Page 2 of 2 FirstFirst 12
Results 16 to 23 of 23
  1. #16
    ☬Ξη†τσρîζ Ζσ♍βîε δτσηε☬
    Former Staff
    Premium Member
    Lehsyrus's Avatar
    Join Date
    Aug 2009
    Gender
    male
    Location
    Jersey
    Posts
    10,899
    Reputation
    1281
    Thanks
    3,065
    We can't verify anything without proof. We need a screenshot of the alert, a copy of the updated hack, etc. Word of mouth proves nothing.

  2. #17
    Riddick's Avatar
    Join Date
    Oct 2012
    Gender
    male
    Location
    Delusional
    Posts
    7,732
    Reputation
    529
    Thanks
    5,134
    My Mood
    Devilish
    Quote Originally Posted by Lehsyrus View Post
    We can't verify anything without proof. We need a screenshot of the alert, a copy of the updated hack, etc. Word of mouth proves nothing.
    Understand this! Now we have all the script and have pulled it apart yesterday, it did come from the connectivity source.............. It got as far as the old Interpol spammer html and the fine warning. There is no keylogger, but a connection attempt was made. My Alienware has now been cleaned so no more event history................

    There is no evidence to put forward on my behalf, and I am not inciting anyone on this forum.

    Infidels!!!!
    Last edited by Riddick; 01-23-2013 at 05:14 AM.

  3. #18
    rhenen3's Avatar
    Join Date
    Jul 2012
    Gender
    male
    Posts
    234
    Reputation
    10
    Thanks
    164
    this is disrescpect full for CCman's work delet e this thread....

  4. #19
    ledimiku's Avatar
    Join Date
    Sep 2011
    Gender
    male
    Posts
    282
    Reputation
    10
    Thanks
    26
    My Mood
    Angelic
    ccman were are you bro i need you

  5. #20
    Jabberwock's Avatar
    Join Date
    Jun 2012
    Gender
    male
    Posts
    1,660
    Reputation
    191
    Thanks
    14,482
    My Mood
    Relaxed
    In no way it's a keylogger. I vouch for him 100%.

    it's suspected as a keylogger for the following reasons:
    1) It connects to the internet(To download. Not upload)
    2) it checks for key input.

    As you can see it has the characteristics of a keylogger. That's why some anti-viruses treat this as a keylogger.

    He made the internet connectivity to check if you are in the same room as he is. And if it's true, the hack won't work.

    Also, he doesn't know currently how to even build a keylogger. So stop spouting nonsense.
    Even familiar landscapes will
    reveal a different kind of beauty
    if you change your viewpoint.
    Where these new encounters
    and new bonds will lead you...
    Such dazzling golden days.
    I, too, look forward to
    what I might behold.

  6. #21
    albe1998's Avatar
    Join Date
    Jun 2012
    Gender
    male
    Posts
    6
    Reputation
    10
    Thanks
    0
    My Mood
    Doh
    My antivirus detect the same keylogger i think that ccman is trying to infect us, and the most curious, when i download and my antivirus detect i clean the file ok? and the next day I tried to enter to my ava account and someone change my password, i changed again and I can to enter AVA, but i think that CCMAN is trying to steal our accounts, so be carefull. PS: SORRY MY ENGLISH XD

  7. #22
    soulnite12's Avatar
    Join Date
    May 2012
    Gender
    male
    Posts
    573
    Reputation
    21
    Thanks
    444
    My Mood
    Daring
    the dude did not try to steal your accounts why the hell would he do that this guy tried to help you noobs not get beaten all the time and then bam you noobs go on a kill spree in the pvp channel and just because he has a key logger dont mean it was meant to be bad he did not steal your accounts and it was just a failsafe just in case you smarts went kill bsing around

  8. #23
    Prepix's Avatar
    Join Date
    Jun 2012
    Gender
    male
    Posts
    5,965
    Reputation
    117
    Thanks
    1,375
    /closed to prevent spam.

Page 2 of 2 FirstFirst 12

Similar Threads

  1. How do I hack Warrock now that they detect Cheat Engine 5.5?
    By apocalypsist in forum General Hacking
    Replies: 3
    Last Post: 03-30-2012, 06:56 PM
  2. Can someone send me a hack shield bypass that works?
    By fishout in forum Combat Arms Hacks & Cheats
    Replies: 1
    Last Post: 04-15-2009, 05:04 PM
  3. Memory Hacking (the ones that works/doesn't work)
    By Kuro Tenshi in forum Combat Arms Europe Hacks
    Replies: 2
    Last Post: 04-12-2009, 03:36 AM
  4. How come there are no NA Public hacks on MPGH that work?
    By aa56 in forum Combat Arms Hacks & Cheats
    Replies: 3
    Last Post: 03-05-2009, 12:24 AM
  5. Zeims Hacks SUCK @ KEYLOGGER
    By Sensei_Kenji in forum WarRock - International Hacks
    Replies: 9
    Last Post: 07-15-2008, 07:27 AM