The BASHandSlash.com Feed

BASH Webcasts

Monday, April 30, 2007

Fanmail!

Here at BASH we'd like to hear from you our readers and listenership.

We use Google Analytics here at this website so we know that we're being read on almost every continent on the earth, but we'd like to get to know you better!

Drop us a line by sending Jock an email introducing yourself: jockyitch@devil-dogz.com

Otherwise, write us a comment here on BASH...the blog.

You can post anonymously if you need the secrecy (surely the statute of limitations is up on that bank heist you pulled back in the 90's).
One of our readers, KingNoob just wrote and he's sent us these snapshots of his home in Norway. Thanks Noob. Beautiful pictures.

Saturday, April 28, 2007

COD4 Editorial: Lamers and flamers

BASH Editorial: Jock Yitch

Activision has finally officially stated that their Call of Duty series will continue in a new setting: the modern age. Call of Duty 4: Modern Warfare was announced today and whereas we still as yet do not know whether CoD4 will even be released to the PC platform, rumors and leaks released to industry wags suggest it will.

Yet, not one hour after the release of the CoD4 trailer by Activision, a cursory scan of gamer forums resulted in posts that were similar to these:

The jaded:
Just saw the trailer. Arab jihadists,rogue Russian generals and military chatter. "Been there, done that" is an understatement..
- BAFOMET
The faded:
Gah! What a horrible setting. It's ether going to be a right-wing propaganda wankfest, or a limp-wristed PC pile of crap! Yay! Surely there are more wars then just WWII to base games on. There's even a few where the Americans didn't make a complete arse of themselves, so why pick this other to generate contrvesy (sic)?
-Poisoned Al
The traditionalists:
I'm a little disappointed that it's not going to be a WWII game...I'm even more disappointed, however, that this looks like yet another "Hunt the Terrorists!" game, which I find incredibly stupid...it appears that they are going to grab the low hanging fruit of a glorified WMD hunt in the desert.
-EVEWALKER
The completely daft:

Seriously, its about time. The WWII games are fun and what not, but they've reached their limit. If the actual battle was pretty lame in itself (from a gamer's standpoint, mostly because there were no lasers), then a video game about it can't be that much better. The game-play and graphics were great in all of the previous games, but the limits on weapons and movement (no agility orbs),makes the game just slow to begin with. I also propose a name change for thistitle, superpowered alienz don't have a "call of duty", they do whatever thef@#$ they want.

- FAPMaster

Those painting things black:
im not buying this crap.. i might never buy a IW game again...
-Joueflux
Can you imagine a programmer or graphic artist at IW reading these quotes? If you can, then also imagine, that you have spent the last year hunched over your computer every day so that the gaming public can get a little bit of entertainment after a hum-drum day. I guess you would expect a thank you from this same public, but on the contrary you get this tripe. Geez, you might just decide to chuck it all in and send your resume off to the group doing Super-Mario: the Las Vegas Adventures.

It is very disturbing to me that the gamers are no longer awed by the incredible realism of today's computer simulations. Games are being rendered at a level of detail we all thought unattainable only a decade ago.

Even with what comes close to a Star-Trek Holodeck in their homes, gamers have turned to contemptuous criticism against the very makers of the programs that supposedly give them so much joy. This is cheap, unschooled criticism leveled against picayune targets: the game has no lasers, I am bored with yet another extremely-detailed World War II sim, the colors are to brownish.

What a joke.

These lamers - not gamers - feel the need to criticize the artists who make these epic programs not because they have a genuine gripe, but clearly to counter their deep sense of inferiority. It always make you feel good if you can knock someone who has achieved success. Make you feel important, right?

The whithering criticism of CoD4 from these haters is not only unjustified it is damn near libelous.

If you want criticism, then let's be critical not whiny, try these on for size:

The negative:

- Yes, I do think there were some CGI effects mixed in with game footage in the Modern Warfare trailer. Wouldn't be a first for Activision. I can tell you that after seeing the CoD2 trailers I was AMAZED that the game played nearly identical to what I had seen. So I'm giving the folks at Activision a big pass on this one.

- I agree, the dogs (shown for a split second, mid trailer) were hideously rendered RELATIVE to the rest of the graphics in the trailer.

- There was no indication whether in game physics would finally be applied to the bullets in the game. This is the real elephant in the room with CoD. I can aim two miles downrange and never have to compensate for gravity. Raytracing insta-hit bullets are a sop to the arcade crowd. The game would be much harder to play - and that is what most of these elitist "critics" are looking for right? Well why doesn't anyone ever complain or want true ballistics in the game? Could it be that for all the CoD haters out there that despise the game for its arcady style - actually enjoy the arcade experience?

- There are many folks that think the WWII FPS scenario is out of style and thus embrace a change to modern war. This problem faced the flight sim crowd years ago - something I am a little familiar with. I've noticed some parallels I will share with you. When you go from WWII scenarios to modern, many times you take tactical subtlety out of the game. However, in both genres, you are managing systems. In WWII the system was the sight and the trigger. In modern scenarios the system might be complex firing systems or organizing an integrated arms attack. They both offer challenges. I like diversity as much as anyone, but I like fidelity more than anything. I would rather take a high fidelity (good graphics, good sound) WWII any day over a low fidelity game of any genre. It's the PLAYABILITY stupid!

- For me, the big negative from yesterday's introduction of CoD4 was that there was no indication of the gaming platforms that the game will support. That's inexcusable as far as I'm concerned - but probably, this was done as a pure business decision. Another pass for Activision.

The positive:

- The game trailer had a huge amount of 'tude. And attitude is very important in the marketing of the game.

- The colors and look of the game were great. There was a strong blue tone throughout - and it made the game look really cool. Yes it took some flavour from the Clancy Rainbow Six series - but that's what art is all about. They haven't copied that game - they've borrowed elements of it. We all borrow elements from everywhere when we create. It's called *inspiration*.

- The level of detail in player animation was simply incredible: sliding tackles and leg sweeps are what we have to look forward to!

