Forum Moderators: phranque
Um, what "referer" are we talking about?
Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0)
an external referer would be more useful
Maybe they're getting tired?
That's what I meant. Aristotle was saying that if the referer stays the same, I can block it. But I'm not going to block my own document folder. Anyone can use that. From a defensive perspective, an external referer would be more useful.
But, uhm, how does your own personal computer get to be anyone's referer? That is, other than maybe yourself when testing.
Botnets are exploited for various purposes, including denial-of-service attacks, creation or misuse of SMTP mail relays for spam (see Spambot), click fraud, mining bitcoins, spamdexing, and the theft of application serial numbers, login IDs, and financial information such as credit card numbers.
How do you implement that?
BrowserMatch icky-UA-string-here keep_out
BrowserMatch nasty-UA-string-here keep_out
BrowserMatch foul-UA-string-here keep_out
Deny from env=keep_out
Deny from 1.2.3.4
Deny from 11.22.33
a DDoS attack against that site
Lucy wrote:
In the case of tiny sites like mine, possibly a DDoS attack on some other site using the same or neighboring server.
Don't these commands just go in .htaccess?
BrowserMatch ^-?$ keep_out
BrowserMatch Ahrefs keep_out
BrowserMatchNoCase "America Online Browser" keep_out
BrowserMatch Apache-HttpClient keep_out
...
BrowserMatch Firefox/[12]\b keep_out
RewriteCond %{HTTP_USER_AGENT} MSIE\ [56]\.\d [OR]
RewriteCond %{HTTP_USER_AGENT} Chrome/[1-8]\.\d [OR]
RewriteCond %{HTTP_USER_AGENT} Firefox/(3\.[0-5]|[567])
RewriteCond %{HTTP_COOKIE} !oldbrowser
RewriteCond %{HTTP_REFERER} !\?
RewriteCond %{REMOTE_ADDR} !^11\.22\.
RewriteRule (^|\.html|/)$ http://example.com/boilerplate/goaway.html [R=301,L]
"^Mozilla/5\.0 \(compatible; MSIE 6\.0; Windows NT 5\.0\)$"