bontrose
|
|
« Reply #15 on: January 08, 2010, 04:04:49 PM » |
|
hah
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
ãłþħά-∆9
|
|
« Reply #16 on: January 12, 2010, 03:57:50 PM » |
|
That was just needless +1ery bonbon
|
|
|
Logged
|
|
|
|
bontrose
|
|
« Reply #17 on: January 12, 2010, 04:23:04 PM » |
|
well i found it funny
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
Exousia
Guest
|
|
« Reply #18 on: January 12, 2010, 05:34:16 PM » |
|
That was just needless +1ery bonbon
That's the best kind of +1ery, Delta. I also love "postcount++" because it references C, which is one of my favorite programming languages. You may rerail the thread now.
|
|
|
Logged
|
|
|
|
bontrose
|
|
« Reply #19 on: January 13, 2010, 03:26:22 PM » |
|
yeah knock that bloated U.S. military budget... err i mean robber baron, down to size!
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
docslax
|
|
« Reply #20 on: January 14, 2010, 06:14:33 PM » |
|
America has budgets for stuff other than military? LIES!
|
|
|
Logged
|
Derailing and trolling forum posts since Sept 2009!
|
|
|
bontrose
|
|
« Reply #21 on: January 16, 2010, 11:24:53 AM » |
|
there is no other budget...
...but obama is still spending
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
Exousia
Guest
|
|
« Reply #22 on: January 16, 2010, 08:25:07 PM » |
|
Oh, so that's why my paycheck envelopes have bills in them......
|
|
|
Logged
|
|
|
|
gs 059
|
|
« Reply #23 on: January 17, 2010, 02:56:05 AM » |
|
you know, there is something our government follows.. it is called, if you are in debt, just keep digging a deeper hole, and maybe you will find money somewhere under it all...
|
|
|
Logged
|
|
|
|
ivandrago
Guest
|
|
« Reply #24 on: January 17, 2010, 06:29:32 AM » |
|
Good to see atleast some Americans have a bit of self reflection, but can we get back on topic ?
I'd like to hear how our developer thinks about my comments and suggestion, but still no word
|
|
|
Logged
|
|
|
|
bontrose
|
|
« Reply #25 on: January 17, 2010, 11:07:23 AM » |
|
Good to see atleast some Americans have a bit of self reflection
R U kidding? its called comedy
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
Brok Ironfist
|
|
« Reply #26 on: January 17, 2010, 11:26:34 AM » |
|
Ivan,
Going back to your original post...
I think bandwidth should be taken out of a virus installation and consideration. A server should have a rating, which could get increased every reboot cycle, that is indicative of the maximum value of money-producing virii installed. The sum of all money-producing virii cannot be larger than the server rating.
All virii would still have their memory and hd limits.
I'm almost thinking that the ability of spyware to steal the $$ of a virus should be changed. As it is, a money-producing virus is much harder to install and easily lost to a quickly installed spyware.
What I would propose is Spyware keeps its ability to track transactions, but not capture them. This would give the hacker the ability to track a virus to its source.
All money-making virii should have a small 100 cpu install file on their server that installed it. It would be this file that we would have to capture (instead of the currently infected machines virus) in order to steal someone's virus. Once captured, the file is transferred to the hackers own machine and all future transactions are moved to him.
This capture would have to be relatively quick though, otherwise no one would be able to steal another virus. Small .1 virus a matter of minutes but larger files could take a few hours.
-Brok
|
|
|
Logged
|
|
|
|
bontrose
|
|
« Reply #27 on: January 18, 2010, 11:36:48 AM » |
|
how about an hour for a v1 fs and a baron should take 24 hrs per v.1
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
ivandrago
Guest
|
|
« Reply #28 on: January 18, 2010, 01:59:31 PM » |
|
What I would propose is Spyware keeps its ability to track transactions, but not capture them. This would give the hacker the ability to track a virus to its source.
All money-making virii should have a small 100 cpu install file on their server that installed it. It would be this file that we would have to capture (instead of the currently infected machines virus) in order to steal someone's virus. Once captured, the file is transferred to the hackers own machine and all future transactions are moved to him.
This capture would have to be relatively quick though, otherwise no one would be able to steal another virus. Small .1 virus a matter of minutes but larger files could take a few hours.
-Brok
Very interesting suggestion this is, I hope it'll draw Emi's attention. Thank you
|
|
|
Logged
|
|
|
|
bontrose
|
|
« Reply #29 on: January 19, 2010, 07:05:36 PM » |
|
send him a msg
|
|
|
Logged
|
i win you lose get over it
NOW
|
|
|
|