Archive Info

You are currently browsing the I Hate Google.org weblog archives for 'work' category

IPLists.com updated

# Baidu
123.125.71
180.76.5.154
180.76.6.54
180.76.6.145
220.181.108

# Easou.com
# UA “Mozilla/5.0 (compatible; EasouSpider; +http://www.easou.com/search/spider.html)”
183.60.213.53

# Google
# UA “DoCoMo/2.0 N905i(c100;TB;W24H16) (compatible; Googlebot-Mobile/2.1; +http://www.google.com/bot.html)”
# UA “SAMSUNG-SGH-E250/1.0 Profile/MIDP-2.0 Configuration/CLDC-1.1 UP.Browser/6.2.3.3.c.1.101 (GUI) MMP/2.0 (compatible; Googlebot-Mobile/2.1; +http://www.google.com/bot.html)”
66.249.76.196

# Gorgor
# UA “hivaBot(http://gorgor.ir and info@gorgor.ir)/hivaBot-0.2″
# 5.144.131.82

# MSN/Bing
# UA “Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)”
157.55.34.27
157.55.33.38
157.55.33.251

# Sogou
220.181.125.13

# Inktomi/Yahoo!
68.180.224.229

# Yandex
# UA “Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)”
199.21.99.102

# Youdao
61.135.249.193
61.135.249.195
61.135.249.212

Finished Law School

This month is a huge milestone in my life. I graduated law school.



Over the last three years I have reported some of my grades and rankings here. I ended up in the top 11% of my class (missed the coveted top 10% by one one-hundredth of a grade point), with a cumulative GPA of 3.494. My family and I sacrificed a lot to put me through law school and we are proud of the accomplishment.

This July I will take the Louisiana bar exam and begin my career as an attorney. People often ask me what type of law I will practice. It is difficult to know this at the outset. My first job as a lawyer will be as an associate at Lundy, Lundy, Soileau & South, LLP, a law firm in Lake Charles, Louisiana. I was hired as a “commercial litigator.” I worked there these past two summer and winter breaks as a law clerk and thoroughly enjoyed the experience.

Goodbye and good luck to my friends at LSU Law. I am sure that many of us will meet again in practice, sitting on opposite sides of the courtroom ;-)

Update (Nov., 2014): passed the bar on the first try and have been practicing law for about two years. It’s a great profession and very challenging. I wish I had done this years ago.

IPLists.com updated

# Ask Jeeves/Teoma
206.80.1.253

# Cuil.com
67.218.116.132
67.218.116.134
67.218.116.162

# Inktomi/Yahoo!
67.195.110
67.195.111
67.195.112
67.195.113
67.195.114

# Kalooga
195.210.57.83

# Linguee
# UA “Linguee Bot (http://www.linguee.com/bot; bot@linguee.com)”
85.25.124.167

# Metadatalabs
66.219.58.34
66.219.58.41
66.219.58.42
66.219.58.43
66.219.58.44
66.219.58.45
71.41.201.34
71.41.201.35
71.41.201.36
71.41.201.37
71.41.201.38

# Novosoft
# UA “Mozilla/5.0 (compatible; Page2RSS/0.5; +http://page2rss.com/)”
69.64.69.73

# RF Crawler
# UA “DoCoMo/1.0/N505i/c20/TB/W20H10 (compatible; RFCrawler-Mobile/1.0;”
# UA “DoCoMo/1.0/N505i/c20/TB/W20H10+(compatible;+RFCrawler-Mobile/1.0;”
# UA “DoCoMo/2.0+SH901iC(c100;TB;W24H12)”
# UA “DoCoMo/1.0/N505i/c20/TB/W20H10 (compatible; RFCrawler-Mobile/1.0;”
216.255.229.246

