This is an archive of the mabination.com forums which were active from 2010 to 2018. You can not register, post or otherwise interact with the site other than browsing the content for historical purposes. The content is provided as-is, from the moment of the last backup taken of the database in 2019. Image and video embeds are disabled on purpose and represented textually since most of those links are dead.

To view other archive projects go to https://archives.mabination.com

Infection/Hacking Prevention Guide


  • Set up your two security questions and answers. Do NOT enter random crap here, because you may need to answer these questions in the future. Be sure to pick questions and answers that only you know, not ones that other people can easily find out or guess.

    Now that you have your account's security set up properly, there's a few things to keep in mind.





    [SIZE="4"]Computer Security[/SIZE]

    Having the proper account security won't make much of a difference if you're being keylogged, 'ya know?
    So here's some information and steps you can take to try to prevent infections/hacking.

    A main source of protection, of course, are antivirus and anti-malware programs, so it's very important that you have a functional set of programs installed.
    There's multiple classifications of infection in the computer world, just like there's multiple classifications of infections in the real world (for example viruses versus bacteria versus fungal infections). These infections work in different ways, and are often removed in different ways as well.

    There's two main common categories for computer infections because of this. The first is "viruses", this generally includes viruses, worms, trojans, and malicious modifications to core system files. The second is "malware", which generally includes spware, adware, rogue software, and malicious system settings changes.

    Often a scanner for one category won't aim for the other category due to the major differences, so it's recommended to have two programs. One antivirus and one antimalware, unless you have an antivirus that specifically includes antimalware instead (such as one of the paid anti-virus programs.)

    It's important to only keep one anti-virus program installed at a time. Antivirus programs aren't normal programs, they hook into core parts of the system (such as filesystem I/O) and expect to be the only things doing so. Having multi antivirus programs can actually cause them to perform worse, or actually damage your system under rare circumstances.



    There's a lot of misinformation about where infections/keyloggers come from and how you might catch them. What follows is a list of common causes of infection. Don't skip over it, you might be surprised.


    These are just a few of the places to pick up infections. The people who make them are always looking into new ways to infect a large amount of machines, so if you're not sure on something look it up before you use it!

    Here's steps you can take to prevent things from infecting you even if they try.




    [SIZE="4"]Social Security[/SIZE]
    Many people get info via Social Engineering, not any hacking.
    Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques; essentially a fancier, more technical way of lying.


    This can be done various ways.






    [SIZE="4"]Personal/Hacking Threats[/SIZE]
    Actual computer hackers don't issue hacking threats on people for games, because despite what kids like to believe, you are not anonymous on the internet. You can be tracked easily (by law enforcement, not normal people), even if you use a proxy. The Computer Fraud and Abuse Act of 1984 states you can go to jail for up to ten years for hacking another person's computer. You don't have internet access in jail in order to brag about it, and you're often not allowed to use the internet once you get out, so you're not going to hear anybody except script kiddies bragging about "hacking" because a videogame isn't worth it.

    You ever see how cats puff their fur up, arch their backs, and make loud noises to scare other animals?
    Ever notice how fast a cat runs when you spray water at it?

    You ever seen those little poodles that are always barking at everything?
    Ever notice how they're just tiny poodles and you could send them flying with one kick?

    People prey on fear, and they will try to threaten you into giving them items or doing things for them. Don't let people boss you around with threats. If somebody is threatening to hack you, ignore/report them. Do NOT give into their demands, and do not continue to talk to them.





    Changelog...
    1/4/2012 - Removed the spoilers.
    1/4/2012 - Added mention of sandboxing suspicious programs in the prevention section.
    1/3/2012 - Added mention of game hacks/mods as a common source, also fleshed out the social security section a bit with info on phishing and e-mail stuff.
    1/3/2012 - Created.
  • Cheerios wrote on 2012-01-03 20:43
    [S]China bots injected a keylog on nexon servers a while ago and that's why nx is being stolen from players thus this thread is moot[/S]

    edit: also idiots going to be idiots

    [Image: http://puu.sh/ck2u]


    then they cry they got hacked

    Edit : oops, just noticed this wasn't on mabi section. Regardless giving this youtube example as its a nice example how people get their accounts compromised by downloading this sort of software
  • Kingofrunes wrote on 2012-01-03 21:06
    You should add in more detailed information about Phishing attacks. That's a very popular way to trick people. I've seen some pretty convincing Runescape ones that I almost fell for if I hadn't checked the links before clicking on them. Always be wary of emails claiming to be from a trusted source because you never know if it's a clever phishing attack.

