Avoid becoming a victim of reciprocal link fraud by learning how to spot the most common scams.
There are some Web sites who claim to be a trusted reciprocal linking partner when in fact they just aim to outwit their so-called linking partner. Why do they use fraudulent reciprocal linking? There are two possible reasons for this. First, these Web sites want to have one-way incoming links rather than a reciprocal link because a one-way incoming link is more valuable than a reciprocal link. Second, it's done to avoid participating in reciprocal linking activity with lower ranking Web sites. How Is It Done?
Since reciprocal linking gained a huge amount of attention in terms of Web marketing and site promotion, it became a favorite target for fraud. There are some Web sites that don't use true reciprocal linking. Here are some common tricks unethical linkers use:
- Absent Back Link: This happens when your Web sites reciprocal linking partner asks for a link from your site in exchange of a back link. Once you have already linked to their Web site, they wont give your site a back link. This results in giving their Web site a one-way incoming link.
- Redirect Script For Back Link: Some reciprocal linking partners use a redirect script to hide the back link pointing to your Web site. The back link is supposed to take the search engines and shoppers to your Web site, but instead it actually points to another page on the reciprocal linking partners site. This way, the back link pointing to your site is not recognized by the Web crawler, making it a useless link.
Reciprocal linking still lives and is still effective in increasing your Web sites search engine ranking and traffic, but only if it is performed properly. If you're vigilant, you won't be a victim of reciprocal linking fraud. This article by Monica Lorica of nPresence, an online Web marketing agency that specializes in Search Engine Optimization, Pay Per Click advertising, Content Management Systems, Web Design, Conversion Tracking and Analysis, initially appeared on webreference.com Feb. 21, 2007.
|Do you have a comment or question about this article or other e-commerce topics in general? Speak out in the SmallBusinessComputing.com E-Commerce Forum. Join the discussion today!|
Voice Trunking in an IP World: Charting a Practical Path for PRI and SIP IT leaders understand the real-world road to all-IP means leveraging existing technology investments as well as intelligently integrating...
WestStar Mortgage: Room to Grow with XO Hosted PBX WestStar Mortgage, a lender operating in 39 states, sought a hosted PBX solution after experiencing multiple outages with premises-based PBXs....
A Smarter Solution to Malware Prevention Traditional endpoint security has failed to keep up with today's threats and is exposing organizations to unacceptable levels of risk. It's time...
Control Risk Across the Enterprise with a Managed File Transfer Solution Enterprise risk has grown dramatically in both scope and complexity since the dawn of the digital era. Managed File Transfer (MFT) is a prime...