Brandon Posted August 25, 2012 Share Posted August 25, 2012 I feel inclined to inform TCA users of a recent hack attempt we experienced. According to other GSP's the same user was asking for test servers from them as well. So this looks to be TCA host targeting. Hacker info: Email: internetbsnet[at]gmail.com IP's used: 184.22.136.237 204.8.156.142 24.188.236.215 I won't disclose specific information here but if you want to know more you can contact me through various instant messengers, email or ask TCA how to prevent this. Link to comment Share on other sites More sharing options...
vgamer Posted March 11, 2018 Share Posted March 11, 2018 Honestly that your job to harden the TCA installations and of course the servers themselves so hackers cannot do anything to harm yourself and/or customers. Assuming the infrastructure is well secured then the hackers shouldn't be able to do much (if any damages). If all else fails that why containment is a thing and regularly used to keep hackers from doing any more damages. Link to comment Share on other sites More sharing options...
Dennis Posted March 12, 2018 Share Posted March 12, 2018 Honestly that your job to harden the TCA installations and of course the servers themselves so hackers cannot do anything to harm yourself and/or customers. Assuming the infrastructure is well secured then the hackers shouldn't be able to do much (if any damages). If all else fails that why containment is a thing and regularly used to keep hackers from doing any more damages. This thread is 6 years old... Anyway, TCAdmin is a very closed piece of software software. You can't really make any steps to secure your TCAdmin installation besides what TCAdmin offers. Link to comment Share on other sites More sharing options...
vgamer Posted March 12, 2018 Share Posted March 12, 2018 This thread is 6 years old... Anyway, TCAdmin is a very closed piece of software software. You can't really make any steps to secure your TCAdmin installation besides what TCAdmin offers. While true, usually though security problems are at least partly lies in the host/user of said software. Though yes if the vendor (such as not limited to TcAdmin) does not patch what they are supposed to patch then that is indeed on them. WordPress is notorious for this (recently they even said that they will NOT patch a critical exploit). But because this is the most used and most expensive software "flat rate" software for gaming control "on the shelve" I would expect them to be "up the par" with such. Link to comment Share on other sites More sharing options...
ECF Posted March 14, 2018 Share Posted March 14, 2018 If you have any security questions or find any exploits please let us know via support ticket or our contact us page. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.