Search
Related Links

 

 

Informative Articles

Blogging, Spamming and Blog Spam
Email marketing once proved to be immensely effective, but the greedy and idiotic polluted the well by spamming the planet with everything from weight-loss products to sexual enhancement drugs and beyond. Because of the stench, filters and laws have...

Corporate Email Policies Lower Unnecessary Legal and Security Risks
What comes to your mind when you think about your email? Email makes possible almost instant communication with your co-workers without leaving your desk, a quick note to a family member who lives far away, but also has a very annoying...

Dispelling the Myths - Will WebPosition Get My Site Banned from Google?
Dispelling the Myths - Will WebPosition Get My Site Banned from Google? by Matt Paolini In mid November of 2003, Google seriously revamped their ranking algorithm. As a result, many sites were dropped from their index, or fell dramatically in...

Importance of Meta Tags Optimization
In this article, we simply talk about what Meta Tags are, their importance, the important Meta Tags and useful tips on how to optimize your Meta Tags for a better ranking with the search engines. "Meta Tag Optimization is an...

The 5 Best Revenue Models in E-Commerce History
There was a time, back in the 20th century, when everyone wanted to have their own online shopping cart system. By 1997, Amazon.com had served their millionth customer and was really starting to impress regular folks. The internet looked like...

 
Search Engine Cloaking


Cloaking


As soon as you mention the idea of page cloaking you can be sure that someone somewhere is going to jump to the conclusion that you intend to cheat the search engines. There is no denying the fact that search engine spammers have used page cloaking in the past, and that the reputation of cloaking has been damaged as a result. The fact remains however that there are still many legitimate reasons for wanting to dabble in various forms of page cloaking, so don't be too quick to judge!



What is Page Cloaking


Page cloaking is the practice of altering contents of a page depending on the software, method and/or IP address being used to access it. Cloaking has been made possible through the use of server side technologies such as ASP and PHP (amongst others), and has been abused so much in the past that it will probably never shake off it's bad reputation.


Cloaking is used in all manor of situations, some of them you won't even be aware of until it is pointed out to you. I'll admit to using it on my own site, and I'm not ashamed of the fact either!



Cloaking Methods


There are several different ways of implementing cloaking; each is based on the environment variables that are passed to the server as part of the actual request.


What browser/program is making the request? (HTTP_USER-AGENT)

What IP address are they trying to connect from? (REMOTE_HOST)

What page (if any) did they come from? (HTTP_REFERER)

Did they recently request a page? Have they already set preferences? (Session data)


While the environment variables available to us can be used independently to make generalizations and educated guesses, they become powerful customization tools when combined.


By identifying the program used to make the request, we get an idea of how the data will be used and the capabilities of the browser. Suddenly we can use specialized page designs without having to use or redirect users to different URLs depending on what they could handle. It can also prove an effective way to reduce needless data transfer costs; by sending only the code the browser or bot will understand.


When we want to target groups of users based on their geographical location or connection speed, we can use IP addresses to make an educated guess. Different ISPs will own different IP blocks; these ISPs may operate in a specific region or offer only broadband services. While gathering and maintaining current IP data can be a chore, it is probably the best way to get information on the location of the user without specifically asking them.


The use of referral or session data is probably the most interesting area of cloaking however, as this is where we can learn more about the person making the request. With a little research, you can match visitor types by the sites they come from and tailor the site to their needs. Referral and session data can tell us a lot about the visitor without actually needing to identify them; the possibilities are limited only by the imagination!



Why use Cloaking?


There are many different reasons why people want to use page cloaking, and while some of these can be devious in nature, others are designed to be helpful or to standardize the user experience. Some reasons for using page cloaking include: -


To serve known search engine bots with content optimized for best results.

To hide the real keywords and text used for rankings from normal visitors.

To alter the identity of the site depending on who accessed it.

To protect the server and it's contents from malicious bots or misuse.
To re-brand shared content depending on the domain name used to access it.

To limit the options available depending on browser features or capabilities.

