Preview

Opraft Feasibility Study

Satisfactory Essays
Open Document
Open Document
309 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Opraft Feasibility Study
+-+- Staff Disrespect : When a donator nicknames his/her self a staff member/owners name will be temp-muted for 5-15 minutes depending how many times posted in chat, but higher staff may make the consequence worse.
-+-+- Nude/Inappropriate links : If someone would to post a pornographic link or a disgusting link would become a permanent mute to keep the kids safe.
-+-+- Suspicious Links / IP-Loggers : If any links in game that does not include OPCraft or is a IPLogger would conclude as a permanent mute or could become a ban.
-+-+- Spamming Chat : If someone would spam chat or Teleport request request's would results with a /warn.
-+-+- Leaking Staff Information : If someone would leak staff's in real life name, Pictures or were they live would results into a permanent ban, If staff would it would they would get demoted.
…show more content…
-+-+- Advertising : If they would post an IP in chat or a link not related to OPCraft It would result in a permanently banned.
-+-+- Indirect Advertising : If someone would post a youtube channel, Discord link or a Teamspeak server not related to opcraft would result in a permanent mute.
-+-+- Mute Evasion : Mute Evasion would result in a 15m mute.
-+-+- Racism : In the following term, If its excess it would become a /warn equaling first as a 15 minute mute then a 30 minute, Higher staff can permanent mute.
-+-+- Server Drama : If caused would result in a forum post deletion, But if staff is falsely reported would become a global IP-Ban.
-+-+- Purchase Trolling : If you bought a Immortal VIP rank would get your banned from buy

You May Also Find These Documents Helpful

  • Better Essays

    Implementing the installation of an IDS or IPS will allow for suspicious traffic to be flagged and reported to administrators based on one of two different factors. These factors are signature based or anomaly based depending on how they are configured.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    - if someone is spamming ingame chat i would warn him by the command /warn Spamming, and if he goes ahead an continue to begin as a spammer i would temp-mute him by the command…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Violating these rules an employee can and will be disciplined in the form of suspension and/ or termination of BLANK, Inc.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In “Douse the Online Flamers” Andrew Keen writes about individuals who choose to hide behind a façade in cyber crime. He goes on to speak of the unlawful acts inflicted upon innocent individuals of cyber space. Keen reflects on three major cases where cyber criminals are protected under the freedom of speech act while the innocent are left vulnerable. In all three cases, the judges failed the victims of unidentified slander. In his article, Keen forcefully expresses his opinion on why he believes we, as Americans, should take a stand against the anonymity of today’s internet tormenters because too many innocent lives are destroyed due to the cruel intentions of anonymous speech.…

    • 428 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bus 210 Code of Ethics

    • 307 Words
    • 2 Pages

    5. There is a No Tolerance Policy for those employees that are not honest with the company. Automatic termination and legal action may be used for those who remove company property of this without the permission from the owners. The company must be able to depend on every employee’s truthfulness and accurate work to take care of proper business transactions.…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    [player][reason] Indirect Advertising- If someone puts an IP to another server just so they can get people on it I would permanently mute them- /mute [player][reason] Pornography Links-…

    • 738 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    You may not use this Web site and any attached network in a manner that precludes or significantly hampers its use by others.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Good Essays

    After the reading of the ''Gettysburg Address'', the famous Abraham Lincoln gave a truthful meaning full speech. In Lincoln speech he said that they were now engaged into a civil war and what he meant by saying this he means with American they were having a war with America. When they were in war they were testing if the nation can last a long time together or if it will break apart this is why they were having this war to see if this could happen or if it will be just an abort. The North wanted to reunite bring the country back together he wanted to grow as a country. He keeps saying things in the speech as talking if it was possible in the future.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    iPremier a web based company founded in 1996, and located in Seattle, Washington, experienced a outage or denial of service attack in the early monring on January 12th. The disturbance in the iPremier web site occurred as an individual was able to get past the iPremier’s firewall. When instances like this occur in organizationss the disruption greatly impacts operations an can potentially expose an organization to legal issues as data can be compromised. When an event like this occurs in an organization, the first question asked post mortum is how can we prevent his from happening again. From iPremier’s perspective there are a few steps that can be taken.…

    • 504 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sending a threatening message asking the recipient to do something that makes it possible to defraud them.…

    • 1096 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Online Chatting

    • 408 Words
    • 2 Pages

    Online chatting has become increasingly popular. Individuals are no longer hindered from communicating with each other due to physical barriers such as distance , borders or sea. The most common place for people to chat is in chat rooms. Many people , especially youngsters , use 'messenger' services like 'Facebook Messenger' and the newest is 'Whatsapp Messenger' to chat. However , there are advantages and disadvantages of online chatting.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security

    • 2061 Words
    • 9 Pages

    A lot of ways to access information, considerable quantity of qualified specialists, vast use of special technical equipment in social production make it possible for violators practically at any moment and in any place carry out the actions, which represent a threat to information safety.…

    • 2061 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    The phrase ‘trolling’ has become popular to describe a person “who posts inflammatory, extraneous messages in an online community with the primary intent of provoking readers”[1] This version of bullying has actually gone unnoticed by mass media and law enforcements for years, with victims usually having to suffer on their own. However, in 2011, the first person was sentenced for trolling under the malicious communications act [2]…

    • 1453 Words
    • 6 Pages
    Powerful Essays