Social media optimization is taking the world by storm and here is an attempt to tell what all this is about.
Thursday, August 16, 2007
Google is Being Hacked Using this Technique
What is a Web Proxy?
First, it is important to understand that in their simplest form proxies are servers that act as a relay for Internet requests. Web proxies are often used to allow people to surf the net anonymously by forwarding their requests for content and then delivering the content to the users. This is similar to sending mail to a person through the post office except that in this case there is no return address or any identifying information. For a more detailed explanation here is Wikipedia's definition.
Here is essentially how this Google hack works:
1. All is well; your website is www.xyzname.com and it is currently listed in the top 10 in Google for 'xyz'.
2. A hacker comes along and decides that your listing for 'xyz' needs to be removed (perhaps for competitive reasons or out of spite). So the hacker gets Google to spider your website through a proxy. The address that Google would be given to index might look like this:
www.proxysrus.au/proxy/www.xyzname.com/
3. When Google indexes this new URL it looks legitimate and Google's filters will soon recognize that the content being indexed is exactly the same as www.xyzname.com. As a result, in the cases that have arisen so far www.xyzname.com loses its ranking and the freshly indexed proxy URL has effectively eradicated the competition.
So how is this hack technically accomplished?
Well I am with Dan Thies on this one, I have no interest at all in sharing the specifics because the last thing I want to do is enable more evil in the world. In addition, since I have never seen such a thing done I can only postulate how it would be accomplished. That said, I think it is reasonable to share the problems that would need to be surmounted to make such a thing work:
1. When the proxy URL is requested the server would have to provide the search engines with zero suspicion that a proxy was delivering the information. This includes URL syntax, URL length, server header information and latency.
2. The proxy URL would have to appear authoritative.
3. The proxy would need to be able to thwart the proxy hacking prevention measures that Dan has laid out within his informative article. At this time it appears the only proxies that are having some success are the ones that strip all browsing information so that the 'hack proof' sites cannot tell whether the traffic is legitimate or not. If they can't tell then they will not know to block Google from spidering their site through the wrong URL. Again even that attack has been rebuffed by Dan and his team by enabling noindex and nofollow tags on his client's sites UNLESS a verified search engine is visiting.
Source:www.stepforth.com
Wednesday, August 15, 2007
Google Hacks: Please Do Not Use This Program For Illegal Uses

"This program is for educational purposed only." That's the disclaimer I see whenever I visit a warez site (which is the, cough, primary reason I'm there).
I don't know what Google was thinking when they released Google Hacks, but it's a sure bet most people won't abide by the "Please do not use this program for illegal uses" disclaimer you'll find on their download site.
Google Hacks is a front-end GUI you can use as a standalone app (see image below) or as a browser toolbar. It performs searches you can already do -- if you know the syntax. For instance, if I wanted to search for Dave Brubeck, I could pop the following into Google's search field.
-inurl:(htm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(.mp3|.wma) "Dave Brubeck"
But it's obviously a heck of a lot easier to type "Dave Brubeck" into Google Hacks and choose the music category.
Search for videos, music and more with Google Hacks
Hacking with Google
Google Hacks lets you search in any one of 12 categories -- music, applications, video, books, lyrics, and others. But there's a catch. The searches are indexes -- Web site directories that haven't been protected. Translation: You have to sort through lists of files and some, if not most, could be unrelated to what you're searching for.
Here are the results of a Google Hacks search
At the same time, you might hit the jackpot -- loads of files with just the content you're looking for. The showstopper is that the content belongs to someone else who doesn't know how to hide it from prying eyes. (And yes, I know, that person may have downloaded the music illegally as well.)
Here's plenty of music downloads for Stan Getz fans
Source:www.pcworld.com