|
Avalon Asturias
Registered User
Join date: 3 Dec 2005
Posts: 117
|
08-30-2006 06:35
How would someone be able to transport you against your will to various locations in- world? Remove a scripted item from your body? Bypass the mute function and send IM's after being muted? Remove people from your friends list while you are in-world and being tped around with out your permission?
A firewall is in use on victim's computer. Action has been taken with the victim's ISP to prevent such activity. They even changed the port # and IP # of their computer. Yet someone has the ability to do these things? Is this an exploit of SL or a script? The victim has not given out their password and changes their password weekly.
|
|
Argent Stonecutter
Emergency Mustelid
Join date: 20 Sep 2005
Posts: 20,263
|
08-30-2006 07:08
Just because a firewall is in use, that doesn't mean your computer is secure. A firewall won't prevent malicious code from making a connection out to receive commands, and even a fancy firewall with application filtering won't stop the code if it's embedded in a browser or other application that normally makes outgoing requests. Someone may have used an exploit to plant such code (a "rootkit"  on the computer at some point in the past. There are plenty of rootkits that allow people to see everything on your screen and control your computer just as if they were sitting in front of it. Cleaning something like that out... it's hard to be sure you've got it. Something like Spybot Search and Destroy (from kolla.de) may find the malware, but you may need to go as far as backing up your data, reformatting the disk, and reinstalling Windows and all applications from media.
|
|
Elror Gullwing
Registered User
Join date: 6 Sep 2004
Posts: 306
|
The Other Possiblity.....
08-31-2006 07:42
From: Avalon Asturias How would someone be able to transport you against your will to various locations in- world? Remove a scripted item from your body? Bypass the mute function and send IM's after being muted? Remove people from your friends list while you are in-world and being tped around with out your permission?
A firewall is in use on victim's computer. Action has been taken with the victim's ISP to prevent such activity. They even changed the port # and IP # of their computer. Yet someone has the ability to do these things? Is this an exploit of SL or a script? The victim has not given out their password and changes their password weekly. .....a Linden and Linden Lab.
|