colorsite.blogg.se

Conquer private
Conquer private









conquer private
  1. Conquer private how to#
  2. Conquer private generator#

Conquer private generator#

Most of private servers are using custom classes to access the database and CRUD (Change,Read, Update, Delete) techniques over here you would find 40 tutorial about mysql and c# but for a better database connection and more reliable one you may use NHibernate, everyone is recommending it however it's not used frequently as when it comes to mapping inherited/composted classes as it becomes lil more complicated (maybe not lil but yeah it depends on how familiar are you with the xml) where as of what i know generator won't do the trick, enough about nhibernate cuz i personally duno much about it and lets move to Cryptology : TQ cryptology is already public (most of it required to go), Reverse Engineering experts could always find there way at the client and find the signature of the encrypting/decrypting, you may even use client methods with a copy past at c++ inline asm with slightly editing and you will end up with perfectly valid method and end connection for both main sockets you have (game server / auth server) each on it's own port Database Connection : What's left about sockets is having a wrapper class which is used to keep both the socket(connection) and a gameserver/authserver object together so you can figure out whom the data was sent forĪt the end you would want to invoke custom methods at accept connection, recv. There is already a topics out there on the same subjects which had been released by great members that you must first read before proceeding Sockets Connection : the following links will ease your life and will save your time searching, if you are familiar with C# sockets you can simply quit this part as all of the C# socket classes looks the same to me (with slightly difference) but i would still recommend you visiting those links video links: almost an hr explaining everything in detailsĬode: int size = SOC.EndReceive(IR, out error) that is briefly a simple example of async socket, but the links i provide you is way more correct and briefly explaining everything Second is Reverse engineering knowledge to be able to get information from the client such as crypto and other useful information but that is not particularly necessary as others have done that job and released it to public (however there is still a missing part which to why we are using loaders, it has not been released by RE experts to limit the number of proxy bots out there that can use clientless feature).

conquer private

  • First of all is programming, I'm not asking you to be expert but atleast being able to design such a big project and be able to fix errors, but trust me the more you know the better you will do, every technique of the language and every options becomes handy at some point.
  • Conquer private how to#

    Well maybe i'm not the best to write this kind of tutorials but ill proceed because of the lack of tutorials on this subject, we will explain how to get everything up from scratch and not how to setup a server for sake of simplifying we will split the server to the following main partsĬonquer server is simply an application that handle connections from clients which sends and receive data, which is why you need the internet connection with other clients also the cryptology part as the packets are always encrypted and then you should handle the data with your server logic to figure out what the client want to do and reply with appropriate respond, and you would always need to verify and store information which why we use the database what knowledge do you need











    Conquer private