Monday, December 17, 2007

IP Address

IP address specifies Internet Protocol. Every device connected with a public Internet is assigned a unique number known as an IP address. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255.For Example .The four numbers in an IP address are used in different ways to identify a particular network and a host on that network.The IP address is devided into 3 classes.

Let us take the example of this IP address

Class A-A Class Ip address is like 1

Class B-B Class IP address is like 1.150

Class C-C Class IP address is like 1.150.24

C class IP address are commonly used in small and middle level business.

Class D and Class E IP address:These two IP addresses are very different than first three classes.

Two types of IP address are there.

  • Shared IP
  • Dedicated IP

Shared IP Address: One IP address is hosted by several domains.

Dedicated IP Address: One IP address is hosted by one IP address i.e unique IP address.

Shared IP is devided again in two categories:

  • Static IP address
  • Dynamic IP address

Static IP address:

A static IP address is fixed IP address.If yourInternet service provider gives you a static IP address,You will always use the same IP address.Server usually have static IP addresses,so they can always be sound at the same location.

Dynamic IP Adress: A dynamic IP address changes each time you connect to your Internet Service Provider (ISP). This allows ISPs to keep a pool of addresses available to subscribers. If you disconnect from the ISP, your address is returned to the pool, becoming available to the next computer that connects.

It is better to use Dedicated IP address for your website.

Fake Copy Listing, The content stealing process

Do you all know what do you mean by fake copy listing? Fake copy listing is the practice of stealing content from other website, modifying, republishing it and submitting that duplicate page to search engines by the hope of stealing traffic from the original website.

In this case the webmaster should have used copyright notice in every page of their website.

How to check about duplicate content?

If you want to check about duplicate content, how many sites are using the same content then just copy one line of content from your website then put it in a site named If it will show multiple results then you will know that your site content is repeated.If it will show no results then your site has unique content.

So, Be aware of this stealing process of content by strictly using copyright process.

Thursday, December 13, 2007

Black Hat Technique, the unethical SEO process

Black Hat Technique:

There are two types of seo techniques.i.e white hat and black hat technique. White hat technique means the ethical way of seo technique. I want to tell something about black hat technique.

Black hat technique is one of the unethical ways of SEO Technique. In this process there are various techniques to frowned upon search engines like:

Hidden Text: Hidden text is meant for the text contain in the page has the similar color as website background. This is for attract to search engines but it is not user friendly.

Keyword Stuffing: Unnecessary use of keywords for ranking well in search engines.

Cloaking: At the same URL one page is shown to search engine which is designed well and contains some codes to attract search engines, invisible to users and other is to users which may be severely penalized by search engine.

Doorway Pages: A webpage is particularly designed for ranking well in search engines. After opening this page suddenly it is redirect to another real page.

These are the important methods of black hat techniques which is mainly used for attract to search engines. Search engines may penalize for these methods when it comes to know. So, Be careful for black hat techniques.

Custom Search