Crazy black Hat seo with dark chain lost search engine rankings

Source: Internet
Author: User
Keywords Hacker SEO Black Hat

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Mention the dark chain, we will think of "Secret love"! But what we have to say here is not "secret love" but "dark chain". Dark chain is also called "Black Chain". Hacking on the page by inserting a dark chain is called a "dark chain attack."

Dark chain usually refers to hackers in the Web site to gain control of the site, the Web page to embed the link information and other code. The implementation of the dark chain is very simple, are done through the CSS style, by the implementation of the classification, there are usually three types of dark chain:

1. Make the link information invisible by setting the display property to none.

2. By linking the characters infinitely small, to reach the naked eye is not visible.

3. Links are not visible by making the link character consistent or similar to the background color of the Web page.

4. Link location, so that links appear to visible outside the screen, to achieve dark chain effect.

The most obvious animal of the dark chain is "dark", which is hidden in the source code of the Web page, invisible directly on the page by the naked eye.

Hackers implement the purpose of the dark chain is very simple: the vast majority of search engines that when a site is referenced by multiple sites (links), then the content of the site is high quality, is widely read by netizens, so in search engine search results rankings, the site ranking natural rise.

is dark chain harmful to the website?

Many students may think that: since the dark chain of information directly with the naked eye can not see, it seems to have no impact on the site, it is entirely possible to ignore. In fact, this is not the case, the vast majority of search engines think that when a large number of sites to quote it site links, the site is less original content, poor quality, natural search engine results in the rankings will fall, and the ranking of the decline will directly affect the site to visit the passenger traffic and the site revenue and

Crazy Dark Chain attack

Since the web hanging horse gradually away from our vision at the same time, dark chain attack rapid outbreak, there are analysis: Dark chain is a complete replacement of the site horse. Today's hackers are no longer the brazen web of horse-going, and are turning to more obscure dark-chain attacks.

Since the dark chain is usually invisible to the unaided eye, so many times the dark chain can often be kept for a long time, and not be found by the administrator, recently, well-known network security companies know that the Chinese Red Cross Foundation Emergency Rescue Fund website was implanted dark chain news, however, even so, in nearly one months past, The author visited the website again and found that the dark chain information still exists.

  

To the writer's surprise, there was an online donation channel on the site, and the embedded dark chain meant that the site had been hacked, and a website with online transactions would be very costly if hackers tampered with the feature or account. Through the red will the site's dark chain information we can easily see that the chain site may be a lot of illegal.

Knowledge of the "China Internet Web site Security Report (2010)", released at the beginning of the year, shows that the data that has been statistically alarming after a year-long monitoring of the creation of the site has been dramatically increased in the past year by dark-chain attacks, just one year At the same time, the number of sites with dark chains has reached the peak of similar data in the past few years.

  

Dark chain, this past seemingly simple way of attacking, is gradually eating the site's PR value, it seems to be a small problem, but it reflects that the site is being hacker control, hackers can do anything, when such as Red will be the site of hackers control, think about let people fear, stationmaster, pay attention to it. Your data is being eroded, your privacy is being violated, your site is being implanted with illegal information, and your ranking is losing. In this harmonious country, perhaps tomorrow the computer room should dial the line.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.