- Aircraft, armor and maybe even nuclear options!

- The graphics seemed to be good enough to wow me but were not too over-the-top. I may not have to buy a new computer just to run this game when it comes out.

Conclusion

Overall, the trailer has me wanting more and I really hope the rumors are true and we get PC support.

For the lamers and flamers out there...shut the computer down for a few hours and go read a book or something.

Call of Duty 4 Modern Warfare Trailer

Here's the trailer from youtube.com.

COD4: Trailer


Things are heating up fast on the Call of Duty 4 front. Here are a few links you'll need to check out:


Call of Duty 4 Modern Warfare Trailer: http://www.youtube.com

Here is a 720p version - in surround sound: ve3d.ign.com

Or download it here: www.codhq.com


Now, check out screenshots from callofduty.com


The trailer is filled with tracer rounds and explosions, assault helicopters, night and laser scopes, roping ingresses, Arab terrorist types with a deft hand for spinning their 9mm cowboy-style, and of course RPG's.

Charlie Oscar Delta (Infinity Ward's CoD4 website): http://www.charlieoscardelta.com

Related articles:

CoD4: Modern Warfare Officially released

Rise of the Resistance Update

The folks at Rise of the Resistance (www.cod2-expansion.com) are keeping very busy! They have issued their first media release.

Be sure to check out all the pictures they have posted in their forums, here: Media Release.

The following pictures are taken of the new Kar98 (with bayonet) that they have been working on. The RoTR guys are working on giving the Kar98 player the ability to stab with the bayonet. Ouch!

Note that these pictures are taken in Carentan - or, it looks like Carentan. Wait! Those rascals at RoTR have done some nifty changes to that little town and it looks like the *new* Carentan will be slightly larger than the stock map and it'll have a "gated-community" feel to it!



Here is a nice view of the new Carentan:



Friend of BASH, {PST} Joker tells us that RoTR is at 40% complete. They are still in discussions with Activision but he cannot speculate where those talks will take the project. Joker is quick to point out that regardless of the outcome of the Activision meetings, RoTR is a community project and will be completed by the community. He also states that the volunteers putting this expansion pack together have resolved to work even harder now that CoD4 has been announced. Again...go get 'em guys!


Related articles:

vive-la-resistance

Thursday, April 26, 2007

BASH's new Digs

For those of you who remember, a while back, the BASH studios here in Toronto were blown to smithereens in what I would like to think was a well co-ordinated terrorist accident - for which not a single charge has yet to be laid, unless you count the traffic ticket I got for double parking one hour before the explosives went off.

Well, we here at BASH would like to tell you that we will debut the new state of the art web-cast studio facilities, high atop the new 100 storey Scungile Tower in Downtown Toronto, this week..

The full details will be provided to BASH's extensive fan base on Saturday the 28th of April, at 10:00am just prior to the Chef Draft on the Food Network.

Yes, we finally put the financing together, thanks to a generous loan from the Western New Jersey Wastemanagement Group, and we're going to be webcasting from the penthouse suite of the just-completed Scungile skyscraper starting next week. I'm so excited I can hardly keep from showing off my new $400 porcelain laminate veneers I just had my dentist install, which is a shame because its a webcast program and not a vidcast. Oh well. Use your imagination.

Wednesday, April 25, 2007

Call of Duty: Modern Warfare

Check out the Apr. 25th posting on planetcallofduty.com !

It is official. Activision, partnered with CoD2 developer Infinity Ward, will introduce us to their latest Call of Duty installment for the PC: Call of Duty Modern Warfare. Activision will apparently reveal their new game by playing trailers during the U.S. NFL Draft taking place this Saturday (April 28th) at 1:00 pm EDT.

Although not the best kept secret in the gaming industry, enthusiasts of the WWII series knew that CoD4 was coming; however, there was and still is, a great deal of speculation regarding its theme and setting.

While the general public has not been told much in this regard, rampant Internet speculation suggests that the plot in CoD: Modern Warfare involves global terrorism and weapons of mass destruction.

Those same rumors suggest that players will operate as units of the U.S. Army, Marines and British Special Air Service. Settings apparently include Eastern Europe, the Middle East and at sea.

While the Call of Duty series has been fighting neck and neck with the Battlefield-series for the first person shooter market, undoubtedly, the impending release of Medal of Honor: Airborne Assault necessitated Activision to launch a first strike to ensure that their current players do not stray from their franchise.

Tuesday, April 24, 2007

In a bind: Changing your name in CoD2

This article can now be found here: BASHandSlash.com

Sunday, April 22, 2007

CoD4 to be announced soon?

According to the good folks at planetcallofduty, IW is making a big announcement on the 28th of this month.

Could this be the big CoD4 news we have all been waiting for?

Or did someone in their accounting office win the lotto?

Check it out for yourself here.

The Malware War: Defense in depth

BASH: Episode 16 (The Malware War)


Show Notes

Episode 15 of BASH raised a lot of issues but did not provide much in the way of specifics to either protect yourself from, or rid yourself of, malware.

In this article we summarize what we learned from Episode 15. The major points from Episode 15, can be separated into technical and behavioral elements.

Let’s start with the technical elements:

1. Keep your operating system patched to the latest revision.

Make sure you turn on automatic updates (we showed how in Episode 15). Apply any critical Windows updates right away. Hackers will create malicious programs taking advantage of any deficiencies with Windows within one day of Microsoft announcing a new patch. These are called zero day exploits - so make sure you patch your system the day the patches appear.

2. Use a firewall.

The best is a hardware firewall - a wireless router is a good example - this is a device that lets you share a single Internet connection amongst many computers. While they may not be advertised as firewalls - routers are excellent at preventing hackers from getting into your system.

Software firewalls are a second best solution. Microsoft's firewall, for example, is a software firewall and should be turned on even if you are running a hardware firewall.

