Jump to content

Darkie Minotaur

Resident
  • Posts

    1,663
  • Joined

  • Last visited

Posts posted by Darkie Minotaur

  1. Also nochmal zum Zusammenfassen:

    1. Wenn es ein script ist, muss es nicht in einem Attachment sein, sondern es kann an jedem beliebigen Ort sein.
    2. Ein Script kann dem Objekt in dem es liegt, einen beliebigen Namen geben - das wird oft genutzt
    3. IMs von avas und Objecten (d.h. Scripten) lassen sich leicht unterscheiden:
    • erstere oeffnen im Normalfall ein IM Fenster - letztere nicht, denn man kann ihnen keine IM zurueckschicken
    • wenn man auf einen Namen klickt, der vor der IM steht, erhält man bei IMs von Scripten den Ort angezeigt, an dem das Objekt ist, das das Script enthält. Bei avataren bekommt man eine Auswahl von avatar-spezifischen Optionen (z.B. Profil anzeigen)

    Es lässt sich also leicht festellen, ob ein Script die Quelle ist, oder ob der Ava manipuliert ist.

    Im Falle des Scripts, ist das ärgerlich, aber weiter nicht schlimm. Im Falle der Manipulation des Avas ist das anders - wenn du sicher bist, dass es kein Script ist, wuerde ich den Account sperren lassen und den Rechner neu installieren. Eine 'Firewall' (dieser Begriff besagt herzlich wenig) hilft nur dann wirklich, wenn man versteht, gegen was genau sie schuetzen soll. Zumal muss die Manipulation nicht auf deinem Rechner passieren - die Wahrscheinlichkeit ist jedoch hoch.

  2. Der Punkt ist: Ein Skript kann nur IMs mit dem Absender des Objekts verschicken, in dem es ist. Auch als Attachment. Natuerlich kann dieses Objekt den Namen des Avas uebernehmen - es ist aber immer das Objekt, das die IM schickt - daher mein Tipp mit dem Klick auf den Namen.

    Wenn es kein Objekt ist, das die IMs schickt, sondern wirklich dein Ava, dann ist es ein Hack, der nach meinem Wissen nicht per Skript erreichbar ist. Daher auch die Vermutung des Firestorm Supports - RLV ist schließlich eine Modifikation des Viewers, und nicht einfach etwas geskriptetes.

  3. Wenn die IMs von deinem ava kommen, solltest du dich dringend an LL wenden. IMs von deinem ava koennen nicht durch ein ein script verdandt werden. Ein solches IM script klaeme dann immer von diesem Objekt, nicht von dir. In diesem Falle wäre es voellig egal, ob du das Objekt traegst.

    RLV - das du ja auch schon deaktiviert hast - bietet m.W. nich die Funktionalität, IMs in fremdem Namen zu versenden, sondern (wie der Name sagt) Versand und Empfang einzuschraenken.

    M.E. bleibt nur, dass sich jemand in irgendeiner Weise in deinen Account eingehackt hat. Also schnellstens an LL wenden - die werden deinen Account erstmal sperren, wuerde ich erwarten.

  4. Strictly speaking, this is a Metabolt question, not a scripting question.

    Metabolt is a viewer - and you have a range of options to control the avatar that you log in with Metabolt. Additionally there are plug-ins for Metabolt to give you more options. Metanomy is such a plug-in for moving the avatar. Read the documentation of both Netabolt and Mtanomy, then log in n avatar and play with it  to find out what you can do.

