<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE>Message</TITLE>
<META content="MSHTML 6.00.2719.2200" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff size=2>Hi
Shockwave,</FONT></SPAN></DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff
size=2></FONT></SPAN> </DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff size=2>As a
supplier of game servers (<A
href="http://www.fragserv.co.uk">www.fragserv.co.uk</A>) I am worried about a
new cheat that has come to light. As we use Linux servers you seemed to be the
right person 2 ask.</FONT></SPAN></DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff
size=2></FONT></SPAN> </DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff size=2>Its a
wallhack lets u see right through walls! its in a .pk3 format is there anyway
the server could see if someone is using this and kick them?</FONT></SPAN></DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff
size=2></FONT></SPAN> </DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff
size=2>Regards</FONT></SPAN></DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff
size=2></FONT></SPAN> </DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff
size=2>Perry</FONT></SPAN></DIV>
<DIV><SPAN class=305072315-03112002><FONT face=Arial color=#0000ff
size=2>fragserv.co.uk</FONT></SPAN></DIV>
<BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px">
<DIV></DIV>
<DIV class=OutlookMessageHeader lang=en-us dir=ltr align=left><FONT
face=Tahoma size=2>-----Original Message-----<BR><B>From:</B> [-SF-]Shockwave
[mailto:shockwave@clanshortfuse.com] <BR><B>Sent:</B> 03 November 2002
15:00<BR><B>To:</B> mohaa@icculus.org<BR><B>Subject:</B> Re: [mohaa] "Spawn
Hack" and server crashes<BR><BR></FONT></DIV>
<DIV><FONT face=Arial size=2>Hello again,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>It seems that there is now a fix out for this
problem. Here are the links to the news item and the file
itself:</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2><A
href="http://www.mohadmin.com/nuke/">http://www.mohadmin.com/nuke/</A></FONT></DIV>
<DIV><FONT face=Arial size=2><A
href="http://www.mohadmin.com/nuke/download/MoHAAPatch.zip">http://www.mohadmin.com/nuke/download/MoHAAPatch.zip</A></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>The people involved in producing this patch still
haven't responded to my request for information about how this exploit works
which is disappointing. If anyone has any more information about this, I
think it would be a good idea to discuss it further. The idea of
compiling a new fgameded.so file from a Windows installation using an
unofficial patch program in order to fix an unexplained server exploit makes
me a bit uneasy. Maybe it's just me.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>Shockwave</FONT></DIV></BLOCKQUOTE></BODY></HTML>