#391 Re: BF1942 Discussion » 1vs1 / 2vs2 Tank Ladder » 2019-10-17 12:14:40

Thanks Whoopz. I believe it was a good and funny tournament, with some hiccups (noshows and usual delays) along the way. We had 32 players joining, which was amazing, and it was a double elimination tournament. Sadly, I lost all the results and screenshots, but I remember that Tuesday won, against all odds, in the final against Ramjet.

I wanted to start a new 1vs1 tournament, tanks, planes, infantry or even knife, but the problem is that tournament system I used is too old and has many security holes, so I have to fix that or create a new one from scratch.

#392 Re: Feedback » too few vehicles - too long spawn times » 2019-10-17 11:17:06

Some good proposed changes to the maps. I will add some of them this weekend and over the next days.

#393 Re: Feedback » 72 player slots » 2019-10-17 11:09:45

Ok, I'll reconsider the idea, but the players numbers fluctuate a bit every week. I've added a poll to the original post to get eveyone's opinion.

#394 Re: Server Ban Appeals » Unban request » 2019-10-17 10:56:07

It doesn't look like it, just play fair and follow the server rules, please, and do not try to evade your ban.

#395 Re: Server Ban Appeals » My banned thread » 2019-10-07 10:52:42

BFSoldier is being cyberbullied, please stop that guys. No one wants to be that lonely kid in the playground school, show him some love next time. You all are better than that.

#396 Re: Server Ban Appeals » Banned for being too good » 2019-10-07 10:22:00

Freedom of speech is about freely discussing ideas or voicing your opinion, not having a free pass to insult or use vulgar words, you fkn animal.

Zwarrior, you have to excuse my friend T-BONE, he is a bit slow in the head. He should be kicked/banned, if he is insulting anyone.

#398 Re: Report Abuse » ''Cheating'' » 2019-10-06 23:29:07

That is blatant cheating, shame on you. To be fair, you should play with default settings, no key remapping, no sensitivity changes, and in 800x600 resolution, like the game was supposed to be played.

#399 Re: Server Ban Appeals » Come on Unban me » 2019-07-16 17:54:03

Zwarrior, I think you are wrong about T-BONE, he does not insult neither team kills afaik. He evaded a previous ban and it was me that banned him, but anyway for evading a ban it is not a permanent ban.

#400 Re: Server Ban Appeals » Come on Unban me » 2019-07-15 23:00:18

T-BONE, you were banned for evading a previous ban, don't do it again next time, even if you find it was an unfair ban.

#401 Re: Technical Help » bf 1942 server help » 2019-02-21 22:31:28

Hello,

You need to open BF1942 server default ports 14567 and 23000 (UDP protocol) in your router. Port 14567 is necessary for players to connect to your server and port 23000 is for GameSpy queries (information about number of players, players name, ping, kills, deaths, etc.).

Then, to show up in the server list you need to download a patched server from http://team-simple.org/download/ page. After, you can check in http://master.bf1942.sk if your server shows up there.

#403 Re: Technical Help » auto kick on AX » 2019-02-21 16:13:53

I think you will be auto kicked from aX server by using a VPN.

He should use a different internet connection. A quick way to test is creating a mobile hotspot from your smartphone and use it to connect to aX server.

#404 Re: Technical Help » auto kick on AX » 2019-02-21 15:09:35

I am not sure if you are DoubTi, but anyway you share the same problem. Your internet connection has a very poor routing to SiMPLE server, packets go from Denmark to New York, USA and then to Paris, France. The same route back and forth.

 1  163-172-13-1.rev.poneytelecom.eu (163.172.13.1)  0.383 ms  0.396 ms  0.475 ms
 2  195.154.2.190 (195.154.2.190)  0.317 ms  0.392 ms 195.154.2.188 (195.154.2.188)  0.334 ms
 3  a9k1-49e-s202b-1-dc2.dc3.poneytelecom.eu (195.154.1.28)  0.616 ms a9k1-pni-th2.dc3.poneytelecom.eu (195.154.1.36)  0.655 ms  0.393 ms
 4  be4752.rcr21.b039311-0.par04.atlas.cogentco.com (149.6.165.65)  0.980 ms  1.279 ms be4751.rcr21.b022890-0.par04.atlas.cogentco.com (149.6.164.41)  0.653 ms
 5  be3750.ccr31.par04.atlas.cogentco.com (154.54.60.201)  1.234 ms  1.132 ms be3739.ccr31.par04.atlas.cogentco.com (154.54.60.185)  1.101 ms
 6  be3184.ccr42.par01.atlas.cogentco.com (154.54.38.157)  1.531 ms  1.474 ms  1.454 ms
 7  be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)  74.364 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)  72.824 ms  71.693 ms
 8  be3496.ccr31.jfk10.atlas.cogentco.com (154.54.0.142)  74.546 ms be3495.ccr31.jfk10.atlas.cogentco.com (66.28.4.182)  73.217 ms  74.213 ms
 9  sprint.jfk10.atlas.cogentco.com (154.54.12.22)  82.485 ms  80.693 ms  82.446 ms
10  144.232.25.231 (144.232.25.231)  91.124 ms  86.358 ms  86.284 ms
11  144.232.14.7 (144.232.14.7)  94.444 ms  90.099 ms  92.140 ms
12  144.232.15.174 (144.232.15.174)  86.111 ms 144.232.14.10 (144.232.14.10)  85.093 ms 144.232.15.174 (144.232.15.174)  86.584 ms
13  144.232.15.123 (144.232.15.123)  91.035 ms 144.232.15.119 (144.232.15.119)  82.682 ms  90.753 ms
14  sl-tdcca-965838-0.sprintlink.net (144.228.205.230)  83.773 ms  83.024 ms  84.320 ms
15  ae1-0.arcnqp7.dk.ip.tdc.net (83.88.26.35)  105.832 ms  104.928 ms  105.802 ms
16  cpe.xe-8-0-1-0.arcnqp7.dk.customer.tdc.net (93.178.190.10)  103.569 ms cpe.xe-7-1-0-0.arcnqp7.dk.customer.tdc.net (176.22.75.234)  105.363 ms cpe.xe-8-0-1-0.arcnqp7.dk.customer.tdc.net (93.178.190.10)  105.880 ms
17  ae0.u36.br1-ar.ip.fullrate.dk (90.185.1.213)  104.963 ms  105.014 ms  105.847 ms
18  * * *
19  * * *
20  * * *

I think that may be the reason why you are getting auto kicked from aX server. You should do a ping or, even better, a traceroute to aX server and post the results.

You can do a traceroute in Windows, by downloading WinMTR and typing ax.bf1942.sk in it.

#405 Re: Server Ban Appeals » Ban on SIMPLE BF 1942 » 2019-02-16 17:51:46

Hello,

There was a problem with the bans. You should be able to join SIMPLE BF 1942 (FRA) server.

#407 Re: News and Announcements » Pwned Passwords » 2019-01-31 15:47:19

Black Mamba wrote:

Tuia, I know you are working hard to maintain this website but have you ever thought of implementing a SSL certificate on your domain? Wouldn’t it make the forums safer?

I will do that in about a month.

#409 Re: News and Announcements » Pwned Passwords » 2019-01-31 15:01:13

There are passwords: https://api.pwnedpasswords.com/range/4BC4A. But, the rest of the hash is not in that list.

#410 Re: News and Announcements » Pwned Passwords » 2019-01-31 14:38:46

Here is the first five digits of my super secret password hash:  4BC4A

Find the password, if you think it is possible. smile

#411 Re: News and Announcements » Pwned Passwords » 2019-01-31 14:19:45

nämeless wrote:

Tuia, don't get me wrong but try to think a bit deeper.

