Get PAID everytime someone downloads your Files - MAKE OVER $100 PER DAY
 

 

 

Archive for the ‘Blackhat SEO’ Category

First make sure you ping your blog, and then after  you add new content you will then update.

            You can use either:

pingomatic.com
pingoat.com

Then submit your rss feed to a few agregators like:

http://www.millionrss.com/
http://www.feedage.com/

After that, bookmark at the following sites:

digg.com
propeller.com
cloudytags.com
jumptags.com
mixx.com
backflip.com
blinkList.com
buddyMarks.com
del.icio.us
flikr.com
furl.com

This should have you indexed within about 12 – 24 hrs. Sometimes faster.

And sometimes putting an ad up on free classifieds can bring similar results with you url. Like backpage or domesticsale.

Good Luck !!

How To Cloak Links The Simple Way

There are people on the Net who honestly think link cloaking is ‘not done’, because visitors can’t see where they are redirected too if the click the link. Hm, that’s a great argument to consider, until…

…your affiliate ID is taken from the link, so you will not earn a commission. In that case, you definitely WANT to cloak your links, don’t you?

Another reason to cloak links is that you want to count how many people have clicked on them. Thus you can discover which links work well and which don’t.

Yet another reason could be, because your (affiliate) links are long and ugly. Especially when using them in text email they take a lot of space and sometimes break up into two or more lines.

So yes, there are valid reasons to mask your links.

There’s a lot of software available that can do the job very well, but there are also easy ways to cloak your links yourself.

One of the ways is to use a simple HTML redirect. You simply add the following line inside the <head> and </head> meta tags:

<meta http-equiv=”REFRESH” content=”0;url=http://www.the-link-to-redirect-to.com”>

Just replace ‘the-link-to-redirect-to.com’ by your link and you’re done.

IF you have log files available and IF they record access to such pages, then you have a counter too. That’s two ‘IF’s’ however.
Also, from the information I read from the SEO experts, this kind of link cloaking isn’t appreciated by search engines, because lots of people have abused this method.

You can also use Javascript to cloak your links quite easy. Here’s an example:

<script type=”text/javascript”>
<!–
window.location = “http://www.the-link-to-redirect-to.com”
//–>
</script>

This redirect doesn’t leave a single trace, but it’s hard to count clicks to this page.

The same applies to this link cloak in PHP:
<?php
header(”Location: http://www.the-link-to-redirect-to.com”);
?>

You can also use a htaaccess redirect to cloak your links and even use a rewrite rule, but, although easy to implement, these solutions are too complicated for this post. I want to talk about an easier one.

You see, I use a simple PHP script that is very easy to set up. No PHP knowledge required. And it counts clicks! Nothing special, but it does its job very well.
Plus, and that’s another advantage of cloaking your links, if the page you’re referring to disappears from the Net, you can easily replace your cloaked link by another one!

Lots of these scripts use a MySQL database to store the information, but this one doesn’t. It’s a simple text file. No need to set up another database!
It’s a great balance between functionality and ease of installation.

Plus…
this script allows you to backup the text file containing your links from the screen, so if anything goes wrong, you’ll have a backup copy at your hard disk.

And you may want to add a rel=”nofollow” to all of your cloaked links, as the refer to your counter script, which is useless in search engines.

Other software that you can check out is Smart Links. It allows you to turn your affiliate links that nobody wants to click on, into cash-generating magnets.

Another piece of very interesting software that is worth checking out is Affiliate ID Manager. It’s a program where you can store and manage all your IDs, passwords, affiliate links and other relevant details in ONE secured software. All your info will be orgazined and available to you so you can concentrate on your work instead of searching for your missing links… This essential tool will save lots of time and money and comes with …..Master Rebrandable Rights !!!

You can try to find this software at Google or receive it  completely Free.

(They are easy to find:  just do a search for the product name!)

So, how about you?
Do you cloak your links and if yes, how?

Blackhat PR

Posted by admin under Blackhat SEO

Have you seen a sudden increase in the interest in “Black PR”? If you haven’t… you will. black hat Blackhat PR

What is it? For those of you who aren’t familiar with the term, “Black PR” or BPR occurs when a person with malicious intent — often a competitor — uses various techniques to attack and even destroy an adversary’s reputation. It may be unethical, but in a zero-sum business world it is also survival of the fittest. It is a strategic alternative and a most effective one at that.

How’s it done? There are thousands of ways to screw with the basic relationship between the organization and its stakeholders frankly. But now with Web 2.0, it doesn’t get any easier.

