Watch Out for Free Hosting Services

Many free web hosting services can be wonderful. Some of these services have helped to reduce costs and technical barriers for webmasters and allow inexperienced venture into its path on the Web.

Unfortunately, there are times when these lower barriers (whose aim is to attract less skilled users) can attract problematic characters, like spammers looking for easy and inexpensive ways to set up dozens or hundreds of sites that do not add any value to the Web. In the case of auto-generated sites, our position is the same: if the sites do not provide enough value, are usually considered as spam and take appropriate measures to prevent these sites appear in search results and protect natural Users of such

If a free hosting service starts to show patterns of spam, we strive to be accurate and only deal with spam sites or pages. However, in cases in which spammers control the free web hosting service or a substantial part of it, we may need to take more stringent measures to protect users and remove all the free hosting of the search results. To prevent this from happening, we would like to share with the owners of free hosting services measures that can help you save valuable resources such as bandwidth or processing power, and protect the service hosting spammers simultaneously:

Post a clear misuse policy and inform your users about it. For example, you can do during the registration process. This step will clearly explain what you consider spam activities.

In the registration form, you may consider to use CAPTCHA or similar verification tools to allow sending only human (web design) and to prevent automated scripts that generate a lot of sites in your hosting service. These methods are not completely foolproof, but they can help to avoid the presence of impostores.Prueba to monitor your free hosting service for other indicators of spam, such as funnels, a large number of ad units, certain keywords unwanted Large sections of JavaScript with escape characters, etc.

If you want a simple and cost effective solution, we recommend consultation with the site operator or Google Alerts. Keep track of users who have registered and try to identify typical patterns of spam, such as the time it takes to fill out a form, the number of requests sent from the same IP address range, the user-agents used during registration, user names or other values sent through selected during the registration form, etc.. It is also possible that these patterns are not always conclusive.

Check the server log files Web for sudden spikes in traffic, especially if it receives that traffic a site created recently. Also, try to identify the reasons for which consumes more bandwidth and power procesamiento.Prueba to monitor your web host free pages for infected with malicious software or phishing. For example, you can use Safe Browsing API Google URL to test your service regularly. You can also register to receive alerts to your autonomous system. Check the condition of the site. For example, if you use a Polish service free web hosting, what are the chances of creating thousands of new legitimate sites in Japanese on your service day to day? There are several tools that can help detect the language of the newly created sites.

Finally (but no less important), if you use a free web hosting service, be sure to monitor your services for sudden bursts of activity that may indicate an ongoing spam attack.

Post a comment or leave a trackback: Trackback URL.


  • hostinsight  On July 3, 2012 at 6:30 pm

    My advice.. if you want free hosting, the only free point of entry to the web I can suggest is getting a blog. Such as this one hosted with WordPress.. if you need something more going the free hosting route can just cause headaches. Slow response, downtown, little to no support. There are so many hosts that offer great hosting for very little. Saving a few bucks on web hosting really isn’t worth it.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: