[cod] Beware...

[FnG] Lambik fng.lambik at gmail.com
Thu May 28 14:15:22 EDT 2009


For as far as I can see, this 'hack' isn't even nessessary as they can
easily change the 'hosts' file( I read this from the forum posted in one of
the previous mails),
and thus it will work also on windows servers aswell. Correct me if my
assumption is wrong. Your check will have to go a bit further then checking
the executable.

To me is seems that activision was very VERY sloppy on securing the game,
they should have made it the way that the server stops running if it can't
reach the master server.
No master server, no game.

Yes the GSP that are hosting illegal games are destroying the games, and NO
it's not because it's a certain platform (linux) that makes it possible to
run it illegal.

Lambik



On Wed, May 27, 2009 at 2:44 PM, Oliver Warburton <olly at inx-gaming.co.uk>wrote:

> I would love to see these companies running illegal servers being nailed.
> They are one of the biggest parts of the problem. Without wishing to state
> the obvious, without the game sales, there won't be the developers
> supporting the servers.
>
> My only real concern with this is the game companies that allowed free /
> open hosting of binaries before then being very difficult to approach to
> become an official provider, and lots of big providers that play by the
> rules and have supported the games for 6+ years then not being able to host
> the game!
>
> It's not like it hasn't happened before with another popular series. And
> with another game, that died a death because of the reluctance to have more
> than only a handful of official providers.
>
> Oliver Warburton,
> Managing Director
> INX-Network LTD
>
> INX-Gaming
>
> www.inx-gaming.com
> ----- Original Message ----- From: "James Landi" <jim at landi.net>
> To: "Call of Duty server admin list." <cod at icculus.org>
> Sent: Wednesday, May 27, 2009 2:20 AM
> Subject: Re: [cod] Beware...
>
>
>   Thanks for the heads up, I've seen this on my site (only one or two
>> request) but we've been able to nip those posts in the bud.
>>
>> I've passed your message on to Activision in hopes they can do something.
>> These smaller GSPs should understand, that we have it easy and Activision
>> can make the job of a GSP very hard by licensing them the server code.  I
>> know all you GSPs would love to deal with that, on top of the delayed Linux
>> bits, and patches.
>>
>> I've been willing to help spread CoD2/4/5 bits around to GPSs upon release
>> or even pre release but if the smaller guys are letting these modified exes
>> on their servers then I'll stick to the people I know and trust.
>>
>> I wonder what Activision's legal department would say if they found these
>> "modified" exes on commercial GSP servers?
>>
>> Come on guys, we're loosing support by the day from the publishers and
>> developers and they will blame anything other then their workmanship. Lets
>> not give them another reason to kill our platform.
>>
>> Jim Landi
>> Rudedog
>> FPSadmin.com
>> Microsoft MVP, Games for Windows
>>
>>
>>
>> Oliver Warburton wrote:
>>
>>> Hi guys,
>>>  A heads up for you gsps.
>>>  We seem to have had a lot of enquiries / signups over the past few days
>>> from people that want to edit exe's. When I dig a bit further, they
>>> obviously want to run cracked servers.
>>>  So essentially, they buy legit servers, then want access.
>>>  I am presuming for the 99% of TCadmin gsp lot this isn't an issue. For
>>> the small minority (hence emailing this list), just beware. These guys pose
>>> as normal customers and pretend to just want to make "minor" changes to the
>>> exe, which of course we absolutely did not allow.
>>>  2/3 have got nasty and filed a paypal dispute.
>>>  Hope this helps.
>>>  Oliver Warburton,
>>> Managing Director
>>> INX-Network LTD
>>>  INX-Gaming
>>>  |
>>> www.inx-gaming.com <http://www.inx-gaming.com>
>>> ------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> cod mailing list
>>> cod at icculus.org
>>> http://icculus.org/mailman/listinfo/cod
>>>
>>>
>> _______________________________________________
>> cod mailing list
>> cod at icculus.org
>> http://icculus.org/mailman/listinfo/cod
>>
>> __________ Information from ESET Smart Security, version of virus
>> signature database 3877 (20090222) __________
>>
>> The message was checked by ESET Smart Security.
>>
>> http://www.eset.com
>>
>>
>>
>>
> _______________________________________________
> cod mailing list
> cod at icculus.org
> http://icculus.org/mailman/listinfo/cod
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://icculus.org/pipermail/cod/attachments/20090528/31183db0/attachment.htm>


More information about the cod mailing list