To iron out browser inconsistencies.

To serve relevant information to the user based on Operating System and/or browser.

To create a more personalised experience for the visitor.

You see page cloaking is perhaps more common than you first think, and when you look at the whole picture it doesn't seem as bad as some people make it out to be. It's not so much whether or not you use it, but rather how you use it.


I use ASP and dynamically edit the page to show the style sheet optimized for the browser. Even though my server changes just one line from one browser to the next, it is technically page cloaking; the style sheet it serves to the visitor using Opera is not the same style sheet it sends to the visitor using Internet Explorer. Ironically, if I chose to use a script on the client side to do the same thing, it would not be considered to be page cloaking!


So why does it matter where the script is executed if they both do the same thing?


It's all because we can look at the source code of the script when it is on the client side; thus we can see the alternatives that are available simply by looking at the way the script works. On the server side however, all the logic is hidden away in some script or server module and we only see the results of the server's decision; not how it came to the conclusion on how it should respond to the request.



The Dark side of Cloaking


The use of cloaking is controversial because of the way it has been abused in the past. Some search engine optimisers use it in their promotional campaigns to serve pages optimised for each of the search engines. While this may seem unfair to other site owners fighting for rankings with the same keywords, some of the arguments for doing so are certainly feasible.


Why increase the visitors download time by including Meta tags they don't normally see?


Why send images to the search engines when all they really look at is the text?
Why should they share keyword lists they spend the time researching?


All the reasons above may seem rather selfish, but just because a Webmaster wants to minimize their data transfer costs and protect


the investment of their time and effort does not make them an unethical person. Only when the topic of the alternative pages strays from the page the visitor sees can the practice of optimizing for the search engines in this way be deemed to be unethical. There is a fine line between optimizing a page for the search engines and misleading them altogether!


Page jacking occurs when a site owner takes the source code of a page that performs well in the search engines and cloaks it behind their own site. If this is done properly, a search engine spider will see the optimized page and do one of two things; improve the ranking of the unrelated site, or remove the original site from their indexes. This unethical use of cloaking is unfortunately difficult to spot, and is one of the reasons why the use of cloaking is so controversial.



Is Cloaking all that Bad?


Lets forget for a moment the role and ethics of using cloaking for promotion and concentrate on the human factor. After all the main interest of any site owner should be the thoughts and feelings of their visitors.


Given the choice, I'm sure you would like to make your web site more intelligent. Does this particular visitor use a Mac or a PC? Opera, Netscape or Internet Explorer? Why should you waste the user's time by asking them for information that is readily available by the way their browser identifies itself? Wouldn't it be easier to just establish how best to optimize the page source code for the user's browser and operating system before they get it?
By establishing details from the user agent string and determining IP addresses, it is also possible to make an educated guess at the best default language or localized settings. It would be far more convenient if your visitors didn't need to convert the prices into their own currency or search through a long list of international branches to find their nearest store!
Although the examples used above describe the use of program identification and IP address to customize the user experience, user-friendly cloaking scripts can also make use of things such as referrer and session data. Knowing that a visitor came from a search engine while looking for a particular keyword gives you a great opportunity to optimise the page for better conversions. This can even work for informational sites; if they came to that page looking for information, there is a chance that they might be interested in buying a book on the subject!


Cloaking could also be used to protect yourself, your site and your visitors in a variety of ways. For example, it can be used to: -

Ban IPs of known email harvesters (useful if you run a community site).

Minimise the damage and cost of bots flooding the server.

Filter out questionable content from visitors that enter from a child oriented site.

Limit access by countries that require it by law or who are likely to find the site content objectionable.

Disable site features such as order forms to those surfing from problem IP addresses or countries thought to be involved with fraud.

Such legitimate uses of cloaking ought not to be penalized by the search engines. However the activities of site owners that optimize for the engines have meant that those that dare to implement such features to their site run the risk of being banned by the search engines.



The Future could be Bright!


