SEO – Black Hat Prepared by: Murali Venkatesh http://www.prestiva.com/seo/ http://blog.prestiva.com Black Hat SEO – Search...
Common Techniques <ul><li>Keyword Stuffing </li></ul><ul><li>Invisible Text </li></ul><ul><li>Doorway Pages </li></ul><ul>...
KeyWord Stuffing <ul><li>The idea of Keyword stuffing is to repeat a keyword as often as possible throughout a website wit...
Invisible Text <ul><li>Invisible text works by using a number of techniques including same color text, negative z-index, a...
Doorway Pages <ul><li>Simple websites with stuffed content that is designed to only ever be seen by search engine spiders....
Cloaking <ul><li>Cloaking works by using the features of the HTTP request in order to identify and deliver unique content ...
Other Techniques <ul><li>Typo Spam </li></ul><ul><li>Link Dumping </li></ul><ul><li>Faking Page Ranks </li></ul><ul><li>Co...
Typo Spam <ul><li>Typo spam works by having multiple versions of the same site, most of which have misspellings in them, s...
Link Dumping <ul><li>Link Dumping is simply posting a link to your site on as many websites as possible. Often this is don...
Faking Page Ranks <ul><li>By using cloaking and redirection techniques, you can build up a page rank off of your competito...
Content Scrapers <ul><li>Content Scrapers are computer programs that go out onto the web and borrow content from other sit...
Google Bowling <ul><li>Generally using off-site tactics to bring down your competitors rankings. Examples include; links f...
Questions? Contact : http://blog.prestiva.com http://www.prestiva.com/seo/
of 13

prestiva_blackhat

prestiva_blackhat
Published on: Mar 4, 2016
Published in: Technology      Design      
Source: www.slideshare.net


Transcripts - prestiva_blackhat

  • 1. SEO – Black Hat Prepared by: Murali Venkatesh http://www.prestiva.com/seo/ http://blog.prestiva.com Black Hat SEO – Search Engine Optimization
  • 2. Common Techniques <ul><li>Keyword Stuffing </li></ul><ul><li>Invisible Text </li></ul><ul><li>Doorway Pages </li></ul><ul><li>Cloaking </li></ul>
  • 3. KeyWord Stuffing <ul><li>The idea of Keyword stuffing is to repeat a keyword as often as possible throughout a website without setting off red flags. </li></ul>
  • 4. Invisible Text <ul><li>Invisible text works by using a number of techniques including same color text, negative z-index, and text overlaid on top of Flash objects. </li></ul>
  • 5. Doorway Pages <ul><li>Simple websites with stuffed content that is designed to only ever be seen by search engine spiders. Scripts and server side programming is used to send spiders to these optimized pages. </li></ul>
  • 6. Cloaking <ul><li>Cloaking works by using the features of the HTTP request in order to identify and deliver unique content to a specific ip or User-agent. </li></ul>
  • 7. Other Techniques <ul><li>Typo Spam </li></ul><ul><li>Link Dumping </li></ul><ul><li>Faking Page Ranks </li></ul><ul><li>Content Scrapers </li></ul><ul><li>Google Bowling </li></ul>
  • 8. Typo Spam <ul><li>Typo spam works by having multiple versions of the same site, most of which have misspellings in them, sometimes redirecting to the proper page when visited by a non-spider. </li></ul>
  • 9. Link Dumping <ul><li>Link Dumping is simply posting a link to your site on as many websites as possible. Often this is done by posting topics in a forum, blog, or similar function. It can also be done by more nefarious techniques. </li></ul>
  • 10. Faking Page Ranks <ul><li>By using cloaking and redirection techniques, you can build up a page rank off of your competitor’s. After about 3 months you should have higher page rank and you end the redirection. </li></ul>
  • 11. Content Scrapers <ul><li>Content Scrapers are computer programs that go out onto the web and borrow content from other sites for you. These content scraper programs scrape what is on other sites so you have the content for your sites. </li></ul>
  • 12. Google Bowling <ul><li>Generally using off-site tactics to bring down your competitors rankings. Examples include; links from bad neighbors, un-stealthy redirects, mass automated querying. The idea is to make it look as if your competitor is using black-hat techniques to get them banned. </li></ul>
  • 13. Questions? Contact : http://blog.prestiva.com http://www.prestiva.com/seo/

Related Documents