2 weeks ago
- last edited
2 weeks ago
A customer from you started getting admin stuff on my Server with Script/Hacks and start to deface/destroy Player bases.
2020-06-20 02:07:35: Jagalskarfitta SteamId 76561199067814025. IP Address [MOD EDIT: REMOVED] at Position: 2550 X 48 Y -1647 Z in RegionFile: r.4.-4
Stats: Health=200 Stamina=199 ZombieKills=334 PlayerKills=0 PlayerLevel=300
Inventory of Jagalskarfitta steamId 76561199067814025Belt:Slot 0: 001 * Auger - quality: 5Slot 1: 001 * SMG-5 - quality: 6- Silencer Mod- Reflex Sight Mod- Rad Remover Mod- Cripple 'Em Mod- Dye: RedSlot 2: 493 * Admin: CubeCandleSlot 3: 500 * Admin: CubeTorchSlot 4: 500 * Admin: PyramidSteelTorchSlot 5: 30000 * Bottled WaterSlot 6: 30000 * Can of ChiliSlot 7: 001 * Grandpas Learnin' ElixirBackpack:Equipment:Slot Legs: Suit PantsSlot Feet: Cowboy Boots- Dye: RedSlot Head: Steel Helmet - quality: 6Slot Chest: Military Vest - quality: 5Slot Chest: College JacketSlot Hands: Dev: Ring of FireSlot Legs: Military Leg Armor - quality: 2End of inventory
[MOD EDIT: Personal and private information has been removed from this post. Please do not post personal or private information in your public posts. Please review the Forum Guidelines]
2 weeks ago
I'm a Very Insightful Person, I'm here to share knowledge, I don't work for Virgin Media. Learn more
Have I helped? Click Mark as Helpful Answer or use Kudos to say thanks
I've already done that.Steam and the game maker too 😉
But the internet provider should also know that their line is used for such things.
Unless the customer has not broken any laws then it is outside of what any ISP can do, and even with a law broken then it would need a court order.
The "customer" could be charged under the Computer Misuse Act 1990,
Section 3: Unauthorised modification of computer material.
(1)A person is guilty of an offence if—
(a)he does any act which causes an unauthorised modification of the contents of any computer; and
(b)at the time when he does the act he has the requisite intent and the requisite knowledge.
(2)For the purposes of subsection (1)(b) above the requisite intent is an intent to cause a modification of the contents of any computer and by so doing—
(a)to impair the operation of any computer;
(b)to prevent or hinder access to any program or data held in any computer; or
(c)to impair the operation of any such program or the reliability of any such data.
(3)The intent need not be directed at—
(a)any particular computer;
(b)any particular program or data or a program or data of any particular kind; or
(c)any particular modification or a modification of any particular kind.
All that is required is a police investigation, and if enough evidence is found to support a prosecution, charges to be brought. That's when the courts would become involved.