Create Your Own Amazon Affiliate Links

Amazon Affiliate Featured Image

When it comes to links, which one of these would you rather have to deal with when setting up a link to an Amazon product in your web site code?

https://www.amazon.com/Untold-Truths-Internet-Marketing-Secrets/dp/1502742748/ref=sr_1_1?ie=UTF8&qid=1495669457&sr=8-1&keywords=untold+truths+of+internet+marketing

https://www.amazon.com/dp/1502742748/?tag=millisuccenet-20

Although both links will get you to the same product the second one is definitely much easier to work with.

In addition to being easier to work with, using an Amazon Affiliate Link is a good way to make some extra money when selling your products. Why? Because every time someone buys a product using one of your Affiliate Links, Amazon will pay you a small affiliate fee or commission. Therefore, when adding Amazon products to your website you will always want to use an Amazon Affiliate Link.

Amazon Affiliate Link Breakdown

Once you understand the structure of an Amazon Affiliate Link it will be really easy to create them in the future, so let’s breakdown the link structure into three key parts as shown in the diagram below.

Amazon Affiliate Link Breakdown

Part 1: is simply the first portion of an Amazon URL and is the same for all affiliate links – https://www.amazon.com/dp/

Part 2: is the ASIN or Amazon Standard Identification Number of a product and is unique for all products – 1502742748

Part 3: is a tag parameter followed by an Amazon Tracking ID – /?tag=millisuccenet-20

Finding Your Amazon Tracking ID

Before you can find your Amazon Tracking ID you have to logon to your Amazon Affiliate Program account.

Amazon Affiliate Program Signon

After you have logged in you should be taken to your Amazon Associates home tab. At this point you will want to mouse-over your Amazon Login ID and slide down to select the “Manage Tracking IDs” options to take you to the Tracking ID page as shown below.

Amazon Affiliate Link Listing

At this point you should see all of the Tracking IDs that you’ve created or at least a default one. Write down or Copy & Paste the Tracking ID you want to use for your Affiliate Link into a note or temporary file (e.g. millisuccenet-20.)

Finding An Amazon Products ASIN

Now that you know your Amazon Tracking ID you have to find the ASIN of the product you want to create an Affiliate Link for. Note: for books the ASIN may be listed as the ISBN under the product details, as shown in the image below.

Amazon Affiliate Product Page

Write down or Copy & Paste the ASIN you want to use for your Affiliate Link into a note or temporary file (e.g 1502742748.)

Creating Your Amazon Affiliate Link

Now that you have all the components to create your Amazon Affiliate Link all you have to do is assemble them and you are done. Just replace the ASIN number and TRACKING-ID in the default link structure below with your specific items and you are all set to go.

https://www.amazon.com/dp/ASIN/?tag=TRACKING-ID

Example ASIN = 1502742748
Example TRACKING-ID = millisuccenet-20

Resulting Amazon Affiliate Link is:

https://www.amazon.com/dp/1502742748/?tag=millisuccenet-20

The best part about this is that it will not just work for your products, it will work for ANY Amazon product that you want to be an affiliate for. Pretty cool!

Validating Your Amazon Affiliate Link

The last thing you want to do is create an affiliate link for a product that doesn’t work. Few things stink more on the web than clicking on a link that doesn’t work or takes you to something other than what you wanted. Fortunately, Amazon provides a Link Checker tool that allows you to validate the Affiliate Links you create.

From within your Amazon Associates account you will want to mouse-over the “Tools” menu option, then slide down and click on the “Link Checker” option as shown below.

Amazon Affiliate Link Checker

At this point you will need to Copy & Paste the Amazon Affiliate Link you created into the URL Link Entry Field and then press the “Check Link” button. If all goes well and you created a valid link, Amazon will return the message “Success. The link tags to a valid tag or sub-tag for your Associate ID” in green under your link.

You can now use this Amazon Affiliate Link you created on your website, in an Email, a blog posting, or any other way you can think of. And the best part about it is that every time someone clicks on your affiliate link and purchases the item from Amazon you are going to earn a commission.

