You are not logged in.
Thanks Whoopz. I believe it was a good and funny tournament, with some hiccups (noshows and usual delays) along the way. We had 32 players joining, which was amazing, and it was a double elimination tournament. Sadly, I lost all the results and screenshots, but I remember that Tuesday won, against all odds, in the final against Ramjet.
I wanted to start a new 1vs1 tournament, tanks, planes, infantry or even knife, but the problem is that tournament system I used is too old and has many security holes, so I have to fix that or create a new one from scratch.
Some good proposed changes to the maps. I will add some of them this weekend and over the next days.
Ok, I'll reconsider the idea, but the players numbers fluctuate a bit every week. I've added a poll to the original post to get eveyone's opinion.
It doesn't look like it, just play fair and follow the server rules, please, and do not try to evade your ban.
BFSoldier is being cyberbullied, please stop that guys. No one wants to be that lonely kid in the playground school, show him some love next time. You all are better than that.
Freedom of speech is about freely discussing ideas or voicing your opinion, not having a free pass to insult or use vulgar words, you fkn animal.
Zwarrior, you have to excuse my friend T-BONE, he is a bit slow in the head. He should be kicked/banned, if he is insulting anyone.
What about free speech?
That is blatant cheating, shame on you. To be fair, you should play with default settings, no key remapping, no sensitivity changes, and in 800x600 resolution, like the game was supposed to be played.
Zwarrior, I think you are wrong about T-BONE, he does not insult neither team kills afaik. He evaded a previous ban and it was me that banned him, but anyway for evading a ban it is not a permanent ban.
T-BONE, you were banned for evading a previous ban, don't do it again next time, even if you find it was an unfair ban.
Hello,
You need to open BF1942 server default ports 14567 and 23000 (UDP protocol) in your router. Port 14567 is necessary for players to connect to your server and port 23000 is for GameSpy queries (information about number of players, players name, ping, kills, deaths, etc.).
Then, to show up in the server list you need to download a patched server from http://team-simple.org/download/ page. After, you can check in http://master.bf1942.sk if your server shows up there.
I think you will be auto kicked from aX server by using a VPN.
He should use a different internet connection. A quick way to test is creating a mobile hotspot from your smartphone and use it to connect to aX server.
I am not sure if you are DoubTi, but anyway you share the same problem. Your internet connection has a very poor routing to SiMPLE server, packets go from Denmark to New York, USA and then to Paris, France. The same route back and forth.
1 163-172-13-1.rev.poneytelecom.eu (163.172.13.1) 0.383 ms 0.396 ms 0.475 ms
2 195.154.2.190 (195.154.2.190) 0.317 ms 0.392 ms 195.154.2.188 (195.154.2.188) 0.334 ms
3 a9k1-49e-s202b-1-dc2.dc3.poneytelecom.eu (195.154.1.28) 0.616 ms a9k1-pni-th2.dc3.poneytelecom.eu (195.154.1.36) 0.655 ms 0.393 ms
4 be4752.rcr21.b039311-0.par04.atlas.cogentco.com (149.6.165.65) 0.980 ms 1.279 ms be4751.rcr21.b022890-0.par04.atlas.cogentco.com (149.6.164.41) 0.653 ms
5 be3750.ccr31.par04.atlas.cogentco.com (154.54.60.201) 1.234 ms 1.132 ms be3739.ccr31.par04.atlas.cogentco.com (154.54.60.185) 1.101 ms
6 be3184.ccr42.par01.atlas.cogentco.com (154.54.38.157) 1.531 ms 1.474 ms 1.454 ms
7 be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169) 74.364 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197) 72.824 ms 71.693 ms
8 be3496.ccr31.jfk10.atlas.cogentco.com (154.54.0.142) 74.546 ms be3495.ccr31.jfk10.atlas.cogentco.com (66.28.4.182) 73.217 ms 74.213 ms
9 sprint.jfk10.atlas.cogentco.com (154.54.12.22) 82.485 ms 80.693 ms 82.446 ms
10 144.232.25.231 (144.232.25.231) 91.124 ms 86.358 ms 86.284 ms
11 144.232.14.7 (144.232.14.7) 94.444 ms 90.099 ms 92.140 ms
12 144.232.15.174 (144.232.15.174) 86.111 ms 144.232.14.10 (144.232.14.10) 85.093 ms 144.232.15.174 (144.232.15.174) 86.584 ms
13 144.232.15.123 (144.232.15.123) 91.035 ms 144.232.15.119 (144.232.15.119) 82.682 ms 90.753 ms
14 sl-tdcca-965838-0.sprintlink.net (144.228.205.230) 83.773 ms 83.024 ms 84.320 ms
15 ae1-0.arcnqp7.dk.ip.tdc.net (83.88.26.35) 105.832 ms 104.928 ms 105.802 ms
16 cpe.xe-8-0-1-0.arcnqp7.dk.customer.tdc.net (93.178.190.10) 103.569 ms cpe.xe-7-1-0-0.arcnqp7.dk.customer.tdc.net (176.22.75.234) 105.363 ms cpe.xe-8-0-1-0.arcnqp7.dk.customer.tdc.net (93.178.190.10) 105.880 ms
17 ae0.u36.br1-ar.ip.fullrate.dk (90.185.1.213) 104.963 ms 105.014 ms 105.847 ms
18 * * *
19 * * *
20 * * *
I think that may be the reason why you are getting auto kicked from aX server. You should do a ping or, even better, a traceroute to aX server and post the results.
