Search Engine Cloaking

Written by James O'Keefe


Cloaking

As soon as you mentionrepparttar idea of page cloaking you can be sure that someone somewhere is going to jump torepparttar 108815 conclusion that you intend to cheatrepparttar 108816 search engines. There is no denyingrepparttar 108817 fact that search engine spammers have used page cloaking inrepparttar 108818 past, and thatrepparttar 108819 reputation of cloaking has been damaged as a result. The fact remains however that there are still many legitimate reasons for wanting to dabble in various forms of page cloaking, so don't be too quick to judge!

What is Page Cloaking

Page cloaking isrepparttar 108820 practice of altering contents of a page depending onrepparttar 108821 software, method and/or IP address being used to access it. Cloaking has been made possible throughrepparttar 108822 use of server side technologies such as ASP and PHP (amongst others), and has been abused so much inrepparttar 108823 past that it will probably never shake off it's bad reputation.

Cloaking is used in all manor of situations, some of them you won't even be aware of until it is pointed out to you. I'll admit to using it on my own site, and I'm not ashamed ofrepparttar 108824 fact either!

Cloaking Methods

There are several different ways of implementing cloaking; each is based onrepparttar 108825 environment variables that are passed torepparttar 108826 server as part ofrepparttar 108827 actual request.

What browser/program is makingrepparttar 108828 request? (HTTP_USER-AGENT)

What IP address are they trying to connect from? (REMOTE_HOST)

What page (if any) did they come from? (HTTP_REFERER)

Did they recently request a page? Have they already set preferences? (Session data)

Whilerepparttar 108829 environment variables available to us can be used independently to make generalizations and educated guesses, they become powerful customization tools when combined.

By identifyingrepparttar 108830 program used to makerepparttar 108831 request, we get an idea of howrepparttar 108832 data will be used andrepparttar 108833 capabilities ofrepparttar 108834 browser. Suddenly we can use specialized page designs without having to use or redirect users to different URLs depending on what they could handle. It can also prove an effective way to reduce needless data transfer costs; by sending onlyrepparttar 108835 coderepparttar 108836 browser or bot will understand.

When we want to target groups of users based on their geographical location or connection speed, we can use IP addresses to make an educated guess. Different ISPs will own different IP blocks; these ISPs may operate in a specific region or offer only broadband services. While gathering and maintaining current IP data can be a chore, it is probablyrepparttar 108837 best way to get information onrepparttar 108838 location ofrepparttar 108839 user without specifically asking them.

The use of referral or session data is probablyrepparttar 108840 most interesting area of cloaking however, as this is where we can learn more aboutrepparttar 108841 person makingrepparttar 108842 request. With a little research, you can match visitor types byrepparttar 108843 sites they come from and tailorrepparttar 108844 site to their needs. Referral and session data can tell us a lot aboutrepparttar 108845 visitor without actually needing to identify them;repparttar 108846 possibilities are limited only byrepparttar 108847 imagination!

Why use Cloaking?

There are many different reasons why people want to use page cloaking, and while some of these can be devious in nature, others are designed to be helpful or to standardizerepparttar 108848 user experience. Some reasons for using page cloaking include: -

To serve known search engine bots with content optimized for best results.

To hiderepparttar 108849 real keywords and text used for rankings from normal visitors.

To alterrepparttar 108850 identity ofrepparttar 108851 site depending on who accessed it.

To protectrepparttar 108852 server and it's contents from malicious bots or misuse. To re-brand shared content depending onrepparttar 108853 domain name used to access it. To limitrepparttar 108854 options available depending on browser features or capabilities.

To iron out browser inconsistencies.

To serve relevant information torepparttar 108855 user based on Operating System and/or browser.

To create a more personalised experience forrepparttar 108856 visitor.

You see page cloaking is perhaps more common than you first think, and when you look atrepparttar 108857 whole picture it doesn't seem as bad as some people make it out to be. It's not so much whether or not you use it, but rather how you use it.

I use ASP and dynamically editrepparttar 108858 page to showrepparttar 108859 style sheet optimized forrepparttar 108860 browser. Even though my server changes just one line from one browser torepparttar 108861 next, it is technically page cloaking;repparttar 108862 style sheet it serves torepparttar 108863 visitor using Opera is notrepparttar 108864 same style sheet it sends torepparttar 108865 visitor using Internet Explorer. Ironically, if I chose to use a script onrepparttar 108866 client side to dorepparttar 108867 same thing, it would not be considered to be page cloaking!

So why does it matter whererepparttar 108868 script is executed if they both dorepparttar 108869 same thing?

It's all because we can look atrepparttar 108870 source code ofrepparttar 108871 script when it is onrepparttar 108872 client side; thus we can seerepparttar 108873 alternatives that are available simply by looking atrepparttar 108874 wayrepparttar 108875 script works. Onrepparttar 108876 server side however, allrepparttar 108877 logic is hidden away in some script or server module and we only seerepparttar 108878 results ofrepparttar 108879 server's decision; not how it came torepparttar 108880 conclusion on how it should respond torepparttar 108881 request.

The Dark side of Cloaking

The use of cloaking is controversial because ofrepparttar 108882 way it has been abused inrepparttar 108883 past. Some search engine optimisers use it in their promotional campaigns to serve pages optimised for each ofrepparttar 108884 search engines. While this may seem unfair to other site owners fighting for rankings withrepparttar 108885 same keywords, some ofrepparttar 108886 arguments for doing so are certainly feasible.

Why increaserepparttar 108887 visitors download time by including Meta tags they don't normally see?

Why send images torepparttar 108888 search engines when all they really look at isrepparttar 108889 text? Why should they share keyword lists they spendrepparttar 108890 time researching?

Allrepparttar 108891 reasons above may seem rather selfish, but just because a Webmaster wants to minimize their data transfer costs and protectrepparttar 108892 investment of their time and effort does not make them an unethical person. Only whenrepparttar 108893 topic ofrepparttar 108894 alternative pages strays fromrepparttar 108895 pagerepparttar 108896 visitor sees canrepparttar 108897 practice of optimizing forrepparttar 108898 search engines in this way be deemed to be unethical. There is a fine line between optimizing a page forrepparttar 108899 search engines and misleading them altogether!

Accept Credit Cards Online without a Merchant Account

Written by John Lynch


It is often assumed if you want to accept credit cards on your website that you must have a merchant account. This is notrepparttar case. You can accept credit cards with a Third Party credit card processor.

1) What is a Third Party Credit Card Processor?

A Third Party credit card processor is a company that will accept credit card payments on behalf of you or your company. The payments your customers make are processed throughrepparttar 108814 Third Party's own merchant account, and yourepparttar 108815 retailer is paid (minus a commission fee) byrepparttar 108816 Third Party processor.

No need to pay for expensive processing software, monthly fees or minimum transaction fees. As you only pay a percentage fee on a sale, you cannot lose money.

2) Should I have a Merchant Account or Third Party Processor?

For most businesses this decision will be made according torepparttar 108817 size ofrepparttar 108818 company. Most small businesses do not need their own merchant account.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use