• Content Automation: Content automation is the technique where tools and scripts are used to generate random content for the website. Automated content are written in no particular pattern or style. Content automation is risky sometimes, it degrade the website value even considered as blacklist websites.
  • Doorway Pages: Doorway pages are web pages those are created for the deliberate manipulation of search engine indexes. These kind of pages are also called jump pages, portal pages, bridge pages. Doorway pages that redirect visitors without their knowledge, use some form of cloaking.
  • Hidden Text or Links: According to the google, “Hiding text or links in your content is to manipulate Google’s search rankings which can be seen as shady and hidden text is a violation of Google’s Webmaster Guidelines”. Text (such as excessive keywords) can be hidden in several ways, By using white text on a white background & Locating text behind an image, using Cascading style sheet to position off-screen text, setting the font size to 0, etc..
  • Keyword Stuffing: “Keyword stuffing” is a practice of loading a webpage with keywords or numbers in order to manipulate a site’s ranking in Google search results. Often, these keywords appear in a list or group, or out of context. Filling pages with keywords or numbers results in a negative user experience, and can harm your site’s ranking. Focus on creating useful, information-rich content that uses keywords appropriately and in context.
image source: Google images
  • Reporting a Competitor (or Negative SEO): This include a set of activities that is required to decreased competitor’s site rankings in search engines’ results. These activities may include knowingly building spammy, unnatural links to the site, content scraping, and even hacking the site, defaming web pages.
  • Sneaky Redirects: Redirecting is the act of sending a visitor to a different URL than the one they initially requested. There are many good reasons to redirect one URL to another, such as when moving your site to a new address, or consolidating several pages into one.
  • Cloaking:Cloaking is a technique to deliver the content on a web page to a search engine in such a way that a different content than what is delivered to a regular human user, appears on the search engine. The goal of cloaking is to boost a website’s search engine rank on certain keywords.
  • Link Schemes: Any links intended to manipulate PageRank or a site’s ranking in Google search results may be considered part of a link scheme and a violation of Google’s Webmaster Guidelines. This includes any behavior that manipulates links to your site or outgoing links from your site.
  • Guest Posting Networks: Guest posting is an SEO technique where a writer who owns his own blog but creates a unique and original post on another blog or site with mention of the author. Guest posting or blogging is a method used by bloggers to increase more traffic on a blog or site where bloggers write posts to be published on other bloggers’ blogs. Guest blogging can work in one of two ways:
  • Link Manipulation (including buying links): Link manipulation includes creating webrings in the website, shady redirects, spammy footer links, guest post link in order to get the links back.
  • Article Spinning: It is specific writing technique used in search engine optimization & web applications, where website authors may use article spinning on their own sites to reduce the similarity ratio of rather redundant pages or pages with thin content. Content spinning works by rewriting existing articles, or parts of articles, and replacing specific words, phrases, sentences, or even entire paragraphs with any number of alternate versions to provide a slightly different variation with each spin. This process can be completely automated or written manually as many times as needed.
  • Automated Queries to Google: Google prohibited sending any kind of automated queries to their system without prior permission from Google. Sending automated queries consumes resources which includes those which has capability software to send automated queries to Google to determine how a website or webpage ranks in Google search results for various queries. In addition to rank checking, other types of automated access to Google without permission are also a violation of their Webmaster Guidelines and Terms of Service.
  • Creating pages, subdomains, or domains with duplicate content
  • Pages with malicious behavior: Pages with unusual malicious behavior such as phishing, viruses, trojans, malware, Cross site scripting, cross site request forgery are considered as blackhat SEO techniques.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Parul Jain

Parul Jain

SEO Analyst and Passionate Digital Marketer