Most Recent

Google's Near Parameter Still Lets You See Results By Specific Location

So yesterday, Google stripped away the ability to use the Search Tools options in the user interface to show search results as if you are in a specific location. This upset many many SEOs and webmasters, especially the ones who do SEO outside of the US for US customers. The thing is, you can still […]

3
Like
Save
12 Years Covering The Search Industry

12 years doesn’t seem that long but when you look back at it, look how much has changed over the years. This site has been around for 12 years today and the basic purpose of the site has not changed. That being, we bring what the industry is talking about to the forefront of the […]

9
Like
Save
Fixing “full path disclosure” issues

Whether you’re running a web service or a blog, you should always keep your software fully patched to prevent attacks and minimize your attack surface. Another smart step is to prevent full path disclosures. For example, if your blog or service throws an error like “Warning: require(ABSPATHwp-includes/load.php) [function.require]: failed to open stream: No such file […]

4
Like
Save
Google+: A case study on App Download Interstitials

Many mobile sites use promotional app interstitials to encourage users to download their native mobile apps. For some apps, native can provide richer user experiences, and use features of the device that are currently not easy to access on a browser. Because of this, many app owners believe that they should encourage users to install […]

8
Like
Save
#NoHacked: How to avoid being the target of hackers

If you publish anything online, one of your top priorities should be security. Getting hacked can negatively affect your online reputation and result in loss of critical and private data. Over the past year Google has noticed a 180% increase in the number of sites getting hacked. While we are working hard to combat this […]

3
Like
Save
Daily Search Forum Recap: December 2, 2015

Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web. Search Engine Roundtable Stories: 12 Years Covering The Search Industry 12 years doesn’t seem that long but when you look back at it, look how much has changed […]

5
Like
Save
Four Tools To Break You Out Of The Keyword Research Box

Need inspiration for expanding your keyword research? Columnist Paul Shapiro has some creative suggestions for you. The post Four Tools To Break You Out Of The Keyword Research Box appeared first on Search Engine Land. Please visit Search Engine Land for the full article.

4
Like
Save
My next project: AutoSEO

This was an April Fool’s joke. I’ve been working really hard with some friends on a project to handle SEO automatically. Now we’re ready to take the wraps off it over at seo.ninja. One of the ideas that helped the World Wide Web succeed was that it separated presentation and content. You could write your […]

4
Like
Save
#NoHacked: How to recognise and protect yourself against social engineering

Today in our #NoHacked campaign, we’ll be talking about social engineering. Follow along with discussions on Twitter and Google+ using the #nohacked hashtag. (Part 1) If you’ve spent some time on the web, you have more than likely encountered some form of social engineering. Social engineering attempts to extract confidential information from you by manipulating […]

9
Like
Save
Introducing the Search Analytics API

With the great feedback from the Search Analytics feature in Google Search Console, we’ve decided to make this data accessible for developers via API. We hope that the Search Analytics API will help you to bake search performance data into your apps and tools. If you’ve used any of Google’s other APIs, or maybe one […]

4
Like
Save
#NoHacked: Identifying and Diagnosing Injected Gibberish URL Hacking

Today in our #NoHacked campaign, we’ll be discussing how to identify and diagnose a trending hack. Even if your site is not infected with this specific type of hack, many of these steps can be helpful for other types of hacks. Next week, we’ll be following up with a post about fixing this hack. Follow […]

2
Like
Save