Cloaking is a search engine optimization (SEO) technique in which the content presented to the search engine spider is different from that presented to the user’s browser. This is done by delivering content based on the IP addresses or the User-Agent HTTP header of the user requesting the page. When a user is identified as a search engine spider, a server-side script delivers a different version of the web page, one that contains content not present on the visible page, or that is present but not searchable. The purpose of cloaking is sometimes to deceive search engines so they display the page when it would not otherwise be displayed (black hat SEO). However, it can also be a functional (though antiquated) technique for informing search engines of content they would not otherwise be able to locate because it is embedded in non-textual containers such as video or certain Adobe Flash components. As of 2006, better methods of accessibility, including progressive enhancement, are available, so cloaking is no longer considered necessary by its proponents.[who?]
Cloaking is often used as a spamdexing technique to try to trick search engines into giving the relevant site a higher ranking. By the same method, it can also be used to trick search engine users into visiting a site that is substantially different from the search engine description, including delivering pornographic content cloaked within non-pornographic search results.
Cloaking is a form of the doorway page technique.
|This section does not cite any references or sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (September 2011)|
Increasingly, for a page without natural popularity due to compelling or rewarding content to rank well in the search engines, webmasters design pages solely for the search engines. This results in pages with too many keywords and other factors that might be search engine “friendly”, but make the pages difficult for actual visitors to consume. As such, black hat SEO practitioners consider cloaking to be an important technique to allow webmasters to split their efforts and separately target the search engine spiders and human visitors. Cloaking allows user experience to be high while satisfying the necessary minimum keyword concentration to rank in a search engine.
IP Cloaking refers to the ability to send the same email multiple times. IP Cloaking is used to maintain the integrity of an Email Token and a corresponding SendMail Server. Batch emails are released with huge email lists. As email addresses in the list are returned due to failure, the IP Address must be randomized to prohibit being flagged for spam. IP Cloaking is used in this stage of email blitzing as a tool to build a list. Once a list is built, the IP Address no longer needs Cloaking because the list contains real email addresses.
IP delivery can be considered a more benign variation of cloaking, where different content is served based upon the requester’s IP address. With cloaking, search engines and people never see the other’s pages, whereas, with other uses of IP delivery, both search engines and people can see the same pages. This technique is sometimes used by graphics-heavy sites that have little textual content for spiders to analyze.
One use of IP delivery is to determine the requestor’s location, and deliver content specifically written for that country. This isn’t necessarily cloaking. For instance, Google uses IP delivery for AdWords and AdSense advertising programs to target users in different geographic locations.
IP delivery is a crude and unreliable method of determining the language in which to provide content. Many countries and regions are multi-lingual, or the requestor may be a foreign national. A better method of content negotiation is to examine the client’s
Accept-Language HTTP header.
As of 2006, many sites have taken up IP delivery to personalise content for their regular customers. Many of the top 1000 sites, including sites like Amazon (amazon.com), actively use IP delivery. None of these have been banned from search engines as their intent is not deceptive.
This article uses material from the Wikipedia article Cloaking, which is released under the Creative Commons Attribution-Share-Alike License 3.0.
Note: At Fantomaster Inc., we only offer fully managed customized cloaking 2.0 campaign projects for corporate clients. We do NOT offer any other blackhat services of any kind. We also do not practice or condone deceptive or misleading cloaking. We will only cloak client sites or Facebook FanPages within the specific client business niche parameters to ensure that visitors obtain the best targeted and relevant quality search experience.
Tags: Anyone With Internet Access | Behaviour Analysis | Betty White | Black Hat | Cloak | Computer Search Engine | Corporate Message | Doorway Page | Flash Components | Gaining Website Traffic | Http Referrer | Human Editors | Inexpensive Platform | Marketing Campaigns | Marketing Cost | Marketing Programs | Marketing Search Engine | Marketing Techniques | Mobile Advertising | Open Directory Project | Optimization Seo | Page Requests | Party Source | Personal Reflection | Refe | Referral Marketing | Search Engine Cloaking | Search Engine Description | Search Engine Marketing | Search Engine Optimization | Search Engine Spider | search engine spiders | Search Engine Users | Search engines | Server Side Script | Several Ways | Social Networking Websites | Traditional Advertising | Yelp
Copyright ©2013 Fantomaster Inc. All Rights Reserved Fantomaster™ is the protected Trade Mark of Fantomaster Inc.