Jump to content

Leaderboard

The search index is currently processing. Leaderboard results may not be complete.

Popular Content

Showing content with the highest reputation on 09/06/2014 in all areas

  1. What if one day the whole community .... but everyone is like playing cs be like playing any game and could put they nicknames > CSBD-Is With Palestine^Free Gaza!!!.... sounds good .... and fighting for a noble cause even if on forum even if in a game we are there ...with our hearts we try to do this... just for our member from Palestine We will select a day...a date and we will do this? who is with me? Gaza need Voices!!! And it would be nice to spread it to all games on all servers ON AL FORUMS ... this day ... in which each player fighting for gaza ... what if we could be seen by people and say .... That's weird .... and be on TV ..... the day when gamers fight for gaza
    1 point
  2. Developer Sucker Punch is not calling inFamous: Second Son a reboot but a new protagonist, gorgeous new location and new powers suggests otherwise. Core elements remain like the morality system and being able to parkour your way around the city that still make it an altogether familiar experience. Cole MacGrath and his electrical powers are gone though, replaced by a younger superhero in the making. Delsin Rowe is a twenty-something tagger, casually dressed in denim, flannel shirt and red beanie. A member of the Native American Akomish tribe, Rowe lives in the shadow of his clearly much-loved local deputy brother Reggie whose face is plastered on billboards. Troy Baker (whose voice acting credits include Joel from the Last of Us) puts in a fine performance as Delsin giving him the kind of roguish charm that Cole certainly lacked. The voice casting on the whole impresses and the excellent facial mapping brings a great cinematic quality to the cut-scenes. What happened in the previous games, and specifically inFamous 2, shape the events in Second Son. Set seven years after the fallout in New Morais, the oppressive Department of Unified Protection (D.U.P) is still attempting to lock up the Conduits or as they are known to their captors, the bio-terrorists. Delsin is experiencing a life without purpose until an accident changes everything and he discovers he can absorb the powers of Conduits. It also grants him the power to see into their lives, fuelling his ambition to protect the people with superhero powers but his rebellious instincts give him an insatiable hunger to gain more new powers to have fun with. There’s smoke, neon and a whole lot more. We won’t spoil it by listing them in detail but they are guaranteed to make the slick combat more fun and getting around the city a breeze. Powers need to be developed and with little time on his hands, Delsin needs to soak up power shards stored in AR Drone-looking surveillance cameras that float around the city or by dismantling core relays. The only problem is that these relays are dotted around the city in D.U.P territory and you’ll need to flush them out first before soaking up the shards. You’ll also get access to an upgrade system where you can increase your powers or add new moves to make combat up close or from a distance more varied. The choice whether to take the Heroic or Ruthless path will affect the moves you can unlock, so if you want to experience them all, it’s an extra incentive to give Second Son another playthrough choosing the alternate path. Handily, there’s a power bar in the bottom right corner that lets you know when you’re running low on juice. It’s usually pretty easy to roam the rooftops to find a chimney top to suck smoke from, or snatch the neon from a nearby street sign. You will definitely want to roam as well. It a large part of the fun you can have in Second Son and a testament to Sucker Punch for creating such a wide open world where only the forested areas outside of the city are really off limits. The Second Son world isn’t quite GTA 5 big, but it’s still impressively grand enough to want to explore every inch. Modelled on Seattle, the city closest to the developer HQ, the two-part landscape is separated by a river and if you climb up to the highest points you can appreciate how much detail and work has gone into to it – it’s quite stunning. If you thought Killzone: Shadow Fall raised the bar for dynamic use of lighting, Second Son smashes it to pieces. Whether it’s the glare as you look up into the sky or the early evening sun that pierces through the gaps in high-rise buildings, this world looks every bit part of a next-generation game. Even when drenched in darkness, the neon billboards help create that gritty, urban feel of a city. Not only is there clear appreciation of the PS4’s extra graphical capabilities but Sucker Punch is the first to fully embrace the DualShock 4 controller. Touchpad, speaker, light bar and haptic feedback all play their part. Soaking up power shards is amplified through the controller, the touchpad can be swiped to open up Conduit holding pens. Perhaps best of all, you can use the controller as a spray can to tag the side of buildings and walls. Tilt the DualShock 4 controller vertically, you’ll have to shake the controller to mimic shaking the can and hit R2 to spray through the stencils. It’s a nice touch and adds to the more playful nature and