Monday 8 October 2012

Site Health



This post's written because I want to share my experience with you, some time ago,   some of my blogs that have a high ranks on google searc,  but suddenly google rank dropped drastically, even if we write the url in Google Search  the site does not appear anymore, only an explanation of other websites such as pageinsider, webstatsdomain  and others, after I check it turns out some of my blogs are unhealthy.


To help you identify and prioritize the most important issues on your site, Webmaster Tools will display the Site Health alert Google Webmaster Tools Site Health alert icon next to your site on the Webmaster Tools home page whenever we detect certain problems or events that prevent us from crawling or indexing your site. The following events can trigger a Site Health alert: Google detects malware on your site. An important page is removed from your site. If you've intentionally removed a page that was previously generating traffic to your site, you can ignore this alert. An important page is blocked by robots.txt. If you've intentionally blocked a page (because you don't want it to appear in search results), you can ignore this alert.


                                                                   Site Health Homepage



Cloaking refers to the practice of presenting different content or URLs to human users and search engines. Cloaking is considered a violation of Google’s Webmaster Guidelines because it provides our users with different results than they expected. Some examples of cloaking include: Serving a page of HTML text to search engines, while showing a page of images or Flash to users Inserting text or keywords into a page only when the User-agent requesting the page is a search engine, not a human visitor If your site uses technologies that search engines have difficulty accessing, like JavaScript, images, or Flash, see our recommendations for making that content accessible to search engines and users without cloaking. If a site gets hacked, it’s not uncommon for the hacker to use cloaking to make the hack harder for the site owner to detect.


Sneaky Redirects are conditionally redirecting users based upon their country. This means that some of your visitors are redirected to other sites instead of being able to view your site's content, and these other sites have little relevance to the content of your site's pages.  It's may be caused by an affiliate program on your site through an iframe tag ending in seo.php, and wanted to bring this to your attention in case you did not know about this behavior.  If you make changes to your site so that it is no longer in violation of Google quality guidelines,  Google will  discover these changes as we re-crawl your pages and update Google index. 


Hacked content is any content that is placed on your site without your permission due to vulnerabilities in your site’s security. In order to protect our users and to maintain the integrity of our search results, Google tries its best to keep hacked content out of our search results. Hacked content gives our users results that are not useful and can potentially install malicious content on their machines. We recommend that you keep your site secure, and clean up hacked content when you find it. Some examples of hacking include: Injected content When hackers gain access to your website, they may try to inject malicious content into existing pages on your site. This often takes the form of malicious JavaScript injected directly into the site, or into iframes. Added content Sometimes, due to security flaws, hackers are able to add new pages to your site that contain spammy or malicious content. These pages are often meant to manipulate search engines. Your existing pages may not show signs of hacking, but these newly-created pages could harm your site’s visitors or your performance in search results. Hidden content Hackers may also try to subtly manipulate existing pages on your site. Their goal is to add content to your site that search engines can see but which may be harder for you and your users to spot. This can involve adding hidden links or hidden text to a page by using CSS or HTML, or it can involve more complex changes like cloaking.



Can your  web site get banned by Google for cloaking?
If that was true, then your competitor would hire us to build thousands of cloaked domains and point them to your primary web site so that it would be banned from the Google Search!

Can Google penalize or “ban” your site because of the traffic that your Affiliates or other blackhat Internet Marketer sends your way?
If that was true, you would well expect the world’s top 1000 web properties to disappear from Google’s index, and where would that leave them, loss of advertising revenue aside? Cloaked domains have nothing to do with your core web site. In fact, we build cloaked domains for clients on an entirely separate server which is completely independent from the client web site or server. This ensures total arms length association between your core web site and your traffic generating campaign. ip delivery






Tips
If your site has been compromised and you need help cleaning up the hacked content, see our tips here. Remember, the most effective way to combat hacking is to prevent it from happening in the first place.
Here are some Tips of Prevention.

