У нас вы можете посмотреть бесплатно Stay Safe on WoW Private Servers: Essential Security Tips After Turtle WoW Leak! или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In light of the recent Turtle WoW hack/leak, it's more important than ever to ensure your security while playing on World of Warcraft private servers and navigating the internet. In this video, I share essential tips to protect your account and personal information, not just for WoW but for your online activities in general. Learn how to use unique passwords, burner email addresses, VPNs, and more to stay safe and secure. Don't forget to like and comment and subscribe! ;) Edit: Since doing this video, I've been contacted by a couple of nice people. As mentioned in the video, I am not a security expert by any stretch of the imagination. My knowledge is self-taught, and regarding the private server scene, I worked on a couple of projects doing CM (Community Manager), GM (Gamemaster), and a bit of admin work as well. This included helping organize events, forwarding suggestions, talking with concerned or even angry players, hunting bots, cheaters, answering tickets in-game and more. A good password manager should do the trick; it also makes it pretty easy to create new passwords and store them, so you don't have to memorize everything. Regarding VPNs, according to the person I spoke to, they don't really help that much anymore, since Warden will show your local IP address and other data regarding your PC. By "burner email addresses," I mean an email that you use just for specific purposes, hence why I mentioned Gmail. There is a program called GlassWire, which is free and will show you what processes send data and where it's going (instantly see your current and past network activity, detect malware, and block badly behaving apps). Here would be a link to the program: https://www.glasswire.com/ Regarding the RCE exploit, I get conflicting information. Some people claim 1.12 - 3.3.5 clients are at extreme risk, while others say that you cannot silently update 1.12 and 2.x.x clients, or that the highest damage one could do is delete client data. However, 3.3.5 clients can be exploited since that's how Blizzard kept Warden up-to-date without needing to push actual patches back in the day. Here is a link: / warning_rce_exploit_in_335_game_client which has a patch for the 3.3.5 client that claims to patch RCE on 3.3.5 clients. Using a patcher of some sort can be much more damaging; however, normally, your Windows and/or antivirus should pick up on that, so keep your security software up-to-date. I really want you guys to be safe, so please take care—there's nothing wrong with looking out for yourself. This video was not made to be malicious; quite the opposite. Take care, guys, and thank you very much to the kind people who reached out to me! Music used: Skyrim OST #worldofwarcraft #worldofwarcraftclassic #security