Flame-Gunz
Please log in or register
Want to help our community?
Dear gasts, Iff you want to help the flame-gunz community you can donate and become a donator !. All the receivements goes to the hardware of the server.
Pay With Phone
BUY NOW!
donation .tk
Search
 
 

Display results as :
 


Rechercher Advanced Search

Log in

I forgot my password

* GunzLauncher FIXED + UPDATE *

Fri Oct 02, 2009 2:59 am by Grimgor

Hi guys

i've worked on the gunzlaucher because some of u got an error that some crc file wasnt right?

Well thats fixed now.. as it is good you dont see those 2 updates comming everytime again so updater is good just as it should be Very Happy

From now on always run ur gunz thru Launcher. Because when i update flamegunz u will get the updates thru that launcher.

( About talking on that subject …

[ Full reading ]

Comments: 8

Bad news guys

Wed Oct 28, 2009 6:27 pm by k0edufast

Hey everyone..

Well i got some bad news for you as u know grimgor(nick) is very very busy in real life work,school,parents,girlfriend etc.
So 2 days ago he decided to stop with Flamegunz i know it sucks he feels very sorry but he doesn't want to make us wait any longer for nothing i dont know who still is left on the forums but i just had to post this.

BUT there's some good news : We have …


[ Full reading ]

Comments: 3

nickyboy , Boa read

Fri Oct 30, 2009 5:00 pm by k0edufast

well our new boss maybe needs another developer.. so if u want to work for him contact me then i will send u the link then u can post some screenies of ur work and u can maybe join our staff team Smile

Comments: 1

What has happened?

Mon Oct 26, 2009 8:47 am by Chimera

Guys what has happen to flamegunz ? Grimgor every1 have you all forgotten flamegunz? i am upset that no1 is keeping post on the gunz grimgor are you abandoning all our hardwork?please do tell me what has happen or you all have given up and if you all are giving up which means ashley has won so TELL ME HAVE YOU ALL FORGOTTEN FLAMEGUNZ OR YOU DECIDED TO LET HER WIN? TELL ME I DEMAND EVERY1 TO POST …

[ Full reading ]

Comments: 2

k guys server is online!

Sat Oct 10, 2009 1:08 pm by Grimgor

NO LINK! VIRUS WAS IN IT!

Comments: 7

Isokaid is out of our staf !

Fri Oct 09, 2009 3:52 pm by Grimgor

Hi guys,,

IsoKaid is out of our staff because she joined ashley Shocked

i've been shocked Evil or Very Mad

Well more i cant say.. or i dont know what to say but wel **** ashly..

Greetz grim

Comments: 13

Its Time We mean buisness

Sun Oct 11, 2009 6:17 pm by Chimera

Listen up I knew This was coming along time ago so now I am going to take strict messurements i had enough with cutting ashley some slack i will arrange a meeting with Every Staff no point of me going undercover anymore so as co owner i want a meeting with every single staff i am going to cross each and every1 of your background so i can seek a traitor easily somebody told me that the person …

[ Full reading ]

Comments: 3

TO EVERY GUY IN FLAME GUNZ

Sun Oct 11, 2009 3:43 pm by Chimera

Hey guys check this out if your plannin to play on a regular day basis here are some ultra special condoms ready for ya to feel the fun especially those of you with a huge weinner and love ladies

Comments: 3

[EVENT]Design[EVENT]

Wed Oct 07, 2009 8:59 pm by boa

Ok guys here is a new event here are all the details of it;

This is event is for the new site that ive been making for quite some time now, Ok here goes

I need a few images, you cna make either one, the details for them are listed below;

Banner image: will be used for the top of the page; size(pixels) width = 920 height = 200
needs to have FlameGunz written on it, and a picture, DONOT …

[ Full reading ]

Comments: 63


What to do when youre hacked

Go down

What to do when youre hacked

Post by isokaid on Tue Sep 29, 2009 8:49 pm

I found this tut quite informative and i am sure it will be usefull for many peoples Victoire Razz

CONTENTS
Evaluate:
Identify the intruder:
Identify the vulnerability:
Return systems to operation:
Plan ahead:
Communicate:
Disconnect:
Conclusion:


What should you do in the first five minutes after you discover your system has been hacked? Sitting at your desk, you notice some odd activity in a log while you're looking into a user problem. The more you step through it, the more you are convinced that something is just not right. Your heart skips a beat when you realise that the system has been hacked. At this point, you enter a stage of shock as you ask yourself, "How could this happen?" and "What do I do now?"

