Loading...
 
Skip to main content

View Articles

List Articles

IA : des crawlers « affamés » qui saturent vos serveurs et rendent vos sites lents ou inaccessibles

Bernard Sfez - 2025-10-28 17:14

Dans la course effrénée à la capture de données que se livrent les modèles d’IA, des armées de robots ratissent le Web sans relâche, souvent sans respecter les règles comme les fichiers robots.txt et autres. Bande passante siphonnée, serveurs sous pression, pages ralenties voire inaccessibles, une consommation anormale et extrême qui se fait au détriment des éditeurs, des entreprises et des utilisateurs. De plus en plus de voix, comme le souligne The Register, dénoncent des bots qui ne renvoient aucun trafic mais génèrent des coûts d’infrastructure et laissent des équipes débordées.

Chez OpenSource Solutions, nous privilégions une approche claire et mesurable. Nous analysons en continu les logs de trafic pour détecter surconsommations, nous croisons les signaux de plusieurs serveurs afin de distinguer les bons crawlers (moteurs de recherche) des scrapers d’IA agressifs. Enfin, nous mettons en place des mesures proactives (quotas, rate limiting, allowlists IP, pièges à bots, voir GEOip filtering) pour protéger les performances des sites sans empêcher l’indexation essentielle au référencement. Faisons donc le point.

Installing Tiki 29 from Git requires more memory, here how to fix on Debian-Ubuntu

Bernard Sfez - 2025-10-09 12:44

If you’ve tried installing Tiki 29 from GitLab or running setup.sh or npm run build, you might notice something new — your server runs out of memory halfway through. What used to work fine with 2 GB RAM now fails unless you have at least 4 GB or more on your Debian/Ubuntu server.

In this short OpenSource Solutions guide, we’ll look at why this happens and how to fix it quickly, either by adding swap memory or upgrading your server’s RAM, so you can complete your Tiki 29 VCS installation smoothly.

The wiki syntax in Tiki

Bernard Sfez - 2025-10-08 09:13

My name is Bernard Sfez and I’m a Tiki specialist.
Today in this first tutorial I will explain how to use the Wiki syntax in Tiki.

  • What is the Wiki syntax
  • How to use it, inline or with the help of the toolbar buttons
  • Where to find the online help available once in the edit mode
  • An overview of the advanced usages of the Wiki syntax
  • The Editing and Plugin control panel parameters and options
  • Finally we’ll create together a wiki page using what we’ve just learned


Some other interesting links

Tiki Wiki Doc: https://doc.tiki.org/Wiki-Syntax
Tiki Wiki: https://tiki.org/Why-Wiki-Syntax-Is-Important
Interesting comparison with WYSIWYG: http://wysiwygproblems.com

Tiki Wiki installation on Linux 2024 (Debian 12)

Bernard Sfez - 2024-04-17 09:45

Through this comprehensive guide learn how to setup your Debian 12 server and everything needed to install and maintain multiple Tiki Wiki websites or applications. This concise tutorial covers the entire process, from upgrading your Debian Linux operating system to publish your TikiWiki website. This step-by-step walkthrough will cover MariaDB, installing different PHP versions, installing Webmin and Virtuamin control panel, setup and use Git, set an SSL certificat and finally publish your Tiki Wiki website online.

Understanding DoS and DDoS Attacks: Their Impact, Trends, and Mitigation Strategies

Bernard Sfez - 2024-02-06 10:00

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are among the most disruptive cybersecurity threats faced by businesses and governments alike. These attacks involve overwhelming a system with excessive traffic to render it inaccessible, thereby causing significant service disruptions. While DoS attacks are typically launched from a single source, DDoS attacks leverage a multitude of sources, making them much more difficult to mitigate.

Recent trends indicate a surge in such attacks, with a notable example being the 2023 HTTP/2 protocol exploit that saw major tech giants like Google and Amazon fend off record-breaking levels of traffic.

This article explores these threats and outlines key strategies for mitigating risks, such as the use of DDoS protection services, network security protocols, secure authentication methods, proactive monitoring, and more. By implementing these strategies, businesses can significantly reduce their vulnerability to such attacks and safeguard critical infrastructure.