Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
5 Simple Steps to Protect your Digital Downloads > NetSparsh - Viral Content you Love & Share

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a popular eBook online.

Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes.

Okay, so here I was, opening Google, entering the name of the eBook - clicking search, and checking through the first few pages of search results.

-> Forward to Page 5 of Google

I saw a link that looked like a PDF document.

Right click -> open in new window

There, in full glory, was the eBook I was searching for!

The complete eBook, mind you, not a trial or demo - sitting there for the world to download.

And this is a product that sells for over $25 online!!

Obviously I'm not going to tell you the name of the eBook because it would not be fair to the reseller.

But it just made me realise that one of the reasons digital theft is so prevalent is simply because... its so EASY!

Don't get me wrong. I don't condone theft of any kind - digital or otherwise.

But would YOU shell out $25 for a product that everyone can 'legally' download off the 5th page of Google?

Most people would just shrug their shoulders, hit the save button and thank their lucky stars.

Result: The opposite of $ KA-CHING $ for the sellers

One of the problems with selling digital products online is that it is so SIMPLE to do. So now everyone and their grandmother wants to do it.

But most newbies have no idea that it requires only a few simple steps to ensure a moderate degree of security for your downloads.

So here I've outlined the five most BASIC security steps That anyone selling digital products online must take.

These will take you only a few minutes to do, and you do not need any special software or programming knowledge.

1. ZIP THAT FILE

The biggest problem arises when sellers store their downloads as PDF documents, as in my experience above.

Now you should know that Google, Altavista and many other search engines can read and list PDF files.

While this may not be a problem for those adding content to their sites in the form of PDF newsletters and reports, it also means that you must never store a product you want to SELL as a PDF file (unless it is in a password- protected folder).

It gets worse. Google also converts your PDF files into HTML documents. So ordinary browsers not only have access to your PDF file, but - horror of horrors - they can download your SOURCE FILE as well!!

The next logical step is for them to customize it with their own links, compile it and sell it or give it away.

Result: The opposite of $ KA-CHING $ for the sellers ...AND the author.

A simple way of keeping your files out of the reach of spiders is to upload them as a zip file. Search engines cannot look inside zip files (yet) and list their contents.

2. CREATE AN INDEX.HTML FILE

You MUST have an index.html file in EVERY folder. It acts like a curtain that keeps your files away from prying eyes.

A folder without an index file is like a house without walls. Everyone can enter and help themselves to the valuables.

The 'index.htm' file is the default file that opens when you click on the link here -

http://ebizwhiz-publishing.com/

If you don't create an index.htm or index.html file, you'd be allowing everyone to directly access the root directory of the folder where you store your downloads.

Here is a folder I uploaded to show you what happens when you DON'T have an index file.

http://ebizwhiz-publishing.com/test/

As you can see, all the files stored in it are clearly visible and ready to download.

And yes, feel free to help yourself - I won't accuse you of stealing :-)

3. SHOW PEEPING TOMS THE EXIT

You can use a simple script to redirect peeping Toms back to your home page.

Here's the easiest way to do it using what it called a "meta refresh tag." Add it between the Header tags like this.

<head> <META HTTP-EQUIV="refresh" content="0;URL=http://ebizwhiz-publishing.com"> </head>

Replace
< with <
> with >
" with "

Just replace my URL with your own in the example above and paste it into the head of your document (before your text).

You can see how it works by clicking on the test folder here.

http://ebizwhiz-publishing.com/redirect/

Now even though you click on the folder URL, you will be sent to my home page.

4. SPIDER-PROOF YOUR DOWNLOAD PAGES

To prevent search engine spiders from reading and listing the download pages that link to your eBooks add the tag below in the head of the document.

This "Robot" tag tells the spider that this page is not to be spidered or indexed. As a result it should never show up on a search.

<head> <META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"> </head>

5. CHANGE YOUR DOWNLOAD LINKS OFTEN

To prevent unscrupulous people from posting your download links on forums or message boards, change the folder or file name where you store them from time to time, even if it means having to change the download links in your merchant account.

