Proxy hacking is the process of getting a website indexed through a proxy, which then manipulates the search index...
for the website. Proxy hacking can be rendered ineffective by limiting connections to your website from open proxies. There is software available for proxy hacking protection that runs either as a part of a Web server or as a part of the webpages themselves.
Spamdexing entails replicating content unrelated to search terms to manipulate the relevancy of webpages indexed by a search engine. This type of attack can be stopped by searching for your content and contacting websites that duplicate it.
Link farms are websites that have a large number of links to each other to manipulate the relevancy of webpages indexed by a search engine. You would also need to contact websites if a link farm links to your website to ask them to stop doing so.
Keyword stuffing is when a webpage has a large number of keywords in the meta tags in an attempt to improve the content's rank in a search engine. Keyword stuffing is an attack on the search engine and not something you can do anything about.
Finally, article spinning involves rewriting existing webpages and replacing parts to avoid being penalized by search engines for using duplicate content. Article spinning, as with spamdexing, can be stopped by contacting the website that is copying your content and having them remove the infringing content.
Dig Deeper on Emerging cyberattacks and threats
Related Q&A from Nick Lewis
Researchers developed aIR-Jumper, an exploit that leverages lights within security cameras to extract data. Learn how this attack works and how to ... Continue Reading
The com.google.provision virus reportedly targets Android users, but little is known about it. Nick Lewis discusses the mystery threat and how Common... Continue Reading
A bug in Microsoft's Internet Explorer update exposes information that users enter into the browser's address bar. Learn more about the bug and URL ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.