If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
I wish you the best of luck in finding the cyber-criminal, i think that it could be easy to find the person based on their IP, what i would like to know if the person that "pretends" to be you, its the same person that insulted you on youtube under my Megs Name (advancedetail) ? i have been looking also for any more posts under any of my forum names but havent found anything more, it seems like he used advancedetail on youtube only to make that coment
-Nelson
Nelson Zapata - Advance Detail - Detailing and Auto Reconditioning in Santiago Chile.
Tim, I hope they catch this criminal and prosecute them to the fullest extent of the law. Someone like you who is very experienced and knows car care/detailing more than most, shouldn't have to go through nonsense like this, where someone can try to hurt your highly experienced reputation.
This thread is a good reminder that using your full name as your login isn't THAT good of an idea. I know some say it is a good thing from a marketing perspective, bit when situations like this occur, I like to err on the side of anonymity.
Tim: Have you contacted the forum webmaster to locate an IP for this person?
NOTE: Post count does not reflect actual detailing knowledge.
This thread is a good reminder that using your full name as your login isn't THAT good of an idea. I know some say it is a good thing from a marketing perspective, bit when situations like this occur, I like to err on the side of anonymity.
Tim: Have you contacted the forum webmaster to locate an IP for this person?
This is a good suggestion.When I used to admin in network security, sometimes moderately smart hackers and spammers would disguise their IP's by running them through dummy routers or devising an IP alias, or they might use multi-homed NIC's to offer a spread of different IP addresses. Others would hack an unprotected workstation on an unsecured network and "zombie" or slave the workstation and use their NIC address to mask their own.
However, most are simply too lazy or don't have the chops to pull this off, so contacting the admin of the forum is still a solid first step.
Comment