Jump to content

Recommended Posts

Posted
taken from postpacific.

 

 

 

[1:14pm] <yy-Ken-Bean-net> How

 

[1:15pm] <[RK]Encore> you need 2 persons' date=' a calculator

 

[1:15pm'] <yy-Ken-Bean-net> Explain?

 

[1:15pm] <[RK]Encore> the 1st one got the weapon to enchant and a enchant scroll

 

[1:15pm] <[RK]Encore> then he sets up a shop with the scroll for 1 adena

 

[1:15pm] <[RK]Encore> double clicks the scroll and the friend buys it after he double clicked

 

[1:16pm] <[RK]Encore> then he can do the scroll on a weapon and he will see if sucess or not

 

[1:16pm] <[RK]Encore> repeat that 10 times and you got a binary number

 

[1:16pm] <[RK]Encore> decode the binary number and you got the key 10010100010111010....

 

[1:17pm] <[RK]Encore> 1 for sucess, 0 for fail

 

[1:17pm] <[RK]Encore> every binary number got 10 letters

 

[1:18pm] <[RK]Encore> after the 10 letters are finished, it starts from new

 

[1:18pm] <[RK]Encore> sorry for my bad englisch

 

[1:18pm] <yy-Ken-Bean-net> Hmmm

 

Tested in l2x and ... Broke sls;[

Posted

I can`t see any useful things at first post (yep, i know russian) - it`s just a nooby instruction, it`s not buq or anything like that. The most useful way to enchant (without any exploits) is get few similar things to enchant and enchant until you`ll get a last one.

 

 

 

btw. i heard so much about 'l2j encchant bug", can you talk something about it, if it`s exists, ofcourse)

Posted
taken from postpacific.

 

 

 

[1:14pm] <yy-Ken-Bean-net> How

 

[1:15pm] <[RK]Encore> you need 2 persons' date=' a calculator

 

[1:15pm'] <yy-Ken-Bean-net> Explain?

 

[1:15pm] <[RK]Encore> the 1st one got the weapon to enchant and a enchant scroll

 

[1:15pm] <[RK]Encore> then he sets up a shop with the scroll for 1 adena

 

[1:15pm] <[RK]Encore> double clicks the scroll and the friend buys it after he double clicked

 

[1:16pm] <[RK]Encore> then he can do the scroll on a weapon and he will see if sucess or not

 

[1:16pm] <[RK]Encore> repeat that 10 times and you got a binary number

 

[1:16pm] <[RK]Encore> decode the binary number and you got the key 10010100010111010....

 

[1:17pm] <[RK]Encore> 1 for sucess, 0 for fail

 

[1:17pm] <[RK]Encore> every binary number got 10 letters

 

[1:18pm] <[RK]Encore> after the 10 letters are finished, it starts from new

 

[1:18pm] <[RK]Encore> sorry for my bad englisch

 

[1:18pm] <yy-Ken-Bean-net> Hmmm

 

i dont get it btw i sow a person on idragon with +31 LOL that is somekind of cheat i think cus he wasnt a GM it was strange i wanted to see it in trade and he showed it to me ^^

Posted

Clearly a cheater... noone could ever do an enchant to +31 !!??!?

 

Even +16 is very hard to make, but +31?? Or maybe he donated for that weapon :P

Guest
This topic is now closed to further replies.



  • Posts

    • https://web.archive.org/web/20260306183214/https://maxcheaters.com/topic/241828-l2j-l2damage/page/3/ https://l2topzone.com/forum/l2-server-support-problems/9/l2damage-stopped/30514 Also we will try to push longer seasons ever ! (1135-100)/9 = 115 online
    • ONE SIDE – AND EVERYTHING BREAKS ▪ Looks like a simple case: Florida DL, back side, barcode – “clean and minimal”. ▪ In reality, these are exactly the tasks that fail most often. – data provided as plain text – request only for the back side – focus on the barcode (PDF417) ▪ And here’s the key point: ▪ A barcode is not just a “picture on the back”. It’s compressed logic of the entire document. ▪ If it doesn’t match the front, format, and data structure – the system flags it instantly. ▪ Many create a “similar-looking” code. But systems don’t read “similar” – they read by specification. ▪ In cases like this, it’s not about design. It’s about correct data assembly and how it behaves inside the format. ▪ Today only – 15% off for verification cases. ▪ Want it to pass, not just look right? Describe your case – we’ll show where even clean files break. › TG: @mustang_service ( https:// t.me/ mustang_service ) › Channel: Mustang Service ( https:// t.me/ +JPpJCETg-xM1NjNl ) #editing #photoshop #documents #verification #case
    • Your anonymity is a corpse. Blockchain forgets nothing. Your transactions are direct footprints in the hands of anyone who takes an interest. [✘] Still believe in "mixing"? Forget it. Classic Bitcoin mixers are an illusion of security. For Chainalysis and Elliptic algorithms, any attempt to hide tracks in the ledger is transparent. Your "mixing" is an artifact that gets filtered out in seconds. Every transaction leaves a trail that leads to frozen assets or unwanted questions from exchanges.  We don't mix. We break the link. [-] Input: Your "dirty" coins (Dirty BTC/ETH) with all their history and digital markers stay with us. [+] Output: You receive absolutely clean assets (Clean Crypto) from our reserves, which have never intersected with your past. This isn't a game of hide and seek. This is the surgical removal of your financial history from the system.   ------------------------------------------------------------------- Technical indexing: Bitcoin Mixer, Crypto Mixer, Clean BTC, Clean ETH, Anti-Chainalysis, Best Bitcoin Mixer, Anonymous Crypto Exchange, NoLog Mixing Service.
    • Here you are: https://l2crypt.com/l2-tools/l2editor-source/
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..