Secure Apache: Out, Damned Bot!
The introduction of almost any technology is closely followed by attempts to figure out how to abuse it. As the technology matures, the methods of abuse become more and more sophisticated.
The Web is no different; almost as soon as people started publishing content, others began trying to figure out how to steal it. I'll call these people and their ilk 'perps.' As soon as pages became read/write instead of just read-only, perps began figuring out how to use them to publish their own content on other people's servers. (Examples include wikis and blog comments.)
Describing ways of dealing with such abuses is the end goal of this series of articles, but I'm going to cover some more basic issues first.