Analysis on the misunderstanding of search engine optimization

Source: Internet
Author: User
Keywords SEO

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Search engine optimization cheating refers to the imperfect search engine algorithm to take the corresponding deceptive means to improve the page weight and related behavior, according to the operating range of cheating can be divided into "internal cheating" and "external cheating."

Internal cheating refers to the behavior that affects the page weight and the correlation by manipulating the internal factors of the website, while external cheating refers to the behavior of influencing the page weight and correlation by manipulating the external factors (external links) of the website. Common search engine Optimization cheating methods include:

1. Keyword Piling

2. Hide Text

3. Mirror Web site

4. Door page

5.302 redirect

6. Camouflage

7. Link spoofing

Of these, 1-6 belonged to internal cheating, while 7 belonged to external cheating.

1. Keyword Piling

Keyword piling refers to the stacking of a large number of keywords on a page that are related to or unrelated to a page theme, in order to increase the word frequency of certain keywords to improve page relevance. Areas that are commonly used for piling keywords in a page include body content, labels, and comments. The content of the text in the Stack keyword refers to the page body tag (that is ...). tags) anywhere in the stack with pages related or unrelated keywords, as shown in the following figure.

  

Piling keywords in the content of the page will not only affect the appearance of the page and the user experience, but also a deceptive search

Engine irregularities, search engines can easily identify.

2. Hide Text

Hidden text is one of the earliest and simplest methods of search engine optimization cheating, through the "hidden" page stack of keywords, to achieve both increase the key word frequency, improve the relevance of the page, but does not affect the appearance of the page and user experience purposes.

Hidden text is usually implemented by controlling the text's font size and color property values. Therefore, these "hidden text" for ordinary users is not visible, but search engines can be identified.

(Note: "Hidden text" is also a way of "keyword piling".) )

3. Mirror Web site

In a broad sense, a mirrored web site is one that replicates or copies other sites. There are three common mirror sites:

The first is cloning a Web site that binds multiple domain names on sites with exactly the same content (which may be on the same server or on different servers), such as binding the domain name "www.xxx.net" and "www.xxx.com" on the same content site.

The second is for the content of the same site to develop a number of different styles of page templates, and then bind multiple domain names.

The third is the data acquisition site, which refers to all the content of the site is collected through the acquisition program.

To reduce the duplication of information in search results and improve the user experience, search engines can reduce the weight of mirror sites or ignore the content of mirrored sites.

4. Door page

"Door page" that is "doorway pages", also known as bridge, jump or entry page, refers to the search engine for a specially optimized page, when the user visits the door page, will automatically (or guide the user manually) to another content completely different page. For example: "Page 1", "Page 2" is the "site A" page, "Page 1" for the search engine for a special optimization, and "Page 2" is a normal page. When a normal user accesses the site, it automatically jumps from page 1 (or guides the user manually) to page 2, that is, "Page 1" exists to guide the user to page 2, and when the search engine accesses the site, the page 1 is the first, and page 2 may be ignored. In this way, this specially optimized "page 1" can be a better performance in search engines, while ordinary users in the search results click on the "Page 1" link, will automatically (or guide users manually) into the "Page 2." At this point, we call "Page 1" as the door page. The door page may be for a search engine, or it may be for several different search engines. Because each search engine algorithm will be more or less different, some people in order to improve the site in each search engine performance, will be for different search engines to build different door pages, and then to different search engine Spider program return the corresponding door page.

For example, if the program is monitoring the Googlebot that came to visit, then return to Google for a special excellent

, if it is Baidu's Baiduspider, then return to Baidu for a special optimization of the page.

Search engines can easily identify door pages. For the use of portal pages of the site, the search engine punishment is very strict, the light to reduce the weight of the site, the heavy people directly from the index to clear.

5 Camouflage

"Camouflage" namely cloaking, refers to the behavior of returning different pages according to the user identity, is one of the most commonly used jump ways of the door page. For example: In the face of search engines and ordinary users return to different pages, to the search engine to return to a specially optimized page, and normal users return to the regular page. In any case, "camouflage" is to deceive the search engine irregularities, so the search engine will be punished.

