Should You Use Page Cloaking! I Say YES!

Written by James OKeefe


Search Engine Cloaking - Do it? Search Engine Cloaking - To Cloak or Not to Cloak

By Sumantra Roy

Cloaking can broadly be defined as a technique used to deliver different web pages under different circumstances. There are two primary reasons that people use page cloaking:

i) It allows them to create a separate optimized page for each search engine and another page which is aesthetically pleasing and designed for their human visitors. When a search engine spider visits a site,repparttar page which has been optimized for that search engine is delivered to it. When a human visits a site,repparttar 107612 page which was designed forrepparttar 107613 human visitors is shown. The primary benefit of doing this is thatrepparttar 107614 human visitors don't need to be shownrepparttar 107615 pages which have been optimized forrepparttar 107616 search engines, becauserepparttar 107617 pages which are meant forrepparttar 107618 search engines may not be aesthetically pleasing, and may contain an over-repetition of keywords.

ii) It allows them to hiderepparttar 107619 source code ofrepparttar 107620 optimized pages that they have created, and hence prevents their competitors from being able to copyrepparttar 107621 source code.

Page cloaking is implemented by using some specialized cloaking scripts. A cloaking script is installed onrepparttar 107622 server, which detects whether it is a search engine or a human being that is requesting a page. If a search engine is requesting a page,repparttar 107623 cloaking script deliversrepparttar 107624 page which has been optimized for that search engine. If a human being is requestingrepparttar 107625 page,repparttar 107626 cloaking script deliversrepparttar 107627 page which has been designed for humans.

There are two primary ways by whichrepparttar 107628 script can detect whether a search engine or a human being is visiting a site:

i) The first and simplest way is by checkingrepparttar 107629 User-Agent variable. Each time anyone (be it a search engine spider or a browser being operated by a human) requests a page from a site, it reports an User-Agent name torepparttar 107630 site. Generally, if a search engine spider requests a page,repparttar 107631 User-Agent variable containsrepparttar 107632 name ofrepparttar 107633 search engine. Hence, ifrepparttar 107634 cloaking script detects thatrepparttar 107635 User-Agent variable contains a name of a search engine, it deliversrepparttar 107636 page which has been optimized for that search engine. Ifrepparttar 107637 cloaking script does not detectrepparttar 107638 name of a search engine inrepparttar 107639 User-Agent variable, it assumes thatrepparttar 107640 request has been made by a human being and deliversrepparttar 107641 page which was designed for human beings.

However, while this isrepparttar 107642 simplest way to implement a cloaking script, it is alsorepparttar 107643 least safe. It is pretty easy to fakerepparttar 107644 User-Agent variable, and hence, someone who wants to seerepparttar 107645 optimized pages that are being delivered to different search engines can easily do so.

ii) The second and more complicated way is to use I.P. (Internet Protocol) based cloaking. This involvesrepparttar 107646 use of an I.P. database which contains a list ofrepparttar 107647 I.P. addresses of all known search engine spiders. When a visitor (a search engine or a human) requests a page,repparttar 107648 cloaking script checksrepparttar 107649 I.P. address ofrepparttar 107650 visitor. Ifrepparttar 107651 I.P. address is present inrepparttar 107652 I.P. database,repparttar 107653 cloaking script knows thatrepparttar 107654 visitor is a search engine and deliversrepparttar 107655 page optimized for that search engine. Ifrepparttar 107656 I.P. address is not present inrepparttar 107657 I.P. database,repparttar 107658 cloaking script assumes that a human has requestedrepparttar 107659 page, and deliversrepparttar 107660 page which is meant for human visitors.

Although more complicated than User-Agent based cloaking, I.P. based cloaking is more reliable and safe because it is very difficult to fake I.P. addresses.

Recordable DVD formats explained

Written by Kenny Hemphill


Picking your way throughrepparttar ton of information available on recordable DVD formats can be a nightmare. To help you out, we’ve done our best to distill it into this summary.

There are five recordable versions of DVD; DVD-R for General, DVD-R for Authoring, DVD-RAM, DVD-RW, and DVD+RW. None ofrepparttar 107611 formats is fully compatible withrepparttar 107612 other although there are drives which will read, and in some cases write to more than one format.

DVD-R for General and DVD-R for Authoring are essentially DVD versions of CD-R. And DVD-RW is a DVD version of CD-RW. All three formats can be read in standard DVD-ROM drives and in most DVD video players. The difference between DVD-R for General and DVD-R for Authoring is that DVD-R for General is a format intended for widespread consumer use and doeasn’t support ‘professional’ features such as piracy protection or duplication in mass duplicators. The Pioneer DVD-RW drive which isrepparttar 107613 most popular PC device for writing to DVD usesrepparttar 107614 DVD for General format. And as asrepparttar 107615 case with CD, DVD-RW is essentiallyrepparttar 107616 same as DVD-R except that it can be erased and written to again and again.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use