QUOTE
Cspace: Hmm....Didn't know you yourself were this strict...But I know what you're doing, you're trying to bring federal laws onto the internet...Very unwise if I may say so because it won't work. Government wasn't designed for law and order, it was designed to keep people who think too much in line...Like myself...Which is why I choose to be a hacker and "defy" the laws of both physics and logic...
Trying to bring federal laws onto the internet? Lol, all I'm doing is securing our own website. I mean, someone flames... ok, that's an inconvenience maybe. But when someone starts doing something along the lines of hacking or compromising our users' privacy/security, something needs to be done right away. Regardless of whether it's a law or not, I think it's my obligation to maintain the safety of the community.
This is the context of the rule:
QUOTE
Any real life scams, hacking attempts, and direct privacy breaches (also including the posting any specifically identifying information without permission; includes an address, phone number, last name, hacker-usable information, religion in a negative light, and political affiliation in a negative light) SHOULD BE DELETED AND REPORTED TO ME. Scams will result in a 3 month suspension, hacking attempts will result in a ban, and privacy breaches can flex between a two week suspension and a ban depending on the intent and extent.
-----------------------
QUOTE
Is this not the same kind of stuff as those signs in people's sigs everywhere that say:
You are running {Internet Browser} an a {blah blah blah} connection. your IP is {blah blah blah}
Is it? Or am I dumb?
You are running {Internet Browser} an a {blah blah blah} connection. your IP is {blah blah blah}
Is it? Or am I dumb?
That's just a few benign Javascript tags, normally either used to tell a website what features you can handle and who not to let in (if applicable). There is more to an IP than just the number commonly seen, and a port scan's only purpose is to see what holes are left open by a firewall basically (either by a hacker or by someone securing your network/system). Those dynamic images can also do more things than just that (such as download software like keyloggers and viruses), although I severely doubt Big did. Infact I will say with almost complete certainty that he did not.
For our members' privacy, however, is why this was done.
****************************************************
I just hope everyone understands not to even joke about doing something like this, because I am not so lenient when it comes to security for obvious reasons.
Sign In
Register
Help




MultiQuote

