In search engine optimization (SEO) terminology, black hat SEO refers to the use of aggressive SEO strategies, techniques and tactics that focus only on search engines and not a human audience, and usually does not obey search engines guidelines.
Some examples of black hat SEO techniques include keyword stuffing, invisible text, doorway pages, adding unrelated keywords to the page content or page swapping (changing the webpage entirely after it has been ranked by search engines).
Black Hat SEO Usage
Black hat SEO is more frequently used by those who are looking for a quick financial return on their Web site, rather than a long-term investment on their Web site. Black hat SEO can possibly result in your Web site being banned from a search engine, however since the focus is usually on quick high return business models, most experts who use Black Hat SEO tactics consider being banned from search engines a somewhat irrelevant risk.
Black hat SEO may also be referred to as unethical SEO or spamdexing, as spamdexing is a frequently used black hat SEO practice.
Contrast with White Hat SEO.
The name of a Twitter client for BlackBerry smartphones. See “Social Media Tips for Online Marketing Plus 30 Social Media Sites” in the Did You Know…? section of
Used on Blogger.com, it is a function that lets you make a blog post without going to the Blogger.com Web site. BlogThis can be added to your browser toolbars. When you click BlogThis, it launches a mini-interface to Blogger that is pre-populated with a link to the Web page you are currently visiting, as well […]
- Blog and Ping
An online marketing term applied to a system that utilizes blogs and pings (short for pingback) to deliver content and /or sites for indexing in search engines with the ultimate aim of profit. Also called blog ping. [Source: The Blog Herald]
A Web site that offers blog content. Usually the site will be a portal to blog news and offer feeds from a number of different blog sources. See The History of Blogging in the Quick Reference section of
A symmetric encryption algorithm designed by Bruce Schneier in 1993 as an alternative to existing encryption algorithms, such as DES. Blowfish is a 64-bit block cipher (i.e., a cryptographic key and algorithm are applied to a block of data rather than single bits) that uses a key length that can vary between 32 and 448 […]