Showing posts with label news. Show all posts
Showing posts with label news. Show all posts
Amazon: Jeff Bezos was hacked on WhatsApp by Saudi Arabia Prince

Amazon: Jeff Bezos was hacked on WhatsApp by Saudi Arabia Prince

Jeff Bezos, Amazon CEO and the world's richest man, had his WhatsApp account hacked. According to the British newspaper The Guardian, the Prince of Saudi Arabia used a stolen video file, transmitted during a conversation with the billionaire, to access the account. Many personal and professional data would have been stolen.



This is a totally incredible story. Jeff Bezos, CEO of Amazon and the world's richest man with $ 115 billion in his pocket, had his WhatsApp account hacked. And not by anyone. As the Guardian newspaper reported in a punched investigation, Prince of Saudi Arabia Mohammend Ben Salmane is believed to be directly involved in the operation.

The case dates from May 2018. Jeff Bezos and the Prince of Saudi Arabia converse amicably on the instant messaging application. The two men met a few weeks earlier on his majesty's trip to Los Angeles. During their exchanges, the prince sends a video to Jeff Bezos in which was hidden malware. According to The Guardian, computer experts hired by the businessman were able to trace the hacking trail, to Mohammed Ben Salmane's laptop.

When the video file was opened, the malware was able to get onto Jeff Bezos' laptop and steal a large amount of personal and professional data, without going into the exact details. What happened to this data and how was it used? It remains a mystery, for the moment.

Murder, sex and blackmail

Jeff Bezos does not suspect that his cell phone has been hacked. Meanwhile, a pro-Trump newspaper, the National Enquirer, posts intimate texts from Amazon boss and his lover. What will earn him a very expensive divorce with his wife Mckenzie Bezos. The billionaire then decides to launch an investigation to understand how the tabloid could end up in possession of such information. This is how Saudi piracy was discovered.

It’s at this very moment that the affair takes on the appearance of spy films. In summary, the National Enquirer, President Donald Trump and Saudi Arabia were collaborating in a vast blackmail operation targeting the CEO of Amazon. It is common knowledge that Donald Trump and his son have had excellent relationships with the Saudi royal family, remnants of their careers in international trade. So why Jeff Bezos in particular? Because the business man is none other than the owner of The Washington Post newspaper.

A prestigious newspaper for which worked Adnan Khashoggi, journalist brutally murdered in obscure circumstances in Saudi Arabia. Following the murder, the Post's editors mobilized to uncover the truth and repeatedly highlighted the alleged Saudi government responsibility for the assassination.

In fact, for Andrew Miller, expert on Middle East issues and national security adviser to the Obama administration, this hacking was only intended to put pressure on Jeff Bezos, so that he ordered journalists to the Washington Post to stop their investigation. After the Guardian article appeared, Saudi Arabia responded quickly.

"Recent media reports suggesting that the Kingdom is behind a hacking of Mr. Jeff Bezos' phone are preposterous. We request an investigation into these allegations so that we can know all the facts, "said the Saudi Embassy in the United States on its official Twitter account.





Source : The Guardian








4 things are very important to do and activate when buying a new phone

When you buy a new phone, the vast majority of what it does is add its account to Google and install the applications it needs, while you have to do many important things that are necessary and will need them greatly when you use your phone, the following 4 things are very important to do When buying a new phone.

4 things are very important to do and activate when buying a new phone

1. Activate Find My device

Although this feature is very important and you will not know its value unless you lose your phone, but it is overlooked by many, find my device is the most important first step you must do when you buy a new phone to be retrieved in case stolen or lost somewhere, The method of activation is very easy, all you have to do is go to the settings and find Find my device, you click on it and activate it, so you did Find my device and you should always keep GPS open, when your phone is stolen, you go to Chrome browser and login To the Find my Device site, and then place your phone exactly or last place before the device is turned off G.

4 things are very important to do and activate when buying a new phone


2- Activating the developers option
The developers option gives you many options that may benefit you greatly and make your use of your phone smooth, fast and professional. Of course, the option does not come by default. Instead, you have to do this manually, by going to Settings, then accessing System, and then go to About phone. Build number and click on it with successive presses, and so when you exit System again you will find the Developer OPtions option visible and you can access it and take advantage of everything it offers you.



