Jump to content

Cleric xtx

Members
  • Posts

    285
  • Joined

  • Last visited

Posts posted by Cleric xtx

  1. You would actually have to check the access list to do exactly as you wanted, as stated above. The only other way to do it is to remotely delete the entire deny (eg: `dd [email protected]).

    Never tried it before tho, sorry laugh.gif

  2. Try saying that to err0r, digi tongue.gif

    You can find a few flood protections in the addons section of this forum (obviously under MSN Scripting)

  3. You should really change the nicklist - the icons are low quality, the green text reminds me of the earliest MSNChat war scripts and the black bg doesn't go well with purple. The black also goes extremely badly with the blue text on the whisper dialog, as it's illegible

    Aside from that, it looks fine.

  4. You could always use this for simplicity:

    on *:ctcpreply:*:{
     if ($regex(noscript,$1-,vincula|clear) >= 1) { kick $chan $nick Script detected. }
    
    ;or if you want full regex of all - won't slow + shouldn't flood
    on *:ctcpreply:*:{
     if ($regex(noscript,$1-,finger|â€DTäE|vincula|clear) >= 1) { kick $chan $nick Script detected }
    }

  5. Isn't this going just a tad offtopic.gif

    As previously stated but perhaps not spelled out completely, the reason why the MSNChat OCX is "freeware" is because the OCX itself is distributed for free use. However, it is designed for exclusive use on MSNChat.

    It's like grabbing a free Argos (store's) catalogue and using the same catalogue numbers in your own store. The catalogue, much like MSNChat's OCX is free to use but is designed specifically for one company; use in any other way can be classed as illegal.

  6. Internet Explorer users spent much more time during 2004 with holes in their security pants, compared to securely-clad Firefox users, web consultancy, ScanIT, reckons.

     

    The consultancy says Microsoft's IE was "unsafe" for 98 percent of 2004, while rival browser Mozilla was "unsafe" for only 15 percent of the time.

     

    The figures come from ScanIT’s free online Browser Security Checker which, the company says, 195,000 surfers used to check their systems for vulnerabilities during the year.

     

    The reports suggest that surfers using Mozilla’s Firefox browser enjoyed the shortest "exposure period", where a patch for known vulnerabilities in the browser was unavailable. By comparison, Internet Explorer users were fully protected for just one measly week in the whole twelve-month period - between 12 and 19 October 2004.

     

    "This means fully-patched IE was known to be unsafe for an incredible 98 per cent of 2004," said ScanIT's CEO David Michaux. "And for 200 days in 2004 – that’s some 54 per cent of the time - there was a worm or virus exploiting one of those un-patched vulnerabilities," he added.

     

    There were only 56 days in 2004 where there was a publicly-known vulnerability – a remote code execution - in Mozilla’s browser and no patch to fix it, ScanIT said.

     

    Users of the Opera browser spent 65 days (17 per cent of the year) with their security pants around their virtual ankles, according to ScanIT’s browser checker figures.

     

    "Security researchers seem to be more inclined to report Firefox vulnerabilities to the Mozilla development team than IE flaws to Microsoft because of a better general attitude towards them,reckoned Alla Bezroutchko, ScanIT's Senior Security Engineer. "Mozilla’s Bug Bounty Program, which pays users $500 for reporting critical security bugs, is also a major incentive," he added.

  7. You should change the send button to match the colour of the rest of the switchbar (if you're keeping it).

    Personally, I'd only use one switchbar; you can divide it into separate servers by using main items (ie: branches) in the treeview.

  8. Where you have (%words > %wd) that's bascially "if this sentence is greater than that sentence" - you can't use greater than with anything other than digits. Also, the return wouldn't do anything.

    alias words {
     if (%blockwords != $true) { return $1- }
     else { 
       var %words = $1-
     ;I've added %tt to have a list of bad words, rather than just one
       var %x = 1, %i = $lines(blockwords.txt), %tt = $chr(36)
       while (%x <= %i) {
         var %wd = $read(blockwords.txt,%x)
       ;if it's not there, continue with the loop, if it is, add it to the list
         if (%wd !isin %words) { inc %x }
         else { var %tt = %tt $+ , %wd | inc %x }
       }
     ;Lastly, it returns the full list of bad words
       return $remove(%tt,$chr(36))
     }
    }

  9. Correction for character counter

    on *:text:*:#:{
    var %a = $regex(c,$1-,(\w|\W)/q), %b = $regex(s,$1-,\ /q)
    var %q = $regex(q,$remove($1-,$chr(32),\S/q)
    echo -a $nick Used %a non-space characters and %b spaces, giving $calc(%a + %b) total characters.
    if (%q => 1) echo -a $nick also managed (somehow) to use %q white-space characters other than a space.
    }

    I'm pretty sure that's right...

     

    Caps kicker (tried & tested)

    on *:text:*:#:{
     var %r = $regex($1-,/[A-Z]/q)
     if ($calc(%r / $len($1-) * 100) >= 70) {
       kick # $nick $ifmatch $+ % caps - too many!
     }
    }

  10. on *:input:#:{
     if (/* iswm $1-) && (/me* !iswm $1-) { halt }
     var %a = 1, %tt = $1-
     while (%a <= $numtok($1-,32)) {
       var %tt = $replace($left($gettok(%tt,%a,32),1),$chr(3) $+ $r(0,9) $left($gettok(%tt,%a,32) $+ $chr(15))
       inc %a
     }
    }

    I think that's it...

  11. I decided to have a crack at regex addons. You can modify it how you like, just don't try claiming it as your own if you don't know how to use regular expressions tongue.gif

     

    URL & email kicker

    on *:text:*:#:{
     if ($emailreg => 1) { kick # $nick I have detected $regml(email,0) emails in your text. }
     if ($urlreg => 1) { kick # $nick I have detected $regml(url,0) URLs in your text. }
    }
    on *:action:*:#:{
     if ($emailreg => 1) { kick # $nick I have detected $regml(email,0) emails in your text. }
     if ($urlreg => 1) { kick # $nick I have detected $regml(url,0) URLs in your text. }
    }
    alias emailreg { return $regex(email,$1-,/^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$) }
    alias urlreg { return $regex(url,$1-,/^\w+([\.-]?\w+)*\.\w+([\.-]?\w+)*(\.\w{2,3})+$) }

     

    Image viewer

    on *:text:*:#:{ if ($imgreg == 1) { run $regml(img,1) } }
    on *:action:*:#:{ if ($imgreg == 1) { run $regml(img,1) } }
    alias imgreg { return $regex(img,$1-,/^(file|http):\/\/\S+\/\S+\.(gif|jpg|png|bmp)$/i) }

     

    Counts how many spaces and characters are in users' text (untested)

    on *:text:*:#:{
     var %a = $regex(c,$1-,/^(\w|\W)+$), %b = $regex(s,$1-,/^\ +$)
     var %q = $regex(q,$remove($1-,$chr(32),/^\S+$)
     echo -a $nick Used %a non-space characters and %b spaces, giving $calc(%a + %b) total characters.
     if (%q => 1) echo -a $nick also managed (somehow) to use %q white-space characters other than a space.
    }

     

    If the counter doesn't work just replace the alias (eg: $urlreg) with the corresponding regex.

    In case you're wondering, a white-space character other than a space is tab, vertical tab, new line, etc

  12. Wouldn't it be easier to use a regular expression?

    Emails: $regex($1-,/^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$)

    URLs: $regex($1-,/^\w+([\.-]?\w+)*\.\w+([\.-]?\w+)*(\.\w{2,3})+$)

    on *:text:*:#:{ if (regex => 1) { action } }

×
×
  • Create New...