Saturday, October 2, 2010

Black Hat Seo Techniques/Terms

Cloaking:
Cloaking is the technique whereby the web site visible to a site visitor is entirely different
from that seen by a search engine spider. The ordinary user may see one set of text and
images but underneath that image, or “cloak”, the site is “stuffed” with keywords.

Cloaking, however, can also be used to ethically increase accessibility of a site to users with disabilities or provide human users with content that search engines aren't able to process or parse. It is also used todeliver content based on a user's location; Google itself uses IP delivery, a form of cloaking, to deliver results. Another form of cloaking is code swapping, i.e., optimizing a page for top rankingand then swapping another page in its place once a top ranking is achieved.

Keyword stuffing:
 Keyword stuffing is the technique of excessively using lots of keywords with expressintention of influencing the search engines. This involves the calculated placement of keywords within a page to raise the keyword count, variety, and density of the page. There are several techniques involved in this. One is through the use of meta tags. Meta tag stuffing involves repeating keywords in the Meta tags, and using meta keywords that are unrelated to the site's content. This technique, however, has been ineffective since 2005.
<meta name="keywords" content="fiction pets, pets, dogs and cats, pet stores, dogs, cats, lizards, birds, dog collars, hamster cages, jessica alba, fish, dog shampoo, dog treats, bird seed, good dogs, bad dogs, nice kitty">

Its stuffed Meta description might read:
<meta name="description" content="Fiction Pets is the best pet store of all the pet stores. You've never seen a pet store like Fiction Pets. best pet stores, good pet stores, visit pet stores, contact pet stores">

Choose a Solid Keyword Phrase using White Hat SEO
Research your keyword phrase. Choose a solid keyword phrase that accurately represents your page and use it in your Meta tags. An example of Meta keywords:

<meta name="keywords" content="online pet store, fiction pets, pet supplies, pets store, pet supply store">
A white hat Meta description could be:
<meta name="description" content="Fiction Pets is an online pet store with a full line of pet supplies for dogs, cats, birds, fish and more. Our pet supply store can help you get everything you need for all of your pets.">

Hidden or Invisible Unrelated Text:
Disguising keywords and phrases by making them the same color as the background, using a tiny font size, or hiding them within HTML code such as "no frame" sections, alt attributes, zero-width/height divs , and "no script" sections. However, hidden text is not always spamdexing: it can also be used to enhance accessibility.Another black hat SEO method is using comment tags to hide keywords. For example:
<!--hidden content, hidden content is bad, hidden content in comment tags is bad--!>

Meta tag stuffing:
Repeating keywords in the Meta tags, and using meta keywords that are unrelated to the site's content. This tactic has been ineffective since 2005.

Gateway or doorway pages:
A doorway site is a site that acts as a referring page for another site. The doorway page is
highly optimized – containing hidden links and keywords that the ordinary web user never sees. The doorway site then climbs the search engine rankings but re-directs all of its traffic to the target – and perhaps poorly optimized site.

Throwaway Sites:
Throwaway sites are almost always doorway sites. They are web sites built by spammers
to provide a short-term and artificial boost to traffic. Once their traffic objectives are achieved they are often switched off or left to decay – hence throwaway. Throwaway sites are stuffed with links and keywords to attract and then re-direct traffic to a target
web site.

Link spam
" links between pages that are present for reasons other than merit." Link spam takes advantage of link-based ranking algorithms, such as Google's Page Rank algorithm, which gives a higher ranking to a web site the more other highly ranked web sites link to it. These techniques also aim at influencing other link-based ranking techniques such as the HITS algorithm.

Comment Spam:
Comment spam is where a spammer visits a publicly accessible site and deposits a comment with an anchor text link back to a
designated site. Forums and blogs are typical target.

Mirror Sites:
Mirror sites use an alternative URL to the target site but contain identical content. With automated page production, there maybe hundreds of different URLs all with the same content. This technique is sometimes referred to as domain duplication.

