SEO: Blackhat Tactics – Part 1

During working on a customer SEO project I just came across a competitor which is massively using black hat SEO tactics. Ethically now the question pops up, if the right approach is to respond by using the same or even better tactics. So here are some interesting reads on how to approach this situation.

Black hats really like to use automatic content generators, which post answers to forum posts or blog comments, just by querying databases like e.g. Yahoo Answers:

http://developer.yahoo.com/answers/

The tools used here are in my opinion highly black stuff, so if you follow these links you do it on your own and have been warned:

http://www.blackhatworld.com/blackhat-seo/cloaking-content-generators/65432-phpbb-auto-forum-poster.html
http://www.blackhatworld.com/blackhat-seo/cloaking-content-generators/28074-best-auto-content-generator.html
http://www.blackhatworld.com/blackhat-seo/black-hat-seo-tools/174743-fastest-way-harvest-relevant-urls.html
http://www.blackhatworld.com/blackhat-seo/black-hat-seo-tools/35060-any-one-have-auto-forum-poster-forum-leecher-tools-collect-automated-post-other.html
http://www.wjunction.com/showthread.php?t=29288
http://megarapid.net/forums/p/56059/56059.aspx
http://www.blackhatworld.com/blackhat-seo/cloaking-content-generators/25315-forum-content-generator.html
http://www.xdreams.ch/black-hat/blackhat-seo-blogs/

And there are even some “commercial” tools for forum and blog posts, to support you with your black thinking:

http://www.instadigi.com/
http://www.scrapebox.com/

And if you need a good content generator just head over to:

http://getyacg.com/

Feel free to do what ever you read in the links, but be warned that these tactics might get you blocked by google or other SEs for years…

On the opposite I can just sit down and read another nice SEO Book

http://tools.seobook.com/

Related Posts

ISPConfig3: Mail aliases for login to Dovecot

If you knew ISPConfig2 you probably remember the user login approach which was done there: [crayon-5a11f3c1e8a50517210792/] Now with ISPConfig3 this has changed to the better by using the users email address – sounds cool – it is! But what about migration from ispconfig 2 to ispconfig 3 – you do not want to drive around […]

Read More

Joomla 1.5 Password Encryption

simple

March 17, 2010

Internet

No Comment

Joomla! 1.5 uses md5 to hash the passwords. but see details here When the passwords are created, they are hashed with a 32 character salt that is appended to the end of the password string. The password is stored as [crayon-5a11f3c1e8de5165680420/] To see how this is tested for authentication take a look at plugins/authentication/joomla.php lines […]

Read More

Leave a Reply