Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
A Painless Plagiarism Solution > NetSparsh - Viral Content you Love & Share

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.

I had worked hard on the copy for my sales page at Watch Live Football (, ensuring the copy was relevant to potential customers and contained keyword rich phrases to assist with search engine ranking.

Understandably, I was incensed when I found not one, but two websites selling a similar service had not just pinched a few key phrases here and there from my website, but had reproduced the entire text verbatim!

I found these offending websites by using Copyscape ( which is an invaluable, free tool, in the battle against online plagiarism.

It highlighted that my competitors had stolen 254 words from my sales copy despite there being a clear copyright logo at the foot of each page of my website. However, this alone does not prevent an unscrupulous webmaster and CTRL & C command in full flow.

Fortunately, dealing with plagiarism on the internet can be a straightforward process and incidents resolved quickly and amicably before any real 'action' needs to be taken.

This is how I ensured my sales copy was removed from the two offending websites in less than 24 hours of discovery.

Write a polite, but firm email to the webmaster of the offending website and explain that you have found your copyrighted work has been illegally reproduced on it. If you have used Copyscape to detect plagiarism you could even include the link that highlights the illegally used copy and states an actual word count.

Inform the webmaster your material should be removed from their website within a certain time frame, I chose 48 hours, or you will take the following action:

1. Contact their web hosting company and inform them of the webmaster's abuse. A WHOIS search (e.g. can reveal plenty of information about a particular website, including hosting information and also contact details of the individual or company that registered the website.

A personal introduction, for example, 'Dear Mr Smith', is very effective when making the first contact to combat plagiarism, especially if this information is not readily available on the 'Contact' section of the offending website!

2. In case the offending webmaster does not take the prospect of the above action seriously then you should also clearly state you intend to file a notice of Digital Millenium Copyright Act (DCMA) infringement with search engines such as Google and Yahoo.

This action can potentially ruin a web business as the search engines take a dim view of plagiarism and can remove an offending site from their search results should an infringement claim be justified.

You can also point out that you can prove your website is the originator of the copy by using the Internet Archive (

These simple procedures should be enough to persuade an offending webmaster to remove your material without the need for legal action which can be a long, drawn out and expensive process.

© 2005 David Walker

David Walker is the Managing Director of Magic Hat Ltd (, a company which provides webmasters with a range of brand new sports, gambling and entertainment affiliate programmes to promote.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at


Here's How You Can Stay Ahead Of Your Cyber Security ETF
Berlin, Germany - January 11: Symbolic photo on the topic Data security. A padlock is on the board of a computer on January 11, 2018 in Berlin, Germany. (Photo Illustration by Thomas Trutschel/Photothek via Getty Images). An ETF provides a single ...

and more »

CSO Online

8 questions to ask about your industrial control systems security
CSO Online
Do I have the people to manage and sustain ICS security? Organizational planners often tend to think of industrial cybersecurity as largely a technology issue when often the much bigger problem is a lack of skilled resources, says Sid Snitkin, an ...

and more »

Washington Post

Security clearance process remains 'broken' despite 2016 changes ...
Washington Post
Among the list of problems beleaguering the security clearance process, reciprocity, among and even within agencies, should be easy to fix. Federal employees and contractors can be cleared to work in one office, but if they move to another, they often ...

and more »

U.S. News & World Report

With Security Measures, Urban Schools Avoid Mass Shootings
U.S. News & World Report
As schools around the U.S. look for ways to impose tougher security measures in the wake of last month's school shooting in Parkland, Florida, that left 17 people dead, they don't have to look further than urban districts such as Detroit, Chicago, Los ...
Experts Believe Security Measures Help Detroit Schools Avoid Mass ShootingsCBS Detroit

all 2 news articles »


Retirement Security Being Threatened By High Debt Warns Researchers
Ted Knutson , Contributor I am your guru for cybersecurity/fintech/Bitcoin SEC/CFTC/FTC/OCC. Opinions expressed by Forbes Contributors are their own. Tweet This. “(They) are placing themselves at risk of running short of money,” the researchers found ...


PGA eyes security after Austin bombings
The PGA Tour, which is staging the Dell Match Play Championship in west Austin, Texas, this week, says its security advisers are collaborating closely with law enforcement to try to ensure the safety of players and fans. The PGA said Monday that it ...
AUDIO: Austin bombing heard on security

all 712 news articles »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: March 10 - March 16
Council on Foreign Relations (blog)
About CFR · All About CFR · Who We Are · Membership · Member Programs · Outreach · For Media · Careers · Support CFR · Contact · Member Login · · Member Login · Nigeria Security Tracker Weekly Update: March 10 ...

Readout of National Security Advisor HR McMaster's Meeting with National Security Office Director Chung Eui-yong of ... (press release)
National Security Advisor H.R. McMaster of the United States, National Security Office Director Chung Eui-yong of the Republic of Korea, and Secretary General of the National Security Secretariat Shotaro Yachi of Japan held a trilateral meeting on ...

Cybersecurity trend forecast: Streamlined, simplified security
In part one of this two-part Q&A, Malik spoke with SearchCIO about changes in the cybersecurity landscape and highlighted key cybersecurity trends to watch out for this year. He also shed light on how emerging tech like AI and techniques like DevSecOps ...

Wall Street Journal

How Secure Is Mobile Banking?
Wall Street Journal
The general consensus is that while the risk is low when it comes to banking, security does depend to some extent on consumers—many of whom don't do what they should be doing to keep their phones safe from attack. As a result, experts say, banks could ...

Google News

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More