Summary
In this chapter you learned about types of Internet bots: What their purpose is and how to protect your instance of Moodle against them. We outlined search engine support embedded into Moodle and what level of exposure you can enable or disable according to your specific needs. We outlined all weak points within the Moodle that can be used for generating and propagating spam content. We also demonstrated tools and techniques for detecting and cleaning spam generated inside the platform and the notification system designed to inform us if anybody is probing the system for detecting passwords. Our next stop is user files security within Moodle.