tone of Second Son. The morality system has always been a fundamental part of inFamous and in Second Son you’ll be faced with making decisions. Whether it’s choosing to corrupt or save a conduit or execute a surrendering D.U.P soldier, it will affect your good and bad karma altering the arc of your story. Whether it dramatically changes events or some of the outcomes we’re not entirely convinced. Playing through both heroic and ruthless stories, we still encountered many of the same bosses and felt like we were moving to the same conclusion. Basically, if you were hoping for Heavy Rain-style decisions with drastic storyline consequences you might be a little disappointed. The story should offer you around 10-11 hours from start to finish. Tackle the heroic and ruthless arcs and you can double that. The storyline is nicely paced and doesn’t try to force you through the story too quickly. Those who were eager to get it on pre-order get the added bonus of the Cole Legacy DLC as well, which will extend that playtime. Bosses might not be Kessler from inFamous frustrating, but you can expect to die more than a few times trying to defeat most of them. They’re definitely not as taxing to work out how to beat and staying alive is made easier with some of the powers you’ll acquire later in the game. Our advice is that if you reach a critically condition, run away for long enough and it doesn’t take long for your life to be restored. Even jumping into the water simply places you back on land with life intact and the boss energy bar still at the same level, unlike when your powers were electric-based in previous inFamous titles. One of the more disappointing aspects of the game is that the side missions seem a little undercooked. Saying that, you will definitely spend plenty of time just going around destroying D.U.P territories or taking our drug dealers if you adopt the squeaky clean hero option.
    1 point
  3. ø Method of contact (Y!m / Skype): PM or TS.CSBLACKDEVIL.COM ø Item(s) on sale: 4x CS:GO GIFTS ø Price of the product(s): 6€ paypal/gift or 2x gifts at 10€ ø Payment method: paypal ø Other specifications: -
    1 point
  4. Topic Inchis Member Banat!
    1 point
  5. Te rog sa iti dai interesul pentru acest topic folosind functia "Bump Topic" altfel va fi inchis !
    1 point
  6. ¤ Name in game : Madnour ¤ Age : 30 ¤ Name : nourddine ¤ City : Djelfa ¤ County : ¤ Country : Algeria ¤ Favorite Games : last battle , counter strike ¤ A short description about you : normal person ¤ How did you find CsBlackDevil : RaMiRaZ tell me ¤ Server preferred (server only from community!) : all server's ¤ A picture of you (if you already have one and want to post):--
    1 point
  7. Acea eroare este cauzata de browser-ul tau, probabil ai multe cookie-uri active ce formeaza un conflict intre browser si site-ul curent, incearca sa schimbi browser-ul sau sa-l cureti pe cel actual cu softuri de genu: CC cleaner, etc.
    1 point
  8. [ENG] This server does not belong to this community! because their owners decided Changing Community [RO] Acest server nu face parte din aceasta comunitate! pentru că proprietarii lor au decis Schimbarea comunitare
    1 point
  9. ¤ Nume în joc : FickeDbr0N ¤ Vârsta:23 ¤ Nume:Matei ¤ Oraș:Fcs ¤ Județ:VN ¤ Țară:Romania =)) ¤ Jocuri preferate:CS1.6/GO ¤ O scurtă descriere despre tine:Nimic interesant ) ¤ De unde ai aflat de CsBlackDevil: Jucam pe anumite servere , nu mai stiu sigur de unde ¤ Server preferat (server doar din comunitate!):RESPAWN :]] Majoritatea ma mai stiti . Cand am avut meciuri la dreamhack sau prin bucuresti v-am mai cunoscut , nu va stiu si pe forum asa ca , lasati si un reply ) P.S : Astept pareri de video =))))) https://www.youtube.com/watch?v=Ikt9dW3neGo
    1 point
  10. Hacking Internet of Things (IoTs) have become an amazing practice for cyber criminals out there, but messing with Traffic lights would be something more crazy for them. The hacking scenes in hollywood movies has just been a source of entertainment for the technology industry, like we've seen traffic lights hacked in Die Hard and The Italian Job, but these movies always inspire hackers to perform similar hacking attacks in day-to-day life. Security researchers at the University of Michigan have not only hacked traffic light signals in real life, but also claimed that it’s actually shockingly easy to perform by anyone with a laptop and the right kind of radio. If we compare the traffic light hacks in movies and real life, the reality is much easier. In a paper study published this month, the security researchers describe how a series of major security vulnerabilities in traffic light systems allowed them to very easily and very quickly seized control of the whole system of at least 100 traffic signals in an unnamed Michigan city from a single point of access. Researchers took permission from a local road agency before performing the hack, but they did not disclose exactly where in Michigan they did their research. ‟Our attacks show that an adversary can control traffic infrastructure to cause disruption, degrade safety, or gain an unfair advantage,” the paper explained. SECURITY HOLES IN TRAFFIC LIGHT SYSTEMS The team, led by University of Michigan computer scientist J. Alex Halderman, said that the networked traffic systems are left vulnerable to