4 things are very important to do and activate when buying a new phone


 3. Turn on the Google Assistant service
Google Assistant or Google Assistant is one of the services that make your use of your phone much easier. You can do many long tasks just by your voice, just by saying "Hi Google" or "Google OK," and then say what you want in English, for example Navigate to home to give you a map of your home, or take a selfie to go directly to the camera application and the front camera to capture Sylvie, and many more tasks you can do more easily and faster with Google Assistant, to activate the service all you have to do is access to the Google application and pressing the three points In the side, then Settings, then Voice, and finally Voice Match, so you can activate the voice plugin for Google.




4. Disable Bloatware applications
If you do not know what Bloatware applications are, which are installed by default on the device that comes with it without you, there are many of these applications that do not play any role other than filling the phone storage, especially if you use a phone from Samsung, Huawei, Obo ... Each of these companies have interfaces that you add to the Android system, which contains many useless applications, so the best thing you can do is disable it as if you were deleting any normal application by going to the settings and selecting the applications you need and not using them and simply disabling them.






These were some of the things that are very important to do when you buy a new phone, or even if you already have a phone and have not yet activated these options



















Windows 10 19H1: Can not Install May Update When a USB Key Is Plugged

Windows 10 19H1: Can not Install May Update When a USB Key Is Plugged

"This computer can not be updated." Many users may encounter this error message when trying to install Windows 10 19H1, the operating system update expected for the month of May 2019. In a bulletin published on a support page, Microsoft explains that this message could be displayed on many computers due to a bug. The only solution is to unplug all external storage devices.
 Windows 10 USB Key
 With a little delay, the 19H1 update of Windows 10 will finally begin to be deployed in May. But before, Microsoft warns users of the existence of a bug that could prevent them from installing the new version of the OS. Many members of the Insiders program have complained about this problem when installing a system preview. They ended up with the message "This computer can not be updated".
 

Windows 10: the May 2019 update has a problem with USB sticks


External storage devices are causing this problem. Microsoft explains that for most computers, users will need to remove all USB keys, SD card or external hard drives before being able to install the update. And for good reason, a bug in the assignment of letters to the discs forces the firm to display this error message in case a computer is at risk.

Are concerned, the computers trying to pass from one of the updates of 2018 (April or October) to the update Windows 10 19H1 of May 2019. The problem that arises exactly is the following: suppose that the partition main door letter C and a USB key letter D. These assignments could be reversed during the update due to a bug.

To avoid this situation, Microsoft has decided to display an error message when the computer is at risk. In case you encounter this problem, you should unplug the external supports. But the Redmond firm says that internal hard drives could also cause the same concern. A patch is under preparation and will be deployed in a future update.

A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

Sometimes, when we do something, we have to stop suddenly and turn off the computer for more important reasons, but this is really annoying because when you restart the machine, you have to restart all the programs you use, Again, if you're working on editing a video and I wanted to extract it and found that it would take a long time and then I had to turn off the device, then when you reboot you will have to re-wait for that long time from the beginning, and this is what we all hate, so in the post Today I will try to give you a simple technique that will enable you to keep a For running programs even though the computer is turned off permanently, so you will be able to resume work when you reboot without any problems, so continue with us.

 A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

 1. Turn immediately to the command wave

 A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

 2. Type the shutdown / h command

A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

3. Press enter and this will turn off the computer and you will notice that when you reboot all the programs you left are running and still are the same.

 
















What is the most demanding area in the job market today and get paid courses in this field for free

In the past years, many people believed that the Internet was only a passing technological technology and it was never possible to predict the success of the latter. Simply, the Internet became a second world in which we live next to the real world, where everything has become Digital Even money and currencies are becoming more digital than they are digital. This is the case with some of the areas we recognize today, such as artificial intelligence, huge data and many other areas that will in the future become one of the most successful fields in the job market.

What is the most demanding area in the job market today and get paid courses in this field for free

The field of artificial intelligence is one of the scientific developments that has been able to add itself in all fields of various kinds and has also helped in the development of many technological companies and among the known fields Is also a large data area or what is called in English Big Data, which is simply a collection of large databases difficult to be analyzed and processed through the use of tools known and used so a set of modern techniques to address the rules of This data is accurate.
The reason for my participation in this post is not to check the fields and know how it works, but to share the best paid courses only, which you can download for free and without payment of any amount of money.