The use of cloaking is sure to become more commonplace as time goes on. Not everyone will hold back on implementing features that improve the usability of their site just because they are worried they will be banned by the search engines.


It would be sad to see the legitimate use of cloaking thwarted by the minority of site owners who choose to use it purely to achieve higher rankings through deception. Cloaking has the scope to make sites seem far more intelligent than they are, to the point where it becomes invisible to the vast majority of people who visit the site that use it.


Wouldn't it be nice to make a visitor feel more "at home" on your site the first time they visit it? Or to provide alternatives to those with limited access so they don't have to miss out entirely?


Cloaking can make such features a reality. If we are willing to let it!


If, you are determined to possibly reap the big rewards as well, target=_top>Click Here!



< d>
< r>
< able>
James O’Keefe is the owner of My Millionaire Friend. offering FREE articles, tips, hints, and real-world advice on how to make money with your website. Visit his site or join his FREE newsletter by sending a blank email to mailto:newsletter@mymillionairefriend.com.



< d>
< r>
< able>



< d>< r>




Webmasters and Ezine Publishers:



Free content for your newsletter or your website!



You are invited to use this article in your newsletter or website. The only requirement is the inclusion of the following, after each article used:
James O’Keefe is the owner of My Millionaire Friend offering FREE articles, tips, hints, and real-world advice on how to make money with your website. Visit his site or join his FREE newsletter, by sending a blank email to mailto:newsletter@mymillionairefriend.com.


< d>

ABOUT THE AUTHOR
James O’Keefe is the owner of My Millionaire Friend offering FREE articles, tips, hints, and real-world advice on how to make money with your website. Visit his site or join his FREE newsletter, by sending a blank email to mailto:newsletter@mymillionairefriend.com.


 

Mailwasher Anti Spam Software: The Reliable Free Spam Blocker
Reliable anti spam and spam blocker software, protect your computer from unwanted email spam. Control spam and stop viruses before you download them.
www.mailwasher.net
 
EarthLink® spamBlocker - For Windows Users
Anytime, anywhere, EarthLink connects people to the power and possibilities of the Internet. Connect to the Internet with High Speed, DSL, Cable, Satellite, ...
www.earthlink.net
 
FREE Spam Blocker and Email Filter Software to Stop Spam in ...
A plugin for Outlook that works for a POP3 account. Available for 2000/XP.
www.openfieldsoftware.com
 
Spam Blocker - the best spam blocking/filtering software
Spam Blocker - the best spam blocking/filtering software.
www.adscleaner.com
 
Microsoft Outlook SPAM Blocker -- filter spam and junk email with ...
Spam Blocker features VBA-enabled filtering technology that integrates tightly with Microsoft Outlook 2000/2002.
www.programmingmsaccess.com
 
SPAM BLOCKER COALITION – Join the anti-spam fight!
The SPAM BLOCKER COALITION is a new grass roots anti spam effort created to fight ... <a href="http://www.killersites.com/antiSpam.php">spam blocker - help ...
www.killersites.com
 
Free Spam Blocker Download - SpamButcher
SpamButcher's spam blocker filter will solve your spam problem. Its advanced spam filtering software can stop spam with up to 98% effectiveness.
www.spambutcher.com
 
Spam Filter Review 2007
Spam Filter Review - Top Spam Filter Software Reviewed.
spam-filter-review.toptenreviews.com
 
Cloudmark - Intelligent Messaging Security for Service Providers ...
A toolbar for Internet Explorer which blocks sites containing spyware, viruses and worms, and helps protect against identity theft and phishing.
www.cloudmark.com
 
spamgourmet - free disposable email addresses, spam blocker
spamgourmet provides spam protection using on-the-fly self-destructing disposable email addresses. Users can also set up rulesets for trusted or permitted ...
www.spamgourmet.com
 
Spam Filter for Outlook - Outlook Express and Servers - SPAMfighter
Block Spam - Spam Blocker - Anti Spam Software - Block Email Junk - Exchange anti spam - Enterprise Spam Filter - Email Server Spam Filter - Spam and virus ...
www.spamfighter.com
 