Hidden links.
Putting links where visitors will not see them in order to increase link popularity. Highlighted link text can help rank a web page higher for matching that phrase."Sybil attack". This is the forging of multiple identities for malicious intent, named after the famous multiple personality disorder patient "Sybil" (Shirley Ardell Mason). A spammer may create multiple web sites at different domain names that all link to each other, such as fake blogs known as spam blogs.

Spam blogs:
  Spam blogs, also known as splogs, are fake blogs created solely for spamming. They are similar in nature to link farms.

Page hijacking.
This is achieved by creating a rogue copy of a popular website which shows contents similar to the original to a web crawler but redirects web surfers to unrelated or malicious web sites.

Buying expired domains:
Some link spammers monitor DNS records for domains that will expire soon, then buy them when they expire and replace the pages with links to their pages. . However Google resets the link data on expired domains.Some of these techniques may be applied for creating a Google bomb, this is, to cooperate with other users to boost the ranking of a particular page for a particular query.

Using world-writable pages:
Web sites that can be edited by users, such as Wikis(Wiki spam), blogs that allow comments to be posted, etc. can be used to insert links to spam sites if the appropriate anti-spam measures are not taken.

Spam in blogs.
This is the placing or solicitation of links randomly on other sites, placing a desired keyword into the hyper linked text of the inbound link. Guest books, forums, blogs, and any site that accepts visitors' comments are particular targets and are often victims of drive-by spamming where automated software creates nonsense posts with links that are usually irrelevant and unwanted.

Wiki spam.
Using the open edit ability of wiki systems to place links from the wiki site to the spam site. The subject of the spam site is often unrelated to the wiki page where the link is added.

In early 2005, Wikipedia implemented a 'no-follow' value for the 'rel' HTML attribute. Links with this attribute are ignored by Google's Page Rank algorithm. Forum and Wiki admins can use these to end or discourage

Referrer log spamming:
When someone accesses a web page, i.e. the referee, by following a link from another web page, i.e. the referrer, the referee is given the address of the referrer by the person's internet browser. Some web sites have a referrer log which shows which pages link to that site. By having a robot randomly access many sites enough times, with a message or specific address given as the referrer, that message or internet address then appears in the referrer log of those sites that have referrer logs. Since some search engines base the importance of sites by the number of different sites linking to them, referrer-log spam may be used to increase the search engine rankings of the spammer's sites, by getting the referrer logs of many sites to link to them.

Other types of spamming

Mirror web sites:
Hosting of multiple web sites all with conceptually similar content but using different URLs. Some search engines give a higher rank to results where the keyword searched for appears in the URL.URL redirection. Taking the user to another page without his or her intervention, e.g. using META refresh tags, Java, Java Script or Server side redirects.

Article spinning:
One of the most widely use form of black hat SEO today is article spinning. This technique is similar to duplicate content, however, this works by rewriting existing articles, or parts of articles, and replacing elements to avoid being penalized in the Search Engine Results pages for using duplicate content. This type of black hat SEO is also a form of copyright infringements if the original article was used without the copyright owner's permission.

Link farms:
Link farms in one of oldest forms of link spam which involve any group of web sites that all hyperlink to every other site in the group. Although it was designed to allow individual websites to selectively exchange links-with other relevant websites, it was used by unscrupulous webmasters who joined the services to receive inbound links and then found ways to hide their outbound links or to avoid posting any links on their sites at all. Search engines countered the link farm movement by identifying specific attributes associated with link farm pages and filtering those pages from indexing and search results.

Comment spam:
One of the most widely used form of black hat SEO today is the comment spam. This involves the use of world-writable pages such as blogs, wikis, guest books, and many other publicly accessible online discussion boards. This can be problematic because agents can be written that automatically randomly select a user edited web page, such as a Wikipedia article, and add spamming links.

0 comments:

Post a Comment