On Mon, 25 Mar 2002, Jason Gauthier wrote: >> Seriously though. It really isn't all that hard for a would be cheater >> to log in a character with the Almighty Sword of Slayage give the sword >> to some other character, then run a program which would exhaust all >> your file descriptors so when they quit, it wouldn't save their pfile. >> Then they stop the program again, log back in, and voom. Instantly they >> have 2 Almighty Swords of Slayage. > >Elaborate.. what "program" are they going to run inside a mud that opens >file descriptors?
Wrong question, no need to run anything inside the MUD. Easy way to eat open file descriptors? Shell script, loops launching Telnet sessions in the background. When telnet fails, script aborts and alerts the cheating player. Player hands over items, logs out, killall telnet. Relogin and check if item duplication worked. Probably more that could be done with some creativity. As I read things, lesson to be learned here is to always be mindful of system rseource limitations. Later, d.c. | [EMAIL PROTECTED] - qvid me anxivs svm? - www: rats.darktech.org - KD7KJG | | yet another linux guru in training & reality avoidance therapist at large | | tired of voting for the lesser evil? vote kthulhu & yog-sothoth in 2004! |

