In this chapter you learned about types of Internet bots: What their purpose is and how to protect your instance of Moodle against them. We outlined search engine support embedded into Moodle and what level of exposure you can enable or disable according to your specific needs. We outlined all weak points within the Moodle that can be used for generating and propagating spam content. We also demonstrated tools and techniques for detecting and cleaning spam generated inside the platform and the notification system designed to inform us if anybody is probing the system for detecting passwords. Our next stop is user files security within Moodle.
Moodle Security
Moodle Security
Overview of this book
Table of Contents (17 chapters)
Moodle Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Delving into the World of Security
Securing Your Server Linux
Securing Your Server—Windows
Authentication
Roles and Permissions
Protection Against Bots
Securing User Files
Securing Moodle Data
Monitoring User Activity
Backup
Authentication Plugins
Customer Reviews