Thumbnail gallery post

Last updated

A thumbnail gallery post (TGP) is a website that provides links to free Internet pornography. [1] TGP sites consist of categorized lists (more often tables) of small pictures (called "thumbnails") linked to full-size images or redirected to another website. Sites containing thumbs that lead to galleries with video content are called movie gallery posts (MGP). The main benefit of TGP/MGP is that the surfer can browse through the thumbnails to get an impression of the content provided by a gallery without actually visiting it, saving on broadband usage.

Contents

However, TGP sites are open to abuse, with the most abusive form being “circle jerk” TGP sites (CJ), that contain links that misdirect surfers to sites they did not wish to see.

Many TGP sites are free to users, but commonly are ad-driven. In affiliate marketing terms, TGPs are the affiliates that drive new traffic to the product producers, paysites. Paysites offer free hosted galleries (FHGs) in an effort to attract paying customers, and it is these FHGs, as well as chains of TGPs, that a TGP links to. [2]

Traffic trading and TGP scripts

TGPs employ a variety of schemes to trade traffic with other TGPs; signing up for these trades is usually easy and free for other TGP owners. Perhaps the most basic trade is to link to other TGP sites.

These trades are reciprocal: by looking at the referrer header of the HTTP requests, a TGP owner knows where their traffic comes from; a site that doesn't provide enough visitors will be excluded from further trades. Both of these traffic trade schemes are therefore susceptible to cheating: a trader can use so-called hitbots to create bogus traffic from his site to another, in order to get good traffic in return.

Scripts that automate the maintenance of a TGP, manage traffic trades and protect against hitbots are readily available. Some of these are even free, financed by an occasional redirecting of surfers to a site under the control of the script's programmer, or by advertisements directed at other webmasters on the gallery submission and traffic trade pages.

TGP2

The success of the TGP format forced some adult webmasters to rethink their role in promotion of commercial sites. Some webmasters believe that TGPs saturate the Internet with free pornography. A new format for organizing previews was tried. This format, named TGP2, limits the exposure of the surfer to free content in many ways. For example, no more than 12 thumbnails are allowed per page, of which only 5 can link to images (and not directly, but to pages with images and ads) and the rest must link to signup pages. Per the standard, TGP2 galleries only include softcore images and may not link to TGP sites. Most TGP sites do not allow TGP2 galleries to be listed. The concept received little approval among web surfers and high traffic levels were never achieved.

Fake TGPs

Some websites appear to be TGPs, yet all or most of the featured galleries belong to the same webmaster and promote a limited selection of commercial websites. Such fake TGPs often contain links to other fake TGP sites owned by the same group or individual. Paysite owners produce and host ready-made galleries known as free hosted galleries for use on these fake TGPs.

Many sponsors also provide webmasters with TGP templates which feature rotating galleries of the sponsor's sites. All a webmaster has to do is link the site using their referral code and surfers are provided with freshly updated content (often changing with each reload).

Circle jerk (CJ) TGP

These sites look like TGP sites but end up sending users on a 'circle jerk' of blind links. [2] When users click on a gallery link provided by a TGP, they will be unwillingly redirected to another TGP instead. Many legitimate TGPs do this to some extent, either by having some links redirect to other TGPs, or by having all links do so a certain percentage of the time. CJ TGPs almost never have any real content. The method of earnings for these sites are selling large volumes of traffic, non-adult sponsors (who sell virus protection, adware scanning, privacy protection, web history cleaning software) and adult sponsors.

Security concerns while browsing CJ sites

Many CJs attempt to trap the hapless viewer by resizing the browser window, opening new windows or installing spyware, adware or dialers (for instance by having the user download a trojan horse fake codec such as Trojan.Emcodec.E or exploiting browser bugs), changing the home page and adding bookmarks. It is therefore advisable to visit these sites only when Java, ActiveX and JavaScript as well as other scripting languages have been disabled in the browser and the system is fully patched. Users who are infected with potentially unwanted programs (PUPs) and other malicious software usually end up with a variety of issues, like modified host files, endless popup ads (originating from the user's own computer) browser redirects, etc.

Related Research Articles

<span class="mw-page-title-main">HTTP 404</span> Internet error message

In computer network communications, the HTTP 404, 404 not found, 404, 404 error, page not found, or file not found error message is a hypertext transfer protocol (HTTP) standard response code, to indicate that the browser was able to communicate with a given server, but the server could not find what was requested. The error may also be used when a server does not wish to disclose whether it has the requested information.

Spamdexing is the deliberate manipulation of search engine indexes. It involves a number of methods, such as link building and repeating unrelated phrases, to manipulate the relevance or prominence of resources indexed in a manner inconsistent with the purpose of the indexing system.

<span class="mw-page-title-main">Hyperlink</span> Method of referencing visual computer data

In computing, a hyperlink, or simply a link, is a digital reference to data that the user can follow or be guided to by clicking or tapping. A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks. The text that is linked from is known as anchor text. A software system that is used for viewing and creating hypertext is a hypertext system, and to create a hyperlink is to hyperlink. A user following hyperlinks is said to navigate or browse the hypertext.

Search engine optimization (SEO) is the process of improving the quality and quantity of website traffic to a website or a web page from search engines. SEO targets unpaid traffic rather than direct traffic or paid traffic. Unpaid traffic may originate from different kinds of searches, including image search, video search, academic search, news search, and industry-specific vertical search engines.

