Ok well I don't know if mods will do anything without proof.
what has he done other than change your name?
[QUOTE=ghostfais;23096228]what has he done other than change your name?[/QUOTE]
He's probably also vac'd.
[img]http://images3.wikia.nocookie.net/__cb20090318234336/southpark/images/9/9e/12.png[/img]
[b]I found the bitch![/b]
If you're dumb enough to manage to get your account hacked, you probably don't deserve to have it anyway.
I knew someone named Lexis a while back.
They shortened "lexicality"
[QUOTE=ghostfais;23096228]what has he done other than change your name?[/QUOTE]
Bought games.
Well that's good for you!
Tip: Verify your steam account. It will prevent anyone from changing your account password once it got compromised without having access to your E-Mail account at the same time. Steam/Settings/Account/Verify
I got mine hijacked, so I sent some reports in. I cannot log in, and I requested the email be sent to my mail via the "Retrieve the lost account", but to no avail. So I sent it into the report with a receipt and am waiting for a reply.
[editline]12:09PM[/editline]
[QUOTE=Jasun;23099165]If you're dumb enough to manage to get your account hacked, you probably don't deserve to have it anyway.[/QUOTE]
And sir, this is trolling. he and I have had our accounts hacked and are certainly not mentally challenged. I can't say anything about the OP, but I think he is in mental shape.
See is they saved their credit card details when buying the games. Have a spending spree.
[QUOTE=HarryG321;23105894]See is they saved their credit card details when buying the games. Have a spending spree.[/QUOTE]
Proably the op's credit info.
[QUOTE=PEn1s lol;23088491]Update: I also found out that he changed my steam name to Lexis too.
Shit he cleared out my whole friends list. I have no friends.[/QUOTE]
You don't have any friends
You were adopted
[QUOTE=|FlapJack|;23092478]HEY LOOK AT THIS GREAT PRONZ
SEXYBLOWJOBFUCKED.EXE
Yes, Trojans are extremely effective... when used on retards.
[editline]02:27AM[/editline]
This.[/QUOTE]
Image.jpg - [email]email@hotmail.com[/email]
That's a legit file name as .com is the same as .exe in most cases.
Not hacked, phished. You were stupid enough to give away your password.
Why you complaining when you got free games?
[QUOTE=Bigboy855;23106389]Proably the op's credit info.[/QUOTE]
I use prepaids when I order on the internet. I don't trust banks.
A 'Thank you' would be nice you know.
Oh Boy, Oh Boy! I hope I get my account "Lexised"! Maybe I should put a Wish-list on my profile page!
Let's see, I want Dawn of War 2, and Half-Life: Source...
It's okay I know exactly what to do.
First you need to find out the last compromised system the hacker was in. Once you do that, find a public access server owned by the same company and click "About Us." Then contact the system administrator. Take your voice analyzer and record his voice. Save it somewhere, and then connect to the last compromised system by a long connection (at least 20+).
Once you do that, bypass the monitor, firewall, and proxy. You'll ned HUD.Connection.Analysis and Monitor/Proxy/Firewall Bypass 5 (As these are the best.) After you bypass the security measures, crack the encryption cypher with a Decypher 3.0 and use the voice clip from the system admin to get through the Voice Print ID menu. Lastly, crack the password with a Password Cracker 1.0 to get into the system.
Now that you're in, access the logs and use a Log_UnDeleter 1.0 on logs dated around the time of the hack. If you do not know the time of the hack, use the log undeleter on every log in the system until you see one change.
This is the log your hacker covered up. Connect to the IP that the connection was routed from with the IP_Lookup tool, and rinse and repeat.
Eventually you will find your hackers system and will be able to do with it as you please.
[QUOTE=haloguy234;23115768]It's okay I know exactly what to do.
First you need to find out the last compromised system the hacker was in. Once you do that, find a public access server owned by the same company and click "About Us." Then contact the system administrator. Take your voice analyzer and record his voice. Save it somewhere, and then connect to the last compromised system by a long connection (at least 20+).
Once you do that, bypass the monitor, firewall, and proxy. You'll ned HUD.Connection.Analysis and Monitor/Proxy/Firewall Bypass 5 (As these are the best.) After you bypass the security measures, crack the encryption cypher with a Decypher 3.0 and use the voice clip from the system admin to get through the Voice Print ID menu. Lastly, crack the password with a Password Cracker 1.0 to get into the system.
Now that you're in, access the logs and use a Log_UnDeleter 1.0 on logs dated around the time of the hack. If you do not know the time of the hack, use the log undeleter on every log in the system until you see one change.
This is the log your hacker covered up. Connect to the IP that the connection was routed from with the IP_Lookup tool, and rinse and repeat.
Eventually you will find your hackers system and will be able to do with it as you please.[/QUOTE]
Good god... Thats almost confusing enough to work.
[QUOTE=haloguy234;23115768]It's okay I know exactly what to do.
First you need to find out the last compromised system the hacker was in. Once you do that, find a public access server owned by the same company and click "About Us." Then contact the system administrator. Take your voice analyzer and record his voice. Save it somewhere, and then connect to the last compromised system by a long connection (at least 20+).
Once you do that, bypass the monitor, firewall, and proxy. You'll ned HUD.Connection.Analysis and Monitor/Proxy/Firewall Bypass 5 (As these are the best.) After you bypass the security measures, crack the encryption cypher with a Decypher 3.0 and use the voice clip from the system admin to get through the Voice Print ID menu. Lastly, crack the password with a Password Cracker 1.0 to get into the system.
Now that you're in, access the logs and use a Log_UnDeleter 1.0 on logs dated around the time of the hack. If you do not know the time of the hack, use the log undeleter on every log in the system until you see one change.
This is the log your hacker covered up. Connect to the IP that the connection was routed from with the IP_Lookup tool, and rinse and repeat.
Eventually you will find your hackers system and will be able to do with it as you please.[/QUOTE]
Did all that but the Log_Undeleter 1.0 Did not work right.
Dude you have to use the Log_UnDeleter on every system otherwise you'll end up being thrown in the wrong direction.
[QUOTE=Activeellis;23088216]If you find the hackers steam alert 4chan.[/QUOTE]
4chan is not your personal army. They won't give two shits about some random dude on the Internet.
[QUOTE=haloguy234;23115768]It's okay I know exactly what to do.
First you need to find out the last compromised system the hacker was in. Once you do that, find a public access server owned by the same company and click "About Us." Then contact the system administrator. Take your voice analyzer and record his voice. Save it somewhere, and then connect to the last compromised system by a long connection (at least 20+).
Once you do that, bypass the monitor, firewall, and proxy. You'll ned HUD.Connection.Analysis and Monitor/Proxy/Firewall Bypass 5 (As these are the best.) After you bypass the security measures, crack the encryption cypher with a Decypher 3.0 and use the voice clip from the system admin to get through the Voice Print ID menu. Lastly, crack the password with a Password Cracker 1.0 to get into the system.
Now that you're in, access the logs and use a Log_UnDeleter 1.0 on logs dated around the time of the hack. If you do not know the time of the hack, use the log undeleter on every log in the system until you see one change.
This is the log your hacker covered up. Connect to the IP that the connection was routed from with the IP_Lookup tool, and rinse and repeat.
Eventually you will find your hackers system and will be able to do with it as you please.[/QUOTE]
Might wanna lay off Uplink for a while.
Sorry, you need to Log In to post a reply to this thread.