HOW TO CREATE A BLOGGER BLOG

In my previous post I wrote on how to create a successful blog, in this post I will be sharing with you on how you can create a blogger blog.
There are several blogging platforms, but going through some of them I came to realize that blogger is one of the best blogging platforms. It is simple to use and doesn’t require any programming knowledge. 
Anyone can follow these simple steps to create a blog:
1. Log on www.blogger.com

2. You will see the blogger homepage, click on “CREATE BLOG” button.

3. You will be taken to “Create account” page, where you will need to input your blogger username and all that…

4. After which you have filled out the required details, tick on “I accept term of service” to sign up and then click on “Continue” to proceed your registration.

5. You will then see the “Name your Blog” page. Fill out the necessary information on the page and click on “Continue” button

6. You will then see the “choose a template” page where you will need to choose your blogger template, select a template that correlate with your blog niche and click on “Continue

7. You will see a confirmation page, confirming that your blog has been created.

8. Click on “start posting” to start blogging.

9. You have successfully created a blog!

That's all...

Feel free to share this post by clicking on the share button at the bottom of this post.
If you have any comment or question relating to this post don’t hesitate to make use of the comment box.

HOW TO CREATE A SUCCESSFUL BLOGGER BLOG AND TIPS

I can vividly remember when I started blogging, I knew nothing about blogging. I used to think blogging is as simple as ABC. Then, all I blogged for was to get money but, not knowing that there is much to blogging.
I have made several mistakes in the past which I wouldn’t want pre-bloggers to make. Either you own a blog or you’re planning to own a blog, it is necessary you read this.
What is a Blog?
A blog is a term derived from two words Web Log. It is a user-generated website where entries are made in journal style. Blogs often provide commentary, or news on a particular subject, such as food, politics, sport, or local news; some function as more personal online dairies. A typical blog combines text, images and links to other blogs, web pages and other media related to its topic.

Examples of Blog
www.freebrowsingnews.blogspot.com
www.freebrowsingnews.mobstac.com
www.tech2inform.blogspot.com 

Blogs can be hosted by dedicated blog hosting services, or they can be run using blog software on regular web hosting services.
Blog platforms
There are various blog platform which include:

  • Wordpress.org
  • Blogger.com
  • TypePad
  • WordPress.com
  • Drupal
  • CustomMade
  • TextPattern
  • LiveJournal
  • B2evolution and others…

The most popular blogging platform right now are WordPress and Blogger.
I would recommend that you blog on blogger, because blogger is absolutely free and provide reliable service. You can start your own blog freely on blogger after which you can then pay for hosting and domain (if you wish…
Some blogging terms
There are terms you need to know, some of them are listed below:

  • Title: this is the main title or headline of your blog post.
  • Blog post: these are the individual articles published on your blog.
  • Body: this is the main content of your post.
  • Post date: this is the exact time your post was published on your blog.
  • Permalink: these are the url links of your articles
  • Comments: these are the comments added by the readers.  

Reason NOT to blog

1. Money: when I started bloging, I blogged all because of money. After some years I later on realized that it is absolutely wrong of me to blog for money. I was fed up because I couldn’t make any money. It is wrong to blog for money. If you do, you won’t focus on writing great post, you would rather take it as a job which is very wrong. It is not a doubt that you can make your full term living online blogging, but that should be your aim, Blog because you have passion for it.

2. Traffic: some people blog to get traffic to promote their  products and services. It is very wrong, you shouldn’t blog for traffic. If you blog for traffic, you will only work more traffic not your content and when the traffic comes, they would browse through your blog and go away. But the most important thing is to change your visitors to your readers.

3. Fame:  some people blog for fame. If you’re blogging for fame, it is better you don’t waste your time coz it is absolute very wrong.

All these three things are what you can get from blogging, if you’re passionate about blogging. You can earn full term income off your blog, get good traffic and as well be popular.

Don’t blog for money, fame or traffic; rather blog because you have passion for it.

Things you need to know about blogging
1. Niche: some people blog without even knowing what’s called “Niche”. It is important that you choose a Niche before blogging. Look for something you have passion for and then write about it. You can choose technology Niche just like me, health, News, gist and so on.

2. Identify your Ideal Reader: after you’ve found your Niche, it is also important that you know people who are to be reading your posts (articles). For instance, I’m on technology Niche, and I write about blog tips, wapka tricks, computer and mobile phone secret info, computer and mobile phone tutorials and all that… my ideal readers are pre-bloggers, youths and students. If you want to write about the latest gist in campus or a particular course you offer in school, that’s cool! Your ideal readers are students. Or you may even decide to write on sport, that’s cool also! Your ideal readers are sport lovers. Tailor your writing to your Readers, you will definitely find readers coming to your blog continuously.

3. Add value: when writing for your blog always make sure that it add value to your readers’ live. The sure way to get great quality to your site is by adding value.

4. Be honest: when writing on your blog, make sure your articles are real and genuine rather than posting fantasy articles.

5. Time: when starting a blog, there is one thing you should know about blogging, Blogging takes time. Just like building your own company, you keep developing the company before it gains it strength. People like Jide Ogunsanga of Ogbongeblog started just like everyone does but never quitted till he gained his stand on Blogosphere. I have spent several hours at front of my computer learning about blogging and as well developing my blog. It takes a lot of time.

6. When to update a blog: it is not compulsory you update your blog every time, but you can make it daily or weekly. Just like me, I update my blog at least four times a week. You’ll determine when to update your blog.

7. Keep your post simple: one of the easiest ways to make your readers keep coming is by keeping your post simple. Write articles that are easy to comprehend.

6. Picture: when writing for your blog, it is advisable to update your post with pictures for quick understanding.

7. Video: if your blog is a tutorial blog, it would be nice embedding your post with video for quick understanding. People find it easier watching video than reading text.

Recommendation:
I would really recommend that you read on how to create a blogger blog.
That’s all!
Hope it helps…

Feel free to share this post by clicking on the share button at the bottom of this post.
If you have any comment or question relating to this post don’t hesitate to make use of the comment box.

Solution to Protect Your Blog From Spam Harvesters

Are you tired of getting a ton of spam everyday? I am too but unfortunately there is no solution to eliminate it 100% but there are smart ways to avoid and reduce spam. The method I’m going to talk about is aimed at bloggers and how they can easily implement a preventative measure to reduce the amount and chances of spam being sent to them.
With the popularity and ease of setting up a blog, the number of people blogging increases daily. This is great but one main problem is most of these people aren’t usually educated in proper techniques such as spam prevention.
Did you know that putting your email address anywhere on your blog or website is an open invitation for new spam? Yes, you heard me right. Little do you know that trying to be nice and provide a method for your readers to contact you only causes you more harm than good.
Let me give you an example. The usual way to include your email address on your blog is to use the mailto: tag. This is the case if you use Blogger and any other blogging platform. Unfortunately for you, spam harvesters use “web spiders” to troll the internet and look for email address links on websites and blogs. When they come across your site they will look at the html code and grab your address.

Prevent Spam Harvesters From Getting Your Email Address

The best way to beat spam bots as well as giving your readers a way to contact you is to use a contact submission form. That way your email address is never displayed and a script handles the entire mailing process. This is a great option if you use WordPress but for people using Blogger, it’s not an option.
You don’t know how many Blogger blogs I’ve come across and just rolled my eyes. There it is…their email address listed right on their site. Look out spam, here it comes! So my quick solution to protect all blogs (especially Blogger users) from spam bots is to replace your email address with an image.
There are several sites out there that can create free email icon images for you but I like using this email icon generator site because it provides several cool options. My favorite is the branded email image based on your email host provider.
Here are some examples of email images I created in a few seconds:
mac.png
yahoo.png
aol.png
email2.png
emailaddress.png
mac.png
email3.png
As you can see, it supports all the popular email domain addresses as well as an option to create your own custom email address. It even hosts the image for you if you don’t want to copy and upload it to your own server. I recommend uploading it to your Blogger site so you’ve always got it available regardless.
Make sure after you use these images you do NOT turn them into a mailto link. If your email address is anywhere in the html code, spam harvesters will find it. I had a friend that I shared this trick with and he replaced his email address with this image but didn’t remove the mailto link! He might as well of not even used the image.