Making a little “extra” income just got a little bit easier.

To Your Success!

Coloring Tips

Coloring Tips

When it comes to colors things aren’t just black and white. In fact some would even argue if those are colors, but that discussion is for another day. For now, we’re just going to talk a little about the color wheel and hopefully give you enough coloring tips to make your adult coloring journals amazing works of art.

The color wheel identifies three types of colors: primary, secondary, and tertiary. PrimaryColoring Tips - Coloring Wheel colors (Red, Yellow, and Blue – P in the color wheel) are true colors from nature and are used to create all other colors. Secondary colors (Orange, Green, and Purple – S in the color wheel) are created by mixing two primary colors. Tertiary colors (Red-Orange, Orange-Yellow, Yellow-Green, Green-Blue, Blue-Purple, Purple-Red) are created by mixing adjacent primary and secondary colors.

Half of the color wheel has “Warm” colors that are said to reflect passion, happiness, enthusiasm, and energy. The other half of the color wheel has “Cool” colors, which are said to give a sense of calm or professionalism. And finally we have the complementary colors. Complementary colors are directly opposite each other on the color wheel (Red – Green, Orange – Blue, Yellow – Purple, etc.)

Color Theory

Now in color theory you will also find these terms:

  • Hue – the actual color with its qualities of yellowness and blueness. Intensity is the degree of purity, or saturation of the color.The more intense a color, the more of the pure color is added.
  • Tint – formed when a color is mixed with white. The more white in a color the lighter the tint.
  • Shade – formed when a color is mixed with black. The more black added to the color the darker the shade.
  • Tone – formed when a color is mixed with grey.

By the way, it’s color theory that also defines the cool and warm colors we talked about earlier.

Color Schemes

Once you have a basic understanding of the color wheel and see how different color combination are formed, you can use one or more colors to create a color scheme.

  • Monochromatic Schemes –  single-color schemes; use one color and its variations for intensity and values. Neutrals colors are considered part of the monochromatic color schemes. Using this scheme, your drawings will look unified.
  • Harmonious Schemes – colors from the same side of the color wheel. Yellows and oranges, or greens and blues are two examples of harmonious combinations.
  • Analogous Schemes – composed of related color schemes; bring colors together that are beside each other on the color wheel. Even though this scheme is easy enough to accomplish, to avoid a flat overall drawing, use one or two light dominant colors and for the third one choose a darker shade as an accent. An example of this color scheme would be blue, blue-green and blue-violet.
  • Triadic Schemes – created using three colors (hues) all at the same distance from each other on the color wheel. An example would be blue, red, and yellow. Because these colors are unrelated you should use their tints and shades in order to avoid a harsh overall effect.

Keep in mind that in almost all cases, when choosing a color scheme, all colors are altered and combined to soften their impact and create a mood.

Coloring Tips

The cool thing about color is that what you like and we like, and everyone else likes, is not going to be the same. And since the adult coloring journal your drawing in is all yours, we suggest that you draw from your own experiences and decide on the colors you want to use for each of your drawings.

However, we do know that most people prefer to use colored pencils when coloring their drawings. One reason is because colored pencils offer a lot of versatility, enabling you to easily blend and shade colors. Another reason is that they typically don’t have the bleed through problem that felt-tip markers have. Of course you also have the option of using crayons, chalks, and paints. Although some of those tend to get a little messy and require drying time. WARNING: if you’re going to use something that will bleed through, make sure you put something in between your pages and also realize that you’ll probably not be able to use the item on the back side of the page you just used.

Shading

Our final coloring tip relates to shading. Shading allows you to add “dimension” to your drawings. Dimensions can be created by layering your colors or mixing different colors along the edges or corners of your drawing. Shading can also be added with dots or fine black lines before coloring with your pencils, or by using a darker color over a lighter area of the same color.

Creating Your Master Piece

When all is said and done, or colored, however you color in your drawings and whether you stay within the lines or not, is total up to you. Whether you use it to express how you’re inner most feelings, or to release built up tension from a stress filled day, or just to color, your adult coloring journal is yours and yours alone.  Each and every drawing you color is your master piece.

