This article is a translation requested by SEOGuess.
Generally speaking, all those who use cheating or suspicious methods can be called black hat SEO. For example, spam links, hidden web pages, bridge pages, keyword stuffing, etc.
Domestic black hat SEO has been developing rapidly recently, driven by Black Hat China and Q2C’s black hat SEO training, and more and more people have begun to understand and get in touch with this field. If you plan to make money by building a website, then black hat SEO should be a piece of knowledge that everyone must understand. This article will briefly introduce 30 black hat SEO techniques you can use. (Note: What I introduce below are all the positive uses of these black hat methods.)
Black Hat SEO is what we as SEOers have to face sooner or later. It is both true and false. I abide by the ethical standards of SEO and the guidelines of standard white hat SEO, but many SEO companies still cannot deny that they are black hat SEO.
Here are a few reasons why we must be aware of these black hat SEO techniques that absolutely exist.
As xx said, you should at least know why your competitors are still able to surpass you in the rankings even if they execute incorrectly.
The good news is that most black hat SEO can also be achieved through completely white hat SEO techniques.
It's like a knife: you can cut bread with a knife, and you can kill yourself with a knife. It depends on how you use the knife. You can also understand these problems through the SEO industry. You may be using white hat techniques, but many people may use this knife to stab you.
Personally, I think black hat SEO is weak.
The rule of black hat is: when you can't win the game, you can only cheat. This is the same as sports. How do you win when everyone is surpassing you? This is why successful, reputable SEO experts don't use black hats.
Okay, long story short, here are 30 black hat techniques you can use. Note the positive aspects of how I explained each technique. I don't advocate using these black hat technology prototypes, think of these knives as kitchen knives.
1. Hidden text - a website made using CSS and JQuery effects. Sometimes some text is hidden through layers, and the text only appears when the mouse is clicked or hovered. (My blog has this kind of example, although I didn’t mean to do it.)
2. IP delivery – Display appropriate localized content to visitors based on their IP address. But at the same time, it also provides users with a choice (such as Shopping Australia Station/UK Station). Shopping.Com does this very well.
3. 301 jump – Use 301 jump to permanently redirect expired or deleted page addresses to new addresses. This trick can also be used when launching a new domain name.
4. Short-term domain name behavior – buy exactly matching domain names for those currently popular keywords and build small niche sites. When this trend passes, the domain name can be abandoned. (eg tigerwoodssexrehab.com)
5. Cloaking – Cloaking is a black hat SEO technique whereby you display different content to users and search engines like Google. For example, some websites that use too much Flash can use Cloaking to display the Flash version to users, while showing Google a fully optimized website with only text.
6. Paid links – Donate to charities, software program developers, etc. Many people will give donors a link.
7. Keyword stuffing - use Tags and folksonomy (explanation at the end) to add keywords, or let your users do this work (if your site is a UGC (User Generated Content) type). Every social service site does this.
8. Automatically generate keyword pages - Some shopping search engines will automatically generate relevant keyword pages based on each Google incoming query, and allocate relevant and appropriate products to this page. If your site has enough content, you can do this too.
9. Misspelling - Definition, correcting a misspelled word and transferring it to the correct word version.
10. Scraping - Create mirrors for popular websites and provide them to well-known webmasters. Most people would be happy to pay less.
11. Ad only pages - pop up ads before users get to the actual content. (For example, pop-up windows, such as advertisements during page switching)
12. Blog spam – Let others spam you. Install a WordPress version without enabling the Akismet anti-spam measures. Then for example, publish some articles about Mesothelioma (high-priced keywords). Let spammer do blog comment spam. Finally analyze those comments and look at keywords and export links. If the comment contains your keyword (Mesothelioma), then pass this comment, of course, remove the link first. This is also considered a UGC.
13. Duplicate content under different domain names – Make your content available under the terms of the Creative Commons License.
14. Purchase domain names - Purchase old and authoritative domain names and use them to rebuild your site.
15. Fake News - Creating real news about real events on sites that imitate official websites (such as http://www.nytimes-se.com/ ).
16. Link Factory – Create a small network of high-quality blogs. A full-time professional blogger can manage 3 to 5 high-quality blogs.
