0 Members and 1 Guest are viewing this topic.
nvm i got it to work and its awesome but i gotta ask is there a way i can enable the grand exchange?
is there any way to compile?I can't seem to find the compiler.Do I need eclipse for it?
hey tom Im coming for ur gurl
I'm cool with that, she'd never go for someone who can't finish the job anyway.
wont this lag like hell if you do get like 2billion people on... and if you do i would say run the same server twice but with diffrent ports and change the maximum person to 200. so that way you wont get bad lag
what if i want to stick it in? you got a problem with that?
any 718 cache will work on it?
CVE-2465.N.Gen blocked in class 52 virus in your files lmao.
Exploit:Java/CVE-2013-2465 uses a vulnerability that was found in a 2D component of Java SE. The problem lies in the way the underlying memory operation checks for validity of raster data. Specifically, the memory corruption issue happens in AWT (Abstract Window Toolkit) code. AWT dos native operations on the image data used in the Java application.The vulnerable classes are:java.awt.image.MultiPixelPackedSampleModeljava.awt.image.SinglePixelPackedSampleModelMalicious raster data is prepared for the vulnerable classes. Memory copy operation happens when the image transformation class, for example java.awt.image.AffineTransformOp, is used upon these crafted image objects. The destination raster memory array will be overflown with hacker-supplied data. Heap corruption will happen at this point.Unlike many previous Java vulnerabilities, the exploitation actually happens with native code, not in the code written in Java, and native level memory corruption is involved. The thing is that the Java internal memory structure is laid out very predictably and it helps with the stability of the exploits. Usual exploitation involves the corruption of the hacker-supplied array data structure. By corrupting the length field of the affected data structure, the malicious code will gain full control on the native level memory space. Searching through this memory space and changeing fields related to user privileges, hackers can achieve escalation of privilege.Usually exploits are written using a few Java classes working together. The various class files are bundled into an archive called a JAR, which uses the ZIP file format. Every JAR contains a Manifest.MF file to identify itself to the Java Runtime. Since it is found in every JAR, it won't be listed.
I've only just started looking at 718's and this looks pretty good, least cluttered one i've seen. thanks for this. I'll see what I can do with it