
Igor Epocci
Minmatar Fringe Industries EMS
|
Posted - 2010.04.27 16:40:00 -
[1]
Originally by: Silent Wispa
Originally by: BOEHKOP Edited by: BOEHKOP on 26/04/2010 14:10:03
Originally by: War Kitten
What bothers me is that it took him 2 hours because he just happens to have already done the decoding work in relation to, shall we say, his 'other' projects.
'other' projects? Everyone can do 'other' projects, not only russians! I can't believe that they so smart.
You, as well, can start first 'other' project: Find answers for all questions in Donald E. Knuth TAOCP books. (take note: you can start earn cash! "If you are really a careful reader, you may be able to recoup more than the cost of the books this way.") Then move to W. Richard Stevens books, it will be easy after TAOCP, you will enjoy reading.
After some years of similar and 'other' projects, you can say - "two hours from scratch? why so long?"
I'm sorry, I was being polite, but as thats leading to misunderstanding I'll drop that tack now.
What I mean is, its absolutely impossible for anyone no matter how bright to decypher what means what with the Eve-Online client stream in a mere 2 hours. Infact the majority of the Devs would need more than 2 hours.
The reason it only took huhuhuhuhuhuhuhuh and co. 2 hours is because they had already done it some time ago as they take a very deep interest in how the client works for the production of macro programs. What they've done here is taken the information they've already been using - ie watching the local stream for new clients to automatically move a ship ratting to safety and instead spoofed information to prevent the client appearing in local at all. Then they've gone and stated this must be exactly what the accussed is doing because otherwise their macro bots wouldn't have been failing like they have.
don't bet on it being that difficult. It your job, say maybe corporate network security, has you using low-level network software and you know your trade, then figuring out the contents of an MMO packet could be trivial.
Theoretically, it wouldn't be vastly more difficult than hacking a wireless network. The tools exist, and those versed in their usage commonly perform 'miracles' in short order.
|