#willuse Forum
General
CS2D Bug Reports
#willuse
DC has writtenYou can even do this:
result: you will commit suicide and the console will say "lol" 
1
2
2
alias "4" "echo lol" kill 4

No it doesn't. It will completely ignore the last command if you are alive.
so do you have any ideas for ?
Lua Scripts: On/Off
Server uses lua scripts: No scripts/Remove from Favorites
Both are the same thing, and the Remove from Favorites there doesn't make sense.
Wallhits not working for silinced weapons and that's shitty :
Mora: It's actually not a bug, @
DC made it intentionally to make the game looks a bit realistic.
THEMUD: realistic? maybe i'll surprise you but.. not the matter if you attacking from silenced weapon or not, anyway you hit the wall, and it will be broken or atleast damaged so it will be seen a hit after bullet.. that's not about realistic at all./sorryformyenglish.
Mora: Do you mean that silenced weapons don't make holes in the walls?
J192: yes, they do not.. But'ey should.. Will be fixed in the next release.
edited 1×, last 07.02.16 10:08:38 am
When player is reloading his/her gun, player(id,"process") still returns 0. It should return other value, like planting bomb returns 1.
Also is there currently a way to reroute this? Other way to check if player is reloading?
Thanks.
Read the manual, it's in there:
player
Yates: Oh dam...
But still player(id,"process") shouldn't say
Quote
if it doesn't show anything about reload... That confused me.(internal id for reloading/planting/defusing...)
But anyway, thanks for help Yates!
Have a happy weekend!
if you add
cs2d.png
cs2d.png
cs2d.png
cs2d.png
cs2d.png
..etc in the servertransfer.lst
you will download the same file multiple times
I repeated the experiment by using stress services and this time cs2d_dedicated used almost 100% CPU resources. Game server was freezed but my VPS worked without any problems.
Hajt: I too have problem like it. When flood cs2d_dedicated used 99% CPU. http://www23.zippyshare.com/v/lG5Q5g9b/file.html
udp.dstport == 9710
As you can see it was UDP flood from random locations. If someone have any ideas how to deal with these attack PM me, thanks.
1
2
2
iptables -I INPUT -p udp --dport 36963 -i eth0 -m state --state NEW -m recent --set iptables -I INPUT -p udp --dport 36963 -i eth0 -m state --state NEW -m recent --update --seconds 60 --hitcount 10 -j DROP
10 connection / min / IP on eth0 with prot. UDP and port 36963. When the limit is exceeded all packages are blocked on the given port(s) until they sink below the hitcount (10).
Not tested though...
CS2D Bug Reports


Offline