You have a password, an insecure password like "monkey", for example. It's a typical thing for people to get passwords like this one to always remember them. As far as you know, it's possible to get hash from the string but it's not possible to get string from the hash. I believe you will never get something like "iwrestledapolarbeartwice" from any hash but it doesn't work for insecure passwords like "monkey" because it's a very common issue. There are bases of stolen passwords, no hashes, no salt. If you have a table of passwords, you can get another column in this table with hashes of these passwords.

For example.

http://foxtools.ru/Hash

md5(monkey) is d0763edaa9d9bd2a9516280e9044d885

https://md5.web-max.ca

https://i.imgur.com/WIYyUaZ.png

If there is a base of stolen passwords, there are also a table of stolen usernames, addresses, locations etc. In case of request for checking the passwords, the script can seek somewhere to get usernames and addresses associated with this password or hash. There could be a lot of records but only a few with the same IP or another address from the same range.

I know about brute-force, rainbow tables and that MD5 and SHA1 hashes are insecure, but what are you failing to realize is that the complete SHA1 hash of a password is not sent to that Pwned Passwords website, it is just the first 5 digits of that hash. So, that means there are 16^35 combinations remaining. In other words, your password is still safe, if you check by that method.

#412 Re: News and Announcements » Pwned Passwords » 2019-01-31 12:09:33

You are spreading fear, uncertainty and doubt (FUD). Do not type your password in that website, if you are that worried, you just have to send the first 5 digits of the SHA1 hash of your password to check it, how hard is that?

Actually, I think it is a very good service by Troy Hunt and I may add this to the forum registration and login pages, with a very simple method:

<?php
/*
 * Simple method to use the API from https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/
 * Written by Jim Westergren and released to public domain
 * @return int count
 */
function checkPwnedPasswords(string $password) : int
{
    $sha1 = strtoupper(sha1($password));
    $data = file_get_contents('https://api.pwnedpasswords.com/range/'.substr($sha1, 0, 5));
    if (FALSE !== strpos($data, substr($sha1, 5))) {
        $data = explode(substr($sha1, 5).':', $data);
        $count = (int) $data[1];
    }
    return $count ?? 0;
}

#415 Re: Report Abuse » Night mess » 2019-01-30 16:24:01

Thank you for your report. He is banned.

#416 Re: News and Announcements » Pwned Passwords » 2019-01-29 13:50:58

Yes, but that is just visually, the Pwned Passwords website can log and store your password, which I do not believe it does.

#418 Re: News and Announcements » Pwned Passwords » 2019-01-29 13:15:33

If you are concerned of typing your passwords in an "unknown" website to check if they are leaked, your sensible choice would be to create the SHA1 hash of your password and send the first 5 digits of that hash to the Pwned Passwords website, like Trench explained.

You can create SHA1 hash of any text in Windows with QuickHash GUI program instead. Then, send just the first 5 digits of the hash to api.pwnedpasswords.com/range/ and check if the rest of the hash is present in the response. If it is not, your password is not leaked.

An example, suppose the password you want to check is "12345678". The SHA1 hash is 7C222FB2927D828AF22F592134E8932480637C0D, and then you type in your browser tab api.pwnedpasswords.com/range/7c222 and you will see in the text response that the rest of the hash is there:

FB2927D828AF22F592134E8932480637C0D:2889079

2889079 leaks of "12345678" password is not surprising, since most people use these weak, easy to remember, passwords.

I use 3 different passwords for all accounts, but the usual recommendation is to use a different strong password for every account and have a password manager, like KeePass for example, to save them. In case one password gets leaked the other accounts are not at risk.

#419 News and Announcements » Pwned Passwords » 2019-01-28 18:10:33

tuia
Replies: 53

Pwned Passwords are real world passwords previously exposed in data breaches. You should check your passwords in this website: https://haveibeenpwned.com/Passwords

If you have a leaked password, you should change it right away. To change this forum password, go to Profile > Essentials > Change password.

#420 Re: Feedback » Autobalance teams? » 2019-01-28 17:42:48

Ok, I think it works, I did not have time to test it rigorously, please, report any problems. I am not sure if new players are assigned to each team randomly, when autoBalanceTeam is enabled.

Board footer