    Other than that, very comprehensive guide. Of course this thread isn't useless as this applies to ALL games and basic security precautions that you should follow. So no, it's not useless at all.
  • Osayidan wrote on 2012-01-03 21:53
    You should add to the UAC part:
    Do not log in as an administrator account. Have a limited account where you need to type the admin password for most things to run.
    UAC is nice, but not giving the account you log into any rights is even nicer.

    Also, for people with good enough computers, use virtual machines!
    Browse the web in a VM, this allows you to browse the web "unrestricted". If something happens, revert to a clean snapshot of the VM. This is especially useful if you download a lot of stuff. I also run my skype in a VM.

    There's free virtualization software like Virtualbox, and if you have an old windows XP license you can use that, or even linux like ubuntu or fedora, they support chrome and firefox.
  • Rydian wrote on 2012-01-03 21:54
    Quote from Cheerios;720435:
    [S]China bots injected a keylog on nexon servers a while ago and that's why nx is being stolen from players thus this thread is moot[/S]
    In all the mabinogi threads I've seen, this is the first I've heard of that.

    I did hear one rumor about a virus in nexon's database, but it was the usual bull**** threat stuff.

    Quote from Cheerios;720435:
    edit: also idiots going to be idiots

    ~

    then they cry they got hacked

    Edit : oops, just noticed this wasn't on mabi section. Regardless giving this youtube example as its a nice example how people get their accounts compromised by downloading this sort of software
    Will add mention of that.

    Quote from Kingofrunes;720461:
    You should add in more detailed information about Phishing attacks. That's a very popular way to trick people. I've seen some pretty convincing Runescape ones that I almost fell for if I hadn't checked the links before clicking on them. Always be wary of emails claiming to be from a trusted source because you never know if it's a clever phishing attack.
    Good ideas, I'll add them.

    Quote from Osayidan;720506:
    You should add to the UAC part:
    Do not log in as an administrator account. Have a limited account where you need to type the admin password for most things to run.
    UAC is nice, but not giving the account you log into any rights is even nicer.

    Also, for people with good enough computers, use virtual machines!
    Browse the web in a VM, this allows you to browse the web "unrestricted". If something happens, revert to a clean snapshot of the VM. This is especially useful if you download a lot of stuff. I also run my skype in a VM.

    There's free virtualization software like Virtualbox, and if you have an old windows XP license you can use that, or even linux like ubuntu or fedora, they support chrome and firefox.
    Not sure if I agree with those suggestions for normal users. There's security, and then there's overprotective-mother security.

    This thread is for the average user, and those things are way too troublesome and restrictive for the average user while giving comparatively little security. If a keylog is installed in a VM, anything you're typing in the VM is still hooked and sent. If a program you're running as admin gets hijacked, it's got admin rights regardless of if they're default or not.
  • Zid wrote on 2012-01-04 00:07
    What about rootkits?

    Unless removal of rootkits is past the limit of explaining to the average user.
  • Kingofrunes wrote on 2012-01-04 00:36


    This can be done various ways.
    Pure Text
    Think about it with this example... let's say your username on a Mabinogi forum is the same thing as your Nexon account name. Somebody contacts you and starts talking, and suddenly wants to e-mail you something. Well, you give them your address and you two e-mail back and forth a few times, and they start asking you various questions and talking about things... say, who your favorite actor is, what primary school you went to, you know, normal stuff like that.

    Well, that's your account name, e-mail, and security question answers right there! Be careful about what sort of information you give out online, and try to make your account names on various places different.

    E-mail
    It's entirely possible to fake the e-mail address a message appears to have come from. If you get an e-mail that's supposedly from Nexon, but is directing you to weird sites or asking you for your account information, ignore it.

