![]() ![]() ![]() for(n = 0, left = snapshot_size left n++) numpackets = (snapshot_size+max_size-1)/max_size + dbg_msg("", "deltasize=%d -> %d : %s", deltasize, snapshot_size, buffer) */ dbg_msg("", "deltasize=%d -> %d : %s", deltasize, snapshot_size, buffer) */ *str_hex(buffer, sizeof(buffer), compdata, snapshot_size) Snapshot_size = intpack_compress(deltadata, deltasize, compdata) Static SNAPBUILD -33,7 +33,8 int current_tick = 0 MACRO_CONFIG_INT(b_max_requests, 10, 0, 1000, CFGFLAG_SAVE|CFGFLAG_CLIENT, "Number of requests to use when refreshing server browser")ĭiff -Naur Coding/teeworlds-0.5.2-src/src/engine/server/es_server.c BlockMod/src/engine/server/es_server.c MACRO_CONFIG_INT(b_sort_order, 0, 0, 1, CFGFLAG_SAVE|CFGFLAG_CLIENT, "") ![]() MACRO_CONFIG_INT(b_sort, 0, 0, 256, CFGFLAG_SAVE|CFGFLAG_CLIENT, "") +MACRO_CONFIG_INT(sv_netmsg_bantime, 300, 0, 9999, CFGFLAG_SERVER, "How Much time will the unauthed rcon command spammer will be banned") +MACRO_CONFIG_INT(sv_netmsg_limit, 0, 0, 100, CFGFLAG_SERVER, "How Many unauthed Command Tries Before ban") +MACRO_CONFIG_INT(sv_rcon_tries_bantime, 300, 0, 9999, CFGFLAG_SERVER, "How Much time will the brute rcon password attacker will be banned") +MACRO_CONFIG_INT(sv_rcon_tries, 5, 0, 100, CFGFLAG_SERVER, "How Many Password Tries Before ban") +MACRO_CONFIG_INT(sv_max_connections, 2, 1, 16, CFGFLAG_SERVER, "Maximum count of connection from one IP server can accept") MACRO_CONFIG_INT(b_filter_compatversion, 1, 0, 1, CFGFLAG_SAVE|CFGFLAG_CLIENT, "Filter out non-compatible servers in browser") Diff -Naur Coding/teeworlds-0.5.2-src/src/engine/e_config_variables.h BlockMod/src/engine/e_config_variables.h ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |