O'Reilly logo

Moodle Security by Darko Miletić

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter you learned about types of Internet bots: What their purpose is and how to protect your instance of Moodle against them. We outlined search engine support embedded into Moodle and what level of exposure you can enable or disable according to your specific needs. We outlined all weak points within the Moodle that can be used for generating and propagating spam content. We also demonstrated tools and techniques for detecting and cleaning spam generated inside the platform and the notification system designed to inform us if anybody is probing the system for detecting passwords. Our next stop is user files security within Moodle.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required