Saturday 8 September 2012

Brakes Efficiency Percentages

Last week my '71 Early Bay van failed her MOT on a couple of points (both now rectified and retested - so she's through), one of which was that the parking break efficiency was only 13%. The tester gave me a report showing the figure above, which also showed:

Front Service Brake 38%
Rear Service Brake 27%
Total Service Brake 66%

I was curious about these figures and meant to ask when I went back, but forgot.  Since then I've done a little research, and here's what I found out:

Apparently the percentages are calculated by dividing the total weight of the vehicle (with everything in it) by the force required to stop it (they have a machine to test this at the test centre) and multiplying by 100%.  A little searching on the web revealed that the service brake needs to be at least 50% and parking brake at least 16% for an MOT pass.  However this left me wondering: how much better could they be?

What I found suggested that it's possible to get significantly higher percentages and, surprisingly, to even exceed 100% mark.  Sounds crazy that something can be more than 100% efficient doesn't it?  But consider the way the percentage is calculated and what would happen if you put the brakes from HGV on a moped.  :-)

Unsurprisingly such high efficiencies are not recommended and according to herbie275h on the VZi forum:
normally the limit is reached by the tyres which skid around 85-90% of the vehicle weight
Various Internet sources also suggested that 60-70% is about normal and this sounds quite reasonable to me after finding the following titbit of information that SpunkMoney posted on the motester.co.uk forum:
The Highway Code stopping distances ("A car in good condition, with good brakes in good conditions blah-de-blah-de-blah....") base their actual stopping distance (ie: NOT the reaction part) on a deceleration of 0.66g - that's 66% braking efficiency.
So I guess 70%-ish is what we ought to be aiming for and be happy with.  I guess it also makes sense that the individual front and rear efficiencies will be less, and that the handbrake (which according to herbi275h needs to be enough to hold the vehicle on a 1:6 hill), can be even less than those and still be acceptable.

Thanks also to Samba63 on VZi who pointed me in the direction of SpudMonkey's info.  ;-)

Tuesday 21 February 2012

GIMP, Inkscape, and X11

For a few years now I've been using GIMP (GNU Image Manipulation Program) to manipulate bitmap images. I wouldn't say I'm an expert and in fact I don't use it that much because most of the time I'll crop and resize image using Preview; which loads up a lot quicker. I only fire up GIMP when I need to do something "fancy". Thus I haven't been too irritated by the fact that GIMP uses key combinations like Ctrl-C and Ctrl-V rather than Apple's Command-C and Command-V. However, I've recently begun to use Inkscape to create vector images and it makes use of the Alt key for quite a number of things... and the Mac's preassigned used of that key gets in the way. Fortunately there's a solution and I found it on the Inkscape FAQ:

Both Inkscape and GIMP make use of the X11, X window system and the FAQ describes the creation of a "keyboard modifier map and keymap table" to get the Alt and Command keys working "correctly". I'm not going to re-post the information here as we can get the details from Inkscape FAQ, however I wanted to create this post as a reminder for myself in case I ever need to set it up on another computer.

If you've found this post then I guess you were looking for a solution to the same problem. Hope it helps. :-)

Friday 6 August 2010

End Of An Era?

I've done something I thought I'd never do: after just a little over three years of ownership, I've sold my Beetle!

Back in April my wife announced that she was moving to Wales… without me. Ironic given that we'd moved to Norfolk primarily so that she could be closer to her family, but it meant that I needed to find a new place to live. That in turn meant that I had to reconsider the future of my work in (not making very much) progress Beetle project. In truth, I'd been having second thoughts about it for a while.

Okay, so there were issues with not having a garage to work in; so the weather, in addition to my health problems and other work load, meant that I was progressing much slower than anticipated. However there was another, probably bigger problem in that this Beetle restoration lark was not what I'd anticipated:

When I looked into getting the bug I thought that given the length of time these things have been around, I'd be able to buy a book or something that told me what to do with it. As it turns out there are lots of sources of information... but with no real consensus about the best way to go about things. Just search VZi for which oil to use and you'll see that even with something as apparently simple as that, dub owners have to make their own decisions about who and what to believe.

