Digital Track and Field will secure your private information with S2Member and Paypal.
DVD’s and other physical products use secure gateway payments via Paypal and credit cards.
On-line video security uses S2Member-
This website takes advantage of a “Unique Security Encryption Key” (running in combination with the s2Member® software application and WordPress®, a PHP framework). This Unique Security Encryption Key works to further protect all User/Member accounts from being accessed or abused by hackers. This website’s Unique Security Encryption Key, allows it to operate with a unique instance of the s2Member® software application (i.e. slightly different from other sites on the web, possibly using s2Member® as well). As a consumer, this protects you! Sites like this one, using a Unique Security Encryption Key with s2Member®, along with randomly generated Salt Keys, and other WordPress® security standards; greatly reduces the risk of someone stealing and/or sharing your personal information. Security Encryption Keys are also used in some data storage routines, and extensively in Cookie-based authentication, to further safeguard your information during server-based sessions.
In cryptography, a Brute Force Attack is a strategy that can, in theory, be used against any encrypted data, by an attacker who is unable to take advantage of any other weakness. One example of a Brute Force Attack, occurs when multiple/repeated logins are strategically attempted with various username/password combinations, until a correct guess is made. This website takes an important step to further protect your account from being hacked, by implementing what’s known as “Brute Force Login Protection”; made possible by the s2Member® software application. s2Member® thwarts this behavior by monitoring failed login attempts that occur within a short period of time. When/if s2Member® detects an IP address (i.e. a remote User), who is consistently failing to enter a valid username/password, a temporary ban is created; preventing additional attempts from taking place for several minutes (or even hours), as configured by the site owner.
This website stores passwords with a One-way Encrypted Hash, using only a “hashed” version of your password for future comparison. This means that your plain text password is not stored anywhere, and therefore cannot be stolen and/or shared through this website. Only an encrypted “hash” is known, with no way to decode the actual value of the password itself (e.g. a One-way Encrypted Hash). This One-way Encrypted Hash allows the site to verify a cryptographic hash algorithm, and if the hash value generated from your entry ( during an attempt to log in ) matches the One-way Encrypted Hash stored in the password database, you are permitted access. The One-way Encrypted Hash value is created by applying a hash function (using cryptographic methodologies) to a string consisting of the submitted password, and another value known as a Salt. The Salt is unique to this site, and it prevents attackers from easily building a list of One-way Encrypted Hash values for common passwords.
As with any website granting account access through a username/password combination, it is possible for one User to signup, and then share their username with someone else; or even post it online for the whole world to see. This is known as “link sharing” (aka: “username sharing”). This website takes an important step toward preventing this bad behavior; both for consumer safety, and for the safety of the site itself; along with associated products/services made available. The s2Member® software application assists in this regard. With s2Member®, a single username, access link, and/or entry point, is only valid for a certain number of unique IP addresses, as configured by the site owner. When/if an upper limit is reached, s2Member® will assume there’s been a security breach. At that time, s2Member® will ban (i.e. prevent access) to a specific URL, and/or to an entire account associated with a particular username.
We are committed to conducting our business in accordance with these principles in order to ensure that the confidentiality of personal information is protected and maintained.