Jump to content

ExTeamWeb CMS v2.0

Уважаемые клиенты и пользователи форума. Представляем новую и улучшенную версию Web-обвязки для серверов MuOnline - ExTeamWeb v2.0 CMS. ExTeamWeb v2.0 CMS - это новая версия достаточно известной в MuOnline сообществе CMS. Было проделано много работы по улучшению, оптимизации и автоматизации CMS.
Buy now
News Ticker
  • Были добавлены новые темы к CMS, не пропусти! КАТАЛОГ
  • New themes have been added to the CMS, do not miss! CATALOG
Sign in to follow this  
DangeR

Protect Server [EN]

Recommended Posts

PROTECTION SERVER

e1353419321e.jpg


EX PROTECTION SERVER - software to prevent players from using cheats (dishonest game techniques).

 

PRINCIPLE OF OPERATION

aad8134f38a2.png

Computer operating systems provide different levels of access to resources. A protection ring is one of two or more hierarchical levels or layers of privilege within the architecture of a computer system. This is generally hardware-enforced by some CPU architectures that provide different CPU modes at the hardware or microcode level. Rings are arranged in a hierarchy from most privileged (most trusted, usually numbered zero) to least privileged (least trusted, usually with the highest ring number). On most operating systems, Ring 0 is the level with the most privileges and interacts most directly with the physical hardware such as the CPU and memory.

PROPERTIES
Encryptor
- client file encryptor

Protect

- server-based security protection
- encryption of client files

- protection of client files from replacement
- kernel level protection
- Encryption of protocol packets
- demonstration of the player's screen
- list of running player processes
- update client files
- update file parser
- protocol protection in the game server
- client debugging protection
- protection of memory aders
- client thread protection
- the maximum number of windows from one PC
- blocking by ip address
- hard drive lock pc
- manager cheat and hack
- Encode file tools
- logs address of the intruder
- logs of the malicious address of the intruder
- logs of the intruder's HDD
- logs Player Name of the intruder

 

VIDEO

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...