Then there's the situation with parts, because while there's loads of stuff available, I've been astounded by the poor quality. A few months back for example I bought a stock pulley from VHW, and the centre was two millimetres off. TWO! I've had other parts that were equally useless and it would appear that needing to bend, file, re-drill, and generally adjust things to get them to fit is par for the course... and the situation is getting worse:

Having ultimately decided to sell my bug, and the plethora of parts I'd acquired to restore it, (I tried to sell them as a job lot but had no takers), I've made some very good money on the parts. Why? Because when I bought the floor panels, heater channels, rear quarter panels, and other parts that have spent the last couple of years in my shed, it was still possible to buy genuine VW, and mine were. These days they're as rare as hens teeth and I'm told the repro stuff is... erm... poop.

So rather than the Beetle being the big Lego kit with step-by-step instructions that I'd anticipated, it's a big heap of frustration with conflicting opinions about what's best for it, and parts that don't fit well into anything other than a dustbin.

The sale of my Beetle clearly represents the end of an era for me. I'm keeping my van but she's in pretty good condition and provided I protect her she should see me out. But I'm inclined to wonder whether my personal adventure might have also spanned the end of the era in which it was practical / worthwhile to undertake a major restoration.

Sunday 21 March 2010

The Major Oil Leak That Wasn't

Last November I set off in my van to do a 200 mile trip up to Manchester. However, after 40 miles or so she sprang a major oil leak and I ended up being towed home by the RAC. It's taken me a while to find out and understand what went wrong and it turns out to be an embarrassingly stupid mistake on my part. Rather than keep it to myself however, I thought I'd write it up in some detail, in the hope that it benefits somebody else.



As you can see, my van's engine, like most, is not entirely stock. For one thing it has a progressive carb with a paper air filter, and for another the heating system is not connected up. One of the first things I did when I got my her was to block up the gaping holes in the fan shroud where heater pipes would be attached. Given that the Manchester trip was to be a significantly longer drive than I'd ever done before, I'd decided to attend to a few other things too, including blocking up the holes where said heater pipes, and a stock air filter's warm air intake hose, would go through the rear tinware.

All of the above is as it should be but I'm mentioning it here because it gives context to the mistake that I did make. The fact is that if you look around you'll see a lot of VW engines with these orifices left gaping; and they shouldn't be. The ones in the fan shroud will result in air being blown back into the engine bay rather than being sent to cool the cylinder heads. Gaping holes in the tinware will result in warm air from the lower engine being sucked back into the engine bay.

So what was my mistake?

Well, the oil filler neck has a connection which, on a stock engine, has a hose connecting it to the air filter; thus, you might think, as I did, allowing the crankcase to breathe filtered air. Replace the stock air filter (often done when a non-stock carb is used) and you might not have a place to connect this hose. Have a look at a few dub engines with non-stock carbs and you'll see that the breather on the oil filler neck is often left unconnected to anything. This did not strike me as being a good thing and in my bid to close up 'unnecessary' orifices, I put some tape over it to stop any crud getting in there.

As I discovered later, the crank case is in fact more inclined to breathe out though that tube as it takes air in through a (surprisingly to me) unfiltered opening behind the pulley wheel. The tube on the filler neck connects to the stock air filter not to supply it with filtered air but so that the oily vapour it breaths out goes into the carb; to be burned up in the engine rather than dumping it elsewhere. Block the pipe on the oil filler neck, as I did, and the crank case will breathe its oily breath out behind the pulley wheel. Result: the pulley wheel flings the oil all over the engine bay.

