Perm-Ban People Hacking Case Study

Decent Essays
Explain some cases in which you would perm-ban/temp-ban people Hacking: as a helper I would record it and post on Fourms and if it hits 5+ or more then a mod+ will come on server and /ban [players name] [hacking]

Spaming: if someone is spaming chat as a helper I will /warn [players name] [spam] if continued /tempmute [players name] [5min] [spam] if still continued /mute [players name] [continued spam]

Advertising: /clearchat if continued /mute [players name] [advertising] then screen shot his/her name plus him/her advertising and send to a mod+ and they would get on /ipban [players name] [advertising]

Staff dis: is someone was dissrespecting staff as helper I would /warn [players name] [Staff dis] if continued /tempmute [players name] [5min]

Related Documents

  • Decent Essays

    IGN (InGame Name): PolloWangs (IRL Name : Matt) Date of application: Wednesday, August 10, 2016 Age: 16 turning 17 soon. Country: USA Time zone: Eastern EST InGame ranks (Mine rank and Donation Rank,only if you have one): Sadly I am not a donor but Ive spent a lot of time on the Prison Server and I'm rank Meow :) 1. Why do you want to be staff?…

    • 527 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Answer these questions based on the rules What would you do if someone threatened to DDoS/DoS the server: I would mute or either ban them. Threatening to DDos is a bannable or mutable offence! What would you do if you caught someone x-raying and they admitted it: I would give them a reduced ban for admitting and giving me less time to SS!…

    • 637 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 5 Assignment

    • 526 Words
    • 3 Pages

    2. Describe how you think you could make a difference on CycloneNetwork as a helper - At times, noticing hackers isn't the easiest thing, but some are very easy. but looking into the possible hacks on Minecraft is possible. Also I believe i could make a difference to cyclone by keeping the chat clean from un-necessary comments/language. At times i see people doing things which are against Cyclone rules, and there is no one there to enforce them.…

    • 526 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Gmt201 Unit 3 Assignment

    • 845 Words
    • 4 Pages

    I wish to become staff so I can improve the server and make it greater for players and staff. I'd like to see the serer at it's peak, so I'll try everyday as hard as I can to improve it for the better. Rule-breakers are a great crisis for every community in Minecraft. They destroy the fun for players who actually like to play. I plan to eliminate them swiftly so they can cause no harm to threaten this community; in any way at all.…

    • 845 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    (User) 48h Hacks Staff will discuss the evidence (video) and if the user is hacking they will be perm banned./ban (user) Hacks Spamming: These are the commands you would do if someone is spamming /warn (user) spam Then if they continue you would do /tempmute (user)…

    • 270 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Graded Memo Fall Semester 2014, Number: 5632 Date: November 24, 2014 Re: Harald’s claim of vicarious infringement against Danktank, Inc. I. Introduction On January 8, 2014, a user named HackManZAZ posted pictures of Erik Harald smoking marijuana to a message board on danktank.com, a website that advocates for the legalization of recreational marijuana. Harald took those pictures and uploaded them to the “cloud”. He believes a hacker stole the photos and uploaded them to danktank.com.…

    • 3065 Words
    • 13 Pages
    Improved Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    In the article “The undercover Parent” (2008) written by Coben Harlan. He states that putting spy gear on the computers is okay. I disagree with coben. In Cobens article he says “Some will say that it is better just to use parental blocks that deny access to risky sites.”…

    • 170 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Moderator Rank

    • 531 Words
    • 3 Pages

    Explain some cases in which you would perm-ban/temp-ban people. -HACKING As a Helper: Take a video and send to a moderator immediately As a Moderator: Record. /tempban {IGN} 48Hr (Until get 5 +1's from a…

    • 531 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Hacking can lead to theft of important information which can be sold to other competitors. References: globalriskinsights.com 2. Viruses Viruses and worms spread across computers and networks by making copies of themselves, usually without the knowledge of the computer user. Risks can also come from popular social networking sites.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Ap English Research Paper

    • 591 Words
    • 3 Pages

    IGN: LaurinPlaysX Previous IGN (If applicable): TheLinkHD Real life name: Laurin Age (13+): 13 and 10 months Birthday: 3rd December Timezone: Germany, Berlin What time are you most often on? (your time): I am mostly online on Monday: 13.45-20.30 Tuesday: 13.30-20.30 Wednesday: 13.30-20.30 Thursday: 13.30-20.30 Friday: 13.30-23 Saturday: 11-23 Sunday: 11-20.30 I can contribute about 75% of the time I am online. Do you speak any foreign language? (If yes, specify): I am able to speak english and german, german as my mother language…

    • 591 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Unfortunately, I have not that experienced with screen sharing and the procedures that you should follow but I am watching the staff series of @MadG and @ProCombo to get an idea of how things run around here. I remember that I need to record any bans that I distribute in case I am accused of false banning. Another beneficial thing upon my addition to the Viper team is that I have a judicial temperament when I am representing the position of a job. This means that I am able to deal with people calmly and that I am always willing to hear and consider the views of all sides of a case. In a majority of player reports that I have witnessed throughout my time playing Minecraft in general, staff usually only look at one side of the problem.…

    • 768 Words
    • 4 Pages
    Improved Essays