By way of background, the term “Web 2.0″ was coined by O’Reilly Media in 2003 as a marketing buzzword used to capture the new ways of developing and interacting with on-line applications. Web 2.0 applications are by-directional and absolutely better suited for information gathering and analysis. Regrettably, these very same technologies can also be used by Black PR practitioners to reach the masses faster than ever before. Welcome to BPR 2.0.

For the record, BPR techniques in the Web 2.0 world are pretty much the same as their earlier iterations; only now the new tools can handle enormous volumes of information. While in Web 1.0 the data was hard to be found, analyzed and modified; today it is much more accessible and a lot more integrated. Simple fact, search engines query information more often than before and cached information sources never disappear.

TECHNICALLY SPEAKING

Here, to spirit discussion, let’s look at some of the technical aspects of Web 2.0 and how each relate to potential Black PR practices:

Ajax — The term stands for Asynchronous JavaScript and XML. It is a new Web development practice which pushes key-business logic from the Web server down to the Web client in order to provide better user interface and in general improved user experience. However, often developers push down too much causing information leaks to appear around the internal application. These leaks may often contain sensitive information. BPR pros will then use the information obtained strategically as part of a reverse public relation campaign.

Feeds — Feeds are syndication formats designed to automatically deliver content to the user. RSS and ATOM are the two most popular formats. The idea behind feeds is rather than the need to visit a specific site as was the case in Web 1.0, a feed brings the information to the user. Due to their modularity and the remixable nature, feeds can very efficiently aggregate and re-distribute information.

Black PR professionals can take advantage of both RSS and ATOM by first locating key information channels and then using them to redistribute an alternative message. Once a carefully placed message is in circulation with important feed channels, it could potentially reach millions of users instantly. This type of technology can be used to spread forged messages in order to perform a negative BPR “stunt.” And remember, traces of these stunts remain on the Net (your Web portfolio) forever.

Social Networks — One of the key features of Web 2.0 is its social aspect. Social Networks are probably one of the most powerful BPR tools since they can be used to spread false messages virally.

Splogs – Blogging is now the undisputed 21st century media platform for delivering messages. However, Splogs, short for spam blogs, are false, forged and artificially created blogs by software agents. Splogs are usually used to generate income by abusing advertisement platforms such as Google Ad-Sense.

However, it is completely different story when it comes to BPR. Black PR practitioners can and do employ the power of splogging to deliver a message across multiple platforms. The actual splog content is dynamically generated out of completely legitimate blogs and deadly BPR messages are then subsequently embedded. The more splogs that are employed, the further the message is distributed.

SEO Power Tools — There are even power tools to enable even better and more successful BPR. One such is Paterva. Paterva is mega powerful tool which utilizes several social networks, search engines and information sources, such as the MIT PKI (Public Key Infrastructure) data to enable BPR professionals to extract and find links between entities in an easy to use and quite graphical way. Paterva can find links between e-mails, names, social profiles, locations, etc. Once the map is reveled the connections are obvious and leveragable.

PRACTICALLY SPEAKING

Frankly, the real scary part… This stuff isn’t that hard. For instance, a hacker could very readily create hundreds of junk backlinks to your site within a short period of time. Most commonly they’ll set up a Splogs created using a free blog account. They’ll create it in such a way that the anchor text of these links to contain spam words like “online gambling” or “viagra”. Bottom line: Google sends up a red flag anytime you acquire too many backlinks too quickly (especially if the links look spammy). In short order, your Google PR (page rank) goes to hell.

You want a real example of BPR 2.0′s effectiveness? Here’s a BPR strategy designed steal the clients of their rival. One of the leading European airlines (name withheld here for security) recently launched a new version of its website. It’s Ajax Web2.0 orientated; it’s beautiful; and it’s vulnerable. What happened? The airline’s major competitor hired a small team of professional “black-hats” (hackers) to probe the site using light-weigh Web-apps. The hackers directly found various “leaks,” allowing them glean the names, contact details and many other personal data of the competitor’s customers. The competing airline used the information to target specific travel prospectives and prices. The result: the company with the beautiful new website lost about 25 percent the annual revenue as a result of client conversion.

BOTTOM LINE

A loss of 25 percent the annual revenue… That’s real money! And THAT should keep you up at night.

Well, at the very least, it should knock some sense into all the nuts-and-berries Social Media PR 2.0 freaks who think Web 2.0 is akin to the Second Coming.

Web 2.0 is without doubt the most innovative approach to technology. However, due to its flexibility, modularity and easy of use, it perfectly suits black public relations practices. The future is within the information, the single most valuable resource in the digital world. Black PR needs indefinite supply of it and Web 2.0 is here to make that happen.

Subscribe to BlackHatBUZZ




Free Money