-->

AUTO JINGLING , KENAPA TIDAK DI HAPUS GOOGLE ?

AUTO JINGLING , KENAPA TIDAK DI HAPUS GOOGLE ?

Autojingling tidak terdeksi google sebagai malware 

Ada yang pernah terkena jingling ? Saya juga. Beberapa waktu lalu saya melaporkan sebuah blog jingling dengan permintaan penghapusan halaman oleh google karena web jingling mengirimkan robot traffic .

Jelas  pengiriman robot traffic akan membuat blog kebanjiran traffic , hal yang menakutkan terutama bagi para pengguna AdSense yaitu banned. Karena beberapa isu attack jingling di khawatirkan akan berdampak pada akun AdSense, walaupun saya sendiri belum bisa memastikan bahwa hal ITU benar atau tidak.

Web jingling memang rese  mengirimkan traffic dengan tujuan untuk menyerang website seseorang. Apakah benar hal ini mampu ? Beberapa blogger mengatakan kalau yang di serang hosting blogger , masih aman , kecuali hosting sendiri dengan WordPress dengan bandwith terbatas. Kata beberapa teman blog saya.

Hal yang unik Dari autojingling.blogspot.com

ISI FEED AUTO JINGLING
Lihat yang saya warnai merah

<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6503366067783270573</id><updated>2020-05-21T23:49:16.713-07:00</updated><title type='text'>Auto Jingling</title><subtitle type='html'>Traffic Jingling Auto Visitor Online</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://autojingling.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6503366067783270573/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://autojingling.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>2</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6503366067783270573.post-7521068634579521632</id><published>2019-08-07T10:12:00.001-07:00</published><updated>2019-08-07T10:12:12.990-07:00</updated><title type='text'>Protecting Children Online</title><content type='html'>&lt;h2 style=&quot;text-align: justify;&quot;&gt;Steps Toward Making Your Computer &quot;Weirdo-Proof&quot;&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It&#39;s an unfortunate fact of reality, but children are the most victimized computer users on the Internet today. The good news is that there are some practical steps you can take to protect your children from sexual predators, hackers, and other seedy individuals who want to cause harm. This article will describe a few of them.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The first step in protecting your children at the computer is to prevent their access to &amp;nbsp;passwords. This will keep them from sharing passwords with others and inadvertently enabling hacking into your system. If you think about it, there&#39;s no reason why a five, seven, or even twelve year old needs to know the passwords to sensitive areas on the computer unless you&#39;ve given them permission! In fact, children don&#39;t need to know the password used to access the Internet either. It may be a hassle to type it in each time they want to get online, but it&#39;s better to know the times that they connect than to have them sneak online without your permission and knowledge of their activities.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The second step towards protecting your children online is using the computer together. Siting next to your child while he or she peruses the Internet, you can guide him or her to make safe and intelligent decisions. You can approve websites and bookmark them together. You can monitor the conversations your children have with their friends and teach them appropriate online behavior at the same time. You can make recommendations and create a private time for quality time as well.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The third step involves blocking access to inappropriate areas altogether. You and your children may not always agree about what&#39;s appropriate, but as a guardian, you&#39;re in control and you&#39;re ultimately responsible for their safety. Take the time to investigate software tools that put you in control and allow you to block access to certain websites. If you use an online service like AOL (America Online), you can use its internal Parental Control settings to block access to various chatrooms and websites. You could even block instant messaging and email from anyone who isn&#39;t a fellow AOL user.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Other tools available online operate similar to the way that AOL&#39;s Parental Control settings work, however no collection of tools could replace the reinforcement of mom and dad. Never let your children speak with strangers and never leave them alone at the computer unattended. Children just don&#39;t have the experience that adults have and they don&#39;t have the skills required to handle inappropriate conversations, emails, or images found online.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;NOTE: Some of these tools include kid-specific web browsers that will visit pre-approved websites. Others include browser plug-ins that won&#39;t allow access to online areas that contain forbidden keywords.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Another step requires teaching your children to never ever volunteer personal information. Under no circumstances, should children give their personal names, home addresses, phone numbers, or school information to anyone over the Internet regardless of the situation. &amp;nbsp;In the even this information is required to enter a contest of some sort, be sure that you&#39;re the one who makes the decision to supply it and that you&#39;re the one who does it.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Performing all of these steps won&#39;t be easy. However you can help minimize resistance to your monitoring efforts by explaining why you&#39;re taking these precautions. Smaller children will probably enjoy the time you spend together at the computer, but older children and pre-teens may resent it. To help build a case for your concern, you might want to show your older children a few news stories that exemplify the dangers that unsupervised children are exposed to. The newspaper is unfortunately full of examples but with your help, we can reduce them world-wide.