OG Mollom

Provides some OG Permissions for Mollom. Initially this will allow certain roles of a group to bypass mollom, but may be expanded to include other permissions. This will also require a (yet-to-be-written) patch to OG.

Requires the patch in https://drupal.org/node/2284511#comment-8869267

Entry Gate

Cookie Setting

Block Search engine from indexing site and also unauthorized access while in development or in any condition you want to keep sites secure from others.

If you don't want to put your site in maintanance mode but want to prevent early access to your website during its development, then this module is very helpful for you.

Flag vote

Allow users with the appropriate permission to vote on a flag. When a specific number of votes is reached, some action is carried out. Some built in actions (e.g. unpublish entity). Also a hook that allows the action to be defined in another module..

Proof-of-Work CAPTCHA

Plugin for CAPTCHA module.

Proof-of-Work will be required to submit form. As a result in order for spammers or bots to submit a lot of spam, they need to spend a lot of CPU cycles which should become not worth it. On top of it most of the spamming software and bots simply can't run JS to do Proof-of-Work at all.


Simple IP acl

Tourists away. photo by Seth Werkheiser - Flickr

This module uses a few of variables in settings.php to configure environment dependent access list by origin IP.
Use it to limit access to sensitive URLs to only certain IPs (e.g., your office).

The module throws a very unsexy and un-meaningful error message which will be useless for unwanted visitors, but will allow developers and site owners to understand why they are getting it.

This module is perfect to quickly block the possibility of getting to your site's management area if your'e not in a specific place or using the right VPN connection.


Iron Curtain

Developed by Reload, sponsored by Scribo.

This module allows the site admins to restrict access to certain paths or the entire site, based on the visitor's IP address.

It allows users with a certain role to bypass the system, it allows a list of paths to bypass the system and it allows you to make a list of paths which can only be seen by whitelisted IPs, and another list which can not be accessed by blacklisted IPs.



Subscribe with RSS Subscribe to RSS - Spam Prevention