• Now They Signed Up – Learn How To Keep Them

    Date: 2011.02.22 | Category: General | Response: 0

    Member retention is going to have a large effect on the adult industry over the next few months, with Visa chargeback rates being lowered and, many affiliate programs lowering their payout model something has to give and, hopefully, the thing that does give will be that affiliate programs start to realize that once they have your surfer, it becomes their responsibility to make that member retain.

    With that in mind this article will look at a few things that we have been doing on some of our paysites for the last few months and, instead of having to provide an excess of plug in content we have started updating our sites regularly within the niche confines of what our members are actually looking for, also, despite this increase in content, we have started doing something unique so far as member retention goes – actually communicating with the member directly.

    Communication Pays.

    Actually spending the time to listen to what your members want can be beneficial on many levels for example, how many of the big sponsors offer the member a chance to become involved in a ‘community’ inside their paysites, i can only think of 3 paysites that i have personally visited that do this.

    Often, offering your members a way to communicate to YOU what they want inside the site can, and usually will increase the value of their membership to you in the long run. offer your members weekly polls, offer them incentives to keep an active membership, perhaps some kind of loyalty program, in addition to a method of your paysite members being able to communicate to each other inside your site.

    Content Updates.

    We all know that paysites need to update however, how many paysite owners spend the time to ask their member what they are looking for? As mention in the previous section, offer your members polls on the next updates you will be doing, ask them what sections of the site need improving and, more importantly, ask them if they are happy with how your site looks and feels overall.

    Renewal Time.

    So you have managed to keep hold of your paysite member for a few days without them canceling and, their trial period is ending what now? Well, more often than not, communicating to the member that they are about to get rebilled can have a positive effect, send them an email prior to the rebill informing them of what your next set of updates will be, let them know they are a valued member of the site and, more importantly than this, that you are there to help them and listen to their suggestions. This is also an ideal time to remind them of why they joined your site in the first place, you have a lot of exclusive content that, simply put, no other paysite can offer them, you listen to their feedback and, again, value their feedback, all of these things will ensure that your member base retains well over the trial period.

    Second Month Renewals.

    So you have managed to keep your member for a month, and, again they are due a rebill, as with the first rebill you gave them, re-iterate the points of your site and, tell them what has changed over the past month, give them some sales speak about how your site is doing and, more importantly, what you have coming next month, by communicating these updates to your members a day or so before they have to renew, you should, in all honesty, keep their interest in your paysite and, more importantly, make more money from your members.

    So Your Member Cancels.

    Okay, so perhaps you managed to rebill your member for a few month or, perhaps they left after the trial period, what now? Simple, send them a follow up email, find out the reasons they cancelled their membership to your site and, see if you can offer them an alternative to stay, perhaps a reduced cost membership or, maybe even an alternative site altogether, if they entered your teen pay site and, were looking for amateur teen pics, even though you know you don’t have them yet, you will probably know of a site that does, tell this cancelled membership about this site and, get them to try it out, if you can match what the surfer is looking for to a site you own then you have a second chance at keeping their membership and, making money.

    Retention Overview.

    When all is said and done the one thing that is apparent so far as pay sites go is that a lot of them do not communicate with their members and build the sites they operate around what their members are looking for, we can all say we actually do this constantly but, how many of us really, hand on heart, can prove that they ask, listen and, more importantly, implement the feedback from their members base?

    Article written by Lee

  • Google – Manipulate Your Listings For More Traffic

    Date: 2011.02.22 | Category: Search Engine Optimization | Response: 0

    Google seems to be the Search Engine that everyone talks about almost on a daily basis however, far from being about search engine optimization and specifically about Google related SEO i wanted to touch on something new that, perhaps you would not have already thought about.

    Manipulating Google Traffic.

    So your site is already listed in Google but you want to increase the amount of traffic you receive, one way that we as a company have been successfully using for the last 18 months is that of manipulating the display of our clickable links in Google, how are we doing this? Simple, using ASCII character codes in your meta tags.

    ASCII In Your Meta Tags.