Although we did not talk about this in the last episode:

3. Do not log in as a System Administrator.

If hackers pass your firewall their software can easily install itself if you have complete system privileges and you do if you are logged in as an Administrator. Instead, log into your computer as a limited user. XP has special problems when it comes to this due to the fact that programs written for XP never thought they would have their system privileges restricted - so some of these programs may not work well if you run as a limited user. However, if all you are doing is surfing and running Call of Duty - you should not have too much of a problem.

The next item is a behavioral element:

4. Don’t open email attachments.

Email attachments are the number one way viruses and Trojan horses spread and can get into your system. Turn off HTML email in your email browser (for example, MS's Outlook). As well, don’t click links in email. Hackers regularly spoof the real link they want you to browse. For example you may think the link says cnn.com but in reality the hacker could actually be directing you to hack.com. If you need to go to some one's link, manually copy and paste the link into your browser. If the link is spoofed you'll see the real address in your browser's address window.

The final element is to use software against malware.

5. Don't surf naked: use anti-virus and anti-spyware software.

Don’t download files from unsafe places. Filesharing software like Azureus, Kazaa, and Limewire, many times cause you to unknowingly download files that contain spyware and Trojans. Make sure you use an antivirus program on anything you have downloaded. Additionally, there are programs you can download for free to detect and prevent infestations.

Well, this is all well and good I suppose. If you use that advice, not only will the likelihood of getting malware be low, your productivity will be as well. Given the dependence we have on the Internet these days it is very important that we be able to surf freely. If you are limited to certain sub-domains because you're afraid of getting a virus, you'll be spending all of your time on either Google, Yahoo or Amazon.com.

So on behalf of all the bobs_t_shirts.com and weedwhacker.net sites out there, we need some practical solutions to these problems and hopefully, this article will provide them to you - or at least tell you where to look.

Since this freedom to surf is of primary importance to gamers who spend a considerable amount of time on the net, let's look at some practical solutions to each of these issues.

Let's look at some of the technical elements first:

1. Keep your operating system patched to the latest revision.

Although the ball is squarely in Microsoft's court to fix the holes in their operating system before hackers try to exploit deficiencies in it, you can do your part to keep your operating system up to date and the simple way to do that is to ensure your Automatic Windows Update is turned on.

Unfortunately for us, Microsoft is usually fixing these holes after the hackers have exploited them. Compounding this is that when an exploit is found, the news of this is broadcast by the media far and wide. This alerts other hackers world wide that there is an exploit to be had - and the bad guys flock to it like flies on buffalo poop. For this reason, the days immediately after such an announcement are very dangerous as every black-hat programmer in the world is training their sights on the same program flaw. Some people call these exploits "zero-day" viruses for obvious reasons.

Patches are typically issued for Microsoft programs the first Tuesday of every month: so called, patch Tuesday.

As a gamer, you usually don't have much of a choice but to stay with Windows products and thus are susceptible to these issues. If you are a regular reader of the influential planetcallofduty.com you'll know that CoD2 is available on the Mac now. So, if you are really paranoid about viruses - try the Mac which although not invulnerable is a much safer operating system than Microsoft.

An excellent example of a recent zero-day virus is something called the animated cursor exploit - you may have heard about it just a few weeks ago in the news. Animated cursors are often used on websites (a spinning hourglass is a typical example of animated cursors), well it turns out that you the surfer don't get a choice whether a website attempts to animate your cursor. Turns out that Windows had a bug in their operating system that allowed unscrupulous hackers to upload malware through files that were supposed to animate your cursor on various dodgy websites. This malware would typically be a Trojans which could compromise an infected computer and gain complete control of it. Although Microsoft just patched this but, the vulnerability existed regardless whether you were browsing in IE or in the other popular free browser, Firefox. Antivirus programs, firewall...nothing would stop this type of exploit - except to update your operating system.

2. Firewalls

A hardware firewall is a gadget that acts like a one way valve to prevent unwanted network traffic from communicating with your computer. Additionally, if you set up your system correctly, you could completely hide the computers behind that firewall from the prying pings of hackers.

Which hardware firewall should I buy? Without a doubt the most common firewall out there right now is a router, either a wired or wireless, or WiFi router. We have decided to write about a very common configuration in many gamer households, where the gamer uses a desktop PC and at least one family member uses a portable laptop. Therefore, we’ll pick a wireless router for our firewall.

Connecting your broadband modem into the wireless router will provide you with a WiFi connection anywhere in your house for your laptop users. As well, most wireless routers allow you to connect an Ethernet cable directly into them, therefore you can plug your Desktop PC into one – giving you a connection speed that is just as fast as being directly connected into your modem. Importantly, all the devices connected to it can be hidden from the prying pings of Internet hackers.

What should we look at when buying a wireless router?
Is it stable (does it need to be rebooted all the time)?
Can I prioritize the routing of certain software applications above all others?
And finally, what does it cost?

Of all the wireless routers, one of the least expensive is the Linksys WRT54G.

Linksys WRT54G

It is by far one of the most popular devices that can be used as a firewall. The 54G's became well known because they were very customizable through 3rd party modifications. Although customization has become difficult lately, the 54G remains popular because of its low price: $50 US.

The device is capable of sharing Internet connections amongst several computers via IEEE 802.3 Ethernet and 802.11b/g wireless data links.

Having said all that, we have personally found it to be somewhat lacking rock solid stability and it needs to be rebooted from time to time; however, upgrading the unit to the very latest firmware – a free download off the Linksys website, has greatly improved the situation. Did we mention it is very inexpensive? As with most routers you can decrease the effect of latency when you are gaming and two or more people are using the router by programming the unit to prioritize the packets coming from, say your Call of Duty software. This is easy to do and can be done by accessing it through a web-browser.

With it, wired devices connect to a blazing fast standard ethernet 10/100 switch and on the wireless side, you'll transfer data at 54 Mps

Now, if you are a hard core gamer, then the D-Link DGL4300 might be for you.

