Avoid becoming a victim of reciprocal link fraud by learning how to spot the most common scams.
There are some Web sites who claim to be a trusted reciprocal linking partner when in fact they just aim to outwit their so-called linking partner. Why do they use fraudulent reciprocal linking? There are two possible reasons for this. First, these Web sites want to have one-way incoming links rather than a reciprocal link because a one-way incoming link is more valuable than a reciprocal link. Second, it's done to avoid participating in reciprocal linking activity with lower ranking Web sites. How Is It Done?
Since reciprocal linking gained a huge amount of attention in terms of Web marketing and site promotion, it became a favorite target for fraud. There are some Web sites that don't use true reciprocal linking. Here are some common tricks unethical linkers use:
- Absent Back Link: This happens when your Web sites reciprocal linking partner asks for a link from your site in exchange of a back link. Once you have already linked to their Web site, they wont give your site a back link. This results in giving their Web site a one-way incoming link.
- Redirect Script For Back Link: Some reciprocal linking partners use a redirect script to hide the back link pointing to your Web site. The back link is supposed to take the search engines and shoppers to your Web site, but instead it actually points to another page on the reciprocal linking partners site. This way, the back link pointing to your site is not recognized by the Web crawler, making it a useless link.
Reciprocal linking still lives and is still effective in increasing your Web sites search engine ranking and traffic, but only if it is performed properly. If you're vigilant, you won't be a victim of reciprocal linking fraud. This article by Monica Lorica of nPresence, an online Web marketing agency that specializes in Search Engine Optimization, Pay Per Click advertising, Content Management Systems, Web Design, Conversion Tracking and Analysis, initially appeared on webreference.com Feb. 21, 2007.
|Do you have a comment or question about this article or other e-commerce topics in general? Speak out in the SmallBusinessComputing.com E-Commerce Forum. Join the discussion today!|
Putting Mobile First: Best Practices of Mobile Technology Leaders Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the...
Live Chat Comparison: A Goal-driven Approach to Chat Vendor Selection Selecting a live chat vendor can feel like evaluating dizzying lists of features -- each feature-set will help achieve a goal. But the challenge is...
Choosing the Proper Deployment Option - Which Managed File Transfer (MFT) Deployment Model is Right for Your? The applications for MFT are as varied as the businesses that use the solutions. Because managed file transfer is important to such a wide range of...
SSL 101: A Guide to Fundamental Web Site Security As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number...