# Soso
58.61.164.140

# Visvo
# UA “VisBot/2.0+(Visvo.com+Crawler)”
72.249.60.74

# Yandex
93.158.148.31
93.158.149.32
77.88.27.26
77.88.26.26
93.158.151.24
95.108.156.251
87.250.230.33
95.108.150.235

IPLists.com Updated

# Cuil.com

216.129.119.10
216.129.119.11
216.129.119.12
216.129.119.13
216.129.119.14
216.129.119.15
216.129.119.16
216.129.119.17
216.129.119.18
216.129.119.19
216.129.119.40
216.129.119.41
216.129.119.42
216.129.119.43
216.129.119.44
216.129.119.45
216.129.119.46
216.129.119.47
216.129.119.48
216.129.119.49
216.129.119.81
38.99.13.116
38.99.13.117
38.99.13.118
38.99.13.119
38.99.13.120
38.99.44.107
38.99.44.108

IPLists.com Updated

# Apexoo.com
# UA “Apexoo Spider (http://www.apexoo.com/spider/)”
208.78.102.219

# Baidu
123.125.64.38
123.125.64.49
220.181.7

# Inktomi/Yahoo!
67.195.115

# Naver
61.247.221.92

# Seznam
# 77.75.73.123

# Sogou
220.181.61.234

# Yandex
77.88.25.28

IPLists.com Updated

I updated the MSN list to include the range:

65.55.0.0 – 65.55.255.255

IPLists.com Updated

# Baidu
61.135.168.124
61.135.168.126
61.135.168.19
61.135.168.22
61.135.168.56

# Gigablast
# 67.16.94.2

# MSN
65.55.234
65.55.106

# Naver
61.247.221.87
114.111.36.26

# Zibb.com
208.68.138.5

IPLists.com updated

# Inktomi/Yahoo!
67.195.53.111
67.195.53.219

# MSN
65.55.217.53
65.55.217.54
65.55.217.55
65.55.217.56
65.55.217.57

Top 10 Black Hat SEO Techniques

Black Hat SEO techniques are methods webmasters/marketers use to get a leg up on the competition in the search engines. Whether they are fair or unfair, legitimate or illegitimate is not up for discussion here. This is a list and explanation of ten of the top black hat SEO techniques.

10. Buying Links

Is buying links a black hat technique? Of course it is. When a marketer pays for a link, they are essentially “buying a vote” for the page they are promoting. That link would not exist except that it was paid for. This gives extra weight to the promoted page in the search engine algorithms. The paid-for link does not itself add extra value to visitors, so the technique must be black hat. More Info

9. Cyber Hoaxing

Hoaxing is a way of “creatively” making news. First, create a fake news website that looks real. Second, write a sensational but false news story. It helps if it is difficult to prove the veracity. Third, create multiple accounts on various social networking sites such as Digg, Stumbleupon, Del.icio.us, etc., and submit your story there. Fourth, be ready for emails and phone calls from actual big-time media outlets with questions about your story. You will generate buzz and get links to your fake news story. Eventually, when it is discovered your story is false, try to capitalize on the outrage. How to monetize the whole situation is up to the webmaster, but it is commonly done with affiliate programs. More Info

8. Keyword Stuffing/Hidden Text

This technique involves picking a bunch of keywords for which a marketer wants a page to be optimized, and then placing them on the page in such a way that they will be read by search engine spiders, but not by human visitors. They can be located in a hidden div tag, colored so that they blend into the background, or even placed within HTML comment tags. This is truly an oldschool technique, and is not nearly as effective now as it was back in the day. More Info

7. Doorway pages

Doorway pages are web pages created solely for the purpose of being spidered by search engines and included in the search engine results pages (SERPs). They are usually optimized for placement in the SERPs by being stuffed with keywords and created in bulk. Often, you will see that the pages are named after the primary keyword being targeted. Also, doorway pages will likely have a form of redirection involved sending visitors to the “money site”. The redirection can be a meta refresh tag or javascript. Most webmasters using this technique will have software which cranks out doorway pages by the thousands. More Info

