Jump to content

hellreturn

Management
  • Posts

    2836
  • Joined

  • Last visited

  • Days Won

    53

Everything posted by hellreturn

  1. Likes * too. With empty they will complain certain players don't have ping
  2. I use this one: http://audacity.sourceforge.net/
  3. Objective Rotation: set d1 "set g_gametype 2 ; map sw_oasis_b3 ; set nextmap vstr d2" set d2 "set g_gametype 2 ; map mlb_daybreak ; set nextmap vstr d3" set d3 "set g_gametype 2 ; map supplydepot2 ; set nextmap vstr d4" set d4 "set g_gametype 2 ; map mlb_temple; set nextmap vstr d5" set d5 "set g_gametype 2 ; map baserace; set nextmap vstr d6" set d6 "set g_gametype 2 ; map et_mor2_night_final; set nextmap vstr d7" set d7 "set g_gametype 2 ; map venice_ne4; set nextmap vstr d8" set d8 "set g_gametype 2 ; map fueldump; set nextmap vstr d9" set d9 "set g_gametype 2 ; map UJE_00 ; set nextmap vstr d10" set d10 "set g_gametype 2 ; map goldrush ; set nextmap vstr d1" vstr d1 Stopwatch Rotation: // WATCHDOG set com_watchdog_cmd "vstr m1r1 ; say watchdog found no map running - restarted mapcycle" // MAP set m1r1 "g_gametype 3; map oasis; set nextmap vstr m1r2" set m1r2 "map_restart 0; set nextmap vstr m2r1" set m2r1 "g_gametype 3; map goldrush; set nextmap vstr m2r2" set m2r2 "map_restart 0; set nextmap vstr m3r1" set m3r1 "g_gametype 3; map radar; set nextmap vstr m3r2" set m3r2 "map_restart 0; set nextmap vstr m4r1" set m4r1 "g_gametype 3; map railgun; set nextmap vstr m4r2" set m4r2 "map_restart 0; set nextmap vstr m5r1" set m5r1 "g_gametype 3; map supplydepot; set nextmap vstr m5r2" set m5r2 "map_restart 0; set nextmap vstr m6r1" set m6r1 "g_gametype 3; map caen; set nextmap vstr m6r2" set m6r2 "map_restart 0; set nextmap vstr m1r1" vstr m1r1 m1r1 and so on are known as a string library, kind of like a name given to a string of commands - tell the game to run the 'name' and it runs the string of commands associated with it. What basically happens here is the engine stores these lines kind of like "m1r1 command means: set g_gametype to 3, load map oasis and set 'nextmap' to run 'm1r2'". The very last line of the rotation is "vstr m1r1", which tells the engine to actually execute the line m1r1, which will startup the map rotation. Hence: g_gametype is set to 3, Oasis is loaded, and once the round of Oasis is finished, it runs "nextmap" which has been set to run m1r2, whereupon the map is restarted the the map cycle continues. Campaign rotation: For a campaign rotation, it is fairly similar up to this point. Here is an example of a roation that runs both of the official campaigns, one after the other: // CAMPAIGN ROTATION - official campaigns // WATCHDOG set com_watchdog_cmd "vstr d_initial ; say watchdog found no map running - restarted mapcycle" // MAP set d1 "campaign cmpgn_northafrica ; set nextcampaign vstr d2" set d2 "campaign cmpgn_centraleurope ; set nextcampaign vstr d1" set d_initial "set g_gametype 4 ; map oasis ; set nextcampaign vstr d2" vstr d_initial // END CAMPAIGN ROTATION Notice the similarity with the stopwatch rotation - really its almost exactly the same. The important things to notice is that: g_gametype is 4, and the campaign mode version of nextmap is "nextcampaign". Secondly, also notice the first campaign being loaded is northafrica, which starts with Oasis, and in the d_initial line the map there (which is first loaded) is also Oasis.
  4. We have updated our Forum, Gallery, Calendar, Download and Bug Tracker to provide new features. If you find any bugs or missing things, please report it on tracker so we can fix it asap. We will keep adding new features during this week. Any new suggestions are more then welcome. We will be soon adding new skins. If you find any bugs, please report here. Thank you.
  5. Updating forums. Please be patient. - Thank you.
    1. Show previous comments  3 more
    2. hellreturn

      hellreturn

      if u still get it, please PM me screenshot.. :)
    3. TheSilencerPL

      TheSilencerPL

      I can't see it anymore :) that's why I was curious, whether you tried something and removed it.
    4. hellreturn

      hellreturn

      tbh dunno i never noticed it.. may be u caught during i was upgrading? hrm dunno
  6. Thank you for the report! We will look into it.
  7. File Name: Supplydepot2 File Submitter: hellreturn File Submitted: 11 Aug 2011 File Category: Map Scripts Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and offers new satchel/crane control exploit fix. Fixes wm_endround waitstate. Click here to download this file
  8. 11 downloads

    Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and offers new satchel/crane control exploit fix. Fixes wm_endround waitstate.
  9. File Name: Supplydepot - alternate script File Submitter: hellreturn File Submitted: 11 Aug 2011 File Category: Map Scripts Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and removes the satchel/crane control exploit fix. Fixes wm_endround waitstate. Players will no longer bounce into invisible walls, but the satchel exploit is possible with this script! This version was requested by GA for competition and the desire to play with no playerclips in the passages. Click here to download this file
  10. 7 downloads

    Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and removes the satchel/crane control exploit fix. Fixes wm_endround waitstate. Players will no longer bounce into invisible walls, but the satchel exploit is possible with this script! This version was requested by GA for competition and the desire to play with no playerclips in the passages.
  11. File Name: Supplydepot File Submitter: hellreturn File Submitted: 11 Aug 2011 File Category: Map Scripts Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and offers new satchel/crane control exploit fix. Fixes wm_endround waitstate. Click here to download this file
  12. 14 downloads

    Fixes spawn bug, gold bug, grenade/mortar over roof into stairwell exploit, disables troublesome music speakers and offers new satchel/crane control exploit fix. Fixes wm_endround waitstate.
  13. Time to steal u PC tosa!
  14. woho!! My feedback got checked! I got to check it!! Yoohooo!
  15. Fake Fanboi making video of it.. or that's how i see it.
  16. If you bought the key using paypal and it's within last 30 or 90 days you can still file fraud charge and get your money back.
  17. I don't think US will in near amount of time frame. Most of the things.. Manufactured in China.
  18. File Name: Jaymod File Submitter: hellreturn File Submitted: 03 Aug 2011 File Category: Mods Enemy Territory Mod - Jaymod Click here to download this file
  19. hellreturn

    Jaymod

    Version 2.2.0

    135 downloads

    Enemy Territory Mod - Jaymod
  20. IT security firm McAfee claims to have uncovered one of the largest ever series of cyber attacks. It lists 72 different organisations that were targeted over five years, including the International Olympic Committee, the UN and security firms. McAfee will not say who it thinks is responsible, but there is speculation that China may be behind the attacks. Beijing has always denied any state involvement in cyber-attacks, calling such accusations "groundless". Speaking to BBC News, McAfee's chief European technology officer, Raj Samani, said the attacks were still going on. "This is a whole different level to the Night Dragon attacks that occurred earlier this year. Those were attacks on a specific sector. This one is very, very broad." Dubbed Operation Shady RAT - after the remote access tool that security experts and hackers use to remotely access computer networks - the five-year investigation examined information from a number of different organisations which thought they may have been hit. "From the logs we were able to see where the traffic flow was coming from," said Mr Samani. "In some cases, we were permitted to delve a bit deeper and see what, if anything, had been taken, and in many cases we found evidence that intellectual property (IP) had been stolen. "The United Nations, the Indian government, the International Olympic Committee, the steel industry, defence firms, even computer security companies were hit," he added. China speculation McAfee said it did not know what was happening to the stolen data, but it could be used to improve existing products or help beat a competitor, representing a major economic threat. "This was what we call a spear-phish attack, as opposed to a trawl, where they were targeting specific individuals within an organisation," said Mr Samani. "An email would be sent to an individual with the right level of access within the system; attached to the message was a piece of malware which would then execute and open a channel to a remote website giving them access. "Once they had access to an organisation, they either did what we would call a 'smash-and-grab' operation, where they would try and grab as much information before they got caught, or they sometimes embedded themselves in the network and [tried to] spread across different systems within an organisation." Mr Samani said his firm would "not make any guesses on where this has come from", but China is seen by many in the industry as a prime suspect. Jim Lewis, a cyber expert with the Centre for Strategic and International Studies, was quoted by the Reuters news agency as saying it was "very likely China was behind the campaign because some of the targets had information that would be of particular interest to Beijing". Experts warned that commercial espionage was a bigger threat to business than Lulzsec and Anonymous. "Everything points to China. It could be the Russians, but there is more that points to China than Russia," Lewis said. However, Graham Cluley - a computer-security expert with Sophos, is not so sure. He said: "Every time one of these reports come out, people always point the finger at China." He told BBC News: "We cannot prove it's China. That doesn't mean we should be naive. Every country in the world is probably using the internet to spy. "After all, it's easy and cost-effective - but there's many different countries and organisations it could be." Mr Cluley said firms were often distracted by the very public actions of LulzSec and Anonymous, groups of online activists who have hacked a number of high-profile websites in recent months. "Sometimes it's not about stealing your money or publicly leaking your data. It's about quietly stealing your information, which can have a very high political, military or financial value. "In short, don't let your defences down," he added. Source: BBC Click here to view the article
  21. IT security firm McAfee claims to have uncovered one of the largest ever series of cyber attacks. It lists 72 different organisations that were targeted over five years, including the International Olympic Committee, the UN and security firms. McAfee will not say who it thinks is responsible, but there is speculation that China may be behind the attacks. Beijing has always denied any state involvement in cyber-attacks, calling such accusations "groundless". Speaking to BBC News, McAfee's chief European technology officer, Raj Samani, said the attacks were still going on. "This is a whole different level to the Night Dragon attacks that occurred earlier this year. Those were attacks on a specific sector. This one is very, very broad." Dubbed Operation Shady RAT - after the remote access tool that security experts and hackers use to remotely access computer networks - the five-year investigation examined information from a number of different organisations which thought they may have been hit. "From the logs we were able to see where the traffic flow was coming from," said Mr Samani. "In some cases, we were permitted to delve a bit deeper and see what, if anything, had been taken, and in many cases we found evidence that intellectual property (IP) had been stolen. "The United Nations, the Indian government, the International Olympic Committee, the steel industry, defence firms, even computer security companies were hit," he added. China speculation McAfee said it did not know what was happening to the stolen data, but it could be used to improve existing products or help beat a competitor, representing a major economic threat. "This was what we call a spear-phish attack, as opposed to a trawl, where they were targeting specific individuals within an organisation," said Mr Samani. "An email would be sent to an individual with the right level of access within the system; attached to the message was a piece of malware which would then execute and open a channel to a remote website giving them access. "Once they had access to an organisation, they either did what we would call a 'smash-and-grab' operation, where they would try and grab as much information before they got caught, or they sometimes embedded themselves in the network and [tried to] spread across different systems within an organisation." Mr Samani said his firm would "not make any guesses on where this has come from", but China is seen by many in the industry as a prime suspect. Jim Lewis, a cyber expert with the Centre for Strategic and International Studies, was quoted by the Reuters news agency as saying it was "very likely China was behind the campaign because some of the targets had information that would be of particular interest to Beijing". Experts warned that commercial espionage was a bigger threat to business than Lulzsec and Anonymous. "Everything points to China. It could be the Russians, but there is more that points to China than Russia," Lewis said. However, Graham Cluley - a computer-security expert with Sophos, is not so sure. He said: "Every time one of these reports come out, people always point the finger at China." He told BBC News: "We cannot prove it's China. That doesn't mean we should be naive. Every country in the world is probably using the internet to spy. "After all, it's easy and cost-effective - but there's many different countries and organisations it could be." Mr Cluley said firms were often distracted by the very public actions of LulzSec and Anonymous, groups of online activists who have hacked a number of high-profile websites in recent months. "Sometimes it's not about stealing your money or publicly leaking your data. It's about quietly stealing your information, which can have a very high political, military or financial value. "In short, don't let your defences down," he added. Source: BBC
  22. Let's do remote desktop over the weekend because on my IE 8, I tried like 5 times and it's working for me. On my job PC I use IE 8 and at home IE 9. On both ones it works perfectly fine for me. I need to view in live to see what's wrong because I can't fix something which I can't recreate. May be somewhere my IE 8 settings are different.
  23. I dunno how can u replace files without stopping server.. never tried that.. if u don't have access to stop server, it's very odd host. The best way would be to: 1. Stop server. 2. Delete old files. 3. Upload new one. Well that's what I do.
  24. Can you trying deleting your browser cache and see if it's working or not?
×
×
  • Create New...