Menu
process mining software
Jun 15, 2017 - Note this does not work on servers running v1.00 Admin Mod or SOFII MP. Type in the ftp username and then your password (NOT the RCON pass). V_pure 0 and 2 are particularly prone to cheating from no fog hacks.
Process mining software is a type of programming that analyzes data in enterprise application event logs in order to learn how business processes are actually working. The goal of process mining software is to identify bottlenecks and other areas of inefficiency so they can be improved.
Word of the Day ArchiveTechnology GuideTechnology Buyer's Guide
Find out which product TechnologyGuides editors selected as the best choices in price, performance and capabilities.
Be sure and check out our Technology Technology Guide for our top picks for laptops, tablets, smartphones, cameras and more!
- The United States Department of Transportation - The United States Department of Transportation (USDOT or DOT) is a cabinet agency of the U.
- U - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.
- U (measurement) - A U is a standard unit of measure for designating the height in computer enclosures and rack cabinets.
- U interface - In Integrated Services Digital Network (ISDN) Basic Rate Interface service, a U interface is the electrical interface for the single twisted pair wire connection from a local phone company (the central office) to a home or business.
- U-SQL - U-SQL is a Microsoft query language that combines a declarative SQL-like syntax with C# programming, enabling it to be used to process both structured and unstructured data in big data environments.
- U.2 SSD (formerly SFF-8639) - A U.2 SSD is a high-performance data storage device designed to support the Peripheral Component Interconnect Express (PCIe) interface using a small form factor (SFF) connector that is also compatible with standard Serial-Attached SCSI (SAS) and Serial Advanced Technology Attachment (SATA)-based spinning disks and solid-state drives (SSDs).
- U.K. Data Protection Act 1998 (DPA 1998) - The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled.
- U.S. Department of Homeland Security (DHS) - The U.S.
- U.S. National Library of Medicine (NLM) - The U.S.
- U.S. Navy purchasing abbreviations and acronyms - U.S.
- UART - A UART is the microchip with programming that controls a computer's interface to its attached serial devices.
- UART - A UART (Universal Asynchronous Receiver/Transmitter) is the microchip with programming that controls a computer's interface to its attached serial devices.
- UART (Universal Asynchronous Receiver/Transmitter) - A UART (Universal Asynchronous Receiver/Transmitter) is the microchip with programming that controls a computer's interface to its attached serial devices.
- UAT - In software development, user acceptance testing (UAT) - also called beta testing, application testing, and end user testing - is a phase of software development in which the software is tested in the 'real world' by the intended audience.
- UBE - UBE (unsolicited bulk email) is a formal term for spam.
- UBE (unsolicited bulk email) - UBE (unsolicited bulk email) is a formal term for spam.
- uber geek - An uber geek is a prominent or extreme example of the common geek.
- uberAir - uberAIR is an app-hailed air vehicle ride service in the planning stages at Uber.
- UberFLEET - UberFLEET is a smartphone application that allows partners with Uber, a popular rideshare application, to oversee their fleet drivers.
- ubiquitous computing - Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.
- ubiquitous networking - Ubiquitous networking is the pervasion of communications infrastructure and wireless technologies throughout the environment such that they enable continuous connectivity.
- ubiquitous robotics - Ubiquitous robotics is the design and deployment of robots in smart network environments in which everything is interconnected.
- ubiquitous sensor network (USN) - A ubiquitous sensor network (USN) is one that connects all possible sensors in a given network or environment which, theoretically, could be global.
- Ubuntu - Ubuntu (pronounced oo-BOON-too) is an open source Debian-based Linux distribution.
- Ubuntu 8.04 LTS Server Edition - Hardy Heron is the code name for version 8.
- Ubuntu Core - Ubuntu Core is a transactional version of the Ubuntu Linux OS, made specifically for internet of things (IoT) devices and large container deployments.
- UC - Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools, with the goal of enhancing business communication, collaboration and productivity.
- UCaaS (Unified Communications as a Service) - Unified communications as a service (UCaaS) is a cloud delivery model that offers a variety of communication and collaboration applications and services.
- UCCnet - UCCnet is a standards organization that provides an Internet-based supply chain management (SCM) data registry service for e-commerce companies and companies that have an e-commerce component.
- UCE - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
- UCE (unsolicited commercial email) - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
- UCM - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
- UCS - A unified computing system (UCS) is a data center architecture that integrates computing, networking and storage resources and is managed through a single software application.
- UDA - Universal Data Access (UDA) is Microsoft's model or framework for a single uniform application program interface to different software makers' databases, both relational and nonrelational.
- UDDI - UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.
- UDDI (Universal Description, Discovery, and Integration) - UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.
- UDF - Universal Disk Format (UDF) is a CD-ROM and DVD file system standard developed as a means of ensuring consistency among data written to various optical media, by facilitating both data interchange and the implementation of the ISO/IEC 13346 standard.
- UDMA - Ultra DMA (UDMA, or, more accurately, Ultra DMA/33) is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the computer's random access memory (RAM).
- UDO - Ultra density optical (UDO) is an optical storage technology that increases capacities by using an extremely focused blue laser to write and read data.
- UDO (ultra density optical) - Ultra density optical (UDO) is an optical storage technology that increases capacities by using an extremely focused blue laser to write and read data.
- UDP - UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating connections between applications on the internet.
- UDP (User Datagram Protocol) - UDP (User Datagram Protocol) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating connections between applications on the internet.
- UEFI - Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer's firmware to its operating system (OS).
- UHDV - UHDV (ultra high definition video) is a technology that provides video image resolution containing 16 times as many pixels as HDTV (high definition television).
- UHDV (ultra high definition video) - UHDV (ultra high definition video) is a technology that provides video image resolution containing 16 times as many pixels as HDTV (high definition television).
- UHF - The UHF (ultrahigh frequency) range of the radio spectrum is the band extending from 300 MHz to 3 GHz.
- UHF (ultrahigh frequency) - The UHF (ultrahigh frequency) range of the radio spectrum is the band extending from 300 MHz to 3 GHz.
- UI redressing - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
- UIA - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
- UIML (User Interface Markup Language) - UIML (User Interface Markup Language) is a descriptive language that lets you create a Web page that can be sent to any kind of interface device - for example, to a PC with a large display and a keyboard or to a 'smart phone' with a tiny display and no keyboard.
- UK Data Protection Act 1998 - The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled.
- UK Government Connect Secure Extranet - The UK Government Connect Secure Extranet (GCSX) is a secure WAN that allows officials at local public-sector organisations to interact and share data privately and securely with central government departments.
- UK Government Connect Secure Extranet (GCSX) - The UK Government Connect Secure Extranet (GCSX) is a secure WAN that allows officials at local public-sector organisations to interact and share data privately and securely with central government departments.
- UK Identity Cards Act - The UK Identity Cards Act is a framework of enabling legislation for a British National Identity card passed in 2006.
- ultra density optical - Ultra density optical (UDO) is an optical storage technology that increases capacities by using an extremely focused blue laser to write and read data.
- Ultra DMA - Ultra DMA (UDMA, or, more accurately, Ultra DMA/33) is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the computer's random access memory (RAM).
- Ultra DMA (UDMA or Ultra DMA/33) - Ultra DMA (UDMA, or, more accurately, Ultra DMA/33) is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the computer's random access memory (RAM).
- Ultra DMA 33 - Ultra DMA (UDMA, or, more accurately, Ultra DMA/33) is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the computer's random access memory (RAM).
- Ultra DMA33 - Ultra DMA (UDMA, or, more accurately, Ultra DMA/33) is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the computer's random access memory (RAM).
- Ultra Extended Graphics Array - UXGA (Ultra Extended Graphics Array) is a display modein which the resolutionis 1600 pixels horizontally by 1200 pixels vertically (1600 x 1200).
- ultra HD - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
- ultra HDTV - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
- ultra high definition video - UHDV (ultra high definition video) is a technology that provides video image resolution containing 16 times as many pixels as HDTV (high definition television).
- Ultra High-Definition TV (UHDTV) - Ultra-high-definition (UHD) television, also abbreviated UHDTV, is a digital television display format in which the horizontal screen resolution is on the order of 4000 pixels (4K UHD) or 8000 pixels (8K UHD).
- Ultra Low Energy (ULE) - Ultra Low Energy (ULE) is a telecommunications technology based on DECT (Digital Enhanced Cordless Telecommunications) which is the de-facto standard for voice calls, integrated in millions of devices worldwide.
- Ultra mobile PC - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
- ultra personal computer - A handtop is a full-featured portable computer that is slightly larger than a PDA, but much smaller than a laptop.
- ultra wideband - Ultra wideband (also known as UWB or as digital pulse wireless) is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance.
- ultra-HD - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
- ultra-mobile personal computer - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
- ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
- ultrabook - An ultrabook is a category of thin and light laptop computers designed to bridge the market gap between tablets and premium notebook PCs.
- ultracapacitor - An ultracapacitor, also called a supercapacitor, is an electrical component capable of holding hundreds of times more electrical charge quantity than a standard capacitor.
- ultrahigh frequency - The UHF (ultrahigh frequency) range of the radio spectrum is the band extending from 300 MHz to 3 GHz.
- ultrapersonal computer - A handtop is a full-featured portable computer that is slightly larger than a PDA, but much smaller than a laptop.
- ultrasound - Ultrasound is acoustic (sound) energy in the form of waves having a frequency above the human hearing range.
- ultrawideband - Ultra wideband (also known as UWB or as digital pulse wireless) is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance.
- UMA - The Generic Access Network (GAN) is an evolving wireless communications system in which mobile phone sets function seamlessly between local area networks (LANs) and wide-area networks (WANs).
- UML - UML (Unified Modeling Language) is a standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology.
- UML (Unified Modeling Language) - UML (Unified Modeling Language) is a standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology.
- UMLS - Unified Medical Language System (UMLS) is a comprehensive list of biomedical terms for developing computer systems capable of understanding the specialized vocabulary used in biomedicine and health care.
- UMPC - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
- UMS - Unified messaging (sometimes referred to as the unified messaging system or UMS) is the handling of voice, fax, and regular text messages as objects in a single mailbox that a user can access either with a regular e-mail client or by telephone.
- UMTS - UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
- UMTS - UMTS (Universal Mobile Telecommunications System) is a so-called 'third-generation (3G),' broadband, packet -based transmission of text, digitized voice, video, and multimedia at data rates up to and possibly higher than 2 megabits per second (Mbps), offering a consistent set of services to mobile computer and phone users no matter where they are located in the world.
- UMTS (Universal Mobile Telecommunications Service) - UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
- UN laptop - XO is the first version of the $100 laptop expected to reach a substantial number of users.
- unary - The term unary defines operators in Boolean (binary) algebra, trinary algebra, arithmetic, and set theory.
- unauthenticated security scan (logged-out secuity scan) - An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.
- UNC - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
- uncanny valley - The uncanny valley is a common unsettling feeling people experience where androids (humanoid robots) and audio/visual simulations closely resemble humans in many respects but are not quite realistic.
- uncertainty principle - The uncertainty principle is the concept that precise, simultaneous measurement of some complementary variables -- such as the position and momentum of a subatomic particle -- is impossible.
- uncloud (cloud repatriation) - Unclouding, also called cloud repatriation, is the retrieval of applications and data from a cloud computing platform.
- uncompressing - Uncompressing (or decompressing) is the act of expanding a compression file back into its original form.
- uncompressing (or decompressing) - Uncompressing (or decompressing) is the act of expanding a compression file back into its original form.
- unconference - An unconference is a conference organized, structured and led by the people attending it.
- undelete - Undeleting is the process of recovering data that has been deleted from a storage medium, usually the hard drive of a computer.
- undeleting - Undeleting is the process of recovering data that has been deleted from a storage medium, usually the hard drive of a computer.
- undercapitalization - Undercapitalization is a situation when an organization lacks the availability of funds needed to conduct regular business.
- Undernet - For terms frequently used in online keyboard chatting, see chat acronyms/IRC/BBS.
It is currently Fri Nov 22, 2019 1:50 am |
Page 1 of 1 | [ 13 posts ] |
Print view | Previous topic | Next topic |
Author | Message |
---|---|
Joined: Fri Jan 22, 2010 1:43 pm Posts: 6 | q3 hack fix (NOT THE CRASHING ONE) Hi, when i have sv_allowdownload enabled, theres a bug that people can easily get my server.cfg, ive put the fix in the server ftp, but i don't know how to execute it from there, cause I must point the jk2mp.exe of the server. Can you please help me with it? |
Mon Jan 25, 2010 11:55 pm | |
Joined: Thu Oct 18, 2007 10:42 pm Posts: 235 | Re: q3 hack fix (NOT THE CRASHING ONE) wasn't the fix to rename server.cfg to something else, like abc123.cfg, something people wouldn't think to type in? _________________ q2server.fuzzylogicinc.com:27910 :: Leper Q2 ATTN: In serious need of limbs! d3server.fuzzylogicinc.com :: Doom 3, FMJ! etqwserver.fuzzylogicinc.com Quake Wars... Grrrrr..... |
Tue Jan 26, 2010 8:23 am | |
Joined: Thu Jun 17, 2004 4:38 am Posts: 582 Location: Nooboo | Re: q3 hack fix (NOT THE CRASHING ONE) Edit your server.cfg so sv_allowdownload is disabled. seta sv_allowdownload '0' sv_allowdownload should always be '0'. The Quake3 map download feature is old and very slow. There is no reason to enable it, and keeping it disabled prevents a known hack that allows people to download your server.cfg and gain your rcon password. _________________ Human Female Jedi Skin Expansion Mod Tavion Extreme Makeover |
Tue Jan 26, 2010 7:29 pm | |
Joined: Thu Oct 18, 2007 10:42 pm Posts: 235 | Re: q3 hack fix (NOT THE CRASHING ONE) is there an admin mod someone can use so they can still allow downloads & not deal with this? Talking to older Quake players they all agree that the easy content downloading is what kept quake 2 & 3 engines alive for so long. _________________ q2server.fuzzylogicinc.com:27910 :: Leper Q2 ATTN: In serious need of limbs! d3server.fuzzylogicinc.com :: Doom 3, FMJ! etqwserver.fuzzylogicinc.com Quake Wars... Grrrrr..... |
Tue Jan 26, 2010 10:54 pm | |
if im putting custom maps on my server that i made myself and that i dont wanna release, theres a reason to put allowdownload to 1, thats why i wanna fix this and im paying monthly for my server, so i would like it to be safe against hackers, i dont wanna only rename the server.cfg to something i wanna be sure its fixed... | |
Wed Jan 27, 2010 4:02 am | |
and ive got another question, is there anyway to stop the auto reboot of the server? I didnt want to make another topic for this... | |
Wed Jan 27, 2010 4:03 am | |
Joined: Thu Oct 18, 2007 10:42 pm Posts: 235 | Re: q3 hack fix (NOT THE CRASHING ONE) ET can't fix errors in the game that the developer made, that's the dev's responsibility. I'm not quite up on my Q3A security, but it may be possible to block the hackers once you get their IP. You can't stop the server from rebooting, it always happens. Is there issues with it on your end? _________________ q2server.fuzzylogicinc.com:27910 :: Leper Q2 ATTN: In serious need of limbs! d3server.fuzzylogicinc.com :: Doom 3, FMJ! etqwserver.fuzzylogicinc.com Quake Wars... Grrrrr..... |
Wed Jan 27, 2010 8:05 am | |
Joined: Thu Jun 17, 2004 4:38 am Posts: 582 Location: Nooboo | Re: q3 hack fix (NOT THE CRASHING ONE) if im putting custom maps on my server that i made myself and that i dont wanna release, theres a reason to put allowdownload to 1, thats why i wanna fix this and im paying monthly for my server, so i would like it to be safe against hackers, i dont wanna only rename the server.cfg to something i wanna be sure its fixed... Have you ever tried downloading a map from a server using the built-in sv_allowdownload function? It is incredibly slow and takes so long I would guess most players will disconnect before it is downloaded. Plus, it takes bandwidth away from your server and it opens up a security exploit. It just is not a good idea to use it. You might as well put your rcon password in your MOTD. If for some reason you don't want to release your maps to the general public, email copies of the map to the people that you want to have it and leave sv_allowdownload '0' (off). That's a much safer way to do it. and ive got another question, is there anyway to stop the auto reboot of the server? I didnt want to make another topic for this... Daily rebooting of JK2 and JA servers running on Linux is necessary to keep the server running well. If it isn't rebooted on a regular basis it will eventually lag and lock up, not fun. _________________ Human Female Jedi Skin Expansion Mod Tavion Extreme Makeover |
Wed Jan 27, 2010 9:57 pm | |
and if for some reason i have to put sv_allowdownload to 1, what am i gonna do? thats why ive put the fix in the server ftp, so i just want u guys to point it to the jk2mp.exe of the server, i dont think its so complicated, id do it if i could, but i cant... thx for the second question =] | |
Thu Jan 28, 2010 12:31 am | |
oh and since i cant stop the auto reboot, is there anyway to hide the bots so that they stop annoying every1? im putting bots to show people that its an active server, but i wanan hide them somewhere so that they stop annoying. I mean hiding automatically at server reboot. | |
Thu Jan 28, 2010 12:35 am | |
Joined: Thu Oct 18, 2007 10:42 pm Posts: 235 | Re: q3 hack fix (NOT THE CRASHING ONE) if you use server redirect does the game still have the exploit? (hoe come noone's changed q3a's audodownload like q2's so it faster! ) _________________ q2server.fuzzylogicinc.com:27910 :: Leper Q2 ATTN: In serious need of limbs! d3server.fuzzylogicinc.com :: Doom 3, FMJ! etqwserver.fuzzylogicinc.com Quake Wars... Grrrrr..... |
Thu Jan 28, 2010 11:51 am | |
Joined: Thu Jun 17, 2004 4:38 am Posts: 582 Location: Nooboo | Re: q3 hack fix (NOT THE CRASHING ONE) and if for some reason i have to put sv_allowdownload to 1, what am i gonna do? thats why ive put the fix in the server ftp, so i just want u guys to point it to the jk2mp.exe of the server, i dont think its so complicated, id do it if i could, but i cant... thx for the second question =] Sorry, I don't understand the question. All that sv_allowdownload '1' does is allow .pk3 files that the server is actively using (such as a map that the server is currently running) to be downloaded to clients using the server's bandwidth, set by sv_maxrate. It has nothing to do with directing anything to jk2mp.exe. Even at the maximum sv_maxrate of 25000 bits per second (25 kbs) that is super slow compared to broadband rates of megabits per second that people are used to. It is super slow and just not worth it. If you insist on using it you just have to accept the security risk, there is no way to prevent it. It would be better to figure out some other way to distribute your map. Most people just submit it to file sites like jk2files.com so people can download it at broadband rates. oh and since i cant stop the auto reboot, is there anyway to hide the bots so that they stop annoying every1? im putting bots to show people that its an active server, but i wanan hide them somewhere so that they stop annoying. I mean hiding automatically at server reboot. In your server.cfg, put the following line set bot_minplayers '2' When your server starts up, it will add two bots. If a human joins the server the server will kick one of the bots so there will be one human and one bot on the server. The human can chase the bot around if he wants to. As soon as a second human joins the server the one bot will be kicked, leaving two humans. If one of the humans leaves the server will add back a bot. If both humans leave it will add two bots. bot_minplayers 'x' will always keep at least x players, humans and bots, on the server, adding or kicking bots as necessary. _________________ Human Female Jedi Skin Expansion Mod Tavion Extreme Makeover |
Fri Jan 29, 2010 5:12 pm | |
ok, thx alot ! =] | |
Tue Feb 09, 2010 3:04 am |
Page 1 of 1 | [ 13 posts ] |
Who is online |
Users browsing this forum: No registered users and 2 guests |
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot post attachments in this forum |
Powered by phpBB | Based on the theme by Vjacheslav Trushkin