SEO attacks and attacks

Source: Internet
Author: User

Seo is a SEOer that increases its ranking by cracking down on rival websites. There are many methods. I will introduce some SEO attacks and small secrets today.
Method 1: someone who uses hacking technology to attack a competitor's website will ask: "I am the author, you treat your opponent as a fool. I don't know if someone else has attacked another website ?" Well, SEO won't be discovered as long as it doesn't do silly things on the attacked website (replace the homepage with the most silly ones. SEO requires search engine rankings, not names on other websites, and there is no need to make too many changes to other websites. Just do a few small moves.
Action 1: block spider IP addresses on compromised independent servers.
Action 2: After the VM is attacked, if the peer is a dynamic web page, modify its page and add
<Meta name = "robots" content = "noindex, nofollow, noarchive"/>
 
In order not to be discovered, SEO often does not let the code be directly output to the browser, but the html is only displayed to the spider. The php code for determining whether the access is from a spider is as follows:
 
/**
* Determine whether it is a search engine spider
*
* @ Access public
* @ Return string
*/
Function is_spider ($ record = true)
{
Static $ spider = NULL;
 
If ($ spider! = NULL)
{
Return $ spider;
}
 
If (emptyempty ($ _ SERVER ['HTTP _ USER_AGENT '])
{
$ Spider = ";
 
Return ";
}
Www.2cto.com
$ Searchengine_bot = array (
'Googlebot ',
'Mediapartners-google ',
'Baidider ider + ',
'Msnbot ',
'Yodaobot ',
'Yahoo! Slurp ;',
'Yahoo! Slurp china ;',
'Askspider ',
'Sogou web spider ',
'Sogou push spider'
);
 
$ Searchengine_name = array (
'Google ',
'Google adsens ',
'Baidu ',
'Msn ',
'Yodao ',
'Yahoo ',
'Yahoo China ',
'Iask ',
'Sogou ',
'Sogou'
);
 
$ Spider = strtolower ($ _ SERVER ['HTTP _ USER_AGENT ']);
 
Foreach ($ searchengine_bot AS $ key => $ value)
{
If (strpos ($ spider, $ value )! = False)
{
$ Spider = $ searchengine_name [$ key];
 
If ($ record = true)
{
$ GLOBALS ['db']-> autoReplace ($ GLOBALS ['ecs']-> table ('searchengine '), array ('date' => local_date ('Y-m-d'), 'searchengine '=> $ spider, 'Count' => 1 ), array ('Count' => 1 ));
}
 
Return $ spider;
}
}
 
$ Spider = ";
 
Return ";
}
This kind of action also has advanced gameplay, that is, blocking only Baidu spider, blocking only Google spider, or even cyclical alternate blocking, making it even harder to be discovered.
Action 3: The robot.txt of the attacker, which has a higher probability of being detected. However, sometimes the competitor's website runs on a VM, and all the pages automatically generate html, so that SEO cannot execute action 1 and Action 2. This is the only option.
Method 2: low-level methods help others brush Baidu rankings many people are refreshing Baidu rankings. Of course, most of them are refreshing their own websites. However, there are some other users who are hacking for others' websites, but the lower their competitor's website rankings are. SEO hackers tried to tell Baidu that the website was cheating through the lowest-level cheating method. Come and punish them. Of course, this website is a competitor.
Method 3: The first two methods are used to create garbage for his webpage. They are mostly used to attack the opponent's main site. Method 3 is used to attack the competitor's external chain. When the opponent publishes information or soft text on other information networks, if the page can be commented on, the SEO hacker will often construct a spam comment, and write everything such as the license and spring medicine into it, if the Administrator is negligent and spam messages are not deleted in time, the page will be regarded as spam by the search engine in a few days, and the external link will naturally become invalid.
The above has not exhausted all the tricks of SEO. On the one hand, there will still be operation methods that I do not know, and on the other hand, I am not willing to give all the methods I know. Because the author wrote this article to help SEOer understand other people's attack methods, improve vigilance, and do a good job of defense, rather than willing to see SEO hitting method is widely used.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.