Quote:
ROFL. Small tip Huzzur, why don't you at least use "IMHO" word instead of "I know for 100% certain", when you make such a statements? Trust me, it will make you look better at the end.
FYI I didn't even know any of the players before the game, except Cohen. Which is not suprising considering the fact that for all of them it was the first MP game. I never spoke to any of them about any in game alliances before the game. And I din't even send any in game message to any of them until about turn 10, when I got the message from Arco (or Jotuns, don't remeber) asking me if I want to ally with him against Ermor, since Ermor was starting to grow very powerfull by than, based upon graphs that were visible to everybody.
|
Well that sure contradicts what you said in the thread. You said: "I have been receiving all of their gems since the start of the game."
Bummer. You should not have let that slip.
Anyway on to the topic of the thread. I was silly. Why attack the encryption/hashing of the turn file when there is a perfectly servable program which knows exactly the way to encrypt and has the file: dom2 itself. I was thinking more like a programmer than a hacker.
If I ever get home before 10 PM I'll write up somethig that injects some code in to the process and see if I can find the parts of memory and edit then and see what happens. I'm praying that it will get caught.
Of course more 3137 dudes probably have some memory hex editing programs already and don't need to know ( or want to know ) how to inject code and they could probably do it faster, but it's an interesting project. I'll post the results ( but not the method ).
Hopefully it's already taken care of. Let's keep out fingers crossed.