Hey guys,
Quite some time ago my brother and I purchased a Conquer Online private server source in C#. The code base is terrible, but atleast it's not a binary(since there was some hack to get them down) but uses .usr files for users and .chr files for characters.
Im planning on rewriting the whole code base (will take me some time tough) with a good structure making use of OOP and design patterns. Also I'm planning to skip the implementation of using files and use a mysql database (will design it myself, starting with an Entity Relationship Diagram). On top of that I will write an API to get the data from the database into the C# code where the server will run. I'll probably go for json format on the response and requests in the API.
Will this setup also be able to get affected by that hack or only the ones that are just downloaded like that? I'm asking because it will take me alot of effort and if it simply gets killed by such a hack (I have no idea how the hack works) it isn't worth it.
Hoping someone can enlighten me.
Looking forward to any help.
Regards,
Blaze







