A question that has been bugging me all day today when I was conducting some SEO work today was is the <strong> and <em> tag any different to the <b> and <i> tag. The conclusion I have come to after researching the topic is that you use the <strong> and <em> instead of <b> and <i> tag when you are trying to emphasize keywords on a page as readers treat the two tags differently. They achieve the same visual effect however the <strong> and <em> tags are "logical" tags. This means that they are for when the developer wants to add emphasis to particular words or phrases. A reader for a user with disabilities may say the word louder for example. The <b> and <i> tags are for visual layout effects on a page and do not have the same effect on a reader or add any weight to your keywords in the search engines. I suggest when crafting a page and that if you want to format something purely for visual effect then you use the <b> or <i> tag, as they will reduce you page size very slightly, hence increase load time. This post by Nikki Pilkington also states that there is no effect in the SEO world.
http://nikkipilk.sc10.co.uk/blog/2008/09/30/tip-49-the-bold-and-the-beautiful/
Technology Tips blog for improve computer & technology use! Technology tips relating to all aspects of technology, from web development, search engine optimization, technology news, internet news, web 2.0, social networking, search and software. This Technology Tips blog has a bit of everything.
Search
Thursday, December 18, 2008
<strong> and <b> / <em> and <i> - Which is for what?
Tuesday, December 16, 2008
Improve Your Businesses Wireless Security
Create a Wireless Security Policy
Create a policy that specifies who can use the network, and how to protect the network This is one below is taken from a Cisco template I found on a website;
- Acceptable use policy, to specify what types of network activities are allowed and which ones are prohibited.
- E-mail and communications activities, to help minimise problems from e-mails and attachments.
- Antivirus policy, to help protect the network against threats like viruses, worms, and Trojan horses.
- Identity policy, to help safeguard the network from unauthorised users.
- Password policy, to help employees select strong passwords and protect them.
- Encryption policy, to provide guidance on using encryption technology to protect network data.
- Remote access policy, to help employees safely access the network when working outside the office.
Educate your Employees
Educate your employees and get them involved in protecting the network. Use informational posters and training about security, passwords, and privacy to help you keep your business information and communications secure.
Secure the WLAN
- Use strong encryption: When you install your network, set up the strongest wireless encryption you can. WEP encryption is adequate, but WPA and WPA2 are better options.
- Secure communications: Encrypt data that travels on the network, and authenticate users to be sure you know who is using the WLAN.
- Change the default network name to something that is hard to identify so it is unrecognisable.
- Use MAC address control lists combined with encryption to restrict user access.
- Be sure that management ports are secured with non default names and passwords.
- Hide the access points to prevent tampering.
- Use video surveillance cameras to monitor your office building and site for suspicious activity.
Protect Your Company from Outside Threats
Protect wireless devices with the same security you use for the your company network. (i.e. firewalls, VPNs, and antivirus software)
Protect Your Wired Network from Wireless Threats
Install wireless intelligent protection switching (IPS) devices to prevent unauthorised, "rogue" access points and other wireless threats.
Monday, December 08, 2008
Review of Untangle UTM
Untangle is aimed at SMB appliances and is geared toward 250 users or fewer, and is meant to work on one server although not released as an enterprise product it is targeted at SMB’s who previously may have used a combination of open source projects.
There is an enterprise-scale version slated for a 2009 release with the free version including a spam, virus, spyware, phish and attack blocker, as well as a web filter, protocol control, open VPN, intrusion
prevention, firewall, router and web reporting.
The paid version of Untangle includes active directory integration and advanced policy management, as well as remote access portal and configuration back-up.
Pricing for up to 10 users is US$25 a month, and it's double for up to 50 users. From 51 to 150 users it will cost US$150 a month, and for more than 151 users US$250 a month.
For more information go to
http://www.untangle.com/