Jump to content
metin2dev
Ekstasia2

Weles

Members
  • Content Count

    34
  • Joined

  • Last visited

Community Reputation

9 Neutral

About Weles

  • Rank
    Neutral

Profile Information

  • Gender
    Male

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Weles

    open Metin2 VIP Src error

    Show me ur vip.h and .cpp file.
  2. Weles

    open High MySQL CPU Usage

    This is the answer to the question. If you will have such a problem again open SSH and enter "top" and look at% "mysqld" usage. It is very possible that someone deliberately clogged the database. This is by no means complicated if your site does not meet several key safeguards - by loading the ranking/downloading port status/;oading the list of players/logging in to the site you can even clog the database.
  3. Weles

    open High MySQL CPU Usage

    Does ur site connect to the database?
  4. Weles

    Metin2 Icon Database

    The problem with this page is loading everything at once, not the gradual loading that you could get with example ajax, jQuery.
  5. Weles

    c++ Fix Moblock/bravery cape hack

    Probably u must delete this function with PythonCharacterModule.cpp (It is not used by the client but allows for speeding) { "SetMoveSpeed", chrSetMoveSpeed, METH_VARARGS },
  6. Weles

    [HowTo]Items with the effect of use

    No no, item proto any id and wearflag always this same (128)
  7. Weles

    Free site + protect www server

    Topic repaired - magic doubling the content
  8. Warning!: The site is vulnerable to SQLi attacks - if someone wants to, he can rewrite the page as follows: https://youtu.be/DXji_JiuTdo I do not know if this is the right forum section I also recommend adding a captcha for registration, login and display of the full ranking. The site also has an advanced administrator system. Website (one change - 99% of original files from BombWorkStudio): https://www23.zippyshare.com/v/eo4JElK4/file.html Scan: https://www.virustotal.com/#/file-analysis/YzJjNDUyOGY0MzJlZGI5ZDgwMWFlYWVmMzBmYzE0OGY6MTUzMDQ2NDcwNQ== Layout: https://www.mpcforum.pl/applications/core/interface/imageproxy/imageproxy.php?img=http://i.imgur.com/jySgsmk.jpg&key=6f9f51e6dc2b4695eef338e253b46d36f714e9f3ae3b035c720b15909e791c07 Web server protection against two idiots (Internet terror - DejmieN & Komar1911) ## CHECKING IP, WHICH MAKE THE BIGGEST ATTACKS ## cat /var/log/apache2/access.log |awk '{print $1}' |sort |uniq -c |sort -n ## CHECKING IPs WHICH MAKE THE BIGGEST ATTACKS AND BLOCKING THEIR ## FILE=/var/log/apache2/access.log; for ip in `cat $FILE |cut -d ' ' -f 1 |sort |uniq`; do { COUNT=`grep ^$ip $FILE |wc -l`; if [[ "$COUNT" -gt "500" ]]; then iptables -A INPUT -s $ip -j DROP; fi }; done Where 500 - is responsible for the number of connections from one ip - after exceeding this number, the bot will be blocked. ## DISPLAYING ALL IP ADDRESSES AND NUMBER OF ATTACKS FROM ANY IP ## FILE=/var/log/apache2/access.log; for ip in `cat $FILE |cut -d ' ' -f 1 |sort |uniq`; do { COUNT=`grep ^$ip $FILE |wc -l`; if [[ "$COUNT" -gt "500" ]]; then echo "$COUNT : $ip"; fi }; done ## BLOCKING ENTRIES ON THE WEBSITE + CLOUDFLARE UNLOCKING ## iptables -A INPUT -s YOUR_IP_MACHINE_THAT_YOU_WILL_PROTECT -j DROP iptables -A INPUT -p tcp -m multiport --dports http,https -j DROP ip6tables -A INPUT -p tcp -m multiport --dports http,https -j DROP You enter the IP addresses one by one https://www.cloudflare.com/ips-v4 iptables -I INPUT -p tcp -m multiport --dports http,https -s HERE_IPV4_ADRESS -j ACCEPT https://www.cloudflare.com/ips-v6 iptables -I INPUT -p tcp -m multiport --dports http,https -s HERE_IPV6_ADRESS -j ACCEPT ## CONFIGURATION jail.local - FAIL2BAN ## [apache] enabled = true filter = apache-auth action = iptables-multiport[name=auth, port="http,https"] logpath = /var/log/apache2/access.log bantime = 9600 maxretry = 1 ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17 [apache-badbots] enabled = true filter = apache-badbots action = iptables-multiport[name=badbots, port="http,https"] logpath = /var/log/apache2/access.log bantime = 9600 maxretry = 1 ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17 [apache-noscript] enabled = true filter = apache-noscript action = iptables-multiport[name=noscript, port="http,https"] logpath = /var/log/apache2/access.log bantime = 9600 maxretry = 1 ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17 [apache-overflows] enabled = true filter = apache-overflows action = iptables-multiport[name=overflows, port="http,https"] logpath = /var/log/apache2/access.log bantime = 9600 maxretry = 1 ignoreip = 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17 Where ignoreip is responsible for IP addresses CLOUDFLARE ## BLOCKING EMPTY GETS VIA .htaccess ## RewriteEngine On RewriteCond %{HTTP_USER_AGENT} ^-?$ RewriteRule ^ - [F]
  9. Weles

    [HowTo]Items with the effect of use

    @amosth Hey you need to do the tutorial again just changing the name, e.g. "IsWELESRing1" to "IsWELESRing2"
  10. Weles

    open Compile source error

    The solution to your problem is easier than you think. Find: if (m_wCell == INVENTORY_MAX_NUM + WEAR_WEAPON) #ifdef __CHANGELOOK_SYSTEM__ DWORD dwRes = GetTransmutation() != 0 ? GetTransmutation() : GetVnum(); m_pOwner->SetPart(PART_WEAPON, dwRes); #else m_pOwner->SetPart(PART_WEAPON, GetVnum()); #endif Change: if (m_wCell == INVENTORY_MAX_NUM + WEAR_WEAPON) #ifdef __CHANGELOOK_SYSTEM__ { DWORD dwRes = GetTransmutation() != 0 ? GetTransmutation() : GetVnum(); m_pOwner->SetPart(PART_WEAPON, dwRes); } #else m_pOwner->SetPart(PART_WEAPON, GetVnum()); #endif And your problem will disappear
  11. Hi, if I have activated autopotion after switching to the mount it turns off, but the effect of launching (in the inventory) stays - does not heal. I tried to fix it with every way I knew, it did not help. This happens only with autopotion sp. Any ideas? I have a mount system for a costume slot.
  12. Raylee this is not it.
×