I just had a brainchild Who wants me to make a backend, free leech protection service. If you went to the website and entered the secret identifier, it would disable the app. This could be acheived by pinging my database at startup. I'm gonna go to bed now and let this topic develop.
WHO WANTS IT?
I'm new but have great skills (not in developing hacks but web apps) and ideas.
It's called a Fucking MPGH GUID Database.
50+ Post to use apps posted on MPGH.
Erm I missed that. Explanation for choob please?
The GUID is a code. That is unique to your computer.
hey add me pr0h4x0r@hotmail.com
"Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."- Dwight D. Eisenhower
whoa wtf is this hell naw dawg! 0_0
Essentially no, but I could kill everything if I wanted. The way it would work is a developer would type in the secret code on the website and it would create an entry for the application to not work. I would not know this code until it is given to me. I could find it by looking at all calls to the database bit that would be hard to do. Also, how does the guid database help me if a hack gets leeched an how does it work
So should I continue to develop this or not?
If you guys ever are going to do this I could host the database on my server and stuff. I also have an ass load of domains and stuff.
Meh... idk... the code will probably get leeched, then so much for preventing leeching. Public hacks are public for a reason. Only way to really prevent detection is a VIP or something. Its a nice effort, but I'd say ultimately not worth it. Better to build, built in fail-safes in your own hacks to prevent alteration.
"Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."- Dwight D. Eisenhower