![]() |
actually at the moment it doesn't work for many people and there already are several threads about this, so this isn't a one man's issue. altough, I admit that announcements aren't meant for such posts.
but hey, he said "sorry", didn't he? |
Ok i am from US. And i was playing. IF you were ingame already since last night you should still be on. But i got a buffer overrun(DAMN U SPAMMERS) i get the same issue as eveyrone else. SO only the people who were on less than 12hrs ago can play.
|
my folder was under a folder called builds not local settings, but the folders were empty. Try looking for that and see if it helps you. I'm from Orlando, FL as well so maybe its a Florida thing?
|
What is a buffer overrun?
|
its a pop up window thats says you have had a buffer over run the files are curropt and it kicks you off the game. I get it when I'm in a town and have the normal chat on and can see all the spam.
|
yup lol, so has ANYONE been able to talk to a csr, gm or anyone about this?
|
I hope all this is the new patch for December let us hope :)
|
Quote:
|
WHY WONT THE SITE WORK:eek:
|
This article is about buffer overflows in the general case. For stack-based buffer overflows, see Stack buffer overflow.
In computer security and programming, a buffer overflow, or buffer overrun, is a programming error which may result in a memory access exception and program termination, or in the event of the user being malicious, a possible breach of system security. A buffer overflow is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed-length buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include other buffers, variables and program flow data and may cause a process to crash or produce incorrect results. They can be triggered by inputs specifically designed to execute malicious code or to make the program operate in an unintended way. As such, buffer overflows cause many software vulnerabilities and form the basis of many exploits. Sufficient bounds checking by either the programmer, the compiler or the runtime can prevent buffer overflows. |
All times are GMT. The time now is 11:59 PM. |
Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.