We hope you enjoy your journal and if you’re looking for more journals, or just other books in general, checkout our other books when you have a chance. And don’t forget to visit our coloring downloads page for some extra special stuff too!

Mobile Responsive Design Testing

Mobile Responsive Design Testing Tool

In order to help you determine how mobile-friendly your site is we’ve rolled out a mobile responsive design testing tool. The tool lets you see how your site design looks on different devices – from mobile phones and tablets, to different web browser window sizes.

The tool is really easy to use. Just enter the URL of a site whose mobile responsive design you want to test and then select one of two options: Width only or Device sizes.

Selecting the width only option will keep the height of all test areas the same, while the device sizes option will adjust the height of the test areas to more closely reflect the height of the device the test represents.

There’s no limit to the number of sites you can test, just keep entering in URL’s that you want to test. By the way, your site should fully function in each of our testing windows, so feel free to scroll around and check things out.

By the way, if you’re not sure why your site needs a responsive design, you might want to checkout our post Mobilegeddon: Google Mobile Friendly Update Arrives.

To Your Success!

WordPress Security Hardening

WordPress Security Hardening In 14-Steps

WordPress is an Open Source project that’s maintained by hundreds of people all over the world. Started in 2003 it has grown to be the largest self-hosted blogging tool in the world, used on millions of sites and seen by tens of millions of people every single day. Pretty amazing for something that started as a single bit of code and used by only a handful of individuals.

Security of the WordPress environment is extremely critical, considering the vast reach that WordPress has garnered today and the number of people who depend on it. That is why the open source community supporting WordPress takes security so seriously. And you should too!

What is Security?

When it comes to computers, the concept of security is somewhat of an oxymoron. As long as a computer is turned on, someone, somewhere, somehow is going to try to break into it. In fact, the computer doesn’t even have to have any important information stored on it at all. If it’s on a network, it’s useful to someone and that’s why he or she will try to compromise it.

So at the end of the day a secure computing environment provides a trusted environment that protects the privacy, integrity, and availability of the software and hardware being accessed by the end user. When it comes to WordPress this encompasses the front-end webpages, the core environment files, and the backend databases used to deliver a WordPress website.

Security Vulnerabilities

There are two main vulnerabilities that need to be secured: hardware and software. Other than your own personal computer there’s not much you can do when it comes to securing hardware, unless of course you own the servers, routers, and networks that your WordPress environment runs on. In most cases you will have to rely on your web host and broadband providers to secure the core pieces of this infrastructure.

Good hosting providers will backup your site and do their best to provide a secure shared environment, so that nobody else that’s using the same hardware that you’re on will be able to infect our environment. Two web hosts that we recommend are HostGator and HostMonster.

Don’t forget that we are an affiliate for both of these services and if you haven’t read it yet make sure you read our Affiliate Relationship Disclaimer just in case you use one of our recommendations.

Although your service providers will also have some key software to secure across all the hardware supporting you, your main responsibility is making sure your WordPress environment is secure. So lets look at some of the key things that you control when it comes to securing your WordPress environment.

Level One Security

The following security steps are pretty basic. They are easy to implement and don’t required you to do anything outside of WordPress itself. Doing these are a minimum when it comes to security and taking just these few simple steps will help push intruders away from your site and towards someone else’s.

1. Applying WordPress Updates

The easiest way to keep your WordPress environment secure is to make sure you’re applying WordPress updates in a timely fashion. WordPress is no different than any other software package…it has bugs, bad guys exploit the bugs, good guys patch the bugs, and the cycle continues.

Prior to version 3.7 end users had to manually apply WordPress updates on their own, which many administrators never got to. However, automatic updates were introduced in WordPress version 3.7 that improved the overall global WordPress install base by enabling the direct push of update patches to installed environments.

NOTE: by default only minor point releases (3.7.1, 3.7.2, etc.) are applied automatically. Major release updates (4.0, 5.0, etc.) still need to be manually applied.

