Signatures -- The Long and Short of It

What is the accepted standard for signatures? Who sets these standards? The signatures in question are those blurbs that we include after the body of our main message content in our emails for the purpose of identification and contacts.

I'm really not referring to signatures in the respect that Usenet Newsgroups see them. It is pretty much agreed by established netiquette that Usenet signatures should be limited to five lines or less. They should, or may, contain:

  • Your name: Doug Davis

  • Your email: dougd@cros.net

  • Your company: Northern Research

  • What you do: Publisher

  • Your URL: dougd@cros.net

    You can shave a line or two from the above by combining your name and email address plus your company with what you do:

    Doug Davis dougd@cros.net

    Northern Research, Publisher

    dougd@cros.net

    Getting away from Usenet and, some lists, into the real nitty-gritty of internet marketing, signatures have become a way of sticking that extra ad in there. For better or worse we seem to be stuck with this practice, so don't expect it to go away soon.

    How wide should your signature be?

    Text terminals usually had and have a width of 80 characters; this means they can display just as many characters in one row. This is the practical reason why the ultimate text width of email messages and sigs should be no more than 80 characters.

    But this doesn't work very well in practice. We reply, we forward, we quote, and each time we do we add those little angle brackets to the lines of text in our messages, ">>>>." So we end up having short lines and long lines staggered throughout the text. This looks very unprofessional, even if you're just sending to friends. That's why all the recommendations for different line lengths. Some will not set their character length to anything greater than 72; some 74, others 76, etc.

    In publishing ezines and newsletters online, however, the standard seems to be 65 characters. This is what most submission guidelines that I have read, recommend. My ezine wraps with hard carriage returns at 65 characters. Almost all of the article submissions I receive are wrapped at 65 characters. If they're not, then I have to reformat them to fit my layout. I don't like reformatting -- it's a time wasting task I could do without.

    Naturally, sigs in my ezine, and many others, can't be longer than 65 characters either.

    How many lines?

    It depends, I suppose, on where you are posting or sending your emails. Discussion lists should be about the same as Usenet, in my opinion. On the other hand if you are posting to opt-in mailing lists for the purpose of advertising your business offerings, there are no rules. It's whatever you can get by with really. Who cares whether you have 20 lines of text and a 4-line sig? How about 4 lines of text and a 20-line sig?

    I have exactly 128 separate sigs in my MS Outlook 2000 sig file. Some of these are actually 12 line, or more, ads; it's just easier to paste them into the email that way.

    Remember the aim of your signature is to be read. If you have a humongous sig it not only won't be read, it will possibly provoke anger -- an emotion you don't need in your prospective customers.

    Signature Dashes

    The "signature dashes" actually is a line which is used as the first line of a signature. This is described in the "son-of-rfc1036": If a poster or posting agent does append a signature to an article, the signature SHOULD be preceded with a delimiter line containing (only) two hyphens (ASCII 45) followed by one blank (ASCII 32).

    The sigdashes act as a separator which allows easy recognition of signatures. This line consists of two dashes and a trailing space, ie "-- " (note the space) and thus can be recognized in a data stream as the character sequence "(newline)(dash)(dash)(space)(newline)". Some programs recognize a signature by the (sigdashes).

    Let me make this perfectly clear: There are no additional characters before, after or in between. This means no whitespace before the dashes, no additional dashes, one space at the end, followed only by an newline which ends the line. That's it!

    Synopsis:

    If you are posting to newsgroups or discussion lists keep your sig as short as possible; try not to go over four lines. Personal messages probably should be the same; why would you need all that sig space when you have the entire body of the message?

    When I'm posting ads to opt-in lists I usually don't include a sig at all. I want the ad to be the focus, not the sig.

    About The Author

    Doug Davis is the publisher of "Couch Potato Marketing Ezine", a veritable treasure trove of internet marketing information, plus a section highlighting the freebies available to help you increase your bottomline. We Have Bonuses: http://kabino.com

    weekly home cleaning Highland Park ..
    In The News:

    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
    New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
    FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
    New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
    OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
    Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
    New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
    DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
    Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
    Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
    Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
    A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
    South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
    Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
    Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
    Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
    Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
  • Seecrets on Website Promotion: Marketing Plan for Joe Nogood Gift Store

    Joe Nogood owns a small but thriving gift store. He... Read More

    Website Promotion: 10 Electrifying Tactics To Boost Your Profits

    Is your business lagging behind?Are you frustrated?Cheer up.Here are 10... Read More

    The Link Swapping Trap

    If you want to make money on the web, you... Read More

    Three Cost Effective Ways to Get Bumper-to-Bumper Traffic Using Your Vehicle

    The following traffic generating ideas do not require costly set-up... Read More

    Google Pagerank ? Microsoft Business Solutions Great Plains Certified Master Point of View

    Google is the most popular internet search engine and even... Read More

    Link Building Secrets - Promote Your Website with a Proven Tactic

    Building links to your website is of huge importance and... Read More

    Make That Website Visitor Stick Around: Youve Got 30 Seconds!

    Yes indeed, that's all you've got, 30 seconds to make... Read More

    5 Innovative Ways To Advertise Your Web Site

    1. Directory Linking Create a directory of web sites on... Read More

    How to Get More Links to Your Websites and Improve Traffic

    I feel the most effective way to get people to... Read More

    How One Free Advertising Method Can Trasform Your Income

    A great way to get the word out about your... Read More

    Free Traffic From Articles ? Plus A Big Hidden Bonus

    Writing articles for submission and distribution on the internet is... Read More

    Make Your Web Site Work More So You Can Work Less

    Do you know how your web site fits into the... Read More

    How To Stop Your Site Disappearing Into The Void

    Repetition is the key to getting your adverts and promotion... Read More

    Unique Selling Propositions - USPs

    Got one? Two? Three?If you have competitors, then you should... Read More

    10 Ways To Extend The Reach Of Your Site

    Successful websites extend their reach far and wide! They build... Read More

    Why Your Site Needs Fresh, Relevant Content

    It is said that content is king, but today 'fresh,... Read More

    So You Have A New Website But The Phone Isnt Ringing Off The Hook?

    So you have a new website but the phone isn't... Read More

    Complete Novice Builds Business Using Press Releases on the Internet

    My name is Barbara Mascio. I am the founder of... Read More

    Reciprocal Link Exchanges - A Foolproof Technique That Will Never Die

    On the Internet, links are very important for websites to... Read More

    How to Get Targeted Web Site Traffic from Other Peoples Sites

    Getting targeted web site traffic from other people's websites is... Read More

    Free Advertising Techniques

    The most successful advertising is obviously expensive. There are ways... Read More

    Culture and Website Localization

    Culture and Website Localization With the rise... Read More

    Why You MUST Have A My Yahoo! Page

    Yahoo! allows you to set up your own front page... Read More

    I Need Real Visitors, NOT Search Spiders!

    The answer to the first question is simple, the difference... Read More

    Avoid Search Engine Blacklisting

    The best way to avoid being blacklisted by the search... Read More

    whole house cleaning Park Ridge ..