    ASCII (American Standard Code for Information Interchange) it has been proven, when used in your HTML page Meta Tags will actually display not only letters and numbers but, symbols as well, as a webmaster this can give you a great advantage over how much traffic you can pull from your Google listings and, not only Google, a few of the other search engines also read ASCII code when it is found in your Meta Tags.

    Putting This To Use Practically.

    A good method of putting this to use would be utilizing in your Meta Tags as follows.

    <title>Site Name <ascii code here> page title</title>
    <meta name=”Description” content=”normal page description”>
    <meta name=”Keywords” content=”normal keywords”>

    This will display a search engine listing that not only has your site name on it as well as a description but, in the position where the ASCII code will appear you will also have an attention grabbing symbol enuring that your site stands out from all the others listed on the same search engine results page as yours.

    ASCII Meta Tags – An Overview.

    Hopefully you have seen how adapting your current HTML page Meta Tags by placing an ASCII character code within them can benefit you for gleeming further search engine traffic to your sites and, with this new found knowledge you may well place both your sites traffic and your bottom line profits ahead of other webmasters.

    Article written by Lee

  • What On Earth Is CGI?

    Date: 2011.02.24 | Category: WebDesign | Response: 0

    Let’s unlock a little bit of the mystery about something called CGI. If it helps any, CGI means Common Gateway Interface.

    This is a method which is used to swap data between the server (the hardware and software that actually allows you to get to your web site) and a web client (your browser). CGI is actually a set of standards where a program or script (a series of commands) can send data back to the web server where it can be processed.

    Typically, you use standard HTML tags to get data from a person, then pass that data to a CGI routine. The CGI routine then performs some action with the data.

    Some of the more common uses of CGI include:

    Guest books – The CGI routine is responsible for accepting the data, ensuring it is valid, sending an email acknowledgement back to the writer, perhaps sending an email to the webmaster, and creating the guest book entry itself.

    Email Forms – A simple CGI forms routine just formats the data into an email and sends it back to the webmaster. More complicated routines can maintain a database, send an acknowledgement and validate data.

    Mailing List Maintenance – These routines allow visitors to subscribe and unsubscribe from a mailing list. In this case, the CGI routine maintains a database of email addresses, and the better ones send acknowledgements back to the visitor and webmaster.

    A CGI routine can be anything which understands the CGI standard. A popular CGI language is called PERL, which is simple to understand and use (well, compared to other languages). PERL is a scripting language, which means each time a PERL routine is executed the web server must examine the PERL commands to determine what to do. In contrast, a compiled language such as C++ or Visual Basic can be directly executed, which is faster and more efficient.

    Okay, in a nutshell (and greatly simplified), here’s how it works:

    1) You (the webmaster) specify a form tag which includes the name of the CGI routine.

    2) You create HTML tags which retrieves data from your visitors.

    3) Each of the input tags includes a variable name. The data which is retrieved from the visitor (or directly set if the tag includes the “hidden” qualifier) is placed in the variable name.

    4) When the visitor presses the “submit” button, the CGI routine which was specified in the form tag is executed. At this time, the CGI routine “takes control”, meaning the browser essentially is waiting for it to complete.

    5) This CGI routine can get data from variable names. It retrieves the data and does whatever action is required.

    6) When the CGI routine finishes, it returns control back to the browser.

    Some important things to remember about CGI routines:

    You can install CGI routines on your own site if your host allows it http://www.webair.com is an example of a web host which allows for CGI routines. Some web hosts do not allow you to install your own routines but do provide some pre-written ones to you. If these are not sufficient for your needs, you can find a remote hosting service to provide the necessary functions.

    Generally, if you install your own routines they must be installed in the cgi-bin directory of your site. This is a special location which allows scripts and programs to be executed.

    CGI routines work best on Apache-style servers. Windows NT and Windows 2000 does support CGI, but it tends to be slow and problematic.

    If you use a remote hosting service, you must remember that although they appear to be giving you this for free, you are actually paying a price. Usually they want to display advertisements, although some of them actually take visitors away from your site.

    When you write a CGI routine, you have the choice of a scripting language like PERL or a compiled language such as C++ or Visual Basic. Anything which can execute on the web server is acceptable.