2. Theme and Plugin Updates

It’s no secret that themes and plugins are what make WordPress WordPress. If it weren’t for these two features, most WordPress sites would look identical and lots of cool features wouldn’t exists. Therefore, it’s extremely critical that any themes and plugins you purchase (or get for free) are acquired from reputable sources.

The last thing you want to do is install a theme or plugin that undoes all the other security steps you take to protect your visitors and your site. Just like WordPress itself, make sure you’re always applying the latest theme and plugin updates provided by your theme and plugin vendors.

There’s plenty of free stuff out there, just make sure the free stuff is trustworthy and not going to cause you more headaches down the road.

3. Strong Usernames

One of the easiest ways to keep the bad guys out of your site and moving on to the next site is to use strong usernames in place of default usernames. When doing a basic WordPress install a default administrative user named “Admin” is created. Using this or “Administrator” is not what you want to do.

When creating admin accounts you want to avoid usernames that are easily guessed like the two mentioned above or Webmaster, or your name, company name, etc. If you really want admin in the username of the account, then create something like “Admin_Acme” or “Admin_JD” for John Doe’s admin account.

4. Strong Passwords

Another easy way to keep the bad guys out of your site and moving on to the next site is to use strong passwords. And by strong password we don’t mean Happy123. Strong passwords are things that are hard to guess and hard to hack by brute force.

Using numeric and alphabetic (upper and lower case) letters, special characters, no repeating characters, minimum lengths of 10-12 characters, nothing related to your name, birthday, company, dictionary words (in any language) is starting to put you in the realm of strong passwords. And if this makes it too hard for you to come up with a password, then try the old phrase technique.

Take a phrase like “The red fox runs in the forest to the river every Sunday afternoon.” If you take the first letter of each word, alternate each character between upper and lower case, and then change a couple letters to special characters you can come up with a password like: TrFrItF2tRe$A – which will be pretty hard to guess or attach by brute force.

5. Modify Your WordPress Nickname

Each username you create in WordPress is given a nickname and by default the nickname will be the same as the username. Unfortunately this can open up a security hole, because the nickname is used as the author tag on post that you write. Hackers use scrapper programs to roam the web looking for WordPress author tags, which they then use as the login username to your site in a brute force password attack.

Make sure you update each users profile and modify your WordPress Nickname to something different than the username. And when doing so make sure you select the “Display name publicly as” option. This option will make sure the displayed author tag on your posts is not your username.

6. Limit Login Attempts

One of the easiest security hacks to prevent against a live site is a brute force attack. This is where an attacker uses a known username and then just tries password after password to access the account. Unfortunately, limiting login attempts is often overlooked…just ask Apple who not long ago had a number of celebrity iCloud accounts hacked in this manner.

The best way to prevent a brute force attack is to use a plugin that’s designed to do just this…limit login attempts. One we use is called Login Lockdown by Bad Neighborhood. In addition to doing what it’s designed to do, it has a nice feature that allows you to “Mask Login Errors.” When you set this feature to “Yes” WordPress will generate a more generic error message when incorrect login information is entered; you won’t be told that the password only is in error when a valid username is entered. This makes it a little harder for an attacker to determine if they have a valid username or not.

NOTE: if you’re really paranoid and want to implement even more security on your website, then you’ll want to install the plugin Wordfence Security. Not only does this plugin allow you to control many more security related options on your site, it also has an interesting Live Traffic option that allows you to see who’s attacking your site.

7. Schedule Regular Backups

If you do nothing else, not even the basic security steps, then the most important thing that you must do is have a solid backup strategy; although this will always be suspect, if you don’t do the basic stuff too. There are plenty of plugins that do this, so find one you like and use it to schedule regular backups.

Also, don’t just rely on your web hosting service provide to backup your WordPress environment. Having them help you recover is not only harder, but will take much longer as well. Instead, schedule regular WordPress backups using the plugin of your choice and make sure you always keep your backup files in a secure location. And by regular we mean hourly, daily, weekly, or monthly – it really all depends on how often your content is updated.

