Search the Community

Showing results for tags 'hacking'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Latest News
    • Announcements
  • Community
    • Immigration
    • The Town Square
    • The Pub
    • Ideas & Suggestions
    • Support Center
    • Bug Reporting
  • Careers
    • The Precinct
    • The Hideout
    • The Podium
    • Board Room
    • Other Careers
  • Off Topic
    • Hangout
    • Arcade

Found 9 results

  1. HACKING

    ALTHOUGH IT IS SAID THAT THERE MIGHT NOT BE ANY HACKING, I ON THE OTHER HAND FOUND OUT THERE IS SOME FORM OF HACKING... ALTHOUGH, UNLESS WE TRY IT THERE IS NO WAY OF KNOWING THE EXTENT. BUT HERE IS PROOF THAT THERE WILL BE SOME FORM OF HACKING. GO TO 3:28 THIS MIGHT NOT BE A CAREER BUT IT MIGHT BE ALOT OF HELP TOWARDS THE JUSTICE SYNDICATE AND THE CRIME SYNDICATE
  2. DEDSEC(RECRUITING ALL)

    THIS IS FOR THOSE WHO DO NOT WANNA BE A CIVILIAN BUT WANNA WATCH OVER THEM> YOU DONT HAVE TO BE A HACKER TO JOIN BUT YOU DO HAVE TO HAVE A SKILL THAT CAN HELP DEDSEC WE DO WHAT WE WANT BUT WE DO NOT LIKE BULLIES WE ARE A SECRET SOCIETY OF HACKERS SERVING OUR OWN BRAND OF JUSTICE. WE_ARE_JUDGE_ WE_ARE_JURY_ IN ORDER TO BE RECRUITED> CHECK MY PROFILE AND WE WILL MESSAGE YOU AND GIVE YOU YOUR DEAL ITS UP TO YOU TO TAKE IT WE ACCEPT ALL
  3. P.H.I.R.M.

    The PHIRM was an early hacking group which was founded in the early 2000s by Mikhail Kryukov. First going by the name of "PRISMX". Kademlia Kademlia is a peer-to-peer botnet based on components from the earlier Prism trojan. It is believed to have been spread through use of the Cutwail botnet. Unlike its predecessor the Prism trojan, Kademlia uses an encrypted peer-to-peer communication system to communicate between its nodes and its command and control servers, greatly reducing its vulnerability to law enforcement operations The algorithm used appears to be modeled on the Kademlia P2P protocol. Scammers control and monitor Kademlia Botnet via Command and Control (C&C) server. The virus establishes the connection to the server as soon as its malicious executable installs on the computer, disables certain system processes, download and launch executables, or even delete essential system files, easily bricking the device. Kademlia has largely been used for banking fraud and distribution of the CryptoLockerX ransomware. In early June 2014, the U.S. Department of Justice announced that an international inter-agency collaboration named Operation Krokvar had succeeded in temporarily cutting communication between Kademlia and its command and control servers.[5][6] On 24 February 2015, the FBI announced a reward of up to $3 million in exchange for information regarding alleged Russian cyber criminal Mikhail Kryukov ( known online aliases : «MRSlavik», «luckyRU» and «Byt3» [7]) over his suspected association with Kademlia. Go see Krukov mafia page for more details.
  4. Is it possible to hack in Identity?
  5. Hacker/Pentester

    Maybe you could insert something like a penetraition tester for companies and a hacker for the bad guys or a hacker for the police
  6. will there be computer hacking in the game and if so will it work like 'normal' hacking and if so could you make fake web pages to steal momey and would it be possible to make you own webistes and 'hidden' websites much like drug websites like dream market ,silk road etc... ?
  7. Hackers?

    Would we be able to have a hacking organisation or a security organisation?
  8. FBI Hacking Suspects

    There should be a way the FBI could hack into a suspects phones and They should make multiple phones to be able to buy so like- A normal basic phone where you can get hacked easily and the FBI can read your texts, a smartphone which is a little harder for the FBI to crack and then a more expensive smartphone that the FBI can not possibly hack. So like for example, the FBI has heard that a criminal is going to meet a customer / "friend" but the FBI don't want to walk into a trap, they can simply ask the higher command if they can try and HACK the suspects phone. if they get approved they should have to go through a series of CAPTHA codes or a minigame or something else just as challenging.
  9. Cyber Security?

    Is Identity going to contain Information Technology career paths? I know it'd be quite a lot of coding/scripting needed to make a virtual world within a virtual world, but is there any possibility of seeing this in the world of Identity?