Raportarea problemelor in goldsrc

Discutii despre tot ce nu se incadreaza in celelalte categorii (dar legat de Counter-Strike !)

Moderators: Moderatori ajutatori, Moderatori

Post Reply
User avatar
SkillartzHD
Membru, skill +3
Membru, skill +3
Posts: 1140
Joined: 08 Feb 2013, 19:43
Detinator Steam: Da
CS Status: HLDS Vulnerability
Detinator server CS: GoldSrc
SteamID: SkillartzHD_hlds
Reputatie: Fost Moderator ajutator
Location: Bucuresti
Has thanked: 14 times
Been thanked: 26 times
Contact:

17 Apr 2019, 04:14

https://github.com/ValveSoftware/halflife/issues

aici puteti raporta probleme acestui motor de joc , valve se preocupa din nou din half-life dar nu se stie pentru cat timp asa ca ar ceva frumos pentru a remedia acest joc invechit

am postat si eu cateva probleme :

https://github.com/ValveSoftware/halflife/issues/2129
https://github.com/ValveSoftware/halflife/issues/2135
Project by HLDS-Project 2017
Static Emulator : Native | Random Emulator : SettiEmu/AVSMP1/AVSMP0/SteamEmu/oldRevEmu/RevEmu is done
KickASS-HLDS v2 (hlds)
KickASS-HLDS v1 (fakedetector)
HL-ClientSteam exploit (pure hlds)
PLCore exploit (dproto&hlds)
FakeConnect 2.0(reunion&rehlds)
KickASS-HLDS v3 in amxx(hlds&rehlds)
...... time passes and evidence are many
Special thanks to Spanwer and Magister
Skype : spyware.spyware1
Steam : Click

SV_CheckForDuplicateNames V2 download
eXtreamSHOP
User avatar
SkillartzHD
Membru, skill +3
Membru, skill +3
Posts: 1140
Joined: 08 Feb 2013, 19:43
Detinator Steam: Da
CS Status: HLDS Vulnerability
Detinator server CS: GoldSrc
SteamID: SkillartzHD_hlds
Reputatie: Fost Moderator ajutator
Location: Bucuresti
Has thanked: 14 times
Been thanked: 26 times
Contact:

20 Apr 2019, 07:07

a aparut counter strike beta
avem si un nou svc , numit svc_exec
si in showscore avem un label cu "money"
:face_party_blower: :face_party_blower: :face_party_blower: :face_party_blower: :face_party_blower:
Project by HLDS-Project 2017
Static Emulator : Native | Random Emulator : SettiEmu/AVSMP1/AVSMP0/SteamEmu/oldRevEmu/RevEmu is done
KickASS-HLDS v2 (hlds)
KickASS-HLDS v1 (fakedetector)
HL-ClientSteam exploit (pure hlds)
PLCore exploit (dproto&hlds)
FakeConnect 2.0(reunion&rehlds)
KickASS-HLDS v3 in amxx(hlds&rehlds)
...... time passes and evidence are many
Special thanks to Spanwer and Magister
Skype : spyware.spyware1
Steam : Click

SV_CheckForDuplicateNames V2 download
User avatar
SkillartzHD
Membru, skill +3
Membru, skill +3
Posts: 1140
Joined: 08 Feb 2013, 19:43
Detinator Steam: Da
CS Status: HLDS Vulnerability
Detinator server CS: GoldSrc
SteamID: SkillartzHD_hlds
Reputatie: Fost Moderator ajutator
Location: Bucuresti
Has thanked: 14 times
Been thanked: 26 times
Contact:

20 Apr 2019, 07:42

svc_exec

el executa fisierele .cfg/rc direct in client/server , fara a folosi comanda exec

