Jump to content

Recommended Posts

Posted

nc idea.

 

Thanks for your Good Comment 8)

 

really nice share romeo

thanks, and keep it like this (awesome shares) :)

 

 

Thank you bro =)

 

I love it because all the project need anti feed at oly

 

yeah its true :D

 

fvcking awesome. ;)

 

yeah its Awesome and thanks ;D

 

 

ty

 

np =)

Posted

Although the code is 'mostly' different. I do not believe this was your idea, or your friends.

 

And changing the names/appearances of players is only 1/10th of the battle against feeding in oly. What about all the system msgs?

What about wartags? What about speaking messages?

 

To be honest, it seems like you're just taking already done stuff, and ideas, and posting them as your own. And it looks like a lot of copy/pasting.

The methods getOlympiadWeaponId and getOlympiadItemId look a lot like ones I've seen in the .dressme mod. I see nothing impressive in this code.

 

A more complete version is, and has been here: http://www.l2jserver.com/forum/viewtopic.php?f=73&t=25471

Ripping time?

Posted

Although the code is 'mostly' different. I do not believe this was your idea, or your friends.

 

And changing the names/appearances of players is only 1/10th of the battle against feeding in oly. What about all the system msgs?

What about wartags? What about speaking messages?

 

To be honest, it seems like you're just taking already done stuff, and ideas, and posting them as your own. And it looks like a lot of copy/pasting.

The methods getOlympiadWeaponId and getOlympiadItemId look a lot like ones I've seen in the .dressme mod. I see nothing impressive in this code.

 

A more complete version is, and has been here: http://www.l2jserver.com/forum/viewtopic.php?f=73&t=25471

Ripping time?

 

nah im Not Ripping.. i Requested this Code From Friends. so where the problem?

Posted

I didn't say you ripped it, I said:

Although the code is 'mostly' different. I do not believe this was your idea, or your friends.

 

I also said, it looks a lot like copy pasting of some .dressme code, slightly modified.

 

I also gave you insight as to how it's no where near complete, or affective. If you can't take constructive criticism,

you won't learn as much as you could.

 

Posted

I didn't say you ripped it, I said:

I also said, it looks a lot like copy pasting of some .dressme code, slightly modified.

 

I also gave you insight as to how it's no where near complete, or affective. If you can't take constructive criticism,

you won't learn as much as you could.

 

 

its not mine but mine Friends made it.. im not good on java but nvm if you have Problems we can talk on skype romeo.inside1 no need to spam this topic Thanks

  • 4 weeks later...
Posted

kinda pointless to make some topic that only people with 100 posts are able to see...want people to start spamming forum to see one topic? really.....

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • Posts

    • https://web.archive.org/web/20260306183214/https://maxcheaters.com/topic/241828-l2j-l2damage/page/3/ https://l2topzone.com/forum/l2-server-support-problems/9/l2damage-stopped/30514 Also we will try to push longer seasons ever ! (1135-100)/9 = 115 online
    • ONE SIDE – AND EVERYTHING BREAKS ▪ Looks like a simple case: Florida DL, back side, barcode – “clean and minimal”. ▪ In reality, these are exactly the tasks that fail most often. – data provided as plain text – request only for the back side – focus on the barcode (PDF417) ▪ And here’s the key point: ▪ A barcode is not just a “picture on the back”. It’s compressed logic of the entire document. ▪ If it doesn’t match the front, format, and data structure – the system flags it instantly. ▪ Many create a “similar-looking” code. But systems don’t read “similar” – they read by specification. ▪ In cases like this, it’s not about design. It’s about correct data assembly and how it behaves inside the format. ▪ Today only – 15% off for verification cases. ▪ Want it to pass, not just look right? Describe your case – we’ll show where even clean files break. › TG: @mustang_service ( https:// t.me/ mustang_service ) › Channel: Mustang Service ( https:// t.me/ +JPpJCETg-xM1NjNl ) #editing #photoshop #documents #verification #case
    • Your anonymity is a corpse. Blockchain forgets nothing. Your transactions are direct footprints in the hands of anyone who takes an interest. [✘] Still believe in "mixing"? Forget it. Classic Bitcoin mixers are an illusion of security. For Chainalysis and Elliptic algorithms, any attempt to hide tracks in the ledger is transparent. Your "mixing" is an artifact that gets filtered out in seconds. Every transaction leaves a trail that leads to frozen assets or unwanted questions from exchanges.  We don't mix. We break the link. [-] Input: Your "dirty" coins (Dirty BTC/ETH) with all their history and digital markers stay with us. [+] Output: You receive absolutely clean assets (Clean Crypto) from our reserves, which have never intersected with your past. This isn't a game of hide and seek. This is the surgical removal of your financial history from the system.   ------------------------------------------------------------------- Technical indexing: Bitcoin Mixer, Crypto Mixer, Clean BTC, Clean ETH, Anti-Chainalysis, Best Bitcoin Mixer, Anonymous Crypto Exchange, NoLog Mixing Service.
    • Here you are: https://l2crypt.com/l2-tools/l2editor-source/
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..