    Websites
    People make sites that appear to be Nexon's official site, but are just copies that send them your login information if you try to log into them. These are known as "phishing" sites, and the major way to tell the difference is by looking at the URL bar to see if it's actually Nexon's site or not. Check the URL/location bar of your browser before typing your login information, if it's not Nexon's site then do not type anything in and close the window.


    I would highly suggest you tell the user to check the url BEFORE they click that link. The site they could be going to could have malicious software or keyloggers on it.
  • Rydian wrote on 2012-01-04 01:04
    Quote from Zid;720723:
    What about rootkits?

    Unless removal of rootkits is past the limit of explaining to the average user.
    This guide isn't meant for removal, that should be for a more technical forum in general so users can get quick, experienced help. While there's a user or two here that may help, having a forum full is better.

    Quote from Kingofrunes;720795:
    I would highly suggest you tell the user to check the url BEFORE they click that link. The site they could be going to could have malicious software or keyloggers on it.
    http://www.google.com

    I don't really think that's' a feasible thing to do... right-clicking and copying/pasting the URL of every link before you click it is an exercise in being driven insane. XD
  • Yoorah wrote on 2012-01-04 05:17
    Putting everything inside spoilers makes it pretty hard to read. D8
    I think you should just use sections and stuff. xd
  • Vinhthehero wrote on 2012-01-04 05:47
    Quote from Osayidan;720506:
    You should add to the UAC part:
    Also, for people with good enough computers, use virtual machines!
    Browse the web in a VM, this allows you to browse the web "unrestricted". If something happens, revert to a clean snapshot of the VM. This is especially useful if you download a lot of stuff. I also run my skype in a VM.

    There's free virtualization software like Virtualbox, and if you have an old windows XP license you can use that, or even linux like ubuntu or fedora, they support chrome and firefox.


    Another alternative is: Sandboxie

    "Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer."

    Basically, if you're unsure about executing a file on your computer, use Sandboxie. To be super-safe, you can always run your web browser through Sandboxie so nothing from the browser can reach anything within your computer.
  • Kingofrunes wrote on 2012-01-04 10:28
    Quote from Rydian;720855:
    This guide isn't meant for removal, that should be for a more technical forum in general so users can get quick, experienced help. While there's a user or two here that may help, having a forum full is better.

    http://www.google.com

    I don't really think that's' a feasible thing to do... right-clicking and copying/pasting the URL of every link before you click it is an exercise in being driven insane. XD


    In most browsers there's a thing called a status bar. Ever heard of hovering over it? That's what I do. Hover over the link and check the status bar. If it doesn't match, then I immediately know something is up.

    If you are using chrome and you hover over a link, a little bar appears at the bottom telling you where that link actually goes to. Take this for example. Hover over it and check the bottom of your browser and you'll see that the link doesn't match. How is that too much work?

    http://youtube.com
  • Rydian wrote on 2012-01-04 11:53
    Quote from Yoorah;721375:
    Putting everything inside spoilers makes it pretty hard to read. D8
    I think you should just use sections and stuff. xd
    Alright, I'll test out some division methods and see what's the most readable.

    Quote from Vinhthehero;721420:
    Another alternative is: Sandboxie

    "Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer."

    Basically, if you're unsure about executing a file on your computer, use Sandboxie. To be super-safe, you can always run your web browser through Sandboxie so nothing from the browser can reach anything within your computer.
    That's a better approach, it's still a little troublesome but is only needed in some situations and requires minimal action so it's feasible, I'll add mention of that.

    Quote from Kingofrunes;721706:
    In most browsers there's a thing called a status bar. Ever heard of hovering over it? That's what I do. Hover over the link and check the status bar. If it doesn't match, then I immediately know something is up.

    If you are using chrome and you hover over a link, a little bar appears at the bottom telling you where that link actually goes to. Take this for example. Hover over it and check the bottom of your browser and you'll see that the link doesn't match. How is that too much work?

    http://youtube.com
    URL shortening services (used on some forums due to signature limits) and things of that nature can hinder that... in addition, as I've shown, even good sites can accidentally serve up malware. I'm not saying it's not a good idea, but it's likely more trouble than it's worth considering that the main point is checking when logging in, which isn't done on nearly every page.