This extension is important because it blocks websites that can steal your information

When you browse the Internet security will always come in our priority and much more especially in our day where computer attacks are everywhere. In this sense, we need to carefully check the type of sites we visit and even more so when we leave personal information. To increase your protection there is an add-on that can help us in this area, providing security information about the sites before we get into them.

This extension is important because it blocks websites that can steal your information

That's why we offer you today Emsisoft Browser Secutiry, an extension of the Google Chrome browser that is able to protect us from sites that are potentially dangerous to us.

 This extension is important because it blocks websites that can steal your information

 Phishing attacks and password theft are rampant at this time, as hackers are still creating solutions that allow them to be impenetrable in stealing passwords and private data. This is why it is very important to know what websites we visit and where we add personal information, since it is very common to be victims of information theft under these circumstances. In this sense, Emsisoft Browser Security tells us if the sites we intend to visit are safe.

This extension is important because it blocks websites that can steal your information

Emsisoft Browser Secutiry is able to tell us if the sites we plan to open are really safe. This is done by reviewing a strong database. If you match any dangerous site, the extension will immediately notify you, indicating that the site is blocked for security reasons.
Add Link: Emsisoft Browser Security






Top 3 cpa sites to start a free online business + a very successful strategy

CPA is one of the most powerful areas of profitability on the Internet, as many freelancers rely on this area in the profit of hundreds, if not transfer thousands of dollars per month without any trouble and without any experience, as it depends only on your ability to persuade people to complete the tasks Such as registering on a site, downloading an application and other things that earn a profit rate for each individual you bring to complete the task. You can simply adopt the foreign Facebook packages (especially the American) interested in a particular niche, preferably this niche is far from the field of informatics, And movies, for example, and then you search for a show from a m Cpa texts corresponding to the same idea of the group, for example a presentation by people to enter their mail to get a book about the secrets of cooking, or for example download an application that can follow the new sports or movies, and then short link to this presentation using bit.ly and posted on the group , Since Facebook automatically monitors and deletes a cpa link, so it should be abbreviated first using a non-profit link service.

Top 3 cpa sites to start a free online business + a very successful strategy
At this point, you will be able to achieve at least a few dozen dollars a month in the worst case, because many people will complete the task, especially as the foreign teams know a great interaction. As for the best cpa platforms to start the task, we chose 3 sites we have adopted many criteria in the selection For example, because there are other platforms giant and more professional, such as maxbounty, but it is very difficult to accept them if they are not from America or Europe.
 cpalead

 2 - crack revenue platform

crakrevenue
 
adworkmedia

You can now choose one of these platforms and start working from this moment. In my view, adworkmedia remains the best option due to the many characteristics that distinguish it from other platforms, such as simplicity of interface and ease of use, in addition to the multiplicity of offers for which the responsible people pay very respectable sums. Do not waste time and start a new adventure in the field of cpa on one of these platforms.



Through this designer you can now download the new icons for Office and Windows 10 before everyone else

At the end of 2018 Microsoft announced the arrival of a new icon pack to Office, bringing modernity and freshness to their applications. Which is the first major change in the icons of the program since 2013, we also know that the company plans to change Windows 10 icons to some formats of the same style.

this designer you can now download the new icons for Office and Windows 10 before everyone else

However, these changes in icons have not yet arrived, and we do not know for sure when they will arrive. In the meantime, if you like these icons and want to use them on your computer, you can take advantage of the work of one of the designers who recreated them for us without waiting too long.
As the designer explains in Reddit, through this video released by Microsoft in which the graphics were shown with the new icons, he re-created many of them using Photoshop, and now presents it in a package in the format of ICO and PNG.
You can download the icons from the link below in Google Drive. Currently, the package contains only 16 icons, but plans to add more in the future, so you can always check the link frequently to check for updates: Microsoft 2019 Icons






The best site to design a professional video cover for your Facebook page in seconds

All Facebook users are always looking for a cover for their personal page because it reflects your page, which is the first thing anyone who visits your page on Facebook has recently launched a new feature that is the possibility of placing a video in the cover of any page on Facebook. For this reason it is important that the image creates the best possible impression, and moves the object that aims to deliver it exactly.

