all of that just to be able to rename, delete, or edit these files and folders. In this article, I’ll walk you through the steps in order to do this.

    First, go to the folder or set of files that you need to change permissions for, right-click on them and choose Properties.

    Next click on the Security tab and then click on the Advanced button at the bottom:

    Next click on the Owner tab and you’ll now see that the current owner is TrustedInstaller.

    Now click on the Edit button and choose who you would like to change the owner to, either your account or the Administrators. If your account is an Administrator account, I would suggest just picking Administrators.

     

    You can also check off Replace owner on subcontainers and objects if you need to delete more than one file in a folder. Go ahead and click OK. Now you will see that the Current owner is the account you picked.

    Click OK until you have closed all properties windows and are back to the Windows Explorer screen. Then right-click on the folder or file again and choose Properties again.

    Now click on the Security tab again, but instead of clicking on Advanced, you need to click the Edit button.

    Now click on the user name in the list that you want to change the permissions for, which should be the same as who you changed the current owner too. If the user name is not in the list, click Add, type in the name and click OK.

    Since I had changed the current owner to Administrators, I clicked on Administrators here and then clicked on the check box next to Full Control. When you do that, all the other boxes get checked too.

    Click OK once and then click OK one more time to get back to Windows Explorer. Now you can delete those files without any UAC messages telling you that you can’t! Enjoy!

    Continue reading  Post ID 3734


  • Web Design and Forums

    Web Design Blog

    There are loads of forums on the internet today, ranging from about every kind of niche you can think of, many forums of which are to do with web design / graphic design. Some stand out, and others don’t. We decided to make things easier for you and search for the best forums for web designers.

    What makes a forum great in our opinion is:

    • Having a great, friendly and knowledgeable community.
    • The users need to be active (sign on daily / every few days).
    • Needs to have a very targeted user base. In other words, most of the members need to have signed up to be members and become active in the community, not just sign up to gain access to a few things, not post, then forget about the community entirely.

    We could be here all day listing off factors. Of course, the forum needs to have a decent amount of traffic so designers get heard, and it needs to have a user-friendly design so web designers can use the forum with ease. Anyway enough talking, here’s the list of 10 forums web designers must know about.

    Launch Chat

    #Launch is a community of designers, developers, entrepreneurs, and marketers. Its homepage boasts of members who are “Y-Combinator founders, entrepreneurs, and investors.

    #frontendDevelopers

    #frontendDevelopers is a great place to find new gigs. You can also get feedback from other developers, learn the latest trends and share ideas.

    Coffee Cup

    CoffeeCup Software was started in 1996. The forum helps web designers create better websites.

    Designer Hangout

    Designer Hangout is a great web designers’ community and you can join 9,700+ UX designers and researchers from around the world to discuss user experience in the UX Slack community.

    Digital Point Forums

    This forum may not be just about web design, but it has one of the largest forum communities on the internet with over 290,000 registered members! You can buy, sell and trade services on there, so it’s the perfect place for web designers. You can also pick up a lot of work on there, and clients too!

    Designers Talk

    This forum has a really nice simple layout, and their forums are always buzzing with new threads. They have many forum categories that are split in to more a less everything you can think of. They cover web 2.0, graphic design, flash, illustration, advertising, marketing, typography and much more.

    Web Designer Forum

    Although this forum is hosted on a .co.uk domain (it doesn’t mean it is just for UK people), and even though they only have around 10,000 registered members (compared to some big boy forums), they have an awesome community for web designers. Their forum categories cover all aspects of web design and I love the header design on their website.

    Warrior Forum

    This forum covers web design and other webmaster aspects such as promotion and search engine optimization. Their nice simple forum design is very easy to navigate round. They have nearly 90,000 registered members, and there are always people online.

    Estetica Design Forum

    This forum is insane! All web designers must be registered at this forum! It’s simply beautiful! They have a small user base of around 11,000 members, but there are always web designers online. Their forum covers many aspects of web design, and it’s worth checking out.

    Kirupa Forums

    Now Kirupa is usually for flash design and development, but as the years have gone on they have extended their forums to cope with web design. You can post your designs for critique, and you can also talk about HTML, css, and styling web design.


  • 11 networking commands every Windows admin should use

    11 networking commands every Windows admin should use

    The Windows operating system contains numerous built-in, command line networking utilities. These tools range from the obscure to the commonplace. However, there are 11 built-in networking tools that Windows networking administrators should be familiar with.

    Ping

    I am guessing that the ping command is probably the most familiar, and most widely used of the utilities being discussed in this article, but that does not make it any less essential.

