What is linking ?Explain surface linking and deep linking?
Using hypertext, a link is a selectable connection from one word, picture, or information
object to another. In a multimedia environment such as the World Wide Web, such objects
can include sound and motion video sequences. The most common form of link is the
highlighted word or picture that can be selected by the user (with a mouse or in some other
fashion), resulting in the immediate delivery and view of another file. The highlighted object
is referred to as an anchor. The anchor reference and the object referred to constitute a
hypertext link.
Deep linking is a tool used by websites to point a visitor directly to a page within the
website instead of the landing page or front page of the site. Deep linking allows visitors
to go directly to the information they require, which may be available on a certain page
of the website, but not on the web page to which the basic link leads. Businesses
participate in deep linking through search engines so that they can guide visitors to what
they need quickly, as well as keeping the attention of the visitor in hopes that the visitor
will find the information, product, or service that he or she needs and not leave the
website because it was difficult to find that information on a different page. Deep linking
is also an excellent way to take visitors directly to a product on a web page and not have
them go through multiple pages to find it, especially on a website that has numerous
products.
The process of deep linking is slightly controversial in the search engine world. While
some say it is an excellent way to get visitors directly where they want to go, others
counter that when visitors do not have to click through a website to find something, the
other parts of the website have lower impressions. Having higher impression rates is
important to many websites, especially those which have advertisements that either
sponsor the web pages, or lead to their own pages and products. This also poses a
problem to those who advertise on other websites that might be passed by when a deep
link is created to a page that is just past the one the company advertises on.
Example: Many library web pages contain links to other web sites. Librarians often want
to deep link into a site rather than having to include instructions on the library's web
page on how to navigate to the appropriate item. Not only does a deep link get the user
of the library's web page to the right place on the web but it also saves the user's time.
The deep link may also make it more apparent to the user why the link is included as
opposed to a link to the first page. For example, if the library wants to include a link to
Professor Lolly Gasaway's public domain chart, it makes much more sense to link directly
to it than to her personal homepage with instructions to scroll down to the courses she
teaches, click on "Intellectual Property" then "Other materials" then "Copyright" then
finally "Public Domain Chart."
Surface links which link to the homepage of another website
Framing of website
On a web page, framing means that a website can be organized into frames. Each frame
displays a different HTML document. This practice is useful for making headers and sidebar
menus that do not move when the content frame is scrolled up and down. It also
significantly decreases the hassle of maintaining a website. For example, if an item needs to
be added to the sidebar menu, only one file needs to be changed, whereas each individual
page on a non-frameset website would have to be edited if the sidebar menu appeared on
all of them.
Framing is a lot like linking in that you code a word or image so that it will connect to another Web
page when the user clicks on it. What makes framing different is that instead of taking the user to the
linked website, the information from that website is imported into the original page and displayed in a
special “frame.” Technically, when you’re viewing framed information your computer is connected to
the site doing the framing -- not the site whose page appears in the frame.
Problems with Frames. Frames are used to subdivide web pages into multiple parts. In
most cases, frames are used only to show multiple pages of content from the same site
at the same time. For example, frames could be used to divide a browser into two parts,
with one part containing an index for the web site and the second containing content
pages. While this type of use is perfectly legal, problems can arise if a frame is used to
show pages from two web sites at the same time. The use of frames in this way can
mislead the viewer of a site as to the creator of its content, possibly raising issues of
copyright infringement
Example 1: A dental website, Applied Anagramic, Inc. framed the content of a competing site. The
frames included information about Applied Anagramic as well as its trademark and links to all of its
Web pages. A district court ruled that the addition of the frame modified the appearance of the linked
site and such modifications could, without authorization, amount to infringement.
Example 2 :John starts a site devoted to auto racing news called John’s RacingVision. He offers a
number of links to racing industry Web magazines like Autosport, whose content he displays within a
frame on his site. When users click on “Read Autosport News,” for example, the content from the
Autosport site is displayed within John’s RacingVision website, in a frame. When the user reads
Autosport’s news, the user’s computer is still connected to John’s website, not Autosport’s.
Meta Tag
A meta tag contains meta data about the web page it is in. A meta tag will not affect the way the
page looks, and in most cases won't even be seen by the person reading the web page. But meta
data can contain useful information about the page that programs can use.
