cloaking

For term searches and specialty glossaries, please try the new GBK glossaries
20:57 Apr 7, 2010
English to Arabic translations [PRO]
Tech/Engineering - Internet, e-Commerce
Additional field(s): Advertising / Public Relations, Computers: Software, Marketing / Market Research
English term or phrase: cloaking
Definition from Nick Usborne:
The process by which your site can display different pages under different circumstances. It is primarily used to show an optimized page to the search engines and a different page to humans. Most search engines will penalize a site if they discover that it is using cloaking.

Example sentence(s):
  • The cloaking system works by detecting search engine spiders via spider name or IP address. By comparing the IP address of the site visitor to a database of IP addresses of search engine spiders, the cloaking program determines whether or not a visitor is a search engine spider. Incisive Interactive Marketing LLC
  • Marketers may use cloaking to draw users to pages that have many ads but little to do with what the person was searching for. QuinStreet Inc.
  • Most search engines will immediately remove and sometimes blacklist a site that is discovered to be cloaking. They do this because cloaking is usually intended to completely fool the search engine's algorithms and programming that determine what makes a site rank high or low in that engine. About.com
Glossary-building KudoZ




This question was created by:


This question will remain open until an answer receives the required level of agreement from peers. Submission is still possible.


Summary of translations provided
5 +1التغطية
Dr. Mohamed Elkhateeb


  

Translations offered


57 mins   confidence: Answerer confidence 5/5 peer agreement (net): +1
التغطية


Definition from المتميز للرياضيات:
الطريقة تعتمد على صناعة مئات من الكلمات المفتاحية في صفحات الموقع غير ظاهرة للزوار و موجهة لعناكب البحث عن طريق سكريبتات و كالعادة هذه الطريقة ستعرضك للطرد من نتائج البحث !

Example sentence(s):
  • التغطية Cloaking أحد الخصائص الخطيرة وأحد الطرق اليدوية للحماية التي تعتمد على دراية المستخدم وحرفيته هي مراقبة كل من processes task manager, startup, windows and registery ولكن ماذا تفعل لو أخفى التروجان نفسه عن أبراج المراقبة؟؟ هذا ما حدث بالفعل من خلال تلك الخاصية المضافة حديثا. مسح باستخدام آي بي الضحية Scanning Using Victims IPs سعى المخترق بالدرجة الأولى لإخفاء هويته قدر الإمكان، أولا بهدف إخفاء شخصيته عن الضحية ثانيا بهدف عدم تقفي الأثر من قبل السلطات المختصة حال تعقبه فأضاف الهاكرز خاصية القيام بعمل مسح للتنبهات لاصطياد البورتات المفتوحة مستخدما أجهزة الضحايا، فحتى لو قام الجدار الناري بتسليم رقم الآي بي الخاص بضحية فسيكون مظلوم لا يعلم أن جهازه أداة طيعة في يد المخترق، أي أن رقم الآي بي هو رقم الضحية، بل حتى لو حاولت السلطات تقفي الأثر فسيكون الضحية هو الجاني. - منتديات عالم مدريدي  
Dr. Mohamed Elkhateeb
Egypt
Local time: 15:36
Native speaker of: Arabic
PRO pts in category: 8

Votes in favor of/against selecting this as the best translation of the term asked
Yes  elsayed fayed
60 days
  -> Thank you very much
Login to enter a peer comment (or grade)



Login or register (free and only takes a few minutes) to participate in this question.

You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.

KudoZ™ translation help

The KudoZ network provides a framework for translators and others to assist each other with translations or explanations of terms and short phrases.


See also:
Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search