#1 Re: Technical Help » bf 1942 server help » 2019-02-21 21:31:28


You need to open BF1942 server default ports 14567 and 23000 (UDP protocol) in your router. Port 14567 is necessary for players to connect to your server and port 23000 is for GameSpy queries (information about number of players, players name, ping, kills, deaths, etc.).

Then, to show up in the server list you need to download a patched server from http://team-simple.org/download/ page. After, you can check in http://master.bf1942.sk if your server shows up there.

#3 Re: Technical Help » auto kick on AX » 2019-02-21 15:13:53

I think you will be auto kicked from aX server by using a VPN.

He should use a different internet connection. A quick way to test is creating a mobile hotspot from your smartphone and use it to connect to aX server.

#4 Re: Technical Help » auto kick on AX » 2019-02-21 14:09:35

I am not sure if you are DoubTi, but anyway you share the same problem. Your internet connection has a very poor routing to SiMPLE server, packets go from Denmark to New York, USA and then to Paris, France. The same route back and forth.

 1  163-172-13-1.rev.poneytelecom.eu (  0.383 ms  0.396 ms  0.475 ms
 2 (  0.317 ms  0.392 ms (  0.334 ms
 3  a9k1-49e-s202b-1-dc2.dc3.poneytelecom.eu (  0.616 ms a9k1-pni-th2.dc3.poneytelecom.eu (  0.655 ms  0.393 ms
 4  be4752.rcr21.b039311-0.par04.atlas.cogentco.com (  0.980 ms  1.279 ms be4751.rcr21.b022890-0.par04.atlas.cogentco.com (  0.653 ms
 5  be3750.ccr31.par04.atlas.cogentco.com (  1.234 ms  1.132 ms be3739.ccr31.par04.atlas.cogentco.com (  1.101 ms
 6  be3184.ccr42.par01.atlas.cogentco.com (  1.531 ms  1.474 ms  1.454 ms
 7  be3628.ccr42.jfk02.atlas.cogentco.com (  74.364 ms be3627.ccr41.jfk02.atlas.cogentco.com (  72.824 ms  71.693 ms
 8  be3496.ccr31.jfk10.atlas.cogentco.com (  74.546 ms be3495.ccr31.jfk10.atlas.cogentco.com (  73.217 ms  74.213 ms
 9  sprint.jfk10.atlas.cogentco.com (  82.485 ms  80.693 ms  82.446 ms
10 (  91.124 ms  86.358 ms  86.284 ms
11 (  94.444 ms  90.099 ms  92.140 ms
12 (  86.111 ms (  85.093 ms (  86.584 ms
13 (  91.035 ms (  82.682 ms  90.753 ms
14  sl-tdcca-965838-0.sprintlink.net (  83.773 ms  83.024 ms  84.320 ms
15  ae1-0.arcnqp7.dk.ip.tdc.net (  105.832 ms  104.928 ms  105.802 ms
16  cpe.xe-8-0-1-0.arcnqp7.dk.customer.tdc.net (  103.569 ms cpe.xe-7-1-0-0.arcnqp7.dk.customer.tdc.net (  105.363 ms cpe.xe-8-0-1-0.arcnqp7.dk.customer.tdc.net (  105.880 ms
17  ae0.u36.br1-ar.ip.fullrate.dk (  104.963 ms  105.014 ms  105.847 ms
18  * * *
19  * * *
20  * * *

I think that may be the reason why you are getting auto kicked from aX server. You should do a ping or, even better, a traceroute to aX server and post the results.

You can do a traceroute in Windows, by downloading WinMTR and typing ax.bf1942.sk in it.

#5 Re: Server Ban Appeals » Ban on SIMPLE BF 1942 » 2019-02-16 16:51:46


There was a problem with the bans. You should be able to join SIMPLE BF 1942 (FRA) server.

#7 Re: Feedback » SiMPLE expansion into other FPS titles » 2019-02-12 00:07:10

Great post, Black Mamba. I would like to help out Battlefield Vietnam players indeed, the code is very similar to Battlefield 1942, and that is a plus. There are other old FPS game titles interesting: Call of Duty, Counter-Strike, Medal of Honor. I never liked Quake, Unreal Tournament and Doom type of games.

Let's not forget Battlefield Secret Weapons Demo. smile It was always great fun playing Hellendoorn modded 24/7.

Can you add more game options to the poll, please?

#8 Re: News and Announcements » Pwned Passwords » 2019-01-31 14:47:19

Black Mamba wrote:

Tuia, I know you are working hard to maintain this website but have you ever thought of implementing a SSL certificate on your domain? Wouldn’t it make the forums safer?

I will do that in about a month.

#10 Re: News and Announcements » Pwned Passwords » 2019-01-31 14:01:13

There are passwords: https://api.pwnedpasswords.com/range/4BC4A. But, the rest of the hash is not in that list.

#11 Re: News and Announcements » Pwned Passwords » 2019-01-31 13:38:46

Here is the first five digits of my super secret password hash:  4BC4A

Find the password, if you think it is possible. smile

#12 Re: News and Announcements » Pwned Passwords » 2019-01-31 13:19:45

nämeless wrote:

Tuia, don't get me wrong but try to think a bit deeper.

You have a password, an insecure password like "monkey", for example. It's a typical thing for people to get passwords like this one to always remember them. As far as you know, it's possible to get hash from the string but it's not possible to get string from the hash. I believe you will never get something like "iwrestledapolarbeartwice" from any hash but it doesn't work for insecure passwords like "monkey" because it's a very common issue. There are bases of stolen passwords, no hashes, no salt. If you have a table of passwords, you can get another column in this table with hashes of these passwords.

For example.


md5(monkey) is d0763edaa9d9bd2a9516280e9044d885



If there is a base of stolen passwords, there are also a table of stolen usernames, addresses, locations etc. In case of request for checking the passwords, the script can seek somewhere to get usernames and addresses associated with this password or hash. There could be a lot of records but only a few with the same IP or another address from the same range.

I know about brute-force, rainbow tables and that MD5 and SHA1 hashes are insecure, but what are you failing to realize is that the complete SHA1 hash of a password is not sent to that Pwned Passwords website, it is just the first 5 digits of that hash. So, that means there are 16^35 combinations remaining. In other words, your password is still safe, if you check by that method.

#13 Re: News and Announcements » Pwned Passwords » 2019-01-31 11:09:33

You are spreading fear, uncertainty and doubt (FUD). Do not type your password in that website, if you are that worried, you just have to send the first 5 digits of the SHA1 hash of your password to check it, how hard is that?

Actually, I think it is a very good service by Troy Hunt and I may add this to the forum registration and login pages, with a very simple method:

 * Simple method to use the API from https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/
 * Written by Jim Westergren and released to public domain
 * @return int count
function checkPwnedPasswords(string $password) : int
    $sha1 = strtoupper(sha1($password));
    $data = file_get_contents('https://api.pwnedpasswords.com/range/'.substr($sha1, 0, 5));
    if (FALSE !== strpos($data, substr($sha1, 5))) {
        $data = explode(substr($sha1, 5).':', $data);
        $count = (int) $data[1];
    return $count ?? 0;

#16 Re: Report Abuse » Night mess » 2019-01-30 15:24:01

Thank you for your report. He is banned.

#17 Re: News and Announcements » Pwned Passwords » 2019-01-29 12:50:58

Yes, but that is just visually, the Pwned Passwords website can log and store your password, which I do not believe it does.

#19 Re: News and Announcements » Pwned Passwords » 2019-01-29 12:15:33

If you are concerned of typing your passwords in an "unknown" website to check if they are leaked, your sensible choice would be to create the SHA1 hash of your password and send the first 5 digits of that hash to the Pwned Passwords website, like Trench explained.

You can create SHA1 hash of any text in Windows with QuickHash GUI program instead. Then, send just the first 5 digits of the hash to api.pwnedpasswords.com/range/ and check if the rest of the hash is present in the response. If it is not, your password is not leaked.

An example, suppose the password you want to check is "12345678". The SHA1 hash is 7C222FB2927D828AF22F592134E8932480637C0D, and then you type in your browser tab api.pwnedpasswords.com/range/7c222 and you will see in the text response that the rest of the hash is there:


2889079 leaks of "12345678" password is not surprising, since most people use these weak, easy to remember, passwords.

I use 3 different passwords for all accounts, but the usual recommendation is to use a different strong password for every account and have a password manager, like KeePass for example, to save them. In case one password gets leaked the other accounts are not at risk.

#20 News and Announcements » Pwned Passwords » 2019-01-28 17:10:33

Replies: 50

Pwned Passwords are real world passwords previously exposed in data breaches. You should check your passwords in this website: https://haveibeenpwned.com/Passwords

If you have a leaked password, you should change it right away. To change this forum password, go to Profile > Essentials > Change password.

#21 Re: Feedback » Autobalance teams? » 2019-01-28 16:42:48

Ok, I think it works, I did not have time to test it rigorously, please, report any problems. I am not sure if new players are assigned to each team randomly, when autoBalanceTeam is enabled.

#22 Re: Feedback » Autobalance teams? » 2019-01-28 13:38:44

I did a small change to autobalance system in BF1942 server, it now does not switch killed players to the team with less players , it only prevents players from switching to the team with more players, when autoteambalance is activated.

To add that change to bf1942_lnxded.static binary, at offset 0x105C26 change byte values from 75 08 to 90 90 and to bf1942_lnxded.dynamic it is at offset 0x10CC96. To BF1942_w32ded.exe at offset 0x73AD5 change byte value from 74 to EB.

#23 Re: Off-Topic » Funny Videos and Pics... » 2019-01-28 13:13:03

This is actually not a funny video, it is rather cringy, but it is in line with the previous American Idol video I've posted and it details a typical jewish behavior:


#25 Re: BF1942 Discussion » Strasbourg Custom Map event [Saturday, Feb. 16, 2019 @18:30 CET] » 2019-01-28 12:37:01

In my opinion, all these mod events should have 2 previously arranged teams, and have players register freely to each team. That way it will attract more players and be more organized, than expecting anyone to join the event.

#26 Re: Feedback » Tone down the APC Mobile Spawnpoint? » 2019-01-28 12:19:00

Thank you for the detailed feedback, BFSoldier1. Those changes will be done this weekend, it should be fairly easy and quick to do.

#27 Re: Server Ban Appeals » Garikabc » 2019-01-20 20:59:59

Your ban expired that day.

#28 Re: Feedback » TeamSpeak update? » 2019-01-20 20:30:05

It is finally working, connect to ts.team-simple.fr or ts.team-simple.org.

Mumble server is also ready: mumble.team-simple.fr or mumble.team-simple.org.

If you wish to have a private channel in SiMPLE's Mumble or TeamSpeak server for your clan or your group of friends, PM me with details and I will get back to you, as soon as possible.

#29 Re: Server Ban Appeals » Banned in SiMPLE | BF1942 [FRA] » 2019-01-13 20:13:38

Yes, it is under "Alex" player name. You were banned for too many minus-score kicks. You are not banned anymore, please, be careful Alex Reaper and read the server rules. Thank you.

#30 Re: Feedback » Autobalance teams? » 2019-01-13 19:49:26

Yes, the team balance system in BF1942 has to be fixed. If anyone has a simple and brilliant idea to improve the autobalance of players, please share it.

Board footer