[wp-hackers] SOS (Formerly 'Referrer Spam') [s]

John Ha [c] mailing-lists at netspace.net.au
Wed Oct 12 13:39:56 GMT 2005


Like I said earlier, try "Bad Behaviour". You might have missed the FAQ on
his site, so here's a quote from his FAQ page
(http://www.ioerror.us/software/bad-behavior/bad-behavior-faq/):
---
Will Bad Behavior reduce my site's bandwidth usage?
Absolutely! This is one of the reasons for Bad Behavior's existence. By
preventing spambots and other malicious bots from ever accessing any of your
pages, your bandwidth usage will drop significantly. How much depends on how
many malicious bots visit your site regularly. On higher traffic sites
paying a premium for bandwidth, this may well decrease your web hosting
bill.

---

This plugin requires no maintenance, which I like and it has worked for me
so far.

John Ha.

----- Original Message ----- 

From: "Roy Schestowitz" <r at schestowitz.com>
To: <wp-hackers at lists.automattic.com>
Sent: Wednesday, October 12, 2005 9:57 PM
Subject: Re: [wp-hackers] SOS (Formerly 'Referrer Spam')


> _____/ On Wed 12 Oct 2005 10:43:01 BST, [Amit Gupta] wrote : \_____
>
> > Roy Schestowitz <r at schestowitz.com> wrote:
> > |  Not my host *frown*. Consider yourself to be fortunate if you are
> > allowed
> > |  SSH/Telnet access. The best I can ever do when wishing to invoke
> > commands is
> > |  use
> > |  tricks <
> > |
> > http://schestowitz.com/Weblog/archives/2005/09/12/cpanel-terminal-hack/
> > |  >
> >
> > my host doesn't provide it either, but I know some hosts that do on
> > special request, & I've been considering them for sometime now, not for
> > SSH access ofcourse as its all greek to me!! ;)
>
> Getting back on topic, the scale of the attacks is beginning to become
scary,
> not just worrying. As I said at the start, it continues to grow by the day
> (nearing 2 weeks now) and it's reaching the point where I get tens of
> thousands
> of page requests from a variety of UIP's. This still gets worse by the
> hour and
> I am running out of bandwidth (although I re-directed to reduce it), not
to
> mention the speed penalty that the shared server is susceptible to.
>
> These attacks can wind up costing hundreds of pounds, not to mention
> the time I
> spend/t trying to stop them. I have no root access to the Web server. Any
> suggestions? I would rather not tell the hosts and ignite some sort of
> reputation of a trouble-maker.
>
> Cheers,
>
> Roy
>
> -- 
> Roy S. Schestowitz      | "I think I think, therefore I think I am"
> http://Schestowitz.com  |    SuSE Linux    |     PGP-Key: 74572E8E
> 12:45pm  up 48 days  0:59,  3 users,  load average: 0.29, 0.51, 0.52
>       http://iuron.com - next generation of search paradigms
>
> _______________________________________________
> wp-hackers mailing list
> wp-hackers at lists.automattic.com
> http://lists.automattic.com/mailman/listinfo/wp-hackers
>



-- 
------------------------ [ SECURITY NOTICE ]
------------------------
To: wp-hackers at lists.automattic.com.
For your security, mailing-lists at netspace.net.au
digitally signed this message on 12 October 2005 at 13:41:09 UTC.
Verify this digital signature at http://www.ciphire.com/verify.
------------------- [ CIPHIRE DIGITAL SIGNATURE ]
-------------------
Q2lwaGlyZSBTaWcuAjh3cC1oYWNrZXJzQGxpc3RzLmF1dG9tYXR0aWMuY29tAG1haWxpb
mctbGlzdHNAbmV0c3BhY2UubmV0LmF1AGVtYWlsIGJvZHkAywgAAHwAfAAAAAEAAAB1Ek
1DywgAAGcCAAIAAgACACAe5TcBbmIU6owNe1xZd/iId1LWxoic0s8JYnXeBrMqZgEAoH7
uzw9IZPyJ563ZYHUtH1HUo9KSbjEaKJV3swG1UnphrNXzXBEZ/l9NgY9XA2Q1nroRrUgh
VJtM7Gu/7kqxa64Ux45MU2lnRW5k
--------------------- [ END DIGITAL SIGNATURE ]
---------------------



More information about the wp-hackers mailing list