Free Spam Blocker Solutions
Free Spam Blocker Solutions: Polesoft Provides You the Safe Solutions: ... Lockspam Outlook is a safe and efficient Free Spam Blocker Solutions which is ...
www.polesoft.com
 
spamBlocker for Unified Threat Management | WatchGuard ...
spamBlocker for Unified Threat Management on WatchGuard Firebox appliances blocks incoming spam.
www.watchguard.com
 
Msn spamblocker software by MSN Content Plus and others
Msn spamblocker. latest reviews ... Reviews newsletter. Free Downloads Msn spamblocker. SpyLOG. catalogue. msn spamblocker at Free Downloads Center ...
www.freedownloadscenter.com
 
to Give an Answer » WordPress Trackback Spam Solution
Enter my new “Mod_Rewrite Trackback Spam Blocker” WordPress plugin (yes, I know, ... Mod Rewrite Trackback Spam Blocker - Gives a line of code to add […] ...
blog.mytechaid.com
 
Download free applications - WeOnlyDo! Software
Click to download SpamBlocker - Challenge-Response anti spam software ... SpamBlocker is a 'proof of concept' application that uses wodPop3 and wodSmtp ...
www.weonlydo.com
 
SpamBlocker free download Spam Blocker blocks unwanted messages on ...
Spam Blocker works with several mailboxes and allows configuring user setting for ... Spam Blocker blocks unwanted advertising messages on the mail server. ...
3d2f.com
 
Wired News: Spam Blocker Has Opposite Effect
Spam Blocker Has Opposite Effect. [Print story] · [E-mail story] [Rants + Raves]. Page 1 of 1. *. See Also. How and Why the Internet Broke ...
www.wired.com
 
Home - Spamfo
Organized collection of news, reviews and links about unsolicited bulk email (spam).
www.spamfo.co.uk
 
Open-source spam-blocker gets high marks at Cornell
Cornell University's management school is getting ready to deploy an open-source antispam tool that its CIO claims is 99% effective in blocking unwanted ...
www.computerworld.com
 
 

 

Content Menu
  • 10 facts about search engines

  • 10 key strategies for success in a home based business

  • 10 steps to joint venture setup and success

  • 10 tips for effective email sales letters

  • 10 ways to screw up your list

  • 12 tips for writing winning e mail

  • 30 seconds to a new customer

  • 3 keys to success with your affiliate program

  • 3 ways of search engines indexing flash websites

  • 5 keys to a successful internet home based business

  • 6 secrets to preventing email overload

  • 7 steps to managing your time better

  • adsense heresy revealing the lies youre fed every day and how you could be eating caviar instead

  • adsense sandbox

  • an affiliate program that did not work

  • are spam filters crippling ezines

  • are you losing sales because of your email link

  • are you making these email mistakes

  • are you submitting your articles

  • avoid search engine blacklisting

  • a common frustration when operating a home based business

  • a review of webposition gold v2 0 beta part 2

  • a simple guide to analyzing all those web traffic ideas part 3

  • a typical frustration in a home based business

  • a use for junk mail

  • a web traffic secret guaranteed to give you 16 807 visitors to your blog on a regular basis

