Jump to content

Recommended Posts

Posted

Actually everything is trash when it comes to binding files.

You may find a great code obfuscation but it won't stop anybody to distribute it across the net, but will stop them editing it etc.

Posted (edited)

dont buy anything related with l2scripts or strixguard , they both have trojan backdoors, scripts used it on akumu/pcoder(smartguard) and retrived sources of his smartguard, and based "their" protection on it. They can easly do the same to anyone else and get any kind of information/data, or pass from your data center and u wouldn't even know, so better use something like ActiveAnticheat or custom protection.

 

Edited by LightFusionMain
Posted
2 hours ago, SGuard said:

xxdem, public send it and I'll prove you wrong.

 

I am pretty sure its possible, with OpenFile and ReadFile exploit

Posted
16 hours ago, LightFusionMain said:

dont buy anything related with l2scripts or strixguard , they both have trojan backdoors, scripts used it on akumu/pcoder(smartguard) and retrived sources of his smartguard, and based "their" protection on it. They can easly do the same to anyone else and get any kind of information/data, or pass from your data center and u wouldn't even know, so better use something like ActiveAnticheat or custom protection.

 

We do you get that information lol? 

How much they pay you for a single false claim?

What you're talking now is exactly smartguard work style, having screenshots of people's desktop or having file access by terms of use (just read them).

There's a discussion about 'file access' in our thread with that guy (forgot his name, he tried to do a protection awhile ago), and there's an explanation about limitation that we pose regarding file access. 

You should do ur research better, man. 

 

and OMG, how could we get smart's files without having a protection first? Bullshit is in the air.

 

And we don't have any trojan lol, if we do, file a claim in microsoft, since we're certificated with them our code is crystal clean by all standards. 

 

Do your homework before posting obvious lies.

Posted (edited)
1 hour ago, SGuard said:

We do you get that information lol? 

How much they pay you for a single false claim?

What you're talking now is exactly smartguard work style, having screenshots of people's desktop or having file access by terms of use (just read them).

There's a discussion about 'file access' in our thread with that guy (forgot his name, he tried to do a protection awhile ago), and there's an explanation about limitation that we pose regarding file access. 

You should do ur research better, man. 

 

and OMG, how could we get smart's files without having a protection first? Bullshit is in the air.

 

And we don't have any trojan lol, if we do, file a claim in microsoft, since we're certificated with them our code is crystal clean by all standards. 

 

Do your homework before posting obvious lies.

hah obvious lies ?

U(or Юрий https://bit.ly/2qFtpTT ) posted topic on zone-game.info describing conversation between akumu and pcoder (from fake account) u also posted partial source code of Adrenaline.

U are using guard.des(sources old version)  stolen from akumu( as he described it in one of post's not so long ago - here https://bit.ly/2OD7wy4  ) 

I clearly know what i'm saying, your certificate doesn't prove anything, u could allways download and execute non certified app , via your guard.des, u only got certf on your .exe , keep fooling people somewhere else, don't use his trojan protection !

 

Edited by LightFusionMain

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...