Jump to content
MakeWebGames

SRB

Members
  • Posts

    785
  • Joined

  • Last visited

  • Days Won

    79

Everything posted by SRB

  1. I'm missing the point that there was a scam attempt. Even free hosts alert you to inform you that you can buy hosting. Moral of the story: Be a tight ass and don't pay for your hosting and you can expect poor standards of conduct. What's $5 a month to not have to deal with the drama that free hosting gives you? Know I'd rather pay for a server (Currently paying around $100 monthly) and know it's all running as it should. As you're not paying for a free host, they don't technically owe you anything, including keeping your site online, IMO
  2. You may have a little problem with this:   if(isset($_POST['text']) && empty($_POST['text'])) {  
  3.   Anybody know the way that works? How many before you can hit someone else with one again?  
  4.   Rep given with comment On Behalf of DJK and Dom
  5. SRB

    game suggestions

      Send me the URL.
  6. SRB

    game suggestions

    Yes, the domain is www.pocketmafia.com. The problem is information disclosure via sql tampering. Meaning... You need to be updating the code and checking every variable and where it goes. Enjoy :)
  7. SRB

    Mobile Layout

    Depends on how you plan to sell. Mobile templates, sell at anything from $15 to $30 per copy, when mass sold. Maybe try selling on a site like 4templates. http://www.4templates.com/website-templates/219372625-WT00918/demo/#red
  8. SRB

    Stupid Idoits.

    Really going to play grammar nazi when you don't use punctuation or grammar yourself? I see what you did there!
  9. Oh, go on then, I'll take it :P
  10. SRB

    Stupid Idoits.

    How so? If they don't have the database info or access to the code, this can prove quite tricky to ever work out, IF you go about it the right way. Adding some randomness into the storage function, such as:   $randomNumber = mt_rand(1000,1000000); sha1($_POST['password'] . $randomNumber . substr($username, 0, 5));   Would be quite pressed to break that in any rainbow table or decryption table. Plain MD5 is quite easily breakable since people will happily encrypt their passwords using an online tool such as MD5 Encryption and not accepting the fact that you have just gave your password the ability to be de-crypted using the same database at MD5 Decryption Password circumvention is dependent, for the most part, on your encryption, imo.
  11. Domain Tools Lookup: TopGamesAndServers.eu Not sure you did.
×
×
  • Create New...