Flash - To Use Or No To Use?

Written by Oleg Lazarenko


Continued from page 1

The Fifth Fact: As you may notice we used on our web page http://www.metamorphozis.com flash header. Why? The reason was simple and that isrepparttar fact number five: flash movies are cashed in special browser folder and second time you access it you don't need to wait. Flash movie will be displayed fromrepparttar 131751 cache folder. Image files are also stored in browser cache and may be reused if you keeprepparttar 131752 file names and path to imagesrepparttar 131753 same. But we selected flash due to several technical reasons related to our needs. So we did it to reduce our page loading time. See how confusing it sounds withrepparttar 131754 third fact I mentioned?:-) The problem is that it requires a lot of time to download but only forrepparttar 131755 first time! If you could make visitors wait that time then you will benefit from having flash header as it always there and does not need to be loaded each time you go torepparttar 131756 other page.

The Sixth Fact: Search engines do not like flash pages, as it makes almost impossible to crawl them. They can not crawl links on your web page and can not index your website content if it is in flash. In html you can insert flash only as object.

As you may see flash has number of advantages and disadvantages. No matter what you think about flash but it belongs torepparttar 131757 future ofrepparttar 131758 Internet. If you cannot admit this and stay away then tomorrow you will regret you did it. Just considerrepparttar 131759 flash usage on your web site. Remember! Be reasonable in design and flash usage and you will get good looking website. This article may be reprinted and distributed with no charge untilrepparttar 131760 credit line below remains without changes. Thanks for reading. Oleg Lazarenko Metamorphosis Web Design Studio http://www.metamorphozis.com Production Manager

Thanks for reading. Oleg Lazarenko Metamorphosis Web Design Studio http://www.metamorphozis.com Production Manager


How secure is your data? Preventing the theft of your internet property.

Written by John Miles


Continued from page 1

After securing your serverrepparttar next thing to look at has to be ways of protectingrepparttar 131749 data. Most theft occurs directly fromrepparttar 131750 web site itself and if you’re trying to protect images, there are plenty of watermarking programs that can apply a watermark to your images. Take a look at www.hotscripts.com for example and search for watermarking. You can also find hints and tips on preventing people from saving your files to their local pc on many sites, http://javascript.internet.com is a good source for free scripts and searching on Google for javascripts will reveal more sources.

The company inrepparttar 131751 example I used earlier had watermarking protection for all their images but, unfortunately for them,repparttar 131752 watermarking was dynamic meaning thatrepparttar 131753 images themselves were unwatermarked andrepparttar 131754 watermarking was applied whenrepparttar 131755 browser displayedrepparttar 131756 images. What this meant was that by stealingrepparttar 131757 images fromrepparttar 131758 server,repparttar 131759 thieves were able to take unwatermarked images.

There is a way around this and something like Strong Arm from www.liquidfrog.com can help by taking invisible watermarks or copyright information and embedding it directly intorepparttar 131760 image. Being able to positively identify a file on someone else’s website as belonging to you can be a strong persuader in making them remove your content from their site even if they feel they’ve bought it legitimately. By proving ownership of a file you can bring a large amount of pressure to bear and save yourselfrepparttar 131761 legal costs of issuing a cease and desist notice.

So far we’ve looked mainly at ways of preventing image theft. What if your site contains document files or exe files that you make available for download perhaps? How do you prevent them from being stolen? Including a copyright in a text document is something that everyone should be doing but it’s very easy to remove that and claimrepparttar 131762 work as your own. Givenrepparttar 131763 fact that you are allowing people to take these files from your site, you should be including a way of identifying them so that, if you see them on another site, you can prove ownership. Again something like Strong Arm can help.

Finally, having done what you can to preventrepparttar 131764 theft of your data, you need to check regularly that your web site is still secure and that your file protection systems are working. You also need to check whatrepparttar 131765 current trends are for data security by making sure you understand whererepparttar 131766 latest threats are coming from. Atrepparttar 131767 moment China and Russia arerepparttar 131768 two major culprits but this will probably change over time as less advanced countries come up to speed. New ways of stealing data are always just aroundrepparttar 131769 corner and you need to be one step aheadrepparttar 131770 whole time. It’s only by keeping on top of it that you can effectively preventrepparttar 131771 data you’ve bought and paid for being stolen!

John Miles is a security consultant and programmer. He deals on a daily basis with threats to web site security. With ten years in the computer industry he has seen the damage that can be done to a business by the theft of its intellectual property from a website.


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use