D-Link DGL4300

The D-Link has been a favorite amongst reviewers for sometime now. At approximately $140US you get the following features:

• It has a slightly smarter packet filtering method, a proprietary algorithm called GameFuel. It prioritizes incoming and outgoing packets going through your router. Gaming packets will have priority over other packets such as those commonly associated with FTP and web traffic, allowing you to maintain consistent latencies while playing online games.
• Enhanced wireless technology for optimal range and connectivity – up to 108Mbps
• Enables multi-tasking between other applications without degradation in game connection.
• Customizable settings to add or modify new applications or game configurations
• A Firmware upgrade notification feature.

Now, did we say that if you get in behind a router, wireless or otherwise, you are safe? Well guess what? Don't leave your credit card numbers on the hard drive just yet.

The computer magazine PCWorld found way back in November 2002 that if you leave the default password on your router (which by the way most people do) hackers can – at least on some routers - rewrite the code controlling your router and gain access to your system. Interestingly if your next door neighbor is using the same type of router and they use the default password you'll both be using each others routers without knowing it. So remember to set a different password!

Now in addition to hardware firewalls, you may have heard of software firewalls. What are these?

Well, a software firewall is simply a program that runs in the background all the time. Its basic function is to monitor all traffic trying to get into your computer and lets you decide whether you want to let it in. The software firewall then alerts you to any unwanted intrusions. As well, YOU get to choose which programs are allowed access to the Internet and thus you can prevent worms, Trojans and spyware from infecting your computer. Without one, any program you install has access to the Internet.

The downside to software firewalls is that if you do get infected by a virus, the really dangerous ones will rewrite the software firewall code itself to prevent you from knowing the virus is there. For this reason there are a lot of computer experts who do not recommend surfing the net with only a software firewall. Use both a hardware and a software firewall for maximum protection.
The other downside is that software firewalls consume CPU cycles and computer resources.

A very concise list of these programs can be found at: hackfix.org/software/configure and click on the Firewall software listed there.

Here’s the do’s and dont's of a software firewall. Like the hardware version, they:

Help block computer viruses and worms but they do NOT detect or disable them.

Software firewalls WILL ask you for your permission to block or unblock certain connection requests, but it does not stop you from opening e-mail with dangerous attachments.

Software firewalls can create security logs of the sites trying to send you requests for access but they do not block spam or unsolicited e-mail.

Some of the more sophisticated software firewalls do indeed do some of those things, but we'll keep things simple here and discuss two products that only do the basics.

Here are 2 software firewalls I can recommend:

a) The Windows Firewall.

This was previously known as Internet Connection Firewall or ICF. If you're running Windows XP Service Pack 2 (SP2), Windows Firewall is already installed and it is turned on by default. However, some computer manufacturers and network administrators might turn it off.

To turn it on:

To open Windows Firewall
1. Click Start and then click Control Panel.
2. In the control panel, click Windows Security Center.
3. Click on Windows Firewall

The Windows Firewall is a very basic program. It's fairly unobtrusive in that you'd never know it was running.

When someone on the Internet or on a network tries to connect to your computer without being requested to do so, Windows Firewall blocks the connection. If you run a program such as a multiplayer online game that needs to receive information from the Internet, the firewall asks if you want to block or unblock the connection.

If you choose to unblock the connection, Windows Firewall creates an exception so that the firewall won't bother you when that program needs to receive information in the future.

b) ZoneAlarm

There are two versions of this firewall. I want to only talk about the free version here. ZoneAlarm is hands down every one's best software firewall. The biggest difference between it and Windows Firewall is that Zonealarm is bidirectional. That is, it not only senses intrusions it also senses outbound traffic. For example, if someone hacked your computer and installed a program that will try to access the Internet, ZoneAlarm will alert you and you can then take action to shut that program down. It even has a stealth mode to hide your computer from hackers.

The downsides to ZoneAlarm are that it slows down your computer and takes up system resources.

The other big downside is that ZoneAlarm is very obtrusive and warns you about even innocuous events. For this reason, it is probably best left to power users. Remember, the goal of Zone Alarm is to sell you ZoneAlarmPro for $50 so their goal is to sufficiently frighten you into buying their pay version – so it tries to draw attention to itself as much as possible to show you that it’s working. Novice computer users could find this frightening.

Zonealarm’s website is found here: Zonealarm

Don't run ZoneAlarm with any other software firewall. So if you download it - make sure you turn off Windows Firewall.

Right now, ZoneAlarm just takes up too many system resources for me to recommend it while you are gaming. Use Windows Firewall while gaming and turn ZoneAlarm on at other times. But don’t run both simultaneously.

In the next edition of our articles on malware we discuss the details of changing your online behavior and more excitingly, we discuss what software programs you can download (most for free) to help you protect yourself against malware.

Related Articles

How to protect yourself from Malware

Thursday, April 19, 2007

CoD2 player levitates during scrim

Levitation earns player uber pwner status

Staff
April 19, 2007 Special BASH report

SWAMPGAS, FL - In a stunning development in the gaming world, new Call of Duty 2, Devil-Dogz recruit, {DD}BrOtHeRGaNoOsH, has apparently mastered the secret of levitation during a TWL sanctioned scrim.

In a BASH exclusive, photographs of
BrOtHeRGaNoOsH performing this mystical act, are categorical confirmation that he was able to momentarily suspend the laws of gravity.

A few prominent physicists contacted by BASH, unwilling to allow their names to be published due to fears of being ridiculed by their peers, have now even speculated that gravity may now actually be demoted from a law to a mere "guideline" as a result of this spectacular feat.

Levitation, or psychokinesis (PK) is defined as the ability to lift into the air without any visible physical means and float or fly around. The phenomenon has been said to have occurred in the past and limited to shamans, mediums or persons demonically possessed. This is the first time it has ever been associated with a video game avatar.

BASH was not able to contact "the Noosh" as BrOtHeRGaNoOsH is known in CoD2 gaming circles, he did leave the following voicemail greeting on his answering machine: "Yo, I'm not home right now - leave a message (grunt sound)".

