jQuery Ajax Development   Released in January 2006, jQuery is a cross browser compatible fast and concise JavaScript library which makes it easy and shortens various development process such as animations, communications with server, transferring of documents and handling of event. In fact, jQuery is the most popular JavaScript library in use these days. On the other hand Ajax is a web application framework which helps to create web applications. jQuery is capable to integrate Ajax interactions for rapid web development. Together jQuery and Ajax are compiled with many features; as a result currently Ajax jQuery development is one of the highest demanding needs ofRead More →

Google Sitemaps   Google Sitemaps are XML files that list the URLs available on a site. The aim is to help site owners notify search engines about the URLs on a website that are available for indexing.   Webmasters can include information about each URL, such as when it was last updated and its importance in the context of the site.   A site map (or sitemap) is a list of pages of a web site accessible to crawlers or users. It can be either a document in any form used as a planning tool for web design, or a web page that lists theRead More →

Sitelok Plugin   The Password Sentry Sitelok Plugin is a great case example of how easy it is to integrate Password Sentry into third party applications. Sitelok is a powerful PHP / MySQL based membership software script that allows you to password protect pages to create members only areas on your website. We partnered with Sitelok in 2015 in a cross-promotional partnership. Password Sentry is an excellent fit for Sitelok to protect their password protected members areas from password sharing.   Sitelok was quick to develop a plugin: Password Sentry Plugin. It is a FREE plugin for Sitelok end-users: although one requires a purchased PasswordRead More →

Password Sharing Password sharing is a problem with any website which allows users (members) to login. It is especially true with paysites where users purchase access. Adult websites, in particular, are prone to password sharing which can be very expensive in terms of bandwidth and lost sales. Sharing of passwords usually results from two actions:   An existing member shares, trades, or sells his password to other person(s). Less common and less a problem since they typically share their password to a select small group of people like friends. Nevertheless, it which results in lost sales.   A second method is used by individuals (hackers)Read More →

Captcha Form Protection   What is Captcha? Captcha is a backronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”. It is is a type of challenge-response test used in computing to determine whether or not the user is human. The purpose of Captcha is to deter hackers, spammers, etc. from using software to auto-submit forms. For example, to spam message boards, blogs, etc. The person is presented with a challenge to which the person must respond correctly. For example, in its earliest and simplest implementation, a graphic is displayed which contains a random selection of letters and numbers. The person mustRead More →

Social Media Traffic Building   In an earlier Blog article, I discussed traffic building in terms of building a better website. Now that you have built a better website, you need to get it on people’s radar. Word of mouth advertising is great and often underestimated. However, you need to first get a crowd forming around your website. You could purchase advertising, but there is a free alternative: social media traffic building.   Social media is great venue for promoting your website: on your Facebook wall and Facebook page, YouTube Channel, Twitter Feed, LinkedIn Profile and Feed, Blogger blog, etc. There are so many. YouRead More →

Secure Form Validation   It is of critical importance to ensure that your forms are secure and safe. Secure in that surfers cannot enter data which can harm or exploit your server. There are two levels of security: client-side and server-side. Let’s first discuss client-side.   In the case of client-side, you use the browser (using client-side JavaScript) to catch simple failures like mandatory fields that are empty, or catch invalid input (e.g., non-numeric input when you are collecting numeric data). You can find an abundant number of examples just by Googling ‘jquery form validation’. This is your first line of defense. These client-side securityRead More →

Optimize Alt Text   One area where web designers and search engine optimization (SEO) professionals usually butt heads is over the use of images as text instead of actual plain text, usually done in the navigation or other important elements of a website. This can cripple an SEO implementation by limiting the effectiveness of elements that could have been textually based, as text is much more effective for interlinking. This is just one area where image alt text can be very useful.   Alt text — which are found in the “alt” portion of image tag — allows you to add a short descriptor ofRead More →

Block Hotlinking   What is hotlinking? Hotlinking (= bandwidth and intellectual property theft) refers to direct linking to a website’s files (images, video, etc.). An example would be using an <img> HTML tag to display an image you found on someone else’s webpage so it will appear on your own website, blog, forum message, etc. The most common solution is to add Rewrite lines to .htaccess file in images directory to check Referer. Only display images if referrer is from certain domains. Old school, ineffective, and easy to cheat. For one, it is common for browsers to not pass referrer (for example, under certain browserRead More →

Website Password Protection   The typical and most common method to password protect a website directory is Basic Authentication. What is Basic Authentication? It is the more common method to password protect a directory. HTTP Basic Authentication (BA) implementation is the simplest technique for enforcing access controls to web resources because it doesn’t require cookies, sessions, or login pages. Rather, HTTP Basic Authentication uses standard fields passed by the browser. You authenticate via browser popup, and then the same credentials are automatically passed to the web server every time you request a resource (image, video, web page, etc.) in the password protected directory.   ThereRead More →