Forum Moderators: open
http://www.webmasterworld.com/forum24/210.htm [webmasterworld.com]
and if they don't know I know AIR will.....he is Mr. Cloaking.
-A Gerhart
The only other way is to use an IP spoofing technique, but this involves a denial of service attack against the machine you want to take the IP of, not easily accomplished since you also have to guess correctly what the TCP/IP packet sequence will be and have infiltrated the network that machine is on.
The easiest way is to get a job at one of the search engines :)
You just compare the cached copy to the live copy (this is another way to catch sloppy cloakers). You can also use googles cache to give you an idea of who's cloaking, more often than not if someone uses the 'no cache' tag they're cloaking.
For instance: If you look at these serps [google.com] you'll see that the spiegel-catalog.com listing is not allowing google to cache them. If you then run that listing through AV's babel fish you'll find out that they are indeed sloppy cloakers...
PHP and Perl I know. JS I'm a little weak on.
What's up with this script?
-------->
<HTML>
<!-- BabelFish added base tag --><base href="http://www.foo.com/">
<SCRIPT LANGUAGE="JavaScript">
<!--
var babelOrigUrl="http://www.foo.com/"; if ((null == parent) ¦¦ (null == parent.BabelFishAdd) ¦¦ ('TF' != parent.BabelFishAdd.babelTF)) { var i = new Image(); i.src =
'http://babel.altavista.com/aftu' }
//-->
</SCRIPT>
For example:
<?
function feed_spider($ipaddress)
{
$cloak_buster = "^209.73.164.50";
$inktomi="^xxx.xx.xx.x¦^XXX.X.XX.XXX";
ereg_replace (" ", "", $ipaddress);
if(preg_match ("/$cloak_buster/i", "$ipaddress"))
{
return false;
}
elseif(preg_match ("/$inktomi/i", "$ipaddress"))
{
return "inktomi";
}
else{
return false;
}
}