Talk:DCC SEND exploit
This redirect does not require a rating on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||
|
The contents of the DCC SEND exploit page were merged into Direct Client-to-Client on 2007-12-27 and it now redirects there. For the contribution history and old versions of the merged article please see its history. |
Illegal hack
[edit]So an incredibly easy-to-use and still illegal hack is being displayed here? That's great. -Valdrone (talk) 20:34, 21 November 2007 (UTC)
I think its important that newbies know about this stuff. It hardly effects anyone any more - most users have updated their router firmware --84.70.199.89 (talk) 21:27, 24 November 2007 (UTC)
Update?
[edit]I was recently testing out this exploit (with the permission of the person being tested on, of course) to see what exactly matches. I found out that it's not "DCC SEND [character argument]
". In fact, the trigger is better described with the following regular expression:
DCC (SEND|CHAT) \S{5}.{9}
In other words, it must include "DCC" followed by a single space, then either "SEND" or "CHAT" followed by another space. Then, it must be followed by 5 non-space characters and then nine characters, which may or may not be spaces. Note that this text may appear anywhere in the line.—Iggy Koopa (talk) 00:44, 14 December 2007 (UTC)