Combine my faux pas in closing that vent with topping up the oil to the max (she always leaks a bit so I expected to lose some on the trip) before I set off and I was all set for the incident that followed. This part of the story is worth telling because it helps to show why it took me a while to find out what went wrong. So, in a nutshell:

I pulled into a service station, smelled oil, and when I went around the back I found that there was oil sprayed all over the back of the vehicle (it must have been hitting the hot engine and vaporising) as well as all over the engine bay. In a bid to save a potentially dry engine I grabbed a can of oil and glugged it in fast. Well, most of it went in. However a good deal didn't so by the time the RAC man arrived there was additional oil, spilled by me, all over the place making things look even worse. It's also important to note (we'll see why shortly) that because I just glugged it in, there was now way too much oil in the engine.

So the RAC man arrives and a can of degreaser and a shed load of paper towels later the engine is somewhat cleaner and we're trying to work out where the oil came from. We drive down the road half a mile and take another look. This is where having glugged too much oil in the engine plays it's part in the story because of course it's immediately been forced out of the vent behind the pulley and thrown all over the engine bay.

Of course we didn't realise at the time that this is what was happening so we conclude that there's a major leak somewhere that we can't see. The greatest concentration of oil seemed to be on top of the tinware over no. 4 cylinder (where I've marked an X on the photo accompanying this post) and as we could see that it wasn't coming from the oil pressure switch or anywhere like that, we figured that the oil cooler was a likely candidate, it being hidden away, up top, on that side of the engine. Given that accessing the oil cooler is an engine out job we concluded that my trip to Manchester wasn't gonna happen and the RAC man towed me home.


I've already explained what the problem turned out to be but it took me several weeks of research to find and piece together the parts of this puzzle.

One of the first things I did was to post the photo shown above on VZi but I felt fairly sure that the oil cooler was the most likely cause of the problem and was kinda distracted by the idea of swapping the engine with the one in my (project) Beetle to get myself back on the road ASAP. So nobody thought to question my diagnosis and it wasn't until a while later, when watching the Bug Me Video on stripping/rebuilding an engine, that I began to realise that oil from the cooler is unlikely to end up on top of that tinware. Of course with hindsight it's obvious why there was a concentration of oil there. Clue: consider the direction in which the pulley wheel rotates and where most of the oil it flings/flicks is going to end up.

My first breakthrough came when I stumbled across some information about a "sand seal". For those who don't know, and to air my new knowledge, this is something that's needed on dune buggies to prevent sand from getting into the crank case through the vent behind the pulley wheel. WHAT? There's a vent behind the pulley wheel?

This in turn lead me to find an article about crankcase ventilation over at
Rob & Dave's Aircooled Volkswagen Pages which pretty much describes the problem. Oh how I wish I'd found that sooner but I have to say that when I did I was sceptical that the amount of mess I'd seen in my engine bay was down to just that. However, having cleaned up my engine, unblocked the breather, and syphoned out a litre of excess oil that I'd glugged in when I panicked, she's working just fine.


Coda:

You can get little "breather filters" (SSP part no AC115551) to go on that filler neck connection. I've heard they can leak oil but they've got to be better than nothing and certainly a hell of a lot better than what I tried. On closer examination however I found that the rectangular filter on top of my carb had a connector for a hose. The filter was fitted with this hidden away around the back; which is why I hadn't seen it before. I've turned it around however there's still an issue in that the most direct path for the hose would be at risk of fouling the fan belt. This would not be the case with a stock filter.

For now I have a long tube, taking a path over the generator and around the back of the carb to connect the breather to the filter. However I'm also investigating other possibilities ranging from returning to a stock set up, to installing twin carbs and a breather box. More about that in a future post.

Sunday 21 June 2009

Blocking Bots

In previous posts relating to my LAMP server (see tags) I've described how I use PHP to write iptables rules so I can keep various ports closed when I'm not actually using them. Something else I use it for is to block IP addresses from which bad bots are operating. This technique is discussed and documented on various other sites so I'm not going to give details full details here. However, in a nutshell my scheme involves:

1. Using robots.txt to designate a directory into which bots should not go.

2. Inserting hidden links on various documents that link to a file in the above directory. Humans will not see these links (because they are invisible) and well behaved robots (that pay attention to robots.txt) will not follow them either. Thus the only things that will follow those links are bad bots.

