Blog

  • What is the llms.txt file?

    An llms.txt file is a plain-text instruction file placed at the root of a website that provides structured guidance to Large Language Models about how your content should be interpreted, prioritized, and referenced.

    In simple terms:

    llms.txt is for AI models what robots.txt is for search engines — but focused on understanding, context, and trust rather than crawling permissions.

    While robots.txt controls whether bots can crawl pages, llms.txt helps LLMs understand what your site is about and which content matters most.


    Why llms.txt Exists (And Why Robots.txt Isn’t Enough)

    Search engines like Google use crawlers, indexes, and ranking algorithms. LLMs work differently:

    • They ingest and synthesize information
    • They generate answers instead of lists of links
    • They rely heavily on context, authority, and clarity

    Problems LLMs face without guidance:

    • Ambiguous brand names
    • Multiple similar service pages
    • Outdated or archived content
    • Weak attribution signals
    • Conflicting explanations across pages

    The llms.txt file exists to reduce ambiguity and help AI systems:

    • Identify authoritative pages
    • Understand primary topics
    • Reference preferred explanations
    • Avoid deprecated or low-value content

    What Problem Does llms.txt Solve?

    1. AI Answer Visibility (GEO)

    LLMs often summarize information instead of linking directly. If your site isn’t clearly understood, it won’t be cited or paraphrased.

    2. Content Hierarchy Clarity

    AI models don’t automatically know which page is your cornerstone content.

    3. Brand & Expertise Recognition

    Without guidance, AI may fragment your authority across unrelated pages.

    4. Reduced Hallucination Risk

    Clear instructions reduce misinterpretation of your services, products, or data.


    How llms.txt Works

    The llms.txt file is publicly accessible and placed here:

    https://example.com/llms.txt
    

    It typically includes:

    • Site purpose
    • Core topics
    • Priority URLs
    • Authoritative explanations
    • Content to ignore or de-prioritize
    • Preferred citation sources

    LLMs that choose to respect this convention can use it to:

    • Improve content understanding
    • Select canonical explanations
    • Attribute answers more accurately

    llms.txt vs robots.txt vs sitemap.xml

    FilePurposeAudience
    robots.txtCrawl permissionsSearch engine bots
    sitemap.xmlURL discoverySearch engines
    llms.txtContent understandingLLMs & AI systems

    They complement each other, not replace one another.


    Example of an llms.txt File

    Here’s a simplified example:

    # llms.txt – AI content guidance
    
    Site-Name: Example Digital Agency
    Primary-Topics: SEO, Google Ads, Analytics, AI Search Optimization
    
    Preferred-Pages:
    https://example.com/seo-services/
    https://example.com/google-ads-management/
    https://example.com/ai-search-optimization/
    
    Authoritative-Content:
    https://example.com/blog/what-is-llms-txt/
    
    Deprioritize:
    https://example.com/tag/
    https://example.com/old-blog-posts/
    
    Content-Notes:
    - This site provides professional digital marketing services
    - All pricing pages reflect current offers
    

    This tells AI systems where truth and authority live on your website.


    Is llms.txt an Official Standard?

    At the time of writing:

    • ❌ It is not an official W3C or Google standard
    • ✅ It is an emerging best practice in GEO (Generative Engine Optimization)
    • ✅ Actively discussed among SEO & AI researchers
    • ✅ Increasingly adopted by AI-forward publishers

    Much like schema markup in its early days, adoption often comes before official endorsement.


    Does Google Use llms.txt?

    Currently:

    • Google has not officially confirmed support for llms.txt
    • However:
      • Google does use LLMs internally
      • Google encourages structured clarity, authority, and canonicalization
      • llms.txt aligns with these principles

    Even if Google doesn’t read llms.txt directly today, LLMs used by other platforms do, and future AI-driven search engines are likely to rely on similar signals.


    How llms.txt Helps You Rank in AI Search

    LLMs don’t rank pages — they rank understanding.

    llms.txt improves:

    • Topical authority signals
    • Semantic consistency
    • Source reliability
    • Content prioritization

    This increases your chances of:

    • Being quoted in AI answers
    • Being paraphrased as a source
    • Being recommended as an authority
    • Appearing in “AI Overview”-style results

    Best Practices for Creating an llms.txt File

    1. Keep It Human-Readable

    LLMs are trained on natural language. Write clearly.

    2. Point to Cornerstone Content

    Choose one best page per topic.

    3. Avoid Marketing Hype

    Stick to factual, descriptive language.

    4. Update Regularly

    Outdated guidance is worse than none.

