Successfully reported this slideshow.
Blackhat SEO
Exploiting Social Media for Traffic



            Maxim Ogienko
              BUS 456
What is it?
Search Engine Optimization (SEO) is the process of
increasing a website’s popularity in search engines.

Black-hat SEO is ...
Why use it?
Time-Consuming
                              Expensive
                              Ineffective
“Search Engine Optimizati...
Cheap
Scaleable
Automated
 Targeted
  Quick
Why not use it?
Annoying
 Unethical
Short-Living
Suspicious
How does it work?
Trick search engines
Get links (from big, reputable sites)
      Cover page in keywords
      Spam social media sites
Who uses it?
Affiliate marketers
     Spammers
      Fraudsters
 Big companies
How to use it?
Link Farms
Create thousands of pages containing
meaningless links,all leading to one place
Social Bookmarking
Use fake accounts at social bookmarking
sites to submit the target site multi ple times.
Account Buying
Purchasing hacked accounts at social
media sites to broadcast the target site’s
message and post links.

PV...
Who is affected?
How to fight it?
Improving search engines
       Moderation
 Making links NOFOLLOW
       CAPTCHAs
 Crowdsourcing cleanup
Introduction to Blackhat SEO
Upcoming SlideShare
Loading in …5
×

Introduction to Blackhat SEO

885 views

Published on

  • Be the first to comment

Introduction to Blackhat SEO

  1. 1. Blackhat SEO Exploiting Social Media for Traffic Maxim Ogienko BUS 456
  2. 2. What is it?
  3. 3. Search Engine Optimization (SEO) is the process of increasing a website’s popularity in search engines. Black-hat SEO is a set of techniques for unethically, but not necessarily illegally, driving traffic to a site.
  4. 4. Why use it?
  5. 5. Time-Consuming Expensive Ineffective “Search Engine Optimization = Slow ” Non-Scaleable Difficult Boring
  6. 6. Cheap Scaleable Automated Targeted Quick
  7. 7. Why not use it?
  8. 8. Annoying Unethical Short-Living Suspicious
  9. 9. How does it work?
  10. 10. Trick search engines Get links (from big, reputable sites) Cover page in keywords Spam social media sites
  11. 11. Who uses it?
  12. 12. Affiliate marketers Spammers Fraudsters Big companies
  13. 13. How to use it?
  14. 14. Link Farms Create thousands of pages containing meaningless links,all leading to one place
  15. 15. Social Bookmarking Use fake accounts at social bookmarking sites to submit the target site multi ple times.
  16. 16. Account Buying Purchasing hacked accounts at social media sites to broadcast the target site’s message and post links. PVA Accounts Many sites now require a valid phone number to register. A phone-verified account (PVA) has a valid phone number on file. These are much harder to fake.
  17. 17. Who is affected?
  18. 18. How to fight it?
  19. 19. Improving search engines Moderation Making links NOFOLLOW CAPTCHAs Crowdsourcing cleanup

×