Jump to content

Recommended Posts

Posted

Q:what is this?

A: something like the gameserver.bat... but this is faster...in java style(running in java like a process) with password protection :)

 

 

vb based.

 

just look the video:

 

price: 30 euro. :)

Posted

Easy to decompile it non protected , and also give me the task i want to see the performance.

the performance its 10% faster just look how fast it loading and how fast i connect to the server. :P  and the usage of ram is lower :P
Posted

the performance its 10% faster just look how fast it loading and how fast i connect to the server. :P  and the usage of ram is lower :P

How the blue hell performance can be better since the server is java based that actually has nothing to do with server's performance..
Posted

How the blue hell performance can be better since the server is java based that actually has nothing to do with server's performance..

i am talking for the loader and the ram.
Guest Elfocrash
Posted

1) reflector.com and decompile the shit (getting the pass and stuff)

2) What if someone codes the normal batch file? Still loads without the shitty pass.

3) This shit has nothing to do with performance since you are using a .Net language to apply on java files and you are not using a .Net-Java connection method but just a hardcoded normal file with a useless password as soon as you are the only one using the files.

4) It is about 3 minutes to code something like that.

 

It would be better if it was something like that and it is so easy to add a password shit.

goIiZ.png

Coded on C# encrypted source even on decompile on personal XOR encryption key.

Posted

1) reflector.com and decompile the shit (getting the pass and stuff)

2) What if someone codes the normal batch file? Still loads without the shitty pass.

3) This shit has nothing to do with performance since you are using a .Net language to apply on java files and you are not using a .Net-Java connection method but just a hardcoded normal file with a useless password as soon as you are the only one using the files.

4) It is about 3 minutes to code something like that.

 

It would be better if it was something like that and it is so easy to add a password shit.

goIiZ.png

Coded on C# encrypted source even on decompile on personal XOR encryption key.

you trying what? to show us that you know how to do it? bravo... next time that you will make something i will come to your post and i will make it. you will like it? nop and  as always you will delete the post.
Guest Elfocrash
Posted

you trying what? to show us that you know how to do it? bravo... next time that you will make something i will come to your post and i will make it. you will like it? nop and  as always you will delete the post.

Nothing related to something you said on these words. I just explain that giving 30 euros for something like that is useless + you did not answer my question.

Posted

Nothing related to something you said on these words. I just explain that giving 30 euros for something like that is useless + you did not answer my question.

2) What if someone codes the normal batch file? Still loads without the shitty pass.?

 

just change the imports from pack and add a protection for decompile.  anyway go to play with your vortex and let me alne. you became mod and you have " prikseis our balls" ax00ax rofl

Guest Elfocrash
Posted

just change the imports from pack and add a protection for decompile

:yesyoucan:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

:ilied:

 

 

Good Luck.

Posted

Loled really Elfocrash. Haven't you seen this guy's shares? He just thinks he is a java developer, when he knows shit. It's not even worth telling him anything, as he always answers with the same bullsh1t, like stop spamming and such stuff.. Pff never mind.

Guest
This topic is now closed to further replies.


  • Posts

    • https://web.archive.org/web/20260306183214/https://maxcheaters.com/topic/241828-l2j-l2damage/page/3/ https://l2topzone.com/forum/l2-server-support-problems/9/l2damage-stopped/30514 Also we will try to push longer seasons ever ! (1135-100)/9 = 115 online
    • ONE SIDE – AND EVERYTHING BREAKS ▪ Looks like a simple case: Florida DL, back side, barcode – “clean and minimal”. ▪ In reality, these are exactly the tasks that fail most often. – data provided as plain text – request only for the back side – focus on the barcode (PDF417) ▪ And here’s the key point: ▪ A barcode is not just a “picture on the back”. It’s compressed logic of the entire document. ▪ If it doesn’t match the front, format, and data structure – the system flags it instantly. ▪ Many create a “similar-looking” code. But systems don’t read “similar” – they read by specification. ▪ In cases like this, it’s not about design. It’s about correct data assembly and how it behaves inside the format. ▪ Today only – 15% off for verification cases. ▪ Want it to pass, not just look right? Describe your case – we’ll show where even clean files break. › TG: @mustang_service ( https:// t.me/ mustang_service ) › Channel: Mustang Service ( https:// t.me/ +JPpJCETg-xM1NjNl ) #editing #photoshop #documents #verification #case
    • Your anonymity is a corpse. Blockchain forgets nothing. Your transactions are direct footprints in the hands of anyone who takes an interest. [✘] Still believe in "mixing"? Forget it. Classic Bitcoin mixers are an illusion of security. For Chainalysis and Elliptic algorithms, any attempt to hide tracks in the ledger is transparent. Your "mixing" is an artifact that gets filtered out in seconds. Every transaction leaves a trail that leads to frozen assets or unwanted questions from exchanges.  We don't mix. We break the link. [-] Input: Your "dirty" coins (Dirty BTC/ETH) with all their history and digital markers stay with us. [+] Output: You receive absolutely clean assets (Clean Crypto) from our reserves, which have never intersected with your past. This isn't a game of hide and seek. This is the surgical removal of your financial history from the system.   ------------------------------------------------------------------- Technical indexing: Bitcoin Mixer, Crypto Mixer, Clean BTC, Clean ETH, Anti-Chainalysis, Best Bitcoin Mixer, Anonymous Crypto Exchange, NoLog Mixing Service.
    • Here you are: https://l2crypt.com/l2-tools/l2editor-source/
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..