Although you'll find plenty of advice on how to keep your systems from being hacked, there are relatively few articles that will help you sort things out in the aftermath of an attack. So for the next three weeks, I'll present a series of articles that will explain what you should do in the first five minutes, in the first hour, and in the first week after you've discovered that an interloper has compromised your systems. This article will focus on the most immediate actions you must take to secure your system: evaluate, communicate, and disconnect.


Evaluate:

The first question that you must answer after an attack (or preferably before) is what your objectives are. In most cases, the objectives are simple: prevent further intrusion and resolve the problem. However, in some cases, you will want to be able to positively identify the intruder and, in others, you will be focused on figuring out which vulnerability the hacker exploited.

Identify the intruder:

It may be necessary to positively identify the intruder so that you can refer the matter to the police for further investigation and possible prosecution. Of course, this is not the most expedient way to get the systems back online and prevent further infection. Identifying intruders can be difficult, particularly if they have covered their tracks well. Despite Hollywood's portrayal of hackers easily being traced, someone who is routing traffic through several systems is not only difficult to find, but might be - in all practical terms - impossible to track down.


Identify the vulnerability:
Another approach that some organisations take is to try to identify the specific vulnerability exploited. The thinking is that you want to patch the specific hole that allowed this intruder to gain access. By and large, this approaches the problem from a suboptimal perspective. A far better strategy is to attempt to identify all vulnerabilities and prevent any intruder from gaining access to your systems, rather than focusing on the one vulnerability this particular hacker exploited. Many of today's security assessment tools will allow you to quickly test and resolve all vulnerabilities.


Return systems to operation:
If this is the first time you have been attacked, you may find it simpler to forgo trying to pinpoint the intruder or the specific vulnerability that was exploited. In general, it is unlikely that you will be able to easily generate the logs you might need to target the origin of the intrusion.

Patching the vulnerabilities and returning systems to operation as soon as possible is the most straightforward approach. It reduces your risk and allows you to fortify your defences without worrying about the intruder continuing to take advantage of your systems.


Plan ahead:
In many cases, organisations determine their course of action prior to an attack. But in an equal number of cases, organisations must make this their first order of business after an attack. In addition to determining your specific goals after an attack, you should consider executing a disaster recovery plan, if one exists for your organisation. Depending on the severity of the situation, it may make sense to treat the situation as if the data centre had been destroyed.

The one unique complication to activating a disaster recovery plan for an organisation is that it is typically centred on a known event with a known time. But with an intrusion into your network, you may not know exactly when the system was first compromised. This can complicate the recovery process because it may not be clear what set of backups should be restored for each system. Further complicating matters is the fact that some systems may have been compromised before others, so it may be necessary to repeat the restoration process several times while trying to determine when the first intrusion occurred and on which system.


Communicate:
Once you have decided on your approach, you need to communicate to upper management what is happening - or what you suspect is happening. This is perhaps the most difficult step and, because of that, it is one that is often skipped or delayed. But despite the potential for internal political problems, it is important to let business leadership understand what is happening so that everyone can plan for the steps required to resolve the problem. It will also give business leadership an opportunity to reaffirm the goal for problem resolution, whether that goal is to go after the intruder, target the vulnerability, or simply solve the problem as quickly as possible.

You should also communicate with your IT peers about the problem. You need everyone on the team to look for suspicious activity to ensure that the network is not further compromised. To that end, the more professionals involved who are aware of the problem, the more likely it is that nothing will slip through the cracks and be missed.

Conversely, you should not communicate with your users that you have detected an intrusion. An employee may have caused the breach, either by providing a password to a friend with the intention of allowing a breach or through something more innocent. It is a good idea to hold off on notifying employees until the HR department can communicate the company policy along with the message.

Finally, if you have a security infrastructure partner, communicate with it immediately that you have a potential situation. Even if you have only engaged the organisation in the past to perform a security audit, you should call it to indicate that you suspect that you have a problem. The intent here is not at this point to ask for help but rather to inform the partner so that it can be prepared to assist if necessary.


Disconnect:
If you are not planning on attempting to identify the intruder or the vulnerability, you should disconnect the system or the entire internal network from the Internet as soon as possible. This prevents the intruder from working against you as you try to clean up the mess and also prevents further infections or data loss while you work on the systems.

One of the downsides of disconnecting is that people who want to use the system internally and externally will be unable to do so until the problem is resolved. This can exert substantial internal pressure to take shortcuts to get the systems back up again. But the natural desire to reconnect systems before a thorough evaluation of their status has been conducted is ill advised and typically leads to repeated intrusions while the problems with each of the servers are identified and resolved one-by-one.

