What Are Some Cases In Which You Would Perm-Ban

Decent Essays
Explain some cases in which you would perm-ban/temp-ban people:
Is when someone if using a blacklisted mod/hacked client to have an advantage or upperhand against somebody else. As helper i would record them and show it to a high staff member to ban them and as moderator+ i would record them and do /tempban (IGN) 48 hacked client

Spamming: Spamming is when someone is spamming chat more than 3 times is a short period of time or trying to cause drama. As Helper+ i would first warn them by using /warn (name) spamming and then if they continued to spam i would do /tempmute (name) 5 spamming. If they continue on it is a 15 minute temp mute and then a perm mute.

Suspicious Links / IP-Loggers: When a player posts something that is not related to

Related Documents

  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Lab #5: Introduction to Metasploit on Kali Linux Team: CRYPTERS 1 d. Why is it usually a bad idea to operate in the Linux environment as root? If you are unfamiliar with the concept of the root user, do a quick google search. It is always a good practice on any operating system to run your applications on a user level and leave the administrative tasks to the root user, and only on a per-need basis. Applications are meant to be run by users with non-administrative privileges.(Power December 4, 2010)…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Penetration tests assesses the overall security. It is the process of attempting to gain access to resources without knowledge of specific user names, their passwords, or other normal means of access (similar to what an attacker would do). The big different between a penetration tester and an attacker basically is permission. A penetration tester will already have some permissions (such as an normal user account) in place from the owner or managers of the computing resources that are to be tested. From here, the pen tester will attempt to gain additional accesses.…

    • 460 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    (User) 48h Hacks Staff will discuss the evidence (video) and if the user is hacking they will be perm banned./ban (user) Hacks Spamming: These are the commands you would do if someone is spamming /warn (user) spam Then if they continue you would do /tempmute (user)…

    • 270 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Spam- The first time i would kick them. If they continued i would temp-mute them. If they continued after that i would mute them.…

    • 357 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    DESPITE HIPPA’S HITECH ACT, CYBERATTACKS CONTINUE TO RISE HIPPA’s HITECH Act and the Omnibus rule were enacted to prevent data breaches in healthcare; however, healthcare data breaches are on the rise. Since its enactment in 1996, several provisions have been incorporated into the original Health Information Profitability and Accountability Act (HIPAA), one of which is the Health Information Technology for Economic and Clinical Health Act (HITECH): In 2009, The U.S. Department of Health and Human Services (HHS) enacted the American Recovery and Reinvestment Act, which includes the HITECH Act. On March 26,2013, HHS enacted a final Omnibus rule to implement several provisions of the HITECH Act. These provisions aim to strengthen the confidentiality…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Perm-Ban People Banned

    • 742 Words
    • 3 Pages

    If a player was Spamming, i would first warn the player then Temp-Mute the player for 5-15 minutes. If it continues i will alert a higher staff member and continue and punish the player once more with possibly a permanent mute or whatever the higher staff member chooses. Suspicious Links / Ip-Loggers: This…

    • 742 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Explain some cases in which you would perm-ban/temp-ban people: Advertising -- This is when someone decides to place their ip to a server of some sort, This is for sure resulting in a horrible PERM-BAN. Although being a helper means i cannot ban him / her means i would have to screen shot it and send it to a higher staff member such as mods or higher. a Helper would have to simply mute him/her. Mute Evasion -- When someone would be muted and logs onto an alt account so you could talk, that would result in a temp-ban or a perm-ban also one could put a item in the ah named what they wanted to say that is considered a mute evasion.…

    • 424 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Ap English Research Paper

    • 591 Words
    • 3 Pages

    IGN: LaurinPlaysX Previous IGN (If applicable): TheLinkHD Real life name: Laurin Age (13+): 13 and 10 months Birthday: 3rd December Timezone: Germany, Berlin What time are you most often on? (your time): I am mostly online on Monday: 13.45-20.30 Tuesday: 13.30-20.30 Wednesday: 13.30-20.30 Thursday: 13.30-20.30 Friday: 13.30-23 Saturday: 11-23 Sunday: 11-20.30 I can contribute about 75% of the time I am online. Do you speak any foreign language? (If yes, specify): I am able to speak english and german, german as my mother language…

    • 591 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    “Run it down mid.” It probably sounds like complete nonsense to an outsider, but it makes complete sense to the true League of Legends player. The discourse community of League of Legends is defined to be an exhilarating experience with a structure of rules implemented to make entertainment polite yet fresh. The recent interview of Runescape 2007 along with observations of the discourse community prove to follow Swales’ six characteristics. Whether the League of Legends is toxic or alluring, it will prove to be an interesting discourse community.…

    • 563 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    In a world where technology has overtaken society, people have found it much easier to commit crimes. We've all heard of websites such as Facebook, Twitter, Ebay, and possibly the most talked about for being so dangerous, Craigslist. These are websites where people can interact with one another, but sometimes it may just so happen that you do not know who you're truly talking to. What or who is hiding behind a computer screen on the other side may just be your worst nightmare. Philip Markoff, an aspiring medical student was dubbed the Craigslist killer in 2009 for committing robberies and even killing one of his victims.…

    • 1726 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Reasonable Restrictions

    • 191 Words
    • 1 Pages

    As it is necessary to maintain and preserve freedom of speech and expression in a democracy, so it is also necessary to place some restrictions on these freedoms for maintenance of social order which defined in article 19, and the freedoms guaranteed by Article 19(1) are not absolute as no right can be controlled, curtailed, and regulated to some extent by laws made by Parliament or State Legislature. No freedom can be absolute or completely unrestricted . Accordingly, clause (2) to (6) of article 19 lay down the grounds and the purposes for which a legislature can impose ‘reasonable restrictions’ by Article 19(2) on the rights guaranteed by articles. 19 (1)(a) to (g). “The state can make any law imposing ‘reasonable restriction’ on the exercise…

    • 191 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    These actions mostly done by young people. The fact is these actions increased very fast every month. Nowadays, cybercrime is terribly worrying in social media. Many people intend to bully someone even they personally don’t know who the person is, such as the fans on an actress. It is the evidence that prove the previous statement.…

    • 754 Words
    • 4 Pages
    Improved Essays