Simply put, the so-called cloaked technology refers to the site to different visitors selectively return different page content.
You have a cloaked page on your server. This "Web page" is actually a server script that reads the visitor's IP address. It checks whether the visitor's IP address is a well-known search engine address (such as Googleyahoo, etc.). If the visitor IP address is found to be a certain search engine address, identify the visitor as the "search engine spider" Otherwise the visitor is the true "human user".
Server scripts can optionally return different page content based on the visitor's identity if the visitor is a true "human user", you can return to the home page of the site or not to the highly optimized pages. If the visitor is a "search engine spider", you can return a highly optimized page.
You can see the main point of the cloaked page is: the same Web page address (URL) search engine got a highly optimized content of the Web page and real users see different content!
It's stupid up there. The user_agent that the client software (typically the browser) that requests the Web page to use the IP address as a means of identifying the visitor can also be used to identify the visitor.
We have discussed the cloaking mechanism. Here's how to talk about risk management issues. Cloaking is risky. The search engine has publicly stated that it is against cloaking that it may be punished if caught.
This article comes from:http://www.google-china.net
In order to minimize the risk you should take the following strategies: 1 The website is best placed on another site different from your main website. 2 maintain an accurate and up-to-date search engine IP Address List 3) directive search engine do not cache your cloaked Web page (that is, search engines do not maintain a snapshot of your cloaked pages)
Explain each strategy separately below.
1 You should use a new domain name and a new Web server to use your cloaking mechanism so that when you are punished your primary domain name can escape from the day of birth. Remember that domain name WHOIS information is best different.
2 The occasional change in the IP address of a search engine is best able to maintain an up-to-date list to make your cloaking page work.
3 search engines provide snapshots of the pages that will naturally expose your game to the people who visit your site and see if it's worse for your competitors or peers.
Make sure to use the noarchive meta tag in the cloaking Web page. If a search engine ignores the instructions you use in HTML, don't take it as an optimization object.
The last and most important question: "Should you not use cloaked?" This ethical-related issue is left to everyone.
Many people think that cloaking is despicable and immoral. They claim that you cheat search engines to achieve the wrong rankings. The other side argues that the cloaked Web site is trying to provide more relevant results to search engines ...
Of course, there are practical problems to consider. How long it takes to create and maintain a cloaking system. The amount of money you spend (buying a cloaking software to register a new cloaking domain name and hosting server) or the time (you write your own script) is worth comparing with the flow of the system.
Editor's note: The publication of this article will only let you know more cheating methods, rather than recommending the use of this approach, I hope that we do not use cheating methods to disrupt the Internet.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.