|Designing a quality, unique website requires the right combination of art, technology, and communication skills. It is vitally important to the success of any professional website project for the client to be actively involved in helping the designer identify and understand their true wants and needs. Web designers act as both creative coach and translator of ideas. Turning ideas into concepts, incorporating customer feedback, and prototyping rapidly creates a hands-on, evolutionary workflow for the customer, producing maximum results and a pleasant customer experience.|
|Step 1: Learn a little (or a lot) about the client’s business
Once a client has committed to building a new website, it’s time to dig in and learn a little about the business and the specific requirements. This can be done through a simple questionnaire for smaller sites, or may require many hours of consultation for larger ones. Some of the questions asked include: website goals and objectives, target audience, color and style preferences, examples of preferred websites, etc. If a client already has specific text and images that they would like to have included (maybe from an existing brochure or catalog) it is time to share the files and information with the designer, and the designer will in turn review it and share an objective opinion on the usefulness and quality of the customer supplied materials. If a domain name does not already exist for the site, this would be a good time to decide on a name and have it registered. The designer can help as little or as much as necessary in this area. Once all information has been received, work will commence immediately on the custom website design. Idea sharing and customer involvement is always welcomed and encouraged.
Step 2: Review design concepts and pick a direction
Normally, a customer will have initial design concepts to review within a few days. Some projects can take substantially longer to reach this initial stage, depending on the level of research and discovery being done for the customer in other related and possibly interdependent areas, such as designing a new corporate identity (logo and entire brand) or building an information systems solution into the website. The design and layout of the home page and first-level inner pages come first. This offers the customer a view of the possibilities and how different ideas work together at different levels. Then, one will be selected for further refinement. Existing works by the designer can often be used as a starting ground and modified to create a unique, yet familiar, look and feel. In the case that the customer is indecisive or doesn’t fall in love with one of the initial concepts, additional designs will be presented. After a design and layout concept has been chosen, revisions to that design and layout concept will be made until the customer is completely satisfied.
Step 3: Review revisions and ask for feedback
Once the design and layout has been approved and finalized, detailed content will be entered utilizing the selected design guidelines for consistency and beauty. Content can be supplied in almost any electronic format such as email, Word or even scanned text. In the case of larger consultative web projects, content can be created for the customer as part of an overall marketing and branding campaign. For images, content can be shot by the design team, supplied by the client, or in some cases purchased or custom created by the designer. There is also the option of choosing imagery from a gallery of quality royalty-free work at no additional cost. Just describe what is wanted, and the designer will pick the perfect images for the job. Or, if preferred, the client may choose the images themselves and the designer will certainly assist in the process a level with which the customer is comfortable. Customer supplied content can be supplied as soon as it is acquired – there’s no reason to wait until the web pages have been designed. In fact, often times the best design concepts are born of the content.
Step 4: Finalize your website.
All concepts and revisions can be viewed online and there is always an open channel of communication to the designer. Once the customer is completely satisfied with the finished website, high-quality website hosting is offered, or the website can be implemented at a third party host of the client’s choosing, as long as appropriate security access and necessary software tools are available.
|Website hosting nowsadays is very competitive. Many web hosting companies offer tonnes of features at very competitive prices. With so many choices in mind, how do you choose the right host? I have tried many hosts over the years and finally landed on one that I feel has the most complete features that I need at the best possible price, ie BlueHost.|
BlueHost provides hosting features thatÂ surpass the needs ofÂ large commercial websites:10 Gigabyte Hosting Space
Host 6 Domains on 1 Account!!!
2,500 POP/Imap Email Accounts
250 GIGS of Transfer
SSL, FTP, Stats
CGI, PHP, MySQL
2000/2002/2003 Front Page Extensions
Free Domain Forever!
Superb/Responsive Support EngineersÂ
Reliability and Performance
|You must have heard of the term “Quality Links”. How about “Quality Traffic”? “Quality links” means that the one way links coming to your website are from reliable sources and the content is related to yours. For example, if your website is about web design and a link pointing to your site from the web design section of msn website is considered as a quality link. “Quality Traffic” means that the people who come to your website via whatever channels are actually looking for something and have better chances of using your services. They are looking for something specific and your website can provide the answer and make them stay longer. Quality links are important in search engine optimisation as to Quality Traffic to sales generation.|
|Forum / Blog
By participating in forums, you are exposing your url to anyone who is reading your post. For example, if you provide web design service, you might want to be more active in the web design section of the forum because you know that the people who are reading your post are people who are interested in web design. The clicks from these people are usually more valuable than clicks from any other tom, dick and harry. I would recommend using only one link in your signature to avoid confusion. Some people use alot of links in their signature for SEO purposes and that actually defeats the whole idea of getting quality traffic.
Many people leave their urls when participating in blog discussions. Like forums, people who take time to read the blog are interested in the topic. Depending on the popularity of the blog, your url in the blog comments may provide you with quality traffic.
Online Advertisement / PPC Programs
There are other ways to get traffic but most of them are not really effective. I will list 2 commonlyÂ used techniques nowsadays:
Guaranteed Targeted Hits
Hits Exchange Network
|Almost every website nowsadays will have some sort of a login system. If you decide to write a login script yourself in PHP, this article will provide some important pointers on the security of the script you are writing. This article will talk on a common login hacking technique known as The SQL Injection Attack. This is not new in the programmer’s world but worth taking note especially when you are new to programming.There are hackers everywhere, so beware!Â|
|When the user submits a form consisting of the username and password, all the variables will be store in the $_POST array after submitting. You can get the values of the array easily using:
$usr = $_POST[‘username’];
Where “username” and “password”Â are the names of the textfields in your form.
How do you deal with these values?
SELECT * FROM `user_table`Â where username=’$usr’ AND password=’$pwd’
Re-looking at theÂ SQL statement, if someone leaves username empty and writesÂ “Â ‘Â OR username LIKE ‘%”Â in theÂ password field, then your wholeÂ SQL statement becomes:
SELECT * FROM `user_table`Â where username=’ ‘ AND password=’Â ‘ OR username LIKEÂ ‘ %Â ‘
This statement means selecting all the records in the table.Â If your criteria of lettingÂ the user proceedÂ is thatÂ the return number of records is more than 0 (at least one user found), then this SQL statement will return all records, meaning that the user will be able to slip passÂ through the verification process. This type of hacking is famously known as The SQL injection attacks.
One good way to prevent this from happening is to make sure the $_POST array is safe from escape strings such asÂ ‘ and “. You can filter your $_POST array using
$usr = mysql_real_escape_string($_POST[‘username’]);
There are of course other ways to do it but the idea is to let you know that youÂ have to be very carefulÂ in handling the dataÂ retrieved from forms, epecially more so for usernames and passwords.
|There are many variants of Linux used in different computer systems today. Luckily, most Linux developers employ a common naming and utilization scheme that makes different variants of Linux easy to use and maintain. This article will discuss some important and common directories in many popular Linux distributions.|
Each user of a Linux system is assigned a special directory, called “home” direectory, that represents their private space on the system. For example, if a user of the system is called tom, the home directory of tom will be /home/tom. Tom has the right to create any files and directories under his home directory. This is also the default locationÂ when tom logs into the system.
/bin and /usr/bin
/sbin and /usr/sbin
This will be my blog site. There is nothing in here yet. I will add something in the next few days. Thanks everyone.Â