Page 3 of 3 FirstFirst 123
Results 31 to 40 of 40
  1. #31
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,305
    Reputation
    170
    Thanks
    2,194
    My Mood
    Flirty
    Hmmm that's interesting. I can't believe its that easy. Hmmm... well if that's the case it maybe possible to alter so more sensitive files. I'm going to work on my decryptor some more. Maybe I can kind the key for some of these files, but it depends on how they were encrypted...

    One question. Do you have to encrypt it back in order for the changes to take place?

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  2. #32
    Azathᴏth's Avatar
    Join Date
    Oct 2009
    Gender
    male
    Location
    49°51′S 128°34′W
    Posts
    13,526
    Reputation
    1136
    Thanks
    1,683
    My Mood
    Lurking
    Quote Originally Posted by why06 View Post
    Hmmm that's interesting. I can't believe its that easy. Hmmm... well if that's the case it maybe possible to alter so more sensitive files. I'm going to work on my decryptor some more. Maybe I can kind the key for some of these files, but it depends on how they were encrypted...

    One question. Do you have to encrypt it back in order for the changes to take place?
    No, just replace the old .txt with the new unencrypted payer.txt

    You just have to set its attribute to read-only.

    Also, do you know what the encryptions in the binding sand for?

  3. The Following User Says Thank You to Azathᴏth For This Useful Post:

    why06 (10-22-2009)

  4. #33
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,305
    Reputation
    170
    Thanks
    2,194
    My Mood
    Flirty
    Quote Originally Posted by 1nt3l View Post
    No, just replace the old .txt with the new unencrypted payer.txt

    You just have to set its attribute to read-only.

    Also, do you know what the encryptions in the binding sand for?
    Well nope. I have no idea, but if I was to guess I would say they are some type of virtual key code that basically sets which keys do which things. Virtual-Key Codes

    I'm guessing this just might be the lithtech version of the same things, so no big deal. I'm not sure what the "@ @" do however...

    Oh and thanks.

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  5. The Following User Says Thank You to why06 For This Useful Post:

    Azathᴏth (10-22-2009)

  6. #34
    Azathᴏth's Avatar
    Join Date
    Oct 2009
    Gender
    male
    Location
    49°51′S 128°34′W
    Posts
    13,526
    Reputation
    1136
    Thanks
    1,683
    My Mood
    Lurking
    Quote Originally Posted by why06 View Post
    Well nope. I have no idea, but if I was to guess I would say they are some type of virtual key code that basically sets which keys do which things. Virtual-Key Codes

    I'm guessing this just might be the lithtech version of the same things, so no big deal. I'm not sure what the "@ @" do however...

    Oh and thanks.
    Thanks for the link, can any hacks be based off of this?

  7. #35
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,305
    Reputation
    170
    Thanks
    2,194
    My Mood
    Flirty
    Quote Originally Posted by 1nt3l View Post
    Thanks for the link, can any hacks be based off of this?
    Well yeh sure. Nothing incredible, but you might be able to tweak somethings.

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  8. #36
    Azathᴏth's Avatar
    Join Date
    Oct 2009
    Gender
    male
    Location
    49°51′S 128°34′W
    Posts
    13,526
    Reputation
    1136
    Thanks
    1,683
    My Mood
    Lurking
    Oh, goooodie

  9. #37
    DonMadawg's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    miami
    Posts
    1,135
    Reputation
    8
    Thanks
    100
    My Mood
    Mellow
    nice post dude way 2 go.



  10. #38
    Fulfilled's Avatar
    Join Date
    Aug 2009
    Gender
    male
    Location
    Behind you... :P
    Posts
    973
    Reputation
    14
    Thanks
    73
    My Mood
    Amused
    I can imagine it being very easy to create a no spread or no recoil hack from this.
    By the way.
    How did you decrypt it? Mind PMing me since trev is just gonna spam this thread with his Nexon spy crap? ^^
    Respect List
    Dave - for creating the site.
    User1 - he's an uber beast.
    Whitten - for having an emo bear on his avatar.
    Obama - for being "Obamba" rofl.
    Liz - She helps a LOT (good bye choobs...)
    Stumpy & Trunky - can't tell which is which for some reason, sorry
    ...
    Where'd they all go?

    Me - Because you have to respect yourself.

  11. #39
    rabownz's Avatar
    Join Date
    Mar 2009
    Gender
    male
    Location
    Us/Az/Phx
    Posts
    227
    Reputation
    10
    Thanks
    29
    My Mood
    Lonely
    Whoa awesome

  12. #40
    Azathᴏth's Avatar
    Join Date
    Oct 2009
    Gender
    male
    Location
    49°51′S 128°34′W
    Posts
    13,526
    Reputation
    1136
    Thanks
    1,683
    My Mood
    Lurking
    I'm glad everyone likes it, I really hope a mod stickies this, I think No recoil/spread hacks can be based from this

Page 3 of 3 FirstFirst 123

Similar Threads

  1. C:\Nexon\Combat Arms\Profiles\Player.txt
    By ModaFoca in forum Combat Arms Hacks & Cheats
    Replies: 25
    Last Post: 09-27-2009, 10:03 PM
  2. Replies: 1
    Last Post: 12-17-2007, 02:52 PM
  3. nexon's combat arms
    By brownsfan91 in forum WarRock Korea Hacks
    Replies: 11
    Last Post: 12-17-2007, 12:04 PM
  4. Combat Arms
    By Synns in forum WarRock Korea Hacks
    Replies: 0
    Last Post: 11-21-2007, 10:09 PM
  5. Combat Arms
    By tednugent in forum WarRock Korea Hacks
    Replies: 7
    Last Post: 07-10-2007, 08:53 AM