Code: Select all

[b].text:01D1EE20                               sub_1D1EE20     proc near               ; DATA XREF: .data:01E3245C?o
.text:01D1EE20
.text:01D1EE20                               var_504         = byte pentru -504h
.text:01D1EE20                               var_104         = byte pentru -104h
.text:01D1EE20
.text:01D1EE20 55                                            push    ebp
.text:01D1EE21 8B EC                                         mov     ebp, esp
.text:01D1EE23 81 EC 04 05 00 00                             sub     esp, 504h
.text:01D1EE29 E8 62 B5 00 00                                call    sub_1D2A390
.text:01D1EE2E 85 C0                                         test    eax, eax
.text:01D1EE30 75 79                                         jnz     short loc_1D1EEAB
.text:01D1EE32 A1 3C 0F 09 02                                mov     eax, dword_2090F3C
.text:01D1EE37 85 C0                                         test    eax, eax
.text:01D1EE39 0F 84 99 00 00 00                             jz      loc_1D1EED8
.text:01D1EE3F 68 48 3A E3 01                                push    offset aExecMapdefault ; "exec mapdefault.cfg\n"
.text:01D1EE44 E8 27 81 00 00                                call    sub_1D26F70
.text:01D1EE49 68 3C 6E 89 02                                push    offset byte_2896E3C
.text:01D1EE4E E8 3D A1 00 00                                call    sub_1D28F90
.text:01D1EE53 83 C4 08                                      add     esp, 8
.text:01D1EE56 3D 03 01 00 00                                cmp     eax, 103h
.text:01D1EE5B 73 7B                                         jnb     short loc_1D1EED8
.text:01D1EE5D 8D 85 FC FE FF FF                             lea     eax, [ebp+var_104]
.text:01D1EE63 50                                            push    eax
.text:01D1EE64 68 3C 6E 89 02                                push    offset byte_2896E3C
.text:01D1EE69 E8 32 BB 00 00                                call    sub_1D2A9A0
.text:01D1EE6E 8A 85 FC FE FF FF                             mov     al, [ebp+var_104]
.text:01D1EE74 83 C4 08                                      add     esp, 8
.text:01D1EE77 84 C0                                         test    al, al
.text:01D1EE79 74 5D                                         jz      short loc_1D1EED8
.text:01D1EE7B 8D 8D FC FE FF FF                             lea     ecx, [ebp+var_104]
.text:01D1EE81 8D 95 FC FA FF FF                             lea     edx, [ebp+var_504]
.text:01D1EE87 51                                            push    ecx
.text:01D1EE88 68 60 3A E3 01                                push    offset aExecSCfg ; "exec %s.cfg\n"
.text:01D1EE8D 68 00 04 00 00                                push    400h
.text:01D1EE92 52                                            push    edx
.text:01D1EE93 E8 C3 01 0E 00                                call    sub_1DFF05B
.text:01D1EE98 8D 85 FC FA FF FF                             lea     eax, [ebp+var_504]
.text:01D1EE9E 50                                            push    eax
.text:01D1EE9F E8 CC 80 00 00                                call    sub_1D26F70
.text:01D1EEA4 83 C4 14                                      add     esp, 14h
.text:01D1EEA7 8B E5                                         mov     esp, ebp
.text:01D1EEA9 5D                                            pop     ebp
.text:01D1EEAA C3                                            retn
.text:01D1EEAB                               ; ---------------------------------------------------------------------------
.text:01D1EEAB
.text:01D1EEAB                               loc_1D1EEAB:                            ; CODE XREF: sub_1D1EE20+10?j
.text:01D1EEAB 83 F8 01                                      cmp     eax, 1
.text:01D1EEAE 75 28                                         jnz     short loc_1D1EED8
.text:01D1EEB0 E8 DB B4 00 00                                call    sub_1D2A390
.text:01D1EEB5 8B 0D 3C 0F 09 02                             mov     ecx, dword_2090F3C
.text:01D1EEBB 85 C9                                         test    ecx, ecx
.text:01D1EEBD 74 19                                         jz      short loc_1D1EED8
.text:01D1EEBF 85 C0                                         test    eax, eax
.text:01D1EEC1 7C 15                                         jl      short loc_1D1EED8
.text:01D1EEC3 83 F8 0C                                      cmp     eax, 0Ch
.text:01D1EEC6 73 10                                         jnb     short loc_1D1EED8
.text:01D1EEC8 8B 0C 85 18 3A E3 01                          mov     ecx, off_1E33A18[eax*4]
.text:01D1EECF 51                                            push    ecx
.text:01D1EED0 E8 9B 80 00 00                                call    sub_1D26F70
.text:01D1EED5 83 C4 04                                      add     esp, 4
.text:01D1EED8
.text:01D1EED8                               loc_1D1EED8:                            ; CODE XREF: sub_1D1EE20+19?j
.text:01D1EED8                                                                       ; sub_1D1EE20+3B?j ...
.text:01D1EED8 8B E5                                         mov     esp, ebp
.text:01D1EEDA 5D                                            pop     ebp
.text:01D1EEDB C3                                            retn
.text:01D1EEDB                               sub_1D1EE20     endp[/b]

