How to prevent getting keylogged
Your d2jsp account is under your responsibility, so if you lose your account, d2jsp will not refund your fg or items.
There are some rules you can follow:
Phishing link: phishing is an attempt to criminally acquire sensitive information, such as user names, passwords and credit card details by making fake links to already existing sites. It is the most commonly used method on these "free giveaway", or "I'm quitting, free items" type sites.
A phishing link will always have a different URL (internet address) than the "real" link. Example: instead of www.d2jsp.org it will be www-d2jsp-org, notice it's not dots. Always check the URL in the address bar of your browser very carefully, and make sure you are on the correct site. If a site is requesting you to login to do something, close the browser and go back to that site by manually typing the known real address to ensure you are on the real site! If a site is giving away something free, but requires a login, it's probably trying to steal your account(s)!
You need to pay special attention whenever you see "Free Giveaways" that requires you to login to get what is being given away. These are almost always designed and used to steal your account(s). Never put in your information on these pages, even if it looks like d2jsp, battle.net or any other known site. Some sites are created with the sole purpose of stealing accounts, with no other purpose!
PM A MODERATOR AS FAST AS YOU CAN TO TAKE CARE OF THESE and do NOT quote the link saying reported or any such thing.
Any link that makes you log into the site is a scam to steal your account.
** Note: the site www.d2jsp.com is property of d2jsp.
How to clean your computer of keyloggers/spyware
Before telling you how to get rid of them, please remember to change all your personal information after you got rid of them.
If you bought something with a credit card, call the company right now.
Do it for everything that is personal information, including passwords. For d2jsp related information, see the section "How to restore your account status" below.
The best way to remove them is to format.
Link to download: https://www.download.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html?tag=dl.1&cdlPid=10876030
Step to using Malwarebytes-Anti-Malware:
Spybot Search & Destroy
Link to Download: https://www.safer-networking.org/en/mirrors/index.html
Steps to using Spybot S&D:
Link to Download: https://www.download.com/Ad-Aware-2007/3000-8022_4-10045910.html?part=dl-ad-aware&subj=dl&tag=top5&cdlpid=10045910
Ad-Aware is similar to Spybot S&D, but multiple programs have different detection algorithms so it is a good idea to have at least two. I have not used Ad-Aware, but from watching friends it is very user friendly.
Steps to using Ad-Aware:
It really couldn't get any simpler. Click Update to update your list of malicious files and search to find them! You can specify the details of your search to fit your preferences.
Link to Download: https://www.download.com/AVG-Anti-Virus-Free-Edition/3000-2239_4-10320142.html?part=dl-AVGAntiVir&subj=dl&tag=button&cdlpid=10760089
** Note: Many people believe this to be excellent free anti-virus software. I have never used it, and I cannot vouch for it. If you are interested in using this system, research it first.
ZoneAlarm (for more experienced Windows users)
Link to Download: https://download.cnet.com/ZoneAlarm/3000-10435_4-10039884.html?part=dl-69168&subj=dl&tag=button
** Note: You should download this program only if you have some basic (or better) computer knowledge. ZoneAlarm is a firewall program and blocks ALL traffic on your PC. It will prompt you each time a new or "untrusted" program requires access to sensitive files or the internet. You can customize a list of programs that will always have access, but this program is not for the beginner.
Steps to using ZoneAlarm:
** Note: These are websites to scan specific file. I suggest you to get a real anti-virus and only use those if needed.
I recommend Kaspersky 7.0, I used it for few years now and never had a virus during this time.
How to restore your account status
First of all, you are the one who got keylogged so don't blame any user on this website.
If you have been keylogged, use the information in the previous section to rid your computer of malware before logging into d2jsp and doing any of the following. If there are keyloggers still on your computer, you are still providing information to the hacker.
Changing your forum password and forum gold password
It is highly recommended to change your passwords to ensure that the person who keylogged you no longer has access to your d2jsp account.
You can reset your passwords with the following links in the left menu of your Settings.
Change Gold Password
If the hacker changed your forum password and/or gold password
If you don't know your current password, you won't be able to change it. If you still have access to your registered email account, you can request a password reset on the respective "Change Password" link above.
** Note: if you lost access to your registered email address, you will need to use the account recovery form (see below).
Recovering your d2jsp account
If the hacker changed your registered email address, you can use this form to recover the account: https://forums.d2jsp.org/recovery.php
** Note: if you get no reply to your account recovery request for a long time, you can try to get help here: https://forums.d2jsp.org/contact.php
Changing the password to your registered email account
You should also change the password to your registered email account, since it can be used to regain access to your d2jsp account.
If you got warned
You will need to follow the normal warn removal process: The Warn System.
If you got locked and/or scammer tagged
Read the How Do I Get Unlocked? topic and post in the Why Am I Locked? forum.
I lost XXX forum gold
Check your gold logs and post in the Scammer Accusations forum. You might not get your fg back, but you will help the moderators catch the user who keylogged you.
Avoiding security risks
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
Trojans are programs that install themselves or run on the victims machine. They do not install or run automatically, but may trick a user to install or run the infected file/program.
A computer worm is a self-replicating computer program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program however, a worm is self-contained and does not need to be part of another program to propagate itself. They are often designed to exploit the file transmission capabilities found on many computers.
Spyware is computer software that collects personal information about users without their informed approval. Personal information is secretly recorded with a variety of techniques, including logging keystrokes, recording Internet web browsing history, and scanning documents on the computer's hard disk.
Keystroke logging (alot of the time called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. Keyloggers are widely available on the Internet [so be very carefull] and can be used by private parties to spy on the computer usage of others.
In addition to following the advice in the section "How to avoid getting keylogged" above, you can use various security software to protect your computer from getting infected with malware.
The First thing for protecting yourself is with a firewall, they are a security device which is made to permit, deny or proxy data connections set and configured by the organization's security policy. They disable the transmission of data without the users permission as well as stop an unauthorized user gaining access to your computer.
Windows has a firewall, but some things it cannot detect. That is the reason why we use real firewalls.
There is A LOT more than this, if you browse https://www.download.com, you will find many more.
Just because you have a firewall, don't think for a second you're safe. Firewalls block a lot of things but for the things that do get into your computer you're going to need an anti-spyware program that can kill the spyware on your system.
Things like spyware are obtained from a range of sources including emails, and websites especially those adult ones. Below is a list of anti-spyware to destroy these nasty files.
Now you have 2 of the 3 components to protect your computer, let's get the last component. Anti-viruses!
Once you have all these, your computer is protected. You SHOULDN'T get any viruses and if you do, if you scan your computer often, you should pick those viruses up.