HAVE ANY QUESTION FEEL FREE TO COMMENT BELOW OR CONTACT US AT THE E-MAIL ADDRESS ABOVE.

How To Convert Online Web Pages Into PDF Files

Have you ever think of converting a web page into a pdf format to read later on your mobile or pc when you are less busy, if you don’t know these let me tell you that it is possible to do that. If you see any post you like on this Blog and you don’t have enough time to read it, You can convert the specific post/page/article to read later including images, links & others.
How To Convert Web Post/Page To PDF Online
- Make sure you are on the post/page where you want to convert and copy the direct url/link of the post.
- Then Go to web2pdfconvert.com

- Then Insert the Url/Link and click on convert.
- Wait for some minutes to convert the webpage depending on the size of the page.
- Then Click on Download PDF.That’s All.
- If You have anything to add to this post, you can make use of the comment form.

WHAT IS PHISHING?

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used.



Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.



Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.

Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.

Techniques Behind A Phishing Attack

1. Link Manipulation

Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL

www.micosoft.com

www.mircosoft.com

www.verify-microsoft.com

instead of www.microsoft.com



2. Filter Evasion

Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.


How does a phishing attack/scam look like?

As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like
Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.

To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.

These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.


How To Identify A Fraudulent E-mail?

Here are a few phrases to look for if you think an e-mail message is a phishing scam.

“Verify your account.”

Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.

“If you don’t respond within 48 hours, your account will be closed.”

These messages convey a sense of urgency so that you’ll respond immediately without thinking.

“Dear Valued Customer.”

Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.

“Click the link below to gain access to your account.”

HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.


So The Bottom Line To Defend From Phishing Attack Is

1. Never assume that an email is valid based on the sender’s email address.

2. A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal
    email.

3. An email from trusted organization will never contain attachments or software.

4. Clicking on a link in an email is the most insecure way to get to your account

HOW TO CRACK WINDOWS PASSWORD

Warning: This is for Educational purpose only. Please, if you are viewing this do not use it for illegal purpose and if you do Best4hack won't be held responsible for the consequences. So be warned!!
 
In a previous post on windows hacking, I already gave you a detailed explanation of how to bypass windows passwords with kon boot. I’m so sure a lot of you were not pleased with that because you don’t just want to bypass the victim’s login password but you also want to know it so you can just log in anytime without going through the long bypass process.
Ophcrack is an offline password cracker meaning you can use it without a connection to the internet unlike some other password crackers. It performs hybrid attacks where it uses brute force when needed or otherwise it uses dictionary attack.
Brute force is a type of attack where all possible combinations from a-z,A-Z,0-9 are tried by the brute forcing tool to achieve a password crack.
Dictionary attack is a type of brute force attack that is based on dictionary words. It tries all the words in the dictionary so if your password is a dictionary word, it is very vulnerable. Some software developers have designed some dictionary attack tools with function of a specifying a particular dictionary. For example, where I know there a lot of Naruto freaks, I may just use a Naruto dictionary attack to try to crack password of one of them. This will simply try all the characters in Naruto to see which character is used as password or Naruto term.
Now follow these steps to crack the password:
Step1:  Download Ophcrack from http://ophcrack.sourceforge.net , you can just select the version/edition of windows you want to attack. It’s totally free, no payment required.
Step2: Install Ophcrack on an empty Cd/dvd. You can also install ophcrack on your pen drive (flash drive) by using Unetbootin.
Step3: Insert your Cd or pen drive into the victim’s PC and restart it.
Step4: Just before the windows come up, go to the boot priority to select CD or USB device, depending on where you have installed it.
Note: To enter boot priority of dell laptops, press F12, on HP/Compaq press F9. For other models, you can make research about that.
Step5: Now once you’ve selected that, Ophcrack displays. You can just relax while it performs the password cracking. It may take a while so you have to be patient. As the real computer experts are always patient with it because they know the work it’s going through.
Now a table displays showing the hash. This is because our entire passwords are converted to hash and stored in SAM (system account manager). You can locate your SAM by following this path C:\windows\system32\config
So we have the LM hash meaning the LAN manager hash. Also you we have LMNT password.
The password is cracked in the table and displays a LM password and also NT password. The LM password is not case sensitive so you may get uppercase displayed on LM password column which may not be correct. The NT password column gives you the exact Case used for the password. Now you have seen the “NT password” and the crack is successful. 
 
