What does SEO black hat mean?

Black hat seo means cheating, and the method of black hat seo does not meet the criteria of mainstream search engines. The main characteristics of black hat SEO profit are short, flat and fast, and cheating means used for short-term benefits. At the same time, it will be punished at any time because of the change of search engine algorithm.

There is no precise definition of white hat seo or black hat seo. Generally speaking, anyone who uses deception or some suspicious means can be called black hat SEO. For example, hidden web pages, keyword stacks, spam links, door pages and so on.

Edit this paragraph

Basic information

Black hat seo is different from white hat SEO, which is a long-term strategy to catch big fish. Black hat seo pays more attention to short-term interests and gains huge benefits through cheating driven by interests. In the last year or two, the most typical black hat search engine optimization is to use programs to grab a large number of search results from other classified directories or search engines to make web pages, and then put Google Adsense on these web pages. The number of these web pages is not hundreds of thousands, but tens of thousands. So even though most web pages are not ranked high, because of the huge number of web pages, users will still enter the website and click on Google Adsense advertisements.

Edit this paragraph

Black hat SEO cheating trick

Expanding external links is not necessarily by exchanging friendly links. There are many places to get external links. For example: blog comments, online comments, guest books, forums and so on. In blog comments, online comments, guest books, forums and other places, you can often see the wonderful works of black hat SEO. Below, let's talk about some common link cheating tricks of black hat SEO:

First, the blog is derailed.

Blog is a very interactive tool. In recent years, the rise of blogs has become a blessed place for black hat SEO to create new links.

1. Blog cheating: Some common domestic blogging programs, such as WordPress ZBLOG, PJBLOG, Bo-blog. In the early days of ZBLOG and PJBLOG, developers lacked SEO knowledge. ZBLOG and PJBLOG used to be frequented by black hat SEO people. And the Bo-blog blogging program still seems to give Black Hat SEO a chance.

2. Blog cheating: Blog cheating is to apply for a large number of blog accounts through procedures or artificial means. Then by publishing some articles with keyword links, these links can promote the search engine ranking of keywords.

3. Blog hidden link cheating: Cheaters provide a free blog template, and add hidden links in style files to increase the hidden links of websites, thus providing search engine rankings.

Second, the guest book group:

Group software can use the guest book to automatically publish its own keyword URL, and quickly improve external links in a short time.

Third, link factories.

"Link factory" (also known as "mass link mechanism") refers to a network system formed by a large number of web pages. These web pages may come from the same domain or multiple different domains, and may even come from different servers. After the website joins such a "link factory", on the one hand, it can get all the links in the system, and in exchange, it needs to "dedicate" its own links, so as to improve the link score and achieve the purpose of interfering with the link score.

Fourth, hide links.

Hidden links are generally used by SEO on customer websites, using hidden links on their own customer websites to connect their own websites or those of other customers.

Verb (abbreviation of verb) false link

Add a link to a JS code, frame or form. Links in this way cannot be read by spiders in search engines at all. So links are just for people to see, and search engines can't recognize them at all.

Six, web hijacking

Web hijacking, which we often say, is to copy the content of other people's websites or the whole website and put it on your own website. This black hat SEO method is very attractive to webmasters who are extremely short of web content. However, this practice is quite risky and even more despicable. The patented technology of search engine can judge from many factors that the copied webpage or website is not original and will not be included.

Seven. Website mirror image

By copying the content of the whole website or part of the webpage and distributing it to different domain names and servers, the search engine is tricked into indexing the same website or the same page many times. This is why some websites indicate that it is forbidden to mirror websites without authorization. The two websites are exactly the same, and too high similarity will inevitably affect their own websites.

Eight, website address redirection

302 Redirect: 302 represents temporary movement. In the past few years, many black hat SEO have widely used this technology to cheat. At present, major search engines have increased their efforts. Even if the website is not spam objectively, it is easy to be misjudged as spam by search engines and punished. Everyone must have had this experience. When you search a website, you will become another website. This is mainly achieved by jumping technology, and you often jump to a profitable page.

Nine, hang a black chain

Scan FTP or server for weak passwords and vulnerabilities, then hack the website and put links in it. This is illegal means, and these SEOer are also my contempt. There are many such people in China. These can be found with the help of SeoQuake plug-ins.

Cloak method

Simply speaking, masking means that the webmaster uses two different pages to achieve the best effect. One version is only for search engines, and the other is for yourself. Search engines say that this practice does not violate the rules, because the version of the website provided to search engines is optimized and usually does not truly reflect the real content contained in the webpage. If found, the website will be permanently deleted from the list of search engines.

XI。 Keyword accumulation

For a long time, when I was optimizing keywords, the purpose of stacking keywords was only one: to increase the density of keywords, and to repeat a keyword in the page code, META tag, title (especially this one), comments and picture ALT, so that the density of this keyword was very low and the search engine thought that this page was relevant. Keyword stacking technology uses a long list of repeated keywords to confuse search engines. In fact, these keywords are sometimes related to the content of the web page, and sometimes they have nothing to do with the content of the web page. This method is effective for a long time, and it is unlikely to push the ranking of a website to a very low level in a long time or a short time.

Edit this paragraph

The difference between a black hat and a white hat

blackhat seo

It is to optimize the website in a way prohibited by search engines, which affects the rationality and fairness of the website ranking by search engines. At the same time, it will be punished at any time because of the change of search engine algorithm.

White hat search engine optimization

Adopt the thinking of SEO, rationally optimize the website, enhance the user experience, and reasonably connect with other websites. In this way, the website can rank high in search engines. White hat SEO pays attention to long-term interests and takes a long time, but the effect is stable.