    Ping is used to test the ability of one network host to communicate with another. Simply enter the Ping command, followed by the name or the IP address of the destination host. Assuming that there are no network problems or firewalls preventing the ping from completing, the remote host will respond to the ping with four packets. Receiving these packets confirms that a valid and functional network path exists between the two hosts.

    networking utilities

    NetStat

    If you are experiencing problems with network communications, then network statistics can sometimes help point you toward the root cause of the problem. That’s where the aptly named NetStat command comes into play. This command has a number of different functions, but the most useful of these is to display network summary information for the device. To see this type of summary information, just type NetStat -e.

    ARP

    The ARP command corresponds to the Address Resolution Protocol. Although it is easy to think of network communications in terms of IP addressing, packet delivery is ultimately dependent on the Media Access Control (MAC) address of the device’s network adapter. This is where the Address Resolution Protocol comes into play. Its job is to map IP addresses to MAC addresses.

    Windows devices maintain an ARP cache, which contains the results of recent ARP queries. You can see the contents of this cache by using the ARP -A command. If you are having problems communicating with one specific host, you can append the remote host’s IP address to the ARP -A command.

    networking utilities

    NbtStat

    As I am sure you probably know, computers that are running a Windows operating system are assigned a computer name. Oftentimes, there is a domain name or a workgroup name that is also assigned to the computer. The computer name is sometimes referred to as the NetBIOS name.

    Windows uses several different methods to map NetBIOS names to IP addresses, such as broadcast, LMHost lookup, or even using the nearly extinct method of querying a WINS server.

    Of course, NetBIOS over TCP/IP can occasionally break down. The NbtStat command can help you to diagnose and correct such problems. The NbtStat -n command for example, shows the NetBIOS names that are in use by a device. The NbtStat -r command shows how many NetBIOS names the device has been able to resolve recently.

    Like what you’re reading? Get the latest updates and tech guides in your inbox.

    Hostname

    The previously discussed NbtStat command can provide you with the host name that has been assigned to a Windows device, if you know which switch to use with the command. However, if you’re just looking for a fast and easy way of verifying a computer’s name, then try using the Hostname command. Typing Hostname at the command prompt returns the local computer name.

    Tracert

    Contrary to what a rather infamous YouTube video might lead you to believe, Tracert isn’t pronounced “Tracer T,” nor can it show you how many people are using Google right this second. Instead, Tracert, or “Trace Route,” is a utility for examining the path to a remote host.

    Functionally, Tracert works similarly to Ping. The major difference is that Tracert sends a series of ICMP echo requests, and the request’s TTL increased by 1 each time. This allows the utility to display the routers through which packets are passing to be identified. When possible, Windows displays the duration and IP address or fully qualified domain name of each hop.

    IpConfig

    One utility that I find myself using constantly is IPConfig. At its simplest, the IPConfig command will display basic IP address configuration information for the device. Simply type IPConfig at the Windows command prompt, and you will be presented with the IP address, subnet mask, and default gateway that the device is currently using.

    networking utilities

    If you would like to see more detailed information, then type IPConfig /all. Doing so causes Windows to display IP address configuration that is much more verbose. This is also the command that you will have to use if you want to see which DNS server the Windows device is configured to use.

    The IPConfig command can do much more than just display IP address configuration information. It also contains options that can help you to troubleshoot problems related to DNS and DHCP. For example, entering the IPConfig /FlushDNS command purges the contents of the computer’s DNS resolver cache.

    NSLookup

    NSLookup is a great utility for diagnosing DNS name resolution problems. Just type the NSLookup command, and Windows will display the name and IP address of the device’s default DNS server. From there, you can type host names in an effort to see if the DNS server is able to resolve the specified host name.

    Route

    IP networks use routing tables to direct packets from one subnet to another. The Windows Route utility allows you to view the device’s routing tables. To do so, simply type Route Print.

    The cool thing about the Route command is that it not only shows you the routing table, it lets you make changes. Commands such as Route Add, Route Delete, and Route Change allow you to make routing table modifications on an as needed basis. The changes that you make can be persistent or nonpersistent, depending on whether you use the -P switch.

    PathPing

    Earlier, I talked about the Ping utility and the Tracert utility, and the similarities between them. As you might have guessed, the PathPing tool is a utility that combines the best aspects of Tracert and Ping.

    Entering the PathPing command followed by a host name initiates what looks like a somewhat standard Tracert process. Once this process completes however, the tool takes 300 seconds (five minutes) to gather statistics, and then reports latency and packet loss statistics that are more detailed than those provided by Ping or Tracert.

    networking utilities

    NetDiag

    Perhaps the most useful of the network utilities that are built into Windows is NetDiag. The NetDiag command is designed to run a battery of tests on the computer in order to help the technician figure out why the computer is experiencing networking problems.

