Security Information |
|
5 Simple Steps to Protect your Digital Downloads
A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Okay, so here I was, opening Google, entering the name of the eBook - clicking search, and checking through the first few pages of search results. -> Forward to Page 5 of Google I saw a link that looked like a PDF document. Right click -> open in new window There, in full glory, was the eBook I was searching for! The complete eBook, mind you, not a trial or demo - sitting there for the world to download. And this is a product that sells for over $25 online!! Obviously I'm not going to tell you the name of the eBook because it would not be fair to the reseller. But it just made me realise that one of the reasons digital theft is so prevalent is simply because... its so EASY! Don't get me wrong. I don't condone theft of any kind - digital or otherwise. But would YOU shell out $25 for a product that everyone can 'legally' download off the 5th page of Google? Most people would just shrug their shoulders, hit the save button and thank their lucky stars. Result: The opposite of $ KA-CHING $ for the sellers One of the problems with selling digital products online is that it is so SIMPLE to do. So now everyone and their grandmother wants to do it. But most newbies have no idea that it requires only a few simple steps to ensure a moderate degree of security for your downloads. So here I've outlined the five most BASIC security steps That anyone selling digital products online must take. These will take you only a few minutes to do, and you do not need any special software or programming knowledge. 1. ZIP THAT FILE The biggest problem arises when sellers store their downloads as PDF documents, as in my experience above. Now you should know that Google, Altavista and many other search engines can read and list PDF files. While this may not be a problem for those adding content to their sites in the form of PDF newsletters and reports, it also means that you must never store a product you want to SELL as a PDF file (unless it is in a password- protected folder). It gets worse. Google also converts your PDF files into HTML documents. So ordinary browsers not only have access to your PDF file, but - horror of horrors - they can download your SOURCE FILE as well!! The next logical step is for them to customize it with their own links, compile it and sell it or give it away. Result: The opposite of $ KA-CHING $ for the sellers ...AND the author. A simple way of keeping your files out of the reach of spiders is to upload them as a zip file. Search engines cannot look inside zip files (yet) and list their contents. 2. CREATE AN INDEX.HTML FILE You MUST have an index.html file in EVERY folder. It acts like a curtain that keeps your files away from prying eyes. A folder without an index file is like a house without walls. Everyone can enter and help themselves to the valuables. The 'index.htm' file is the default file that opens when you click on the link here - http://ebizwhiz-publishing.com/ If you don't create an index.htm or index.html file, you'd be allowing everyone to directly access the root directory of the folder where you store your downloads. Here is a folder I uploaded to show you what happens when you DON'T have an index file. http://ebizwhiz-publishing.com/test/ As you can see, all the files stored in it are clearly visible and ready to download. And yes, feel free to help yourself - I won't accuse you of stealing :-) 3. SHOW PEEPING TOMS THE EXIT You can use a simple script to redirect peeping Toms back to your home page. Here's the easiest way to do it using what it called a "meta refresh tag." Add it between the Header tags like this. <head> <META HTTP-EQUIV="refresh" content="0;URL=http://ebizwhiz-publishing.com"> </head> Replace Just replace my URL with your own in the example above and paste it into the head of your document (before your text). You can see how it works by clicking on the test folder here. http://ebizwhiz-publishing.com/redirect/ Now even though you click on the folder URL, you will be sent to my home page. 4. SPIDER-PROOF YOUR DOWNLOAD PAGES To prevent search engine spiders from reading and listing the download pages that link to your eBooks add the tag below in the head of the document. This "Robot" tag tells the spider that this page is not to be spidered or indexed. As a result it should never show up on a search. <head> <META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"> </head> 5. CHANGE YOUR DOWNLOAD LINKS OFTEN To prevent unscrupulous people from posting your download links on forums or message boards, change the folder or file name where you store them from time to time, even if it means having to change the download links in your merchant account. Using these methods will give you a good degree of satisfaction, knowing that you have taken the most basic steps to protect your digital valuables - and at absolutely no cost to you. If you want greater security and more information on plugging the security loopholes in your website, check out a selection of digital download protection tools. Copyright © 2003 Priya ShahPriya Shah is the author of the search engine optimization guide, Number One In Your Niche and edits the newsletters Be a Whiz at eBiz! and The Glutathione Report
