What is a proxy hijacking

Source: Internet
Author: User
Keywords Search engine Agent service

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Like the PR hijacking, some of the more difficult to prevent the black hat framing techniques, would not want to actively discuss, because there are many times will be innocent of the webmaster caused great damage.

In the first two days of the SEO case, referred to the agent hijacking (proxy hijack), someone asked what is going on, today to explain. Like this kind of thing is a double-edged sword, malicious people to see, but also a beggar-thy-neighbour tool. On the other hand, the owners who have already been harmed by them have looked at them and may have a positive effect on their prevention and recovery.

Agent hijacking is simply said that search engines are included through the proxy server browsing the Web page, and the original real page to punish or delete.

The domestic webmaster is certainly familiar with proxy server. When you use another Web site on a proxy server, the URL that the browser displays is typically similar to the following:

Http://www.*****.com/proxy/www.*****.com

Where *****.com is the proxy server domain name, *****.com is the website that really wants to visit.

It is certainly okay to open this URL in the browser, but if the search engine crawls the URL, it will form a full copy of the original site. While copying content pages is only negligible in most cases, in some cases, the search engine is wrong, and the original version is penalized or even deleted as a copy.

Typically, URLs accessed through proxies should not be included. But if someone maliciously links to this proxy URL, the search engine will also access and crawl.

How to prevent or restore the ranking of the agents hijacked?

The simplest, if you see their own web page is hijacked, check the IP address of the proxy server, the IP address on their own server to screen off, prohibit crawling.

But sometimes, the proxy server's IP address will change, and the proxy server so many, it is likely to shield not come over. A more sophisticated approach is to use the server-side program to identify whether a search engine spider is a real search engine or not.

In some cases, search engine spider through proxy URL access browser type (User agent), or search engine spider. However, some proxy server may be set to hide the original IP address, hide the user agent, which is to determine whether the search engine spiders caused great difficulties.

Then the website program needs to actively verify whether the visitors are really search engine spiders. If the program test is really a real spider, return to the normal page. If the test is not a spider is a normal user, or a fake spider, then the returned pages are added to the noindex,nofollow tag. So that these original web pages through the proxy access, can not be crawled by search engines.

Google2 month published in Blackboard and webmaster blog translation Matt Cutts how to verify Google Spider posts (Matt Cutts of the original posted not in their own blog, but in the English version of Webmaster blog), is not a play, but has a deep meaning. From the current 0 reference links and comments, most people do not know what the use of this post is.

Supposedly search engines should have a way of judging this kind of proxy hijacking, otherwise it becomes a simple way for some people to frame their competitors. However, any algorithm has a loophole, even if the algorithm can be 99% of the correct judgment, but the slip through the error may cause the innocent site to be deleted.

Writing this article is to introduce to many people, so that we can better prevention. The use of this method intended to frame others, I believe that everyone will be very despised.

Seldom write posts to think that the less people understand the better. This is an article.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.