by Larisa Thomason,
Senior Web Analyst,
Disable Right Click
Betrayed By The Cache
Disabling the right mouse button rarely stops thieves, but it does cause problems for people who want to click their right mouse button for perfectly innocent reasons. They're confused and annoyed when the browser and mouse don't work like they expect. You may also intrigue them into finding a way to circumvent your protections.
"What are they hiding that's so interesting?" visitors ask themselves - and decide to find out.
Hiding And Formatting Code
Fortunately, there are more reliable ways to hide important code and make image files less attractive to thieves.
Source code presents the hardest problem. There's really no easy way to keep someone from copying all or part of your source code. However, you can make your code more difficult to copy.
Yes, these files are also saved to the browser cache file, but you force the thief to make the extra effort of finding the exact filenames and opening them.
- Unreadable code. You can make source code virtually unreadable by deleting spaces, line breaks, etc. Not many people have the patience or ability to comb through a page's source code that's all on a single line or two.
After you change the page, be sure to verify the integrity of the code using HTML Toolbox. When you're deleting line breaks and spaces, it's very easy to accidentally delete part of HTML tags or even page content! Bad HTML code can cause browser compatibility problems bad enough to break pages completely in some browsers.
Always keep a local copy of the page's source code before you play around with it. Since your goal is a page impossible for humans to read, you'd better keep the original available in case you need to update and maintain it.
- HTML Code Protection Software: These programs encrypt your HTML code. Visitors may be able to view the source code, but it appears as gibberish. You can view the real code using the encryption software. Research the different products and compare prices by searching on "HTML code protection" in your favorite search engine.
Before you go to all this trouble, ask yourself this question. Are you really sure that you want to make your code off limits to others?
You might be better off at garnering goodwill and increasing visitors to your site if you do something similar on your page. Even if only a few people link to your site, they may give you a boost in your link popularity score.
Protecting Image Files
Copying a few lines of code is one thing, but image theft is really serious. Many artists and Web designers post their work to sell it online. When people steal the image files and use them on other sites without attribution and without paying for them, the artists are deprived of both publicity and profit.
Fortunately, the methods to protect images are more reliable than those used to hide code.
- Text Watermarks. Use a text watermark to put copyright information over the image. Visitors can view the image through the watermark, but they wouldn't want to use it on their own sites. When someone purchases an image, send them a clean copy without the watermark.
About.com has a short tutorial that describes how to add a text watermark in Photoshop. You can also buy standalone programs to add visible watermarks to your images.
- Digital Watermarks embed identifying information in the image file. It can be an identification number, author information, or any other data that makes the image unique. People don't see the information on the Web page, but you can identify it using graphic program plug-ins or decoding programs. This doesn't keep people from using your images, but it does make the images uniquely identifiable should they be stolen.
Open your favorite search site and search on "digital watermarks" to learn more about this process and the many manufacturers who produce watermarking software.
Physical and digital watermarks give you the means to prove that someone has stolen your image files, but first you have to determine who is using them without permission.
Some sites make it obvious by using direct linking: they aren't just stealing your images, they're stealing your bandwidth too. You can also search for image files on many search engines. The thieves often don't even bother to rename stolen images so you can search for your image file names and descriptions.