Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - LazyPig

Pages: [1] 2 3 4 5 6 ... 18
1
Off Topic / Re: A message to Lazy Pig
« on: May 08, 2007, 02:32:02 am »
Hehe LoL,
Yep, that was me (LazyPig is back). I was playing VC for the first time in months, been busy with other things (like learning to play the guitar)
I don't look for protected or unprotected server and I never crash servers, why would I do that???
Fact is VC sometimes crashes on it's own, doesn't allways need someone to crash it................
I know how to crash servers and that's really simple but I never DO it and don't nobody ask me how to do it cause I don't tell....
I don't really care if you call me a homo or a loser, in fact coming from somebody who just got his ass kicked that's a compliment :D thanks for that :D :D :D


B.t.w. How is everybody doing? As you can see I'm still alive and kicking :D
And what was the name of your server again, so I can kick your ass again :D

2
Vietcong 1 & 2 / Re: Multi ToolZ
« on: March 26, 2007, 11:55:44 pm »
ahum....

3
Vietcong 1 & 2 / Re: ULTIMAT3-TRAIN3R
« on: March 25, 2007, 05:11:07 pm »
Deja vu

4
Vietcong 1 & 2 / Re: Vc pissoff player v1.2
« on: March 20, 2007, 03:05:37 am »
this is the adress i send it to

---------------------------
(c) Mrmedic 2007...
---------------------------
Sorry, this software cannot be run without a license key.

Please, contact xxxxxxxxxxxxxxxx for a new key.
      - - - - - - - - - - - - - -

Putting other peoples email in a forum to attract spam is not a nice way to make friends.....

5
Vietcong 1 & 2 / Re: More Weapons
« on: March 11, 2007, 02:49:01 pm »
Well micro's method is similair but he worked the cbf part out a little bit more. No memory hacking involved, only cbf.
With this you spawn as normal but you can keep on picking up guns as you come across them, either in DM mode or when somebody dies.
Only the first guns bullets kill but all guns have an extra firemode where instead of bullets they shoot bajonets and that works, it's fun to kill everybody with m60 bajonet or mossin nagant bajonet :D
Shows us that cbf hacking is not over and done yet by far...

6
Random Insanity Board / SkyWalker
« on: March 11, 2007, 12:37:27 pm »

7
Vietcong 1 & 2 / Re: More Weapons
« on: March 11, 2007, 10:25:19 am »
@Crossmol,
I saw that one, that looked really cool :D
I can pick up more guns but somehow they don't show.
btw, this one I have is made by micro, not by me. And I don't actually get the weapons, I can pick them up and use them.

8
Vietcong 1 & 2 / Re: More Weapons
« on: March 11, 2007, 03:25:41 am »

9
Vietcong 1 & 2 / Re: vcHook undedected
« on: March 09, 2007, 03:23:15 pm »
Nice, now I can combine 2 wallhacks :D

And surprisingly they work very well together, why choose when you can have the best of both :D

10
Vietcong 1 & 2 / Re: ZoldWord
« on: March 09, 2007, 01:09:56 pm »
He is the one who posted it and altered the game files for everyone who downloaded it.
The fact that it used your concept in changing game files is not the issue here.
He didn't know that menu was in there, he got it on the server we played it on. A server that should have been password protected but we didn't..... mistake....
Quote
I already knew who did what. I left the map as a download because I also thought it was funny....until hearing about the trojan aspects included.
So ok you can take a joke, that's good but trojan is a big word for just 3 changed pictures (menu_top, menu_middle, menu_bottom)
Quote
He was muted for putting the trojan infected file up on TKC for d/l.
If you had done it yourself you would have been banned (only for the trojan part) and I think you knew that...so you had him post it.
The file was not intended to be uploaded here, we made it cause we were bored but did not have any plans with it, again we should have passworded the server while playing to prevent others from joining, forgot that; stupid mistake..
Quote
No they are not installing trojans.
They DISCLOSE the fact that these things will be added/changed before/during install.
So the fact that they state that their package comes with a hidden addon and they mention this somewhere hidden between half a milion words in small print in the eula that they know nobody reads will make it ok??

Quote
I posted in another thread many weeks ago that people should only d/l maps from sites like VET,vietcong-game.net or Don's site (Meat Grinders) as they act as access to large and safe collections.
Safe from what? There is NO code in a map and if you pack it in the cbf it will NOT be executed, its only data. So the worst thing that could happen if there is something wrong with a map is that you have to delete the map.cbf and map.dat.... big risk.... :icon_o_o
Quote
It is sad that you had a part in proving that post all too true.
Well what can I say? Shit happens... I just want to say that there were no animals hurt during the production of this file and I'm sorry if any people were hurt.

When you asked if it was like a trojan and I said yes I was talking about the trojan horse the greeks used to conquer the old city of Troy.
Quote from: http://en.wikipedia.org/wiki/Trojan_Horse
The Greek siege of Troy had lasted for ten years. The Greeks devised a new ruse: a giant hollow wooden horse. It was built by Epeius and filled with Greek warriors led by Odysseus. The rest of the Greek army appeared to leave, but actually hid behind Tenedos. Meanwhile, a Greek spy, Sinon, convinced the Trojans that the horse was a gift despite the warnings of Laocoon and Cassandra; Helen and Deiphobus even investigated the horse; in the end, the Trojans accepted the gift. In ancient times it was customary for a defeated general to surrender his horse to the victorious general in a sign of respect. It should be noted here that the horse was the sacred animal of Poseidon; during the contest with Athena over the patronage of Athens, Poseidon gave men the horse, and Athena gave the olive tree.

