Results 1 to 8 of 8
  1. #1
    suseke16's Avatar
    Join Date
    Oct 2008
    Gender
    male
    Location
    Behind u
    Posts
    918
    Reputation
    9
    Thanks
    99
    My Mood
    Bitchy

    How dose nexon detect hacks?

    Do they scan the executable files u are currently running and cross-reference it with other peoples results? If so, wouldn't it be harder for them to detect a hack if we renamed the hack so they couldnt cross-reference?

    PS. I know this sounds like a really nooby question, but im sure heaps of people dont know either

  2. #2
    NeverBorn's Avatar
    Join Date
    May 2009
    Gender
    male
    Location
    stealing from the cookie jar
    Posts
    1,568
    Reputation
    12
    Thanks
    565
    My Mood
    Pensive
    i have no freakin clue lol. i doubt they would do that though, i think they try and detect changes in your gameplay. definitely not your way though, EVERYONE would be hacking if they detected the hacks that way. its good you brought it up though.

  3. #3
    shadowvolcan's Avatar
    Join Date
    May 2008
    Gender
    male
    Location
    Somewhere
    Posts
    28
    Reputation
    10
    Thanks
    13
    My Mood
    Scared
    i dont know and i dont really care how they detect the hacks as long as there are new/good/working hacks to replace them

  4. The Following User Says Thank You to shadowvolcan For This Useful Post:

    slavanator (06-14-2009)

  5. #4
    NeverBorn's Avatar
    Join Date
    May 2009
    Gender
    male
    Location
    stealing from the cookie jar
    Posts
    1,568
    Reputation
    12
    Thanks
    565
    My Mood
    Pensive
    Quote Originally Posted by shadowvolcan View Post
    i dont know and i dont really care how they detect the hacks as long as there are new/good/working hacks to replace them
    greedy much? hence your name "choob"

  6. #5
    _-Blazin-_'s Avatar
    Join Date
    Jan 2009
    Gender
    male
    Location
    Australia
    Posts
    428
    Reputation
    10
    Thanks
    28
    My Mood
    Hot
    Doesn't hackshield scan your computer for anything different thats running with combat arms?

  7. The Following User Says Thank You to _-Blazin-_ For This Useful Post:

    slavanator (06-14-2009)

  8. #6
    dillhockey's Avatar
    Join Date
    Apr 2009
    Gender
    male
    Location
    Canada
    Posts
    7
    Reputation
    10
    Thanks
    1
    Yeah, I heard that too. Most likely they scan your computer.

  9. The Following User Says Thank You to dillhockey For This Useful Post:

    slavanator (06-14-2009)

  10. #7
    Mouzie's Avatar
    Join Date
    Apr 2009
    Gender
    male
    Location
    Saegertown
    Posts
    9,151
    Reputation
    520
    Thanks
    2,041
    My Mood
    Happy
    Hackshield runs like Punkbuster, this his how it should work:

    Real-time scanning of memory, a feature also prominent in many spyware programs, by Hackshield Client on players' computers searching for known hacks/cheats using a built-in database.
    Throttled two-tiered background auto-update system using multiple Internet Master Servers to provide end-user security ensuring that no false or corrupted updates can be installed on players' computers.
    Frequent status reports (encrypted) are sent to the Server by all players. When necessary, the Hackshield raises a violation which (depending upon settings) will cause the offending player to be removed from the game
    Admins or (Game Admin, not Elites) can also manually remove players from the game for a specified number of minutes or permanently ban if desired.
    Hackshield can be configured to instruct clients to calculate partial MD5 hashes of files inside the game installation directory. The results are compared against a set configuration and differences logged, and optionally, the client removed from the server.
    Hackshield Admins can request actual screenshot samples from specific players and/or can configure the Servers to randomly grab screenshot samples from players during gameplay.
    An optional "bad name" facility is provided so that Admins can prevent players from using offensive player names containing unwanted profanity or racial slurs.
    Search functions are provided for Admins who wish to search player's keybindings and scripts for anything that may be known to exploit the game.
    The Player Power facility can be configured to allow players to self-administer game servers when the Server Administrator (Elites/GM) is not present entirely without the need for passwords, in which the players can call votes to have a player removed from the server for a certain amount of time.

  11. The Following User Says Thank You to Mouzie For This Useful Post:

    slavanator (06-14-2009)

  12. #8
    Obama's Avatar
    Join Date
    Dec 2008
    Gender
    male
    Location
    The Black house
    Posts
    22,195
    Reputation
    870
    Thanks
    6,076
    My Mood
    Cool
    Quote Originally Posted by Mouzie View Post
    Hackshield runs like Punkbuster, this his how it should work:

    Real-time scanning of memory, a feature also prominent in many spyware programs, by Hackshield Client on players' computers searching for known hacks/cheats using a built-in database.
    Throttled two-tiered background auto-update system using multiple Internet Master Servers to provide end-user security ensuring that no false or corrupted updates can be installed on players' computers.
    Frequent status reports (encrypted) are sent to the Server by all players. When necessary, the Hackshield raises a violation which (depending upon settings) will cause the offending player to be removed from the game
    Admins or (Game Admin, not Elites) can also manually remove players from the game for a specified number of minutes or permanently ban if desired.
    Hackshield can be configured to instruct clients to calculate partial MD5 hashes of files inside the game installation directory. The results are compared against a set configuration and differences logged, and optionally, the client removed from the server.
    Hackshield Admins can request actual screenshot samples from specific players and/or can configure the Servers to randomly grab screenshot samples from players during gameplay.
    An optional "bad name" facility is provided so that Admins can prevent players from using offensive player names containing unwanted profanity or racial slurs.
    Search functions are provided for Admins who wish to search player's keybindings and scripts for anything that may be known to exploit the game.
    The Player Power facility can be configured to allow players to self-administer game servers when the Server Administrator (Elites/GM) is not present entirely without the need for passwords, in which the players can call votes to have a player removed from the server for a certain amount of time.
    What he said ^^

    /Close

Similar Threads

  1. Tutorial's please.. all the leechers are getting mad of downloading detected hacks :)
    By hahagotyoulooking in forum WarRock - International Hacks
    Replies: 4
    Last Post: 05-29-2007, 12:57 AM
  2. detected hack with Wallhack
    By gmrapno1 in forum WarRock - International Hacks
    Replies: 5
    Last Post: 05-08-2007, 04:50 PM
  3. how do i get hacks 4 war rock???
    By bigsyph in forum WarRock - International Hacks
    Replies: 6
    Last Post: 04-08-2007, 03:29 PM
  4. [Tutorial]How to find some Hacks
    By mental81 in forum WarRock - International Hacks
    Replies: 22
    Last Post: 04-06-2007, 10:50 AM
  5. How to hide my hack
    By whyshibai in forum WarRock - International Hacks
    Replies: 5
    Last Post: 01-02-2007, 12:58 PM

Tags for this Thread