![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
5 Simple Steps to Protect your Digital Downloads
A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Okay, so here I was, opening Google, entering the name of the eBook - clicking search, and checking through the first few pages of search results. -> Forward to Page 5 of Google I saw a link that looked like a PDF document. Right click -> open in new window There, in full glory, was the eBook I was searching for! The complete eBook, mind you, not a trial or demo - sitting there for the world to download. And this is a product that sells for over $25 online!! Obviously I'm not going to tell you the name of the eBook because it would not be fair to the reseller. But it just made me realise that one of the reasons digital theft is so prevalent is simply because... its so EASY! Don't get me wrong. I don't condone theft of any kind - digital or otherwise. But would YOU shell out $25 for a product that everyone can 'legally' download off the 5th page of Google? Most people would just shrug their shoulders, hit the save button and thank their lucky stars. Result: The opposite of $ KA-CHING $ for the sellers One of the problems with selling digital products online is that it is so SIMPLE to do. So now everyone and their grandmother wants to do it. But most newbies have no idea that it requires only a few simple steps to ensure a moderate degree of security for your downloads. So here I've outlined the five most BASIC security steps That anyone selling digital products online must take. These will take you only a few minutes to do, and you do not need any special software or programming knowledge. 1. ZIP THAT FILE The biggest problem arises when sellers store their downloads as PDF documents, as in my experience above. Now you should know that Google, Altavista and many other search engines can read and list PDF files. While this may not be a problem for those adding content to their sites in the form of PDF newsletters and reports, it also means that you must never store a product you want to SELL as a PDF file (unless it is in a password- protected folder). It gets worse. Google also converts your PDF files into HTML documents. So ordinary browsers not only have access to your PDF file, but - horror of horrors - they can download your SOURCE FILE as well!! The next logical step is for them to customize it with their own links, compile it and sell it or give it away. Result: The opposite of $ KA-CHING $ for the sellers ...AND the author. A simple way of keeping your files out of the reach of spiders is to upload them as a zip file. Search engines cannot look inside zip files (yet) and list their contents. 2. CREATE AN INDEX.HTML FILE You MUST have an index.html file in EVERY folder. It acts like a curtain that keeps your files away from prying eyes. A folder without an index file is like a house without walls. Everyone can enter and help themselves to the valuables. The 'index.htm' file is the default file that opens when you click on the link here - http://ebizwhiz-publishing.com/ If you don't create an index.htm or index.html file, you'd be allowing everyone to directly access the root directory of the folder where you store your downloads. Here is a folder I uploaded to show you what happens when you DON'T have an index file. http://ebizwhiz-publishing.com/test/ As you can see, all the files stored in it are clearly visible and ready to download. And yes, feel free to help yourself - I won't accuse you of stealing :-) 3. SHOW PEEPING TOMS THE EXIT You can use a simple script to redirect peeping Toms back to your home page. Here's the easiest way to do it using what it called a "meta refresh tag." Add it between the Header tags like this. <head> <META HTTP-EQUIV="refresh" content="0;URL=http://ebizwhiz-publishing.com"> </head> Replace Just replace my URL with your own in the example above and paste it into the head of your document (before your text). You can see how it works by clicking on the test folder here. http://ebizwhiz-publishing.com/redirect/ Now even though you click on the folder URL, you will be sent to my home page. 4. SPIDER-PROOF YOUR DOWNLOAD PAGES To prevent search engine spiders from reading and listing the download pages that link to your eBooks add the tag below in the head of the document. This "Robot" tag tells the spider that this page is not to be spidered or indexed. As a result it should never show up on a search. <head> <META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"> </head> 5. CHANGE YOUR DOWNLOAD LINKS OFTEN To prevent unscrupulous people from posting your download links on forums or message boards, change the folder or file name where you store them from time to time, even if it means having to change the download links in your merchant account. Using these methods will give you a good degree of satisfaction, knowing that you have taken the most basic steps to protect your digital valuables - and at absolutely no cost to you. If you want greater security and more information on plugging the security loopholes in your website, check out a selection of digital download protection tools. Copyright © 2003 Priya ShahPriya Shah is the author of the search engine optimization guide, Number One In Your Niche and edits the newsletters Be a Whiz at eBiz! and The Glutathione Report
