Preview

Explain Some Cases In Which You Would Perm-Temp-Ban People

Satisfactory Essays
Open Document
Open Document
82 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Explain Some Cases In Which You Would Perm-Temp-Ban People
Explain some cases in which you would perm-ban/temp-ban people Hacking: If a member is hacking, I will use a recording software to record there hacked/blacklisted client and do a 48 hour temp-ban. Then I will send the footage to a higher staff member until a higher staff member gives me further notice to use the perm-ban. I will not. (If I have access at the time) If I do not have access I will notify the higher staff member of my rank.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    - if someone is begin racism on chat by example saying to people something related to his body color or something else like this, i would warn him firstly by the command…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking: Hacking is using a modified minecraft version that gives you an extreme advantage over other players in the server. The punishment for hacking is a 48h tempban tell the proof is reviewed by other staff members then is changed to a permanent ban.…

    • 238 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    b. Unwanted access can be turned off, or excluded when logged in via a monitoring service, as well as time restricted login. Any unauthorized logins will be recorded and terminated as well as site information and tracing information. Security measures are implied (camera, onsite security, etc.).…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Spamming Chat - If a player is spamming the chat with the same message over and over again, this would be a warn for 'Spamming Chat' and if the user was to carry on, this would result in a 5m mute for 'Spamming Chat' etc.…

    • 252 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Insiders have caused damage to networks being terminated or remain in a position to provide information to the outside. They can set up fake websites that look like a real product or supplier but are actually malicious sites designed to attack the computer and add malicious code to the key log, use contact lists, steal data, and other malicious purposes.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Explain some cases in which you would perm-ban/temp-ban people: Hacking- I would ban the person permanently if they are making it unfair to other players- /ban [player][reason] Spam- First I would warn the person for spamming-/warn [player][reason] But if they keep spamming the chat I would temp-mute them-/tempmute [player][reason][time] Staff Disrespect-…

    • 738 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After achieving your objectives, you typically takes steps to hide the intrusion and possible controls left behind for future visits. Again, in addition to anti-malware, personal firewalls, and host-based IPS solutions, deny business users local administrator access to desktops. Alert on any unusual activity, any activity not expected based on your knowledge of how the business works. To make this work, the security and network teams must have at least as much knowledge of the network as the attacker has obtained during the attack process.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sunny San Diego

    • 581 Words
    • 3 Pages

    Aloha! And, Welcome to one of the friendliest and most temperate climates in the world. We like to call this little slice of heaven, San Diego. Today, you will just get a crumb of the cake, as to what the beaches of this amazing, international hub have to offer. Starting from north, and heading south, along the coast line are La Jolla Beach, Pacific Beach, Mission Beach, and Ocean Beach. With everything from restaurants on piers, bars and novelty shops on the boardwalk, to rollercoasters and dog beaches. You can never go wrong on a bright, sunny, warm day from Also, for the college students; we will cover the social scenes that each area has to offer.…

    • 581 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    List TWO (administrative) steps that the ethical hacker need to do before committing the hacking. (4%)…

    • 421 Words
    • 3 Pages
    Satisfactory Essays