• Dont use fake names in social media

    Posted by Ty on October 8, 2021 at 8:43 am

    If your name is fake and might matches with some wanted person

    Khillat replied 3 years, 1 month ago 5 Members · 4 Replies
  • 4 Replies
  • Zuckerberg

    Member
    October 8, 2021 at 9:29 am
    Newbie

    A misdemeanor fake ID crime can bring up to a year in jail as a possible sentence.

  • Lucas

    Member
    October 9, 2021 at 3:55 am
    Newbie

    I don’t want people knowing my true identity, I also use a fake name because of paranoia of having my identity stolen.

    • This reply was modified 3 years, 1 month ago by  Lucas.
  • Dolly

    Member
    October 9, 2021 at 3:28 pm
    Newbie

    I hate people who use fake names and fake photos in social media because my sister was a victim I shared from Philippines. Now I am very happy to see you share this.

  • Khillat

    Member
    October 13, 2021 at 8:42 am
    Newbie

    Ehh you right, guys this also takes place in people whom are forex Traders ,not originally them ,but people who create a Duplicate page in order to scam people money,the give in money thinking it’s the Original owner of the account

Log in to reply.

Trustscore

Domain: dropbox.com

Established: 1995-06-28

Server IP Address: 205.251.193.59

Domain Blacklisted: No

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that blocks all malicious elements (email addresses, websites users, …)

Suspended Site: No

When your website account is suspended, it means the hosting provider has temporarily taken it offline. Website hosts often suspend websites for a myriad of reasons ranging from malware to spam.

Email (MX) Configured: Yes

Verification that the website has its entity’s proper IMAP (Inbox) and SMTP (Outbox) mailbox servers configured correctly.

DMARC Configured: Yes

DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC), and other email-based attacks.

SSL Cert Blacklisted: No

Hackers have discovered ways to circumvent, alter, or abuse SSL certificates. An SSL certificate blacklist is a list of untrustworthy SSL certificates that have been created and can potentially harm users.

Website Popular: No

Risky TLD: No

The TLD (Top Level Domain) are the last characters of an entity’s website name, such as .com, .org, etc. Cyber-criminals and threat actors prefer a small set of 25 out of the thousands of available extensions, which accounts for 90% of all malicious sites. A Risky TLD is verification that the domain name is not to be trusted.

Heuristic Pattern: No

If a website uses Heuristics, then it is a scanning method that looks for malware-like behavior patterns. It is commonly used to detect new or not-yet-known malware.

Risky Geolocation: No

Verification to an entity’s geolocation status being labeled as ‘Risky’.

Suspicious Domain: No

Verification the entity’s domain is not listed as being “Suspicious”.