17. New Developments - Find new things, report on them and blog about them. Be the first to publish your stories because you will get attention and links.
18. Brand jacking – Write a negative review of a certain brand, for example, say that the brand’s products disappoint you, or create a “brand x sucks” page, which can attract the attention of consumers.
19. Rogue bots – Index crawls other websites and lets webmasters know about problems with their sites (such as broken links). Some people will gratefully give you a backlink.
20. Hidden affiliate links – Affiliate links, especially those with an id (example.com/ref?id=123) are the worst case scenario. The only thing we can do is declare ourselves that this is an affiliate link. For example, [ad], or [partner-link], this anchor text can avoid directly displaying the id, and can make a statement to the maximum extent possible.
21. Bridge page – An effective bridge page can be called a landing page. The only difference is that usually bridge pages are full of junk and worthless content, while landing pages are meant to simplify the website for your own use. What they all have in common is that they are all optimized to get traffic from search engines. So why let your gateway page be a junk page that others will skip? Why not optimize your bridge page into a landing page so that visitors can convert at this step?
22. Multiple subdomains – Think of blogspot, WordPress and other sites that can create multiple subdomains through UGC. In this case they can appear multiple times for a certain query. You can also provide second-level domain names to your users.
23. Twitter Automation – Twitter automation is totally doable as long as you don’t overdo it. Schedule your tweets or even automate tweets via RSS feeds from other blogs. As long as you can show that your Twitter account is performing "manual" operations. Even a bot account is viable as long as it is useful to others.
24. Clickbait – a tactic often used by tabloids and also used by black hat SEO. Although sometimes such deceptive titles are unethical. But it can be expressed in a sarcastic or humorous way. For example, in this post, I can only list 24 items, but the title says 30 items.
25. Google Bowling – The bad thing about Google bowling is that you hurt sites you don't like. You could reverse that: Reverse Google bowling would mean that you push sites of competitors you like to make those you dislike disappear below. In a way we do that all the time linking out to the competition, the good guys of SEO who then outrank the ugly sites we like a lot less.
26. Hidden Links – Most free statistics tools use hidden links. statcounter is an example. When you get the statistics code from it and embed it into your web page, you are using hidden links.
27. Give search engines different information – Do you use WordPress? Then you can add a nofollow tag to your comment link, so that search engines and users will get different information. Users see and click on a link, while search bots see a signal not to follow.
28. Black sites – Whether it’s a hacker hacking a site or a security expert giving a warning to a webmaster, it’s the same thing. For example, recently, I received an email from a friend who reminded me that it was time to upgrade my WordPress.
29. Link Bait – Headlines like “SEO is shit” are very common these days. Why not do it another way? Things like anti-SEO don’t work that well now, unless you’re well-known. On the contrary, publishing an article "100 reasons why I fall in love with SEO experts" may be more resonant.
30.Map Spam – Instead of creating fake addresses to show up on Google Maps, why not create a real affiliate network? Give those small business people (office workers) a little money and let them represent you on the map. All they need to do is help you collect letters from Google and potential customers.
References
folksonomy: See Baidu Encyclopedia
Folksonomy is a coined word derived from the most distinctive custom tag (Tag) function in social bookmarking services. Folksonomy=Folks+Taxonomy, Folks is a colloquial word in English, which means a group of people. Taxonomy refers to taxonomy, which is an important part of Information Architecture. Folksonomy refers to a flat, non-hierarchical label classification defined voluntarily by the "people". I call it "Focus Classification", and some people interpret it as Social Classification.
Original link: 30 Black Hat SEO Techniques You Can Use Ethically
Okay, the article is translated here. There are some vocabulary words in this article that I have never come across before, so it is inevitable that there will be errors and omissions in the translation. Everyone is welcome to leave comments, corrections and discussions. This article introduces many black hat methods, but none of them are detailed. I personally think that the ones that can be actually used in website building are 1, 3, 4, 5, 6, 7, 9, 13, 14, 16, 20. 21, 22, 23, 27 and so on. You can dig out relevant information on your own.
Translation source: http://semthinking.com/blackhat/428