    I hope this short introduction to CGI has cleared up some of the mystery.

    Article written by Lee

  • Fighting Back Against Computer Viruses

    Date: 2011.02.22 | Category: General | Response: 0

    Only 10 years ago, the only way that a virus could have infected your computer was through you physically putting a floppy disk into your hard drive and running the program file that initiated the virus however, today’s viruses have become more complex in how they operate and, can spread like wild fire if they are not recognized as a virus doing damage not only to your computer but that of your associates and peers.

    So how do we minimize the risk of virus infection on our computers which, lets face it, for the Adult Webmaster are our livelihood and, need to be protected at all cost. This is what we will take a brief look at in this article, how to minimize the risk of getting a computer virus and, heaven forbid, how to deal with a virus if you actually have one on your machine already.

    Computer Viruses – A Little History.

    1981 – The first widely accepted computer virus is recognized. The ‘Elk Cloner’ virus was spread through floppy disks and, whilst by today’s standards, it was not a high risk virus it, non the less was still a virus, in fact, all this first virus did was to display a message on your computer screen.

    1991 – The ‘Tequila’ virus was the first recognized ‘polymorphic virus’ meaning, it was the first virus which actually altered its state once on your machine in order to remain undetected.

    2001 – 2001 saw the spawn of several highly potent ‘worm’ orientated viruses from the ‘Gnuman’ virus, the ‘LogoLogic Worm’ and the famed (is that the right word?) ‘Nimda worm’. These ‘worms’ were the first of their kind to actually spread themselves across the World Wide Web through infecting users email clients (specifically Outlook Express) and sending itself to every email address the infected machine had in the address book.

    Virus Infections – Prevention Better Than Cure.

    So we now have a little background on the main viruses over the last 20 years we will take a look at the ways in which we can prevent viral infections on our computers after all, as the subtitle for this paragraph says, a prevention is far better than having to find a cure.

    Here are a few simple ways you can help to prevent the spread and infection of computer viruses.

    1) Install a good anti-virus software package on ALL of your computers, Norton and, Mcafee, both have some good products to aid you in preventing viral infections of your PC. Also, you should ensure the software package you do install has updated virus definitions, a new virus is created almost every week so you need to ensure your software keeps up-to-date on the latest infections.

    2) Scan any and all email attachments you receive, irrespective of whether you know the sender or not, anything that you get sent in an email should be scanned, as mentioned above, there are complex viruses that can ‘send’ themselves from other peoples email address book, what happens if you are on the address book of an infected users computer? Can you afford not to be online?

    3) Ensure that, once you have an Anti virus program installed on your machine that you have it setup to start each and every time that your computer boots, the first thing that should be loading on your machine is an anti-virus program, you only have one chance to prevent infection.

    4) Avoid downloading .exe and .com files to your desktop unless, you know the person you are downloading the files from and, even then, before you launch or open the files ensure you scan them independently.

    Virus Prevention – Overview.

    Hopefully this article will have given you some insight into how you can protect both your computer and the computers of your associates and peers from computer viruses and, hopefully, by following the guidelines within this article your time spent online will be productive and virus free. One thing you should remember however is that no matter how hard we all try to remain virus free, someone will create a new program that ultimately, could infect our machines no matter how hard we try.

    Article written by Lee

  • Building A Surfer Trap – Stage 2

    Date: 2011.02.21 | Category: Traffic | Response: 0

    In the last tutorial we hopefully got the foundations of our surfer trap laid and in this stage, we will start to put this thing together.

    Ok the first step of stage two of building your surfer trap is to start linking each of the individual FPA’s to your Multi-Site FPA.

    The easiest way that I have found to do this is to give each FPA its own sub directory on your server and have the html page named index for each of the single site FPA’s.

    So for instance, if you have the site All Petite on your Multi-Site FPA you would link it to:

    mydomain.com/all-petite/

    Or whatever you called the sub directory for the All Petite single FPA.

    Now, once you have linked these single FPA’s to your Multi-Site FPA we need to start ‘playing’ with them once again.

