Still

‚ÄčIt appears le blog is still being subjected to random brute force attacks. If you notice long load times or get a "500 internal server" error message, it is because I’m being timed out by the server to prevent it from crashing.1 I’m not gone, just try again in a bit and it will be back. If you get updates via RSS, you shouldn’t notice any issues.

I keep getting grumpy notes from my ISP about my server CPU stats. It isn’t me specifically that is being targeted. I’m nothing special in the grand scheme of the big interwebs. However, WordPress has some weak areas that bots and hackers routinely try to take advantage of to proliferate s p @ m. They basically take advantage of inherent internet workings to overload a server with too many page requests.

Anyway, I’m having to step up my game a bit. I’ve turned on site-caching from the server instead of from within WP. This just means a visitor gets served a cached copy of my index page vs the server rendering a file from scratch every time someone visits. Loading a static file only consumes bandwidth vs compiling php files on each request. The cache file gets updated every time I create a new post.

Hopefully, this will cut way back on the server load. If the problem continues, I’ll most likely move my blog to WP servers. They do a lot of work on the back end to prevent this sort of nonsense. I mean it is their product so it makes sense. lol My ISP helps when I ask but they are smaller and leave most of the burden on me. I simply don’t have the resources to combat such things.

Time will tell.

  1. Nifty little protection mechanism I didn’t even know servers did that. lol []