The grunt sound was clearly audible in the recording and sent chills up this reporter's spine when it was overheard. BASH staffers also reported hearing what sounded like someone opening a can of beer at the end of the recording, but this could not be substantiated.

Friends of "the Noosh" speculate that he has somehow uncovered this long lost artform from the few texts left behind by 10th century Arab historian, Abul Hasan ("Bubba") Ali Al-Masudi. Al-Masudi is known for writing a 30 volume history of the world, in which, he commented on the fact that the pyramids were built by Egyptians levitating rocks on magic papyrus.

One CoD2 gamer, TotalKrap, claims to have seen "the Noosh" accidentally text chat "/bind F magicpapyrus" onto the screen, rather than in console just before he allegedly began to float. Other players contacted by BASH are not so sure and say that he merely pressed the jump key and only seemed to float. Clearly, these people have not seen the visual evidence.

Regardless of its tactical significance, {DD} BrOtHeRGaNoOsH, has achieved CoD2 uber pwner status for this fantastic stunt.

Tuesday, April 17, 2007

Changing mouse sensitivity on the fly

This article can now be found here: BASHandSlash.com

Monday, April 16, 2007

We've been punked! *UPDATE 1*

BASH has just received a straightforward reply from Evenbalance regarding the lag induced by their latest Punkbuster update.

As you can read in the BASH article We've been punked!, Evenbalance has added two background processes that run while Call of Duty (or any other Punkbuster enabled game) is running; namely: PnkBstrA.exe and PnkBstrB.exe.

A few days ago, we opened a ticket with Evenbalance and asked them the following questions:
While we greatly appreciate all the efforts you folks are doing to keep us playing in a Cheat-Free environment, the lag induced by the new update has caused some issues.

Can you explain what has caused the lag and if there are any solutions to mitigate it. Currently there are community workarounds.

I have posted a few on my blog. I am sure you cannot sanction such activity; however, can you suggest what we CAN do? Currently your 2 new executables (PnkBstrA and B) are eating up a significant amount of CPU resources and undoubtedly contributing to a slowdown in-game. I would greatly appreciate any information you can provide my readers/listenership.

Glenn Courington, from Evenbalance, replies:
04/16/2007 14:39:41 - "Glenn Courington"

Note #2: As your blog states, yes, these new services will take additional CPU cycles, as this is by design to use CPU cycles that aren't allocated to the game or other processes.

As for the "solutions" posted, no, those wouldn't be solutions. While it hasn't been initiated yet, it will soon be required to run these services to play on a PB server. Uninstalling them or turning them off will result in a kick from the server.

As for lag issues, we have been making updates to correct such issues, and we will continue to do so as needed.

http://www.evenbalance.com/index.php?page=pbsvcfaq.php

So there you have it. Please ensure that you do NOT remove the PunkBuster background processes.

Hopefully, Evenbalance will sort out the lag issues.

If anyone is having lag issues, please let us know. You can email us here at BASH:

jockyitch@devil-dogz.com



Additional articles:

remove those un-needed processes
protect yourself from malware

Sunday, April 15, 2007

You cheat? You Bleed.

With all the controversy over the lag induced by the new PunkBuster upgrade, the focus has once again shifted to the cheats that ruin our online multiplayer gaming experience.

Well say what you will about the government over there in China, I like their policy on hackers.

Read this article to see what one on-line gaming community did when they found hackers on their system:

www.texyt.com

Friday, April 13, 2007

We've been punked!

Has anyone noticed increased lag, higher pings, packet loss, lower FPS and loss of system resources lately when playing online?

Well, it can probably traced to the latest Punkbuster updates.

The latest updates of Punkbuster have certainly wreaked havoc with us here in the COD2 community.

What you may not have noticed is that Evenbalance (the authors of PunkBuster) have added two new processes to their PB suite:

PnkBstrA.exe and PnkBstrB.exe!

That brings them up to a grand total of four processes total - all robbing you of system resources while your playing, albeit for a good cause, I suppose.

What are these new services? Try reading this:

http://www.evenbalance.com/index.php?page=pbsvcfaq.php


Beginning with PunkBuster client version 1.500, we have extended the PunkBuster Anti-Cheat system to operate without the requirement to run PunkBuster supported games with Administrator privileges when running under Windows 2000, XP, or Vista. In order to do this, we have developed new Windows service components to work with the PunkBuster system. We are currently conducting open beta testing for the new service components. To participate in the open beta testing, issue the "pb_installservice" command in your game console after joining a server (at this point, you must still be running as the Administrator user). This command will attempt to install a new PunkBuster service called PnkBstrA. Alternatively, the PBSVC Setup Program can be used as a standalone installer/uninstaller for the PnkBstrA service; PBSVC can be downloaded from here. Once the PnkBstrA service is running along with a new PB client version 1.500 and higher, running PB enabled games under Windows 2000, XP or Vista no longer requires Administrator privileges.

It appears that both executables are part of the latest Punkbuster update. And one, PnkBstrB.exe seems to be looking for cheats on your drive.

The upshot is a very significant increase in system resources while playing. Try bringing up your Task Manager while playing to take a peek. Some people are seeing 30-40% of the their CPU resources being taken over! This is higher than what COD uses most times.

While my initial anger at this made me point to PB...the real culprit is the cheating hacker! Well what can you do about it?

SOLUTIONS?

BASH has found a few solutions that have been found successful by non-COD gamers and we post them here. We have not tried them out and you should use them with great caution:


A. This was found referenced on http://forum.americasarmy.com

1. Click on the start menu, click on Run.... Type services.msc.
2. Under services find PnkBstrA. Right click it and stop it from the option in the drop-down menu.
3. Now double click it. On startup type select disabled.
4. Repeat 2 and 3 for PnkBstrB.
4. Go to your windows/system32 folder.
5. Find the two files, PnkBstrA.exe and PnkBstrB.exe and delete them.
6. Go to AA/system/pb folder.
7. Delete PnkBstrB.exe and PnkBstrK.
8. Go to http://www.americasarmy.com/includes/bumper.php?goto=http%3A%2F%2Fwww.evenbalance.com%2Findex.php%3Fpage%3Dpbsetup.php and download the pbsetup for your operating system.
9. Install. Select game directory and update PB.


