Everything posted by asterix
-
Bitmap Class
Well for starters you're missing a semicolon after then } in your class declaration.
-
v0dka's leet hurricane sailing thing
Does this mean a cake-baking slot is now open?
-
Hmm... Why isn't this working?
You realize buffer is being passed as a parameter right? It would have a value when it's first pushed onto the stack, even before the function is called. Unless you worded the post incorrectly, I think the problem lies elsewhere in your code.
-
A Theory
Well, I was hoping for more thoughts from you intelligent people than "it doesn't just work like that". I'm pretty sure someone has thought of it before, since almost EVERYTHING has been thought of before, but I'm wondering why it was not pursued as an option. I'm going to experiment with some of this stuff later on one of my VMWare installations.
-
A Theory
In theory yes, as there'd be no way for the client-side scans to detect running processes scanning another process's memory. The scan wouldn't be able to detect a "compromised" system, since it would have to use the compromised system's API functions to scan itself.
-
A Theory
I'm sure most of you have heard of "rootkits". They've been around forever for Linux/UNIX (as a linux/unix box is more likely to be a dedicated server), but are becoming increasingly popular on Windows to hide files/processes from things like anti-virus/spyware scanners. I haven't done any really in-depth research about how things like Punkbuster and VAC work, but I can safely guess that they have to work using client-side Win32 API functions. :shifty: Say you wrote a program to modify every possible Win32 API function that can find/open a handle to an existing process so that it can NEVER attach to randomhack.exe, (in theory) there is NO way that any sort of client-side scan (like VAC) would be able to detect the process running. I realize that this wouldn't work for loaders, but programs that are entirely 3rd party and rely on memory scanning/rewriting would be perfect candidates. If existing Windows rootkits can hide themselves and their processes/files from Norton and other "hardcore" virus-scanners, why hasn't this avenue been explored for game hacking? (Or has it?) I realize that modifying your system kernel isn't exactly easy (on windows anyways, heh), but this seems like it could be worth exploring. What do you think?
-
call of duty 2 demo out now
Just what we need, another WW2 game. :shifty:
-
my cake for myg0t
http://img164.imageshack.us/img164/8616/cake6na.png I suck at photoshop, but I gave it a shot lol
-
fished eye girl who is in love with herself
Hit it and deny it. :wow: And then post pics because we won't believe you
-
[CS1.6]Crashing everyone's CS window in a server.
rifl It's funny to do this then refresh the server browser and see the users on the server gradually drop down to zero. :D
-
EA patches madden
EA are fucking geniuses, I swear.
-
Need a bit of help: Free Online Games
Unfortunately, free games generally have low-to-no budgets or are 1 or 2 man operations. I think your expectations are a bit high for free games. You're not going to see professional quality artwork/visuals in a free game, with a few exceptions, like Enemy Territory (back in the day) and America's Army.
- Classic view or Enhanced
-
v0dka & chubr0ck's big bf2 rage
You must be an expert, with almost 1000 posts in 3 months. :shifty:
-
My Webpage
dreamweaver and photoshop do not a good website make :|
-
my cake for myg0t
hahahahahahahaha btw minkey your sig fucking owns
-
why does this use up 100% of CPU? (C++ code)
Who cares, you're just sending stuff to stdout, how you do it doesn't matter. There isn't REALLY that great a difference between C++ and C anyways. Besides, every cross-platform app I've ever looked at has used stdio instead of iostream. And gj @ bumping a dead discussion.
-
ap java proggraming
CGI binaries can't be written in cpp? I know what you mean though. :naughtyd:
-
osX86 on PC
Wikipedia explains it clearly, "It is based on the Mach kernel and the BSD implementation of UNIX". That alone makes it 100x better than Windows. :shifty: And FYI, everything on the 127. range (127.0.0.1 -> 127.255.255.255) is loopback (in regards to your "location") I also tried this (OSx86) a while ago, but the kernel panicked and documentation for it was rather non-existant, so I decided I would try it again some time in the future.
-
video capturing
Yeah, that was it
-
some footage of the new far cry engine
Looking pretty sweet I must say
-
How to change IP
DHCP is Dynamic Host Control Protocol, it's used to assign private IP addresses to devices BEHIND the router. Your external, ISP-assigned IP address (which you can determine at places like http://whatismyip.com ) is what would be banned from a forum or messageboard. Changing the IP you're assigned behind your router (probably 192.168.x.y) won't let you ban evade. What you're looking for is an HTTP proxy, like those found at http://samair.ru/proxy/
-
video capturing
I believe the command to dump a bitmap for each frame is "startmovie" if you wanted to try that way. You'll have to find a program that can merge a bitmap sequence. I can't remember the name of the one I used a while back, but I'm sure you could easily google for "half life video tutorials" or something.
-
video capturing
For Half Life-based games, it's better to record a demo using the "record" command when you're playing, as Fraps will rape your system when it's dumping raw AVI data to your drive. When you're done, you can playback the demo and set your max fps via the console to whatever you want to record at, and either use fraps or dump a bitmap each frame then merge them at the end. Then edit and encode.
-
simple visual basic aimbot: for most fps games
I know, I was telling him. :rolleyes: