Avoid becoming a victim of reciprocal link fraud by learning how to spot the most common scams.
There are some Web sites who claim to be a trusted reciprocal linking partner when in fact they just aim to outwit their so-called linking partner. Why do they use fraudulent reciprocal linking? There are two possible reasons for this. First, these Web sites want to have one-way incoming links rather than a reciprocal link because a one-way incoming link is more valuable than a reciprocal link. Second, it's done to avoid participating in reciprocal linking activity with lower ranking Web sites. How Is It Done?
Since reciprocal linking gained a huge amount of attention in terms of Web marketing and site promotion, it became a favorite target for fraud. There are some Web sites that don't use true reciprocal linking. Here are some common tricks unethical linkers use:
- Absent Back Link: This happens when your Web sites reciprocal linking partner asks for a link from your site in exchange of a back link. Once you have already linked to their Web site, they wont give your site a back link. This results in giving their Web site a one-way incoming link.
- Redirect Script For Back Link: Some reciprocal linking partners use a redirect script to hide the back link pointing to your Web site. The back link is supposed to take the search engines and shoppers to your Web site, but instead it actually points to another page on the reciprocal linking partners site. This way, the back link pointing to your site is not recognized by the Web crawler, making it a useless link.
Reciprocal linking still lives and is still effective in increasing your Web sites search engine ranking and traffic, but only if it is performed properly. If you're vigilant, you won't be a victim of reciprocal linking fraud. This article by Monica Lorica of nPresence, an online Web marketing agency that specializes in Search Engine Optimization, Pay Per Click advertising, Content Management Systems, Web Design, Conversion Tracking and Analysis, initially appeared on webreference.com Feb. 21, 2007.
|Do you have a comment or question about this article or other e-commerce topics in general? Speak out in the SmallBusinessComputing.com E-Commerce Forum. Join the discussion today!|
Unshackling Online Meetings for Business Users More collaboration leads to better achievement of business goals. But getting there requires tools that business users can and want to use, without...
2014 Neustar Annual DDoS Attacks and Impact Report: A Neustar High-Tech Brief DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening — attackers using DDoS as a...
Security Technologies for Mobile and BYOD With mobile malware growing in volume and sophistication, companies need to ensure that the use of mobile devices and BYOD doesn't compromise the...
Case Study: NetApp A global data storage provider whose business is booming needed a best-in-class data center to serve as the backbone of its technical operations...