website bouwer gezocht?

Website bouwer in Den Haag gezocht?

Zoek niet verder, want u heeft er een gevonden. Bovendien zijn we voordelig.

NOS-DESIGN bouwt mobielvriendelijke, moderne websites op maat. Dat kunnen landingpages zijn, WordPress sites, web apps of een Dreamweaver site. Natalia O.Schwermer heeft veel ervaring opgedaan met het maken van verschillende soorten website. Hierdoor kunt u ervan uit gaan dat u een goedwerkende website krijgt, die SEO vriendelijk is en dat deze binnen een korte tijdsbestek gerealiseerd kan worden.

Neem contact op voor de voorwaarden en verschillende mogelijkheden. Of kijk eerst bij webdesign voor de opties.

zoekmachine optimalisatie tips

Zoekmachine optimalisatie tips

U wilt op het internet gevonden worden? U wilt uw positie bij Google verbeteren en verhogen? Dan is het handig om uw website te optimaliseren. Hierdoor zal een zoekmachine de site beter kunnen lezen en indexeren. U kunt er ook voor kiezen om met Google Adwords te adverteren, toch is dit vaak kostbaar en of het het gewenste resultaat oplevert is nog maar de vraag. Een goede optimalisatie kan u ook zo helpen om beter gevonden te worden.

Een goede optimalisatie houdt onder andere in:

  • Korte laadtijd van de website
  • Juiste configuratie en HTML-structuur
  • Unieke content
  • Relevante Keywords
  • Niet te lange, maar ook niet te korte titels
  • Interessante, actuele content

Aanvullend kunt u video’s gebruiken om meer aandacht te vragen, de sociale media inzetten om meer publiek te trekken en blog’s schrijven met actuele thema’s.

Kijk voor meer informatie op NOS-DESIGN en wellicht wilt u een uitgebreide SEO-analyse, promotievideo’s, een mobielvriendelijke website, app of digitale producten om op de social media te adverteren.

Phishing for your identity

B2B | Den Haag

Phishing for your identity

Who hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information?  The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number.  You recognize the business name as one that you’ve conducted business with in the past.  So, you click on the convenient “take me there” link and proceed to provide all the information they have requested.  Unfortunately, you find out much later that the website is bogus.  It was created with the sole intent to steal your personal information.  You, my friend, have just been “phished”.

Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business.  The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.

It is not at easy as you think to spot an email phishing for information.  At first glance, the email may look like it is from a legitimate company. The “From” field of the e-mail may have the .com address of the company mentioned in the e-mail.  The clickable link even appears to take you to the company’s website, when in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals.  They have spent a lot of time in creating emails that look authentic.  Users need to review all emails requesting personal information carefully.  When reviewing your email remember that the “From Field” can be easily changed by the sender.  While it may look like it is coming from a .com you do business with, looks can be deceiving.  Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible.  They will even copy logos or images from the official site to use in their emails.  Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.

A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer.  The actual website address to which you are being directed will show up for you to view.  It is a very quick and easy way to check if you are being directed to a legitimate site.

Finally, follow the golden rule.  Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser.  At least then you can be confident that you are, in fact, being directed to the true and legitimate website.

Fighting Spam

B2B | Den Haag

Fighting Spam

fighting spam

How prevalent is Spam?  According to Scott McAdams, OMA Public Affairs and Communications Department (

“Studies show unsolicited or “junk” e-mail, known as spam, accounts for roughly half of all e-mail messages received. Although once regarded as little more than a nuisance, the prevalence of spam has increased to the point where many users have begun to express a general lack of confidence in the effectiveness of e-mail transmissions, and increased concern over the spread of computer viruses via unsolicited messages.”

In 2003, President Bush signed the  “Can Spam” bill, in December of 2003 which is the first national standards around bulk unsolicited commercial e-mail.  The bill, approved by the Senate by a vote of 97 to 0, prohibits senders of unsolicited commercial e-mail from using false return addresses to disguise their identity (spoofing) and the use of dictionaries to generate such mailers. In addition, it prohibits the use of misleading subject lines and requires that emails include and opt-out mechanism. The legislation also prohibits senders from harvesting addresses off Web sites. Violations constitute a misdemeanor crime subject to up to one year in jail.

One major point that needs to be discussed about this:  spam is now coming from other countries in ever-greater numbers. These emails are harder to fight, because they come from outside our country’s laws and regulations.  Because the Internet opens borders and thinks globally, these laws are fine and good, but do not stop the problem.

So what do you do about this?  Her are the top 5 Rules to do to protect from spam.

Number 1:  Do what you can to avoid having your email address out on the net.

There are products called “spam spiders” that search the Internet for email addresses to send email to.  If you are interested, do a search on “spam spider” and you will be amazed at what you get back.  Interestingly, there is a site,, which is an open source project geared to fight Internet “spambots” and “spam spiders”, by giving them bogus HTML web pages, which contain bogus email addresses

A couple suggestions for you:  a) use form emails, which can hide addresses or also b) use addresses like instead of your full address to help battle the problem. c) There are also programs that encode your email, like jsGuard, which encodes your email address on web pages so that while spam spiders find it difficult or impossible to read your email address.

Number 2:  Get spam blocking software.  There are many programs out there for this.  (go to or for example).  You may also buy a professional version.  Whatever you do, get the software. It will save you time.  The software is not foolproof, but they really do help.  You usually have to do some manual set up to block certain types of email.

Number 3: Use the multiple email address approach.

There are a lot of free email addresses to be had.  If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.

Number 4:  Attachments from people you don’t know are BAD, BAD, BAD.

A common problem with spam is that they have attachments and attachments can have viruses.  Corporations often have filters that don’t let such things pass to you.  Personal email is far more “open country” for spamers.  General rule of thumb:  if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT.  Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.

Number 5:  Email services now have “bulk-mail” baskets.  If what you use currently does not support this, think about moving to a new vender.  The concept is simple.  If you know someone, they can send you emails.  If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle.  Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.