Ok ROFL, you are the same one who said someone posted WR VIP hacks on **********, and said Google it, and proceeded to tell us how to find it, even though it returned nothing, right retard, and yet you can't even give us a link? You think you have done more than me?! Ahaha, your just THAT retarded. First of all, Dave and Me launched this site from the VERY beginning, so don't even talk. That alone is more than you have done. Ok, two, I have hacked games, online, offline, or what not, but I don't make trainers. I have made an AQ auto-bot for VIP by myself, I may not hacked INTO game servers solo, but Dave and me hacked Helbreath two years ago, which again is a hell more than you can accomplish in your entire lifetime. I don't have time to make hacks, much less care to help people cheat with hacks. Any dipshit can get TMK and put the addresses into a hack, it's not hard buddy. Third, I made an online game pretty much almost entirely on my own, and that is a shitload more complex, funner, and a greater achievement than anything you have ever "made". You say you can code, but it's obvious you can't. I was being nice in that post, and didn't point it out, but when you rip on me, might as well reveal all the shit you made up.
Strings are not lines, strings are variables that hold text, dipshit. Words don't make up programs either, they are functions and commands that run in an orderly fashion, till the task is complete.2. Strings
STRING LINES OF UCE AND CE
Strings are lines , words that are found in Cheat Engines source code
these words make CE a UCE that is if you change them properly . PB
is set to detect these words and by changing them to different ones
that aren't in their logs we make our ce a uce . These words once compiled
make DLL library files and EXE application files that we can run then and
use for hacking and so on .
Punkbuster doesn't even detect words, it uses a signature database similar to anti-virus programs. Each program that is ran on a computer has a signature, sometimes it's a fingerprint ID that can be determined by reading RAM, how the program hooks into the application, or such, and other times it can be a MD5 checksum, which is basically so unique, that when you change one line of code the checksum will be entirely different, hence making it an undetected Cheat Engine, in one particular region. Once again, a debugger attaching to a process is basically one form of a fingerprint ID, which is why changing the method can help make it undetected.
You said it's your tutorial, you didn't even give proper credit to the people who really made it, and you can't code, you didn't even care to explain the code, and my guess is, you can't.
You say you release these hacks for everyone, and shit, but I have still yet to see proof, you can claim all you want, but all these thinks you claim to find, you never give the URL, you just say go find it. These hacks you give could be addresses leeched from any trainer, and you claim you made them, it's not even hard to do. These hack packs you say you released, I don't see anyone winning them, or you having proof that someone actually won, it's pure speculation, so in my opinion, you are a poser that deserves to be banned.
That URL I provided you in which you claimed you got the information from is obviously not it, one, because it doesn't show the picture it has provided, two, you leeched it off forums, hoping to claim it as your own undetected, three, the person who wrote the tutorial has entirely different English than you buddy, so don't even say you made shit when you didn't.