Ajax software
Free javascripts
↑
Main Page
0=>’http://www.example.com/0’,
1=>’http://www.example.com/1’,
2=>’http://www.example.com/2’);
// perform redirect
header(‘HTTP/1.1 302 Found’);
header(‘Location:’. $lookup_table[$_GET[‘url_id’]]);
?>
Your URLs in this case would look like
http://www.example.com/redirect.php?redirect_id=
[number]
, and eliminate problems.
With this solution, you’re also free to use 301 redirects, which can be beneficial because 301 redirects
count as votes. (However, never do 301 redirects when the URL can be freely modified.)
If you already have a web site that redirects to the URL specified as query string parameter, you could
also simply verify that it’s a known URL before performing the redirect, like this:
<?php
// define URL lookup table
$lookup_table = array(
0=>’http://www.example.com/0’,
1=>’http://www.example.com/1’,
2=>’http://www.example.com/2’);
// extract destination URL
if (isset($_GET[‘url’]))
{
$url = $_GET[‘url’];
}
// perform redirect only if the target URL is known
if (isset($url) && in_array($url, $lookup_table))
{
header(‘HTTP/1.1 302 Found’);
header(‘Location: ‘.$url);
}
?>
Content Theft
This concept is detailed in Chapter 9, where the use of sitemaps is discussed. A black hat SEO may employ
the use of scripts to lift part or even all of another site’s content — using an RSS feed perhaps, or screen
scraping. Many take various pieces of content from many sites and glue them together, leading to what
Chris Boggs, director of online marketing of Cs Group terms as “Frankenstein content.” The spammers
who take a site’s content verbatim are more of a concern, however, and using sitemaps may prevent, or
at least reduce, the necessity of a cease and desist order.
196
Chapter 8: Black Hat SEO
c08.qxd:c08 10:59 196
Ajax software
Free javascripts
→