3. My hidden links point to a PHP script which write a new iptables rule, thereby blocking the bot. An entry is also made in a database recording the time and request that blocked the bot.

4. Bots will often operate using addresses from pools that are used legitimately at other times, so it's important to release the blocked addresses after a suitable period. I have a cron job to run a script that checks the database and releases anything that has been blocked for longer than a specified period.

This has been working well for some time however more recently I've been seeing something else in my server reports that I wanted to do something about; attempts to access urls such as these:

//Admin//scripts/setup.php
//MyAdmin//scripts/setup.php
//admin//scripts/setup.php
//phpMyAdmin//scripts/setup.php

There's usually a great long list of them trying lots of variations. Something else I've seen quite a bit of is this kind of thing:

/index.php?gzip=0&file=/etc/passwd

Again, the usually attempt the same, or similar things with any .php they can find.

Now provided that all of your other security is in place then attempts such as these shouldn't be a problem however, they are clearly attempts to break into the server. As such whatever is generating them is making a nuisance of itself and should, in my humble opinion, be told to **** off at the first available opportunity. So I've added a few more lines to httpd.conf

RewriteRule scripts/setup.php /var/www/cgi-bin/ip_blocker.php
RewriteCond %{QUERY_STRING} /etc/passwd
RewriteRule ^(.+) /var/www/cgi-bin/ip_blocker.php

The first line looks for urls that contain "scripts/setup.php" and redirects them to my blocking script. Obviously if you use anything on you server where that would be part of a legitimate request you need to modify that, but I don't, so I can use it. The next two lines do a similar redirect on any request where the text "/etc/passwd" appears in the query string.


Note that because I wanted these rules to apply to all of the virtual sites on my server, I've put these rules such that they apply to the main server and told all of the virtual sites to inherit them using:

RewriteOptions inherit

Note however that despite them appearing before the virtual server directives in the httpd.conf file, the virtual server directives are processed first. Thus it is important that none of the virtual server rules end with [F] as this would result in a match there halting the processing of rewrite rules before these are run.

Enjoy, unless you're a bot. ;-)

Sunday 15 March 2009

Passwords

The issue of 'having a good password' is something that comes up in conversation from time to time although I generally suggest that, even if you think you know you what that means, you should do some research (because things change), I realise that most of my friends won't bother and that it might help of few people, those that can be bothered to read it, if I were to do a write up of my current understanding of what is a good password.

The reason I say 'current understanding', and suggest that things change, is because that is my experience; and I don't just mean my own understanding, but that of the 'industry' as a whole. While there are things that have always been regarded as insecure, there are also lots of things that were regarded as secure but are now regarded as a risk. This is largely because, as the speed of computers has increased, the crackers (people who try to break into systems) have more powerful tools at their disposal. For example I have an old programing book containing code for a 'password generator' that works be randomly choosing a couple of three or four letter words and sticking them together to create a password. These days the crackers use programs that attempt to get in by trying common dictionary words, both forwards, backwards, and stuck together in combinations. These days a password that uses actual dictionary words is regarded as relatively insecure.

A Perfect Password



A perfect password would be a completely random collection of letters, numbers, and punctuation marks. Why? Because if it is truly random then the only way for somebody to crack it is to try every possible combination. This does not mean that such a password is uncrackable; but it means that of all the passwords that we could use, this is the hardest to crack.

So, if we know what a perfect password is, why don't we all use them? And the answer is that we are human and we find them difficult to remember. There's not much point having a great password for your desktop computer if it's written on a post-it note stuck to the monitor; partly because it's could be a security risk and partly because if you lose the bit of paper you are locked out.

The security risk aspect of having a post-it note on your screen depends of course on what the password is for. For example, if I had the root password for my server (at a server farm) written on the side of my monitor at home then the only person who sees it besides me is my wife and I'm pretty confident that she's not interested in hacking my server. The post-it note is inaccessible to a cracker unless they come around to my house and although I am sure there are a whole bunch of folks on the Internet who might like to gain access to my server, I doubt very much that they'll go that far.