<span class="mw-page-title-main">Googlebot</span> Web crawler used by Google

Googlebot is the web crawler software used by Google that collects documents from the web to build a searchable index for the Google Search engine. Googlebot was created to function concurrently on thousands of machines in order to enhance its performance and adapt to the expanding size of the internet. This name is actually used to refer to two different types of web crawlers: a desktop crawler and a mobile crawler.

Inline linking is the use of a linked object, often an image, on one site by a web page belonging to a second site. One site is said to have an inline link to the other site where the object is located.

Pop-up ads or pop-ups are forms of online advertising on the World Wide Web. A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears in the foreground of the visual interface. The pop-up window containing an advertisement is usually generated by JavaScript that uses cross-site scripting (XSS), sometimes with a secondary payload that uses Adobe Flash. They can also be generated by other vulnerabilities/security holes in browser security.

Doorway pages are web pages that are created for the deliberate manipulation of search engine indexes (spamdexing). A doorway page will affect the index of a search engine by inserting results for particular phrases while sending visitors to a different page. Doorway pages that redirect visitors without their knowledge use some form of cloaking. This usually falls under Black Hat SEO.

URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address. When a web browser attempts to open a URL that has been redirected, a page with a different URL is opened. Similarly, domain redirection or domain forwarding is when all pages in a URL domain are redirected to a different domain, as when wikipedia.com and wikipedia.net are automatically redirected to wikipedia.org.

Affiliate marketing is a marketing arrangement in which affiliates receive a commission for each visit, signup or sale they generate for a merchant. This arrangement allows businesses to outsource part of the sales process. It is a form of performance-based marketing where the commission acts as an incentive for the affiliate; this commission is usually a percentage of the price of the product being sold, but can also be a flat rate per referral.

Google AdSense is a program run by Google through which website publishers in the Google Network of content sites serve text, images, video, or interactive media advertisements that are targeted to the site content and audience. These advertisements are administered, sorted, and maintained by Google. They can generate revenue on either a per-click or per-impression basis. Google beta-tested a cost-per-action service, but discontinued it in October 2008 in favor of a DoubleClick offering. In Q1 2014, Google earned US$3.4 billion, or 22% of total revenue, through Google AdSense. AdSense is a participant in the AdChoices program, so AdSense ads typically include the triangle-shaped AdChoices icon. This program also operates on HTTP cookies. In 2021, over 38.3 million websites use AdSense.

<span class="mw-page-title-main">AVG AntiVirus</span> Antivirus computer program

AVG AntiVirus is a line of antivirus software developed by AVG Technologies, a subsidiary of Avast, a part of Gen Digital. It is available for Windows, macOS and Android.

A paysite or pay site, in the adult entertainment industry, is a website that charges money to become a member and view its content, and often produces original adult content. They can be contrasted with "free-sites", which do not charge a membership fee. Most paysites offer "free tours" which allow non-members to view a limited number of short trailers. The vast majority of paysite memberships are bought by men. Some of the earliest paysites began by scanning images from pornographic magazines. The number of sites then grew until the market was saturated, and now many thousands of sites cater to every legal pornographic niche.

Christopher Boyd, also known by his online pseudonym Paperghost, is a computer security researcher.

A free hosted gallery (FHG) is a web page of sample content which is provided at no charge to affiliates of subscription websites (paysites). Affiliates promote these galleries to web surfers in order to drive web traffic to the paysite; every subscription sold generates a commission for the affiliate. The FHGs are usually hosted by the paysite and employ a simple URL-based system to distinguish between affiliates, so that commissions will be paid to the right party.

<span class="mw-page-title-main">HTTP referer</span> HTTP header field

In HTTP, "Referer" is an optional HTTP header field that identifies the address of the web page, from which the resource has been requested. By checking the referrer, the server providing the new web page can see where the request originated.

Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer. It is a form of scareware that manipulates users through fear, and a form of ransomware. Rogue security software has been a serious security threat in desktop computing since 2008. An early example that gained infamy was SpySheriff and its clones, such as Nava Shield.

A web widget is a web page or web application that is embedded as an element of a host web page but which is substantially independent of the host page, having limited or no interaction with the host. A web widget commonly provides users of the host page access to resources from another web site, content that the host page may be prevented from accessing itself by the browser's same-origin policy or the content provider's CORS policy. That content includes advertising, sponsored external links (Taboola), user comments (Disqus), social media buttons, news, and weather (AccuWeather). Some web widgets though serve as user-selectable customizations of the host page itself.

<span class="mw-page-title-main">HTTP 301</span> HTTP response status code

HTTP 301 is the HTTP response status code for 301 Moved Permanently. It is used for permanent redirecting, meaning that links or records returning this response should be updated. The new URL should be provided in the Location field, included with the response. The 301 redirect is considered a best practice for upgrading users from HTTP to HTTPS.

<span class="mw-page-title-main">Internet pornography</span> Any pornography that is accessible over the internet

Internet pornography is any pornography that is accessible over the internet; primarily via websites, FTP connections, peer-to-peer file sharing, or Usenet newsgroups. The greater accessibility of the World Wide Web from the late 1990s led to an incremental growth of internet pornography, the use of which among adolescents and adults has since become increasingly popular.

References

  1. "Tutorial about TGPs and galleries for adult webmasters, by Cozy Academy". Cozy Academy. Archived from the original on October 23, 2007. Retrieved 19 September 2006.
  2. 1 2 Blue, Violet (2013-09-18). "Chapter 7: Not Just for Geek Girls: Online Porn". The Smart Girl's Guide to Porn. Cleis Press. pp. 99–120. ISBN   9781573445078 . Retrieved 17 January 2014.

See also