++
Project by HLDS-Project 2017
Static Emulator : Native | Random Emulator : SettiEmu/AVSMP1/AVSMP0/SteamEmu/oldRevEmu/RevEmu is done
KickASS-HLDS v2 (hlds)
KickASS-HLDS v1 (fakedetector)
HL-ClientSteam exploit (pure hlds)
PLCore exploit (dproto&hlds)
FakeConnect 2.0(reunion&rehlds)
KickASS-HLDS v3 in amxx(hlds&rehlds)
...... time passes and evidence are many
Special thanks to Spanwer and Magister
Skype : spyware.spyware1
Steam : Click

SV_CheckForDuplicateNames V2 download
User avatar
faKe91
Moderator ajutator
Moderator ajutator
Posts: 1409
Joined: 07 Oct 2014, 17:49
Detinator Steam: Da
CS Status: I <3 Heavy Metal
SteamID: dogseatmypancreas
Reputatie: Moderator ajutator
Fost Membru Club eXtreamCS (doua luni)
Fond eXtream: 0
Location: Republica Moldova, Chișinău
Has thanked: 6 times
Been thanked: 8 times

20 Apr 2019, 12:24

User avatar
faKe91
Moderator ajutator
Moderator ajutator
Posts: 1409
Joined: 07 Oct 2014, 17:49
Detinator Steam: Da
CS Status: I <3 Heavy Metal
SteamID: dogseatmypancreas
Reputatie: Moderator ajutator
Fost Membru Club eXtreamCS (doua luni)
Fond eXtream: 0
Location: Republica Moldova, Chișinău
Has thanked: 6 times
Been thanked: 8 times

20 Apr 2019, 17:22

Pentru a rezolva problema software mode

Code: Select all

gl_texturemode GL_LINEAR_MIPMAP_LINEAR
User avatar
faKe91
Moderator ajutator
Moderator ajutator
Posts: 1409
Joined: 07 Oct 2014, 17:49
Detinator Steam: Da
CS Status: I <3 Heavy Metal
SteamID: dogseatmypancreas
Reputatie: Moderator ajutator
Fost Membru Club eXtreamCS (doua luni)
Fond eXtream: 0
Location: Republica Moldova, Chișinău
Has thanked: 6 times
Been thanked: 8 times

28 Apr 2019, 13:51

User avatar
Armin1
Membru, skill +1
Membru, skill +1
Posts: 349
Joined: 09 Oct 2012, 18:56
Detinator Steam: Da
Detinator server CS: FORMER
SteamID: STEAM_0:0:66823412
Location: Romania, Bucharest
Has thanked: 6 times
Been thanked: 5 times
Contact:

28 Apr 2019, 19:19

In sfarsit :frowning: Insa, din ce vad eu, apare in repere sub forma "Candidate Issues for Future Release" ceea ce exclude din start aparitia in iminentul update, ba chiar si in cel ce il va preceda... ceea ce rezulta o data indefinitiva dar ii confera cel mai probabil (nu garantat) posibilitatea aparitiei... Acum sper ca mikela nu o sa abandoneze ca alfred sau triage. Ce e drept, sesisez ceva activitate :face_with_monocle: :clapping_hands:

EDIT: Triage area for issues that are either too large to be immediately added to the next release or require additional investigation to determine their viability. Exact cum ziceam :crossed_fingers:
Post Reply

Return to “Diverse”

  • Information
  • Who is online

    Users browsing this forum: No registered users and 3 guests