7 Days to Die
    American Truck Simulator
    ARK: Survival Ascended
    ARK: Survival Evolved
    ARK: Survival Evolved Official Save Game
    ARK: Survival of the Fittest
    Arma 2
    Arma 3
    Arma Reforger
    Assetto Corsa Competizione
    Astroneer
    Atlas
    Avorion
    Battlefield Hardline
    Chivalry 2
    Citadel
    Conan Exiles
    Counter-Strike: Global Offensive
    Craftopia
    Dark and Light
    DayZ
    Dirty Bomb
    Don't Starve Together
    DUCKSIDE
    Dune: Awakening
    ECO
    Empyrion
    Enshrouded
    Euro Truck Simulator 2
    Factorio
    Farming Simulator 17
    Farming Simulator 19
    Farming Simulator 22
    Farming Simulator 25
    FiveM
    Garry's Mod
    Half-Life 2 Deathmatch
    Hell Let Loose
    ICARUS
    Killing Floor 2
    Last Oasis
    Left 4 Dead 2
    Life is Feudal
    LOTR: Return to Moria
    Medieval Engineers
    Minecraft
    Mordhau
    Myth of Empires
    Outpost Zero
    Palworld
    Pantropy
    Path of Titans
    PixARK
    Project Zomboid
    Red Orchestra 2
    Retired Games
    Risk of Rain 2
    Rust
    Satisfactory
    SCP - Secret Laboratory
    SCUM
    Sons Of The Forest
    Soulmask
    Space Engineers
    Squad
    Starbound
    StarMade
    Subsistence
    Team Fortress 2
    Terraria
    The Forest
    The Isle
    Unturned
    V Rising
    Valheim
    Wreckfest
    Ylands
    Zescape
  • webinterface
    • Account
      Customer Support
      FTP
      Other Services
      Security
  • WEBINTERFACE
    1. home /
    2. guides /
    3. general security en

    Guides

    Category A-Z
    Account
    account-hacked
    email
    general-guide
    question
    two-factor-authentication
    Wiki

    General Security

    General Security

    General

    Hackers

    Hackers are individuals who exploit selected vulnerabilities in a server system to gain access to servers and the data stored on them. However, hackers are not inherently malicious. The act of infiltrating a server or copying/modifying its data can be either “good” or “evil,” depending on intent.

    There are generally three categories of hackers:

    – White Hats
    Work within the boundaries of the law, often employed by governments or companies to track and repel Black Hats.
    – Grey Hats
    Individuals who operate in a morally ambiguous space, not easily categorized as good or bad.
    – Black Hats
    Individuals who engage in hacking with criminal intent, usually to cause harm or gain unlawful benefits.

    Crackers (Not for eating!)

    Crackers bypass the copy protection of licensed programs to either offer them for free or cause economic damage to the software developer. They create programs that either circumvent copyright protections or analyze algorithms like serial keys (license keys) to generate an unlimited number of valid serials.

    Phishers

    Phishers are people who create fake websites or misleading programs to trick others into revealing sensitive information, such as login credentials. A well-known example is the “SteamPhisher,” which pretends to generate free Steam games but actually sends the victim’s account information to a third party for resale.

    Script Kiddies

    Script kiddies are individuals, often inexperienced, who use public tools like LOIC (Low Orbit Ion Cannon) or SteamPhisher to feel “cool.” Since they lack deep technical knowledge, they are often easy to trace and stop.

    Note

    The actions mentioned here should only be used for learning/training purposes on your own root server. Please note: A game server is not considered a separate root server. Testing such activities on rented game/voice servers is not permitted.

    Game-based Threats

    Cheaters

    Cheaters exploit hacks or security holes within games to gain an unfair advantage. However, in multiplayer settings, where cheating could harm other players, developers usually disable such functions. Achievements are also blocked to encourage fair play.

    Hackers

    These are individuals who modify the game client or server to gain an advantage not intended by the developers. Game developers work to patch these vulnerabilities. In competitive environments, such as ESL tournaments, using such hacks results in immediate disqualification.

    Server-based Threats

    My Server Was Hacked

    This is highly unlikely. You technically don’t own the server; your server is just part of a larger Nitrado root server. Nitrado employs robust security measures to prevent unauthorized access.

    Local Threats

    Viruses

    Viruses are malicious programs that can damage your system by deleting or modifying data, or by transmitting information to their creator. Viruses do not spread on their own and remain on the infected PC. Most are easily removed by competent antivirus software. (Note: Viruses can be shared via email or other communication methods.)

    Worms

    Worms are a type of virus capable of spreading from one host to other machines or even throughout an entire network, causing widespread damage.

    What Can I Do Locally?

    • Secure your Wi-Fi with WPA or WPA2 encryption
    • Use antivirus software and keep it updated
    • Download files only from reliable sources
    • Delete spam emails without opening them

    User Questions

    What is a Vulnerability in a Website?

    Even if a server is inherently secure, a website may still have vulnerabilities. One example is SQL injection, where an attacker manipulates a database query to gain unauthorized access to data.

    Original Query

    Call: artikel.php id=1? Generated Query: SELECT * FROM `table` WHERE ID = 1;

    Query Injection

    Call: artikel.php id=1; UPDATE USER SET TYPE="admin" WHERE id=23?

    Miscellaneous

    Two-Factor Authentication (2FA)

    Two-Factor Authentication (2FA) adds an extra layer of security to your account. Learn more about setting it up here:

    Note

    This article is a general summary to help illustrate important concepts. For detailed information on any topic, consider looking it up on Wikipedia or other reliable sources.

    Conclusion

    It’s important to stay informed about online threats and how to protect your server and personal data. By understanding the nature of hackers, viruses, and other risks, you can take appropriate measures to safeguard your online presence.

     

    Get Game Server Hosting now!

    General

    - Hackers

    - Crackers (Not for eating!)

    - Phishers

    - Script Kiddies

    - Note

    Game-based Threats

    - Cheaters

    - Hackers

    Server-based Threats

    - My Server Was Hacked

    Local Threats

    - Viruses

    - Worms

    - What Can I Do Locally?

    User Questions

    - What is a Vulnerability in a Website?

    Miscellaneous

    - Two-Factor Authentication (2FA)

    - Note

    Conclusion

    Share this article


    #Account
    #account-hacked
    #email
    #general-guide
    #question
    #two-factor-authentication
    #Wiki
    12/1/2022

    Grab your very own game server now.

    Order game server
    1. home /
    2. guides /
    3. general security en
    Pay the way you prefer
    Klarna Payment Badge
    Our memberships
    RIPE NCC - Ripe Network Coordination Centre Women in Games
    v1.30.0-168-g6f64a707 © 2025 marbis / Nitrado USA, Inc.. All rights reserved. All prices are shown as gross prices and include VAT.