Referrer logging is used to allow web servers and websites to identify where people are visiting them either for promotional or security purposes. You can find out which search engine they used to find your site and whether your customer has come from a ‘linked site’. It is basically the URL of the previous webpage from which your link was followed.
By default, most hosting accounts don’t include referrer logs but may be subscribedd for an extra monthly fee. If your web host does not provide a graphic report of your log files, you can still view the referrer logs for your website by logging into the host server using free or low-cost FTP software, like these:
FTP Explorer: http://www.ftpx.com/
LogMeIn: http://secure.logmein.com/dmcq/103/support.asp
SmartFTP: http://www.smartftp.com/
FTP Voyager: http://www.ftpvoyager.com/
The log file is available on your web server which can be download into your computer later. You can use a log analysis tool, like those mentioned below, to create a graphic report from your log files so that the files are easier to understand.
Abacre Advanced Log Analyzer http://www.abacre.com/ala/
Referrer Soft http://www.softplatz.com/software/referrer/
Log Analyzer http://www.loganalyzer.net
You can view the files using Word, Word Perfect, txt or WordPad files even if you don’t have the right tool. This information is very crucial to your business and marketing plans and is not advisable to neglect it.
In addition to identifying the search engine or linked site from where your visitor arrived, referrer logs can also tell you what keywords or keyword phrases your client used for searching.
As referrer information can sometimes violate privacy, some browsers allow the user to disable the sending of referrer information. Proxy and Firewall software can also filter out referrer information, to avoid leaking the location of private websites. This can result in other problems, as some servers block parts of their site to browsers that don't send the right referrer information, in an attempt to prevent deep linking or unauthorized use of bandwidth. Some proxy software gives the top-level address of the target site itself as the referrer, which prevents these problems and still not divulging the user's last visited site.
Since the referrer can easily be spoofed or faked, however, it is of limited use in this regard except on a casual basis.
By default, most hosting accounts don’t include referrer logs but may be subscribedd for an extra monthly fee. If your web host does not provide a graphic report of your log files, you can still view the referrer logs for your website by logging into the host server using free or low-cost FTP software, like these:
FTP Explorer: http://www.ftpx.com/
LogMeIn: http://secure.logmein.com/dmcq/103/support.asp
SmartFTP: http://www.smartftp.com/
FTP Voyager: http://www.ftpvoyager.com/
The log file is available on your web server which can be download into your computer later. You can use a log analysis tool, like those mentioned below, to create a graphic report from your log files so that the files are easier to understand.
Abacre Advanced Log Analyzer http://www.abacre.com/ala/
Referrer Soft http://www.softplatz.com/software/referrer/
Log Analyzer http://www.loganalyzer.net
You can view the files using Word, Word Perfect, txt or WordPad files even if you don’t have the right tool. This information is very crucial to your business and marketing plans and is not advisable to neglect it.
In addition to identifying the search engine or linked site from where your visitor arrived, referrer logs can also tell you what keywords or keyword phrases your client used for searching.
As referrer information can sometimes violate privacy, some browsers allow the user to disable the sending of referrer information. Proxy and Firewall software can also filter out referrer information, to avoid leaking the location of private websites. This can result in other problems, as some servers block parts of their site to browsers that don't send the right referrer information, in an attempt to prevent deep linking or unauthorized use of bandwidth. Some proxy software gives the top-level address of the target site itself as the referrer, which prevents these problems and still not divulging the user's last visited site.
Since the referrer can easily be spoofed or faked, however, it is of limited use in this regard except on a casual basis.
0 comments:
Post a Comment