Chapter 30. Black optimization methods

Invisible Text is the method of “black optimization” that appeared in the Internet first and is used to the present day. As it comes from the name, this is a publication of invisible for user text on the site page. For example, when placing numerous key words. To make the text invisible, its color is set the same as the background’s, or it is placed under some images, or its size is so tiny that it looks like a thin line.

Doorway is the website that looks real for searchers, but it’s specially made to be adored by them (basically our “friend and enemy” in America is Google; in Russian traffic the case is slightly different). They are to redirect users to another site, so doorways are transit pages.
As a rule, every doorway is fitted for a single request (key word) and often contains an automatic redirect to the target website (but not always).
Just place an auto redirect to the desired webpage (see below to learn how) with help of JavaScript (or Flash).

Cloaking is the method of reaching top in search systems by “showing” different pages to the search robot (spider) and user. So you can get a good rating without limiting the design beauty, since what searchers like usually looks bad (with some exceptions). For this method, you should have two different versions of your page: first one is for search robots, second one is for visitors. So when developing the page for visitors, you may create whatever you want with no thinking of search optimization. But when developing the page for spiders, you’ll need to know how search engine work and about methods of optimization. Doorway developing skills will be required. But there is an advantage if compared to doorways: first, you don’t need to make any redirect or make user click one more time (users don’t like it much). Secondly, no one of your rivals will be able to learn your secrets to a successful indexing by search robots, since optimized page can be seen only by spiders and IP-address can’t be forged. Anyway the page should be well optimized. Of course, there are minuses. For example, the complexity of implementation. Since cloak creation is a very labor-consuming process, you need to have some programming skills and know the methods of webpage optimization for search engines. And not just to know but to know how to practice it. So there is sense in cloak creation only if you’re experienced in doorways. But that’s not all, you need to have big databases of search robots’ IPs and their names. I conclude the introduction into cloaking, read more about this stuff in other articles of this part.

Link Spam is the method of website optimization when the number of links to the source is grown artificially without taking into account the website theme. Or there is an automatic link exchange within a group (“ring”) of sites. Link Spam is used for quote index boost. This optimization method is usually considered as a “gray” or even “black” depending on a certain search system administration decision. Placing invisible for user links is considered a definite violation of search system usage rules. In the worst case, the site may be put into “a black list” and be excluded from the search system database.

Reciprocal Link Exchange is one of the easiest ways to exchange links between sites. You make an arrangement about links exchange with another website, place the link into your site. So does your reciprocal links exchange partner. Because of the abuse of reciprocal link exchange by some web developers, search machines took it into account and changed the algorithms.
Currently reciprocal link exchange doesn’t affect the site statistics too much. It’s been done because links suppose another site recommendation, and if the site is really recommended than the link should be gratis.
But whatever you do, the search machines take into account such links anyways, and smart reciprocal link exchange can be beneficial.
There is no complexity in the very reciprocal link exchange. The complexity is in controlling return links and checking the honesty of a mutual exchange.
One of the simplest deception in Reciprocal Link Exchange is failing to place a reciprocal link or deleting it in a time.
Only a constant return links check and reciprocal link publication control will help in the situation.
Other ways of deception in Reciprocal Link Exchange are extremely hard to find out sometimes.

Swindlers use different methods of deception in Reciprocal Link Exchange:

  • Setting for search bots a ban on indexing some pages of the site, on which is actually placed your return link. The ban is set through file robots.txt or metetag “robots”.
  • Using the tag “noindex”, which prohibits the search bots to index the parts of text with a return link.
  • Using rel= “nofollow” in tag <a> in your return link.

Swindlers’ motive for a Reciprocal Link Exchange is to get a unilateral link to own site.
The conclusion is to be careful with Reciprocal Link Exchange.
Strive to exchange with sites of your own theme. It considerably enhances the value of links. Don’t turn your website pages into a link dustbin.
Link dustbin is a page full of a great amount of different links. Search systems don’t grant sites with such pages.
And the most important thing, don’t practice “black” methods in Reciprocal Link Exchange yourself! If you once get dirty, it may take a lot of time to get your site washed clean.

Code Swapping is one more Black Seo technology.
The idea is very similar to cloaking, but if works slightly different. You develop a webpage, then promote it, e. g. so it’s in top 100. Perfectly indexed in the search engine, the page has no problem. But something else is necessary. Sometimes situation changes and the content don’t satisfy its author anymore.

This can happen in different cases, but mostly the stuff that hangs on site plays the main role – you want even more! Here comes the content substitution, so then the page is no longer interesting for anyone. But it starts to make good money (e. g. from clicks on the link stuff).

That’s it. First you index, earn a good rating, and then stuff it with an excessive and needless ads. Of course, search machines keep an eye on such business and can ban the site, if it appears that it’s not just a usual content update, but a complete content substitution for your own profit. That’s criminal, in other word :  ).

Difference from cloaking: cloaking is substitution for (someone), Swapping is substitution (when).