New Bookstore! Save 20% on books with discount code: LAUNCH
Web Dev + WordPress + Security

Series Summary: Building the 3G Blacklist

[ 3G Stormtrooper ]

In the now-complete series, Building the 3G Blacklist, I share insights and discoveries concerning website security and protection against malicious attacks. Each article in the series focuses on unique blacklist strategies designed to protect sites transparently, effectively, and efficiently. The five articles culminate in the release of the next generation 3G Blacklist.

Here is a quick summary of the entire Building the 3G Blacklist series:

Building the 3G Blacklist, Part 1
Improving Site Security by Recognizing and Exploiting Server Attack Patterns: In this first article of the series, I examine the process of identifying attack patterns and trends and using them to immunize against future attacks.
Building the 3G Blacklist, Part 2
Improving Site Security by Preventing Malicious Query-String Exploits: In this second article, I present an incredibly powerful method for eliminating malicious query string attacks.
Building the 3G Blacklist, Part 3
Improving Site Security by Selectively Blocking Rogue User Agents: In this third article, I discuss targeted, user-agent blacklisting and present an alternate approach to preventing site access for the most prevalent and malicious user agents. Subsequent articles will focus on key blacklist strategies designed to protect your site transparently, effectively, and efficiently.
Building the 3G Blacklist, Part 4
Improving the RedirectMatch Directives of the Original 2G Blacklist: In this fourth article, I build upon the ideas and techniques presented previously in the series by improving the directives contained in the original, 2G Blacklist.
Building the 3G Blacklist, Part 5
Improving Site Security by Selectively Blocking Individual IPs: In this fifth and final article of the series, I provide the final key to our comprehensive blacklist strategy: selectively blocking individual IPs.
Perishable Press 3G Blacklist
The 3G Blacklist is an extremely effective security strategy for preventing a vast majority of common exploits. The list consists of four distinct parts, providing multiple layers of protection while synergizing into a comprehensive defense mechanism. Further, the 3G Blacklist is designed to be as lightweight and flexible as possible, thereby facilitating periodic cultivation and maintenance.

And of course, the following articles are also involved with the series:

I hope you find the information useful for improving the security of your website. As always, thanks for reading! :)

Jeff Starr
About the Author
Jeff Starr = Web Developer. Book Author. Secretly Important.
GA Pro: Add Google Analytics to WordPress like a pro.

4 responses to “Series Summary: Building the 3G Blacklist”

  1. Interesting series, thank you !

    I was just wondering how this would fit into your scheme of things :

  2. Jeff Starr
    Perishable 2008/05/25 2:52 pm

    Hi Peter, thanks for the feedback. That tutorial looks pretty sweet! I haven’t tried the entire method, but many similar directives are currently in effect here at Perishable Press, through either the 3G Blacklist or otherwise. Some great stuff! Thanks for sharing :)

  3. Alissa Miller 2008/05/30 9:51 am

    I recently encountered a conflict with one of the 3G rules and the WordPress plugin WP Super Cache. The particular 3G rule is the following rules:

    RedirectMatch 403 //

    I was able to figure out how to fix it, but the explanation is far too long for a comment. You can view it here:…/perishable-press-3g-blacklist-and-wp-super-cache/

  4. Jeff Starr
    Perishable 2008/05/31 1:46 pm

    Thanks for sharing this information with us, Alissa. Your article is excellent and provides an elegant and practical solution for resolving the Super-Cache/3G conflict. If anyone else is experiencing 403 errors while using the 3G Blacklist with the WordPress Super Cache plugin, read this post for a clean fix ;)

Comments are closed for this post. Something to add? Let me know.
Perishable Press is operated by Jeff Starr, a professional web developer and book author with two decades of experience. Here you will find posts about web development, WordPress, security, and more »
WP Themes In Depth: Build and sell awesome WordPress themes.
iCloud is like the Terminator. It will never stop trying to get your data. An endless fight on each Apple device to keep iCloud disabled and empty.
Take a screenshot with Firefox (no extension required). Open Developer Tools Settings and enable the “Take a screenshot” button. Then click the button :)
Take a screenshot with Chrome (no extension required). Open DevTools, type Cmd + Shift + P, then type screenshot.
After 10 years working on my 2010 iMac, my upgrade finally arrived. Shiny new iMac shipped from Ireland :)
Too much caffeine weirds me out. But I love the taste of coffee. So once in a while I enjoy a small cup of decaf. Hits the spot.
Chris Coyier is a truly awesome person. One of the finest people I've ever worked with. Just #gottasayit
Excel won't open CSV file because SYLK format? Open it with text editor and add an apostrophe ' at the beginning of the file, save changes, done.
Get news, updates, deals & tips via email.
Email kept private. Easy unsubscribe anytime.