was the "you can walk at round start using the conga" mentioned to?
2014-10-30 18:03 GMT+01:00 ics :
> And to confirm, yes the elevator bug is back. Did valve started working
> this map over a year ago and forgot to fix the bugs? Also, RED side ammobox
> is inside the rocks. http://cloud-4.steam
And to confirm, yes the elevator bug is back. Did valve started working
this map over a year ago and forgot to fix the bugs? Also, RED side
ammobox is inside the rocks.
http://cloud-4.steampowered.com/ugc/29598440085670745/377BBC6D2F697FC74C6152E02B78C9DD89BAA6C8/
-ics
ics kirjoitti:
Thats tr
Thats true, on both sides. Though i'm not surprised that this old bug
fixed over a year ago resurfaced. I hope the bug where you can die with
"intel" will cause the lift to go up hasn't come up back again.
-ics
Martin V kirjoitti:
there is also a bug for engies on doomsday_event. They are abl
there is also a bug for engies on doomsday_event. They are able to make
teleport exits behind spawnroom (behind that glass).
2014-10-30 10:13 GMT+01:00 ics :
> Apparently players can get off from bumpercar track with bumpercar. I
> suspect this is due to engineers eureka effect ecploited somehow.
Apparently players can get off from bumpercar track with bumpercar. I suspect
this is due to engineers eureka effect ecploited somehow. In any case, kind of
ruins the fun for others.
-ics
___
To unsubscribe, edit your list preferences, or view the list
In that case, try Russel's suggestion of monitoring CPU usage first. If it
happens and there is no ~10s+ spike, then further investigation's going to
be needed.
On Fri, Jul 20, 2012 at 7:38 PM, Cameron Munroe
wrote:
> After.
>
>
> __**_
> To unsubscribe
After.
On 7/20/2012 5:37 PM, wickedplayer494 . wrote:
Did this happen before or after tonight's update?
On Fri, Jul 20, 2012 at 7:36 PM, Cameron Munroe
wrote:
not sure, wasn't looking at cpu at the time.
On 7/20/2012 5:31 PM, Russell Smith wrote:
What was your CPU usage like at the time?
Did this happen before or after tonight's update?
On Fri, Jul 20, 2012 at 7:36 PM, Cameron Munroe
wrote:
> not sure, wasn't looking at cpu at the time.
>
>
> On 7/20/2012 5:31 PM, Russell Smith wrote:
>
>> What was your CPU usage like at the time? The CPU spike issue I've been
>> having for the
not sure, wasn't looking at cpu at the time.
On 7/20/2012 5:31 PM, Russell Smith wrote:
What was your CPU usage like at the time? The CPU spike issue I've
been having for the last few weeks result in the whole server
disconnecting with steamauth error 6 codes if the spikes happen for a
prolon
What was your CPU usage like at the time? The CPU spike issue I've
been having for the last few weeks result in the whole server
disconnecting with steamauth error 6 codes if the spikes happen for a
prolonged amount of time (10 sec or so).
On 20.07.2012 17:14, Cameron Munroe wrote:
I have he
TF2
On 7/20/2012 5:17 PM, wickedplayer494 . wrote:
What game(s) does this involve? Hard to tell if it's a Source or a GoldSrc
exploit if we don't know.
On Fri, Jul 20, 2012 at 7:14 PM, Cameron Munroe
wrote:
I have heard of reports on my servers that people are able to kick all
players. Was wa
What game(s) does this involve? Hard to tell if it's a Source or a GoldSrc
exploit if we don't know.
On Fri, Jul 20, 2012 at 7:14 PM, Cameron Munroe
wrote:
> I have heard of reports on my servers that people are able to kick all
> players. Was watching the server and just saw a bunch of error 6 c
I have heard of reports on my servers that people are able to kick all
players. Was watching the server and just saw a bunch of error 6 codes.
Just starting the conversation, might be nothing.
