Help:Compromised accounts/es: Difference between revisions

From WickedGov Meta-Wiki
Jump to navigation Jump to search
translate
 
translate
Tag: Mobile
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
<languages/>
<languages/>
{{information page}}
{{information page}}
'''Cuentas comprometidas''' son cuentas que hayan hackeadas por personas otro que sus dueños correctos.  
'''Cuentas comprometidas''' son cuentas que han sido hackeadas por personas otro que sus dueños correctos.  


<div lang="en" dir="ltr" class="mw-content-ltr">
<div lang="en" dir="ltr" class="mw-content-ltr">
Line 27: Line 27:
</div>
</div>


<div lang="en" dir="ltr" class="mw-content-ltr">
Todos los usuarios pueden hacer ciertos acciones para impedir cuentas comprometidas. Estas acciones incluyen:
All users can take certain actions to prevent their accounts from being compromised. These include:
</div>


<div lang="en" dir="ltr" class="mw-content-ltr">
<div lang="en" dir="ltr" class="mw-content-ltr">

Latest revision as of 03:28, 10 March 2025

Cuentas comprometidas son cuentas que han sido hackeadas por personas otro que sus dueños correctos.

Response

If you notice a compromised account, contact the Stewards. This can be done either at Stewards/Requests/Global or by email to stewards@wickedgov.org. The Stewards will globally lock the account to stop any abuse and prevent the account's settings from being changed. They may also remove any advanced privileges from the account.

After the account has been locked, system administrators may investigate further, such as by using CheckUser to confirm that the account is compromised.

Recovery

In some cases, it may be possible to recover a compromised account. If your account has been compromised, and you wish to recover it, contact system administrators at info@wickedgov.org.

Prevention

Todos los usuarios pueden hacer ciertos acciones para impedir cuentas comprometidas. Estas acciones incluyen:

  • Choosing a strong password that is not shared across other websites.
  • Enabling two-factor authentication (this step is required for certain privileged users).
  • Avoiding use of untrusted public computers.