Explain Some Cases In Which You Would Perm-Temp-Ban People

Decent Essays
Explain some cases in which you would perm-ban/temp-ban people:
Advertising: Helpers don't have the /ban command so they use the /mute command like this
/mute (user) Advertising
Then you take a screenshot and send it to a higher staff.

Drama: Server: drama is a perm ip ban but helpers don't have /ipban so I would record it and send it to a higher staff.

Hacking: As a helper you can't ban so I'm going to put the moderator command here just to show that I know the rules
/tempban (User) 48h Hacks
Staff will discuss the evidence (video) and if the user is hacking they will be perm banned./ban (user) Hacks

Spamming: These are the commands you would do if someone is spamming
/warn (user) spam
Then if they continue you would do
/tempmute (user)

Related Documents

  • Great Essays

    What would you do if someone was being toxic (excessive swearing / disrespecting staff - players and the server): I would mute them for some time for being Toxic and rude to players and the server. Describe the following in detail Describe in detail (To the best of your ability) what you'd look for if someone was x-raying: First, I would tell them to press download Join. Me so I can see their screens.…

    • 637 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IGN: Jives Age: 14, Soon to be 15. Timezone: GMT, UK. Country: United Kingdom. Do you have a good quality mic?:…

    • 1990 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 5 Assignment

    • 526 Words
    • 3 Pages

    Age - 17 Country - England Time zone - Greenwich Mean Time Zone (UTC+00:00) InGame ranks (Mine rank and Donation Rank,only if you have one) - Ether & Hitman On Prison. 1. Why do you want to be staff? - I enjoy playing on Cyclone and also the community is awesome.…

    • 526 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1. Shred your documents. Don’t toss bank statements and credit card receipts in the trash. Dispose of them using a cross-cut shredder or shredding service. 2.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Do You Know? EVERY 24 SECONDS A host accesses a malicious website EVERY 1 MINUTE A bot communicates with its command and control center…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Longmeadow Homeowners

    • 736 Words
    • 3 Pages

    THE LONGMEADOW HOMEOWNERS ASSOCIATION SUMMARY OF RULES VIOLATION PROCESS AND FINES Our basic rights and obligations as Longmeadow residential condominium owners are set forth in the Master Deed/Bylaws, which each member accepted upon purchasing property in Longmeadow. Article V, Section 2 of the Master Deed/Bylaws grant the Longmeadow Board of Directors authorization to enforce the Master Deed/Bylaws and Rules and Regulations duly enacted by the Board of Directors. To the degree that we as residential condominium owners observe these obligations, our living together in Longmeadow will be harmonious. Members of the Longmeadow Homeowners Association will be able to enjoy peaceful coexisting and can reasonably expect that the value of their…

    • 736 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Dage Michael Martinez Fraud Auditing May 1, 2016 Fraud Audit Program: Hollate Assess: Fraud: Type/Scheme Control Opportunity Occurs/Fraud Scenario Concealment Red Flags Conversion Journal Entry Scheme The scheme likely occurred due to management override of controls.…

    • 1732 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    My name is samtanq and i have been playing mineage for around 2-3 years and have seen the mineage community grow substantially, i believe this is one of the most important sections here ,so i have taken my time to go over it and over it. Enjoy. I find when someone put adverts up on the chat and no helpers are on I see when you need to record and upload to youtube and write the details in the ban forum its a lot of hassle for someone who is advertising, and could get banned immediately if a helper was on,so if i get a chance i would be on every day and be able to be on when the American helpers can't as i am from the UK (time difference)and get the chance to ban those advertisers without the hassle of recording them. I also feel that the helper…

    • 1569 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Zero Tolerance Policies

    • 1334 Words
    • 6 Pages

    Zero Tolerance Policies: Preparing School-aged Children for Prison The implementation of the Zero Tolerance Policy in in the early 90s created a whirlwind of issues; mainly that it did more harm than good. This policy was originally aimed to make schools safer by penalizing any student caught with drugs or weapons. This sounds like a good thing; however, through a lot of revisions and revisiting this policy, it became clear that any minor indiscretion would receive the same punishment a large offense would. Another issue surrounding zero tolerance is the class base and racialized nature; this policy contributes the criminalization of young black and Latino students.…

    • 1334 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Items like these accounts being accessed at the same time from different IP addresses really should have been a “RED FLAG” of major ongoing issues. Furthermore, he had been an IT manager for two years and had he not been receiving reports of leaving personnel to allow him to have their accounts properly deleted in…

    • 884 Words
    • 4 Pages
    Improved Essays