The successful way of Internet Entrepreneurship (v): Site exchange links also beware of counterfeit

Source: Internet
Author: User

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

After the website is built, maintenance and management become the work that needs to be carried on continuously. In this chapter, the site will be optimized for internal links, efficient maintenance, PR upgrade way to introduce.

Optimize the internal link of the website

Two, the website effective maintenance three general knowledge

Third, improve the site PageRank have a coup

The above details can go to "Internet entrepreneurship Success (five): Web site management and maintenance" read.

Iv. Site Exchange links also beware of counterfeit

With the same type of site exchange links, not only for their own site to bring users, the biggest advantage is that can increase the weight of the site, improve the site in the search engine rankings. However, there are many false links in the network, here we enumerate some common links cheat methods, in exchange for links with other sites, you should pay attention to these problems.

1. Bait Exchange and then delete

The most common situation in the process of building a station is to exchange links with a site, after a period of time to find the other side of the site has no link. This is easier to see, as long as the usual more attention can be. But for many web sites, a query is obviously unrealistic, which let those who do not have moral loopholes.

If the site chain to take over, a manual inspection is obviously very troublesome, we can link the bulk of the query software, to see whether the link site has back to the chain, landing linkhelper.cn, enter the site address, a little bit later can show the site's friendship link information.

Figure 4

2. Very hateful false website homepage

A lot of webmaster are through e-mail exchange links, there are some webmaster, send you an exchange of links to e-mail, the link has been added to the site, and gave a website address, but this address is not the general home page, and often is similar to www. domain name. com/link.php? Then followed by a long string of code, if you click on this link, you can see that this site does have your site.

Wait a minute, if you put their links on your website, you're not worth the candle. Try to use the site's domain name directly in the browser login, is not found their own site has not?

Yes, this is the most common fake link spoofing, and the real home page of this site is probably index.html. To avoid similar link spoofing, you need to pay attention to the exchange of links when the page address, to see whether the real home is really a link, do not click on the long list of URLs directly sent over. Encounter this situation, often will enter for you a person prepares the homepage.

Figure 5

3. Malicious link tag that cannot be passed the weight

Because the link can bring weight to the site, the weight is the importance of the site in the search engine, so in the exchange of links, if you see the other side of the site has been placed on your Web site, but also first, it is possible that its links with the nofollow attribute. This tag is usually used in comments or forums, because these places are most likely to produce spam links, so links with nofollow attributes do not pass weights.

Some webmasters even use JavaScript scripts to invoke links. This link is turned, although this link allows users to see, but for the search engine is meaningless, and can not pass any weight.

For such a situation, in the exchange of links must check the source code of the other site, the way is directly in the page click the right mouse button, select "View Source file" can be in the pop-up text file to see if the source code has its own site links.

4. False PR exchange link to see

PR is the abbreviation of Google's PageRank value, in general a website PR value is bigger, its website weight is also higher. When one day a PR8 site to exchange links with you, do not rush to promise, carefully look at its website, whether it is really so good. If it is a page and content is passable site, then its PR is likely to be false.

This false PR website, is generally used to hijack other high PR domain name method obtained. The use of cheating means to get the rankings are temporary, in exchange for links with such sites, it is likely to let their site also be the search engine punishment.

V. Objectionable content of the website against Vulgar Prohibition

Some time ago, the country launched a boycott of the Internet vulgar wind special action, a large number of sites have been found to be vulgar content, and even some well-known large websites. As a personal webmaster, if the operation is the interactive type of Web sites, such as forums, blogs, SNS, etc., often there will be some users upload inappropriate content, so that the site is not a small risk, then how should be checked and replaced it?

1. Word shielding makes vulgar words nowhere to be found

Various types of interactive Web sites, such as forums, blogs and so on, and now popular SNS community, basically open the user's articles, pictures and other content of the submission function, and most of the information site also opened the function of self-help contributions. Although this facilitates the exchange of everyone, but there are no small drawbacks, a lot of the content of the violation is due to users do not comply with the provisions of the upload. To prohibit vulgar content from the source, you can set the program to do the shielding words.

Domestic more popular Forum program is discuz!, here we take the discuz! forum as an example, to explain the Forum shielding method: first into the Forum Management panel, into the "POST" tab, open the "Word filter" column. Then fill in the need to filter the bad words can be. It can also be set to replace, and if the user publishes content with a offending word, it is automatically replaced with another word.

Figure 6

Tips:

Other types of CMS or SNS programs are mostly similar functions, limited to space, here will no longer repeat. You can use the official Help file or search to find a way to modify it.

2. It is illegal to borrow the search self test content

We can query the scope of the vulgar content, select the key words through the search engine or site search program to find out whether there is a violation of the article information, usually on the network has a similar list of prohibited keywords, and the webmaster can use the words of this type of violation of the content of the site search, query the site has all kinds of illegal information To avoid offending content as soon as possible.