The best site to design a professional video cover for your Facebook page in seconds

If you want to make a professional video of your page on Facebook and you do not have any knowledge of the design, you are here in the right place. Today we will know how to create a video for your page or your Facebook account based on this website that allows you to design professional video For Facebook as well as writing ability

The best site to design a professional video cover for your Facebook page in seconds

 All you have to do is enter the site and go down as shown in the picture and then you will be surprised by the presence of Facebook ready for this site, so you can easily modify the cover and change the words in the cover you chose and write the texts you want to appear In the cover of your page and with the knowledge that all of these images are available for use and do not have the copyright and thus you become a Free Facebook cover

 The best site to design a professional video cover for your Facebook page in seconds

 A great site for designing your personal cover photo easily. You can create a cover for your Facebook page for free and online with great templates and effects according to your choice or the content of your page.







New site presents you some faces of people who will not believe who they are! You will feel scared



A few months ago, NVIDIA published a study in which they trained artificial intelligence to be able to generate faces in a random way, creating them from nowhere that did not exist. This amazing use of artificial intelligence is now available to everyone through a web page that generates random faces.

New site presents you some faces of people who will not believe who they are! You will feel scared
This site, called This person does not exist, randomly generates a face every time you enter it. Therefore, it depends on NVIDIA's deep learning technology. A year or two ago, this was an affordable company and software, but now you can do it directly on your computer or your mobile just by visiting the site.
Although Ian Goodfellow, a Google engineer who invented GAN, NVIDIA had taught him and led him to generate the results that we have today at hand with a simple click. NVIDIA has improved the structure of image generation in a way that creates more realistic faces. Thanks to this, every time we update the page on the site, the new faces are created instantly and with realistic results to the point that they are afraid.


Best 5 programming languages to learn the machine

The increasing demand for automated learning experts has increased over the last few years. Curiosity is to know programming languages that can be used in automated learning. But before discussing the best programming languages for automated learning, you should have brief information on the concept of automated learning.

 programming languages to learn machine


What is automated learning?

In computer science, machine learning is part of the artificial intelligence that provides your computer with the ability to learn how to improve its performance with data, without being exclusively programmed. In today's world of technology, automated learning is one of the fastest growing concepts, with most major technology companies investing heavily in improving their products.

In 1959, Arthur Samuel used the word machine learning for the first time to explore the construction of algorithms that can be used to predict data by overcoming rigid programming instructions accurately to make predictions and decisions based on data. Automated learning is used today in a number of computing operations where the use of explicit programming and algorithm design is not possible such as disclosure of data breaches by insiders or hackers on the network, etc.


The best programming languages for automated learning
In order to understand the process of automated learning and work on it, you will have to learn some programming languages. Here are some of the best programming languages used for automated learning.

Python
Python has become a popular programming language because it can be used flexibly for different purposes. For automated learning, it contains specific libraries such as numpy and scipy which enable your computer to learn linear algebra and kernel methods of automated learning. While working on automated learning algorithms, this language is used extensively since its installation is relatively easy. It is the best programming language for beginners.

R language
This programming language was developed in Bell Labs as a modern version of S. In order to provide flexibility in the production of statistical models, R is combined with the lexical range. Many GNU packages available in R language make it a truly powerful language for automated learning.

One can use R language to create useful algorithms and easy statistical visualization of those algorithms using R Studio. Industry has recently recognized the importance of R language even if it has been common among academic researchers for a long time.

Lisp
Lisp is the best language for programmers who want to learn about the history and facts about the character and practices used in programming just for fun. Some consider it a supernatural tool for programs, while some believe that no language for automated learning has been devised like this.

In fact, artificial intelligence was also used before the invention of programming languages such as Scala, Python, Haskell, etc. It is used more by compilers. Compiles garbage as it contains an automatic memory manager.


Prolog language
It is one of the oldest languages developed for artificial intelligence programming. It is another basic language like Lisp that is used in the artificial intelligence of computers. Developers working on flexible frameworks work with the mechanism of this language. This target language and rule contains rules and facts to dictate the language of encryption for artificial intelligence. It supports some basic mechanisms such as data structuring, automatic regression, pattern matching, etc., essential for artificial intelligence programming.

While representing tree-based data structures, this programming language contains an internal list to handle basic issues. It can be used efficiently to program artificial intelligence programs as quickly as units are fired frequently. Allows you to run the program at the same time as you create the database.

