tsk luke, just buy it
Good to see you back Taba! And a nice screeny you have there
tsk luke, just buy it
Good to see you back Taba! And a nice screeny you have there
Ur late mate. First of april has already passed.
First A11 screenshot!
glad to hear its going better sexy!
Now you cannot talk yourself out of a long game of sid meier anymore...
A11 HAS BEEN RELEASED!
They have done it... they did the invention of the century...
NAPPING SIMULATOR!
just some regular 7DtD catchphrases
"such belgians"
"darn french caves..."
"THA MINES!"
"nub"
"char = beer"
"darn german forts"
that Resolution Decky...
nice home luke its a nice hole in the ground
Someone is jelly here.....
That hole killed you twice though Jens
2muchtext4me
Rtd...
you get extra ammo to defeat the ducks!
rtd...
Just today I've heard that my resit has been shifted forward by a week, meaning that I will have to use next weekend to study for it.
Thus I am afraid that I will have to postpone the meeting. Since A11 is comming somewhere within a fortnight, the meeting will probably be on a new save.
You guys are ofc free to gather together on saturday, and I will put some pvp-stuff in place, but I won't be there for long so no epic stuff will be activated
when I'm bored as zomb, I kill others so that I got some zombs to play with
best russian song:
any suggestions for a time?
Your eyes get burned out by the bludy blue colours...
Rtd...
since we are on the subject:
Gamers are being targeted by a computer virus that stops them playing their favourite titles unless they pay a ransom.
On infected machines, the malicious program seeks out saved games and other files and encrypts them.
A key to unlock encrypted files is only supplied if victims pay at least $500 (£340) in Bitcoins.
The malware targets 40 separate games including Call of Duty, World of Warcraft, Minecraft and World of Tanks.
Dark web cash
The malicious program looks similar to the much more widely distributed Cryptolocker ransomware that has caught out thousands of people over the last couple of years.
But analysis of the malware, called Teslacrypt, reveals that it shares no code with Cryptolocker and appears to be have been created by a different cybercrime group.
Researcher Vadim Kotov from security firm Bromium said the file was catching people out via a website its creators had managed to compromise. The site involved is a Wordpress blog that is inadvertently hosting a file that abuses a loophole in Flash to infect visitors.
One a machine is infected, wrote Mr Kotov, the malware looks for 185 different file extensions. In particular, it seeks out files associated with many popular video games and online services such as Steam that give people access to them.
"Interestingly, although these are all popular games, none of them matches any particular 'Top Sellers' or 'Most Played' chart, " said Mr Kotov. "They could just be games the developer loves to play."
Files holding gamers' profiles, maps, saves and modified versions of games are all sought by Teslacrypt, he said.
He said anyone who tries to outwit the malware by uninstalling a game they obtained via an online service may end up disappointed.
"Often it's not possible to restore this kind of data even after re-installing a game via Steam," he wrote.
Once target files are encrypted the malware pops up a window telling victims they have a few days to pay up and retrieve their data.
To decrypt, victims can either pay $500 in Bitcoins or $1,000 in Paypal My Cash payment cards. The virus tells victims to send payment details to an address located on the Tor anonymous browsing network.
The encryption system used by Teslacrypt has yet to be cracked meaning victims would have to turn to back-ups to restore scrambled files.
hmm, in case of exams we can postphone it a week. Lets just hope A11 won't ruin the party xD