Skip to main content

ADS

What to do after creating your website?


In my recent posts, I talked about how to create a website, How to optimize a website according to SEO, How to use SEO content to build a website, Social media with a website, What is a link juice in a website, what is a link in a website?

Now, in this post, I will show you how to manage your website after creating. There are many areas where we must keep an eye for good ranking and traffic as well as customers.

    1.    The topic should be short and specific.

    2.    Link juice – one link in the single post will be counted as 100%. But that will decrease the total value of the post.

    3.    Two links from Single post will score 50%: 50%.
  
    4.    Three links will divide into 33.33%:33.33%: 33.33%.

    5.    If you want to place a link and do not want to count it selects no follow by right clicking on the link.

    6.    Place only related links in the post.

    7.    Text should be written with Ctrl+Shift+V. To avoid wrong formatting in future.

    8.    Place Sitemap of the website plays the significant role in indexing of post.

    9.    Create sitemap from www.sitemap-xml.com.

     10.        Share all post on Social Media.

     11.       Monitor backlinks via websites that provide such services.

     12.     Google webmaster tool monitors a website’s day to day errors and indexing. That may come handy.

     13.       Sites.google.com can be helpful with uploading files to your website if you have hosted your website over Blogger.

     14.       Free hosting is available at Blogger.

     15.       Alexa.com can be checked for ranking of a website.

     16.       Write down Passwords to a safe place.

     17.       You can add HTTPS to the website for customer’s data security. This will save customer’s data from going into wrong hands.

     18.       One can opt for website’s backup data from losing it with any hardware or software problem.

     19.       Email name must be same of your website name.

     20.       Facebook page can also be created. And same information can be shared there for a better reach.  

WHAT NOT TO DO?

   1.    Never copy content from another website, and if it is the last option then give credit to the original website from which you took the content.

   2.    Never share your confidential details over a public network.

   3.    Do not work with your ID on a public domain.

   4.    Check whether the browser and PC are secured or not. For that website must start with an HTTPS and a locked symbol and PC must have an active antivirus.
  
    Time to time this post will get updated according to latest technology and trends.








Comments

Popular posts from this blog

How to install MAC mouse cursor in Windows 10

Windows 10 comes with many options in mouse cursors. They can be changed with their Shape and Size, Their Black and White cursor are also good. But if you are interested in something different than Apple's Mac mouse cursors are available in market to satisfy you.

How to install MAC mouse cursor in Windows 10
Now I will show you how to install MAC EI Capitan cursors in Windows 10. Following steps will help you.


Step 1.   Go to http://in-dolly.deviantart.com/art/Updated-ElCapitan-cursors-593804414.

Step 2.   Now click on Download link which is in the right corner of website, When this Zip file completely downloaded, now open that Zip file using WINRAR, or locate the file and right click. Now select Extract All(if you have WinRAR installed in your device).

Step 3.   After that select location, where you want to install that file on your Device.


Step 4.   Now open that file and locate the file install.inf. After that click on particular file to install MAC EI Capitan cursors in Windows 1…

HOW TO USE FREE ANTI-KEYLOGGER GHOSTPRESS WITH WINDOWS 10/8/7

Sometimes people need to use an unknown computer to complete a task with Internet and they need to share some personal information there. This may compromise their personal information. When using a public computer, Key logging comes handy to people seeking such information. Key Logging is also known as Keystroke logging or Keyboard capturing. This feature enables information seeker to the recording of key struck on a keyboard. Users do not know that his actions are monitored by anyone else. This is a dangerous feature that compromises people’s personal information like the debit card, credit card and more.
To overcome above situation it is always advised that you use an anti-keylogger app, at the time of using a public terminal with your personal information. This will not let other monitor your keyboard strokes. Software named Ghost press can be used to prevent capturing of keyboard strokes typed by you for windows.
Ghost press is a free and easy to use program that prevents from keyl…

Use of function keys ( F1,F2...........F12).

These keys perform many action according to their role in app.

◆F1
• This key provides help option. You will be directed to help page of that program.
• Windows Key + F1 will open the Microsoft Windows help and support center.


◆F2
• You can change the name of highlighted/selected file using function key F2 In Windows.
• Alt + Ctrl + F2 opens new document window in Microsoft Word.
• Ctrl + F2 shows the print preview window in Microsoft Word.


◆F3
• F3 will open a search window to find files and folders in computer.
• Shift + F3 will changes the text from upper to lower case or a capital letter at the beginning of every word in Microsoft Word.
• Windows Key + F3 opens the Advanced find window in Microsoft Outlook.


◆F4
• Open the address bar in Windows Explorer and Internet Explorer.
• Alt + F4 will close the program window currently active in Microsoft Windows.
• Ctrl + F4 will close the open window within the current active window in Microsoft Windows.

◆F5
• In all Internet browsers pressing …