    You should now have copy’s of your single site FPA’s and Multi-Site FPA on both your server and Hard Drive.

    Take the copy’s you have on your hard drive and add a small NICHE pop up console to each of the single site FPA’s AND the Multi-Site FPA.

    I would suggest making 6 NICHE consoles.

    These consoles should be pure text and nothing else.

    Each of the links on this small console should link to a different niche of your single site FPA’s I usually go with one link for each of the following niches…

    Gay
    Mature
    Teen
    Fetish
    Hardcore
    Asian

    Plus, I usually add a link at the bottom of my console which goes to the POTD program.

    Once you have these consoles built you should upload them to their OWN sub directory on your server, I would suggest calling this directory ‘consoles’ and calling each of the niche consoles the name of the NICHE they represent.

    So, you should now have the following on your HD and on your server:

    1 Multi-Site FPA
    50 or so Single Site FPA’s (All Linked From The Multi-Site FPA)
    6 Small Pop-Up Consoles (Popping Only One On The Multi-Site FPA and The Single Site FPA’s, each different niche Single Site FPA pops a different niche console however.)

    You now have to check that your surfer trap is working so far.

    Article written by Lee.

  • Over The Rainbow

    Date: 2011.02.24 | Category: General | Response: 0

    So why is the gay community over the rainbow? As promised today I’ll finish up on the symbols that are prevalent in the gay community. Last week I mention the Pink Triangle and it’s political emergence. And technically, the rainbow flag has a similar political beginning.

    I always love answering a question with another question (it is one of those annoying habits I have). So, when I am asked the “what does the rainbow flag stand for?” I look forward to the response when I ask, in turn, “what do YOU think it means?” Here are my top three favorite answers:

    1 – “It’s colorful and gay people like colors.”

    2 – “It’s a dance party thing”

    3 – “Judy Garland sang Over the Rainbow you guys loved her a lot.” (This has to be my all time favorite.)

    Well like any political symbol, it is a way to distinguish ourselves. But this time we look not to a place in history but we look at the world in general. No matter where you are, whether it is on 8th street in NYC or Rue du Champe in Paris, there will be a gay person somewhere. Now, some may argue that not all cultures and societies will have homosexual present. And I say, “BULL”. They are just in the closet somewhere.

    So in essence, gay men and women cross every racial and religious culture around the world. We come in all shapes, sizes and colors. So what better symbol to show that with than a rainbow, all colors coming together as one – as one community. No matter how culturally diverse our world is, the gay community is made up from a piece of each.

    The rainbow flag and the uses of the rainbow, in the gay community, are diverse. If you see it flying outside on a restaurant wall, and it means it is a gay or gay friendly establishment. See a set of rainbow rings around a friend’s neck, it’s gay fashion accessories. And see a political march with rainbows on posters and flags, it’s a gay assembly.

    Last week I insinuated that the pink triangle was not a symbol to over use in design. Well, in my opinion, the opposite is true with the rainbow and the rainbow flag. I am NOT saying run out and re do all your sites with rainbow backgrounds. No! But, I am saying that the nature of this political symbol is somewhat more flexible. We ourselves took the rainbow and made jewelry, publications, tee shirts and such. And just as the pink triangle, the rainbow will say that it’s ok to be here, you have friends inside or you have nothing to worry about here – be yourself, this place is for you.

    So what have we learned? What some people think as silly symbols that gay people use, actually have an origin – and, a potent origin at that. I still ask, for your own good, that you use them wisely and not over do it. The more you throw symbols around willy-nilly, the more people will think you do not know what you are doing. And the more that the surfers thinks that, the less likely you are to make the sale and get your business to grow.

    Article written by Gary-Alan

  • Redirecting Questionable Adult Traffic

    Date: 2011.02.24 | Category: 2257, Scripts | Response: 0

    The one thing almost all reputable adult webmasters agree on is that one way or the other, we want to rid the net of those webmasters that profit from traffic primarily gained from either the direct promotion of or, targeting of, keywords relating to child pornography however, how can you tell what traffic you are being sent and, more importantly, how can you do something about the type of traffic that you receive to your site in order to filter out this unwanted traffic? The answer is simple, use a script to redirect the traffic elsewhere before it even hits your site.

