2881
Off Topic / Re: Hot Anime Boys
« on: March 25, 2015, 12:48:25 AM »
Sebastian is great.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
bump. What weapons should I have? I don't knowThe Duck Cannon is a must.
he's talking about his OC right?Didn't sound like it.
The latterThis is very, very, very much the wrong reason to consider changing genders. There are literally horror stories about this, many rich people who maybe kinda felt like that decided to undergo a gender change, and have immensely regretted it because they didn't actually really know what they were getting into. Many of the effects of hormone therapy and especially surgery are irreversible, which is the reason most doctors will make you undergo a lot of therapy to make sure that your gender dysphoria is actually significant enough that gender-changing procedures would be beneficial.
I could flow either way
$40/month.Chances are it costed significantly more than that, Cowboy probably was just short the $40.
This is a great Add-On. One suggestion for this would be to add this event.You can already do this, just enter a negative value for the addRPGItem event.
RemoveRPGItem [ITEM] [AMOUNT]
I know that there is a RemoveRPGKeyItem of sorts, but that event (I think.) is for Quest Items. This event that I'm suggesting could be used for crafting or making potions. When you smith a weapon requiring 2 Iron Bars, for instance, SellRPGItem is not a smart choice due to the fact that it sells ALL of that specific item in the player's inventory. Also, it is illogical to sell the ores in this case because it will likely say "You sold 7 Iron Ore for 0 Gold". I'm thinking of making a 6-8 Player Dungeon RPG using this system for Skills and Items, but when I was getting to the crafting, this is where I ran into problems.
The full keys were never obtainedThey might as well have been. The key.dat files were stolen and Ipqµarx proved that it was totally possible for the full keys to be obtained from them.
more like the fake key hijackAhem, what? There was nothing fake about it. There was a huge security hole (The webserver had global read access) and someone exploited it to obtain the key.dat files of everyone using the service. Then, presumably using a method which was later discovered by Ipqµarx, they were able to reverse the hashing on the key files either by knowing the server's mac address, or had enough of the key.dat files to use an algorithm to narrow down possible hashes and then brute force it effectively.
The keys in the cropped screenshot are the actual users keys, not generated.
lizzy what song did you singhttp://m.youtube.com/watch?v=9cPDdQs7iHs