Welcome to WebmasterWorld Guest from 188.8.131.52
Forum Moderators: open
Most of the SEO work I do is for webmasters that have already built the website, or the Webmaster is hosting a website that has already been built by someone else.
Sometimes I wonder if the original Webmaster of a webpage was using cloaking techniques on a web page that I don't know about.
Is there a tool out there that you can type in the web-address to see if cloaking methods are being used?
You could try looking in the Google cache to see if it matches the content of the website.
Tried that before as I had my suspicion that a particular site was cloaking. When I checked Google cache it showed a blank white page hmmmm. Then I clicked "This cached page may reference images which are no longer available. Click here for the cached text only."
Blinggggg hidden text revealed.
Assuming someone knows what they are doing when it comes to cloaking then you shouldn't be able to detect it at all - the suggestions laid out here all rely on errors on the part of the cloaker allowing you to detect them.
There is no foolproof way to access the html shown to search engines. Every method I've ever seen to access the optimized html has been protected against by most commercial cloaking software packages.
Huh? Just connect to the site giving googlebot as the User Agent and you will see the page that the site serves up to google. Have you got the URL of the cloaked site? cURL will let you do this.
Ok but is that very effective? If I were, say Google, I would randomize the IP addresses used by my robots.
Yup, it's very effective when used in conjunction with user agent detection. Google only have so many IP addresses - and the ones they crawl from do change, but good cloaking software updates IP ranges as Google does.
I've never used cloaking software though - I'm sure that there's other stuff that goes into it as well - a lot of people around here could jump in and explain it and if you look at the library of this forum you'll find that some people already have.