&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6503366067783270573/posts/default/7521068634579521632'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6503366067783270573/posts/default/7521068634579521632'/><link rel='alternate' type='text/html' href='http://autojingling.blogspot.com/2019/08/protecting-children-online.html' title='Protecting Children Online'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6503366067783270573.post-7565302387845299611</id><published>2019-08-07T10:11:00.000-07:00</published><updated>2019-08-07T10:11:04.114-07:00</updated><title type='text'>Introduction to Programming</title><content type='html'>&lt;h2 style=&quot;text-align: justify;&quot;&gt;Controlling Your Computer with a Programming Language&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In a previous article, we introduced automating some tasks with MS-DOS batch files. In this article, we&#39;re going to introduce programming and describe how it can be used to control the way your computer works. Normally, computer novices aren&#39;t interested in controlling the computer. New computer users are typically interested in learning more about how the thing works. However they may be surprised to learn that programming increases computer knowledge as a whole and it can help to diminish the fear associated with using a new computer.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Programming a computer is creating a sequence of instructions that enable the computer to do something.1 The people who program computers (called programmers) use a programming language to communicate with a computer. You might have heard of some of these languages in the past such as Visual Basic, C++, or Fortran. There are hundreds of other programming language and neither one is better than the other. Most of them are capable of performing the same tasks and achieving the same goals. A programmer chooses one language by a simple preference.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Each of these languages differ by the way they communicate with a computer however, and the commands that they follow are very specific. Not a single command of one language can be interchanged with the commands or language of another. But all of them can be used to control a computer.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now it would be impossible to teach you how to program any language in a single article. But we can still introduce you to some of programming&#39;s most basic concepts - starting with the commands we talked about earlier. Commands are the instructions that a computer follows to perform an action. 2 To make them work inside of a program, programmers assign commands to objects like buttons for example.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The commands in a program are pretty useless unless they have some data to act on so programmers either give the programs some data to work with (list of names or numbers for example) or they make the program generate it&#39;s own data. Sometimes, the data comes from an outside source like the Internet or the computer that the program runs on. The data that a program receives is called input and data that the program generates is called output.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Other times, the data is unknown. If the program were working with a simple algebra equation like, &quot;x + 5 = y,&quot; the variables &quot;x&quot; and &quot;y&quot; would be unknown pieces of data. Or if a program were to calculate a date &quot;x&quot; days from now, the variable &quot;x&quot; would be an unknown piece of data until we tell the program what &quot;x&quot; is. In programming, it&#39;s sometimes required to work with unknown pieces of data.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;That&#39;s when conditions come in handy. Conditions allow a program to perform an action based on the outcome of a previous command.3 Using this type of instruction, we could instruct a program to do one thing if the &quot;x&quot; variable in our latter example turned out to be 7 days, and then do different thing if the variable turned out to be 3 days.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Commands, data, variables, and conditions help build the most simple programs and there are certainly many more components of any programming language. But when they&#39;re typed into a programming language and compiled to create a an executable file (a file ending with the .exe extension), they turn into a software application. &amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As we mentioned earlier, you can use a programming language to control your computer. By using simple commands, you can program your computer to perform mathematical tasks, fill out web forms, compose an email message and send it off, or any number of other things. If you&#39;re interested, you may find Visual Basic is one of the most easiest programming languages to learn. Visual Basic is an object-oriented programming language and it automatically codes much of a program the minute a programmer drags a button onto a screen.&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6503366067783270573/posts/default/7565302387845299611'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6503366067783270573/posts/default/7565302387845299611'/><link rel='alternate' type='text/html' href='http://autojingling.blogspot.com/2019/08/introduction-to-programming.html' title='Introduction to Programming'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry></feed>

Blog ini memiliki artikel dengan konten yang baik. Akan tetapi realita halaman yang ini adalah aplikasi  jingling. Google  hanya membaca dengan perayap , mesin bukan manual.


Pembuat aplikasi ini pasti orang yang sudah tidak asing dengan dunia website. Apalagi dia juga memasang iklan popads.

Pembuat aplikasi ini niat banget. 
😁😀