    5. Align With Schema & Internal Links

    llms.txt works best alongside:

    • Schema.org markup
    • Clean site structure
    • Clear internal linking

    Common Mistakes to Avoid

    ❌ Stuffing keywords
    ❌ Listing every URL
    ❌ Using vague descriptions
    ❌ Contradicting schema markup
    ❌ Treating it like robots.txt rules

    llms.txt is guidance, not enforcement.


    Should Every Website Use llms.txt?

    Highly recommended for:

    • Blogs & publishers
    • SaaS companies
    • Agencies & consultants
    • E-commerce brands
    • Educational websites

    Less critical (but still useful) for:

    • Small brochure sites
    • Temporary campaign pages

    If your content should be understood, cited, or summarized by AI, llms.txt is worth implementing.


    llms.txt and the Future of SEO

    Search is evolving from:

    “10 blue links”
    to
    “1 synthesized answer”

    That means:

    • Authority > backlinks
    • Clarity > keyword density
    • Structure > volume

    llms.txt is an early tool for this new era.

    Just like:

    • robots.txt shaped crawling
    • schema shaped rich results

    llms.txt will shape AI understanding.


    Final Thoughts: Is llms.txt Worth It?

    Yes — because it costs almost nothing and aligns perfectly with where search is going.

    If you care about:

    • AI visibility
    • Brand authority
    • Being the source, not just a link

    Then implementing an llms.txt file is a strategic SEO & GEO advantage.

  • Authorize.net API Integration: Creating vendor folder

    Here are the steps to follow if you’re trying to create the vendor folder on Ubuntu for your authorize.net API integration project:

    1. Create a new folder where you want the authnet files to be stored. Open the Terminal and open the new folder. Install the latest Composer, if you don’t have it already.

    Follow the instructions from: https://getcomposer.org/download/ (see below or access the url provided)

    Run the following in your terminal to get the latest Composer version:

    step 1:
    php -r “copy(‘https://getcomposer.org/installer’, ‘composer-setup.php’);”

    step 2:
    php -r “if (hash_file(‘SHA384’, ‘composer-setup.php’) === ‘‼️ENTER KEY HERE‼️’) { echo ‘Installer verified’; } else { echo ‘Installer corrupt’; unlink(‘composer-setup.php’); } echo PHP_EOL;”

    step 3:
    php composer-setup.php

    step 4:
    php -r “unlink(‘composer-setup.php’);”

    2. Create a new file composer.json in the new folder you created. Inside the json file, write the following, then save:

    {
    “require”: {
    “php”: “>=5.6”,
    “authorizenet/authorizenet”: “~1.9”
    }
    }

    3. In Terminal run command: composer update

    4. If all goes well, then you’re good. If you get the cUrl or simplexml errors, then do the following before running “composer update” again:

    for cUrl: in the Terminal, run the following command
    sudo apt-get install php7.0-curl

    for simplexml: in the Terminal, run the following command
    sudo apt-get install php7.0-simplexml

    After installing the 2 options, run: php composer.phar install

    You will be asked to provide a Token. For that,

    – signup or signin to Github.
    – go to Developer settings -> Personal Access Token -> Generate new token (I checked all options)
    – copy new Token and paste it in the Terminal

    It should work now. If you have any questions, I recommend looking them up online — there are plenty of knowledgeable people who can help.

  • “Think Before You Tap”

    “Bad guys are increasingly targeting you through your smartphone. They send texts that trick you into doing something against your own best interests. At the moment, there is a mystery shopping scam going on, starting out with a text invitation, asking you to send an email for more info which then gets you roped into the scam.

    Always, when you get a text, remember to “Think Before You Tap”, because more and more, texts are being used for identity theft, bank account take-overs and to pressure you into giving out personal or company confidential information. Here is a short video made by USA Today that shows how this works: https://www.youtube.com/watch?v=ffck9C4vqEM

    Obviously, an end-user who was trained to spot social engineering red flags would think twice before falling for these scams. The link goes to a complimentary job aid that you can print out and pin to your wall. You’re welcome to distribute this PDF to as many people as you can.
    https://cdn2.hubspot.net/hubfs/241394/Knowbe4-May2015-PDF/SocialEngineeringRedFlags.pdf

  • DocuSign Phishing Attack

    Hackers have stolen the customer email database of DocuSign, the company that allows companies to electronically sign documents. These criminals are now sending phishing emails that look exactly like the real DocuSign ones, but they try to trick you into opening an attached Word file and click to enable editing.

    But if you do that, malware may be installed on your workstation. So if you get emails that look like they come from DocuSign and have an attachment, be very careful. If there is any doubt, pick up the phone and verify before you electronically sign any DocuSign email. Remember: Think Before You Click.

  • Largest Single Cyberattack In History!

