forumeuropi

Информация о пользователе

Привет, Гость! Войдите или зарегистрируйтесь.


Вы здесь » forumeuropi » Реклама и объявления » many black hats


many black hats

Сообщений 1 страница 2 из 2

1

Cloaking – when website or web pages are set up to display different content for a search engine spider versus a human user. Cloaking delivers one version of a page to an Internet user and a different version to a search engine. The cloaked page is packed with keywords and phrases that the website wants to be highly r
ank for so.

It is done by cloaking programs that compare the IP address of the requesting party to a database of known IP addresses from specific search engine spiders. If the IP address matches one on the list, it serves a page that was specifically written for the search engines.

There are good reasons for cloaking as well, such as targeted advertising, but if you are trying to manipulate your rankings in the search engines then your site could be penalized or banned.

[url=http://www.real-blog-spam.info]blo
gger posting[/url]

Spamming (Keyword Stuffing) - “Stuffing” long lists of keywords into the content and the code on a page that makes the page unreadable

link submission

Ever seen a web page with a very awkwardly written first paragraph where a certain word is repeated ad nauseam? Here's an example:

"We sell the best father's day gifts for father's day. If you like to celebrate father's day we can help with the best father's day gifts for father's day."

It's obvious that the page is trying to rank well for “father's day gifts.” This is keyword spamming or stuffing but it is just the tip of the SEO iceberg; there is probably keyword stuffing happening in the code: in the meta tags, invisible text, alt tags, title tags, comment tags, etc. If the word or phrase is repeated too often Google can place a filter to reduce the site's rankings or simply ban the site. Keyword density can be tricky but, as a general rule, Big Oak shoots for 3% to 12% of all text on a page to be our targeted keywords.

cloaking

Hidden Text – if text or links are invisible to the website visitor but can be seen by search engine spiders then they are considered hidden.In the past people would simply make the text too small to read by using a 1 point font or make it the same color as the background. Now that search engines have built in algorit
hms to combat that, spammers are using cascading style sheets (CSS) to hide text or using <div> tags set to not display text on the page. It is boils down to this: it is considered hidden if the text or link is invisible to the website visitor but can be seen by search engine spiders.Search engines can easily spot this today so it is best to avoid it altogether.

buying links

Doorway Pages – pages that solely exist to rank well in the search engines. Sometimes these pages are ugly, containing paragraph after paragraph of meaningless text. Most the time doorway pages are orphaned pages meaning they are not part of the site's regular navigation.

content rotation

A black hat SEO firm may use software to generated doorway pages. They plug a few keywords in and the software proceeds to generate pages where much of the content is duplicated from other pages on the site except they swap out the keywords.

ip delivery forums

Redirect Pages - keyword-stuffed landing pages that quickly redirect to the real page. These pages don't necessarily contain content that any human would be interested in. They are meant to show up high in search engine results pages (SERPS). When you click on one of these pages from the results, you are redirected to
another page–usually a high-pressure sales page. In other words, the page you click to see is not the page you actually get to read.

gov backlinks

Sneaky redirection pages are set up in groups. They target similar and related keywords or phrases. The only links on these pages are links to other pages in the same family creating a false sense of related linking. The redirect can be automatic, done with a meta refresh command or through other means such as mouse m
oving while on the redirect page.

automated blogger posting

Duplicate Content or Websites – setting up multiple websites with the same content or having several pages on a site with essentially the same information but different keywords inserted here and there. You see the duplicate content method a lot with travel-oriented sites. A "template script" is written then regional
terms, such as state or city names, are swapped out on each page.

internet site cloaking

Of course, someone may have copied the content on your site and put it on their site. The search engines do not make any distinction on who had the content first. Make sure no other site is using your content. You can do this by performing a search using some of your text with quotation marks (") around it. If you do find someone is using your original copy visit here to learn more about copyright infringement: http://www.google.com/dmca.html.

site generation

Code swapping - submitting a text-only version of a web page to the search engines in an effort to gain high rankings for that page. Once the desired positions within the search engines are achieved the search-engine friendly text page is swapped out for a content page designed for human visitors. This will only work
for a limited time as the search engine spiders will eventually return to that page and find its content has changed.

site cloaking

Link Farms – typically a network of sites that are all interlinked to one another and have no other benefit but to try to boost the link popularity of the sites. Link farms are mostly used to try to increase the Google PageRank of a site.

gov links

Helpful Google & Yahoo Links

    * Google webmaster guidelines
    * Google's warning about search engine optimization companies
    * What Yahoo! considers unwanted
    * Google Spam Report Form

0

2

Geat article here is the Wiki definition.

Black hat
From Wikipedia, the free encyclopedia

Originally all people with a high level of skills at computing were known as hackers. Over time, the distinction between those perceived to use such skills with social responsibility and those who used them maliciously or criminally, became perceived as an important divide. Two terminologies developed: the former became known as hackers or (within the computer security industry) as white hats, and the latter as crackers or black hats. The general public tends to use the term "hackers" for both types, a source of some conflict when the word is perceived to be used incorrectly in written reports. In computer jargon the meaning of "hacker" can be much broader.

Usually a Black Hat is a person who uses their knowledge of vulnerabilities and exploits for private gain, rather than revealing them either to the general public or the manufacturer for correction. Many Black Hats promote individual freedom and accessibility over privacy and security[citation needed]. Black Hats may seek to expand holes in systems; any attempts made to patch software are generally done to prevent others from also compromising a system they have already obtained secure control over. A Black Hat hacker may have access to 0-day exploits (private software that exploits security vulnerabilities; 0-day exploits have not been distributed to the public). In the most extreme cases, Black Hats may work to cause damage maliciously, and/or make threats to do so as blackmail.

Here is a few more resources : forum spamming : google spam : link spam

Forums and blogs are rife with this at the moment and the only answer seems for forum owners to move the spam to a controlled area.

0


Вы здесь » forumeuropi » Реклама и объявления » many black hats