He is the one who posted it and altered the game files for everyone who downloaded it.
The fact that it used your concept in changing game files is not the issue here.
He didn't know that menu was in there, he got it on the server we played it on. A server that should have been password protected but we didn't..... mistake....
I already knew who did what. I left the map as a download because I also thought it was funny....until hearing about the trojan aspects included.
So ok you can take a joke, that's good but trojan is a big word for just 3 changed pictures (menu_top, menu_middle, menu_bottom)
He was muted for putting the trojan infected file up on TKC for d/l.
If you had done it yourself you would have been banned (only for the trojan part) and I think you knew that...so you had him post it.
The file was not intended to be uploaded here, we made it cause we were bored but did not have any plans with it, again we should have passworded the server while playing to prevent others from joining, forgot that; stupid mistake..
No they are not installing trojans.
They DISCLOSE the fact that these things will be added/changed before/during install.
So the fact that they state that their package comes with a hidden addon and they mention this somewhere hidden between half a milion words in small print in the eula that they know nobody reads will make it ok??
I posted in another thread many weeks ago that people should only d/l maps from sites like VET,vietcong-game.net or Don's site (Meat Grinders) as they act as access to large and safe collections.
Safe from what? There is NO code in a map and if you pack it in the cbf it will NOT be executed, its only data. So the worst thing that could happen if there is something wrong with a map is that you have to delete the map.cbf and map.dat.... big risk....
It is sad that you had a part in proving that post all too true.
Well what can I say? Shit happens... I just want to say that there were no animals hurt during the production of this file and I'm sorry if any people were hurt.
When you asked if it was like a trojan and I said yes I was talking about the trojan horse the greeks used to conquer the old city of Troy.
The Greek siege of Troy had lasted for ten years. The Greeks devised a new ruse: a giant hollow wooden horse. It was built by Epeius and filled with Greek warriors led by Odysseus. The rest of the Greek army appeared to leave, but actually hid behind Tenedos. Meanwhile, a Greek spy, Sinon, convinced the Trojans that the horse was a gift despite the warnings of Laocoon and Cassandra; Helen and Deiphobus even investigated the horse; in the end, the Trojans accepted the gift. In ancient times it was customary for a defeated general to surrender his horse to the victorious general in a sign of respect. It should be noted here that the horse was the sacred animal of Poseidon; during the contest with Athena over the patronage of Athens, Poseidon gave men the horse, and Athena gave the olive tree.
The Trojans hugely celebrated the end of the siege, so that, when the Greeks emerged from the horse, the city was in a drunken stupor. The Greek warriors opened the city gates to allow the rest of the army to enter, and the city was pillaged ruthlessly, all the men were killed, and all the women and children were taken into slavery.
The map came with a hidden menu (only picture) and in that way it resembles that old wooden horse.
In the context of computer software, a trojan is usually more then just some pictures that change the background of a menu.
In the context of computer software, a Trojan horse is a program that contains or installs a malicious program (sometimes called the payload or 'trojan'). The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. (See Social engineering.)
Often the term is shortened to simply trojan, even though this turns the adjective into a noun, reversing the myth (Greeks, not Trojans, were gaining malicious access).
There are two common types of Trojan horses. One is otherwise useful software that has been corrupted by a hacker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives.
Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration.
However there is another meaning for the term 'Trojan Horse' in the field of computer architecture. Here it basically represents any piece of User Code which makes the Kernel Code access anything it would not have been able to access itself in the first place (i.e making the OS do something it wasn't supposed to be doing). Such security loopholes are called Trojan Horses.
This is what Kaspersky says about trojans:
Trojan Programs
This class of malware includes a wide variety of programs that perform actions without the user's knowledge or consent: collecting data and sending it to a cyber criminal, destroying or altering data with malicious intent, causing the computer to malfunction, or using a machine's capabilities for malicious or criminal purposes, such as sending spam.
A subset of Trojans damage remote machines or networks without compromising infected machines; these are Trojans that utilize victim machines to participate in a DoS attack on a designated web site.
And eset:
Trojan Horse
A Trojan Horse, often referred to as just a Trojan, is a program which purports to do one thing, but actually does another. Not always damaging or malicious, they are often associated with things like deleting files, overwriting hard-drives, or being used to provide remote access to a system for an attacker. Classical Trojans include keyloggers being delivered as game files, or file deleters masquerading as useful utilities. Trojans can be used for many purposes including
Remote Access (sometimes called Remote Access Tools or RAT's, or Backdoors)
Keylogging and password stealing (Most spyware falls into this category)
Now doesnt that all sound much more serious then displaying some foolish pictures over the menu?? (not overwriting original ones, ours only gets priority over the original ones like with all cbf changes). Something that goes away the moment you delete the map again from vietcong\maps\
By destiny compell'd, and in despair,
The Greeks grew weary of the tedious war,
And by Minerva's aid a fabric rear'd,
Which like a steed of monstrous height appear'd:
The sides were plank'd with pine; they feign'd it made
For their return, and this the vow they paid..
Thus they pretend, but in the hollow side
Selected numbers of their soldiers hide:
With inward arms the dire machine they load,
And iron bowels stuff the dark abode.
Laocoon, follow'd by a num'rous crowd,
Ran from the fort, and cried, from far, aloud:
‘O wretched countrymen! What fury reigns?
What more than madness has possess'd your brains?
Think you the Grecians from your coasts are gone?
And are Ulysses' arts no better known?
This hollow fabric either must inclose,
Within its blind recess, our secret foes;
Or 't is an engine rais'd above the town,
T' o'erlook the walls, and then to batter down.
Somewhat is sure design'd, by fraud or force:
Trust not their presents, nor admit the horse.’