B. Also from americasarmy

1) delete Punkbuster folder contents in system folder
2) goto start>control panel>administrative tools>services
3) goto extended tab select PnkBstrA. Double click it to see properties you will see a drop down menu select disabled.
4) goto PnkBstrB Double click it to see properties you will see a drop down menu select disabled.
5 ) Download this for your OS http://www.evenbalance.com/ind...tup.php
6) run pbsetup select your game directory and update PB
7) should be gone now go play with out lag!

Both solutions are similar. The folks who have come up with the solutions say their lag was gone once they performed the tweaks and PunkBuster has not kicked them from any server.

The jury is still out on these fixes...stay tuned.


Notes:

Punkbuster support is apparently telling its users that CPU usage has increased with this latest update; however, PB will use "unused" CPU cycles as it completes scanning your system for hacks. They are stating that this will not be detrimental to gameplay.


Related posts:

remove those un-needed processes

protect yourself from malware

The pen is mightier than the hack!

Anti-Cheat Petition

Check out this petition to Software Companies and Legislators:


http://www.petitiononline.com/screwMSX/petition.html


It reads something like this:

This is a petition to the gaming industry and their attorneys as well as to state and federal lawmakers to pass and enforce legislation to penalize those responsible for profiting from distribution of hacks and cheats in online multi player games. The impact of this malicious activity is not only degrading the gaming experience for players but affecting the corporations that publish the games monetarily. I implore all affected parties to read this petition and take action to save online gaming from these criminals.

Sincerely,

The Undersigned

Tuesday, April 10, 2007

Remove those un-needed processes: msconfig

Speed up COD by shutting down any un-needed or unwanted processes!


If you want to speed up COD on your machine, you might want to disable un-needed programs from running in the background while you are playing.


To disable a program from running you can do so PERMANENTLY or TEMPORARILY (they will return next time you boot up your computer). For example, Apple's IPOD SERVICE runs on startup on my machine. This service is used to download mp3 files for my iPod. I want it to run, however, it does take up resources while I am on my computer.


Each background process can consume CPU cyles and memory. Other services are more necessary than others. To get every ounce of horse-power out of my machine to play COD, I might want to stop this program from running.

Some processes can be downright useless...adware or spyware for example.


BEFORE YOU GO FURTHER - MAKE SURE YOU UNDERSTAND THAT YOUR SYSTEM COULD BEHAVE ERRATICALLY IF YOU DO NOT KNOW THE DIFFERENCE BETWEEN A BACKGROUND PROCESS THAT IS CRITICAL FOR YOUR MACHINE AND ONE THAT IS NOT.


TEMPORARILY DISABLE A PROCESS

Disabling a process temporarily should be your first step if you do not know exactly what it does (for example, if you suspect it is spyware).

On Windows XP:

Press Ctrl-Alt-Del

This will bring up Task Manager. Click on the tab that says Processes.

Select the process you want to delete.


Note that Windows Task Manager gives you the memory usage for each program running. For example, my IPOD service takes up 3.6 Mb of RAM!


During your session on the computer, this program will not run - but may come back (if it is set up to start up again on next re-boot). You can temporarily disable after each boot up to determine what loss of functionality you experience.

PERMANENTLY DISABLE A BACKGROUND PROCESS

If you feel comfortable to disable a process (or one part of a process), You can use the System Configuration Utility (MSConfig) that is given to you in Windows XP.

1. Click on Start
2. Click Run
3. In the window that just opened, type the word msconfig.
4. Click the Startup tab.
5. Uncheck any process you do not wish to have start on next start up of your computer.

If you realize that you need this program after all, re-check it and reboot.


Here's yet another way:

1. Click on Start
2. Click Run in the window that just opened, type the word services.msc
3. Click on the service you want disabled on startup (Extended tab)
4. Click on Stop the service (top left)



See also:

How to protect yourself from Malware

Monday, April 9, 2007

Spread Test

This article has moved to: BASHandSlash.com

Friday, April 6, 2007

How to protect yourself from malware

SHOW NOTES FROM BASH EPISODE 15: VIRUS!

This is the first in a few articles on BASH...the blog that will focus on the basics of computer/data safety while connected on line.


I'm embarassed.

No, I wasn't caught trying to steal women's underwear at the Walmart! Um...that was last month.

I am embarassed because I was infected by an internet worm a few weeks ago.

This "worm", a software program, took over elements of my computer and made it do various tasks without my consent or control.

Yup. I picked up a worm and it ruined my gaming life for about a week before I cleaned it off my computer. The embarassing part is that I should have known better.

I thought I understood something about internet security but I failed to act on that knowledge and it cost me one week of frustration. Could have been worse I suppose. I could have had to reformat my drive and re-install XP on my PC. Or it could have been really bad and I could have suffered from identity theft.

I have taken a week out of my gaming life to, number one, clean out my PC of any web-derived infestations and number two, protect myself from any future attacks.

This article will try to atone for my sins by providing you with what little I know or have learned about trying to protect your computer from these devlish creations (viruses, worms, trojans, malware...) and keep your online presence a safe and happy one. The focus here will be on the gamer who uses a PC running Windows XP and a cable-modem to connect to the world, but most of what you will read is applicable to anyone who ties a PC into the internet.

The Axes of Evil

There are many types of programs that are making the rounds on the internet that can cause you problems. The presence of these programs is a natural consequence of the versatility of the personal computer. It is very difficult to exclude programs that have good intentions from programs that have bad intentions.

It's hard to come up with a definition for these programs, you hear the word virus used a lot for these malicious pieces of code, but any program that somehow gets on your system and whose purpose is to alter the behavior of your computer without your permission is by definition malicious and has bad intent.

A decade ago these malicious codes could be very destructive, some for example some programs back in the 80's and 90's even attempted to erase your harddrive.

