Several Link-Spam Architectures Revealed 38
workie writes "Using data derived from website infections, RescueTheWeb.org has found several interesting link-spam architectures. One architecture is where concentric layers of hijacked websites are used to increase the page rank and breadth of reach (within search engine search results) of scam sites. The outer layers link to the inner layers, eventually linking to a site that redirects the user to the scam site. Another architecture involves hijacked sites that redirect the user to fake copies of Google, having the appearance that the visitor is still within Google, but in reality they are on a Google lookalike that contains only nefarious links."
Link Spam? (Score:3, Insightful)
I thought that google had ways of detecting these and down-ranking them?
Re:For the paranoid... (Score:4, Insightful)
When a vulnerabily is found on your LiveCD you won't be able to patch it.
Re:That was actually an interesting read (Score:0, Insightful)
The rest of us moved on about 20 years ago -don't you think it's time YOU did too?
Re:Link Spam? (Score:4, Insightful)
Every time Google adjust the rankings to account for the current crop of deceptive SEO techniques, people think up new deceptive SEO techniques. It is a moving target and Google can't move too fast without thinking as they risk disrupting unaffected parts of the algorithm resulting in reducing its effectiveness when presented with genuine links.
Also Google may be the biggest name in town but they are not the only big name by a long shot. an SEO technique is not completely invalidated until such time as all popular engines have a away to discount it.
And the summary (didn't RTFA, sorry) doesn't state that the techniques were proven to be working, just that this is what people are trying.
Re:For the paranoid... (Score:3, Insightful)
That isn't paranoia - it's good common sense. Statistics tell us that an ungodly number of computers are compromised. Why do your banking and other sensitive online transactions from a potentially compromised machine? Use those LiveCD's, or a virtual machine, or almost ANYTHING other than your Windows browsing and porn watching machine!!
Re:For the paranoid... (Score:3, Insightful)
This is 2010, run your VM off a live CD!
http://wiki.xensource.com/xenwiki/LiveCD [xensource.com]