Maintain your old Siemens Hipath system

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. You and I, my friend, are victims of software piracy that accounted for over $24 BILLION dollars in lost revenue over the last two years*. There are so many ways people can get your product for free these days. If we continue doing nothing we will lose even more money this year as potential customers become more and more aware of just how easy it is to obtain digital products without paying for them.

The question is, why do we put up with this? When we sell our downloadable products they are being easily and freely distributed (read: STOLEN) by the very same people that we are trying to get to purchase. And don't be fooled, this still occurs very regularly today even though a lot of us take precautions against it. This confirms that people want our products, they just don't want to pay for them ?because they don't have to. In fact, 70% of potential customers won't if they can get it for free*.

We know the ideal scenario; what's supposed to happen. Consider Bob Jones and his knot tying eBook, "Scoutmaster Bob's Guide To Knots". Bob uploads his eBook to his web server and creates a sales link to sell it, and this sales link goes through to his payment processor. After the order is placed the customer is redirected to the download page, or "Thank-You" page, in order to automate the delivery process.

Now Bob figures he's all set up and starts his massive promotion efforts. He spends lots of time and money getting people to visit his site and convinces them to place an order because it really is a great product. So, the customers place orders via the sales link then are redirected back to the download page automatically to get what they've paid for. Perfect automated system, right? Sorry Bobby, in a perfect world maybe. But here's what really happens.

"Back Door" #1:

Our boy Bob sets up a sales link, a download redirection link (where people go after successfully ordering) and spends time and money promoting his site. People come and visit his web site and feel that they could really use such an extensive knot tying resource and want a copy of it. A couple people place orders and Bob is happy. Because Bob has created such a great product they tell their friends about Bob's eBook. But instead of telling their friends to check out Bob's web site they simply email them a copy of the actual eBook. Why not, it doesn't cost Bob any money right? Those people then tell their friends, who tell their friends, who tell their friends. A couple of weeks later Bob's knot tying eBook is in the hands of hundreds, even thousands of people?for free. And this is just the first "back door".

There are three (3) "Back Doors" that people use regularly to easily obtain free access to your product:

  • Back Door #1: Get a copy via email, newsgroups, forums, eBay, MSN, ICQ, ... whatever

  • Back Door #2: Get refunded and keep the product

  • Back Door #3: Locate the download page without paying

And here's another scary fact: For every 10 copies downloaded, 4 of those are stolen*. How lightly would you take it if you sold a tangible product, like a t-shirt, and only 6 out of ten t-shirts that left the store were paid for? These are lost sales and income forgone, there's no more blunt way to put it. If you can guarantee that the only way they can get your product is through your payment process you've just stopped that leak and increased your profits.

But right now online merchants have no idea who is really downloading their products, or what happens after the downloaded. They lose total control of its distribution. Some thieves/weasels/snakes ?whatever you want to call them? even go so far as to sell stolen software and eBooks as their own for a greatly reduced price. This is probably the greatest risk to selling a digital product, and if you ask anyone that's been doing it for a while they will have experienced this nightmare first hand. The people out there that do this are much worse than one guy that just gets your product for free. These people distribute hundreds or thousands of your product and you don't see a cent of it. They saturate the market and decrease the value of your product, until it's virtually worthless. They have to be stopped.

"Back Door" #2:

Back to Bob. There is another big problem for Bob when it comes to protecting his eBook. He doesn't know that many payment processors promptly, and without hesitation, honor each and every refund request, no questions asked. Seriously?no questions at all, one simple email is all it takes. There's usually no need for the customer to explain anything, just that they would like a refund. They will get their refund right away and the you, the merchant, don't have a say in the matter at all. And you guessed it, they get to keep the product, for free. There is no requirement to return the product like with a traditional refund, since there's no way to be sure the product was really deleted. Imagine the absolute uproar brick-and-mortar merchants would be in if customers were allowed 100% unconditional refunds on request, and the customer gets to keep the shirt, vacuum cleaner, DVD player, or whatever? Ridiculous right? But it happens to online merchants like Bob every day.

"Back Door" #3:

Lastly, Bob's uploaded product is also easily and regularly downloaded for free by potential customers right from his own web site. People can get to his download page in any number of ways. For example, open up Google. Type this into the search box: "thankyou.htm ebook download". Now go to the second and third pages. Here are some free products for you if you were the type to download copyrighted material without paying for it. Of course I'm not suggesting you do that, in fact I ask you NOT to download these products, just look at the thank you page to see that the "back door" is certainly easy to find. These people are just like Bob, and they work hard to create their web sites and their products. They are simply unaware of the kick-in-the-teeth they're taking by not protecting it.

Some conscientious merchants claim, "I'm safe, I protect my download location with a third-party tool that creates my download location on the fly." This is a false sense of security and it only blocks one back door. Basically this protection method simply hides the download location, but the product is still just as susceptible to being freely distributed after the download. And it can still be kept if a refund is issued. This is equivalent to the banks simply hiding all the money instead of putting it in the bank vault.

So how are online merchants like Bob, and you, and me supposed to stay afloat? As it is now, the only way to turn a profit is to rely on people's goodwill in hopes that they will do the right thing. And be content in the fact that some people don't know how easy it is to get online products for free, so these people actually pay for the product. So, if you think about it, within this system it's pure luck that anyone actually pays for a digital product.

But there is hope. There is a real way to stop all types of thieves and freebie-seekers. We must protect the product itself with unique identifiers and access codes for each customer. And until more of us become wise to this one simple truth rampant software and eBook piracy will continue to plague online merchants.

* - average 40% worldwide software piracy rate for 2001 & 2002, and dollar losses totaling $24.05 billion, based on intensive studies by the Business Software Alliance, and the report - "Quantifying Online Downloading of Unlicensed Software : Survey of Internet Users for BSA - May 29, 2002"

About The Author

Shawn Pringle is the owner and founder of the Virtual Vault digital product security system. Read his story and how he fought back at Email him at

In The News:

Three British men being held in Taliban custody
Sat, 01 Apr 2023 17:48:00 +0100
Three British men are being held in Taliban custody in Afghanistan - including so-called "danger tourist" Miles Routledge who returned to the country after being evacuated by British armed forces less than two years ago.

Yoghurt thrown over women in Iran for not covering their hair
Sat, 01 Apr 2023 16:34:00 +0100
Two women in Iran who went into a store while not fully covering their hair had yoghurt thrown over them by a man, in an incident captured on video.

Women to be prosecuted 'without mercy' for not wearing veils, says Iran
Sat, 01 Apr 2023 11:45:00 +0100
Women will be prosecuted "without mercy" if they are seen in public without a veil, Iran's judiciary chief has warned.

Pope jokes as he leaves hospital after three-day stay
Sat, 01 Apr 2023 09:37:00 +0100
Pope Francis joked "I'm still alive" as he left hospital following treatment for a respiratory infection.

12 killed in crush during free food handout
Sat, 01 Apr 2023 13:18:00 +0100
Twelve people have died in a crush in Pakistan while attempting to collect free food during Ramadan.

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More