Countermeasure
To prevent this kind of attack, you can simply implement physical security. This is when you monitor your computer and make sure it is not left alone where an attacker can try this attack.
You can also increase your password security by making your password 14 characters or more containing uppercase characters (A-Z), lower case characters(a-z), digits (0-9), symbols (&,^,$,|,~).
An example password is: bird?Bird>yes|34gle>beTter
When I tried using the tool for my 22 character password with all the other features as the one above, it produced no result. So Ophcrack is too dumb to break my security.

HOW TO INSTALL A LIVE OS ON YOUR USB

 Many of us would not always want to install our live operating systems like Backtrack, Backbox, Matriux krypton or even software like our Ophcrack for cracking passwords on a CD/DVD because it is not portable enough. I've always used my own USB drives and it is easier that way.
There are two tools I alternate in installing a live operating system on my pen drive. They are:
- Unetbootin       Download
- Linux-live USB creator    Download
Unetbootin
Unetbootin is popular and widely used software for installing live operating system. It is often used by a lot of programmers and this is one good reason why backtrack5 comes with it. You can also have Unetbootin just by clicking on the download link above for your windows. In this software, you can download the file you want to install directly from the internet or you can just select an ISO image stored on your PC/MAC.
Linux-live USB creator
Linux live USB creator often called "lili" is very good and an interesting software for installing live operating systems on a USB device.  It works just fine and it is user friendly. I'm very sure you will love it.
Follow these steps in installing it,
 And now your lili is installed, the settings are very easy, just go through it. This is what it looks like when installed.

If you have any problems, you can place a comment in the comment section

HACKERS ACTIVITY

Every Hacker Must Read This.
*Activity Of Real Hackers*
Before we go ahead, lets clear who are hackers? Here, we are highlighting original hackers, who
learn programming themselves, not the intruders peeking in your computer. Well, if you want to become a hacker or looking forward to be one, here are some common habits of hackers that you can adopt to sound like a real one:
 
Snoopiness: Most Common Habit of Hackers. Most important habit hackers have is curiosity and a hunger to know everything. Any case you put up on a hacker, he will justify the entire how, what and who questions. After that you can rely on him to bring up the defects and tell you how to
bring perfection. So, one not only need snoopiness but also be fond of research and learning to become a successful hacker.
 
Hackers; Best In Ethics And Strict In Discipline: What kind of image comes up in mind when you think of a hacker? A computer-geek T-shirt guy with glasses and munching snacks all the time? But this is how media shows you a hacker. If you happen to get in touch with a real-life hacker, you will get to know they are best in ethics and discipline. Corporations have trouble working with hackers, not because they don’t perform, that is they couldn’t get them to work in fixed timings. They would like to work 24 hours a day if left on own.
 
Tranquility Seeking:  Famous Habit Of Hackers, Hackers are not party-people and it’s quite rare to find one whooping around, unless he come-by and give-away the Window’s Source free. Even their entertainment activities, such as puzzles, chess and reading, are a source of tranquility. If ever get to stumble upon some hacker’s party, all you will find is role-playing games and old-time’s dress-ups.
 
Working Independently: A Strict Habit Of Hackers. Hackers prefer to work independently and avoid going along schedules or regulations. They would rather by-pass the rules andget a work done by themselves when it comes to depend upon others working within the limits of bureaucracy.
 