By the way, a secure location is NOT the same location where your WordPress environment is installed. A more secure environment, for starters, is a directory on your web host outside your WordPress environment, while an even more secure environment is on a totally different web host all together. A secure cloud environment, your own PC, or a stand-alone storage drive can provide you with a simple offsite storage solution.

Level Two Security

Up until this point we have been addressing security within WordPress itself. Now we’re going to tackle some things outside of WordPress. These next set of tasks are not that difficult to implement and will go along way in security your setup. Don’t worry if you’re not comfortable with editing files on your server, just make sure you backup any files before you edit them and you’ll have a quick recovery plan in place.

8. File Permissions

It’s important to have all the files within your WordPress environment secured properly and the easiest way to do this is with file permissions. At a minimum the security permissions of all files from your root level on down should be set to 644 and all folders should be set to 755.

When it comes to file permissions it’s best to secure things as much as possible and only when you have problems should you reduce the security permissions of a file or directory. Also, be careful and suspicious of any themes or plugins that require write access to core files.

9. Basic .htaccess File Security

The .htaccess file is a directory-level configuration file that is supported by most all web servers. Its main purpose is to allow for decentralized management of web server configuration.

There are a couple of things that we are going to secure via some basic .htaccess file security and we will need to Copy/Paste these parameters either before or after the # BEGIN and # END WordPress tags:

# Begin Security Updates: copy/paste from here down

# BLOCK Directory Access
Options -Indexes

# STOP Access to Sensitive Files
# BLOCK wp-config.php File Access
<files wp-config.php>
order allow,deny
deny from all
</files>

# BLOCK Include-only File Access
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^wp-admin/includes/ – [F,L]
RewriteRule !^wp-includes/ – [S=3]
RewriteRule ^wp-includes/[^/]+\.php$ – [F,L]
RewriteRule ^wp-includes/js/tinymce/langs/.+\.php – [F,L]
RewriteRule ^wp-includes/theme-compat/ – [F,L]
</IfModule>

# End Security Updates: copy/paste from here up

The first BLOCK section will prevent people from browsing directories on your server and seeing files that they shouldn’t. The second BLOCK section will prevent people from accessing your wp.config.php file. And the third BLOCK section will secure your “wp-includes” from unwanted access. NOTE: on Multisite environments you will need to remove the third RewriteRule for things to function properly, however that will reduce your overall security a little.

NOTE: the .htaccess file is already protected and forbidden to browsers, as long as, the file is named properly. To be sure, double check that the file is named “.htaccess” and not “htaccess” or “htaccess.txt”. The file must start with a dot.

10. Secure Your wp-config.php File

When it comes securing your wp-config.php file there are a couple of schools of thought on this one. Some people believe that moving the wp-config.php has minimal security benefits and, if not done properly, it will actually introduce serious security vulnerabilities to your site. Others disagree with this concept, including us, and prefer to NOT move the wp-confi.g.php file.

Instead we prefer to implement the second BLOCK concept in the .htaccess file as mentioned in Step 9 above. Implementing this method will secure your wp-config.php file and deny access to anyone surfing for the file. This method will also limit any additional security vulnerabilities that might arise by moving the file to a different location on your server.

11. Changing Your Database Table Prefix

This change is best done when you are first creating a new WordPress environment. Although it can be done to a live site, it’s much riskier and you can really mess things up if you make a mistake. We won’t tell you how to change a live site here, but if you need to just drop our support team an email and we’ll send you some notes on how to do it…totally at your own risk of course!

When installing a new WordPress environment the prefix “wp_” will be used for your default database table_prefix. Since there are plenty of automated attack tools out there looking for this default setting, it’s best if you change it to something else when you performing your install. It doesn’t really matter what you change it to, just change it to something other than the default.

12. Disable File Editing

By default the WordPress Dashboard allows users with administrator privilege to edit standard WordPress, Theme, and Plugin PHP files. An attacker who is able to login to a site will often use this feature as an attack method, since it allows code execution.