___
To unsubscribe, edit your list preferences, or view th
On 11/8/2011 1:28 PM, Saul Rennison wrote:
It's not fake guys, it would be perfectly possible to fake UDP packets
coming from other clients (if you knew their IP address), and then just
flood the server with requests that require reliable responses. Simple.
Kind regards,
*Saul Rennison*
On 8
It's not fake guys, it would be perfectly possible to fake UDP packets
coming from other clients (if you knew their IP address), and then just
flood the server with requests that require reliable responses. Simple.
Kind regards,
*Saul Rennison*
On 8 November 2011 19:19, ics wrote:
> My unders
My understanding is that this was fixed in the latest CS Source update.
-ics
8.11.2011 20:14, Drogen Viech kirjoitti:
http://www.youtube.com/watch?v=i9E7QipxFIA
^
Just seen this on youtube - it was uploaded today. Does anyone already
know how to prevent this?
__
http://www.youtube.com/watch?v=i9E7QipxFIA
^
Just seen this on youtube - it was uploaded today. Does anyone already
know how to prevent this?
___
To unsubscribe, edit your list preferences, or view the list archives, please
visit:
http://list.valvesoftw
@ics: is this the same issue i have with tf2, its almost the same ..
On Tue, 05 Oct 2010 17:19:35 +0300, ics wrote:
> I assume this is CS Source? It has a bug, where if you yourself type
> quit, it will not quit but starts eating 100% cpu. As for the exploit,
> i've seen this working on the old
I assume this is CS Source? It has a bug, where if you yourself type
quit, it will not quit but starts eating 100% cpu. As for the exploit,
i've seen this working on the old engine but not with orangebox so it
might be something new. Do you have any extra security, like plugins
running?
-ics
"Half-Life dedicated Linux server mailing list"
Sent: Tuesday, October 05, 2010 4:04 PM
Subject: [hlds_linux] new exploit? (makes server crash and use 100% cpu)
I have just noticed this (see below) on a srcds_l server running css. After
that the server didn't respond (you aren
I have just noticed this (see below) on a srcds_l server running css.
After that the server didn't respond (you aren't even able to enter
"quit" to the console) and it took 100% cpu.
rcon from "xxx.xxx.xxx.xxx:6565": command "status"
rcon from "xxx.xxx.xxx.xxx:6565": command "sv_allow_wait_com
Anybody aware of the Huntsman Exploit?
If you fire & hit reload it will reload quicker then normal??
Not sure if this is an exploit or not.
William Stillwell
___
To unsubscribe, edit your list preferences, or view the list archive
On Fri, 26 Oct 2001, Eric Smith wrote:
> We've fixed it so the logs won't get spammed anymore. The fix will go out
> with the next TFC server release.
>
> -Eric
I've no problems with some sort of indication of this activity being in
the logs; it allows me to identify intent.
"Insane" Husayn
We've fixed it so the logs won't get spammed anymore. The fix will go out
with the next TFC server release.
-Eric
-Original Message-
From: Leon Hartwig [mailto:[EMAIL PROTECTED]]
Sent: Friday, October 26, 2001 3:54 AM
To: [EMAIL PROTECTED]
Subject: RE: [hlds_linux] New
-
> From: Husayn ibn al-Samarqandi
> [mailto:[EMAIL PROTECTED]]
> Sent: Friday, October 26, 2001 3:28 AM
> To: [EMAIL PROTECTED]
> Subject: [hlds_linux] New exploit or result of Beta patch
>
>
> Folks:
>
> After the recent beta patch, I've been seeing the following
Folks:
After the recent beta patch, I've been seeing the following in the logs.
Is it a new exploit or the results of the beta patch?
L 10/26/2001 - 01:39:33: "((HoGz)) Gen. hogi<555><149361><>" connected,
address "209.86.0.244:27005"
L 10/26/2001 - 01:45:53: "((HoGz)) Gen. hogi<557><149361>"
co
26 matches
Mail list logo