  • bad seo and google penal

  • become an instant seo forum expert

  • blogging a critical part of your web business strategy

  • blogging spamming and blog spam

  • blogging you gotta do if for your business

  • blogpingopt insig fileezine

  • boost your ranking with search engine optimization

  • can a ping really help your blog get top search engine rankings

  • can one really get through those spam filters

  • can pinging really help your blog get top search engine rankings

  • computer viruses the new it arms race

  • corporate email policies lower unnecessary legal and security risks

  • cyber crooks go phishing

  • designing a website so the search engines will like you

  • designing your web site to maximize traffic

  • developing an effective email subject line

  • dispelling the myths will webposition get my site banned from google

  • does your web host affect search engine optimization

  • do what i tell you or your web site will never be found

  • do you know whos in your computer

  • email deliverability tips

  • email market without getting persecuted

  • emerging methods for effective search engine ranking

  • five solid reasons to publish your ezine in a blog

  • five ways to increase website traffic through online message boards and blogs

  • free advertising for ezine owners

  • frustration is typical when operating a home based business

  • future blended threats

  • getting your website noticed

  • get paid to read email tips tricks 9 simple steps

  • give me quality over quantity every time

  • go with quality over quantity and your business will prosper

  • home based businesses have their share of frustrations

  • how to avoid having filters eat your emails

  • how to do effective email marketing

  • how to fail faster then a speeding bullet

  • how to get celebrities to endorse your product

  • how to get indexed by search engines fast

  • how to reel in website visitors by building your own blog

  • how to respond after identity theft occurs

  • how to start an internet business meta tags and keyword density

  • how to use a tell a friend script to drive traffic today

  • how to use content to improve search engine placemtent

  • how to write your own profitable ebook

  • how you can avoid the new dangers of spam

  • if you build it will they come

  • ill take quality over quantity every time

  • importance of meta tags optimization

  • improve your emails deliverability

  • independent back linking network

  • index

  • ineffective and unethical web site promotion methods

  • internet freebies and cheapies to help you grow your business

  • internet marketing is dead

  • introduction to rss

  • is blogging necessary to your internet business

  • is permission email marketing in trouble and is rss the answer

  • is there a future for spam

  • is your website blacklisted

  • junk mail

  • keywords importance and uses

  • kyewords importance and uses

  • latest bytes on search engine marketing

  • learn simple strategies that will stop spammers from bombarding your inbox

  • link building in light of vision based page segmentation

  • message board and forum advertising

  • new insites into the fast search engine an interview with stephen baker of fast part 1

  • not knowing this explosive email secret can kill your mailing list

  • popup ads redesign them and explode your sales

  • pop up blockers before you decide to fight ads you better know what youre up against

  • promote your web store

  • promoting your website

  • proper opt in email marketing step by step

  • publishing e zines via rss

  • quality beats quantity every time

  • rotator

  • rss explained

  • rss is not only for blogs

  • rss the amazing profit potential

  • rss the intelligent marketing medium

  • search engine cloaking

  • search engine secrets get top listings on google yahoo

  • should bloggers be helping google fix their pagerank system

  • sick of wading through spam

  • speleotherapy and asthma allergy and other respiratory diseases

  • stop spam how to escape the spam hell hole

  • succees with a 1930s computer

  • that s not spam that s my newsletter

  • the 5 best revenue models in e commerce history

  • the 5 biggest seo myths debunked

  • the budget webmasters guide to increased credibility part one

  • the death of internet e mail

  • the importance of blogging rss to your home business

  • the new web accountability

  • the opt in secret

  • the power of viral marketing

  • the secret weapon of successful web marketing is

  • things ezine publishers wished their subscribers knew

  • tips for smb web site promotion and optimization

  • top 10 reasons why

  • top 10 reasons why rss autoresponders are becoming a permission email marketers best friend

  • traffic driven method using tell a friend script

  • traffic scams warnings

  • unleash a thundering non stop traffic stampede to your site practically overnight

  • unlocking the keys to your web site traffic web site promotion and search engine strategies

  • use email marketing wisely stand out from junk mail

  • using newsletters to jack up revenues

  • using paid autosurf programs to effectively advertise your website

  • using robots txt files to feed the spiderbots

  • want free targeted traffic craigslist can help

  • want publicity for your company forget traditional press releases heres what works now

  • want publicity for your company forget traditional press releases here s what works now

  • what is blogging

  • what you can publish via rss

  • why blogging is essential to your business

  • why every site needs rss

  • why this is the perfect time to start charging for website subscriptions

  • why your site needs fresh relevant content

  • write a newsletter to get site visitors to return and more

  • your business has an unlisted telephone number

  • your home biz store

  • youve got a new website but how do you get folks to look at it