No, it's not inside the root folder :S, also I'm using sandboxie idk if it has something to do with these files being stored somewhere else.
Yes it's very likely sandboxie stores the chat.log file in it's own sandboxie folder for aion, the chat function should work in a normal client without sandboxieQuote:
No, it's not inside the root folder :S, also I'm using sandboxie idk if it has something to do with these files being stored somewhere else.
Yeah, I used the client without sandboxie and it started to work again.Quote:
Yes it's very likely sandboxie stores the chat.log file in it's own sandboxie folder for aion, the chat function should work in a normal client without sandboxie
Check the target ID again withQuote:
Yeah, I used the client without sandboxie and it started to work again.
Paraly, is there a way to target a monster by using its ID?, I'm trying to target a monster inside an instance, the name is Temple Guardian, I checked the name through the chat.log, and for some reason /Select Temple Guardian doesnt work, the ID is 245200, so I want to try that way.
#DO=9999999; _MemPrint=%AddrTargetID,WORD; Delay=175; #UNTIL=%TargetName,---;
MemWrite=%AddrTargetID,[TargetIDHere],WORD;
That snipet is awesome :D, I just got the real ID's of these monsters, it was 65527, so for a target I can useQuote:
Check the target ID again with
Code:#DO=9999999; _MemPrint=%AddrTargetID,WORD; Delay=175; #UNTIL=%TargetName,---;
MemWrite=%AddrTargetID,65528,WORD;
_UNTILMemRead=%AddrTargetID,WORD,=65528;
3500 people and only 33% are active, so 1150, 10% of them play at EU so 1000 left for NA now we have 2 servers 2 races so 250 on each race, lets say 50% of them are online when you do evergale so 125 how likely is the chance they do evergale as well?Quote:
Hello my fellow asmodian brothers. Quite a few of us has been kicked by this fucktard by the name of Kal-DN and Sandrye-DN, since paraly said there's over 1k members, I'm guessing there's at least 100 of us who plays on NA and is asmodian. We can start either kicking them back, or just mass reporting them for botting. I hope we can stand united, and show them that we are the majority, and its us who they should fear, and not the other way around.
You can just select the target with this line in case the ID doesn't change when you re-enter the instance / re-loginQuote:
That snipet is awesome :D, I just got the real ID's of these monsters, it was 65527, so for a target I can use
In case I want to make some conditionals using that ID I could use this?:Code:MemWrite=%AddrTargetID,65528,WORD;
I dont understand why I can target some monsters inside the instance but when I use #UNTIL=%TargetName,Monster Name; then it doesnt work :/Code:_UNTILMemRead=%AddrTargetID,WORD,=65528;
EDIT: I tried several times and I cant make any conditions based on their names / ID's even tho they work with any other monster / NPC / player
that's why I pay for 6 licenses :D always have a PC I can Use depending where I am.Quote:
A shame, as a shift worker where I can play is not always the same option :(
That XignCode update was just about to fix the compatibility issue with windows 10 1803 updateQuote:
Hi Paraly, I noticed they made a change in xingcode in today's patch:
Also, I saw there's a difference between both bypass methods that are in this thread. Your tool closes all the xingcode processes, but the secoundary method (which requires files replacement) still leaves xcoronahost.xem *32 running, the xingcode at the windows tray dissapears and also it doesnt load the xingcode when an Aion client is starting.
Does xcoronahost.xem *32 process represents a threat? or it's as safe as your tool to run all the clients with it?.