JavaScript
Most new and experienced web developers are using JavaScript today. For a long time, JavaScript used to be limited to web development only but now it is everywhere. Tensorflow.js, an open source library for the Google framework for automated learning is built on the top of JavaScript. Javascript is located in the Python and Java class for its extensive applications.
















Computer science and computer engineering


What is the difference between computer science and computer engineering? We must all think about this at least once in our lives. If you are still not answered or have no clear idea, continue reading to find more details. The ultimate goal for both areas is to make advances in technology and make life easier, both through software upgrades or hardware innovations. So, first of all, let's look at the definitions of either.
 Computer science,computer engineering

Computer Engineering or Computer Engineering (CE) is a combination of electrical engineering and computer science. It deals primarily with computing in all forms, from microprocessors to embedded computing devices to laptop and desktop systems to supercomputers.

On the other hand, Computer Science or Computer Science (CS) is a study of how data is processed, stored, and reported by computers.

In simple terms, CE deals with computers while CS deals with software / software in computers. Now that we have laid out the basics, let us look at how they differ at the university / college level from the perspective of career choices.

Based on what we choose as our area of study, whether CE or CS; both have shared courses and different courses / options at the university. All courses begin with the basics of programming. For example, everyone passes C / C ++ / JAVA / HTML / DBMS basics. Then, based on their field, they branch out to topics that deal primarily with their domain directly.

Computer engineers begin by learning more deeply and more specifically about computer architecture, mainly the CPU and other components involved. They also take half the classes that electrical engineers take, such as introduction to electronics, ring analysis, digital electronics, embedded systems and many more.

On the other hand, computer scientists focus mainly on the design and analysis of algorithms, programming and mathematics to solve some of the famous algorithms and improve the efficiency of their symbols while reducing the time taken to solve a problem.

But eventually CE and CS go hand-in-hand to solve everyday problems effectively and efficiently.


6 consumer devices used in your home can hacker penetrate

Smartphones, home automation systems and virtual personal assistants can make life easier for all of us, but everything has its price and challenges. The biggest concerns in this area are piracy, yes piracy and hacking are the biggest threat to devices and the new life system based on Internet-related technology devices permanent.

6 consumer devices used in your home can hacker penetrate

Breakthrough now not only threatens computers and smart phones, but a set of technologies and devices that you use in your home can be vulnerable to penetration. In this post we will identify the six consumer devices used in your home can hacker penetrate.


1. Refrigerators

 Refrigerators

 Home refrigerators are simply cooled food and drinks, but smart refrigerators have been developed and incorporated into tablet PCs to allow you to view calendar, play music, watch videos and even make purchases online. Future smart refrigerators can also identify the food and drinks inside, and automatically alert you to the need to buy missing items. These functions can make everyday life a little easier, but you have to be very careful with such devices.

A digital security company discovered that two weeks ago, between 23 December 2013 and 6 January 2014, cybercriminals hacked 100,000 smart home appliances, including refrigerators. They even used the Internet connection of these refrigerators to send malicious messages to others!

2. LEDs


 LEDs

 Hackers can connect to various devices connected to the Internet and this is something known. But smart lights are particularly vulnerable to piracy, as researchers from Israel and Canada discovered last year. Hackers may be able to remotely control these bulbs remotely, such as turning them on or off, and changing the light level.

3. Printers


 Printers

 Just like computers and smart phones, some printers come with Wi-Fi connectivity, which makes them a victim of hackers. After hackers can break through the printer, they can see what is being printed on the device, and the computer with which the printer is connected may be attacked. In February 2017, a hacker wrote automated text to manage more than 160,000 printers connected to the Internet without a firewall. Although he can print threatening messages or steal confidential data from these printers, he only prints the messages shown in the following picture:



4. Games



Some toy companies, which produce smart dolls equipped with sensors that transmit all kinds of data, from sound recordings to all vital indicators of the child. Earlier this year, pirates had access to 800,000 client accounts using such games, which could threaten the confidentiality of sound records stored in their system.

5. GPS device


GPS device

Regardless of whether is an independent device or built-in car, GPS can greatly reduce the time of the person when traveling. But hackers can penetrate the GPS on the phone or in the car to track the owner's location, send a person to a dangerous place or even cause an accident. Using a GPS simulator, hackers can also rig coordinates to change location data.

