6 SEO Tips for Brand New Sites


SEO tips

6 SEO Tips for Brand New Sites | IronMonk


Grilled Honey-Glazed Pork Chops

Why this recipe works:We battled glazes that slid right off the chops, while chops appeared slightly lacquered required such lengthy grilling and basting times that the meat was as a dry as a bone. We rub our chops with a sugar mixture that caramelizes on the grill creating a rough surface for our super-reduced glaze to stick to. Oh, and the meat is perfectly cooked too.

Serves 4


  • 4 (10-ounce) bone-in pork rib or center-cut chops, about 1 inch thick, trimmed
  • 1/4 cup sugar
  • 1 teaspoon salt
  • 1 teaspoon pepper
  • 2 tablespoons cider vinegar
  • 1/2 teaspoon cornstarch
  • 1/4 cup honey
  • 1 1/2 tablespoons Dijon mustard
  • 1/2 teaspoon minced fresh thyme
  • 1/8 teaspoon cayenne pepper


  • 1. Cut 2 slits about 2 inches apart through fat and connective tissue around outside of each chop. Combine sugar, salt, and pepper in bowl. Pat chops dry with paper towels and rub with sugar mixture.
  • 2. Whisk vinegar and cornstarch in small saucepan until no lumps remain. Stir in honey, mustard, thyme, and cayenne and bring to boil. Reduce heat to medium-low and simmer until glaze is reduced to 1/4 cup, 5 to 7 minutes.
  • 3A. For a charcoal grill: Open bottom vent completely. Light large chimney starter filled with charcoal briquettes (6 quarts). When top coals are partially covered with ash, pour two-thirds evenly over grill, then pour remaining coals over half of grill. Set cooking grate in place, cover, and open lid vent completely. Heat grill until hot, about 5 minutes.
  • 3B. For a gas grill: Turn all burners to high, cover, and heat grill until hot, about 15 minutes. Leave primary burner on high and turn other burner(s) to medium-low.
  • 4. Clean and oil cooking grate. Place chops on cool part of grill and cook (covered if using gas) until meat registers 140 degrees, 3 to 5 minutes per side. Brush chops with glaze and grill, glazed side down, over hot part of grill until caramelized, about 1 minute. Repeat with second side of chops. Transfer chops to platter, tent loosely with aluminum foil, and rest for 5 to 10 minutes. Brush with remaining glaze. Serve

[Source: Yes!Chef!, Aug-22-12]

Protect Yourself Against Identity Theft

No one is immune…

On August 3rd, 2012, a tech writer for Wired’s “Gadget Lab,” Mat Honan, was the victim of identity theft. His iPhone, iPad and MacBook were remotely wiped, his Twitter account hijacked and his Gmail deleted. He lost irreplaceable photos from the first year of his daughter’s life, hundreds of emails, and his ability to ever again feel secure online. Here’s how to significantly reduce the chances it could happen to you.

In the immediate wake of the attack, Mat Honan assumed that his Apple ID password had been compromised. It turns out the perpetrator provided just two pieces of information to Apple’s phone support – the victim’s billing address and the last four digits of his credit card number – and the phone support representative gave the hacker a temporary password, despite the fact he couldn’t answer security questions correctly. Known as social engineering, a customer support representative was convinced to provide personal information to someone posing as the account holder.

Before you breathe a sigh of relief because you don’t have an Apple ID or iCloud account, know that this can happen at any company where someone other than you has access to your information and the power to push through a password reset – that’s right, everywhere.

A better password is certainly an important piece of the puzzle. Don’t use the same one across multiple sites. Ideally, use a password management program like LastPass to set up unique passwords at every site you visit. Utilize passphrases (a series of unrelated words is best) instead of an odd jumble of characters. Not only are they easier to remember so you’re less likely to get locked out, they’re actually harder for a computer to hack.

Don’t put all your data in one digital basket. The cloud is a great resource for backing up your data, but if losing something would be devastating it’s best to double up and back it up locally as well. Get an external hard drive and use a program like CrashPlan to set up an automated backup to both a cloud storage location and a local backup device.

A big part of the problem for Mat Honan is that he connected his logins and email’s through a very common process known as “daisy chaining.” He set his Apple email as a backup to his Gmail and used his Gmail as a login for his Facebook and Twitter. If you use Google, Facebook or Twitter to login to other social networking sites or websites, a hacker need only to access one of your accounts to gain control of all of them. Ideally, establish a recovery email address for password resets that you don’t use for any other purpose – don’t set it as your username and don’t post it anywhere on the web.

Using the same email prefix across multiple accounts (for example, nerdchick@gmail.com,nerdchick@hotmail.com, and nerdchick@sbcglobal.net), makes it easy for those with malicious intent to locate and hack into additional pieces of your digital profile. This is particularly dangerous if you use the same prefix as your username to login to financial institutions or as your “handle” on social networking sites.

Set up login notifications and two-factor authentication when it’s available. Google and Facebook both offer it. Basically, whenever your account is accessed from a new computer or mobile device, you have to enter a second code. This code is typically texted to your phone. While it can be a pain in the rear when you’re trying to login from a new device, this step would have given Mr. Honan an early warning that someone was attempting to access his account. It also would have stopped the perpetrator from using his Gmail to access additional logins.

Review your security questions to make sure that the information isn’t easily found through your online presence. For example, the name of your dog isn’t hard to ascertain if you post about her on Facebook or Twitter. Your high school mascot, family names, and the street you grew up on are just as easy to glean.

Consider using a Google Voice Number when online accounts require you to provide a phone number. The hacker who attacked Mr. Honan used his phone number as one piece of authenticating information to get his Amazon account password reset.

While convenient, storing your credit card number online with retailers makes your bank account more vulnerable. The same goes for using your smartphone for online banking, logging into Facebook or Twitter, or anything else tied to your personal information. While just about every smartphone owner stores logins and personal info on it, make sure you set a password on the device so if it’s lost or stolen you aren’t compromising your data and accounts.

[Source: Tech | Business to Community, Aug-21-12]