Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
A Painless Plagiarism Solution > NetSparsh - Viral Content you Love & Share

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.

I had worked hard on the copy for my sales page at Watch Live Football (, ensuring the copy was relevant to potential customers and contained keyword rich phrases to assist with search engine ranking.

Understandably, I was incensed when I found not one, but two websites selling a similar service had not just pinched a few key phrases here and there from my website, but had reproduced the entire text verbatim!

I found these offending websites by using Copyscape ( which is an invaluable, free tool, in the battle against online plagiarism.

It highlighted that my competitors had stolen 254 words from my sales copy despite there being a clear copyright logo at the foot of each page of my website. However, this alone does not prevent an unscrupulous webmaster and CTRL & C command in full flow.

Fortunately, dealing with plagiarism on the internet can be a straightforward process and incidents resolved quickly and amicably before any real 'action' needs to be taken.

This is how I ensured my sales copy was removed from the two offending websites in less than 24 hours of discovery.

Write a polite, but firm email to the webmaster of the offending website and explain that you have found your copyrighted work has been illegally reproduced on it. If you have used Copyscape to detect plagiarism you could even include the link that highlights the illegally used copy and states an actual word count.

Inform the webmaster your material should be removed from their website within a certain time frame, I chose 48 hours, or you will take the following action:

1. Contact their web hosting company and inform them of the webmaster's abuse. A WHOIS search (e.g. can reveal plenty of information about a particular website, including hosting information and also contact details of the individual or company that registered the website.

A personal introduction, for example, 'Dear Mr Smith', is very effective when making the first contact to combat plagiarism, especially if this information is not readily available on the 'Contact' section of the offending website!

2. In case the offending webmaster does not take the prospect of the above action seriously then you should also clearly state you intend to file a notice of Digital Millenium Copyright Act (DCMA) infringement with search engines such as Google and Yahoo.

This action can potentially ruin a web business as the search engines take a dim view of plagiarism and can remove an offending site from their search results should an infringement claim be justified.

You can also point out that you can prove your website is the originator of the copy by using the Internet Archive (

These simple procedures should be enough to persuade an offending webmaster to remove your material without the need for legal action which can be a long, drawn out and expensive process.

© 2005 David Walker

David Walker is the Managing Director of Magic Hat Ltd (, a company which provides webmasters with a range of brand new sports, gambling and entertainment affiliate programmes to promote.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at


Security researcher claims macOS Mojave privacy bug on launch day
A security researcher has claimed a new vulnerability in the latest version of macOS — just hours before the software is due to be released. Patrick Wardle, chief researcher officer at Digita Security, tweeted a video Monday of an apparent privacy ...
Critical MacOS Mojave vulnerability bypasses system securityDigital Trends
macOS Mojave - AppleApple
macOS Mojave on the Mac App Store - iTunes - AppleiTunes - Apple

all 223 news articles »


CISO Should Stand For Chief Influence Security Officer
More companies are elevating security executives to true C-level status. Last year, about 65% of the largest enterprises in the U.S. had a Chief Information Security Officer (CISO) on their payroll, according to ISACA (via the Wall Street Journal), and ...

and more »


Must-watch TV: Trump to wield gavel at key UN Security Council meeting
“I'm sure that's going to be the most watched Security Council meeting ever,” Nikki Haley, Trump's ambassador to the U.N., predicted last week in outlining to reporters the administration's agenda for this week's high-level meetings in New York City.
From reality TV to UN, Trump to wield Security Council gavelReuters
Current Members of the Security Council - Members of the United Nations Security CouncilMembers of the United Nations Security Council
Trump's tough line on Iran could rankle world leaders at UN General AssemblyUSA TODAY
USA TODAY -YouTube -United Nations Office on Drugs and Crime
all 743 news articles »

Data Center Knowledge

Microsoft's stock closes at record as security moves seek to shake up cloudscape
Microsoft Corp. shares closed at a record high as the tech giant broadened its profile as a secure cloud vendor on Monday, using its annual IT conference to announce several security initiatives designed to woo enterprises to its Azure public cloud ...
Microsoft Rolls Out New Office, Security, Cloud OfferingsData Center Knowledge
Microsoft Rolls Out Additions to Office, Security and Cloud OfferingsBloomberg
Microsoft 'kills' passwords, throws up threat manager, APIs Graph SecurityThe Register
BleepingComputer -Microsoft
all 224 news articles »

Fox News

Wisconsin restaurant responds after video shows security guards fighting man in wheelchair
Fox News
“The actions that the independant security company took in this matter are NOT acceptable and do not reflect Jalisco's mission or core values. Effective immediately we will have a new security company working our restaurant starting today,” the ...
Wife of man in wheelchair, security company head speak out after

all 12 news articles »


Security experts say Chrome 69's 'forced login' feature violates user privacy
Many security folks have already panned the move as unwanted behavior, arguing it violates their privacy. Some users had good reasons not to want to be logged into Chrome, but now Chrome seems to takes that decision away from the user. Matthew Green ...
Chrome's turning 10, here's what's new - Google BlogGoogle Blog
Why I'm done with Chrome – A Few Thoughts on Cryptographic EngineeringA Few Thoughts on Cryptographic Engineering
Adobe Announces Flash Distribution and Updates to End | WebKitWebKit
MDN - Mozilla
all 172 news articles »


Yubico's new security keys now support FIDO2
Yubico, the company behind the popular Yubikey security keys, today announced the launch of its 5 Series keys. The company argues that these new keys, which start at $45, are the first multi-protocol securities keys that support the FIDO2 standard ...
Yubico launches new lineup of multifactor FIDO2 security keysVentureBeat
YubiKey 5: First multi-protocol security keys with FIDO2 supportZDNet
The New YubiKey Will Help Kill the PasswordWIRED
Android Central
all 36 news articles »

College security officer accused of posing as teen girl to get teen boy to send him nude pics
He works as a campus security officer at Rider University in Lawrence and serves as captain of Bordentown City's volunteer fire department, the prosecutor's office said. (On his LinkedIn page, Berman identifies himself as a member of the department's ...

and more »

NCCU student shot, killed by security officer at off-campus apartment complex
Durham, N.C. — A North Carolina Central University student was shot and killed by a security guard last week at an off-campus apartment complex, officials said Monday. Around 10:15 p.m. on Sept. 17, officers with the Durham Police Department responded ...
Police: College Student Shot, Killed by Security OfficerU.S. News & World Report
Security firm says shooting of NC Central University student was self-defenseDurham Herald Sun
New Bern college student killed by Durham security guardWITN
Spectrum News
all 65 news articles »

School security part of design and construction of new Willoughby-Eastlake schools
WILLOUGHBY, Ohio-- The 1,400 students of Willoughby South High School are getting a brand new home. The new high school is set to open in fall of 2019. While the sweeping curved walls and wide-open spaces in the architecture stand out, ...

Google News

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More