Doing The Math



Okay, so I've said that a random collection of characters is best and while that might seem obvious it's worth taking a few moments to consider exactly why that is the case:

If I ask you to pick a letter of the alphabet you have 26 choices. If I ask you to differentiate between upper and lower case that doubles to 52. If I say to include digits then you gain another 10 possibilities giving 62 options. If we add in punctuation marks then we increase it further but I am going to leave them out (I'll explain why later).

So you have 62 options for a single character. Now I ask you for a second character you have 62 choices for that one too. That's 62 options for the first one and 62 options for the second. Thus for our two character 'password' there are 62x62 options (which is 3844 possibilities). Each additional character multiplies the number of possibilities by 62 so by the time we have a 6 character password we have 62x62x62x62x62x62 which is 56,800,235,584 possibilities. Now unless our password happens to be the very last password that a cracker tries, they aren't going to have to try all of them, but with that many possibilities to go at the cracker is going to have to try a hell of a lot, or are they?

Bear in mind that our 56.8 billion possibilities include all possible 6 letter dictionary words, peoples names, and dates of birth. However these will be a relatively small percentage of the total number of options. Just for the fun of it, let's look at dates and let's say that I'm trying to guess your date of birth, wedding anniversary, child's birthday or other 'secret' date that you may have used as a password:

There are 12 months in a year, each of which has a maximum of 31 days. Chances are that your date is within the last 50 years so for a DD-MM-YY date (6 digits) I have 31x12x50 options which is 18600 possibilities. Now that's a lot for a human but a password cracking program could work through them in a matter of minutes.

Add every name and dictionary word, forwards and backwards, into the equation and our cracker program still only has to deal with a tiny fraction of the number of possibilities that it would have to deal with if we use a truly random password. Of course a cracker could write a program to try totally random passwords but they don't need to because many, many people out there will use a name, date, dictionary word or something else and a program that tries these first will give them access to a lot of systems.

How To Remember It



Okay, so now that I've (hopefully) sold you the idea that a password should be random, how do we go about remembering such a password?

Well one option that we already mentioned is to write it down and while there are a lot of cases where this would be a security risk, there are a lot where it is not a problem. I don't have my server password written on a post-it note but I do have a document on my computer that lists a whole bunch of passwords and PIN numbers that I didn't have any choice about and that I don't trust myself to always remember. The file is backed up so there's no chance of me losing it, and it's password protected (with a good password of my own devising) so to get in there a cracker would need to access my computer and crack that password. In other words, it is HIGHLY unlikely, so although the passwords are 'written' down, they are safe. Of course this still leaves me with the problem of how to remember the password that protects the file, and this is where my technique for remembering a random password comes into play, however I now have a confession to make: it isn't random!!!!!

What? Not random? Well, no, but almost. Let me explain:

My wife's name, let's call her Anne, would make a really poor password. First of all because it's only 4 letters and secondly because it's a name. However let's solve the length problem by adding letters from her surname until we have 6. Hell, let's be different and create a 7 letter password. Assuming that our surname is Jones we now have 'AnneJon'.

Now that's still pants as a password and of course if she'd been called Deborah then we wouldn't have needed the extra letters from the surname and it would be even worse. So, to improve things, let's change some of the letters to numbers that look a bit like them such that we get '4nn3J0n'. Now let's reverse it: 'n0J3nn4'.

Immediately it is looking a lot more random however that number swap is a common technique, and so is reversing a word. Plus, a name is a bad starting point in the first place. Clearly this gives us two areas that we can improve on: our seed word and our encryption' technique.

Now we still want to be able to remember this thing so rather than using one seed word, let's use three. Let's say I want a password for my account at Amazon, that my wife's name is Anne Jones and that I was born on the 04/03/64. By converting the site name to upper case and taking a character from each seed in turn we get: AA0Mn4An0Ze3OS6Nm4ith. However, I only want 7 characters so let's take the first 7 (because I can do that in my head without having to write anything down) and I get: AA0Mn4A.

