Software, your way.
burger menu icon
WillMaster

WillMasterBlog > Content Protection

FREE! Coding tips, tricks, and treasures.

Possibilities weekly ezine

Get the weekly email website developers read:

 

Your email address

name@example.com
YES! Send Possibilities every week!

Rogue Robots and robots.txt

Most people who have had business websites for even a short time know that the robots.txt file contains statements to tell search engine robots which directories and/or pages not to access.

So-called legitimate search engine robots follow the directives in the robots.txt file.

Rogue robots might use the robots.txt file to determine where your secret pages are. Which must have tasty information, because you're trying to hide it (may be the thinking of rogue robot handlers).

So, what does a person do?

One solution is to list a directory in the robots.txt file. Legitimate robots will stay away. Expect rogue robots to enter.

In that directory, put an index.html file with any non-confidential content, or no content, so long as the file is there. That will prevent rogue robots from getting a directory listing.

Now, in that directory, you can create secret directories with names unlikely to be guessed. The secret directory names are seemingly random combinations of characters. The Password Generator could be used to come up with good/strong secret directory names.

This protection by obfuscation can be very effective protection from rogue robots and even from snooping humans.

Content can be put in those secret directories without fear they will be discovered by rogue robots or their handlers.

Will Bontrager

Was this blog post helpful to you?
(anonymous form)

Support This Website

Some of our support is from people like you who see the value of all that's offered for FREE at this website.

"Yes, let me contribute."

Amount (USD):

Tap to Choose
Contribution
Method


All information in WillMaster Blog articles is presented AS-IS.

We only suggest and recommend what we believe is of value. As remuneration for the time and research involved to provide quality links, we generally use affiliate links when we can. Whenever we link to something not our own, you should assume they are affiliate links or that we benefit in some way.

Recent Articles in the Library

Extracting Dates From the Unix Timestamp

The UNIX timestamp can be used to determine the represented time for any time zone on Earth.

Submit Form Data Without Bothering User

To silently and effectively submit a form on a web page, Ajax with FormData() can be used.

CSS Dots

CSS dots can be used for interactions between web page and website user.

Email Testing

One thing to test when email doesn't get sent or doesn't arrive is whether the server actuall sends email.

Tap to Select

Find out how to make a link or button to select the content in a div or other HTML element.

Capitalizing the First Letter of Words

Here, find both PHP code and JavaScript code to capitalize the first letter of a word.

Fixed-position Table Header

During a vertical scroll, the table header scrolls out of view -- unless the header is fixed in position.

How Can We Help You? balloons
How Can We Help You?
bullet Custom Programming
bullet Ready-Made Software
bullet Technical Support
bullet Possibilities Newsletter
bullet Website "How-To" Info
bullet Useful Information List

© 1998-2001 William and Mari Bontrager
© 2001-2011 Bontrager Connection, LLC
© 2011-2024 Will Bontrager Software LLC