Meta data is data about data. In other words, it is information about the Web page that it is
currently on. Meta data is usually information that is more useful to programs and scripts than to
the customers reading the page. So, meta data is stored in meta tags that are hidden in
the <head> of the HTML document.
A special HTML tag that provides information about a Web page. Unlike normal HTML tags, meta
tags do not affect how the page is displayed. Instead, they provide information such as who created
the page, how often it is updated, what the page is about, and which keywords represent the page's
content
Cyber squatting with example
Cybersquatting is the purchase of a domain name in bad faith. Usually this is done with the intention
of reselling that domain name back to the legal copyright holder, although sometimes there are other
reasons. This is considered a violation of the trademark laws.
An example of cybersquatting would be if someone purchased the domain name "[Link]" and
then proceeded to attempt to sell it back to McDonalds. It would also be considered a violation of the
law if the purchaser put up a web site describing how bad McDonald's food was or commenting on the
service.
Cybersquatting was made illegal by the passage of a federal law in 1999 known as the Anti-
Cybersquatting Consumer Protection Act. The law became necessary because numerous large
companies were forced to pay large sums to buy their domain names from third parties. These
companies included such notables as Panasonic, Fry's Electronics, Hertz and Avon.
How do you know if a company is a victim of cybersquatting?
Type in a name that has been trademarked preceded by "www" and following by ".com", ".net" or
".org". If you get a valid web site which looks like it is related in some way to the domain name, then
there is no cybersquatting in effect (although this could be a simple trademark violation). However, if
you get one of the following results, then this could be a cybersquatter.
Can't find server
under construction
page with no relationship to domain name
Of course there could be a reasonable explanation for each of these results, so they do not always
mean there is cybersquatting occurring. It's a good idea to contact the domain name owner before
taking any legal action to find out what's going on.
How do you prove someone is cybersquatting?
The domain name registrants intention was to profit from your domain name in bad faith
Your trademark was in effect and widely known at the time the domain name was registered
The domain name is identical to your trademark
And you have actually registered the trademark
How do you know there is a bad faith intent? Well, there is probably no bad faith intent if one of the
following is true:
- domain name is the same as the person's name or nickname.
They are actually selling or intend on selling something on their web site
Does the web site owner actually have a legitimate use of the domain name? This would be, for
example, true for a company named "McDonalds Plumbing". They would have a legitimate reason for
owning the "McDonalds" domain name.
Some clues that cybersquatting is occurring include:
The domain name owner has put up a web site which in some way harms your company. For
example, if you had somehow purchased "[Link]" and created a web site about how AOL
provided terrible service, you are cybersquatting.
If the domain name owner never legitimately used the domain name and simply offered to sell it to
you, he is cybersquatting. If a person buys up a lot of names and has sold them over and over, there
is a pattern of cybersquatting.
If the domain name is the same as a very famous trademark, then it has a greater likelihood of being
considered cybersquatting.
What is Domain name?how it is registered?
Domain name is a unique address that can be used on the Internet.
It’s what you see in the address bar after the “www.” in your web browser and it’s what comes after
the @ sign in an email address.
Domain names consist of two parts. For example, in ”[Link]” the “.eu” represents what is known
as the top level domain (TLD) and “eurid” represents the second level domain and is the actual
name.
The same name, which can be up to 63 characters long, can be used with different TLDs, such as
.com, .org and .net. There are also country specific Top Level Domains, such as .fr for France and .de
for Germany. When a domain name is used in a web address, ‘www’ is usually put in front of it to
indicate that typing that name into your web browser will take you to a website. Domain name
holders can set up a website with that address and also use it for email addresses. When you are a
domain
name holder you get to decide what is in front of the @-sign in the email address.
How it works
Each computer connected to the Internet has a unique IP address (IP = Internet Protocol). The IP
address consists of four sets of numbers, for example, [Link]. To be able to connect to any
given computer via the Internet you need to know its IP address, but because numbers are hard to
remember domain names are used instead. The domain name system (DNS) then´translates´the
domain name you entered into your browser into the correct IP address. This is done automatically
and you as a user need not worry about it
Every domain name has a suffix that indicates which top level domain (TLD) it belongs to. There are only a
limited number of such domains. For example:
gov - Government agencies
edu - Educational institutions
org - Organizations (nonprofit)
mil - Military
com - commercial business
net - Network organizations
ca - Canada
th - Thailand
Register a Domain:
Fill a registration form to order a domain name .