6. Web Page Cloaking

This technique goes hand-in-hand with the doorway pages technique. The idea behind cloaking is to show a doorway page to search engine spiders but the “money page” to human visitors. Both pages are accessed using the same URL. Software is used to identify the search engine spiders and serve the doorway page to them. There is a dual purpose to web page cloaking: competitors are kept from scraping the content of the optimized doorways, and human visitors are kept from seeing the ugly doorway pages (the redirect is unnecessary in a properly executed cloaking solution). I may be a little biased about web page cloaking because I am the author of KloakIt, a cloaking software application.

5. XSS Injection

Cross-Site Scripting (XSS) is a technique used to take advantage of certain pages with a special security flaw. They accept input from the HTTP GET QUERY_STRING environment variable (the text after the “?” in a URL) and display it on the page. Therefor, it is possible to construct a URL to one of these pages which will be displayed as a link to the site you specify, with the text you specify as the link text. The constructed URL can be set up as a link somewhere that a search engine spider will follow, getting the XSS-generated page indexed. Very sneaky. More Info

4. 302 Redirect Hijacking

This technique is a really nasty black hat trick where the evil webmaster creates a web page on a high-page-rank domain with a 302 redirect to the page he is trying to hijack. Googlebot (or another search engine spider) follows the redirect to the second page and indexes it, but on the SERP, the URL of the indexed page will be that of the page with the redirect. In other words, the evil black hat webmaster will own the SERP, and the page with the content will be de-indexed. A truly evil hijacker builds cloaking into the redirect so human visitors to the page will go to his “money page”, while search engine spiders will still see the 302 redirect. More Info

3. Scraping and Spinning

Scraping and its cousin spinning are a black hat technique that uses software to spider websites, grab the content, mix it up a bit, paraphrase, randomize, and generate “new” content from it. Often it will contain links to sites the marketer is trying to promote. Or, it will contain Adsense or other ads which are used to monetize the content. Spinning content into duplicate-content-penalty-avoiding text is the holy grail of black hat techniques. Programmers who come up with methods for doing this on-the-fly have created true money machines for themselves. Here’s an excellent scraping and spinning story.

2. Splogs

Close cousins to scraping and spinning, splogs are simply blogs with worthless, automatically generated content. Many splogs read RSS feeds and create blog posts for themselves from them. Splogs are the framework into which scraped and spun content is laid out to create made-for-Adsense (MFA) sites. Also, splogs can be used to get other sites indexed or their Pagerank increased, by including links to them. A large percentage (some say 20% or higher) of the blogs on the web are actually splogs. More Info

…and the number one black hat SEO technique is…

1. Link Spamming

King of black hat techniques, link spamming is just a way getting links to the websites of your choice through the use of automated software which accesses unprotected blogs through anonymous web proxies and leaves links in their comments. Long, frequently updated lists of proxy IP addresses are necessary, as well as decent comment generation software. Blog software developers have fought back, however, such as the the development of the Askimet comment filter for WordPress. More Info

A Last Word

Now that you are an expert on black hat SEO techniques, go out and make your millions. But wait! I’ll through in one more technique as a freebie… “churn and burn“. This is actually not a technique, but a strategy. Churn and burn means you have to be prepared to lose domains to penalties in search engine rankings as Google or other search engines discover they are spammy. The real secret to black hat success is to always be developing new domains and campaigns. If one is slammed, you should have two on the back burner.

KloakIt Website Remix

A few days ago, I rewrote the KloakIt website. Actually, I revised some pages from the old site and made them live again. Here are some links to them:

Cloaking Technology

The Dos and Don’ts of Cloaking Software

Cloaking Software for Your Website

The reason I did this was because sales were better when the old version of the site was live. Now, let’s see if that had to do with the copy or with the design. Hopefully, this unscientific test will tell me something useful.

On a related topic, I also added a previously neglected privacy policy.