What To Do If Someone Is Stealing Your Content

Stealing of content can be called copying and posting your materials on other sites, without placing a link to the source.

If to put aside ethical considerations and look only from the point of view of SEO, how does it harm?

What To Do If Someone Is Stealing Your Content

1) Firstly, the evil copy-paste will take the credit, and, if the article is especially interesting, your potential visitors. Visitors are traffic, and traffic is money. There is no explanation needed.

2) Secondly, the search engine can take a copy of the article for the original, and your source for the duplicate. Thus, your “unique” article will be no better than copy-paste.

3) If the stealing assumes enormous proportions, PS may consider that your site consists of a little less than completely copy-paste, and they will not trust such a site (and as a result rank it high).

Having figured out what the consequences may be, if you allow it to steal with impunity, we will move on to how to deal with stealing.

1) If the project is serious, and money is invested in promotion, you should not worry much. The project will pick up a so-called trust, PS will trust it, and easily copy-paste on the left sites from yours.

But if you do not intend to invest in the project, or is it just your cozy blog, from which they are spoiling interesting articles, then read on.

2) Having discovered copy-paste, the first thing you should do is contact the domain owner (see e-mail in whois).

A fairly effective way if stolen articles are measured in units. But if stealing acquires indiscriminate character, this method becomes too tiresome, so we read further.

3) Before you name the next method, you need to understand how content is usually stolen. In most cases, automatic grabbing by scripts occurs. Manual stealing is much smaller. Disabling the right mouse click, as many do, is not only inefficient, but also creates inconvenience to your real visitors. Whoever needs it will steal, and you will not stop him with any mouse manipulations.

It is not so effective to attach direct links to yourself in the text either because grabbers easily cut these links.

Instead, you can attach small inserts into the text.

Or something like that that clearly indicates your rights with respect to the content. Since now proving your authorship will not be a problem – the list of copy-paste sites can safely be turned over to the Plato.

You can also frame inserts with a tag with the display: none style.

This is done so as not to distract your real visitors. And so that the real thief did not immediately find out that he was caught in the act.

4) You can also attach the following construction into the text itself:

<? php

echo “$ REMOTE_ADDR”;


This displays the visitor’s IP. Grabber will of course steal text with his IP. Now that you find the texts stolen from you, you can find out the IP from where they are robbed. And then you arrange hellish cloaking on it: you can give doorway or porn instead of normal texts. Well, or just give him 404 page. It all depends on your imagination.

5) It is worth remembering that a grabber is not an artificial intelligence that can easily recognize where the content is. Therefore, it makes sense to confuse him a little. To do this, you need to frame the text with a pair of different tags: div’s,, close/open new divs inside the text. Moreover, this must be done randomly, and not according to a specific scheme.

Thus, the grabber will not be able to correctly cling to the beginning of the text, and there is a great risk that instead of the true content, it will pull something of no that important. Well, or will steal not complete text, which is also quite good.

Of the downsides: with such actions you can confuse not only grabber bots, but also search engine bots. Of course, PS bots are much smarter, but giving them a huge mess of tags is not worth it.

6) You can also limit the number of page views for a certain time. For example, no more than 5 pages in 30 seconds. If you look more, this is already downloading.

To cut it short, it is hemorrhoid for both, oneself and users. And the effectiveness is remains in question.

Of course, there are still ways to protect yourself, but it is unnecessary to provide examples. It is impossible to fully protect the content because who needs it, will steal it anyway. In the end, through brutal retyping from the monitor to word.

Using absolutely all methods is not worth it. The third and fifth methods are used the most, both in terms of ease of use and effect.