Search if your desired domain name is available. If the domain name is not already
registered by somebody else, it is considered to be available for registration.
Once name is chosen, the next step to register domain would be to give your name and
contact information to us.
If you do not have webhost's DNS server names at time of registration, Domain Name
Servers are provided required by InterNIC for a successful registration. . (The Internet
Network Information Center, known as InterNIC, was the Internet governing body primarily
responsible for domain name and IP address allocations from 1972 )
Notify you by email with the InterNIC confirmation of your new domain name.
You will receive an email renewal notice from us 180 days prior to the end of the
registration term you selected (1 year, 2 years, 3 years, 5 years or 10 years).
Fair use
In essence, fair use is a limitation on the exclusive rights of copyright holders. The
Copyright Act gives copyright holders the exclusive right to reproduce works for a
limited time period. Fair use is a limitation on this right. A use which is considered
"fair" does not infringe copyright, even if it involves one of the exclusive rights of
copyright holders. Fair use allows consumers to make a copy of part or all of a
copyrighted work, even where the copyright holder has not given permission or
objects to your use of the work
There are no clear-cut rules for deciding what's fair use and there are no
"automatic" classes of fair uses. Fair use is decided by a judge, on a case by case
basis, after balancing the four factors listed in section 107 of the Copyright statute.
The factors to be considered include:
a. The purpose and character of the use, including whether such use is of a
commercial nature or is for nonprofit educational purposes -- Courts are
more likely to find fair use where the use is for noncommercial purposes.
b. The nature of the copyrighted work -- A particular use is more likely to be
fair where the copied work is factual rather than creative.
c. The amount and substantiality of the portion used in relation to the
copyrighted work as a whole -- A court will balance this factor toward a
finding of fair use where the amount taken is small or insignificant in
proportion to the overall work.
d. The effect of the use upon the potential market for or value of the
copyrighted work -- If the court finds the newly created work is not a
substitute product for the copyrighted work, it will be more likely to weigh
this factor in favor of fair use.
Courts have previously found that a use was fair where the use of the copyrighted
work was socially beneficial. In particular, U.S. courts have recognized the
following fair uses: criticism, comment, news reporting, teaching, scholarship,
research and parodies. In addition, in 1984 the Supreme Court held that time-
shifting (for example, private, non-commercial home taping of television
programs with a VCR to permit later viewing) is fair use.
Although the legal basis is not completely settled, many lawyers believe that the
following (and many other uses) are also fair uses:
Space-shifting or format-shifting - that is, taking content you own in one
format and putting it into another format, for personal, non-commercial use.
For instance, "ripping" an audio CD (that is, making an MP3-format version
of an audio CD that you already own) is considered fair use by many
lawyers.
Making a personal back-up copy of content you own - for instance, burning
a copy of an audio CD you own.
Discuss IT Act 2000?how is the authentication of the
document done?
The Information Technology Act 2000 (ITA-2000)(IT ACT) is an Act of the Indian Parliament (No 21
of 2000) notified on October 17, 2000.
IT act 200 provides legal recognition for transaction carried out by means of electronic data
interchange and by electronic communication which is commonly refered to as “E-commerce”.It
involves the use of alternatives to paper based methods of communications and storage of
information ,to facilitate electronic filing of documents with the govt agencies.
It will extend to whole of India and same as otherwise provided in this Act,It applies to any offence or
contravention there under commited outside India by any person.
The Information Technology Act, 2000 is India’s mother legislation regulating the use of
computers, computer systems and computer networks as also data and information in the
electronic format. The said legislation has provided for the legality of the electronic format as
well as electronic contracts. This legislation has touched varied aspects pertaining to
electronic authentication, digital signatures, cybercrimes and liability of network service
providers. Consequently, the Government of India tabled the Information Technology
Amendment Bill, 2006 before both the houses of Parliament in December, 2006, which
referred the said amendment bill to the Parliamentary Standing Committee on Information
Technology. Way back in 2007, the Standing Committee had recommended that the entire
menace of cyber terrorism needs to be addressed with a strong [Link] examining the said
recommendations, the Central Government brought the Information Technology Amendment
Bill, 2008 in Parliament, which got passed by both the houses of Parliament.
IT Act is considered in following areas:
E-mail: Companies and individuals should be very careful while sending e-mails,as these e-
mails could be the basis for launching a litigation in a court of law
Digital Signature:It means authentication of any electronic record by a subscriber by means
of an electronic method or procedure.
Electronic record:It means filling of any form,application with any office office or
appropriate govt in a particular manner.
The following are its main objectives and scope:-
1. It is objective of I.T. Act 2000 to give legal recognition to any transaction which is done by
electronic way or use of internet.
2. To give legal recognition to digital signature for accepting any agreement via computer.
3. To provide facility of filling document online relating to school admission or registration in
employment exchange.
4. According to I.T. Act 2000, any company can store their data in electronic storage.
5. To stop computer crime and protect privacy of internet users.
6. To give legal recognition for keeping books of accounts by bankers and other companies in
electronic form.
Scope
Every electronic information is under the scope of I.T. Act 2000 but following electronic transaction
is not under I.T. Act 2000
1. Information technology act 2000 is not applicable on the attestation for creating trust via
electronic way. Physical attestation is must.
2. I.T. Act 2000 is not applicable on the attestation for making will of any body. Physical
attestation by two witnesses is must.
3. Attestation for giving power of attorney of property is not possible via electronic record.
Advantages of I.T. Act 2000
1. Helpful to promote e-commerce
• Email is valid
• Digital signature is valid.
• Payment via credit card is valid.
• Online contract is valid
Above all things validity in eye of Indian law is very necessary. After making IT act 2000 , all
above things are valid and these things are very helpful to promote e-commerce in India .
2. Enhance the corporate business
After issuing digital signature, certificate by Certifying authority, now Indian corporate business
can enhance.
3. Filling online forms :-
After providing facility, filling online forms for different purposes has become so easy.
4. High penalty for cyber crime
Law has power to penalize for doing any cyber crime. After making of this law, nos. of cyber crime
has reduced.
Digital signature
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.)
is authentic. Authentic means that you know who created the document and you know that it has not been
altered in any way since that person created it.
Digital signatures rely on certain types of encryption to ensure authentication. Encryption is the process of taking
all the data that one computer is sending to another and encoding it into a form that only the other computer will
be able to decode. Authentication is the process of verifying that information is coming from a trusted source.
These two processes work hand in hand for digital signatures.
There are several ways to authenticate a person or information on a computer:
Password - The use of a user name and password provide the most common form of authentication.
You enter your name and password when prompted by the computer. It checks the pair against a
secure file to confirm. If either the name or password do not match, then you are not allowed further
access.
Private key encryption -Private key means that each computer has a secret key (code) that it can
use to encrypt a packet of information before it is sent over the network to the other computer.
Private key requires that you know which computers will talk to each other and install the key on
each one. Private key encryption is essentially the same as a secret code that the two computers
must each know in order to decode the information. The code would provide the key to decoding the
message. Think of it like this. You create a coded message to send to a friend where each letter is
substituted by the letter that is second from it. So "A" becomes "C" and "B" becomes "D". You have
already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes
it. Anyone else who sees the message will only see nonsense.
Public key encryption - Public key encryption uses a combination of a private key and a public key.
The private key is known only to your computer while the public key is given by your computer to
any computer that wants to communicate securely with it. To decode an encrypted message, a
computer must use the public key provided by the originating computer and it's own private key.
The key is based on a hash value. This is a value that is computed from a base input number using
a hashing algorithm.
Digital certificates - To implement public key encryption on a large scale, such as a secure Web server might
need, requires a different approach. This is where digital certificates come in. A digital certificate is essentially a
bit of information that says the Web server is trusted by an independent source known as a Certificate
Authority. The Certificate Authority acts as the middleman that both computers trust. It confirms that each
computer is in fact who they say they are and then provides the public keys of each computer to the other.