Figure 7

The internet also has a dedicated query system for self-test, such as the internet on the "website Illegal information self-examination system" into the query page, enter the site's domain name address, click the query can be found in the site whether there are various types of violations of information. If similar content is found, it needs to be deleted as soon as possible.

Tips:

All kinds of self-test query tool to search the offending content is not comprehensive, and there may be some errors, so after the system automatically query, or need to manually check.

3. Change the content of the data replacement website quickly

When through the above methods found that the site has violated the content, what should be done? If you need to delete less content, you can use the program's own delete function to delete. If there are some bad keywords in most of the content, you can use the following methods to quickly modify the offending information.

Since most sites are now built using Php+mysql, here's how to bulk replace the content of such programs. If the site's management panel has the "Execute MySQL" function, you can go directly to the corresponding function operation page, use the replacement statement can:

Update table name set field name =replace (field name, ' original content ', ' replace content ')

Figure 3 is the DEDECMS SQL command line run tool. If your program does not provide similar functionality, you can also do content substitution via a platform such as phpmyadmin, such as the database management tool.

Figure 8

Vi. simple configuration to make the Web server impregnable

Your site is often black, or a no attention to become a hacker's "chicken"? For Web site servers, if not security settings, it is easy for hackers to "stare", at any time there is the risk of intrusion. What, you think the security settings are complicated? It doesn't matter, through our introduction of the IIS server security settings of the three strokes, can be a good defense against attack.

1. Basic Set up patch Delete share

Personal owners often use Windows servers, but we often do not have specialized technicians for security settings through leased or hosted servers, which leads to some common basic vulnerabilities. In fact, as long as the simple installation of the server patch, you can prevent most of the vulnerabilities of intrusion attacks.

After the server has installed the operating system, has not been officially enabled, you should complete the installation of various patches. The server's patch installation method is similar to the XP system we use, and there is no more to repeat.

Do a basic patch installation, more important is to set up an accessible port, usually the server only needs to open the Web service to provide the necessary port, other unnecessary ports can be prohibited. It should be noted, however, that the remote port 3389 of the Management server must not be banned.

Deleting the default share is also a necessary step, the server will be open after sharing is very likely to be virus or hacker intrusion, so as to further power or delete files, so we should try to turn off file sharing. There are several ways to remove the default share, such as using the net share C $/delete command to turn off the default share feature of the C disk.

Figure 9

2. Permission allocation to prevent virus Trojan intrusion

Good server permissions can minimize the harm, and if each IIS site has different permissions, it is difficult for hackers to invade the entire server by means of a side-note attack. Here is a brief introduction to the method of permission setting.

In the system, the permissions are divided according to the user's way, to manage users, you can open the server in turn "start → program → management tools → Computer Management → Local Users and groups", you can see the Management Server all the system users and user groups.

Figure 10

When partitioning a server, you need to divide all the hard disks into NTFS partitions, and then you can set the permissions that each partition opens for each user or group. You can set permissions on a file or folder by right-clicking on the folder where you want to set permissions, and choosing properties → security.

For a Web site, you need to assign an IIS anonymous user to each site, so that when users visit your site files, they have the most permissions to the site directory, which is a good way to prevent other sites from being invaded.

3. Component management makes unsafe components disappear

The server defaults to support many components, but these components can also become a hazard, the most dangerous component is WSH and shell, because it can run the server hard drive EXE program, such as it can run the claim to elevate serv permissions and even use Serv to run higher privileges of the system program.

The easiest way to uninstall the most insecure components is to delete the appropriate program files directly.

Tips:

In addition to the above security settings, some details of the operation also need attention, such as not browsing the Web page on the server, to install anti-virus software to the server, to prevent ARP attack software and other security programs.

Please pay attention to the other paragraphs in chapter Fifth:

Seven, to understand the "spider" to improve the site included

Eight, cleverly speed up the display of Web pages

Nine, improve the domain name PageRank tips

RELATED links:

The successful way of Internet Entrepreneurship (IV.): Improve the function to make the website more easy to use

"Internet Entrepreneurship success: Web site planning, construction, promotion of profitable combat strategy" is a comprehensive explanation of the whole process of website construction of a book, is also the author of five years experience in the establishment of a summary of the station.

This book revolves around the whole process of website construction, from the beginning of the site planning, one by one explained the site creation, site content management, website maintenance, network marketing programs, website SEO, website profitability and other practical operations, and in the form of examples for you to introduce the success of the network business case and website operation of the misunderstanding, So that we can learn the most direct site experience.

A5 Webmaster Network will be serialized this book, if you want to first read, you can go to the Network of Excellence Online bookstore Purchase, the book in Xinhua bookstore throughout the country also has sales.

Author: Tao Qiufung (endto) publishing house: Computer newspaper Electronic audio-visual publishing house.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.