Nowadays, this "bad" software, or malware, is more than likely simply trying to:
  1. Use your computer to send out spam email for which the author of the malware is compensated.
  2. Spy on you and turn the information over to adverstising agencies for money.
    or
  3. Use your computer in conjunction with millions of other computers (botnets) to launch attacks on computer networks (denial of service - or DNS attacks).
The reason malware is not as destructive anymore is that most of the time the author does not even want you to know it's there. Because if you find out you have one of these little programs, you'll try to delete it and thereby removing the author's source of income.

Here is a quick list of such evil programs, or also known as malware... you have all heard their names before if you have ever used a computer:
Virus:
A computer virus is a program that can copy itself and infect a computer without permission or knowledge of the user. Viruses can spread to other computers by infecting files on a network (e.g. the Internet). Viruses spread by attaching themselves to other files they come in contact with.

Most of the viruses spreading nowadays are designed to take control over (hijack) your computer system, turning into what tech experts call a "zombie system". Why would anyone turn your computer into a zombie? Well, there may be some truth in the news that virus authors are getting nearly a dime for every computer they hijack. The virus author then turns the control over your zombie computer to an email spammer who makes your computer spit out spam emails. If you get spam email you'll see that the authors seem legit - these poor folks have had the control of their computer stolen right out from under them and have no idea their system is transmitting these emails. It is no wonder that there are four spam emails sent out for every "real" email.

There are some estimates that say that one-thirds of all computers on the net are zombies. According to the BBC, eighty percent (80%) of all the computers in China have been hijacked! PC Pitstop Spyware Center says that 20% of all computers have spyware!

You get a virus by running a program on your computer. More often than not the user clicks on a program without realizing that the program is a virus.

Trojan Horse
In the computer world, a Trojan is not that rubber thingy in your wallet that you've never used. It's a program where a hacker has hidden their evil-doing code inside what appears to be a harmless program or data file.

It's a program that claims to be one thing, but is in reality, something else. Some people who have used Kazaa (music sharing software) consider it a trojan program because it actually carries spyware inside.

Worm:
A computer worm is a program that can make copies of itself. It employs the internet to send these copies to other computers. You don't have to visit a specific internet site to pick up a worm. In fact you don't have to do anything other than connect to your computer to the net to get a worm.
Worms can spread through computers that have out of date operating systems. For this reason it is important that you constantly keep your operating system up to date by downloading the latest patch.
Some worms spread through email. Most through Microsoft Outlook or Outlook Express.

Worms and viruses are different in how they are transmitted: a worm is a stand-alone program, while a virus propagates by attaching itself to another program.

Spyware
Spyware describes a type of computer program that will try to advertise, collect personal information, or change the configuration of your computer without your permission. Some spyware tries to track visits to a website for example and then send this information to an advertising agency. More evil versions of spyware try to record your passwords or credit card numbers as you type them in on the web.

Spyware typically can get installed when you visit websites. Most websites, even very legitimate sites like CNN and Amazon will try to keep track of your on-line behavior. Usually this happens when your browser settings are not set to a sufficiently high security level and you visit a website that distributes spyware. This is sometimes called “drive-by downloading” since it installs itself when you “drive-by” a website.

Some of the more notorious websites will do more than track your presence on their website though. But it's all a matter of degrees.

How do you know you have been hacked?

The way I knew I was hacked was that the ping or latency I experienced on my favorite game servers had gone up. And I mean way up. For example, on my clan's server, the DD public server, I usually run a 45 ms ping. After being hacked I was running over 100ms all the time. I knew I was the problem and not the server, because I was using CoD2 built-in lag-o-meter running at all times when I'm playing CoD2. More about the lag-o-meter at another time.

As soon as I realized this was happening I immediately shut down my modem.

Another way to tell you have been hacked, that is, attacked by worms, or viruses, is that:

  • Your hard-disk light is constantly blinking, even though your computer is not running any program.
  • Your computer is running perceptibly slowly and it just feels like it's chugging along real slow.
  • Your network upload/download lights (usually little computer icons on your toolbar) are on when you are connected to the internet but you aren't surfing, playing games or downloading files.
  • You have emails in your sent folder that you never authored!
If you have spyware on your machine other symptoms include:
  • Pop-up ads will come up when you aren't even on the internet
    Your web browser home page keeps changing even though you keep tyring to set it back to your original home page.
  • Your web browser has new toolbars that you did not install.
  • Your browser crashes a lot
  • Your computer takes much longer to start and runs really slowly.

Things you should do to prevent yourself from being hacked?

Leo Laporte, a celebrity technology expert, has a saying that to prevent yourself from being hacked, you should change your online behavior.

For example, Microsoft has been saying that Vista has become hack-resistant in comparison to XP, but the reality is that you could fall prey to hackers using Vista if you fail to change your behavior. Here's an example:

Kaspersky, a well known anti-virus company, claims that there are already ways around Vista security and compounding this, Vista nags the user so much during an online session that many people might turn off the security suite inside Vista leaving the computer vulnerable to attack. See : Microsoft partner: Vista less secure than XP.

In attempting to change internet user behavior, Laporte mentions this interesting fact, many security experts do not run anti-virus programs.

None.

They rely on a few simple ideas to keep them safe. Here are the basics:

1. PATCH MICROSOFT WINDOWS

Make sure you are running XP with Service Pack 2 installed.

Make sure you are applying all of the critical Microsoft patches. Usually, on the second Tuesday of the month, Microsoft releases its critical patches to fix flaws in its operating systems. It is vital that you apply these patches, for one, to prevent yourself from getting worms. It is doubly important that you make these patches if you hear about them on the news as this can be looked upon as an invitation to the black hat programmers out there that there is an Microsoft vulnerability that they can exploit.

Did you know that if you try to connect an unpatched XP computer to the internet you will get a worm on that machine in under one minute!

