Search Engine Optimization Strategies

What Is Cloaking?

Cloaking is the practice of serving search engine optimized pages to search engine spiders, while at the same time serving un-optimized pages to site visitors. It is also known as food script, spider script, ghost pages, phantom pages, IP delivery or stealth technology.

Cloaking is probably the most controversial and hotly debated search engine optimization technique around today. Most major search engines publicly state that they consider cloaking to be spam.

However, in the 6 years I’ve been in this business, I have yet to hear of a single website get banned by a search engine because of the use of cloaking. Some search engine optimizers who specialize in cloaking have stated that they have used this technique for many years without ever having a site banned.

How Does Cloaking Work?

Cloaking works by detecting whether a visitor is a search engine spider, or human visitor, and serve the appropriate page to the spider or human visitor accordingly.

Good cloaking software will identify spiders from their unique IP address (the internet address the spider came from), which can be one of many IP addresses. For this to work you need a comprehensive search engine spider IP address database.

Search engine spiders are never redirected; otherwise it would be penalized by a search engine. Only your human visitors' web browser is redirected, so search engine spiders “should” never know they are being “tricked” (and I use that term lightly).

Why Do Search Engine Optimizers Use Cloaking?

Cloaking allows you to:

What Features Should You Look For In Cloaking Software?

There are a number of important features you should look for when deciding on which cloaking software to use.

2 Cloaking Tools