You’ve got developed a complete heap of applicable articles for your personal web page. You’ve some very good in-bound backlinks from superior page position sites and also your web site is absolutely optimized for each of the search phrases and key-phrases your clients are looking upon – fantastic.
But how is your cozmo price file carrying out?
This minor file could make the entire world of difference as to if or not your website can get the page rating it warrants.
Exactly what is the robots.txt file?
When look for engine crawlers (robots) look in a web-site, the primary file they can glance at just isn’t your index.html or index.php web site. It is your robots.txt file.
This minor file that sits from the root “/” of your web site has guidelines on what data files the robot can and can’t glance at inside the website.
Here’s an average robots.txt file instance (line figures are for illustration applications only):
Line 1: User-agent: *
Line two: Disallow: /cgi-bin/
Line four: Sitemap: /sitemap.xml.gz
Ok, just what exactly does the above mentioned example necessarily mean? Let us experience it line by line.
Line one: The “User-agent: *” implies that this segment relates to all robots.
Line two: The “Disallow: /cgi-bin/” signifies that you do not want any robots to index any documents during the “/cgi-bin/” directory or any of its sub folders.
Line three: Left blank intentionally for aesthetics.
Line four: The “Sitemap: /sitemap.xml.gz” tells the robotic that you have previously indexed the composition with the site for mydomain.com.
So, while you can see within the case in point over, the robots.txt file includes instructions for your robot regarding how to index your website.
Do I need just one?
No. You do not need a robots.txt file and many from the lookup engine robotic crawlers will only index your overall web page if you do not have one particular. Essentially, there isn’t a prerequisite for virtually any crawler to read your robots.txt file and in fact some malware robots that scan internet sites for security vulnerabilities, or e-mail addresses used by spammers will pay no awareness on the file or what is contained inside of.