The decision to disconnect the entire organisation from the Internet or to disconnect just one system or a few systems is a difficult call, particularly in the first five minutes. You will not have had time to evaluate which, if any, other systems have been compromised, so it is possible that removing a single system from the Internet may not resolve the problem. On the other hand, you may want the organisation to continue to function with as little disruption as possible.

Ultimately, the decision comes down to one of risk tolerance. How much risk is the organisation willing to accept to avoid some downtime? In most organisations, the risk of potential intruders greatly outweighs the desire to maintain availability of all systems. In other words, most organisations agree that it is important to disconnect from the Internet immediately so that the systems can be checked for signs of intrusion without the possibility of intruders attempting to cover their tracks.


Conclusion:

The first few minutes after you discover an attack are likely to be stressful and confused, so it's important to have a plan of action in place before it happens. When you realise you've been attacked, make sure you identify your objectives in resolving the situation, communicate the situation promptly to business leadership and peers, and determine whether the problem requires you to disconnect one or more systems from the Internet. Deciding how to react to an attack is tricky, at best. The actions you take (or don't take) can have a huge impact on your organisation - and on your reputation. However, following a plan for controlling the situation can make things less chaotic and start you down the right path to get things back on track.

I know its quite big but i hope you all enjoyed. Twisted Evil Razz

_________________

avatar
isokaid
adminstrator
adminstrator

Posts : 119
Points : 3479
Reputation : 6
Join date : 2009-09-16
Age : 24
Location : sweden

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by isokaid on Wed Sep 30, 2009 6:49 pm

guys if you get hacked follow this steps to secure little more

_________________

avatar
isokaid
adminstrator
adminstrator

Posts : 119
Points : 3479
Reputation : 6
Join date : 2009-09-16
Age : 24
Location : sweden

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by k0edufast on Wed Sep 30, 2009 11:14 pm

wow thats alot of text:P

_________________





k0edufast
adminstrator
adminstrator

Posts : 192
Points : 3551
Reputation : 0
Join date : 2009-09-20
Age : 25
Location : The netherlands

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by Axel on Wed Sep 30, 2009 11:52 pm

yea Razz

_________________
avatar
Axel
adminstrator
adminstrator

Posts : 359
Points : 3704
Reputation : 0
Join date : 2009-09-25
Age : 24

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by isokaid on Thu Oct 01, 2009 3:49 pm

yea but it helps xD took me about 1 hour to make

_________________

avatar
isokaid
adminstrator
adminstrator

Posts : 119
Points : 3479
Reputation : 6
Join date : 2009-09-16
Age : 24
Location : sweden

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by Kevin on Thu Oct 01, 2009 3:51 pm

lol
avatar
Kevin
full grown adult
full grown adult

Posts : 85
Points : 3416
Reputation : 0
Join date : 2009-09-15
Age : 24
Location : The netherlands

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by Axel on Thu Oct 01, 2009 4:08 pm

Wow so much

_________________
avatar
Axel
adminstrator
adminstrator

Posts : 359
Points : 3704
Reputation : 0
Join date : 2009-09-25
Age : 24

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by isokaid on Sat Oct 03, 2009 9:22 am

its better than little xD

_________________

avatar
isokaid
adminstrator
adminstrator

Posts : 119
Points : 3479
Reputation : 6
Join date : 2009-09-16
Age : 24
Location : sweden

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by Axel on Sat Oct 03, 2009 1:51 pm

i cant read it all i get tired

_________________
avatar
Axel
adminstrator
adminstrator

Posts : 359
Points : 3704
Reputation : 0
Join date : 2009-09-25
Age : 24

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by isokaid on Sun Oct 04, 2009 8:53 am

well that ur fault bro xD

_________________

avatar
isokaid
adminstrator
adminstrator

Posts : 119
Points : 3479
Reputation : 6
Join date : 2009-09-16
Age : 24
Location : sweden

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by Axel on Sun Oct 04, 2009 10:42 am

lmao

_________________
avatar
Axel
adminstrator
adminstrator

Posts : 359
Points : 3704
Reputation : 0
Join date : 2009-09-25
Age : 24

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by knnyy15 on Mon Oct 05, 2009 2:51 pm

after 1 day reading i readed it,! Nice topic
avatar
knnyy15
Wise old man
Wise old man

Posts : 237
Points : 3583
Reputation : 0
Join date : 2009-09-15
Age : 24
Location : The Netherlands

View user profile

Back to top Go down

Re: What to do when youre hacked

Post by Sponsored content


Sponsored content


Back to top Go down

Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum