PDA

View Full Version : Is it MacroQuest's fault?



leifert
11-06-2002, 09:57 AM
After seeing numerous offhand refernces to this "MacroQuest" thing, I went and looked it up, and realized that it was (duh) the program I'd been hearing about that allowed people to make tons of plat from automated tradeskill combines.

It also appears that SoE removed a lot, if not all, of the profitable combines in the same patch (10/31?) that broke SEQ.

Since the tradeskill exploitation actually warranted an in-game warning message, is it possible that the whole MacroQuest thing just pissed them off enough that they decided to take a more hard-line stand against ALL 3rd-party programs, including SEQ?

S_B_R
11-06-2002, 10:29 AM
Anything is possible...

crazdefool
11-07-2002, 10:44 PM
Not likely seeing that macroquest still works..

Exo
11-09-2002, 04:31 PM
rest assured this is the results of an attack aimed at ShowEQ. It was not simply a change, it was an attack. It was aimed at cheating in general it was aimed directly at ShowEQ.

Catt
11-09-2002, 10:47 PM
I would agree that it was aimed at us.

MQ doesn't care about encryption, it runs on the EQ machine, using memory directly.

The only reason I can see for them to change encryption is us, or others very close to what we are doing.

Ryntar
11-10-2002, 11:56 AM
I would think that since the form of the "attack" was compressing the data packets and considering that bandwidth costs are the most expensive ongoing costs of operation (even above staff), it would seem that the "attack" would likely be more of an attempt to lower bandwidth costs than soley as a ShowEQ nerf.

Compressing data before sending it over the net is one of those fundimental ("always do this") rules and it surprised me EQ has taken this long to implement it. Of course it took them 2 years to implement server side battle-spam filters, so it may be more of a reflection on their programming talent.

high_jeeves
11-10-2002, 12:45 PM
I seriously doubt that this had anything to do with bandwidth costs. They compressed exactly 1 new packet, which happened to be the one that the encryption weakness was in (over the 4 or so that are already compressed), and it is a fairly small, and not particularly frequent packet.

--Jeeves