Step One Taking out the easy way The easiest and most simple way to hack any board is through there archive menu, where you can manipulate and work with temporary zip files. From here you can activate an ANSi Bomb to format the Hard drive, or do many other things. One being, making yourself file with users.dat and users.idx in it. Not a good thing. With this, they have users, info, passwords, not to mention yours, and they can do anything. Your at the mercy of the hacker. Which is not a good thing, so to take out the easiest way, DISABLE the Archive menu, from all users, and probably co-sysops. Even your own account should not have access, because all your archive manipulation can be done in dos. Step Two The Secret Jump This is the secret jump technique used to jump from place to place. The one way to stop this is to assign Security Levels TO every menu, and every important commands. Most likely all of the commands. This prevents this from happening and the unlikely chance of them jumping to your sysop menu. Step Three The Co-Sysop Make sure you fully trust and know your sysops. They can be the one who leaks the password, or even hacks the board. Don't give them access to the menu editor, or Pseudo Dos, as they can fuck up your HD real easy. Trust them, but still be weary of them. Step Four The MCI Codes MCi codes are Renegades one default. Many things can be done with MCi manipulation, so for this there is one way to prevent it. Use my handy batch file included in this. It does not prevent them from crashing the system, but it does reload it and hang them up. All safety. It also notifies you. Very important. Very Deadly. Step Five Viruses The struggling hacker might prove to be a real idiot sometimes. And this might include them uploading a virus. And if you are unlucky enough to run it. BOOM....so run a virus check on everything. Step Six Sysop Passwords Make sure sysops use passwords that are 100% original and that they change them at least every 15 days. That will keep the hacker from getting these passwords. Especially the sysop password. Step Seven QWK System Several methods of hacking can be done from here. None are potentially dangerous and the batch file should handle it fine. Step Eight End Well as of now, I can't think of any more, so that's about it. This is version 1.0B and I will be writing updates as more bugs are found. As for now, good luck... Ear Please contact me on CoD with any questions. +1(714)282-7644 Handle: Support Password: Support