www.1001TopWords.com |
5 Simple Steps to Protect your Digital Downloads
A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Okay, so here I was, opening Google, entering the name of the eBook - clicking search, and checking through the first few pages of search results. -> Forward to Page 5 of Google I saw a link that looked like a PDF document. Right click -> open in new window There, in full glory, was the eBook I was searching for! The complete eBook, mind you, not a trial or demo - sitting there for the world to download. And this is a product that sells for over $25 online!! Obviously I'm not going to tell you the name of the eBook because it would not be fair to the reseller. But it just made me realise that one of the reasons digital theft is so prevalent is simply because... its so EASY! Don't get me wrong. I don't condone theft of any kind - digital or otherwise. But would YOU shell out $25 for a product that everyone can 'legally' download off the 5th page of Google? Most people would just shrug their shoulders, hit the save button and thank their lucky stars. Result: The opposite of $ KA-CHING $ for the sellers One of the problems with selling digital products online is that it is so SIMPLE to do. So now everyone and their grandmother wants to do it. But most newbies have no idea that it requires only a few simple steps to ensure a moderate degree of security for your downloads. So here I've outlined the five most BASIC security steps That anyone selling digital products online must take. These will take you only a few minutes to do, and you do not need any special software or programming knowledge. 1. ZIP THAT FILE The biggest problem arises when sellers store their downloads as PDF documents, as in my experience above. Now you should know that Google, Altavista and many other search engines can read and list PDF files. While this may not be a problem for those adding content to their sites in the form of PDF newsletters and reports, it also means that you must never store a product you want to SELL as a PDF file (unless it is in a password- protected folder). It gets worse. Google also converts your PDF files into HTML documents. So ordinary browsers not only have access to your PDF file, but - horror of horrors - they can download your SOURCE FILE as well!! The next logical step is for them to customize it with their own links, compile it and sell it or give it away. Result: The opposite of $ KA-CHING $ for the sellers ...AND the author. A simple way of keeping your files out of the reach of spiders is to upload them as a zip file. Search engines cannot look inside zip files (yet) and list their contents. 2. CREATE AN INDEX.HTML FILE You MUST have an index.html file in EVERY folder. It acts like a curtain that keeps your files away from prying eyes. A folder without an index file is like a house without walls. Everyone can enter and help themselves to the valuables. The 'index.htm' file is the default file that opens when you click on the link here - http://ebizwhiz-publishing.com/ If you don't create an index.htm or index.html file, you'd be allowing everyone to directly access the root directory of the folder where you store your downloads. Here is a folder I uploaded to show you what happens when you DON'T have an index file. http://ebizwhiz-publishing.com/test/ As you can see, all the files stored in it are clearly visible and ready to download. And yes, feel free to help yourself - I won't accuse you of stealing :-) 3. SHOW PEEPING TOMS THE EXIT You can use a simple script to redirect peeping Toms back to your home page. Here's the easiest way to do it using what it called a "meta refresh tag." Add it between the Header tags like this. <head> <META HTTP-EQUIV="refresh" content="0;URL=http://ebizwhiz-publishing.com"> </head> Replace Just replace my URL with your own in the example above and paste it into the head of your document (before your text). You can see how it works by clicking on the test folder here. http://ebizwhiz-publishing.com/redirect/ Now even though you click on the folder URL, you will be sent to my home page. 4. SPIDER-PROOF YOUR DOWNLOAD PAGES To prevent search engine spiders from reading and listing the download pages that link to your eBooks add the tag below in the head of the document. This "Robot" tag tells the spider that this page is not to be spidered or indexed. As a result it should never show up on a search. <head> <META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"> </head> 5. CHANGE YOUR DOWNLOAD LINKS OFTEN To prevent unscrupulous people from posting your download links on forums or message boards, change the folder or file name where you store them from time to time, even if it means having to change the download links in your merchant account. Using these methods will give you a good degree of satisfaction, knowing that you have taken the most basic steps to protect your digital valuables - and at absolutely no cost to you. If you want greater security and more information on plugging the security loopholes in your website, check out a selection of digital download protection tools. Copyright © 2003 Priya ShahPriya Shah is the author of the search engine optimization guide, Number One In Your Niche and edits the newsletters Be a Whiz at eBiz! and The Glutathione Report
|
RELATED ARTICLES
Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware ? those severely annoying programs that are illegally loaded onto your computer from the internet. Spyware programs can seriously undermine the operating structure of your computer, as well as make you vulnerable to identity theft and other criminal activities. Firewalls, long since a staple in the corporate world for defending large, expensive internal intranets or other networks, has now come into its own as a tool for personal computer owners as well. Your home computer is just as susceptible ? if not more so ? to online attacks, so why should it not be protected? Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. It is important to protect your network and ensure the safety of all computers and users in that network. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. The money those victims lost totaled nearly $5 billion. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Some are disabled as well). Before making a decision to purchase any such software we should check the reliability and should consider various attributes possessed by them and then select the best and the most appropriate one. The various attributes that one should consider to be the most important when purchasing spyware detection and removal software are - Watch Out For That Scam The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. The total dollar loss from all referred cases exceeded 68 million dollars, an average loss of $894 per complaint. There are many types of internet frauds that exist including auction, email, foreign investment letters and online dating. Here are some ways to identify a possible scam or fraud that you may have encountered while surfing the internet. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. You may not see it, but almost all of your company's information is in digital form somewhere in the system. These assets are critical because they describe everything about you; your products, customers, strategies, finances, and your future. They might be in a database, protected by data-center security controls, but more often than not, these assets reside on desktops, laptops, home computers, and more importantly in email or on some form of mobile computing device. We have been counting on our firewall to provide protection, but it has been estimated that at least fifty percent of any given organization's information is in email, traveling through the insecure cyberspace of the Internet. 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. Learn how to Protect To Yourself Now! Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line. Spyware ? Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Every company, big or small, technological or traditional, has two major security concerns: protecting information, and protecting hardware. Identity Theft ? Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. The message explains that certain features of my account have been suspended due to "suspicious activity" on my account. The message then provides a link that I can follow in order to fill out an online form confirming my identity. It's certainly nice that Bank of the West is worried about the status of my account. There's just one problem ? I don't have an account at Bank of the West. In fact, I've never even heard of Bank of the West. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. The blasted stuff shouldn't be on my computer anyway, so what ever would make me want to shell out cash to get rid of something that I shouldn't have in the first place? Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed! |
© Athifea Distribution LLC - 2013 |