    Child Porn Redirection Php Script.

    The following php script when used on your server will enable you to send unwanted traffic gained by the promotion of using ‘illegal’ keywords in the search engines and sites which link to your own.

    <!– Start Copy Here –>

    <?

    // Redirect “Lolita” traffic

    $refer_full_path = “$HTTP_REFERER”.”$PATH_INFO”;

    if(( preg_match(“/lolita/i”, $refer_full_path)) ||
    ( preg_match(“/child/i”, $refer_full_path)) ||
    ( preg_match(“/preteen/i”, $refer_full_path)) ||
    ( preg_match(“/pre-teen/i”, $refer_full_path)) ||
    ( preg_match(“/pedo/i”, $refer_full_path)) ||
    ( preg_match(“/underage/i”, $refer_full_path)) ||
    ( preg_match(“/beast/i”, $refer_full_path)) ||
    ( preg_match(“/rape/i”, $refer_full_path)) ||
    ( preg_match(“/kinder/i”, $refer_full_path)) ||
    ( preg_match(“/incest/i”, $refer_full_path)) ||
    ( preg_match(“/kiddie/i”, $refer_full_path))) {

    header(“Location: $refer_full_path”);
    exit;
    }

    ?>

    <?
    $words=array(“childporn”,”underage”,”beast”,”interracial”,”lolita”,”preteen”);
    for($i=0;$i<count($words);$i++){
    if(eregi($words[$i],$HTTP_REFERER)){
    header(“Location: http://www.fbi.gov/?CHILD_PORN_ON_DISK_LOGGED_AND_REPORTED”);
    }
    }
    ?>

    <!– End Copy Here –>

    In order to use this script, simply add additional keywords or partial word matches to the top part of the script and, include the bottom half of the script at the top of your HTML coding.

    Any traffic being sent to your site via keywords which you have specifically told the script not to allow access to your web site will be forwarded to the url in the bottom part of the php script which again, can be changed to wherever you like.

    Article written by Lee

  • Everything You Need To Know About Meta Tags And More!

    Date: 2011.02.22 | Category: Search Engine Optimization, WebDesign | Response: 0

    Everything You Need To Know About Meta Tags And More!

    There’s a plethora of different META Tags that you can make use of on your site. Because there are so many, it’s impossible for me to cover all of them in this article. However, I will describe the most common ones. But let’s start from the beginning, shall we?

    What Are META Tags?

    META tags are similar to standard HTML tags. However, there is one big difference: You have to insert all META tags between the <head> </head> tags on your page(s). META tags are used primarily to include information about a document. The META tags will be invisible to your site’s visitors, but will be seen by browsers and search engines.

    For The Search Engines.

    Several of the major search engines make use of the META Keyword tag, and virtually all of them make use of the Description tag. These tags help the search engine spider determine the content of your web site so that it can be indexed properly.

    This is what they look like:

    <META name=”keywords” content=”Webmaster Resource Site”>
    <META name=”description” content=”Online Webmaster Resource Site”>

    You can also instruct the search engine robot/spider how to index your site using the robots META Tag. This is what it looks like:

    <META name=”robots” content=”noindex,nofollow”>

    What the tag above does is tell the spider not to index the page that it appears on, and not to follow the links on that page. Here’s a complete list of attributes for the robots tag:

    index – the default, the page is added to the search engine database

    noindex – the page is not added to the search engine database

    nofollow – the spider doesn’t follow the links on that page

    none – same as “noindex, no follow”

    To use any of these attributes simply replace the “noindex,nofollow” text in the example above with whatever you want to use. If you need to use more than one attribute, separate them with a comma.

    Client Pull.

    Have you ever seen a page that automatically refreshes to another URL after a few seconds? Did you ever wondered how it was done? I’ll tell you. The page made use of one of the http-equiv META Tags to automatically “pull” you to a different page after a few seconds. Here’s what the code looks like:

    <META http-equiv=”refresh” content=”1; url=newpage.htm”>

    The value of content denotes how many seconds will pass before the new page is called for. If you want it to happen as soon as a person hits that page, then set the value to “0”.

