from the tittle, can we trust on this? did user really using hack that log in db?
Code:UseHackcheckByTimeScope=0 UseCheckShopHack=0 UseCheckWarpHack=0 UseCheckWareHouseHack=0 UseCheckSkillCoolTimeHack=0 UseCheckDistanceSkillHack=0 UseCheckDeadStatActive=0 UseCheckDMZArea=0 UseCheckInventoryHack=0 UseCheckUserAttack=0 UseCheckDeadStatActive=0 ActiveDeadStatCount=30 SpeedHackCheckTime=10000 MaxAttackHackTime=300000 CheckSkillTimeHackScope=60000


Reply With Quote

