Jump to content
MakeWebGames

Haunted Dawg

Members
  • Posts

    2,933
  • Joined

  • Last visited

    Never
  • Days Won

    1

Everything posted by Haunted Dawg

  1. Re: Securing Variables zeggy do you know what msn is? :? HE QUOTED IT FROM THERE!
  2. Haunted Dawg

    Extract() Error

    Re: Extract() Error explain what extract($row); should be doing?
  3. Re: Password Protect Staff/Admin Panel bullet you cant make a mod to save your life :roll:
  4. Re: Password Protect Staff/Admin Panel seriusly useless :-o I made the other free one into a way better one where my staff can choose there own particular password apart from there game password and such. What happens if one of your staff hates you but likes the hacker? of course your staff will go and say the password wich you gave to everyone duh thats so obvius. But leave it your way IT is just useless in my eyes for $10 when i can make it for free
  5. Re: [Free] Annoying Mod zaver ive used this befor:   <meta http-equiv="REFRESH" content="0;url=http://www.ratemypoo.com;target=blank">   it worked for me or you could just google: php meta codes
  6. Re: New exploit found! just add this at the top of ur cron page: if($_GET['tryitoutagainandifugetitrightluckyforyou'] == hellomyfriendiamanautomatedcron) { Your codes here } then in ur place to run crons just use curl http://www.yourgame.com/cron.php?tryito ... omatedcron I doubt anyone can get that right :D
  7. Re: New exploit found!   dude seriusly i dont think no one can decrypt sh1 atm XD
  8. Re: Strange error in scuba.php well hey...maybe post the code and i can help
  9. Re: Crystal market exploit? woooooh here is a more eficient code for those who have gang markets and such: if($_GET['ID']) { die('Go to hell scumbag :D'); $_GET['ID']=mysql_real_escape_string($_GET['ID']); }['/code] Add that in ur header just under ur health energy and other things. NOTE: You have add a load of them if u dont just use a ID part for instance there is an exploit in the view users wich ive stoped using: [code] if($_GET['u']) { die('Go to hell scumbag :D'); $_GET['u']=mysql_real_escape_string($_GET['u']); }   PS: This has not been tested since mine is a different one and i dont want to go into my database :P[/code]
  10. Re: New exploit found! wanna know the best way to secure ur crons? just go to config.php change ur cron code to sh1 protection atm its md5 hashed so yh just change it to something harder and not just md5 hash encryption
  11. Re: Updated jail features [V2]   Wow thats lame dude XD $jj1iper XD here is an example $killah=$db->query("SELECT WHAT NOT FROM WHERE EVER"); while($d=$db->fetch_row($killah)) { } Do you see where im using $killah???
×
×
  • Create New...