menu
What is Cloaking? How many types of Cloaking are there?
When we build a website, our greed for ranking at the top rises, but we have to keep realistic expectations.

It takes a considerable amount of time to rank on top.

Those who do not keep realistic expectations are usually tempted to follow 'Black Hat SEO' Techniques. But Enterprise SEO services by Kinex Media do not include even a bit of Unethical SEO techniques. 

 

Black Hat SEO Techniques: When we use techniques that are not in compliance with Google, that process of ranking at the top is known as the Unethical or the Black Hat SEO. 

 

One such Black Hat SEO technique is - CLOAKING. 

 

What is CLOAKING? 

Cloaking is an Over-Smart Technique that Google does not like at all. In Cloaking, the information presented to Crawlers or Bots is different from what is given to the users. It is one of the best ways to improve the website's SERP ranking for specific keywords. 

 

How many types of CLOAKING are there? 

There are FIVE significant types of Cloaking as follow: 

  • IP Based Cloaking 

  • Javascript Cloaking 

  • User-Agent Cloaking 

  • HTTP_REFERER cloaking Cloaking 

  • HTTP Accept-Language Header Cloaking

 

  1. IP Based Cloaking 

We know very well that the users accessing a website do have an IP address. An IP address is based on the two predominant factors - Location & Internet Service. An IP address helps the user redirect to the desired content page, with a high SERP Ranking & Traffic. 

 

But with IP Based Cloaking: 

  • First of all, an IP address is identified 

  • .htaccess is set up for redirection 

 

  1. Javascript Cloaking

In this cloaking method, the users who have 'Javascript-Enabled-Browsers' are presented the separated version of the content, while those with 'Javascript-Disabled-Browsers' are shown a different version. 

 

  1. User Agent Cloaking 

The web browsers we use are user agents that present the website information in an operating system. 

 

How does it happen? 

When we request the information from the browser, the browser sends a distinguishable code to the server that helps determine whether a crawler or a user is demanding data. Different pieces of information will be presented to both. 

 

  1. HTTP_REFERER Cloaking

This method involves checking a header. Based on that, a cloaked or uncloaked version is presented. 



  1. HTTP accept-Language header Cloaking 

With this technique, the HTTP Accept-Language header of the user is checked. Based on that, a specific version of the website is presented. If the HTTP accept-language header is found on the search engines, then a cloaked version will be served. 

 

Which is the most common way to implement Cloaking in SEO? 

There are specific easy ways to cloak the actions. But the most used one is HIDDEN texts: 

 

Hidden Texts 

Since keyword stuffing is not considered suitable by Google's algorithm, some people still think it is the best way to make a website rank. So they do not do it directly; instead, they do it indirectly. By embedding keywords so that the users can not read them, google's algorithm can. How? 

The keywords will be embedded separately, and they will obtain the background color.  

 

Final Comments!

There is no shortcut in SEO. If you want to make your website rank achiever, in the Long run, you must not follow Black Hat SEO techniques. It is like breaking the trust of Google. 

 

Obtain Local SEO Services by Kinex Media for Better Rankings in SERP