Lucheng SEO training: Several common black hat methods

Lucheng SEO training: Several common black hat methods

In the SEO industry, the only thing that does not have a complete tutorial is black hat techniques. I have written several articles about black hat techniques recently, and many friends are still quite interested in it. Because there has not been a complete introduction before, it has basically been glossed over. So this time I wrote this article specifically to clear up the doubts in our hearts and satisfy your curiosity. Download address: Baidu Netdisk https://pan.baidu.com/s/1kWNogf1

Although search engines have struck back at black hat SEO time and time again, it still revives. Here we will introduce several common black hat methods.

Black Hat SEO 1: Station Group Spider Pool
Many black hat SEO methods require the use of spider pools. For example, the certificate application and credit card we mentioned before all require this type of method to be optimized.

First of all, you have to master the keywords of the entire profession. Generally, the keywords of your own profession will not be less than 10,000, especially for certificate processing. It is very simple to combine region + keywords, subject + adverb. Of course, you can also use keywords to dig up things.

The second step is to automatically generate pages through the software. Most CMS do not have this function, because you need to add your own keywords and then generate the page. The content part is collected. Most of this function is achieved by collection tools. As for what collection tools are and how to modify the rules, the editor will not share them here to avoid suspicion of advertising, but most collection tools can do it. Just contact the software author and pay him to help write the rules!

The third step is to continuously add external links to the page through the spider pool. When you use the site tool to query the domain name of this site, you will not find that this website has external links, but in fact it is the anchor text made by the spider pool.

Summary: This method is done in the form of a station group.

The second black hat SEO: spider pool + large portal uses the high-authority web pages of large portals, and then uses the spider pool to continuously publish external links to them, and then makes the search engine mistakenly believe that the dynamic page of the large portal is this keyword.

First, find a group of large websites. Note that these large websites must be large websites that do not prohibit dynamic page entry. In addition, you must still have a group of keywords. These keywords can be big words, because we are using other people's websites to do the ranking.

The second step is to add a question mark and then a random number after the URL of the homepage of a large portal website. You will find that it is still the homepage. We link this page to the spider pool and link it to this page by publishing the spider pool. One page links to about 5,000 spider pools.

Summary: The advantage of this technique is that it can cover a large number of keywords and rank quickly, but if it is blocked by the portal, then all keywords will be out of the question.

Black Hat SEO 3: Parasites
Most parasites buy sites from hackers and then continuously generate new pages for their sites to rank, but this technology is no longer practical. The more important reason is that I am not a hacker, I am just an SEO person, so I don’t understand any of the hacker tricks and I can’t share them with you!

1. Generally, high-authority websites are managed by professional programmers, and it is not easy for hackers to gain access.

2. Generally, even if you get the authority for a low-authority website, it will not have much value to your ranking.

The above three are the black hat methods that were popular in the SEO industry back then. Why do I emphasize "back then" here? Because we need to know that as long as the so-called black hat methods introduced on the Internet are basically yesterday's news, so the truly valuable black hat methods that can be used now still have to rely on our own exploration and research! Of course, there may be only a few such people!

<<:  There are 3 basic ways to get traffic when promoting APP!

>>:  APP promotion: How to cultivate core users!

Recommend

A complete guide to WeChat public account advertising promotion!

According to data released by the Enterprise Thin...

Competitive product analysis of Tik Tok and Yoo Video!

Framework of this article 1. Background and Purpo...

When Jing Haipeng met the Swiss astronaut, he told a "tearful" story

Why can't Chinese astronaut Jing Haipeng cry ...

The Bronze, Silver and Golden Ages of Chinese Makers

The word "maker" comes from the transla...

What is the difference between To B operations and To C operations?

From a purely conceptual point of view, the diffe...

The single product strategy of Internet celebrity brands

In recent years, it is not uncommon to see intern...

When we played music on a mountain destroyed by fire, something magical happened

We have all listened to the sounds of nature, whe...

Apple officially abandons iTunes! How to sync iPhone and iPad to Mac?

Recently, Apple officially released the new syste...

Some tips for iOS development

1. In iOS development, when we communicate with p...

HTC One M8 Review

The HTC One M8 is equipped with a 5-inch 1080p dis...

ViewController has many good transition animations

Source code introduction Cool transition animatio...