Several Link-Spam Architectures Revealed 38
workie writes "Using data derived from website infections, RescueTheWeb.org has found several interesting link-spam architectures. One architecture is where concentric layers of hijacked websites are used to increase the page rank and breadth of reach (within search engine search results) of scam sites. The outer layers link to the inner layers, eventually linking to a site that redirects the user to the scam site. Another architecture involves hijacked sites that redirect the user to fake copies of Google, having the appearance that the visitor is still within Google, but in reality they are on a Google lookalike that contains only nefarious links."
For the paranoid... (Score:5, Interesting)
Consider doing all your banking, and any other sensitive stuff, on a computer totally separate from your web-surfing computer. Kind of like having a dummy wallet containing only petty cash and your ID when you go out at night versus your credit cards, etc.
Re:For the paranoid... (Score:4, Insightful)
When a vulnerabily is found on your LiveCD you won't be able to patch it.
Re:For the paranoid... (Score:4, Informative)
Re: (Score:2, Interesting)
Ever heard of LiveOS persistent storage?
Re: (Score:2)
But that negates the whole point of using a livecd for this in the first place.
Re: (Score:3, Interesting)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Insightful)
This is 2010, run your VM off a live CD!
http://wiki.xensource.com/xenwiki/LiveCD [xensource.com]
Re:For the paranoid... (Score:4, Informative)
"When a vulnerabily is found on your LiveCD you won't be able to patch it."
Slashdotters should know better...
You can boot from a live Linux CD and remaster it, which is very cool.
http://www.knoppix.net/wiki/Knoppix_Remastering_Howto [knoppix.net]
You can also keep a variety of live OS including custom WinPE versions.
http://www.911cd.net/forums/ [911cd.net]
Re: (Score:2)
Re: (Score:3, Insightful)
That isn't paranoia - it's good common sense. Statistics tell us that an ungodly number of computers are compromised. Why do your banking and other sensitive online transactions from a potentially compromised machine? Use those LiveCD's, or a virtual machine, or almost ANYTHING other than your Windows browsing and porn watching machine!!
Re: (Score:3, Funny)
exactly three, but that three is, at the same time, only one
Re: (Score:1)
It's less than ten but more than one, but it's not nine, eight, seven, six, five, four, three, or two.
(With apologies to Jorge Luis Borges http://www.christopherculver.com/en/translations/ornithologicum.php [christopherculver.com])
Re: (Score:2)
Protip: It’s called FinTS. With chip card. Look it up. :)
I use it since it were still experimental and called HBCI 1.0.
No browser involved. You have a separate reader with keys (and optionally a display) that you interact with. Unless someone modifies the reader, there is no way anyone else can get your code. In short it’s two-factor authentication on a trusted client. The PC just shoves encrypted packets back and forth between the reader and the bank server.
I recommend having a reader with a di
Re: (Score:1)
Link Spam? (Score:3, Insightful)
I thought that google had ways of detecting these and down-ranking them?
Re: (Score:1, Interesting)
Precisely. In fact, with Google for Domains etc., they know well how profitable this link spam is. Hell, 10 people employed 8 hours a day flagging sites would tackle the vast majority of repeated and obvious search engine spammers. But then Google would have to admit that they haven't refined interesting algorithms since the '90s, and might have to give actual work to the 2nd rate PhDs they hire to twiddle their thumbs.
Re:Link Spam? (Score:4, Insightful)
Every time Google adjust the rankings to account for the current crop of deceptive SEO techniques, people think up new deceptive SEO techniques. It is a moving target and Google can't move too fast without thinking as they risk disrupting unaffected parts of the algorithm resulting in reducing its effectiveness when presented with genuine links.
Also Google may be the biggest name in town but they are not the only big name by a long shot. an SEO technique is not completely invalidated until such time as all popular engines have a away to discount it.
And the summary (didn't RTFA, sorry) doesn't state that the techniques were proven to be working, just that this is what people are trying.
Re: (Score:2)
...an SEO technique is not completely invalidated until such time as all popular engines have a away to discount it.
So, basically...as soon as Google changes their algorithm? Because I'm drawing a blank on any other "popular" engines here...
http://www.netmarketshare.com/search-engine-market-share.aspx?qprid=4 [netmarketshare.com]
That was actually an interesting read (Score:2)
Re: (Score:2, Flamebait)
"The web is under attack from hackers. RescueTheWeb.org is working to reduce their chances of success."
I take issue with their ignorance toward the difference between a hacker [8hz.com] and a cracker [8hz.com]. (links to Eric Raymond's "The Jargon File")
Re: (Score:1, Troll)
When you say "The rest of us", you should say just yourself.
Link pyramids (Score:2)
Sounds familiar: http://seoblackhat.com/2009/07/10/link-pyramids/ [seoblackhat.com]
By the way, if blackhat SEO's describe this technique in the open, it's either already well known, or its effectiveness has been diminished to the point where hiding the details isn't worth it.
Re: (Score:1)
Re: (Score:2)
I had basically known it, but it's still daunting to face as an actual search customer.
I like trying out freeware utilities. But sometimes it's tricky to know which are real links (could be some 15 real ones) and which are nastylinks (could be 85) for my 100-result first page of returns.
The problem: low standards in search engines. (Score:2)
These guys are doing good work, but really, all they're doing is checking for some specific types of black-hat SEO. This is inherently a losing battle, because there's active opposition. It's a "negative file" approach - making a list of the bad guys. Credit cards once worked that way; merchants were sent daily lists of canceled or stolen credit cards. Back then, getting a credit card was tough; the customer had to be a good customer of the bank. Not until credit card transactions were validated remote
Re: (Score:2)
This only works if someone is searching for a business or product. Most searches are for information. There are LOTS of valuable websites run by individuals. You rank them all low?
Why on earth do we want rankings to reflect credit ratings? You can trust sources with good credit ratings more? Lots of businesses with good credit ratings one year, have ended up with their CEO in the dock the next (e.g. Enron).
You need a lot more data coverage than you have: you can cannot verify Glaxosmithkline, Vodafone (main
Re: (Score:2)
Re SiteTruth complaints: (We have a blog [sitetruth.net] for that.)
Non-commercial web sites aren't rated at all. However, the presence of an ad link marks a site as "commercial", as does being in ".com". Our "commercial intent" detection is rather simplistic. We really should have a classifier system doing that. Yahoo search R&D, back when they had search R&D, built one of those, but never did much with it. We've been reluctant to use machine learning techniques, though, because they reduce the transparency