I think the OP is talking about salts that get concatenated as a prefix or suffix, not the salting that happens in oneway hash functions. Remember the topic here is related to getting your pw's exposed and how to easily create different pw's to deal with that scenario.
Both. The salting SHOULD happen in one way Hash functions. But sometimes it does not. Using your own prefix when always using the same password is the second worst solution but at least better than nothing. Poor mans salting :-)
I use a PW manager like its a religion. But having all my eggs in one basket gets me so nervous. I like the poor man's salting solution, and used it a lot before i got a PW manager. I just like to use a scheme where if you see my PW you cannot make out what the pw will be for some other site. For example if the site is hackernews.com, the pw might be "ag" + myusualpassword. Where "ag" is the first two letters of the base64 string of the URL... in this case "hackernews.com". That was just an example... I will not divulge what I actually used to generate my poor man's salt.