hi everyone, can anyone on list please explain a simpl solution to help me get past chapter 2? I can't seem to train my troops and they all die, if their is a walkthrough out their that could help me it would be appreciated. Brandon ----- Original Message ----- From: "shaun everiss" <[EMAIL PROTECTED]> To: "Gamers Discussion list" <gamers@audyssey.org> Sent: Tuesday, July 03, 2007 1:18 PM Subject: Re: [Audyssey] not necessarily true - Re: piracy of games?
> talking on this sort of lines, brings up something interesting. > There are people employed to hack systems, and crack things. > Not sure what its about but someone has to test security systems and > report on their effectiveness, etc. > At 03:07 a.m. 4/07/2007, you wrote: > >>Hi Andy, >> >>Start quote >>hackers anyone? Ever heard of them? Anyone know what they do, ever >>thought of them? >>End quote >> >>As a matter of fact I have. I know the difference between a hacker and a >>cracker which it is obvious you don't. A hacker is an old term to refer >>to programmers which has somehow been misused by the media to describe >>dishonest software pirates. A cracker, the correct term, is somehone who >>cracks software and breaks illegally into networks and computers. >>The truth is software developers, at least some of them, are hackers and >>are aware of many cracker methods to break into there systems. Back in >>my college days I use to experiment with brute force attacks to crack >>passwords, use ping to crash network servers, and generally tried out >>every hack I heard of. However, my intent was not to do harm, but to >>find out if said crack was valid, and secure it if possible. >>I had a dedicated Unix system in my dorm room I used to attempt to crack >>into, and I used my own passworded Word 97 files to crack into to find >>security holes in that software which was nitoriously unsecure. My >>point, there is a difference in attempting to crack software to discover >>security holes to fix them or see if it is valid, and quite another to >>use that knolege to do harm or to steell software. >>Right now I have a couple of pieces of cracker software on my software >>which could crack Shades of Doom or GTC, but i have legal copies of >>both. I'm using the software on my own games to make sure that the I >>won't be a victem to the same kind of cracker attack. So keep that in >>mind, and don't think that all developers are ignorant of the tools of >>the cracker trade. It is just sometimes difficult to deffend against >>specific kinds of attacks. >> >> >> >>_______________________________________________ >>Gamers mailing list .. Gamers@audyssey.org >>To unsubscribe send E-mail to [EMAIL PROTECTED] You can >>visit >>http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make >>any subscription changes via the web. >> >> >> >>-- >>No virus found in this incoming message. >>Checked by AVG Free Edition. >>Version: 7.5.476 / Virus Database: 269.9.14/884 - Release Date: >>2/07/2007 3:35 p.m. > > > > -- > No virus found in this outgoing message. > Checked by AVG Free Edition. > Version: 7.5.476 / Virus Database: 269.9.14/884 - Release Date: 2/07/2007 > 3:35 p.m. > > > > _______________________________________________ > Gamers mailing list .. Gamers@audyssey.org > To unsubscribe send E-mail to [EMAIL PROTECTED] You can > visit > http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make > any subscription changes via the web. _______________________________________________ Gamers mailing list .. Gamers@audyssey.org To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make any subscription changes via the web.