Preview

Gnu General Public License

Powerful Essays
Open Document
Open Document
654 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gnu General Public License
JASS - Jedi Academy Server Security
Copyright (C) 2010-2013 -1.#IND0000 http://jass.ucoz.net/ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see .

Created By: -1.#IND0000 .

Description:
JAZZ - Jedi Academy Server Security. In short, jazz is a project created to protect servers on the so-called basic mod - "basejka". Yet, it also increasing protection of other mods. Based on the QMM source code. Jazz by itself is open-source, but source code of the protection modules will not be published. List of fixed vulnerabilities:
1) msgbof.
2) votebof.
3) infobof.
4) forcecrash.
5) teamcrash.
6) votebug/cbufexec.
7) dirtrav.
8) npccrash.
9) limitbug.
10) gcrash.
11) RCON disabler.
12) RCON bruteforce.
13) Fake Players DDoS.
14) RandomPacket DDoS.
15) UnBan.
16) Remove all possibilities of damage to the game content - for example, by writeconfig.
17) Removed posibillity to «kill server» — to shutdown it that way that restart script won't work.
18) ChatFlood (donedl)
19) Well, little more things.
To get list of jass commands, type in server console command "jass".
Usage: jass [params]
Available sub commands: status - displays information about JASS. list - displays information about loaded JASS plugins. load - loads a new plugin. info - outputs info on plugin with id. pause - pauses plugin with id. unpause - unpauses plugin with id. unload - unloads plugin with id.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    18. Which of the following is not covered by a data loss/data leak prevention tool?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    H. Define a strict zero-day vulnerability window definition. Update devices with the security fixes and software patches right away.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    individuals, etc.), what security controls do you recommend be implemented in order to maximize CI-…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1)Data protection: Ensure all information is stored in a secure place and no information is given out if unsure.…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Securities Licensing

    • 456 Words
    • 2 Pages

    Date: To: For: From: Subject: April 11, 2013 Jay Jenlink, Regional Vice President Securities Licensing Recruits Joshua Conaway, Sales Representative Getting Licensed to Increase Business with Primerica…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Server Security Policy

    • 708 Words
    • 3 Pages

    3.2 General Configuration Guidelines • Operating System configuration should be in accordance with approved InfoSec guidelines. • Services and applications that will not be used must be disabled where practical. • Access to services should be logged and/or protected through access-control…

    • 708 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    After you finished reading this text you`ll know how to crack Cd protection and how to disable movie/sound/music calls in the game exe.…

    • 2046 Words
    • 9 Pages
    Good Essays
  • Good Essays

    1. Ensure that the machine is in good condition before being used for security purposes…

    • 926 Words
    • 4 Pages
    Good Essays

Related Topics