Please
read these instructions in their entirety.
The RKBA WebRing is automatically managed.
If the WebRing code is not placed in your site
as described below it will not be approved and
automatically removed from the queue after 7
days.
Here
is the WebRing HTML Code. There are three to
choose from, but the differences between them
are minor. Of these three, the options are for a
white background with a border, a white
background without a border or a black
background with a border. If you are
experienced with HTML code, you may change the
color of the background to match your
page. What may not be changed is the
"sponsored by" information or the URL
to which the RKBA graphic or sponsored by links
to.
Just
cut and paste the code that is below the
layout you prefer. Then go
here to submit your site to the RKBA
WebRing. Once you submit your site you
will be given a ring ID #. Please follow
the instructions below carefully or your site
will not be approved. Please note:
You MUST replace ***site_ID*** with your ring
ID. This means to remove the *** from the
code. I.E. do not put ***23*** as your
ring ID - the *** portion must be removed.
Note, the ***site_ID*** is in 5 locations in the
WebRing HTML code - all 5 incidents must be
removed and replaced with your ring ID #.
You will need to put
your
ring id #
where you see ***site_ID***.
If you
choose one that includes your email address, you
will need to put your name and email address in
the two spots that say ***your name*** and
***your email***. Makes sense, huh?
In
an effort to save you time and bandwidth on your
server, we are now allowing all WebRing members to
utilize our server bandwidth to serve the WebRing
logo. This also makes it simpler should we
ever choose to change the design of the logo.
If
you have any ideas for variations on these
graphics, please feel free to develop them. The
only condition is that they will have to be
approved by the membership committee in order to
maintain consistency in appearance. This usually
doesn't apply to minor adjustments, but ask
first if you're not sure.
Failure
to adhere to the guidelines of the ring will
cause your site to be removed from the ring
without warning. The ring was created and
it used to drive traffic between Web sites which
support the 2nd Amendment and the right to "Keep And Bear
Arms". We thank you for your
participation.
QUOTES
TO REMEMBER
The saddest epitaph which can be carved in memory of a vanished liberty is that it was lost because its possessors failed to stretch forth a saving hand while yet there was time. — JUSTICE GEORGE SUTHERLAND (1938)
COPYRIGHT POLICY: The posting of copyrighted articles and other content, in whole or in part, is not allowed here. We have made an effort to educate our users about this policy and we are extremely serious about this. Users who are caught violating this rule will be warned and/or banned.
If you are the owner of content that you believe has been posted on this site without your permission, please contact our webmaster by following this link. Please include with your message: (1) the particulars of the infringement, including a description of the content, (2) a link to that content here and (3) information concerning where the content in question was originally posted/published. We will address your complaint as quickly as possible. Thank you.
NOTICE: The information contained in this site is not to be considered
as legal advice. In no way are Keep And Bear Arms .com or any of its agents responsible
for the actions of our members or site visitors. Also, because this web site is a Free
Speech Zone, opinions, ideas, beliefs, suggestions, practices and concepts throughout
this site may or may not represent those of Keep And Bear Arms .com. All rights reserved.
Articles that are original to this site may be redistributed provided they are left
intact and a link to http://www.KeepAndBearArms.com
is given. Click here for Contact Information for
representatives of KeepAndBearArms.com.
Thawte.com is the leading provider of
Public Key Infrastructure (PKI) and digital certificate solutions used by enterprises,
Web sites, and consumers to conduct secure communications and transactions over the
Internet and private networks.