Now that isn't truly random in the sense that it's been generated using two pieces of personal information and a modified (converted to upper case) site name but given the huge number of pieces of information that I could have used as 'seeds' and the huge number of ways in which I could manipulate them, it will be close to impossible for somebody else to guess at. In the example I used the site name, my wife's name, and my date of birth, in that order, and converted the site name to upper case. I could have used my fathers middle name, the registration number of the first car I ever bought, my sister's birthday, the last letter of each word in the first line of the song that was playing when I met my wife, the last 6 digits of my phone number or any number of other pieces of information as seeds. Furthermore I could have 'encrypted' them by reversing them, taking only the first and last letters of the names, using just the odd number letters, omiting vowels, or dozens of other techniques.

The important thing is that rather than using a memorable password I'm using memorable techniques to generate what is to all intents and purposes a random password. If I decide upon a set of seeds and a set of techniques and always use the same ones then I will always know how to generate my passwords. Note that by using the site name (or system name or something that I strongly associate with it) as one of the seeds, I can use the same seeds and my encryption techniques for the others and have different passwords for different sites/systems. Using the scheme above as an example, my password for eBay would be 'EA0Bn4A' and my password from GoogleMail would be 'GA0On4O'. What's more it means that if I register on any forums or shop checkout systems that store member/customer passwords in an unencrypted form, then a malicious person at the company can only see my password for their system; a password that gives them no clue about what I might be using on other systems.

Before we finish, I would just like to step back to my earlier decision to exclude punctuation characters when we were calculating how many possibilities there are for a six character password. Now that I have explained my technique for generating passwords it should be obvious why I did this: because the kind of seeds I suggest don't include punctuation symbols. You could however build in punctuation symbols at the encryption stage. Just in case you are thinking that 56.8 that we calculated before aren't enough.

Domain Names

From time to time I encounter people who need a domain name so I thought I'd share my thinking about choosing one:

Choosing a domain name is like naming a child in that you're as well to give it some very careful consideration because, although it's not impossible to change it again later, it can be rather difficult. In another way however, it's not at all like that because while there are a lot of people called, for example, Andy Slater, there is and can only be, one www.andyslater.com


Things to consider when choosing a domain name:
  1. Availability
    As stated above, every domain name has to be unique so if somebody has already registered the one you'd like, although you may be able to buy it from them for some exorbitant sum, it's probably just a case of hard luck.
    You can find out if a name is available at places like http://www.uk2.net
    On the front page of their site is a box where you can type the domain name that you're interested in registering and click a button to see if it's available. Chances are that your first choice won't be so be prepared for some disappointment and for some considerable time spent thinking up alternatives.
    Please note that if you are planning to ask me to host your website on my server that the whole thing is a lot easier if your domain name is registered via UK2 but please contact me before jumping in.

  2. www.
    Pretty much all domain names start with www. so you don't need to worry about that bit.

  3. .com? .co.uk? .net? .info?
    The bit at the end is called the extension and there are various different ones available. However:

    1. .com is the one that's best known. If people can't remember your extension, .com will probably be the first one they'll try so it's well worth having.

    2. Search engine results show your domain name including the extension. If you've ever used a search engine to find something you want to buy then you'll be aware that much of the time you end up looking at shops in the USA. Amongst the results however you will see sites that have a .co.uk extension and this is a valuable clue that the site is based in the UK. When I'm shopping, I make a beeline for the ones with a .co.uk extension. Thus if you are selling to the UK market, a .co.uk extension can be a bonus.

    There are many other extensions available. Check UK2 as described above for a list of what they have i.e. those available in the UK (you will see other country specific extensions when you're browsing which have to be registered in those countries). However, unless you have a good reason for using something other than .com or .co.uk, I'd stick with those. For a business I'd be inclined to want both.

