68.gif

Search (advanced search)
Use this Search form before posting, asking or make a new thread.
Tips: Use Quotation mark to search words (eg. "How To Make Money Online")

04-24-2019, 06:28 AM
Post: #1
Black Hat SEO Techniques
1. Unrelated Keywords
Do: Add irrelevant keywords to the copy for extra page hits.
Example: "Kanye West would use our Dyson vacuum cleaners if he owned cats."
2. Keyword Stacking and Keyword Stuffing
Do: Repeat keywords to the extent that it reads like gibberish in a sentence or image alt text.
Example: "Picture frames picture frames pictures pictures pictures."
3. Tiny Text, Hidden Text, and Hidden Links
Do: Put illegible text at the bottom of the page, make the text the same color as the background, or format text or images that are visually undetectable as links.
Example: "This is a short sentence full of illegible gray text."
4. Cloaking
Do: Present search engines with one set of content and site visitors with another, tricking visitors from search engines into experiencing a page of substantially different content.
Example: A user searches for "happy octopus", clicks on a search result that appears to be about sea creature psychology, and is greeted with pornography.
5. Doorway Pages or Gateway Pages
Do:: Haphazardly stuff pages with keyword phrases with the primary goal of achieving a high ranking and then automatically redirect visitors to a separate page.
Example: A page, filled with keyword phrases but little coherent content, that uses JavaScript or a meta refresh tag to redirect visitors to a separate and potentially unrelated page.
6. Bait-and-Switch or Page Swapping
Do:: Get a Web page indexed and ranked and then change the page entirely.
Example: Clicking on a result in the SERP takes the user to a page that is completely different from the keywords used for searching and the description provided in the SERP.
7. Duplicate Content or Mirror Site
Do:: Copy a substantial amount of content from another website, with or without permission.
Example: A website reprints an authoritative article found elsewhere to increase the number of visitors.
Do:: Blog using software that generates garbled text with keyword phrases for the sole purpose of getting visitors to click on ads.
Example: "Caffeinating the Mountain Dew with MSG is a summer treat safer than Guinness." 9. Blog Spam or Comment Spam
Do:: Automatically post links as comments on blogs to increase the number of inbound links.
Example: "Great post! |3uy ch34p v14gr4 w1th fr33 5h199ing."
10. Trackback Spam
Do: Abuse trackbacks with links to unrelated links on blogs.
Example: "[…] randomized keyword phrases related keyword more random keywords […]"
11. Spam Ping or Sping or PIngback Spam
Do: Notify ping servers of new content several times per minute to give the illusion that content is new.
Example: Software that automates the process of notifying various ping servers of supposedly new content.
12. Referrer Spam
Do: Advertise a website by making repeated requests using a fake referrer URL to websites that publicize referrer statistics.
Example: Scripts that automatically follow links on illegitimate sites can land spam websites in publicized referrer logs.
13. Link Farms
Do: Seek links from or link to sites with unrelated or low quality content in an attempt to improve visibility in the SERPs.
Example: A long list of unrelated links and with supporting content can be found at pagehole.com.
14. Cybersquatting or Domain Squatting
Do: Register a domain with a trademarked word in the name with the intent to profit off of the association.
Example: juliaroberts.com was originally registered by Russell Boyd. It was later handed over to Julia Roberts after it was determined in court that Boyd "registered and used the domain name in bad faith".
15. Typosquatting or URL Hijacking
Do: Register a domain name that is a misspelled version of a popular website or a competitor in an attempt to mislead visitors.
Example: whitehouse.com may confuse users who intend to visit whitehouse.gov.
16. Social Networking Spam
Do: Target demographics on social networking sites and message people with advertisements.
Example: "Visit example.com to see pics of me and my friends ."
17. Cookie Stuffing or Cookie Dropping
Do: Stealthily place affiliate cookies on computers.
Example: A spammer inserts a URL to a fake image on a message board that puts affiliate cookies on the computers of forum visitors.
04-24-2019, 03:34 PM
Post: #2
RE: Black Hat SEO Techniques
These are 8 Risky Black Hat SEO Techniques according to the Google expert:
Paid Links. Matt Cutts explains it clearly:
Spam Comments.
Duplicate Content.
Article Spinning.
Cloaking.
Doorway Pages.
Keyword Stuffing.
Invisible Tex
07-15-2019, 08:09 AM
Post: #3
RE: Black Hat SEO Techniques
Um...shouldn't this post be titled 'HOW TO GET YOUR SITE BANNED PERMANENTLY IN LESS THAN 24 HOURS"?
08-26-2019, 11:58 AM
Post: #4
RE: Black Hat SEO Techniques
PBN is the best black hat seo technique
08-30-2019, 07:32 AM
Post: #5
RE: Black Hat SEO Techniques
(08-26-2019 11:58 AM)acethegunnerzzz Wrote:  PBN is the best black hat seo technique

Yeah, but you have to do it RIGHT or else you just wasted time and $$
8.gif
I don't suffer fools gladly, but I will gladly make fools suffer.
05-12-2020, 06:58 PM
Post: #6
RE: Black Hat SEO Techniques
From 10 years experience, it told me that organic traffic (wherever you can get, real or fake) is the best method.
06-26-2020, 06:44 AM
Post: #7
RE: Black Hat SEO Techniques
Isn't there a lot of spamming involved? How do you get around it? Spam is easily detected. Is there also a way of smart spamming? I would be interested in learning about it if there is. Also if we keep on using unrelated keywords, wouldn't it deter the traffic after some time?




18.gif