  5. If you take the dialog example, you just find out which button has been pressed using llListFindList which will return the index at which the button that has been pressed in the list of buttons - e.g.:

    list glButtons = ["Ham", "Eggs];

     You culd then keep a 2nd list of counters that starts:

    list glCounters = [0,0];

     In the listener, you sumply increase the index at the same position as the button that has been pressed and increse the conters at this position by 1 and replace the old value by the new one:

    integer index = llListFindList(glButtons, [message]);if (index != -1) {   glCounters = llReplaceList(glCounters, llList2Integer(glCounters, index) + 1, index, index);}

     I hpe this points you in the right direction

  6. I use lslforge since it best suites my most important requirements (or Eclipse does):

    • Possibility to integrate SVN
    • Support for different languages - especially PHP
    • multi plattform (I work on Mac OS as well as on Win)

    As far as LSL is concerned, it suppoert syntax highlighting, sysntax copletion and even off line debugging (which I've hardly used, though)

  7. Thanks for the example.

    This situation would indeed be a case where you need alt detection. Alt detection can - as far as I see - technically omly be approached by detecting if two avas are on the same machine (physically or virtually). The IP address is one important indicator for that - though not the only one. The IP address alone is, however, not a death proof instrument.

    To prevent confusuion: I'm talking about the client IP address - not the sim IP address that you get by looking at the HTTP headers sent by LSL HTTP communication. The client IP address is the IP address of the client the user is using. There is no way to detect the client IP address from inside SL. There are ways of trying to get these IP adresses by using IP connections that come from the client machine directly - usually using prim or parcel media or parcel music. I guess that's similar to what you had in mind when you where talking about using a website to give out a token.

    But this would also rule out persons that are located behind the same IAD (at least in most cases), since all of the clients run e.g. behind the same router have the same public IP address. You would have to use other mechanisms - there are some out there - that collects and evaluates further infoirmation about the client.

    Depending on what exactly you plan to do, there may be other glitches as well.

  8. It seems you've missed the upheaval RedZone and other tools like it have caused - you're on thin ice here (search the archive ans you'll know what I mean).

    Freya has alredy summed up the chances of detecting alts reliably based on IP addresses - although I don't think that someone has ever seriously tried that - it requires a lot more than just IP addresses, and then it would still be no proof of alts.

  9. As far as I know, this is an issue with llSetLinkTexturellSetLinkPrimitiveParams and llSetLinkPrimitiveParamsFast which the scripts in question may use. llSetTexture does not have these perm restrictions. If you have a link set you want to change the textures for, that means, each linked prim will nedd a script that changes it's textures.

     

    ETA:

    The restriction should only hold for copy perms. This of course means: If you don't have copy permissions, you can't apply the texture to more tha one prim's faces - and you couldn't copy it to the inventory of several prims in a link set.

  10. A while ago (like 2 years), I did a similar test that proved the theory about the throttle.

    Fortunately, I still have the scripts. My approach was slightly different in that I tried to get to a real burst as possible - so I deviced a master script tht triggers slave scripts to fire requests.

    Running this setup again ow I found, that LL obviously has changed the throttle. From the tests, the limit of 25 still seems to work quire reliably. The 26th got throttled without fail in may tests as well.

    As for the time it takes the system to 'recover', it seems that 40 secs is the best approximation I could get - again, pretty reliably. (Tested with 10 bursts).

    Finally I tested with one request per second - which ran smoothly. Actually, I let the script rest for 0.9 seconds to take into account the other computing steps take -  taking the time with llGetTime(), I easyly sent out 180 requests in about 175 seconds (the timestamps in the database that got created on each request confirm that).

    To wrap it up:

    Either there is an nwanted bug, or a undocumented change - I can confirm that the 25 requests in 20 seconds no longer works - the best rartio you get, if you send out 1 request per second.

    P.S.:

    I have to crrect my statement in so far that the Wki contains two links to discussions. Kelly Linden stated in the second one:

    "UPDATE: The basic mechanics have not changed but the actual rates changed since this was posted. The new rates are 25 requests per 20 seconds and are per object, not per owner per region. If the object making the requests hits the limit then stopping for 40 seconds will clear the throttle."

  11. I don't really think that yout post  is a reply to the post - but still interesting. As far as PDO vs. MySQLi is concerned, I stick with the authot of the page you quoted. He wraps up:

    " In my opinion, the features and flexibility of PDO far outweigh the very slight performance hit."

    And I absolutly agree that there are a range of factors, that influence how you should/could design your application. As far as OOP is concerned, I agree, too. But that hasn't even been mentioned here.

×
×
  • Create New...