Quote:
Originally Posted by Ian*
You can accomplish it with timestamps and it actually works better than most other methods.
I've never been botjailed for any packet sending besides setting my UID as 0...
this guy is really just speculating on what the outcome of certain things would be.
I've read some of his previous posts and I've also read some by his old account (which is banned; Elimination), read some of the posts he's made and you'll see what I mean.
|
Interesting... so far i've been unable to get a timestamp speedhack to work.. maybe i'm just confused as to wtf to do...
What i'm currently doing is every general data, attack or walk packet a client sends, i'm overwriting the timestamp with the proxy computers time + the clients offset (0 by default)
In my speed test i simply would send out generated jump packets and boost the offset by 700 ms each time... am i just an idiot doing it the wrong way or what? Cause tbh it confused the hell out of me.
Am i correct in that only jump packets need timestamp modified or all client>server or proxy>server timestamps? What about returned server packets?
Now that i thik about it.... perhaps modifying returned jump packets server>client would be part of it..
Annyways, if you could shed some light i'd appreciate it but i understand that alot of people 'in the know' don't really want new competition.
And @ view of monsters, yah he's speculating wildly. Packets (assuming you aren't screwing up the size or uid) have very little chance of getting you botjailed it seems. I've not gotten jailed on my proxy yet and i've sent a TON of invalid, improperly timed packets sorting things out.