I'm falsely accused of breaking a rule on a forum. How can I clear my name?
|
04-28-2014, 12:17 AM
Post: #1
|
|||
|
|||
I'm falsely accused of breaking a rule on a forum. How can I clear my name?
There's this one forum I visit, and one of the rules is that you are not allowed to have multiple accounts. There's this account that's posting random topics, and users are starting to get suspicious and think that it's me using the account, and thus, using multiple accounts. However, I am not the owner of the account, and I am not affiliated with that account.
I haven't been banned yet, but I'm afraid that I might if I don't do something about it. Is there any way I can prove that the account is not mine? Is there any way I can prove that I am not using multiple accounts? Ads |
|||
04-28-2014, 12:24 AM
Post: #2
|
|||
|
|||
Maybe you are infected with a proxy Trojan, that might sound confusing but i'll make it quick and simple, a proxy Trojan is a type of Trojan that uses your computer to do bad things or normal things, you have an ip so does the hacker the hacker uses your ip how? well like VPN the hacker sends the requests to your computer instead of the server then your computer sends the hacker's requests to the server then the server replies to your computer and you respond to the hacker so the server thinks it's you so basically the hacker is connected to your computer his ip is connected to yours but yours is the one connected to the server so the server thinks it's you, here's a nice hacking lesson i made a while ago it will help you find out if there is a connection on your computer however if the hacker is not a professional you might be able to remove the Trojan with a full scan.
Hacking-scanning-Currports Level: Absolute beginner About: Currports is a useful tool if you are hacked one of the best things i found about it is that it can kill the Trojan's connection to the server if you are ratted, Trojans can be made undetectable by anti viruses however they still have to connect somewhere i will talk about rats in another lesson. Go to http://www.nirsoft.net/utils/cports.html and download Currports if you are using 64bits operating system make sure to select that if you don't know English don't worry scroll to the bottom of the page and select your language. Open currports Look for any processes you don't like usually hackers use port 100 to connect your computer to their rat so look for port 100 Look at the remote addresses and note anything that looks weird unless it is an application you trust Ping http://www.noip.com and note their ip cause that's where all the information goes before it goes to most hackers (I am not sure about that one) Look for any process name that looks weird like Server, My first rat, Rat #, Slave # etc especially ones with .exe at the end. I hope you enjoyed this lesson, It is good to know how to defend yourself from the evil hackers whos goal is to destroy your privacy, steal, scam etc, i will be talking about catching a scammer and finding out exactly where he/she lives in another lesson. Lesson made by Christian hacker John Hacket Hackit. Ads |
|||
« Next Oldest | Next Newest »
|
User(s) browsing this thread: 1 Guest(s)