Page 2 of 2 FirstFirst 12
Results 16 to 25 of 25
  1. #16
    _NaPaLM_'s Avatar
    Join Date
    May 2013
    Gender
    male
    Posts
    17
    Reputation
    12
    Thanks
    3
    I doubt that dayz standalone with allow us to have hacks of the kind we are currently getting in dayz mod. By what I've read, the "network bubble" will prevent the client from even getting info on items outside of a certain radius. bye bye, esp hacks

  2. #17
    Douggem's Avatar
    Join Date
    Apr 2013
    Gender
    male
    Posts
    53
    Reputation
    37
    Thanks
    93
    ESP will be fine, if you only get information on those 1km around you, 1km ESP is more than enough.

  3. #18
    Woodhouse's Avatar
    Join Date
    Dec 2012
    Gender
    male
    Location
    Swagtown, Yoloville
    Posts
    2,832
    Reputation
    228
    Thanks
    3,247
    My Mood
    Sick
    Quote Originally Posted by geckosnipp View Post
    Hey... not all of us are script kiddies. I may be slower than others from another website but still have written my own.
    I can count the number of people who can code who have accounts (not who are active) and are in this section on my hand. I am well aware of who you are and that you do as I helped you a while back . But yeah, I see you on the other forums a lot more. So my statement is still pretty accurate. If anything, people just come on here to release stuff or peak around.
    Last edited by chickeninabiskit; 12-07-2013 at 11:18 AM.

  4. The Following User Says Thank You to Woodhouse For This Useful Post:

    Distraught (12-07-2013)

  5. #19
    knucklehead1's Avatar
    Join Date
    Aug 2012
    Gender
    male
    Posts
    81
    Reputation
    10
    Thanks
    2
    Quote Originally Posted by eth0 View Post
    __asm Keyword in C/C++
    sounds funny, but you do realize that __asm emits raw assembler? all code running on your machine is asm, so obviously the word "detection" fits right in there... NOT.

    Quote Originally Posted by eth0 View Post
    It uploads all the information on you to the VAC servers -- running processes, actual running code, etc.
    wrong. if they simply uploaded raw data (like your private radar .exe) from you to their servers they would quickly have a nice scandal/lawsuit on their hands. why? because apart from this concept going completely against any form of privacy there are a lot of legitimate programs that open a process handle to the game (i.e. look like RPM/WPM hacks).

    so all they can do is ban for known/public hack fingerprints / process checksums. i.e. if your (external) hack is private it will never be detected. this has been known for a long time and has been discussed on other sites.
    Last edited by knucklehead1; 12-07-2013 at 01:30 PM.

  6. #20
    xCyberxx's Avatar
    Join Date
    May 2013
    Gender
    male
    Location
    C:\Windows\sys32
    Posts
    1,417
    Reputation
    379
    Thanks
    1,459
    My Mood
    Devilish
    Quote Originally Posted by iSukkHD View Post
    Ooh. Smart idea. if i had a key and private bypass I would try this.
    I can try this if u want me to
    Quote Originally Posted by darkwrath505 View Post

    "zomg ples m4ke free hacks, im too lazy t0 get source code and update offsets." - MPGH 2015



  7. #21
    eth0's Avatar
    Join Date
    Mar 2013
    Gender
    male
    Posts
    17
    Reputation
    10
    Thanks
    24
    Quote Originally Posted by knucklehead1 View Post
    sounds funny, but you do realize that __asm emits raw assembler? all code running on your machine is asm, so obviously the word "detection" fits right in there... NOT.
    Obvious trolling is obvious.

  8. The Following User Says Thank You to eth0 For This Useful Post:

    xCyberxx (12-08-2013)

  9. #22
    knucklehead1's Avatar
    Join Date
    Aug 2012
    Gender
    male
    Posts
    81
    Reputation
    10
    Thanks
    2
    Quote Originally Posted by eth0 View Post
    Obvious trolling is obvious.
    maybe you think so, but my points are still correct.

  10. #23
    Douggem's Avatar
    Join Date
    Apr 2013
    Gender
    male
    Posts
    53
    Reputation
    37
    Thanks
    93
    Quote Originally Posted by knucklehead1 View Post
    maybe you think so, but my points are still correct.
    Except they're not. You know VAC streams suspicious modules and executables back to the master server for analysis, right? It even walks your hard drive. And you explicitly gave them permission to do so when you agreed to their EULA.

  11. #24
    knucklehead1's Avatar
    Join Date
    Aug 2012
    Gender
    male
    Posts
    81
    Reputation
    10
    Thanks
    2
    Quote Originally Posted by Douggem View Post
    You know VAC streams suspicious modules and executables back to the master server for analysis, right? It even walks your hard drive. And you explicitly gave them permission to do so when you agreed to their EULA.
    uh, no, I don't "know" that? care to provide some source or is this just another assumption? Note that there is difference between sending a process list and sending an actual executable file. And yes, it walks your harddrive, but that doesn't mean it sends any files - hashes at max.

    If you don't believe me just check their code. iirc recently there was a discussion about this topic on another well-known hack forum (I won't mention it here).

    sure they could do anything, but that doesn't mean they're actually doing it. If you had used actually private hacks (not those (non)private hacks you can buy anywhere these days) in VAC games you would know. And indeed my own external radars were never detected.


    EDIT: check your PMs...
    Last edited by knucklehead1; 12-09-2013 at 12:45 AM.

  12. #25
    UltraJosue's Avatar
    Join Date
    Jun 2012
    Gender
    male
    Posts
    30
    Reputation
    10
    Thanks
    3
    My Mood
    Aggressive
    Quote Originally Posted by iSukkHD View Post
    Ooh. Smart idea. if i had a key and private bypass I would try this.
    Quote Originally Posted by xCyberxx View Post
    I can try this if u want me to


    I would myself. I came up with the idea a little bit too late though. My key was banned before I could test it out. I'd still like to know though.
    Last edited by UltraJosue; 12-10-2013 at 12:42 AM.

Page 2 of 2 FirstFirst 12

Similar Threads

  1. [Help] TF2 Idling using sandboxie
    By SEAL_ in forum Team Fortress 2 Hacks
    Replies: 1
    Last Post: 05-10-2012, 05:01 AM
  2. [How to] Hide Proxifier from Hackshield using Sandboxie
    By PunkS7yle in forum Vindictus Discussions
    Replies: 16
    Last Post: 04-23-2011, 05:02 AM
  3. M16A3 to PSG1MOD (not useful, just a test)
    By FyreKills~ in forum Combat Arms Mods & Rez Modding
    Replies: 13
    Last Post: 02-08-2010, 01:57 AM