Signatures -- The Long and Short of It

What is the accepted standard for signatures? Who sets these standards? The signatures in question are those blurbs that we include after the body of our main message content in our emails for the purpose of identification and contacts.

I'm really not referring to signatures in the respect that Usenet Newsgroups see them. It is pretty much agreed by established netiquette that Usenet signatures should be limited to five lines or less. They should, or may, contain:

  • Your name: Doug Davis

  • Your email: dougd@cros.net

  • Your company: Northern Research

  • What you do: Publisher

  • Your URL: dougd@cros.net

    You can shave a line or two from the above by combining your name and email address plus your company with what you do:

    Doug Davis dougd@cros.net

    Northern Research, Publisher

    dougd@cros.net

    Getting away from Usenet and, some lists, into the real nitty-gritty of internet marketing, signatures have become a way of sticking that extra ad in there. For better or worse we seem to be stuck with this practice, so don't expect it to go away soon.

    How wide should your signature be?

    Text terminals usually had and have a width of 80 characters; this means they can display just as many characters in one row. This is the practical reason why the ultimate text width of email messages and sigs should be no more than 80 characters.

    But this doesn't work very well in practice. We reply, we forward, we quote, and each time we do we add those little angle brackets to the lines of text in our messages, ">>>>." So we end up having short lines and long lines staggered throughout the text. This looks very unprofessional, even if you're just sending to friends. That's why all the recommendations for different line lengths. Some will not set their character length to anything greater than 72; some 74, others 76, etc.

    In publishing ezines and newsletters online, however, the standard seems to be 65 characters. This is what most submission guidelines that I have read, recommend. My ezine wraps with hard carriage returns at 65 characters. Almost all of the article submissions I receive are wrapped at 65 characters. If they're not, then I have to reformat them to fit my layout. I don't like reformatting -- it's a time wasting task I could do without.

    Naturally, sigs in my ezine, and many others, can't be longer than 65 characters either.

    How many lines?

    It depends, I suppose, on where you are posting or sending your emails. Discussion lists should be about the same as Usenet, in my opinion. On the other hand if you are posting to opt-in mailing lists for the purpose of advertising your business offerings, there are no rules. It's whatever you can get by with really. Who cares whether you have 20 lines of text and a 4-line sig? How about 4 lines of text and a 20-line sig?

    I have exactly 128 separate sigs in my MS Outlook 2000 sig file. Some of these are actually 12 line, or more, ads; it's just easier to paste them into the email that way.

    Remember the aim of your signature is to be read. If you have a humongous sig it not only won't be read, it will possibly provoke anger -- an emotion you don't need in your prospective customers.

    Signature Dashes

    The "signature dashes" actually is a line which is used as the first line of a signature. This is described in the "son-of-rfc1036": If a poster or posting agent does append a signature to an article, the signature SHOULD be preceded with a delimiter line containing (only) two hyphens (ASCII 45) followed by one blank (ASCII 32).

    The sigdashes act as a separator which allows easy recognition of signatures. This line consists of two dashes and a trailing space, ie "-- " (note the space) and thus can be recognized in a data stream as the character sequence "(newline)(dash)(dash)(space)(newline)". Some programs recognize a signature by the (sigdashes).

    Let me make this perfectly clear: There are no additional characters before, after or in between. This means no whitespace before the dashes, no additional dashes, one space at the end, followed only by an newline which ends the line. That's it!

    Synopsis:

    If you are posting to newsgroups or discussion lists keep your sig as short as possible; try not to go over four lines. Personal messages probably should be the same; why would you need all that sig space when you have the entire body of the message?

    When I'm posting ads to opt-in lists I usually don't include a sig at all. I want the ad to be the focus, not the sig.

    About The Author

    Doug Davis is the publisher of "Couch Potato Marketing Ezine", a veritable treasure trove of internet marketing information, plus a section highlighting the freebies available to help you increase your bottomline. We Have Bonuses: http://kabino.com

    no-contract cleaning service Mundelein ..
    In The News:

    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
    Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
    New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
    FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
    New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
    OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
    Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
    New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
    DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
    Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
    Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
    Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
    A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
  • Marketing Tips for Your Web Site

    Here are some simple and easy tips on how to... Read More

    Online Promotion: Five Extraordinary Online Promotion Secrets To Sky-rocket Your Sales

    Do you want to achieve extra-ordinary success in your online... Read More

    Website Marketing Mistakes Smart People Make

    You have invested your time and money into putting up... Read More

    What Can You Do To Beat Your Competition?

    In many cases when you start a new website you... Read More

    4 Steps to a Robot?s Tea Party

    Creating a new website is only the first stage in... Read More

    Sales Marketing: 10 Proven Secrets To Market Your Website Offline

    Some Internet marketing experts have claimed that the best way... Read More

    Why You Need Submit Articles To E-zines

    Ezine publishes have large amount of loyal subscribers. If you... Read More

    Online Website Promotion: How To Expand Your Business By Staying In Touch With Your Customers

    If you want your customers to keep coming back To... Read More

    How To Obtain Free Advertising For Your Online Business

    The beauty of the Internet is that it allows you... Read More

    How To Gain Web Traffic Through 9 Simple Tips

    Driving traffic to your website can be a time consuming... Read More

    How to Get Unlimited Free Advertising

    The opportunities for getting free advertising for your product or... Read More

    Three Cost Effective Ways to Get Bumper-to-Bumper Traffic Using Your Vehicle

    The following traffic generating ideas do not require costly set-up... Read More

    Planning and Evaluating Marketing Programs

    Measuring and understanding your Website's success is a critical process... Read More

    Improve Your Website In 3 Simple Ways

    You may already have thought about the following 3 ways... Read More

    Website Promotion ? Need Inspiration to Write Articles? Check Your Stats!

    One of the best ways to promote a Website inexpensively... Read More

    Increase Traffic to Your Website Free

    When I first began attempting to make money on the... Read More

    5 Successful Tips For Marketing Your Website

    This could be the most amazing article to ever be... Read More

    Viral Marketing Techniques Every Web Site Should Be Using

    Viral marketing can work wonders for any business, web site... Read More

    Searches and Summaries

    The Web is constantly growing and changing. The key issue... Read More

    Fight For Online Visibility

    Would you like to prevent Internet users from visiting your... Read More

    DIY SEO Part 3, Advertising

    We have dealt with the tags so the search engines... Read More

    The Best Way To Promote Your Website

    Everyone would like an increase in traffic to their website... Read More

    11 Awesome Ways To Attract More Orders

    1. Create a free ebook directory on a specific topic... Read More

    Grassroots Marketing Campaign

    Many people, in a rush to spike sales through the... Read More

    10 Shocking Ways To Energize Your Sales

    1. Start your own internet radio station. It could be... Read More

    maid service near Glenview ..