A couple of days ago, I was searching for a popular eBook online.
Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes.
Okay, so here I was, opening Google, entering the name of the eBook - clicking search, and checking through the first few pages of search results.
-> Forward to Page 5 of Google
I saw a link that looked like a PDF document.
Right click -> open in new window
There, in full glory, was the eBook I was searching for!
The complete eBook, mind you, not a trial or demo - sitting there for the world to download.
And this is a product that sells for over $25 online!!
Obviously I'm not going to tell you the name of the eBook because it would not be fair to the reseller.
But it just made me realise that one of the reasons digital theft is so prevalent is simply because... its so EASY!
Don't get me wrong. I don't condone theft of any kind - digital or otherwise.
But would YOU shell out $25 for a product that everyone can 'legally' download off the 5th page of Google?
Most people would just shrug their shoulders, hit the save button and thank their lucky stars.
Result: The opposite of $ KA-CHING $ for the sellers
One of the problems with selling digital products online is that it is so SIMPLE to do. So now everyone and their grandmother wants to do it.
But most newbies have no idea that it requires only a few simple steps to ensure a moderate degree of security for your downloads.
So here I've outlined the five most BASIC security steps That anyone selling digital products online must take.
These will take you only a few minutes to do, and you do not need any special software or programming knowledge.
1. ZIP THAT FILE
The biggest problem arises when sellers store their downloads as PDF documents, as in my experience above.
Now you should know that Google, Altavista and many other search engines can read and list PDF files.
While this may not be a problem for those adding content to their sites in the form of PDF newsletters and reports, it also means that you must never store a product you want to SELL as a PDF file (unless it is in a password- protected folder).
It gets worse. Google also converts your PDF files into HTML documents. So ordinary browsers not only have access to your PDF file, but - horror of horrors - they can download your SOURCE FILE as well!!
The next logical step is for them to customize it with their own links, compile it and sell it or give it away.
Result: The opposite of $ KA-CHING $ for the sellers ...AND the author.
A simple way of keeping your files out of the reach of spiders is to upload them as a zip file. Search engines cannot look inside zip files (yet) and list their contents.
2. CREATE AN INDEX.HTML FILE
You MUST have an index.html file in EVERY folder. It acts like a curtain that keeps your files away from prying eyes.
A folder without an index file is like a house without walls. Everyone can enter and help themselves to the valuables.
The 'index.htm' file is the default file that opens when you click on the link here -
http://ebizwhiz-publishing.com/
If you don't create an index.htm or index.html file, you'd be allowing everyone to directly access the root directory of the folder where you store your downloads.
Here is a folder I uploaded to show you what happens when you DON'T have an index file.
http://ebizwhiz-publishing.com/test/
As you can see, all the files stored in it are clearly visible and ready to download.
And yes, feel free to help yourself - I won't accuse you of stealing :-)
3. SHOW PEEPING TOMS THE EXIT
You can use a simple script to redirect peeping Toms back to your home page.
Here's the easiest way to do it using what it called a "meta refresh tag." Add it between the Header tags like this.
<head> <META HTTP-EQUIV="refresh" content="0;URL=http://ebizwhiz-publishing.com"> </head>
Replace
< with <
> with >
" with "
Just replace my URL with your own in the example above and paste it into the head of your document (before your text).
You can see how it works by clicking on the test folder here.
http://ebizwhiz-publishing.com/redirect/
Now even though you click on the folder URL, you will be sent to my home page.
4. SPIDER-PROOF YOUR DOWNLOAD PAGES
To prevent search engine spiders from reading and listing the download pages that link to your eBooks add the tag below in the head of the document.
This "Robot" tag tells the spider that this page is not to be spidered or indexed. As a result it should never show up on a search.
<head> <META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"> </head>
5. CHANGE YOUR DOWNLOAD LINKS OFTEN
To prevent unscrupulous people from posting your download links on forums or message boards, change the folder or file name where you store them from time to time, even if it means having to change the download links in your merchant account.
Using these methods will give you a good degree of satisfaction, knowing that you have taken the most basic steps to protect your digital valuables - and at absolutely no cost to you.
If you want greater security and more information on plugging the security loopholes in your website, check out a selection of digital download protection tools.
Copyright © 2003 Priya ShahPriya Shah is the author of the search engine optimization guide, Number One In Your Niche and edits the newsletters Be a Whiz at eBiz! and The Glutathione Report
First, let's do a little recap'. As I stated in... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Since its birth, the Internet has grown and expanded to... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Phishing is the act of some individual sending an email... Read More
Spyware protection software is the easiest way of removing spyware... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Having a good Spyware eliminator on your computer is vital... Read More
There is no doubt that "how-to articles" have become a... Read More
Afraid that someone is monitoring your PC or installed a... Read More
If spyware were a person and he set himself up... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
P C. owners are constantly at risk from attacks by... Read More
If you are a parent, you have probably wondered at... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
A little bit of time invested into learning about internet... Read More
With the Internet entering our lives in such an explosive... Read More
You and I are a lot alike. We are both... Read More
When it comes to reporting Internet scams most of us... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
To blog or not to blog? Well, why not? Lots... Read More
File sharing on p2p is soaring despite the music and... Read More
As soon as almost all computer users already got used... Read More
Identity theft is one of the most common criminal acts... Read More
So called phishers try to catch the information about the... Read More
A few nights ago I received an email from "2CO"... Read More
Spyware and adware are becoming major problems for online surfers... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Spyware is the most troublesome software to appear on the... Read More
The Internet is a vast International Network of people and... Read More
In a word, no - an email message has always... Read More
Let us take the example of scrambling an egg. First,... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Security leaks can be a big problem for any site... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Well, if that would have been said to me by... Read More
If you run any type of Internet business, Adware and... Read More
This is not some new fangled techno-speak, it is a... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Credit card fraud is a growing problem for online businesses... Read More
The top five online scams on the Internet hit nearly... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
A friend called me one day and asked if I... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Spyware is software or hardware installed on a computer without... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
They're out there. Individuals trying to make a quick buck... Read More
My first experience with a spyware BHO based infection was... Read More
If you are a parent, you have probably wondered at... Read More
Every day millions of people go online to find information,... Read More
You can detect spyware online using free spyware cleaners and... Read More
As you know, this time the virus under the name... Read More
Phishing is the act of some individual sending an email... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Recently I have received email from my bank/credit Card Company,... Read More
If you use emails actively in your communication, you must... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
It has been said that with the wealth of information,... Read More
By browsing a web page, you could infect your computer... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Internet Security |