hi everyone, can anyone on list please explain a simpl solution to help me 
get past chapter 2?
I can't seem to train my troops and they all die, if their is a walkthrough 
out their that could help me it would be appreciated.
Brandon
----- Original Message ----- 
From: "shaun everiss" <[EMAIL PROTECTED]>
To: "Gamers Discussion list" <gamers@audyssey.org>
Sent: Tuesday, July 03, 2007 1:18 PM
Subject: Re: [Audyssey] not necessarily true - Re: piracy of games?


> talking on this sort of lines, brings up something interesting.
> There are people employed to hack systems, and crack things.
> Not sure what its about but someone has to test security systems and
> report  on their effectiveness, etc.
> At 03:07 a.m. 4/07/2007, you wrote:
>
>>Hi Andy,
>>
>>Start quote
>>hackers anyone? Ever heard of them? Anyone know what they do, ever
>>thought of them?
>>End quote
>>
>>As a matter of fact I have. I know the difference between a hacker and a
>>cracker which it is obvious you don't. A hacker is an old term to refer
>>to programmers which has somehow been misused by the media to describe
>>dishonest software pirates. A cracker, the correct term, is somehone who
>>cracks software and breaks illegally into networks and computers.
>>The truth is software developers, at least some of them, are hackers and
>>are aware of many cracker methods to break into there systems. Back in
>>my college days I use to experiment with brute force attacks to crack
>>passwords, use ping to crash network servers, and generally tried out
>>every hack I heard of. However, my intent was not to do harm, but to
>>find out if said crack was valid, and secure it if possible.
>>I had a dedicated Unix system in my dorm room I used to attempt to crack
>>into, and I used my own passworded Word 97 files to crack into to find
>>security holes in that software which was nitoriously unsecure. My
>>point, there is a difference in attempting to crack software to discover
>>security holes to fix them or see if it is valid, and quite another to
>>use that knolege to do harm or to steell software.
>>Right now I have a couple of pieces of cracker software on my software
>>which could crack Shades of Doom or GTC, but i have legal copies of
>>both. I'm using the software on my own games to make sure that the I
>>won't be a victem to the same kind of cracker attack. So keep that in
>>mind, and don't think that all developers are ignorant of the tools of
>>the cracker trade. It is just sometimes difficult to deffend against
>>specific kinds of attacks.
>>
>>
>>
>>_______________________________________________
>>Gamers mailing list .. Gamers@audyssey.org
>>To unsubscribe send E-mail to [EMAIL PROTECTED] You can 
>>visit
>>http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make
>>any subscription changes via the web.
>>
>>
>>
>>--
>>No virus found in this incoming message.
>>Checked by AVG Free Edition.
>>Version: 7.5.476 / Virus Database: 269.9.14/884 - Release Date:
>>2/07/2007 3:35 p.m.
>
>
>
> -- 
> No virus found in this outgoing message.
> Checked by AVG Free Edition.
> Version: 7.5.476 / Virus Database: 269.9.14/884 - Release Date: 2/07/2007 
> 3:35 p.m.
>
>
>
> _______________________________________________
> Gamers mailing list .. Gamers@audyssey.org
> To unsubscribe send E-mail to [EMAIL PROTECTED] You can 
> visit
> http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make
> any subscription changes via the web. 


_______________________________________________
Gamers mailing list .. Gamers@audyssey.org
To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit
http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make
any subscription changes via the web.

Reply via email to