    Prevent Caching.

    If you want to prevent a page being saved in your visitor’s cache you can do so by inserting the following three tags:

    <META HTTP-EQUIV=”expires” CONTENT=”0″>
    <META HTTP-EQUIV=”Pragma” CONTENT=”no-cache”>
    <META HTTP-EQUIV=”Cache-Control” CONTENT=”no-cache”>

    Why would you want a page not to be cached? If your site is updated frequently and you always want your visitors to see the newest content/changes, or if you want to ensure that a new banner is loaded each time from your server when a page is accessed, you’ll want to use the tags above.

    A quick note here on banner caching: In addition to using the tags above, you’ll want to append random numbers at the end of the tag calling the image.

    Rating Your Content.

    By using the rating META tag on your site, you can specify the appropriateness of your web site for kids. The tag looks like this:

    <META name=”rating” content=”general”>
    In addition to the general rating, you can use three others. They are:

    mature

    restricted

    14 years

    Misc. Tags

    Below I’ve listed several other popular tags that you may have seen around the web.

    The generator META tag is used to specify what program was used to create your web site. Many HTML editing tools automatically insert this so that a company can gauge their market penetration. The tag looks like this:

    <META name=”generator” content=”program name and version”>

    The author tag is used to identify the author of a page. Simply replace “author’s name” with your name or email address.

    <META name=”author” content=”author’s name”>
    The copyright tag identifies the individual or company that holds the copyright to a particular page. This is what it looks like:

    <META name=”copyright” content=”This page and all its contents are copyright 2003 by Lee Windsor. All Rights Reserved.”>

    I hope this article gave you some insight into the usage of Meta Tags and how they can benefit your day to day business.

    Article written by Lee

  • The Web Safe Color Palette

    Date: 2011.02.24 | Category: WebDesign | Response: 0

    The “Web Safe” palette is a bit controversial. It is a set of 216 colors that are, supposedly, guaranteed to appear as intended on all graphical displays when used in HTML, CSS, and images embedded in Web pages. Many Web developers believe that sticking to these colors is one of the holiest commandments in the Web design scripture.

    This was mostly a concern when most computers had 8-bit color displays; these days, most people run at 16-bit or 24-bit color. Although these bit-depths render the Web Safe palette pointless, dithering and quantification bugs in browsers and operating systems still cause problems in 16-bit displays (16-bit display, also known as “High Color” mode or “Thousands of Colors,” is generally problematic). Extensive testing has led to a new palette, called “Really Safe,” whose colors are guaranteed to appear correctly on all displays and all browsers.

    If you use different colors than these, you might see images and backgrounds of the same color appear at a slightly different tint, so that a “box” will be visible around them if the background extends beyond the image’s edges.

    Below is the table of ‘Web Safe’ and ‘Really Safe’ colors, you will see some of the color hex codes are in red, these are ‘Really Safe’ colors.