    ALERT: WannaCry ransomware hits 150 countries with over 200,000 victims in only 3 days. The attack crawls for open vulnerabilities in Windows OS. Typically, ransomware like most Phishing attacks use a blended approach of email and web as attack vectors.

    Please be sure to: (a) update your Windows OS right away, (b) make sure you have and are using current versions of both email and web security systems, and (c) archive your emails and files to ensure back up and recovery.

  • New Phishing Scam: Missed Voicemail

    Criminal hackers are constantly trying to trick people into clicking on links or open attachments they did not ask for. Their new “scam of the week” is to send you an email that looks like it comes from WhatsApp and claims it is a voice mail left for you. It’s not.

    Do not click on the “Play” button. If you do, your computer will get infected with malware which can cause your identity to get stolen, or all your (or the organization’s) files held for ransom.

    Here is a general safety rule: Instead of clicking a link in an unverified email claiming it’s from WhatsApp (or any other social media) log in to your WhatsApp account the standard way instead and check for any messages there. Remember: “When in doubt, throw it out!”

  • Airline Phishing Attack

    “There is a new spin on an existing phishing scam you need to be aware of. Bad guys are doing research on you personally using social media and find out where and when you (might) travel for business. Next, they craft an email especially for you with an airline reservation or receipt that looks just like the real thing, sent with a spoofed “From” email address that also looks legit.

    “Sometimes, they even have links in this email that go to a website that looks identical to the real airline, but it is fake. They try to do two things: 1) try to steal your company username and password, and 2) try to trick you into opening the attachment which could be a PDF or DOCX. If you click on the link or open the attachment, your workstation will possibly get infected with malware that allows the bad guys to hack into our network.

    Remember, if you want to check any airline reservations or flight status, open your browser and type the website name in the address bar or use a bookmark that you yourself set earlier. Do not click on links in emails to go to websites. And as always…. Think before You Click!”

  • KnowBe4: USB Sticks Could Infect Your Network With New Spora Ransomware Worm

    • Infection vector is email attachment with HTA file
    • Spora exhibits worm-like behavior using .LNK files
    • Anyone bringing a USB stick to the office is now a possible ransomware infection vector.

    Read the entire article at KnowBe4

  • SEO Trends in 2017

    Hot to keep up with search engines, especially with Google seems to have been the most important question for a while now in SEO world. World of search is changing every year and, as SEO, you must always keep up with the latest updates and algorhythm changes.

    Position zero

    For some of you, “position zero” has become a main target for those of you keen to improve the brand awareness. Not only you will have to keep optimizing your website indexing or content, but you will also have to markup your content so that search engines better understand the context.

    Instant answers, cards and Knowledge Panel has become part of search experience as Google will provide more and more answers to the query without being forced to click on a website anymore. This thing can help some websites, while others may lose important SEO traffic.

    Search intent

    Search intent has also become a very important factor for search engines as they better and better understand the behavior behind each search experience. Reason for which, Google doesn’t show volume number for plenty of general queries so that advertisers don’t spend too much on them. Yes, conversion rate that follows each search experience has become more important than ever for search engines.

    Search intent will also improve searchers experience as – say – looking for “music apps” may represent a special thing for a user and something else for another one. One may look for reviews or a full list of music apps, while others may look for the company that produces it, app experience or to buy one.

    Voice search

    Very few people type the way they speak, especially when it comes to search queries. When you type, you adopt a sort of stilted shorthand, so you enter something like “weather London” into your search bar. When you speak, you’re more likely to ask the complete question, “What’s the weather like in London?” This pattern holds true with voice search queries as well. Learn more about voice search here.

    Use Schema Markup

    Help search engines understand the context of your content. This means that you may rank better in normal searches, and you’ll be more relevant in specific queries made through voice search. Use as many schema markup elements as possible and you will dominate the search.

  • Hackers Use Ransomware To Extort Money From U.S. Businesses

    A new article published today by KrebsonSecurity about the hacking of the San Francisco rail system re-confirms that foreign hackers use ransomware to extort money from U.S. businesses. The hacker in the Krebs article has been extorting money from different companies in the amounts of tens or hundred of thousands of dollars. Read the entire article on KrebsonSecurity.com

    Sometimes we may think that, my company is not big enough to catch a hacker’s interest. Wrong. No company is too small or too big for a hacker to extort money from. As the hacking impact may be different for each company, it is interfering with the business operations. It is important that additional security measures are taken to accessing company database and files. Additionally, if you received a ransom request after an attacked, report it immediately to the FBI. Each reporting can be used to identifying the bad guys.

We use cookies to improve your experience. Choose what you want to allow.

Cookie Settings

⚙️