three major weaknesses: unencrypted radio signals, the use of factory-default usernames and passwords, and a debugging port that is easy to attack This left the network accessible to everyone from cyber criminals to young hackers. traffic light hacking “The vulnerabilities we discover in the infrastructure are not a fault of any one device or design choice, but rather show a systemic lack of security consciousness,” the researchers report in a paper. In an effort to save on installation costs and increase flexibility, the traffic light system makes use of wireless radio signals rather than dedicated physical networking links for its communication infrastructure - this hole was exploited by the researchers. Surprisingly, more than 40 states currently use such systems to keep traffic flowing as efficiently as possible. “The safety critical nature of traffic infrastructure requires that it be secure against computer-based attacks, but this is not always the case,” the team said. “We investigate a networked traffic signal system currently deployed in the United States and discover a number of security flaws that exist due to systemic failures by the designers. We leveraged these flaws to create attacks which gain control of the system, and we successfully demonstrate them on the deployment.” WIRELESS SECURITY IN QUESTIONS The Traffic light systems use a combination of 5.8GHz and 900MHz radio signals, depending on the conditions at each intersection, for wireless communication in point-to-point or point-to-multipoint configurations. The 900MHz links use "a proprietary protocol with frequency hopping spread-spectrum (FHSS)," but the 5.8GHz version of the proprietary protocol isn't terribly different from 802.11n. The researchers says that anyone with a laptop and a wireless card operating on the same frequency as the wirelessly networked traffic light — in this case, 5.8 gigahertz — could access the entire unencrypted network. DEBUG PORT Now, after gaining access, next was to communicate with one of the controllers in their target network. This was done very easily due to the fact that this system’s the control boxes run VxWorks 5.5, a version which by default gets built from source with a debug port left accessible for testing. “By sniffing packets sent between the controller and this program, we discovered that communication to the controller is not encrypted, requires no authentication, and is replayable. Using this information, we were then able to reverse engineer parts of the communication structure,” the paper reads. “Various command packets only differ in the last byte, allowing an attacker to easily determine remaining commands once one has been discovered. We created a program that allows a user to activate any button on the controller and then displays the results to the user. We also created a library of commands which enable scriptable attacks. We tested this code in the field and were able to access the controller remotely.” This debug port allowed researchers to successfully turned all lights red or alter the timing of neighboring intersections — for example, to make sure someone hit all green lights on a given route. More worrying part is the ability of a cyber criminal to perform denial-of-service (DoS) attack on controlled intersections by triggering each intersection’s malfunction management unit by attempting invalid configurations, which would put the lights into a failure mode. SOLUTION TO PROBLEM At last, the team called for manufacturers and operators to improve the security of traffic infrastructure. It recommended that the traffic-system administrators should not use default usernames and passwords, as well as they should stop broadcasting communications unencrypted for “casual observers and curious teenagers” to see. "While traffic control systems may be built to fail into a safe state, we have shown that they are not safe from attacks by a determined adversary," the paper concluded. Moreover, they also warned that devices like voting machines and even connected cars could suffer similar attacks.
    1 point
  11. Accesul utilizatorului a fost restrictionat. TOPIC CLOSED.
    1 point
  12. ø Produs oferit: Steam CS:GO ø Detalii produs: Steam-ul are rank Legendary Eagle Master. ø Preț: 25 euro transfer bancar / 2 gift-uri CS:GO ø Contact: ts.csblackdevil.com , private fuzy #VALOAREDAIAMARE , sau PM pe forum ø Imagini: http://s13.postimg.org/3ylz0euxz/Untitled.png -edit- Steam-ul a fost vandut cu succes, rog un moderator sa inchida acest topic.
    1 point
  13. 1 point
  14. Fac si eu update ! Una mai veche ca alta , cea mai noua este prima ! :* Si ceea de AICI
    1 point
  15. Hop si io ).Toata lumea ma stie deci nu e nevoie de prea multe prezentari ) Eu is ala din stanga,celalalt e varu,putin cam fumat ca dea e petrecere )
    1 point
  16. 1. Start -> Control Panel -> Network and Sharing Center -> Manage wireless networks 2. Click dreapta pe reteaua de la care vrei sa aflii parola(trebuie sa fi conectat pe acea retea neaparat) si apoi Click pe Properties 3. Mergeti la Security si bifati 'Show characters'. 4. Dupa ce ati bifat 'Show characters' 5. Deaspura de casuta cu Show characters, la Network Security Key va scrie parola retelei wifi respective! Well Done!
    1 point
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.