Book Image

Moodle Security

Book Image

Moodle Security

Overview of this book

Table of Contents (17 chapters)
Moodle Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface

Protecting Moodle from unwanted search bots


Every access to our Moodle website generates traffic, from requesting computer to the server and the other way around. Web server consumes CPU, memory, and other machine resources to generate and deliver desired content to the user. As with anything else in our physical world, all resources are finite and usage of those resources generates cost. We want to employ our platform's resources only to the desirable, legal requests. Since there is no functional difference between page requests made by some automated software and live users, we need to know that giving free access to anybody will implicate higher maintenance costs, open a potential security hole, and most likely incur a performance hit and reduce the availability of the website. This means that we must be aware of the kind of requests that can be made by legal or illegal bots on our Moodle platform.

Every access to our Moodle website generates traffic, from requesting computer to the server...