  4. Name Length
    Short names are best. eBay, Amazon, Google, etc. Short and snappy. I used to run a business from a site called www.themodelmakersresource.co.uk and found that the domain name was too long to fit on till receipts, too long to get printed onto pens for promotional purposes, etc, etc. Doh!

  5. Hyphens and Underscores
    You can't use spaces in domain names but you can use hypens and underscores. If your desired name contains more than one word you could therefore:

    1. Join all the words together: www.themodelmakersresource.co.uk

    2. Use hypens: www.the-modelmakers-resource.co.uk

    3. Use underscores: www.the_modelmakers_resource.co.uk

    Although I said you could use underscores, I recommend that you don't. It's not common practice and is bound to cause confusion; people will mistake them for hypens and spaces.
    Note also that for business purposes it's probably wise to obtain all variants. You can for example access Games Workshop's site with:
    www.gamesworkshop.com
    www.games-workshop.com
    www.gamesworkshop.co.uk
    www.games-workshop.co.uk
    Smart move guys. Note however that eBay, Amazon, Google (businesses that were Internet businesses from day 1) and the like only need half as many domain names to cover all the options. Even smarter.

  6. Memorability
    My experience with The Model Makers Resource has shown me that on the web, unless you can become a household name, you're at the mercy of the search engines if you want people to 'stumble' across your site. Obviously the more memorable your name, the better your chances of people coming straight back to you rather than heading for the search engines. The Model Makers Resource Ltd is too long and clumsy for most folks to remember. There's also an issue about whether "model makers" should be one word, two words, or hyphenated and arguing that your choice is correct according to the dictionary is of little value if potential customers are failing to reach you because they are typing it in wrong.
    It is strange, but it is a fact that I would often hear people outside my shop saying "Oh look, The Model Makers Resource Centre". The sign did NOT have the word 'centre' anywhere on it but for some reason people just seemed to add it on the end. What chance have they got of remembering the domain name if they can't even read the company name off the sign above the shop window correctly?
    It's a bad name and more 'field testing' would have told me that before I invested in it.

  7. Spelling
    If you're a business, having a name that's easy to remember has to be a smart move. Even if you're not a business, obscure spellings, or things that people have difficulty in spelling, are best avoided. Choosing something that you have to explain or spell out every time you tell someone your domain name over the phone is a bad move. Choose something such that when you tell people your domain name, their first guess at how to spell it will be correct.

  8. Keywords
    'Keywords' are words that people type into search engines when they are looking for something. Having a keyword in your domain name can enhance it's position on the list (it's ranking). Perhaps more important, the search engines are fickle after all, is the fact that your domain name is displayed and can be used to say something about you.
    When I was setting up The Model Makers Resource, having the word 'model' in the name was on my list of priorities. Part of the trouble I had finding a domain name was that the word 'model' can be used in more than one context. You've got model kits, catwalk models, data modelling, model citizens and a huge range of other things. As a result, pretty much every domain name I though of was already in use. I did find one short one, models-uk, uk-models or something like that; however, all of the other 'variants' were taken up by competitors, model agencies and in one case a rather nasty porn site. I decided to steer clear.
    If you can slip a keyword into your name it's certainly worth considering but I believe that there are more important issues, as listed above, and I wouldn't compromise them for the sake of inserting a keyword.
    At the end of the day, Boots (the chemists) don't seem to have suffered from having an inappropriate name although one is inclined to wonder what ever became of Mr Chemist the cobbler?


That's about all I want to say on the subject of choosing a domain name. Hopefully you'll find some of it useful. Hopefully I haven't scared you off the idea of having a website altogether. The things above are things to CONSIDER. You don't have to comply with all or even any of it. If you're wanting a website for fun then you can probably ignore most of what I've said. The same is true if you wanted a website to which you can direct people as a means of answering a question that somebody has asked you. If your site is for business and you will want people to be able to find it and remember it without your jotting the name on a bit of paper for the, then the more of the above that you can take into consideration, the better.