[Tutorial] Backdooring and anti-theft methodology.
#3

Honestly, the best protection is to store a bind in the .pwn file and check if the server's IP matches the bind. If it doesn't, than delete the .amx of the script. If it does, do nothing.
Reply


Messages In This Thread
Backdooring and anti-theft methodology. - by Hoborific - 19.12.2011, 01:40
Re: Backdooring and anti-theft methodology. - by Hoborific - 19.12.2011, 01:42
Re: Backdooring and anti-theft methodology. - by Scenario - 19.12.2011, 01:57
Re: Backdooring and anti-theft methodology. - by Hoborific - 19.12.2011, 02:03
Re: Backdooring and anti-theft methodology. - by Calgon - 19.12.2011, 02:06
Re: Backdooring and anti-theft methodology. - by Hoborific - 19.12.2011, 02:11
Re: Backdooring and anti-theft methodology. - by Calgon - 19.12.2011, 02:14
Re: Backdooring and anti-theft methodology. - by titanak - 19.12.2011, 02:15
Re: Backdooring and anti-theft methodology. - by Hoborific - 19.12.2011, 02:23
Re: Backdooring and anti-theft methodology. - by robintjeh - 19.12.2011, 13:56

Forum Jump:


Users browsing this thread: 2 Guest(s)