Just a quick observation on splog registrations (that is, fake spam blog signups for MU Wordpress).
A few months ago, I put up a demo multi-user blog for a client.
It went live and, of course, was immediately hammered by fake spam blog signups.
Sorry, but if I compare this to my experience with other software, MU Wordpress stock provision really, really is embarrassingly abysmal.
Looking at the logs though, I can see that the filth is targeting all the old domains that existed in the demo site 6 months ago but that I deleted, e.g.
Referrer: http://example.com/wp-signup.php?new=example_blog
Referrer: http://example.com/wp-signup.php?new=example_blog_2
Referrer: http://example.com/wp-signup.php?new=example_blog_3
The They obviously grabbed a copy of them all, or DNS records of Wordpress installs, and saved them somewhere. They do not exist on my server.
I just flag it up in case it helps someone more intelligent than I work out how these guys work.
Could simple steps during the installation, such as forced renaming of wp-signup.php, and changing table names from wp_ during the installation process not help in such case?
It took me several days of cleaning out and experimenting before I could work out basic protection to stop them. Thank you for the open source product ... but I cannot believe the software is sent out as is.