Page 1 of 1

The solution to this problem is the same as the previous one

Posted: Mon Dec 23, 2024 9:37 am
by pappu6321
The other classic example of Black Hat that Chuiso talked about during his presentation was the creation of spam links to a website.

This case is worse than the previous one, since it is necessary to go link by link to select the low-quality ones and disavow them. In the example that Chuiso gave, they had created nearly 10,000 junk links for him.

In this case, the goal is not to make Google believe that your site is harmful or associate your website with something negative, but rather to make Google believe that you have tried to improve the positioning of your website by linking your site on multiple low-quality pages.

SOLUTION



The solution is the same, although this time the process is more difficult, since you cannot filter by anchor text, but rather you have to review the links one by one.

[Tweet «Injecting links with negative anchor text and spam links is mobile database uae longer as effective due to Penguin granularization»]
Currently, due to Penguin's granularity, these types of attacks with negative anchors and spam links are not as effective. They still have an effect, but not as much as they did a few years ago.



DDoS attacks and code injections
At this point, Chuiso also mentioned other types of online attacks that are often associated with Black Hat SEO, but are not really.

They are neither SEO nor Black Hat. DDoS attacks and code injections are illegal.

3. DDoS attacks
A denial of service (DDoS) attack is an attack on a computer system or network that results in users being unable to access a website. This usually occurs because the attack has consumed all of the website's bandwidth or because it has overloaded the system of the attacked website.

SOLUTION

When DDoS attacks have a specific origin , they can be solved with few resources and knowledge, since they are not very complicated . It is only necessary to block the IP from which the requests are being made, for this you can use a firewall, for example.

However, if the DDoS attack is variable and comes from different IPs, the solution becomes complicated, being in some cases almost impossible to solve.

In any case, the first thing to do is try to prevent this type of comment as much as possible, being aware of the vulnerabilities that the website has.



Chuiso Online Attacks - Ddos Attacks



4. Code injections
It is a hacking technique in which malicious code is injected into a website that is invisible to users and even to the website administrator, but visible to the Google bot . In this way, hackers can modify any element such as the HTTP protocol , AJAX requests or hidden fields in forms.