You can do a traceroute in Windows, by downloading WinMTR and typing ax.bf1942.sk in it.
Hello,
There was a problem with the bans. You should be able to join SIMPLE BF 1942 (FRA) server.
You can paste the log in https://zerobin.net
Tuia, I know you are working hard to maintain this website but have you ever thought of implementing a SSL certificate on your domain? Wouldn’t it make the forums safer?
I will do that in about a month.
There are passwords: https://api.pwnedpasswords.com/range/4BC4A. But, the rest of the hash is not in that list.
Here is the first five digits of my super secret password hash: 4BC4A
Find the password, if you think it is possible.
Tuia, don't get me wrong but try to think a bit deeper.
You have a password, an insecure password like "monkey", for example. It's a typical thing for people to get passwords like this one to always remember them. As far as you know, it's possible to get hash from the string but it's not possible to get string from the hash. I believe you will never get something like "iwrestledapolarbeartwice" from any hash but it doesn't work for insecure passwords like "monkey" because it's a very common issue. There are bases of stolen passwords, no hashes, no salt. If you have a table of passwords, you can get another column in this table with hashes of these passwords.
For example.
md5(monkey) is d0763edaa9d9bd2a9516280e9044d885
https://i.imgur.com/WIYyUaZ.png
If there is a base of stolen passwords, there are also a table of stolen usernames, addresses, locations etc. In case of request for checking the passwords, the script can seek somewhere to get usernames and addresses associated with this password or hash. There could be a lot of records but only a few with the same IP or another address from the same range.
I know about brute-force, rainbow tables and that MD5 and SHA1 hashes are insecure, but what are you failing to realize is that the complete SHA1 hash of a password is not sent to that Pwned Passwords website, it is just the first 5 digits of that hash. So, that means there are 16^35 combinations remaining. In other words, your password is still safe, if you check by that method.
You are spreading fear, uncertainty and doubt (FUD). Do not type your password in that website, if you are that worried, you just have to send the first 5 digits of the SHA1 hash of your password to check it, how hard is that?
Actually, I think it is a very good service by Troy Hunt and I may add this to the forum registration and login pages, with a very simple method:
<?php
/*
* Simple method to use the API from https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/
* Written by Jim Westergren and released to public domain
* @return int count
*/
function checkPwnedPasswords(string $password) : int
{
$sha1 = strtoupper(sha1($password));
$data = file_get_contents('https://api.pwnedpasswords.com/range/'.substr($sha1, 0, 5));
if (FALSE !== strpos($data, substr($sha1, 5))) {
$data = explode(substr($sha1, 5).':', $data);
$count = (int) $data[1];
}
return $count ?? 0;
}
Amazing at 01:40
Thank you for your report. He is banned.
Yes, but that is just visually, the Pwned Passwords website can log and store your password, which I do not believe it does.
If you are concerned of typing your passwords in an "unknown" website to check if they are leaked, your sensible choice would be to create the SHA1 hash of your password and send the first 5 digits of that hash to the Pwned Passwords website, like Trench explained.
You can create SHA1 hash of any text in Windows with QuickHash GUI program instead. Then, send just the first 5 digits of the hash to api.pwnedpasswords.com/range/ and check if the rest of the hash is present in the response. If it is not, your password is not leaked.
An example, suppose the password you want to check is "12345678". The SHA1 hash is 7C222FB2927D828AF22F592134E8932480637C0D, and then you type in your browser tab api.pwnedpasswords.com/range/7c222 and you will see in the text response that the rest of the hash is there:
FB2927D828AF22F592134E8932480637C0D:2889079
2889079 leaks of "12345678" password is not surprising, since most people use these weak, easy to remember, passwords.
I use 3 different passwords for all accounts, but the usual recommendation is to use a different strong password for every account and have a password manager, like KeePass for example, to save them. In case one password gets leaked the other accounts are not at risk.
Pwned Passwords are real world passwords previously exposed in data breaches. You should check your passwords in this website: https://haveibeenpwned.com/Passwords
If you have a leaked password, you should change it right away. To change this forum password, go to Profile > Essentials > Change password.
Ok, I think it works, I did not have time to test it rigorously, please, report any problems. I am not sure if new players are assigned to each team randomly, when autoBalanceTeam is enabled.