Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Autumn October, is the harvest season, but some do garbage station stationmaster Harvest is not rank and PR, but ruthless by K, from the adjustment of the Baidu algorithm can be seen, Baidu for the standards included more inclined to Google, that is, the content of the original test more stringent, some collected even false original articles, Often will be abandoned, for the flowers and painstaking use of original articles to enrich their site webmaster, this is undoubtedly a good news.
Yes, the original article often need a very long, perhaps brooding one hours, also can not write a decent, and use collection, collect one hours, if your matching rules are accurate enough to write, there may have been 2000 articles lying in your database. And some webmaster to save time, will choose to collect, in fact, these stationmaster do not know is, choose a collection, is to plant the evil result, often will open a beautiful flower in a short time, but wait until the harvest season, only original, will bear fruitful fruit, "is a pine cuibai, although dead Yusen, Mount Tai, Hober!" Some Guojie Hau Ying, outstanding, Gan Moye, thoroughly tempered, blowing the bell silent, sell iron such as mud! Use this poem to describe the original article is more suitable, even if you spend a day to original an article, it is also worth it! You have to believe that only after thoroughly tempered, can be successful, Gan Moye Jian, we do station should be so.
Said this many, some people asked, I spent a lot of time the original article, was collected by others, my station weight is too low, collect my station weight high, Baidu first collected collection station, then I this is not to do without effort. There is no need to worry, there is a way to let others collect your station, online also provides a number of methods to prevent collection, such as what to use random templates, install a collection of anti-capture plug-ins, and so on, in fact, these methods can only deal with a number of low-level collectors, once you encounter the write regular expression of the master, then these methods will be clouds, Should be picked or be picked, below I share a method to do absolutely will not be collected, let your regular expression use of the Acme, also take my station.
The method is to encrypt the URL, we know that the regular expression will match your list page hyperlinks, and then through the hyperlink address to get the content of your article page, and once you have the hyperlinks to the list page encryption, so that from the source to break the collector's path. The cryptographic functions are as follows:
function Uc_authcode ($string, $operation = ' DECODE ', $key = ', $expiry = 0) {
$ckey _length = 4; Note with the secret key length value 0-32;
Note added with the secret key, you can make ciphertext without any regularity, even if the original and key is identical, the encryption results will be different each time, increase the difficulty of cracking.
The greater the value of the note, the greater the rule of ciphertext change, and the change of ciphertext = 16 $ckey _length
Note When this value is 0 o'clock, the secret key is not generated
$key = MD5 ($key);
$keya = MD5 (substr ($key, 0, 16));
$KEYB = MD5 (substr ($key, 16, 16));
$KEYC = $ckey _length? ($operation = = ' DECODE ' substr ($string, 0, $ckey _length): substr (MD5 (Microtime ()),-$ckey _length)): ";
$cryptkey = $keya. MD5 ($keya. $KEYC);
$key _length = strlen ($cryptkey);
$string = $operation = = ' DECODE '? Base64_decode (substr ($string, $ckey _length)): sprintf ('%010d ', $expiry? $expiry + Time (): 0). substr (MD5 ($string. $keyb 0). $string;
$string _length = strlen ($string);
$result = ';
$box = Range (0, 255);
$rndkey = Array ();
for ($i = 0; $i <= 255; $i + +) {
$rndkey [$i] = Ord ($cryptkey [$i% $key _length]);
}
for ($j = $i = 0; $i < 256; $i + +) {
$j = ($j + $box [$i] + $rndkey [$i])% 256;
$tmp = $box [$i];
$box [$i] = $box [$j];
$box [$j] = $tmp;
}
for ($a = $j = $i = 0; $i < $string _length; $i + +) {
$a = ($a + 1)% 256;
$j = ($j + $box [$a])% 256;
$tmp = $box [$a];
$box [$a] = $box [$j];
$box [$j] = $tmp;
$result. = Chr (ord ($string [$i]) ^ ($box [($box [$a] + $box [$j])% 256]);
}
if ($operation = = ' DECODE ') {
if (substr ($result, 0,) = 0 | | substr ($result, 0)-time () > 0) && substr ($result,) = = SUBSTR (MD 5 (substr ($result, num). $keyb), 0, 16)) {
Return substr ($result, 26);
else {
Return ";
}
else {
Return $KEYC. Str_replace (' = ', ', Base64_encode ($result));
}
}
This function randomly encrypts the address into an unordered string, and each time it is different, so there is no rule, and no matching can be made.
Usage: If your list page URL is $str= "http://www.xiaohao.net/list/1.html", then encrypt the variable in the php file $url = uc_authcode ($url ' DECODE ', ' #$123 ') The third parameter is to add the encryption string to increase the difficulty of cracking, so that the URL on your template is added to the secret, and when you want to read the database can be used Uc_authcode ($url ' ENCODE ', ' #$123 '); So in the PHP file in the Read library operation, it will not be a dense address, so as to completely solve the original article was collected problems.