Liberty: Oldest Habit of Hackers. It’s certainly a misconception that hackers are rebellious. Only
condition where they can become revolutionary is when you restrain them being just to their work. A practical example is the story of our hero, Richard stall man, and his free Software foundation. It all
started when Mr. Stallman couldn’t get his computer fixed up due to copyrights. That’s what made him so much dedicated to computing-freedom.
 Hackers’ Self-admiration In Their Craftsmanship:
Inside every hacker there is a young kid haughtily boasting about his creativity, look isn’t it amazing? Hackers aren’t interested in geeky stuff, like writing irksome software which can track a customer’s accounts in a database. They would rather create something innovative and brilliant, for instance program an AI chess-game in Flash, just because it’s interesting. Common Slogan Of Hackers,
‘Looking On Bright Side’ Hackers do yap about how mind- sloths and fool general people are, although they take everybody as exception to general people. Honestly, a true hacker works with
one ambition in mind, they’ll make this world better for all. And they would’ve done it if there was
anything out of ‘machine’ they could work for.

Nokia security codes list & Nokia emergency battery backup code

On the main screen type

*#0000# - Display the software version, the date when the software was built and the phone model. In some cases, the phone model is not the one used by marketing. It is the internal model used inside Nokia. For example, RM-36 is the internal name of Nokia 6680.
















*#06# for checking the IMEI (International Mobile Equipment  Identity). 
            
                                                       

*#7780# reset to factory settings.


 *#67705646# This will clear the LCD display (operator logo).

*#2820# Bluetooth device address.
*#746025625#  Sim clock allowed status.
*#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that support WLAN




*#92702689# - takes you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)

EMERGENCY BATTERY BACKUP(30% INCREASE) 
1 Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger. Nokia instrument comes with a reserve battery. To activate, key is
"*3370#" 

Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery. This reserve will get charged when u charge ur cell next time. sound quality but talk time is reduced by approx. 5% .
#3370# Deactivate Enhanced Full Rate Codec( EFR)

*#3370# - Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.

*#3370* - (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
*#4720# - Half Rate Codec activation.
*#4720* - Half Rate Codec deactivation. The phone will automatically restart

If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345

Press *#3925538# to delete the contents and code of wallet.

Unlock service provider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin#

*#7328748263373738# resets security code.
Default security code is 12345
  1.  #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
  2. #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
  3. #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain  the "p,w" and "+" symbols)
  4. #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)
  5. *#147# (Vodafone) this lets you know who called you last *#1471#  Last call (Only Vodafone)
  6.  *#21# Allows you to check the number that "All Calls" are diverted  To
  7.  *#2640# Displays security code in use
  8.  *#30# Lets you see the private number
  9.  *#43# Allows you to check the "Call Waiting" status of your phone.
  10.  *#61# Allows you to check the number that "On No Reply" calls are diverted to
  11.  *#62# Allows you to check the number that "Divert If Unreachable(no service)" calls are diverted to
  12.  *#67# Allows you to check the number that "On Busy Calls" are diverted to
  13.  *#67705646# Removes operator logo on 3310 & 3330
  14.  *#73# Reset phone timers and game scores
  15.  *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible
  16. *#7760# Manufactures code
  17.  *#7780# Restore factory settings
  18.  *#8110# Software version for the nokia 8110 