Windows should download these patches automatically, but if you suspect you are NOT getting patched and that Windows Update is not automatically doing this check the following:

  1. Open Control Panel
    Click Security Center.
    Select Automatic Updates.
  2. Select your preferred settings according to your needs and then click OK :
  3. Close Windows Security Center.
  4. Important: For first time turning on the Automatic Update feature, please visit Microsoft Windows Update web site to make sure you have all the latest updates available from Microsoft at that time. Automatic Update will only help you to download any future updates but not the existing one for your computer.
If this is not working, or you wish to do this step manually, try this:
  1. Start Internet Explorer.
  2. Select Windows Update under Tools menu and then follow the instructions.
  3. Install at least Critical Update and all the updates for Internet Explorer.
  4. Install other updates if necessary.
2. USE A HARDWARE FIREWALL

What we are talking about here is a separate device that guards the entrance to a network. Behind that network you can link any number of computers.
The wireless router is today's most popular device that can be used as a firewall. Most people buy routers for home use to take a single broadband internet account and spread it to at least two or more computers.

I have a wireless router at home. I've hooked it up by routing my cable broadband connection through the modem my cable company gave me and then through the wireless router. My main computer is then connected to the router using an ethernet cable. I also have a laptop and that can be used anywhere in the house, because after all, it's a wireless router and it will broadcast the connection to the net over radio frequencies that the laptop picks up.

Here is a picture of the back of a wireless router showing the ethernet connections you'll need to plug into. More details on the hook up of a wireless router in later blogs.
How does the router shield you from potential attacks?

A router will prevent unrequested communication from reaching your computer. Think of it as a one way valve. It lets data go out to the internet from your computer, but will not let data in - unless you have requested it. If you are trying to browse a website for example you will send out a request for data to be sent to you, a webpage for example. The router will let the webpage in because you requested it. However, if someone is trying to send you data (an unsolicited malware program for example) the data will be stopped because you never asked for it.


In addition, the router hides the internet address (IP address) of the computers and devices you have that are in behind it. In this way, the outside world doesn't even know you have a computer running. All the world sees is the IP address of the firewall - but it knows nothing about the computer you are on. The router does this automatically as a virtue of its primary function, to take a single IP address and share it amongst many devices. If you didn't have a router you would have to purchase as many internet accounts as you had computers. This way you only buy one account and share it amongst all the computers you have.

Any port in a storm


An important thing to note at this point is the concept of how your computer connects to the internet. When your computer talks to other computers on the net it does so by opening a "channel" or "port". This is a confusing term because in the old days we used to have things like printer ports which was a real connection from a computer to a device. A "port" in this context is a virtual thing. It doesn't exist in hardware. It's a software concept. There are 65536 possible channels or ports that a software program running on your computer can use to communicate to the internet. When a program needs to talk to other computers on the internet it will open a port to communicate. Unfortunately, badly written programs can leave these ports open and once opened can be used by malware to enter into your system. Hackers look for open ports in the hopes of exploiting their existence. This is extremely common on the internet and is known as "port scanning".

Some ports are reserved for your operating system, the others are used by your applications.

Cod2 for example uses the following ports:

Call of Duty (COD2) Port Range

Call of Duty CD Key Validation (UDP) Port 20500
Call of Duty Master Server Monitoring / Browser (UDP) 20510
Call of Duty Master (UDP) Port 28960


The status of any port can be one of 3 things: OPEN, CLOSED, or STEALTH.

A router, or hardware firewall, automatically will block * or close* any unwanted data coming to you on any port. In addition, you can configure your hardware to STEALTH any of your ports. That is, your ports are made invisible to the outside world. No one knows you are even there. That is how you want to configure your firewall.

There are many sites that will allow you to determine what others can see on your computer. These sites will test your ports and detect whether you have any vulnerabilities.

This is my favorite site (www.grc.com): SHIELDS UP


Click on proceed and then when the Shields up site pops up, scroll to "Shields UP services"and click on any of the buttons there to test out your protection.

This is what you should see if you click on the File Sharing button for example:


If it says anything else, you may be at risk. More about what you can do about this in a future article.

Routers thus are excellent protection against worms and can defend against hackers who can remotely install spyware on your computer.

However there is still a risk from viruses; that is, viruses that can cross the firewall. Once they cross they can infect all the machines on your side of that wall.

One way for them to cross is for you to download executable programs (those with suffixes that end in *.exe for example) that have viruses. So be careful what you download.

Email is a typical way for viruses to cross the firewall because routers or firewalls allow email to cross over. If there are any attachments on those emails and you the user opens an infected attachment, whammo, you are infected - even though you had a firewall. Getting back to the changes you must make to your behavior, here are a few of the behavioral modifications you'll need to make:

3. EMAIL

Don't send or open email attachments except when you know for sure that they are safe - which is something very difficult to determine.

  • Don't trust the icons of attachment files. Worms often send executable files which have an icon resembling icons of picture, text or archive files - to fool the user.
  • Configure Windows to always show file extensions. This makes it more difficult to for a harmful file (such as an EXE or VBS) to masquerade as a harmless file (such as TXT or JPG).
  • Never open e-mail attachments with the file extensions VBS, SHS or PIF. These extensions are almost never used in normal attachments but they are frequently used by viruses and worms.
  • Never open attachments with double file extensions such as NAME.BMP.EXE or NAME.TXT.VBS.
  • When you receive e-mail advertisements or other unsolicited e-mail, do not open attachments in them or follow web links quoted in them. In fact it's best to turn off the HTML scripting in email.

4. SURFING

Be careful when you surf the net. If you tend to surf randomly, and most of us do, make sure you run anti-virus software. Don't download programs and run them unless you know they are safe.

  • Don't accept attachments from strangers in online chat systems such as IRC, ICQ, XFIRE, Ventrilo, Teamspeak or MSN Messenger.
  • Avoid downloading files from public newsgroups (Usenet news) or peer-to-peer services (Limewire). These are often used by virus writers to distribute their new viruses.
  • Do not share your folders with other users unless necessary. If you do, make sure you do not share your full drive or your Windows directory.
  • Disconnect your network or modem cable when you're not using your computer - or just power it down.