The Trojans hugely celebrated the end of the siege, so that, when the Greeks emerged from the horse, the city was in a drunken stupor. The Greek warriors opened the city gates to allow the rest of the army to enter, and the city was pillaged ruthlessly, all the men were killed, and all the women and children were taken into slavery.
The map came with a hidden menu (only picture) and in that way it resembles that old wooden horse.
In the context of computer software, a trojan is usually more then just some pictures that change the background of a menu.
Quote from: http://en.wikipedia.org/wiki/Trojan_Horse
In the context of computer software, a Trojan horse is a program that contains or installs a malicious program (sometimes called the payload or 'trojan'). The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. (See Social engineering.)

Often the term is shortened to simply trojan, even though this turns the adjective into a noun, reversing the myth (Greeks, not Trojans, were gaining malicious access).

There are two common types of Trojan horses. One is otherwise useful software that has been corrupted by a hacker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives.

Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration.

However there is another meaning for the term 'Trojan Horse' in the field of computer architecture. Here it basically represents any piece of User Code which makes the Kernel Code access anything it would not have been able to access itself in the first place (i.e making the OS do something it wasn't supposed to be doing). Such security loopholes are called Trojan Horses.

This is what Kaspersky says about trojans:
Quote from: http://www.viruslist.com/en/virusesdescribed
Trojan Programs

This class of malware includes a wide variety of programs that perform actions without the user's knowledge or consent: collecting data and sending it to a cyber criminal, destroying or altering data with malicious intent, causing the computer to malfunction, or using a machine's capabilities for malicious or criminal purposes, such as sending spam.

A subset of Trojans damage remote machines or networks without compromising infected machines; these are Trojans that utilize victim machines to participate in a DoS attack on a designated web site.


And eset:
Quote from: http://www.eset.com/threat-center/threats.php
Trojan Horse
A Trojan Horse, often referred to as just a Trojan, is a program which purports to do one thing, but actually does another. Not always damaging or malicious, they are often associated with things like deleting files, overwriting hard-drives, or being used to provide remote access to a system for an attacker. Classical Trojans include keyloggers being delivered as game files, or file deleters masquerading as useful utilities. Trojans can be used for many purposes including
Remote Access (sometimes called Remote Access Tools or RAT's, or Backdoors)
Keylogging and password stealing (Most spyware falls into this category)
Now doesnt that all sound much more serious then displaying some foolish pictures over the menu?? (not overwriting original ones, ours only gets priority over the original ones like with all cbf changes). Something that goes away the moment you delete the map again from vietcong\maps\

By destiny compell'd, and in despair,
The Greeks grew weary of the tedious war,
And by Minerva's aid a fabric rear'd,
Which like a steed of monstrous height appear'd:
The sides were plank'd with pine; they feign'd it made
For their return, and this the vow they paid..
Thus they pretend, but in the hollow side
Selected numbers of their soldiers hide:
With inward arms the dire machine they load,
And iron bowels stuff the dark abode.
Laocoon, follow'd by a num'rous crowd,
Ran from the fort, and cried, from far, aloud:
‘O wretched countrymen! What fury reigns?
What more than madness has possess'd your brains?
Think you the Grecians from your coasts are gone?
And are Ulysses' arts no better known?
This hollow fabric either must inclose,
Within its blind recess, our secret foes;
Or 't is an engine rais'd above the town,
T' o'erlook the walls, and then to batter down.
Somewhat is sure design'd, by fraud or force:
Trust not their presents, nor admit the horse.’

11
Random Insanity Board / Re: Hack Tutorial
« on: March 08, 2007, 10:04:33 pm »
Get the coolest cheats you can think of over here: http://www.multihack.org/downloads.html

12
Random Insanity Board / Re: Hack Tutorial
« on: March 08, 2007, 09:38:24 pm »
Use this if you want to go really fast:

13
Vietcong 1 & 2 / Re: Hradba Unbanner Crosshair Full Hud any server
« on: March 07, 2007, 07:13:08 pm »
Great mrm, +1

14
Vietcong 1 & 2 / Re: Crosshair / Dot
« on: March 07, 2007, 02:52:08 am »
OMG, doesn't anybody know how to find the download section on the main page anymore?????
Look here, there are a couple of red dots and crosshairs: Main Page Downloads / cheats / for all games
Oh and while you're all there have a look around in the other sections too, there's still some useful stuff in there.

15
Vietcong 1 & 2 / Re: ZoldWord
« on: March 06, 2007, 05:06:45 pm »
Z, why is Dargor muted??? He didn't even know there was an extra menu that came with the map, he wasn't involved in making it either.
He just joined the server and played the map, he must have found out about the menu the other day. I put the menu in there, somebody made the 3 tga files but I packed them in the map's cbf file so if one is to be muted or warned or whatever it should be me, I knew what I was doing. The other people just played along....
Seems unfair if I get away with it with just you calling me a guy who puts trojans on peoples computer and dargor who only wanted to share is muted....

btw. I checked cnet's download site and more than half of the downloads there are trojans  :icon_o_o
They come with toolbars, sponsor programs, addons etc.  And they have executable code in it, my map is only data and no code.
Are they "people who put trojans on other peoples computer" too???

Pages: [1] 2 3 4 5 6 ... 18