MORE RESOURCES: Private Security Guards Have Become a Last Resort for Public Safety The New York Times Netanyahu said to meet Ben Gvir one-on-one after minister left out of security talks The Times of Israel Criminal Gangs Exploit Security Gaps to Infiltrate Airports The Wall Street Journal Couple voices concern after security camera shows men shooting arrows across OKC neighborhood street KFOR Oklahoma City UN Security Council Authorizes Multinational Security Support ... Department of State Statement by National Security Advisor Jake Sullivan on UN ... The White House CAC proposes eliminating data security assessments for some ... International Association of Privacy Professionals ARPA-H awards research contracts to advance health data security ... - American Hospital Association ARPA-H awards research contracts to advance health data security ... American Hospital Association Knoxville woman billed for security system for months after removing it WATE 6 On Your Side Security risk leads to new barriers in downtown Sacramento KCRA Sacramento Three loaded guns caught at Pittsburgh International Airport last week Transportation Security Administration Battery power is crucial for national security. Texas can help The Dallas Morning News UW Security and Fire Safety Report Now Available University of Wyoming News Programme of Work for October 2023 : What's In Blue Security Council Report Employment – Public policy exception – Security deficiencies Massachusetts Lawyers Weekly Metro law enforcement agencies coming together to provide security for the Mississippi State Fair WAPT Jackson To Bolster SCADA Network Security, Know Your Inventory BizTech Magazine NYC college student sentenced to year in Dubai prison after touching airport security guard's arm New York Post FACT SHEET: Impact of a Government Shutdown on the DHS ... Homeland Security Escambia, Santa Rosa County courthouses investigating security ... Pensacola News Journal Chalk: Open-source software security and infrastructure visibility tool Help Net Security Former Worcester police officer, working as security officer, faces ... Worcester Telegram Man shot in struggle with Dallas security guard, police say FOX 4 News Dallas-Fort Worth 2nd Circuit rules JP Morgan's syndicated loan is not a security | ABA ... ABA Banking Journal Security guards thwart armored car holdup outside Country Club ... Chicago Sun-Times Security expert reveals six-figure cost of threats to schools in Wilkes ... WXII12 Winston-Salem Remarks by Ambassador Linda Thomas-Greenfield During a ... United States Mission to the United Nations Netanyahu claims ties with Ben Gvir fine, denies security meeting snub The Times of Israel Pakistan Launches Anti-Polio Vaccine Drive Targeting 44M Children ... U.S. News & World Report IDF said to study security implications of possible Saudi normalization deal The Times of Israel Forest Service completes soil burn security analysis on Smith River ... KOBI-TV NBC5 / KOTI-TV NBC2 15 Embarrassing Lapses in National Security Cracked.com Angels Security Confiscates Negative Sign from Young Fan Sports Illustrated Biden-Harris Administration Announces Final National Security ... US Department of Commerce Designating Actors Undermining the Peace, Security, and Stability of ... Department of State Comprehensive Security Integration and Prosperity Agreement ... Department of State Biden Administration Announces Additional Security Assistance for ... Department of Defense Readout: U.S. - Mexico Meeting on Joint Actions to Further Enhance ... Customs and Border Protection Suspicious skull found in luggage prompts security scare at Utah airport FOX 4 News Dallas-Fort Worth UN Security Council approves Kenyan mission in Haiti DW (English) Data-driven cyber: empowering government security with... - NCSC ... National Cyber Security Centre New U.S.-Poland Foreign Military Financing Direct Loan Agreement ... Department of State Department of Homeland Security Announces Distribution of More ... Homeland Security Secretary Mayorkas Announces Establishment of Homeland ... Homeland Security Secretary Antony J. Blinken At United Nations Security Council ... Department of State Statement by National Security Council Spokesperson Adrienne ... The White House |
![]() |
![]() |
![]() |
RELATED ARTICLES
5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Detect Spyware Online You can detect spyware online using free spyware cleaners and by installing spyware protection software on your computer. Often it's best to start with free spyware cleaners because these free programs will remove any spyware programs currently running on your computer. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. Cybercriminals Trick: Targeted Trojan-Containing Emails Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. ![]() |
home | site map |
© 2006 |