Edit this paragraph

Depth analysis

From the perspective of black hat SEO, they also have their reasons. Because most black hat SEO uses programs, they build a tens of thousands of pages of web pages, just as easy as blowing off dust, just let their spiders go out and catch them. Even if their website is punished a few months later, he may have earned tens of millions. For him, the return on investment is still quite high.

From the standpoint of white hat SEO, some people don't want to do this, even if it is correct. Building a website seriously is sometimes a very boring thing. You have to write content, do research, analyze traffic, analyze users' browsing paths, and communicate with users.

What black hat SEO has to do is much simpler. Buy a domain name, even use a free virtual host, or even save the domain name. As soon as the program is opened, put in the Adsense code, leave some messages in other guest books or blogs (these messages may also be automatically generated by the program), and then wait to receive the check.

Edit this paragraph

Poison the network security environment

Internet security of 20 10 is not peaceful. Hackers frequently attack vulnerable clients by using social engineering and search engine poisoning. According to TrendLabs data of Trend Micro, search engine poisoning (Blackhat SEO) technology is still the most popular attack method in Asia in the first quarter of 20 10. This attack method hides the Trojan virus behind the web page by using social hot news keywords, which makes a large number of users "recruited".

From the Spring Festival Evening report of 20 10, from "Yushu earthquake, Yunnan drought, the opening of the World Expo, house price control" to "stars running away, undressing, NBA players fighting", almost all events that can attract netizens' attention have also been exploited by "intentional" hackers. We find that cyber criminals have successfully improved the ranking of web pages containing viruses in search rankings by using Blackhat SEO technology.

Take the accidental killing of McAfee, a network security company, reported by foreign media on April 2 1 day as an example. Because the system file (svchost.exe) of Windows XP was included in the deletion list, the Windows XP system was restarted repeatedly, and users could not log in to the system. According to foreign media reports, 8,000 of the 25,000 computers in the Medical College of the University of Michigan crashed; The police station in Lexington, Kentucky must switch to handwritten reports and close the switchboard of patrol cars; Visits to several prisons were cancelled; The emergency room of Rhode Island Hospital also temporarily refused non-traumatic patients and postponed some surgical operations; Even Intel is not immune. Although this update was urgently suspended four hours after it was released to enterprise users, the seriousness of the problem forced millions of Windows XP users around the world to use search engines to find faster solutions. Although McAfee apologized to the public, canceled the defect update, and made relevant suggestions on how to manually repair the affected computers, this "manslaughter" incident was still exploited by some hackers, who made a large number of fake antivirus software (FakeAV) and web pages embedded with malicious code, and launched a new round of Blackhat SEO attacks in response to this incident, in an attempt to steal the details of users' credit cards or trick users into installing malicious code on their computers. The above means make it more difficult for the public to obtain correct information about false positives. Black hat SEO attack is not a brand-new skill. It has been widely used in network marketing before, but this attack method using popular current keyword search is still an effective way to spread malicious programs. If cyber criminals take advantage of some hot topics, or put on the "coat" of security software while improving the ranking results of search engines, and rely solely on the anti-virus software of end users, it is difficult to effectively prevent the threat of implanting FAKEAV malicious programs. In addition, many FAKEAV variants are new viruses specifically targeted at enterprises, which poses a high risk of infection to enterprises. In a relatively safe local area network, due to the ubiquitous "* * * sharing" environment, if these systems infected by FAKEAV malicious programs are not detected in time, they will not only continue to spread, but also make the enterprise network become a member of "Bot" in a short time and become a platform for cyber criminals to steal information and spread junk information. Because of the high speed of enterprise intranet and the trust relationship between terminals, they can visit each other at will, and the virus only takes 2~3 seconds to spread, so it is quite difficult to kill.

Edit this paragraph

development trends

At present, although many enterprises in our country have strengthened their defense and installed anti-virus software on their terminals, it is still impossible to avoid the occurrence of mutual infection events, such as hot event web pages and FAKEAV variants. If the traditional anti-virus code upgrade method is adopted, the client will always be in a "passive" situation. Therefore, it will be very wise to adopt cloud security solutions to strengthen the linkage between clients. In response to the continuation of the "manslaughter" incident, Trend Micro, another international security vendor, said that some users of Trend Micro products have successfully intercepted related visits to these URLs pointing to FakeAV by using their cloud security network reputation technology. Trend Micro security experts also remind information security managers in enterprises to track hot events in time, publish verified repair addresses on internal communication platforms, or access the addresses of repair tools in the vendor knowledge base to avoid a large number of possible "Gui Li" attacks.

Edit this paragraph

Positive significance of black hat SEO

1. Different degrees of changing skills and practice cases provide a lot of guiding value for SEO.

2. Constantly test the bottom line of search engines. Without their experiments, white hat SEO is difficult to improve and dangerous.

3. Compared with search engine optimization is an art, black hat SEO is even more.

Edit this paragraph

Black hat SEO industry

Why are many people willing to use black hat SEO at the risk of Google sandbox, Baidu sandbox or even K station?

1. Get rankings and traffic in a short time, and put Google AdSense ads.

2. Once, the domain name. Cn is registered at a very low price, which leads to the proliferation of sites and low cost.

3. Punishment is not enough. It will take some time for Google and Baidu to find out, which is not timely enough.

4. It is harmful to users, especially the black hat SEO means to spread viruses, and the security of bank cards and online banking is greatly reduced.