Jump to content

Robert

User Admin
  • Posts

    12,747
  • Joined

  • Last visited

  • Days Won

    282

Posts posted by Robert

  1. Need more weapons... if you have the strength

     

    A missile let's say, would use 50 strength, and could take

    60-70 HP. Or it could miss of course. Other awesome

    weapons could consume more than 100 strength. A bomb

    is not much of a weapon now. Unless the idea is to level

    the playing field.

  2. These old school installation methods are driving me crazy. Can someone please help me?

    Witch one do I pick?

    witch_to_pick.GIF

    after that i'll take another print screen so you guys can help me with the next step.

    Well I think we got right off track somewhere.

     

    I'm not familiar with Amazon, but most of these games

    allow you to run the sound setup again and choose something

    else. Therefore try Adlib firstly, hopefully you get music. If so,

    then try the SoundBlaster. If it works, then you will get some

    additional sounds such as voices and explosions. Now XP does

    a mapping so that choosing IRQ5, I/O 220, DMA1 is the best

    choice. If nothing works, it hangs the pc, or runs extremely slowly, then choose pc speaker. It will sound horrible but you get something.

     

    If the above doesn't work and you insist on full sound, then either

    get a plug-in soundcard rather than the onboard one and set it for

    the IRQ etc as above; and/or use the programs that the other

    members have suggested.

  3. IMHO you have a problem...

     

    I have kof2003 working on kawaks148dev. Your kof2003 set bears no relationship to mine at all. You are missing all of the 16meg roms.

     

    With kof2003b, the file names and sizes agree, although many of the CRCs differ. A problem is the fact that your 271-c5d.rom and 271-c6d.rom files are identical, indicating a bad dump.

     

    To give you an idea, this is what kawaks148dev needs (neogeo roms omitted)

     

    kof2003                             262144	c521b5bc  	271-bios.bin
    kof2003                           16777216	c29acd28  	271-c1d.bin 
    kof2003                           16777216	328e80b1  	271-c2d.bin 
    kof2003                           16777216	020a11f1  	271-c3d.bin 
    kof2003                           16777216	991b5ed2  	271-c4d.bin 
    kof2003                           16777216	c2de8b66  	271-c5d.bin 
    kof2003                           16777216	3ff750db  	271-c6d.bin 
    kof2003                             524288	0e86af8f  	271-m1d.bin 
    kof2003                            4194304	b9da070c  	271-p1.bin  
    kof2003                            4194304	da3118c4  	271-p2.bin  
    kof2003                            1048576	5cefd0d2  	271-p3.bin  
    kof2003                            1048576	59d376da  	271-p3d.bin 
    kof2003                           16777216	2058ec5e  	271-v1d.bin 
    
    kof2003b                          16777216	c29acd28  	271-c1d.bin 
    kof2003b                          16777216	328e80b1  	271-c2d.bin 
    kof2003b                          16777216	020a11f1  	271-c3d.bin 
    kof2003b                          16777216	991b5ed2  	271-c4d.bin 
    kof2003b            	             16777216	c2de8b66  	271-c5d.bin 
    kof2003b            	             16777216	3ff750db  	271-c6d.bin 
    kof2003b            	               524288	0e86af8f  	271-m1d.bin 
    kof2003b            	              4194304	92ed6ee3  	271-p1bl.bin
    kof2003b            	              3145728	5d3d8bb3  	271-p2bl.bin
    kof2003b            	               131072	482c48a5  	271-s1bl.bin
    kof2003b            	             16777216	2058ec5e  	271-v1d.bin
  4. I know you're the boss here, but why make two threads?

     

    Anyway I'm a bit confused here (need much more info)

     

    What OS?

    What doesn't boot from what?

    What file system?

     

    If safe mode doesn't work,

    Restore disk time by the sound of it.

     

    Is the floppy a bootable floppy?

  5. You need python.exe to run it.

     

    I looked up this man's work, he has written heaps of papers,

    mainly on java.

     

    He also wrote this:

     

    This paper describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer. Web spoofing allows an attacker to create a "shadow copy" of the entire World Wide Web. Accesses to the shadow Web are funneled through the attacker's machine, allowing the attacker to monitor all of the victim's activities including any passwords or account numbers the victim enters. The attacker can also cause false or misleading data to be sent to Web servers in the victim's name, or to the victim in the name of any Web server. In short, the attacker observes and controls everything the victim does on the Web. We have implemented a demonstration version of this attack.
  6. This trojan can download a ddos remote-controlled bot, which

    is controlled via a secret IRC channel, and instructed to conduct

    a denial of service attack on a selected victim.

     

    Since SP2 firewall only blocks incoming ports, outgoing attacks

    can continue unimpeded.

  7. Mozilla and Firefox flaws exposed

     

    Mozilla and Firefox users were warned of a number of potentially troublesome security vulnerabilities this week.

     

    The most serious flaw involves a buffer overflow bug in the way Mozilla processes the NNTP (news) protocol. The bug creates a means for hackers inject hostile code into vulnerable systems, providing they trick users into executing maliciously constructed news server links. All versions of Mozilla prior to 1.7.5 are affected. Firefox users are advised to make sure they are running version 1.0 to minimise any risk. The flaw was discovered by Maurycy Prodeus of Polish firm iSEC Security Research.

     

    Next up, Secunia has discovered a flaw that creates a means to spoof the source displayed in the Firefox's download dialog box. The vulnerability has been confirmed in Mozilla 1.7.3 for Linux, Mozilla 1.7.5 for Windows, and Mozilla Firefox 1.0. Other versions may also be affected, Secunia warns. It advises Firefox users to avoid download links from untrusted sources pending the availability of patches from the Mozilla project.

     

    Finally, there's a less serious problem affecting Firefox and its email client Thunderbird. Security researchers have found that temporary files are stored by the popular packages in a format that makes it possible for snoops to read the content of downloads and attachments of other users on the same machine.

     

    An overview of these flaws and suggested workarounds can be found here

  8. Just when you thought microsoft had fixed the security problems...

     

    A new Trojan horse - named Phel - that punishes users of Microsoft Windows XP operating system is in the wild.

     

    Security software firm Symantec has issued a bulletin warning Windows XP users to be on the look out for the program, which is distributed as an.html file. The malicious code can attack systems running XP Service Pack 2. The vuln was first found in October, and Microsoft is busy trying to catch up to it.

     

    "Microsoft is taking this vulnerability very seriously, and an update to correct the vulnerability is currently in development," the company told ComputerWorld. "We will release the security update when the development and testing process is complete, and the update is found to effectively correct the vulnerability."

     

    Symantec warns that users will see two Internet Explorer windows pop up when an.html file with Trojan.Phel.A is opened. If the code does its worst, the Trojan will automatically be executed every time a Windows user turns on his machine

     

    More information from Symantec is available here

×
×
  • Create New...