--- Jason Gauthier <[EMAIL PROTECTED]> wrote: > > > > Seriously though. It really isn't all that hard for a would > > be cheater to log > > in a character with the Almighty Sword of Slayage give the > > sword to some > > other character, then run a program which would exhaust all your file > > descriptors so when they quit, it wouldn't save their pfile. > > Then they stop the > > program again, log back in, and voom. Instantly they have 2 > > Almighty Swords of > > Slayage. > > Elaborate.. what "program" are they going to run inside a mud that opens > file descriptors?
It is fairly trivial to make one. I won't give code examples here, since there would no doubt be a host of script kiddies decending on muds all over the place to test it out. I will explain the process breifly, however, just to show that it could be done.. Basically you have the one process spawn thirty or so child processes. Then you have each one open a socket to connect to the muds address (host/port) repeatedly, untill the remote port stopped answering. Then you know it's full. Would take around 50 lines or so of perl/python to do. If the remote processes didn't save some descriptors for a rainy day, there's a whole slew of problems which could ensue.. ~Kender ===== -----BEGIN GEEK CODE BLOCK----- Version 3.1 GCS/L/C/O d-(+) s++:+ a-- C+++$>++++ UBLS++++$ P+++(--)$ L++>+++ E--- W+>++$ N !o K? w(--) !O M- !V PS+ PE(++) Y+ PGP->+ t- 5 X+() R(+) tv+@ b++(+++) !DI+++ D G(-) e>+++$ h---() r+++ y+++ ------END GEEK CODE BLOCK------ __________________________________________________ Do You Yahoo!? Yahoo! Movies - coverage of the 74th Academy Awards® http://movies.yahoo.com/

