The Robots txt.org site provides explanation on using the The Robots Exclusion Protocol.
Note that malware or email harvesting bots will ignore the directives of the robots.txt file.
Link provided by BruceM on User2 list 6/30/2009 10:34 PM
The following provide additional security measures:
Controlling Site Access
- Permissions Explained
- Database User
- Move your configuration files
- Move your backup files
- Move your gedcom files
- Overlaid Subroot how to recover from subroot.php overlay
- Prevent Directory Listing
- Protecting access log