Search Engine Optimisation

SEO - Search Engine - Preventing crawling - Increasing prominence

White Hat SEO - Black Hat SEO - Techniques - Marketing Strategy






Seo Spam

Spam, in almost any form, is bad for your health. The vast majority of web users would agree with that statement and nobody would even think of the finely processed luncheon meat-product made by Hormel. Even the word itself is infectious in all the worst ways, being used to describe the dark-side and often deceptive side of everything from email marketing to abusive forum behaviour. In the search engine optimization field, spam is used to describe techniques and tactics thought to be banned by search engines or to be unethical business practices. While writing copy for our soon to be revised website, the team put together a short list of the most outrageous forms of spam we had seen in the last year and a short explanation of the technique. Please note, we do not encourage, endorse or suggest the use of any of the techniques listed here. We don't use them and our clients' sites continue to rank well at Google, Yahoo, MSN and Ask. Also, since Google has been the dominant search engine for almost five years, most of the spammy tricks evolved in order to game Google and might not apply to the other engines.

1. Cloaking Also known as "stealth", cloaking is a technique that involves serving one set of information to known search engine spiders while displaying a different set of information on documents viewed by clients. While there are unique situations in which the use of cloaking might be considered ethical in the day-to-day practice of SEO, cloaking is never required. This is especially true after the Jagger algorithm update at Google, which uses document and link histories as important ranking factors.

2. IP Delivery IP delivery is a simple form of cloaking in which a unique set of information is served based on the IP number the info-query originated from. IP addresses known to be search engine based are served one set of information while unrecognized IP addresses, (assumed to be live-visitors) are served another.

3. Leader Pages Leader pages are a series of similar documents each designed to meet requirements of different search engine algorithms. This is one of the original SEO tricks dating back to the earliest days of search when there were almost a dozen leading search engines sorting less than a billion documents. It is considered spam by the major search engines as they see multiple incidents of what is virtually the same document. Aside from that, the technique is no longer practical as search engines consider a far wider range of factors than the arrangement or density of keywords found in unique documents.

4. Mini-Site Networks Designed to exploit a critical vulnerability in early versions of Google's PageRank algorithm, mini-site networks were very much like leader pages except they tended to be much bigger. The establishment of a mini-site network involved the creation of several topic or product related sites all linking back to a central sales site. Each mini-site would have its own keyword enriched URL and be designed to meet specific requirements of each major search engine. Often they could be enlarged by adding information from leader pages. By weaving webs of links between mini-sites, an artificial link-density was created that could heavily influence Google's perception of the importance of the main site. In the summer of 2004, Google penalized several prominent SEO and SEM firms for using this technique by banning their entire client lists.

5. Link Farms Link farms emerged as free-for-all link depositories when webmasters learned how heavily incoming links influenced Google. Google, in turn, quickly devalued and eventually eliminated the PR value it assigned to pages with an inordinate collection or number of links. Nevertheless, link farms persist as uninformed webmasters and unethical SEO firms continue to use them.

6. Blog and/or Forum spam Blogs and forums are amazing and essential communication technologies, both of which are used heavily in the daily conduct of our business. As with other Internet based media, blogs and forum posts are easily and often proliferated. In some cases, blogs and certain forums also have established high PR values for their documents. These two factors make them targets of unethical SEOs looking for high-PR links back to their websites or those of their clients. Google in particular has clamped down on Blog and Forum abuse.

7. Keyword Stuffing At one time, search engines were limited to sorting and ranking sites based on the number of keywords found on those documents. That limitation led webmasters to put keywords everywhere they possibly could. When Google emerged and incoming links became a factor, some even went as far as using keyword stuffing of anchor text. The most common continuing example of keyword stuffing can be found near the bottom of far too many sites in circulation.

8. Hidden Text It is amazing that some webmasters and SEOs continue to use hidden text as a technique but, as evidenced by the number of sites we find it on, a lot of folks still use it. They shouldn't. There are two types of hidden text. The first is text that is coloured the same shade as the background thus rendering it invisible to human visitors but not to search spiders. The second is text that is hidden behind images or under document layers. Search engines tend to dislike both forms and have been known to devalue documents containing incidents of hidden text.

9. Useless Meta Tags Most meta tags are absolutely useless. The unethical part is that some SEO firms actually charge for the creation and insertion of meta tags. In some cases, there seems to be a meta tag for virtually every possible factor but for the most part are not considered by search spiders. StepForth only uses the description and keywords meta tags (though we are dubious about the actual value of the keywords tag), along with relevant robots.txt files. All other identifying or clarifying information should be visible on a contact page or included in the footers of each page.


Search

Search Engine Optimisation Articles

SEO Search Engine Preventing crawling Increasing prominence
White Hat SEO Black Hat SEO Techniques Marketing Strategy

Search Engine Optimisation Books

SEO Search Engine Preventing crawling Increasing prominence
White Hat SEO Black Hat SEO Techniques Marketing Strategy

Search Engine Optimisation