"Camouflage" principle: first of all to visit the user's head agent information to judge, if the search engine spider Spider Program is returned to the search engine for the page, otherwise return to the normal page. In the "camouflage" you must know the search engine Spider program Header agent information, which we can find in the server log. For example: Google spider spider Program "Googlebot", Baidu Spider Spider Program "Baiduspider". The following describes the "camouflage" code implemented in PHP:

$trouve =strpos ($_server["Http_user_agent"], "Googlebot");

if ($trouve!==false) {

?>

... Pages for Google ...

}

else{

?>

... Pages for ordinary users ...

}

?>

6.302 redirect

Redirection refers to forwarding an access request to a directory or file to another directory or file (refer to the "URL redirection" section in the URL Optimization chapter for details).

Redirects include 301 redirects and 302 redirects. Of these, 302 redirects are also referred to as temporary transfers (temporarily moved), which are suitable for temporary replacement of domain names or directory names. Common 302 redirects include "meta redirection" and "JS redirection." In the use of 302 temporary redirection must be very cautious, otherwise it will be easy to fall into the wrong door page and be punished by the search engine.

Meta redirects are redirects that are implemented by setting the Http-equiv property value and content of the META tag. For example: in the page header plus code "", then open the current page 3 seconds and automatically jump to the site "www.xxx.com."

In Meta redirects, if the set of stay time is too short (such as: Stay time less than a second), it will be the search engine is considered "door page." To avoid the "door page" Suspicion, we usually set the stay time to over 3 seconds when we jump using Meta.

JS redirection refers to redirects that are implemented using the Javascript language. The code looks like this:

The code indicates that the request to access the current page is forwarded to "http://www.xxx.org". With JS redirection, we just need to put the above code on the page that needs to be redirected.

7. Link cheat means

Link cheating refers to the use of the search engine to the external link relationship, the establishment of external links around a series of deceptive search engine behavior.

Spam links are the behavior of obtaining large quantities of high-quality or low-quality external import links by improper means. Strictly speaking, a spam link is an act, not the quality of the page on which the link is imported.

From the point of view of the quality of the page in which the link is imported, the spam links can be divided into high quality spam links and low-quality spam links, from the point of view of the link between the source page and the target page, which can be divided into one-way and two-way spam links.

1. High quality spam links

High-quality spam is the act of getting an import link from a high-quality page by improper means, usually on a WIKI site (Wikipedia and Baidu, for example).

A common feature of the source pages of high quality spam links is that these pages are editable, and the spammers are editing these pages to achieve the purpose of releasing the spam link information.

2. Low quality import link

A low quality import link is the behavior of obtaining an import link from a low-quality page by improper means, low-quality garbage links often appear in the "Forum", "message board", "Self-Help Link System" and "blog" and other pages, the spammers through mass information software to achieve the spread of spam links information.

To determine whether a page is a low quality page, there are two basic conditions: one is the weight of the page itself (for example: we can use Google PR value as a reference indicator); The second is the number of links exported to the page.

3. One-way spam links

One-way spam link refers to the use of improper means to obtain the import link unilaterally, one-way spam links often appear in the "Forum", "blog", "Encyclopedia", "message book" and other pages, spammers usually through mass information software in such pages posted link information.

4. Two-way spam link

Two-way spam links are those that provide both an export link and an import link (the most common two-way spam link is a low quality page with a large number of external export links). Two-way spam links are characterized by the one side of the import link and the provider of the import link. Based on this relationship, search engines can easily identify two-way spam links.

5. Spam link identification

Junk links seriously affect the quality of your search results. As a result, the search engine on the spam link is very severe, light weight reduction, the heavy directly from the search engine index to clear. However, how do search engines identify spam links? Common methods include the following:

A. Manual inspection, the major search engines will have Anti spam department, that is, the anti-spam site department;

B. User reports, such as: your competitors or ordinary users may be the initiator of the report;

C. program tracking, most search engines have established a more intelligent algorithm, according to the characteristics of a variety of spam links to monitor.

6. How to avoid spam links

First of all, the need for practitioners to have a good professional ethics, not to do the release of the garbage link; There should be strict requirements for each Exchange link's site in categories, quality, and external export links

SEO optimization Mistakes summed up, I hope that the major webmaster Help!

Above content from Http://www.pqshow.com/andy original if you need to reprint, please specify the source!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.