Jump to content

hellreturn

Management
  • Posts

    2836
  • Joined

  • Last visited

  • Days Won

    53

Everything posted by hellreturn

  1. 11 downloads

    Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and offers new satchel/crane control exploit fix. Fixes wm_endround waitstate.
  2. File Name: Supplydepot - alternate script File Submitter: hellreturn File Submitted: 11 Aug 2011 File Category: Map Scripts Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and removes the satchel/crane control exploit fix. Fixes wm_endround waitstate. Players will no longer bounce into invisible walls, but the satchel exploit is possible with this script! This version was requested by GA for competition and the desire to play with no playerclips in the passages. Click here to download this file
  3. 7 downloads

    Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and removes the satchel/crane control exploit fix. Fixes wm_endround waitstate. Players will no longer bounce into invisible walls, but the satchel exploit is possible with this script! This version was requested by GA for competition and the desire to play with no playerclips in the passages.
  4. File Name: Supplydepot File Submitter: hellreturn File Submitted: 11 Aug 2011 File Category: Map Scripts Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and offers new satchel/crane control exploit fix. Fixes wm_endround waitstate. Click here to download this file
  5. 14 downloads

    Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and offers new satchel/crane control exploit fix. Fixes wm_endround waitstate.
  6. Time to steal u PC tosa!
  7. woho!! My feedback got checked! I got to check it!! Yoohooo!
  8. Fake Fanboi making video of it.. or that's how i see it.
  9. If you bought the key using paypal and it's within last 30 or 90 days you can still file fraud charge and get your money back.
  10. I don't think US will in near amount of time frame. Most of the things.. Manufactured in China.
  11. File Name: Jaymod File Submitter: hellreturn File Submitted: 03 Aug 2011 File Category: Mods Enemy Territory Mod - Jaymod Click here to download this file
  12. hellreturn

    Jaymod

    Version 2.2.0

    121 downloads

    Enemy Territory Mod - Jaymod
  13. IT security firm McAfee claims to have uncovered one of the largest ever series of cyber attacks. It lists 72 different organisations that were targeted over five years, including the International Olympic Committee, the UN and security firms. McAfee will not say who it thinks is responsible, but there is speculation that China may be behind the attacks. Beijing has always denied any state involvement in cyber-attacks, calling such accusations "groundless". Speaking to BBC News, McAfee's chief European technology officer, Raj Samani, said the attacks were still going on. "This is a whole different level to the Night Dragon attacks that occurred earlier this year. Those were attacks on a specific sector. This one is very, very broad." Dubbed Operation Shady RAT - after the remote access tool that security experts and hackers use to remotely access computer networks - the five-year investigation examined information from a number of different organisations which thought they may have been hit. "From the logs we were able to see where the traffic flow was coming from," said Mr Samani. "In some cases, we were permitted to delve a bit deeper and see what, if anything, had been taken, and in many cases we found evidence that intellectual property (IP) had been stolen. "The United Nations, the Indian government, the International Olympic Committee, the steel industry, defence firms, even computer security companies were hit," he added. China speculation McAfee said it did not know what was happening to the stolen data, but it could be used to improve existing products or help beat a competitor, representing a major economic threat. "This was what we call a spear-phish attack, as opposed to a trawl, where they were targeting specific individuals within an organisation," said Mr Samani. "An email would be sent to an individual with the right level of access within the system; attached to the message was a piece of malware which would then execute and open a channel to a remote website giving them access. "Once they had access to an organisation, they either did what we would call a 'smash-and-grab' operation, where they would try and grab as much information before they got caught, or they sometimes embedded themselves in the network and [tried to] spread across different systems within an organisation." Mr Samani said his firm would "not make any guesses on where this has come from", but China is seen by many in the industry as a prime suspect. Jim Lewis, a cyber expert with the Centre for Strategic and International Studies, was quoted by the Reuters news agency as saying it was "very likely China was behind the campaign because some of the targets had information that would be of particular interest to Beijing". Experts warned that commercial espionage was a bigger threat to business than Lulzsec and Anonymous. "Everything points to China. It could be the Russians, but there is more that points to China than Russia," Lewis said. However, Graham Cluley - a computer-security expert with Sophos, is not so sure. He said: "Every time one of these reports come out, people always point the finger at China." He told BBC News: "We cannot prove it's China. That doesn't mean we should be naive. Every country in the world is probably using the internet to spy. "After all, it's easy and cost-effective - but there's many different countries and organisations it could be." Mr Cluley said firms were often distracted by the very public actions of LulzSec and Anonymous, groups of online activists who have hacked a number of high-profile websites in recent months. "Sometimes it's not about stealing your money or publicly leaking your data. It's about quietly stealing your information, which can have a very high political, military or financial value. "In short, don't let your defences down," he added. Source: BBC Click here to view the article
  14. IT security firm McAfee claims to have uncovered one of the largest ever series of cyber attacks. It lists 72 different organisations that were targeted over five years, including the International Olympic Committee, the UN and security firms. McAfee will not say who it thinks is responsible, but there is speculation that China may be behind the attacks. Beijing has always denied any state involvement in cyber-attacks, calling such accusations "groundless". Speaking to BBC News, McAfee's chief European technology officer, Raj Samani, said the attacks were still going on. "This is a whole different level to the Night Dragon attacks that occurred earlier this year. Those were attacks on a specific sector. This one is very, very broad." Dubbed Operation Shady RAT - after the remote access tool that security experts and hackers use to remotely access computer networks - the five-year investigation examined information from a number of different organisations which thought they may have been hit. "From the logs we were able to see where the traffic flow was coming from," said Mr Samani. "In some cases, we were permitted to delve a bit deeper and see what, if anything, had been taken, and in many cases we found evidence that intellectual property (IP) had been stolen. "The United Nations, the Indian government, the International Olympic Committee, the steel industry, defence firms, even computer security companies were hit," he added. China speculation McAfee said it did not know what was happening to the stolen data, but it could be used to improve existing products or help beat a competitor, representing a major economic threat. "This was what we call a spear-phish attack, as opposed to a trawl, where they were targeting specific individuals within an organisation," said Mr Samani. "An email would be sent to an individual with the right level of access within the system; attached to the message was a piece of malware which would then execute and open a channel to a remote website giving them access. "Once they had access to an organisation, they either did what we would call a 'smash-and-grab' operation, where they would try and grab as much information before they got caught, or they sometimes embedded themselves in the network and [tried to] spread across different systems within an organisation." Mr Samani said his firm would "not make any guesses on where this has come from", but China is seen by many in the industry as a prime suspect. Jim Lewis, a cyber expert with the Centre for Strategic and International Studies, was quoted by the Reuters news agency as saying it was "very likely China was behind the campaign because some of the targets had information that would be of particular interest to Beijing". Experts warned that commercial espionage was a bigger threat to business than Lulzsec and Anonymous. "Everything points to China. It could be the Russians, but there is more that points to China than Russia," Lewis said. However, Graham Cluley - a computer-security expert with Sophos, is not so sure. He said: "Every time one of these reports come out, people always point the finger at China." He told BBC News: "We cannot prove it's China. That doesn't mean we should be naive. Every country in the world is probably using the internet to spy. "After all, it's easy and cost-effective - but there's many different countries and organisations it could be." Mr Cluley said firms were often distracted by the very public actions of LulzSec and Anonymous, groups of online activists who have hacked a number of high-profile websites in recent months. "Sometimes it's not about stealing your money or publicly leaking your data. It's about quietly stealing your information, which can have a very high political, military or financial value. "In short, don't let your defences down," he added. Source: BBC
  15. Let's do remote desktop over the weekend because on my IE 8, I tried like 5 times and it's working for me. On my job PC I use IE 8 and at home IE 9. On both ones it works perfectly fine for me. I need to view in live to see what's wrong because I can't fix something which I can't recreate. May be somewhere my IE 8 settings are different.
  16. I dunno how can u replace files without stopping server.. never tried that.. if u don't have access to stop server, it's very odd host. The best way would be to: 1. Stop server. 2. Delete old files. 3. Upload new one. Well that's what I do.
  17. Can you trying deleting your browser cache and see if it's working or not?
  18. I replied to your question/concern in that topic. Thank you.
  19. The other one is bit bigger because it also includes geoip.dat inside it. For me it's same name. Tosu, what browser do you use?
  20. After banning many Google+ accounts over the weekend that they assumed weren't using real names, Google offers an explanation and some work arounds. The latest and fastest growing social media network has a strict policy to use their first and last name for those who sign up. This has created an identity problem for many users who are often known by nicknames, maiden names or internet handles they've used for years to post on various forums or blogs. It's also a headache for those whose real names often contain commonly offensive words. Those that have tried to manipulate the First and Last name fields in the sign-up process to accommodate those alternate identities have found their Google+ account suspended. Google's VP of Google+, Bradley Horowitz, announced that the policy is currently under review. In the meantime, Google will be giving offending Google+ accounts a warning first, before suspending. If the account is suspended, it only applies to Google+ and not all Google products (i.e. Gmail, Google Docs, etc.) These new rules only apply to people who have made the mistake of trying to use nicknames when signing up for the service. Those who are using the naming process to spam or abuse the service will be treated more harshly. Horowitz goes on to present some ways users can use nicknames so that others may find their Google+ account. You can add nicknames to the "Other names" section of your Google+ profile. To do this, click on the Profile icon at the top of your Google+ page. Then click the blue Edit Profile button to the right of your name. Scroll to the bottom to find the "Other names" section. Right below that you will see the option to allow your Google profile to be visible via search. Be sure to enable that so others can find you via the nickname you are entering. The bigger question is if Google's stance on using you real name for Google+ is necessary. Google claims that insisting on real names makes it easier for others to find you and stops people from registering with offensive names or names meant to harass others. On the other hand, your real name may not be how you are primarily known so registering with it defeats the purpose for those users. Source: Zdnet Click here to view the article
  21. After banning many Google+ accounts over the weekend that they assumed weren't using real names, Google offers an explanation and some work arounds. The latest and fastest growing social media network has a strict policy to use their first and last name for those who sign up. This has created an identity problem for many users who are often known by nicknames, maiden names or internet handles they've used for years to post on various forums or blogs. It's also a headache for those whose real names often contain commonly offensive words. Those that have tried to manipulate the First and Last name fields in the sign-up process to accommodate those alternate identities have found their Google+ account suspended. Google's VP of Google+, Bradley Horowitz, announced that the policy is currently under review. In the meantime, Google will be giving offending Google+ accounts a warning first, before suspending. If the account is suspended, it only applies to Google+ and not all Google products (i.e. Gmail, Google Docs, etc.) These new rules only apply to people who have made the mistake of trying to use nicknames when signing up for the service. Those who are using the naming process to spam or abuse the service will be treated more harshly. Horowitz goes on to present some ways users can use nicknames so that others may find their Google+ account. You can add nicknames to the "Other names" section of your Google+ profile. To do this, click on the Profile icon at the top of your Google+ page. Then click the blue Edit Profile button to the right of your name. Scroll to the bottom to find the "Other names" section. Right below that you will see the option to allow your Google profile to be visible via search. Be sure to enable that so others can find you via the nickname you are entering. The bigger question is if Google's stance on using you real name for Google+ is necessary. Google claims that insisting on real names makes it easier for others to find you and stops people from registering with offensive names or names meant to harass others. On the other hand, your real name may not be how you are primarily known so registering with it defeats the purpose for those users. Source: Zdnet
  22. We've been playing around with Google+ for a few weeks now, but until today the mobile options for the iPhone owners among us were limited to a clunky phone browser version of the G+ website. Today that changes with the launch of the official Google+ app for iOS devices. The app is currently up in the iTunes App Store, though it may take a while for it populate for you depending on your region. The app features the now-familiar Google+ interface, including profile pages, Circles, and Huddles. Google went with a decidedly minimalist design for the app home page, which displays large icons for the various Google+ features and a large bottom notifications bar to sift through the recent social network goings-on. Currently, Google+ remains in invite-only beta, and new users must obtain an email invitation from someone who is already using the service. But with the launch of the official app, we have to imagine that a public introduction of the new social network is right around the corner, as all the software is now in place to really let it thrive. Source Click here to view the article
  23. The newest version of Apple's Mac OS X operating system is finally here, and Lion has brought with it both minor tweaks and some big changes, but is it all for the better? Apple's iPhone and iPad lines have been selling at a rate that puts hotcakes to shame, and while the Mac computer line has a thriving fanbase of its own, there's no question that the company hopes to turn iOS users into Mac users as quickly as possible. To this end, Lion appears built from the ground up to make iPad users — who have perhaps never considered owning a Mac — feel as comfortable as possible with the foreign operating system. These changes make Lion feel more accessible to would-be Mac converts, but also throw a bit of a curve in the road for existing customers who have been using Apple computers since before the iOS craze. The touchable trackpad Download attachment: trackpad.jpg The most immediate change that Mac fans will notice is that scrolling has been reversed. That's right, moving two fingers up on the trackpad or Magic Mouse no longer causes a web page or document to scroll up, instead it scrolls down. This might seem like a completely nonsensical change — and if you're not an iPhone or iPad owner, it is — but it's just one of several changes that make Lion feel more like an iPad experience. On the iPad, as well as the iPhone, you use the touch screen to navigate things like web pages. Placing a finger on the screen and pushing up moves the page itself upwards, effectively scrolling down. Now, when you touch your Mac trackpad or Magic Mouse and push up, the page scrolls down as well. It's a simple change that could go a long way to making iPad owners feel at home, but it might also make Mac diehards feel like the new OS is catered to someone else. Thankfully, the new "feature" can be disabled by visiting the options menu. Launchpad is ready for takeoff Download attachment: apple lion launch pad.jpg Launchpad is a new way to view all the applications installed on your Mac, and it's unapologetically iPad-esque. Clicking the new Launchpad button on the icon dock causes all other applications to fade from sight, leaving you with an out-of-focus view of your desktop with all of your computer's apps presented in a grid-like fashion. From here you can launch whatever program you desire, and also organize your apps into folders just like on an iOS device. If you happen to have more apps than can fit on a single Launchpad screen, multiple screens will be created which can then be scrolled through. If you don't feel like using Launchpad, there's no reason you need to, as the original Finder menus can be used to locate applications just like always, but new users might benefit from the familiar look. Bye-bye scrollbar Another noticeable change is that a the typically static scrollbar is decidedly absent. Instead, a dynamic scroll bar takes it's place, and only appears on the screen when you're actively scrolling, disappearing quickly after you choose a new position on the page. Again, this is an option that can be disabled, but it is clearly aimed to make Apple's computer line feel just a tiny bit more like its portable devices — and vice versa. Apps go fullscreen Download attachment: full-screen-tab-lion.jpg Lion introduces the ability to make your applications dominate the screen. Up until now, apps like web browsers could only take up part of a Mac display, with the dock (if unhidden) and top menu bar remaining visible at all times. This limited screen real estate and could sometimes give a cramped feel. Lion fixes this by allowing programs like the Safari browser and Mail app to go fullscreen by clicking a pair of arrows in the upper right-hand corner. This makes each app the star of its own show, and you can switch between your various fullscreen apps by swiping three fingers to the left or right on your trackpad. This feature is useful in its own right, but it should also provide iOS veterans the simple all-or-nothing feel they've come to expect when using apps on Apple's mobile devices. These changes are already being met with mixed reactions from early adopters around the web. As could be expected, some feel that Apple is catering to the new breed of Apple user who have been introduced to the brand through its top-selling mobile devices. Others see it as the next step for an operating system that has always been about the user experience. If you've given Lion a try, be sure to let us know how you feel about the new features in the comments section. Source: by Mike Wehner from Tecca Click here to view the article
  24. WASHINGTON (AP) — A key member of the Senate Judiciary Committee is calling on federal regulators to block AT&T's proposed $39 billion purchase of T-Mobile USA. Herb Kohl, a Wisconsin Democrat, is chairman of the Senate Judiciary subcommittee that handles antitrust matters. He says the transaction would lead to higher prices and fewer choices for consumers by leaving just three national wireless carriers. He notes that two of those carriers — AT&T and Verizon Wireless — would control nearly 80 percent of the market. He says that by eliminating T-Mobile, the merger would remove the one carrier offering less expensive prices and rate plans. Thus, he says, the acquisition "would likely cause substantial harm to competition and consumers." Kohl sent a letter to the Justice Department and the Federal Communication Commission on Wednesday. Source: Yahoo By JOELLE TESSLER. Click here to view the article
×
×
  • Create New...