well that particular time obviously doesn't classify as majority, unless you imply I'm stupidAlchera wrote:It was mesra.* and stupidity (a majority of the time) usually results in nicks being stolen.demond wrote:and registered an alternative nick for myself only to keep my channel from expiring (after my nick and my bot's nick got stolen on the malaysian server
so I don't classify as user, although I use mIRC and run a bot?Users register their nicks. It does not matter one iota if they are online 24/7 or not or whether it's a bot or not. There's not one mIRC/XChat user that does not use an autoidentify script of one sort or another and there's not one eggdrop owner that doesn't want the same ability for their bot, especially if they have the advantage of services on their network.demond wrote:anyway, registering a nick of an entity which is supposed to be 24/7 on IRC (i.e. bot) for the sake of registering itself is lame (hello? you are *always* on IRC already!)
This happened to me twice in one week. For which I burst a vein and started to improvize. To my notice they argued over it over a long while and in the end told me I was innocent and the akill was not placed against me. Both the times major ips on my public shell box were akilled because of someone else. I contacted the team heads, for which in return I was filed in for oper harrasment which lead to my nick being frozen for 20 days. So all I can say here is, ircop's suck, especially on DALnet. Majority of them are very unexperienced and really know very little about what they are using and how it is actually functioning.As for the DALnet IRCOps, what can be said? They are what could be termed "a little over enthusiastic" most of the time which is a problem when their servers stuff up and you find yourself akilled for being a "channel filler bot".
right, but that's not really relevant to the subject here; I've been using computer passwords in the right(tm) way long before DALnet was even created, so to imply that particular incident was caused by password misuse is ridiculous - I have enough brains not to send my password inadvertently to services impersonator or a query/channel window (and oh, I don't use autoidentify scripts and my home computer/network has never been hacked)Alchera wrote:As with all things care has to be taken. I store any pass I use in a text file outside of my IRC clients' install folder and use a simple alias to read it as required. Little things like that and always using the status window for any communication with services really help cut down problems.
also, somewhat irrelevant; IRCops have nothing to do with the server itself, the admin does; an IRC server can only be compromised by its admin(s) (or the monkey that has possibly hacked it)As for the DALnet IRCOps, what can be said? They are what could be termed "a little over enthusiastic" most of the time which is a problem when their servers stuff up and you find yourself akilled for being a "channel filler bot".
i already make thisawyeah wrote:I recommend not to use this:
Just set it as:Code: Select all
.chanset #chan need-op putserv "nickserv identify $nspass"; putserv "chanserv op #chan $botnick"
Because, my bot has gotten akilled alot of times for flooding services when it was mistakenly deoped. Also had gotten it's nick frozen for SAbuse later onwards, so I wouldn't recommend using any of those need-* functions, especially need-op and need-unban.Code: Select all
.chanset #chan need-op { }
The only wise thing is to detect a nickserv notice, and then only identify once to it. After identification notice is received you can then go ahead and make the bot reop itself on all channels by using a 2-3 line simple procedure.
The script I gave above should work fine, just use that.
Code: Select all
.chanset #chan need-op putserv "nickserv identify $nspass"; putserv "chanserv op #chan $botnick"
Code: Select all
.chanset #chan need-op