    Code Color Code Color Code Color Code Color Code Color Code Color
    000000 000033 000066 000099 0000cc 0000FF
    003300 003333 003366 003399 0033cc 0033ff
    006600 006633 006666 006699 0066cc 0066ff
    009900 009933 009966 009999 0099cc 0099ff
    00cc00 00cc33 00cc66 00cc99 00cccc 00ccff
    00FF00 00ff33 00FF66 00ff99 00FFCC 00FFFF
    330000 330033 330066 330099 3300cc 3300ff
    333300 333333 333366 333399 3333cc 3333ff
    336600 336633 336666 336699 3366cc 3366ff
    339900 339933 339966 339999 3399cc 3399ff
    33cc00 33cc33 33cc66 33cc99 33cccc 33ccff
    33ff00 33FF33 33FF66 33ff99 33FFCC 33FFFF
    660000 660033 660066 660099 6600cc 6600ff
    663300 663333 663366 663399 6633cc 6633ff
    666600 666633 666666 666699 6666cc 6666ff
    669900 669933 669966 669999 6699cc 6699ff
    66cc00 66cc33 66cc66 66cc99 66cccc 66ccff
    66FF00 66FF33 66ff66 66ff99 66ffcc 66FFFF
    990000 990033 990066 990099 9900cc 9900ff
    993300 993333 993366 993399 9933cc 9933ff
    996600 996633 996666 996699 9966cc 9966ff
    999900 999933 999966 999999 9999cc 9999ff
    99cc00 99cc33 99cc66 99cc99 99cccc 99ccff
    99ff00 99ff33 99ff66 99ff99 99ffcc 99ffff
    cc0000 cc0033 cc0066 cc0099 cc00cc cc00ff
    cc3300 cc3333 cc3366 cc3399 cc33cc cc33ff
    cc6600 cc6633 cc6666 cc6699 cc66cc cc66ff
    cc9900 cc9933 cc9966 cc9999 cc99cc cc99ff
    cccc00 cccc33 cccc66 cccc99 cccccc ccccff
    ccff00 ccff33 CCFF66 ccff99 ccffcc ccffff
    FF0000 FF0033 ff0066 ff0099 ff00cc FF00FF
    ff3300 ff3333 ff3366 ff3399 ff33cc ff33ff
    ff6600 ff6633 ff6666 ff6699 ff66cc ff66ff
    ff9900 ff9933 ff9966 ff9999 ff99cc ff99ff
    ffcc00 ffcc33 ffcc66 ffcc99 ffcccc ffccff
    FFFF00 FFFF33 FFFF66 ffff99 ffffcc FFFFFF

    Hopefully, you will find a use for the two different color palettes that are now available and, you can begin designing for your surfers, regardless of which browser they use.

    Article written by Lee

  • Building A Surfer Trap – Stage 4

    Date: 2011.02.21 | Category: Traffic | Response: 0

    Building A Surfer Trap – Stage 4.

    Here we go with stage 4 in our surfer trap.

    We should now have a pretty basic surfer trap set up with consoles on all of the FPA’s all of the links on all of the FPA’s (Excluding the FPA graphics) should go to either another FPA or, the a POTD Program.

    As mentioned in the last stage we are going to start building up some traffic to our surfer trap even though, we are not finished yet.

    The first place where you can get some good free traffic would be from a toplist counter.

    A good counter that I would recommend would be one of the following:

    Outster http://www.outster.com (A Gay Specific Counter)
    SexTracker http://www.sextracker.com (A General Adult Counter)

    You need to sign up to ONE of the above counters and only ONE.

    Usually a counter will ask you for some details when signing up for them these will usually include:

    Email Address.
    Site Url
    Name

    For the email address, enter a REAL email.
    For Your Name, Enter a name you wish to be known by to the counter owners.

    However, for the URL (The one to SEND traffic to FROM the counter) you should enter the index.html page of your surfer trap (The Multi-Site FPA).

    You will now be given some coding once you complete the counter sign up process. This counter code you now need to place on EVERY page of your surfer trap.

    Place the counter towards the bottom of your FPA’s (Including the Multi-Site FPA) this way, they will load after the rest of the graphics or at least, they should in theory.

    Basically what you are doing by implementing this counter is as follows:

    For each time the counter is displayed or clicked on your site (Depending on the counter you choose) you will earn one credit on the respective counters toplist.

    Each credit you earn on the toplist will move you higher up the list.

    Now, the higher up the list you get, the more visitors to the counter site that you are going to get visiting your surfer trap by clicking your link on the toplist.

    In return, by clicking on your surfer trap link from the toplist, they are ‘registering’ another impression of your counter hence, getting you one more ‘credit’ on the counter toplist hence, moving you higher in the listings.

    See where we are going with this?

    The more clicks you get from the counter to your hub, the higher you will get on the toplist in the process earning you more and more traffic to filter through your surfer trap.

    Adding these counter codes to your FPA’s as they stand at present should take you an hour or so to do so, for now this is where I will leave the traffic generation section of this tutorial.

    Article written by Lee

Premium Sponsors















Categories

Site Links