Announcement

Collapse
No announcement yet.

need an admin

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    Originally posted by Whakapono View Post
    I urge you to keep updating your ticket on the matter every few days. We do not have access to game characters from the forum; we can bump your ticket, but you need to reply to keep it open.

    Update:

    I've been informed they are requesting information to prove you're the original owner of the account. There is a screenshot guide in my signature if you need help providing any needed screenshots. Once you have provided the correct information, they can take things from there. As mentioned earlier, you must continue communication through your ticket.
    well i gave my information to them, but obviously it isnt correct enough, i changed all pw yesterday and ran malware scan, clean malware out and i wake up this morning to find i hve been hacked again, i am sick and tired of being hacked, need to do something about this

    Comment


    • #17
      Originally posted by Tiyanku View Post
      well i gave my information to them, but obviously it isnt correct enough, i changed all pw yesterday and ran malware scan, clean malware out and i wake up this morning to find i hve been hacked again, i am sick and tired of being hacked, need to do something about this
      well you better give your info again if they believe you are not the owner that toon will be banned. and last time I will say this RE INSTALL your windows operating system that's the only way to ensure all malware is gone it is time consuming but o well. after RE INSTALLING change ALL passwords to anything you do that requires a password. Very simple

      Comment


      • #18
        Originally posted by JackFrost1111111 View Post
        well you better give your info again if they believe you are not the owner that toon will be banned. and last time I will say this RE INSTALL your windows operating system that's the only way to ensure all malware is gone it is time consuming but o well. after RE INSTALLING change ALL passwords to anything you do that requires a password. Very simple
        jackfrost if ur not an admin, pls keep ur 2 cents out of this

        Comment


        • #19
          Originally posted by Tiyanku View Post
          jackfrost if ur not an admin, pls keep ur 2 cents out of this
          hehe why are you mad? I think now you are mad because you are not the owner of that account. I just gave you simple free advice you don't have to believe what is say look this stuff up yourself. here is some more free advice simple stuff children can understand lol if you don't want people posting on your issue pm and admin don't make a post in a PUBLIC forum lol

          Comment


          • #20
            Originally posted by Tiyanku View Post
            jackfrost if ur not an admin, pls keep ur 2 cents out of this
            He is trying to help you, so I would best take any advice given that is helpful at this point. Funny thing, I never got hacked. That's probably because I do not give out my password/share my accounts, use simple/easy passwords, or use the same password for my email address (well, they are aliases tied to a main locked-on email account). Also, you may have malware, but it is best to delete them --- do not leave them in quarantine --- so they won't come back alive. Now your best bet, after you done all of that, is to reinstall your operating system, run a system scan through Antivirus (McAfee or Norton)/Anti-Spyware (SpyBot Search and Destroy or Windows Defender) before you connect yourself to the internet, and use that as a "control" reference. Then connect to the internet (and don't download any stupid/cutesy program from the net; if you need a tech analysis of a program, you can ask me or do the research as I know which ones are good to be downloaded versus ones you should not even go to) and run the scan again to see if any thing popped up. If nothing bad (and make sure your stuff's up to date), then log into your account and do your changes, but keep up with the ticket, and provide the information needed.

            Hope this one helps. Cheers.
            Vicious! Approach with Caution!
            Because some noob has called me such and had said it so
            Mobile Strike Player: Base 1102 / Com 550 / 672* Power / VIP 1300
            Dissidia Final Fantasy - Opera Omnia: Rank 60

            Comment


            • #21
              Reinstalling the Operating System is probably a little overkill...... Meikura has some good ideas though. +1

              Comment


              • #22
                Originally posted by Alsatia01 View Post
                Reinstalling the Operating System is probably a little overkill...... Meikura has some good ideas though. +1
                it is time consuming to reinstall the OS but if his system is infected as much as he said then who knows what is on there. reinstalling would remove malware that may not be discovered from a scan better safe then sorry

                Comment


                • #23

                  Its very easy to get malware/rootkits on your system, even with the most up to date AV software. You don't know what the source of the breach is, and you know you have malware on your system. With that being said, save yourself some time in the long run and just format the hard drive and reinstall everything. Don't try to simply reinstall everything over what you currently have on your hard drive. After you get everything reinstalled, set up a non-admin profile and run your system from that profile. I would also suggest you invest in system restore software that the colleges use so that every time you reboot the computer, no changes are saved on the affected drive. Like my college, I use Deep Freeze by Faronics, which is very easy to install and manage. There are other similar programs out there that do the same thing. If you're tech savvy enough, you could actually do it yourself under win7/8/10 professional by setting up a virtual machine, but you would need to get another license key for the additional OS.
                  While the system restore software in conjunction with AV protection will prevent a LOT of headaches, there are malware programs out there that will get through both, such as rootkits. Some of the most common places you have a high probability of being hit with one of these are pornographic, pirating, gambling, and "game hack/cheat" websites just to name a few. This is why you'll find all of this stuff blocked by employers who utilize computers in their businesses or corporations. I've also already found websites that appear to target college students doing research, which ends up trying to install malware on the system being used. Suffice to say, you just need to keep track of where you visit and try to only visit known and verified sites(which in itself isn't always 100%). The internet today is a cesspool of garbage that you have to wade through and its only getting worse.

                  Comment


                  • #24
                    Seems a bit odd that if someone has hit his computer that hard with Malware, the only thing that they are mucking about with him is his WT account. I mean, all those nice bank account details and stuff...

                    Comment


                    • #25
                      I don't know. I mean, if I manage to gain control of my "hacked" R2 account and the email that was associated with such, the first thing I would have done is change the security questions/protocols on both; but after the re-install, of course so there won't be evidence of any keyloggers and whatnot. My network was hit in 2002 when an employee downloaded a Looney-Tunes screensaver that opened a Pandora's box in the form of a Hydra virus. It started to replicate and infect systems that were connected to the network that it took hours to try and trace as well as clean the systems. The internet was turned off, the network modules were offline, so every computer was standalone. After each system was cleaned and scanned, we manage to find the culprit; all other systems were then "burn tested" when the network came online, but the affected one wasn't connected to it, for around 48 hours. The affected computer was then cleaned, burn tested, and later reformatted (since the virus replicates more files when one is deleted/destroyed) and reinstalled; then it was re-tested before clearance was given for its connection and use on the network. That time, a weekend was wasted as well as a few days for that employee terminal for something someone thought it was cute to get. After that time, we've implemented strict network guidelines and reconfigured on how network traffic is handled. Some of those guidelines I took home with me to be placed onto my network. Been glad since that day as I taught my family well on the importance of internet "safety". They know when to ask for "research and testing" if they wanted to know about something as I have a DMZ type of setup on a separate part of the network that isn't on the main one.

                      I had been asked countless times if I could either sell my accounts or give my login information, which both are against the Terms of Service. If I am home and able, I can log in my own accounts; and if I afk a long time after that, then so be it, but I won't be doing either; and if trifled enough, that person is going to be sorry since I am a Bart Simpson at heart and that person is a Moe to me.
                      Vicious! Approach with Caution!
                      Because some noob has called me such and had said it so
                      Mobile Strike Player: Base 1102 / Com 550 / 672* Power / VIP 1300
                      Dissidia Final Fantasy - Opera Omnia: Rank 60

                      Comment

                      Working...
                      X