MORE RESOURCES: Trump's inauguration coincides with an unprecedented string of high-stakes security events in DC The Associated Press Louisiana Attorney General announces full review of New Orleans security plan ahead of terror attack WDSU New Orleans Biden signs Social Security Fairness Act into law Federal News Network Pensacola stepping up security of Mardi Gras in wake of New Orleans truck attack Pensacola News Journal U.S. House GOP kicks off new session with border security push Maryland Matters âFaithful public servantâ: Alabama trooper on Gov. Kay Iveyâs security team dies of cancer AL.com Lawyers for security consultant say CNN report on Afghan evacuations destroyed his career Los Angeles Times Heightened security in DC ahead of President Jimmy Carter's state funeral ABC6OnYourSide.com Social Security Fairness Act signed into law by Biden, enhancing retirement benefits for millions CBS News Security guard killed in shooting at Honduran Consulate in Doraville The Atlanta Journal Constitution New Orleansâ Homeland Security director expects more federal resources for Carnival season FOX 8 Local First Veracode Boosts Supply Chain Security Via Phylum Acquisition BankInfoSecurity.com Opinion | Banning TikTok Wonât Solve Your Data-Security Problem The Wall Street Journal Kansas audit flags staff safety, security concerns at Osawatomie State Hospital KSHB 41 Kansas City News January 2025 security patch rolling out for Google Pixel devices, here's what's fixed Android Central Women in Security Profile: âThe industry needs to apply outside-the-box thinking when it comes to recruiting SECURITY SYSTEMS NEWS UW-Stevens Point announces new chief of police, security services Wausau Pilot and Review Security guard killed while trying to stop gunman from entering Honduras consulate in DeKalb County WSB Atlanta CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes CSO Online Skyhigh Security Completes Breakthrough 2024, Surpasses Key Customer and Financial Milestones Business Wire A Look at Changes in the NEW HIPAA Security Rule Healthcare IT Today Marine Corps bases heighten security after New Year's Day attacks Jacksonville Daily News GlobalLogic and Hitachi Systems Trusted Cyber Management Open Cutting-Edge Security Operations Center in Poland Business Wire Border security is national security Washington Times Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Nebraska Distributes $10 Million to Boost School Security and Safety Campus Safety Magazine Merced police to increase security at upcoming MLK parade, following New Orleans terrorist attack Hanford Sentinel Ron Dermer meets with US National Security Advisor at White House The Jerusalem Post UN aviation agency investigating 'potential' security breach BleepingComputer AuditBoard Ranked #1 in Enterprise Security Compliance in G2 Winter 2025 Grid Report - Business Wire How to Lose Your Security Clearance: 2024 Edition ClearanceJobs Security questions CEOs should be asking after the UnitedHealthcare killing, according to experts Fortune New Orleans carnival season begins with high tension, tight security after New Year's attack WBUR News Data deregulation to AI protection: Security priorities in 2025 Security Magazine Massachusetts awards $1.8 million to fund abortion access, security upgrades for abortion providers Boston 25 News Alert: New HIPAA Security Rule Updates You Need to Understand Telehealth.org | Professional Training & Consultation Cactus Custody Releases 2024 Highlights: Advancing Security, Compliance, and Innovation Markets Insider Marine Corps Air Station Beaufort heightens security measures WJCL News Savannah 2025 Security Industry Predictions: Faisal Pandit, VP and GM, Johnson Controls Security Sales & Integration Kevin Kelly on Arcfield's Continued and Growing Commitment to National Security and Space Missions WashingtonExec Valley Metro selects STV to implement new safety and security on its rail and streetcar network Mass Transit Magazine Former security guard accused of secretly recording young girls at The Woodlands Mall KPRC Click2Houston Cymulate acquires CYNC Secure to accelerate continuous threat exposure management capabilities SecurityInfoWatch Why Biden cited national security concerns as he blocked a Japanese bid to buy U.S. Steel PBS NewsHour Amazon's Choice Solar-Powered Eufy S220 Security Camera Is Nearly 50% Off for a Limited Time Gizmodo Parks Associates: 32% of US households have a paid security service SecurityInfoWatch INE Security Alert: Comprehensive Training Solutions to Help Organizations Achieve CMMC Compliance Yahoo Finance Napco Access Proâs Continental Enterprise Security Management Platform, GSA Certified, FIPS 201 Approved Security Today |
RELATED ARTICLES
Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. Spyware Symptoms Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Spyware, This Time Its Personal! First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission.. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Web and Computer Security Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?Today’s cyberspace is hazardous. Temporary Internet Files - the Good, the Bad, and the Ugly A little bit of time invested into learning about internet security can go a long way in preventing mishaps on your computer. Temporary internet files are not something we should be afraid of, but we should certainly be careful in how much we trust them and how we deal with them. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords. Detect Spyware Online You can detect spyware online using free spyware cleaners and by installing spyware protection software on your computer. Often it's best to start with free spyware cleaners because these free programs will remove any spyware programs currently running on your computer. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. |
home | site map |
© 2006 |