Browse Definitions :
Definition

link spam

Link spam is the posting of out-of-context links on websites, discussion forums, blog comments, guestbooks or any other online venue that displays user comments. Link spam is also known as comment spam, blog spam or wikispam. Link spammers usually don’t leave comments of any value along with their links.

The purpose of link spam is to increase the number of external links made to a site the spammer wishes to promote. A greater number of links made to a page, among other things, increases a page’s rank and improves its position on search engine results pages (SERP). Higher rankings in web searches mean greater visibility over competitors, more visitors and potentially more paying customers.

Link spam started in website guestbooks, where the spammer would repeatedly paste links to the site they were promoting. Around 2003, spammers began to attack open comments in blogs. Currently, many blog software systems have ways of eliminating or minimizing link spam. For example, Jay Allan created MT-BlackList, a free plugin to combat link spam on Movable Type-based blogs.

Because common targets were being protected, spammers began looking elsewhere, such as wikis. As a result, wikispam was born. Many wikis, including Wikipedia, have pages in their sandbox testing areas filled with spammed links, along with active pages that are defaced by links.

Link spamming can backfire on the perpetrator when search engines decide a site is a bad neighbor and remove it from search results altogether. Measures to prevent or reduce comment spam include requiring manual approval of comments containing and using a blacklist of banned words to detect spam.

This was last updated in June 2017

Continue Reading About link spam

Networking
Security
  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close