    One of the things that I really like about this tool is that although there are a number of optional switches that you can use, you don’t have to use any of them unless you want to. Entering the NetDiag command by itself will cause all of the available tests to be run.

    In some cases, NetDiag can not only identify problems, but can also fix those problems. Obviously, NetDiag cannot automatically correct every problem that it finds, but appending the /Fix parameter to the command will tell NetDiag to attempt to fix the problem automatically.

    The Windows operating system is jam packed with command line utilities. Many of these utilities are left over from operating systems that were introduced decades ago. Even so, the utilities that I have discussed in this article are every bit as useful today as they were when they were first introduced.


  • 10 Rules to Create a Modern Web Design

    10 Rules to Create a Modern Web Design

    Creating a website that has a design which is keeping up with the times and is to the convenience of all those who use it is no longer optional in this world. The designs that are trending lately are much different from what they used to be just a couple of years ago. Popular websites are being updated every now and then.

    There are no specific rules that you absolutely must use for designing a website. There are just some considerations that you must keep in mind before starting with or finalizing a design. You may find some helpful web design tips below:

    Create a layout

    You may think that you are making the best design ever for your website, but, when you finalize it, you may realize it looks clunky and awkward. This is because you only see your work with full perspective when you are done with it.

    To avoid this, make it a rule to create a layout for the design you have in mind. Do this on a paper with a pencil, or use PhotoShop to attain a clearer perspective on what your design should look like. This should certainly be the first step in designing any website.

    Use a Style Guide

    A great way to achieve uniformity throughout your web design and not make it look awkward is by using Style Guides. You can find them on the web anywhere, or even design your own! Save in it a template for your design with all the proper fonts you will be using.

    Use big, simple fonts

    Fonts have gained much hype in web design recently. Unique typography is very pleasing to the eyes of the viewer. Using glittery and loud fonts, however, is thoroughly discouraged, unless you’re designing a website endorsing something that requires such design.

    Modern fonts are usually quite simple. They must always contrast with the background so that they are visible. They should also be big enough, so as to not make the viewer look around too much or strain his eyes to read what you are trying to convey. It should be such that as soon as the website is opened, the viewer should be greeted by whatever the website is endorsing.

    Use big, responsive images

    Make sure that all the imagery on the site is big enough to catch the viewer’s eye and is pleading his attention. Use high resolution images and make sure they are placed appropriately. Many websites start by placing big images on the top of the screen, just above the menu.

    These images are very often responsive as well. Clicking on an image instead of words to be taken to a certain part of the website is a very modern tactic. Be sure to not overuse this tactic, though, since as explanatory as an image may be, they could never replace the convenience that’s given by words.

    Make the rest of the design responsive too

    Back when programmers first realized how to make a web design responsive, it was considered very cool and amazing. Now, that is no longer the case. A responsive design is quite necessary when designing a website nowadays.

    Make sure that the website is able to function in its optimum form, not only on a computer screen, but also on a mobile phone screen. No viewer likes a website that is non-responsive in this day and age.

    Feature videos

    Many website make it a point to include a short video that features the product they are endorsing on the homepage. An auto-play option for this video is ideal as most users tend to not click on feature videos on their own.

    This video, if included, must explain the product in simple words along with its merits. This is to the benefit of the user since he will hesitate to use the product if he feels that it is complex.

    Appropriate Menus

    Hamburger menus were quite trendy for web designing for a while. They saved a lot of screen space and were quite handy. But, web designers soon realized all the inconvenience they caused.

    Hamburger menus were difficult to locate. Even when viewers finally located them, most of them had no idea how to get to the appropriate page they are looking for with their help. Hamburger menus are still very popular with app developers as mobile phone screens are considerably smaller than computer screens, but they are not quite as popular with websites.

    Back in web design fashion are now old school menus, that are easier to locate by the viewer and gives him all the appropriate information he needs to get to the page he wants. Other than these menus, phase-out side bars are also very trendy as they save considerable screen space.

    The Color Scheme

    Make it a point to use a vibrant color scheme for any website you are designing. Vibrant does not mean too bright or too loud. The colors of any website must be in contrast with the font of that website and also with the imagery. They should not strain the eyes too much. Also, the color scheme of a website must be appropriate with whatever the website is certifying.

    Live Chat

    Most good websites these days come with live chat support. These are quickly replacing the “Contact us” pages on most websites where it is extremely rare to get a response at all.

    Live chats require an employee of the main center of the website to stay online at all times, this is usually done in shifts, so he could listen to anything the viewer has to say and provide an appropriate response accordingly.

    Simple Navigation

    A viewer should be able to view any part of a website without feeling as if he is stuck with no idea where to go.

    For this purpose, it is imperative to use words in appropriate places, which easily direct people to what lies beyond.