Cleaning Your Site
If Google detects that your site has been compromised, we'll tell you about it in Webmaster Tools (to ensure that you're notified quickly, you can have your Message Center messages forwarded to your email account). If the hacker inserted malware into your site, we'll also identify your site as infected in our search results to protect other users. If your site has been hacked or infected with malware, you should act quickly to repair the damage. Google recommends reviewing the recommendations provided by the organization antiphishing.org. Whatever your platform or type of infection.




Clean Up Content
Clean up your content, removing any pages that were added, any spammy content, and any suspicious code identified by virus scanners or the Malware Details tool. If you have backups of your content, consider deleting your content entirely and replacing it with your last known good backup (once you've checked to make sure it's clean and free of hacked content). You can check whether you've completely cleaned out the hacked content by using the Fetch as Google tool in Webmaster Tools. If you have access to your server, Google recommends the following steps: Update any software packages to the latest version. Google recommends doing a complete reinstall of your OS from a trusted source to be sure that you've removed everything the hacker may have done. Also make sure to reinstall or update blogging platforms, content management systems, or any other type of third-party software installed. Once you feel confident that your site is clean, change your passwords again. Get your system back online. Change your server's configuration so that it no longer returns a 503 status code and perform any other necessary steps to make your site publicly available. If you used the URL Removal tool to request removal of any URLs that are now clean and ready to appear again in search results, use the same tool to revoke your request.


                                                                  Google Search Engine


Preventing Mailware Infection
The price of freedom from malware is eternal vigilance. This article contains tips and pointers for preventing malware infection. However, it is by no means exhaustive, and Google encourages encourage webmasters to conduct more thorough research as well. Monitoring your site health Many of the features of Webmaster Tools can help you identify potential problems. For example: Try a Google site: search to see what's indexed. It's always a good idea to do a sanity check and make sure things look normal. If you're not already familiar with the site: search operator, it's a way for you to restrict your search to a specific site. For example, the search site:googleblog.blogspot.com will return results only from the Official Google Blog. The Search Queries page lists significant keywords Google found on your site. If unexpected keywords  appear in the list, it's a signal that your pages have probably been compromised.  The Malware page (under Health) lists sample URLs from your site that have been identified as containing malicious code. Where possible, the page will also include samples of the problem code. The Fetch As Google tool lets you see a page the same way Google's crawlers do. If you suspect a page is infected, you can use the tool to detect what Googlebot will see. If Google detects malware on your site, we'll notify you on the Webmaster Tools home page, and send a message to your Message Center. (To ensure that you're notified quickly, you can have your Message Center messages forwarded to your email account.) Security checklist In addition to monitoring your site regularly, we also recommend the following:

All webmasters Choose good passwords. 
The Gmail guidelines are helpful. Pick third-party content providers very carefully. If you're considering installing an application provided by a third party, such as a widget, counter, or ad network, be sure to exercise due diligence.

Ad Space
Ad space is often syndicated to other parties who are not known to the website owner. While there are many great third-party content on the web, it's also possible for providers to use these applications to push exploits, such as dangerous scripts, towards your visitors. Make sure the application is from a reputable source. Do they have a legitimate website with support and contact information? Have other webmasters used the service? Contact your hosting company or publishing platform for support. Most companies have helpful and responsive support groups and/or security pages. If a security page or site has an RSS feed, subscribe to it to make sure you stay up to date.

Keep all of your computers safe. 
Especially when working on a website, make sure that your local workstation has up-to-date software, is clean from viruses, trojans or similar malware and has recently updated anti-virus software installed. Webmasters with server access Check your server configuration. Apache has some security configuration tips on their site and Microsoft has some tech center resources for IIS on theirs. Some of these tips include information on directory permissions, server-side includes, authentication and encryption. Make a backup copy of your .htaccess file (or other access control mechanisms depending on your website platform). Use your backup file to recover if the following fails. Be sure to delete the backup file once you are finished. Stay up-to-date with the latest software updates and patches.

No comments:

Post a Comment