In order to disable file editing from the WordPress Dashboard the following code can be entered into the wp-config.php file:

define(‘DISALLOW_FILE_EDIT’, true);

Be aware that since you won’t be able to edit files through the WordPress Dashboard anymore, if the need does arise to edit files, then your best bet will be to do it through your CPANEL File Manager.

13. Delete the readme.html File

By default WordPress creates a readme.html file in the root directory of your site install. Unfortunately this file can provide some useful information to snooping eyes about the version of WordPress you’re running. After successfully installing WordPress just go ahead and delete the readme.html file. And you may want to delete any similar files that get installed by themes and plugins too.

NOTE: it’s possible that this file gets recreated when you update your version of WordPress, so if you do not want to keep checking for this file and deleting it over and over, you can add the following to your .htaccess file. By the way, not only will the below code prevent people from accessing the standard WordPress readme.html file, it will prevent users from accessing any readme.html file on your server… some plugins may have these files as well, so this is a good thing to do.

# Stop access to sensitive files
# BLOCK readme.html File(s) Access
<Files readme.html>
Order Allow,Deny
Deny from all
Satisfy all
</Files>

You can add this after you # BLOCK Directory Access and before you # BLOCK wp-config.php File Access.

14. Limit Bot Crawling

Although this doesn’t really provide you any real security, we’re still going to list it…just so we don’t have 13 Security Checklist Items for those who are superstitious. Google bot and other search engine bots crawl the web indexing everything they come across, that’s how they collect their content so they can provide all those search results when you go looking for things.

If you want to limit bot crawling and the directories that search bots have access to you can create a robots.txt file and place it in the root directory of your site. This file should contain at a minimum:

User-agent: *

Disallow: /wp-admin/
Disallow: /wp-includes/
Disallow: /dev/
Disallow: /test/

Note: the last two entries are examples of how to prevent bots from accessing directories with the name “dev” and “test” under the root directory. If you don’t have these directories on your site, then you don’t need these lines in your robots.txt file.

Remember that this isn’t providing any real security. Although real search engine bots like Googlebot will abide by the rules you include in your robots.txt file, not all bots will and the bad ones will search directories that you tell them not to anyway.

When All is Said and Done

At the end of the day there really isn’t much you can do to prevent someone from hacking your system. Given enough time and resources, those who are determined will find away in. As the old saying goes…”the only secure computer is the one not turned on and buried six feet under ground.” Of course it’s also not a very useful computer either.

On the other hand, if you took the time to read this post and then spent another hour or two at the very most to implement everything we told you, then you’ll be 99% more secure than all your friends who are running WordPress and plenty of other people out there too.

There’s plenty more WordPress security hardening that you can do, and just doing a little goes a long way to make your would be attacker go looking for an easier site to hack.

WordPress Training Video Series

MSN: WordPress Training Video Series Featured Image

 

One More Way to Help You Succeed

Watch Live or Download and Watch Later

When it comes to webpage creation these days, WordPress is quickly becoming the de facto standard for creating webpages. Not only is it easy, it’s free! And there are tons of places on the web where you can get all kinds of help for any of your WordPress questions.

Instructions

Browser Right Click Save AsDepending on the browser you’re using, to download your files you can:

  • Right-click on any download link and choose “Save Link As…” (or “Save Target As…”) to save to your computer
  • Click on any download link and the file will automatically download to your computer

Support

If you experience any problems accessing these files, don’t panic, just contact Support and leave a brief message about your problem and we’ll get back to you as quickly as we can.

Tools You May Need

If your media player will not play MP4 videos download VLC player, it’s free too.


Lets Get Started

Click any of the video cover images to launch a Video Window and begin watching the related video or use the link below the video cover image to download the video to your computer and watch later. Enjoy!

NOTE: depending on your device and connection speed, some of the larger videos may take a bit of time to download, be patient.

And by the way, when you’re doing reviewing all our training videos make sure you read our WordPress Security Hardening post to learn 14-Steps that will make your WordPress environment more secure and less inviting to would be attackers.