5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a popular eBook online.

Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes.

Okay, so here I was, opening Google, entering the name of the eBook - clicking search, and checking through the first few pages of search results.

-> Forward to Page 5 of Google

I saw a link that looked like a PDF document.

Right click -> open in new window

There, in full glory, was the eBook I was searching for!

The complete eBook, mind you, not a trial or demo - sitting there for the world to download.

And this is a product that sells for over $25 online!!

Obviously I'm not going to tell you the name of the eBook because it would not be fair to the reseller.

But it just made me realise that one of the reasons digital theft is so prevalent is simply because... its so EASY!

Don't get me wrong. I don't condone theft of any kind - digital or otherwise.

But would YOU shell out $25 for a product that everyone can 'legally' download off the 5th page of Google?

Most people would just shrug their shoulders, hit the save button and thank their lucky stars.

Result: The opposite of $ KA-CHING $ for the sellers

One of the problems with selling digital products online is that it is so SIMPLE to do. So now everyone and their grandmother wants to do it.

But most newbies have no idea that it requires only a few simple steps to ensure a moderate degree of security for your downloads.

So here I've outlined the five most BASIC security steps That anyone selling digital products online must take.

These will take you only a few minutes to do, and you do not need any special software or programming knowledge.

1. ZIP THAT FILE

The biggest problem arises when sellers store their downloads as PDF documents, as in my experience above.

Now you should know that Google, Altavista and many other search engines can read and list PDF files.

While this may not be a problem for those adding content to their sites in the form of PDF newsletters and reports, it also means that you must never store a product you want to SELL as a PDF file (unless it is in a password- protected folder).

It gets worse. Google also converts your PDF files into HTML documents. So ordinary browsers not only have access to your PDF file, but - horror of horrors - they can download your SOURCE FILE as well!!

The next logical step is for them to customize it with their own links, compile it and sell it or give it away.

Result: The opposite of $ KA-CHING $ for the sellers ...AND the author.

A simple way of keeping your files out of the reach of spiders is to upload them as a zip file. Search engines cannot look inside zip files (yet) and list their contents.

2. CREATE AN INDEX.HTML FILE

You MUST have an index.html file in EVERY folder. It acts like a curtain that keeps your files away from prying eyes.

A folder without an index file is like a house without walls. Everyone can enter and help themselves to the valuables.

The 'index.htm' file is the default file that opens when you click on the link here -

http://ebizwhiz-publishing.com/

If you don't create an index.htm or index.html file, you'd be allowing everyone to directly access the root directory of the folder where you store your downloads.

Here is a folder I uploaded to show you what happens when you DON'T have an index file.

http://ebizwhiz-publishing.com/test/

As you can see, all the files stored in it are clearly visible and ready to download.

And yes, feel free to help yourself - I won't accuse you of stealing :-)

3. SHOW PEEPING TOMS THE EXIT

You can use a simple script to redirect peeping Toms back to your home page.

Here's the easiest way to do it using what it called a "meta refresh tag." Add it between the Header tags like this.

<head> <META HTTP-EQUIV="refresh" content="0;URL=http://ebizwhiz-publishing.com"> </head>

Replace
< with <
> with >
" with "

Just replace my URL with your own in the example above and paste it into the head of your document (before your text).

You can see how it works by clicking on the test folder here.

http://ebizwhiz-publishing.com/redirect/

Now even though you click on the folder URL, you will be sent to my home page.

4. SPIDER-PROOF YOUR DOWNLOAD PAGES

To prevent search engine spiders from reading and listing the download pages that link to your eBooks add the tag below in the head of the document.

This "Robot" tag tells the spider that this page is not to be spidered or indexed. As a result it should never show up on a search.

<head> <META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"> </head>

5. CHANGE YOUR DOWNLOAD LINKS OFTEN

To prevent unscrupulous people from posting your download links on forums or message boards, change the folder or file name where you store them from time to time, even if it means having to change the download links in your merchant account.

Using these methods will give you a good degree of satisfaction, knowing that you have taken the most basic steps to protect your digital valuables - and at absolutely no cost to you.

If you want greater security and more information on plugging the security loopholes in your website, check out a selection of digital download protection tools.

Copyright © 2003 Priya Shah

Priya Shah is the author of the search engine optimization guide, Number One In Your Niche and edits the newsletters Be a Whiz at eBiz! and The Glutathione Report

In The News:


pen paper and inkwell


cat break through


Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More