Using these methods will give you a good degree of satisfaction, knowing that you have taken the most basic steps to protect your digital valuables - and at absolutely no cost to you.

If you want greater security and more information on plugging the security loopholes in your website, check out a selection of digital download protection tools.

Copyright © 2003 Priya Shah

Priya Shah is the author of the search engine optimization guide, Number One In Your Niche and edits the newsletters Be a Whiz at eBiz! and The Glutathione Report

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Bradenton Herald

World leaders, high security at Paris climate summit
ABC News
Some 3,100 security personnel are fanned out around Paris for Tuesday's event, including extra patrol boats along the Seine River. Macron will accompany the visiting leaders to the summit site on a river island by boat. Macron, who's also using the ...
The Latest: Call for action on climate change security risksBradenton Herald

all 345 news articles »

War on the Rocks

What Would an Honest National Security Strategy Say?
War on the Rocks
Staffers on the U.S. National Security Council are currently putting the finishing touches to the Trump administration's congressionally mandated National Security Strategy. The strategy is supposed to describe America's interests, identify the threats ...


UN News Centre

Security tensions may have deepened rights violations in DPRK, Security Council told
UN News Centre
Indeed, security tensions seem to have deepened the extremely serious human rights violations endured by the DPRK's 25 million people,” UN High Commissioner for Human Rights Zeid Ra'ad Al Hussein told the Security Council via video link from Paris. He ...

and more »

Bloomberg

Mexico Said to Discuss Security With US in Parallel to Nafta
Bloomberg
The meetings coincide with a sitdown by negotiators from the U.S., Mexico and Canada to update the North American Free Trade Agreement at the demand of U.S. President Donald Trump, who says the deal is responsible for hundreds of thousands of lost ...

and more »

Computer Business Review

Menlo Security secures $40 million Series C to keep malware at bay ...
TechCrunch
Menlo Security, a startup with a unique approach to protecting your company from malware and phishing attacks, announced a $40 million Series C round today. Menlo protects customers by never letting employees access an actual website or email ...
JPMorgan Chase, American Express Put Millions in Cyber Startup ...Fortune

all 14 news articles »

Human Rights Watch

UN Security Council Meeting a Chance to Act on Myanmar
Human Rights Watch
(New York) – The United Nations Security Council should take prompt, concerted, and effective international action to respond to Myanmar's Rohingya crisis, Human Rights Watch and 80 other nongovernmental organizations said today in a joint appeal to ...
AP Report: Myanmar's Security Forces Using Rape Against RohingyaVoice of America

all 162 news articles »

Wall Street Journal

Security Measures Stepped Up Statewide Following Rush-Hour Attack
Wall Street Journal
Officials implored New Yorkers to be vigilant and help law-enforcement agencies keep them safe, after a suspect tried to set off a crude pipe bomb near the Port Authority Bus Terminal Monday, just as the city is welcoming millions of tourists for the ...


East Bay Times

Regional transit agencies heighten security in wake of New York City's subway attack
East Bay Times
In a system that carries up to 450,000 people per weekday and nearly 130 million riders a year, Alvarez said security tools like metal detectors “are not conducive to the movement of people we have,” and are less likely to be effective than riders' use ...

and more »

NBCNews.com

Sandy Hook shooting anniversary: How schools have changed security
NBCNews.com
Adding security features comes with challenges, though: They can be costly for cash-strapped schools — Klinger said the buzzer system alone can run about $5,000 — and they can make school feel less than inviting. "We want to always be looking at that ...
Sandy Hook's Legacy: More Security at Elementary SchoolsNBC Connecticut
The legacy of Newtown: Lockdowns, active-shooter training and school securityWashington Post

all 121 news articles »

Milwaukee Journal Sentinel

Flying for the holidays? Here's what you need to know about the TSA's new security rules
Milwaukee Journal Sentinel
On the same day a terror attack was reported in New York City, officials at Mitchell International Airport in Milwaukee were reminding air travelers of new security measures being rolled out at the airport Monday. The new security procedures, which ...

and more »
Google News

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More