Preview

How To Explain Some Cases In Which You Would Perm-Ban

Satisfactory Essays
Open Document
Open Document
260 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How To Explain Some Cases In Which You Would Perm-Ban
Explain some cases in which you would perm-ban/temp-ban people:
Spamming :
Caps/random letters and more things that will heart some one's feelings .
1st : warn ( name) disrespect staff .
2nd : /mute ( name) 5 minutes disrespect staff .
3rd : /mute ( name ) 10 minutes disrespect staff .
4th : /mute ( name ) 15 minutes disrespect staff .
=============================================================================================================================================================================================
staff impersonation : that's when a player change his name to a mod name to acts they are the mods.
/tempmute ( name) 10 minutes staff impersonation.
===============================================================
==============================================================================================================================
…show more content…
but the problem is i am a helper so i will record him and send to you the video in skype or discrod . but if i will be a moderator .
1st /temban ( name ) 48h/2days hack use
=============================================================================================================================================================================================Advertising : this is when a player send an ip of other server but i am only a helper but if i will be a mod
/tempmute ( name) 15 advertising . and after the tempmuted him will send a photo to a mod and ban him
/ban ( name ) advertising .
=============================================================================================================================================================================================
Purchase trolling : this i when someone have top rank and other player buy to him a lower rank and cusses a trobel i will screenshot it and send it to a mod .
=============================================================================================================================================================================================
(Note : if there is some cases I didn't wrote it tell me and i will fix

You May Also Find These Documents Helpful

  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    16. Which enables a host to determine another host’s name based on its IP address? Reverse look-up zone…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Comp230 Week 1 Lab Report

    • 941 Words
    • 4 Pages

    DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1…

    • 941 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    g. What is the ability to respond to multiple IPs or names as if the server were multiple servers called?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Explain some cases in which you would perm-ban/temp-ban people Hacking: If a member is hacking, I will use a recording software to record there hacked/blacklisted client and do a 48 hour temp-ban. Then I will send the footage to a higher staff member until a higher staff member gives me further notice to use the perm-ban. I will not. (If I have access at the time) If I do not have access I will notify the higher staff member of my rank.…

    • 82 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    There are many tools and suites designed to aid the security practitioner and the organization in…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    - if someone is begin racism on chat by example saying to people something related to his body color or something else like this, i would warn him firstly by the command…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Staff impersonation Is where some one is pretending to be a staff and its hard for players to understand who is who it is a 15 min temp mute no warnings or anything.…

    • 184 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    maths gcse

    • 1123 Words
    • 5 Pages

    Any working should be clearly shown in the spaces provided since marks may be awarded for…

    • 1123 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Organizational Control

    • 4526 Words
    • 19 Pages

    | Scenario B. Your manager is speaking to a group of employees about a problem in your department. Employees are not complying with the rules regarding clocking in and clocking out each day. The rules in this situation are very important as employees will not receive their correct pay if the clocking procedures are not followed. There are three suggestions being considered to address this problem.…

    • 4526 Words
    • 19 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How to Annotate

    • 579 Words
    • 5 Pages
    • 579 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Time- time means that you should not be in the room with the service user for too long; also you should not be in there for a small period of time either. You should spend a decent amount in the room with the service user, making sure that you have covered everything and haven’t missed out anything and also making sure that the service user has told you everything you need to know; in order to help them to resolve their problem(s). Also if you keep mentioning about the time that you have left to speak to the service user then they might get annoyed and feel that you are more worried about the time than about their problems. Also rushing the service user would mean that they’ll have to speak quicker and they will not be able to explain themselves…

    • 2296 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Perm Ban Case Study

    • 71 Words
    • 1 Page

    I do not tolerate advertisers at all. Whether it be a person advertising a server on in game or the people trying to sell drugs on the forums, I despise of advertisers.…

    • 71 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Hw3 provided sml file

    • 374 Words
    • 2 Pages

    (* These are basic test cases. Passing these tests does not guarantee that your code will pass the actual homework grader *)…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    spoofing

    • 2478 Words
    • 10 Pages

    Another way spoofing takes place on the Internet is via IP spoofing. This involves masking the IP address of a certain computer system. By hiding or faking a computer's IP address, it is difficult for other systems to determine where the computer is transmitting data from. Because IP spoofing makes it difficult to track the source of a transmission, it is often used in denial-of-service attacks that overload a server. This may cause the server to either crash or become unresponsive to legitimate requests. Fortunately, software security systems have been developed that can identify denial-of-service attacks and block their transmissions.…

    • 2478 Words
    • 10 Pages
    Better Essays
  • Better Essays

    Cryptology

    • 2017 Words
    • 7 Pages

    Being based on the concept of transferring data through intermediate nodes, the very nature of Transmission Control Protocol/Internet Protocol (TCP/IP), the basic communication protocol over the Internet and intranets, makes it possible for an adversary to interfere with communications. Any TCP/IP session may be interfered with in the following ways:…

    • 2017 Words
    • 7 Pages
    Better Essays