6. Cars


jeep car

In 2015, two security researchers were able to penetrate and control the Jeep, while Charlie Miller and Chris Falasik managed to control the radio, windshield wipers and air conditioning in the car. Furthermore, the researchers also managed to change the car's speed, brake and track movement with the GPS.













 



Sunway Taihulight: Fastest computer in the world that entered the Guinness World Records Book

The China-US dispute over the technology market has been drastically undermined in many markets and sectors, and the Asian nation has already demonstrated its strength in many technological fields against a competitor on the other side of the world - the United States.

Fastest computer in the world

China has overtaken the United States in the field of supercomputers or supercomputers, which are large devices that process and analyze large amounts of data and mathematical equations, and accomplish in a second what other computers need to accomplish in millions of years.

 
 From 2017, China has the majority of most supercomputers on the list of the world's top 500 computers. And
China now has 202 supernatural computers, compared to 143 for the United States, while Japan has 35, Germany 20, France 18, and 15 United Kingdom.


 Guiness World Records

 The Chinese computer "sunway taihulight" leads the list of the fastest supercomputers in the world and is located in the National Center for computers in the city of Wuxi, and another computer from the same country ranked second. Between the fastest US computer ranked fifth after the computer of Japan and Switzerland.



 What does this mean ?
 
This superiority and rapid transformation of China shows that the Asian country continues to invest heavily in supercomputers, capable of working efficiently in various scientific fields, from astronomy to the military, to weather forecasting. Most importantly, these computers are Chinese-made, which confirms that China is trying to rely on itself in the manufacture of supercomputers and the dependence of dependence on the United States of America.















Through this apps you knows who used your phone in your absence

No doubt we do not like anyone using our phones without taking permission from us even when you have a password for your phone. There are those who snoop and try to access the phone, so today I will give you a set of applications that will enable you to know who used your phone when you were gone.

eyes looking,spy eyes

First application: Lockwatch - Thief Catcher

This is the best application in today's list as it contains many great features as well as it exceeded a huge number of downloads in the store Google Play, all you have to download the application then you set a set of settings such as the number of attempts after skipping the application filming of the user The phone also identifies your email address


 

 Where the application will send the images taken, and will send you the geographical location that happened, and of course this is a very nice feature in case God forbid if your phone is stolen
 
Second application: CrookCatcher


This application is very similar to the last application, but it is unique in that it tells you the last time someone tried to access your phone. As for its configuration, all you have to do is write the email and the application will run automatically.


 

















Seach Engine Optimization: for whom, why and how?

Seach Engine Optimization: for whom, why and how?

référencement naturel        
Natural referencing? You have probably heard it already. But although this term is quite common, many people still do not know what it's all about. Yet, SEO is essential today. It is therefore wise to see the reasons to optimize its site for SEO, and especially how it works.


Why optimize your site for SEO?


Simply to optimize your visibility on the internet. Indeed, according to a study:

    80% of people have a computer
    For youth, this rate increases by 95%
    Google and the most visited

85% of Internet users search for more information on the internet before embarking on the purchase of an object.

But that's not all. It has also been noted that appearing on the first page of Google is essential because 87% of people will not visit the second page of Google.

Finally, optimize your site for SEO, because all your competitors already do. Thus, to continue to increase your visibility on the web, you have to be fairly competitive on the internet.



SEO is for whom?


In short, natural referencing is for anything that wants to improve its visibility on the internet.

Whether you are a company, an entity, an association, an organization or an individual, natural referencing concerns you as soon as you have one or more sites and want to generate your traffic.

Using SEO is simply a guarantee that allows you to have a site visible on the internet and will be visited for a large number of people.



How does it work?


At first glance, note that Google is a robot, and of course, its behavior is predictable. In addition, all professionals know that to position themselves on the first page of search results, you have to follow certain rules.

To optimize the site, you must first choose the keywords so that they are in harmony with your theme. Only, avoid exaggerating. 3 to 4 keywords are enough for a text of 500 words.

On the other hand, the content must be unique, non-duplicated, convincing and relevant. For sentences, use short, simple sentences to make the text easier to understand.

And finally, we must not forget the tags and meta description (the summary of the text which has about 160 characters).