Nokia codes

On Nokia mobile phones, you can key in certain codes in standby mode that will display information or make the phone perform certain operations. This is a reference of such codes. Note that not all codes apply to all phone models
  • "*#0000#" - displays firmware version (and date) and phone model
  • "*#06*" - displays IMEI
  • "*3370#" - activates Enhanced Full Rate Codec (EFR); better sound quality for slightly reduced talk time
  • "#3370#" - deactivates Enhanced Full Rate Codec
  • "*#4720#" - activates Half Rate Codec; worse sound quality for better talk time. Same code deactivates it
  • "*#9999#" - displays firmware version if *#0000# doesn't work; only works on some models
  • "*#2640#" - displays phone security code
  • "*#7780#" - restore factory settings
  • "*#92702689#" - displays total duration of phone calls
  • "*#43#" - check the "Call Waiting" status
  • "*#61#" - check the number that "On No Reply" calls are diverted to
  • "*#62#" - check the number that "Divert If Unreachable (no service)" calls are diverted to
  • "*#67#" - check the number that "On Busy Calls" are diverted to
  • "**21*number#" - turn on "All Calls" diverting to the phone number entered
  • "**61*number#" - turn on "No Reply" diverting to the phone number entered
  • "**67*number#" - turn on "On Busy" diverting to the phone number entered

Improve Your Google Rankings in One Easy Step

Having a top rank in Google is the holy grail for anyone who has a website. Organic Google traffic is free advertising and how most bloggers (especially those just starting out) achieve visitors and traffic to their site. It all comes down to a simple numbers game. Essentially, more traffic = more money-making opportunities from your blog. The question is, how do you get ranked higher for my blog posts using Blogger?
Before I tell you how, let me give you a quick lesson is search engine optimization (aka SEO). There are two main components: “off-page” and “on-page” optimization. “Off-page” SEO refers to tactics such as link building. The more websites that point their links to your blog/website, the better. It’s a democratic way of showing Google that your site must be important if lots of people are pointing to it. Even more important with “off-page” inbound links is the actual link text (anchor text) that is used to point to your site.
Here’s my proof. If you search Google for the term “click here” you’ll see that Adobe Reader and Apple’s Quicktime software are in the top 3 results. Why? Because so many other sites are linking to these two sites with “click here” as the anchor text to download their software. That’s the power of “off-page” SEO which you as a blogger can’t do much about besides writing such great unique content that generates lots of links.
So with “on-page” SEO you have complete control over how well you’re optimized for Google. This includes keywords in your post titles, title tags, using header tags (h1, h2) and other tactics. Now the one we’re going to focus on in this article is the blog title tag.
Title tags are one of the most (if not the most) important “on-page” elements to ranking high in Google. Search engines such as Google weigh the importance of each word in the title from left to right. So ideally you want your blog post title all the way to the left and your actual blog name to the right. Below is a perfect example of how this should look. You can also check out our  http://www.freebrowsingnews.blogspot.com/2012/05/free-html-colour-codes-picker-and.html  which is currently using this technique as well.

Blogger templates by default don’t come with search engine optimized (SEO) title tags meaning you aren’t maximizing your blog to rank better in Google. If you take a look at your existing Blogger title you’ll see that blogger displays the blog name first then followed by your post title. They have it backwards so let’s get your blog setup properly.
We’re going to have to make a quick edit to your Blogger template which might intimidate some of you but it’s very small and painless. All I ask you to do first is to backup your template just in case you make a boo boo. That makes it easy to revert back without much headache.

Step #1

In your Blogger dashboard, go to “SETTINGS--------TEMPLATE then “Edit HTML”.

Step #2

In the template code, do a search for this:<data:blog.pageTitle/> <data:blog.pageTitle/><data:blog.pageTitle/><title><data:blog.pageTitle/></title>. It’s usually in the first 5-10 lines of code in your template near the top.

Step #3

Replace that bit of code with the following code: <b:if cond='data:blog.pageType == &quot;index&quot;'>
<title><data:blog.title/></title>
<b:else/>
<title><data:blog.pageName/> | <data:blog.title/></title>
</b:if>

 
<data:blog.title/>
<data:blog.pageName/> | <data:blog.title/>

<data:blog.title/><data:blog.pageName/> | <data:blog.title/>Step #4
Save your template and go back to your blog. Click into any individual post and look at the page title.
All your blogger posts are now much better optimized to rank higher in Google. I’m not going to promise you a night and day difference but you’ve taken a step in the right direction. Now just go post unique high quality content so people searching Google will find your blog first!