@
nasanu, wild guess at having some clue of @
FarSideX capabilities, hacking from early 80's and some years mental training on around millenium, I'm just wondering why using his skills on GT6
You are guessing correctly. As to why, long story. But in short I have not worked on games in a long, long time, I tinkered with COD for a bit mostly to give me something to do to brush up my OOP with. Most the stuff I have been doing has been with embedded systems. But the COD community is disgusting so I stopped.
I have always been a fan of the GT series, a friend stated that people had been trying unsuccessfully to hybrid for some time. I took a look and just over an hour later I had my first hybrid. So I guess it was because I a) needed something to keep up my OOP skills with b) boredom and c) a little urging from friends. If you know me (and it almost seems like you do) telling me something isn't possible is just motivation to prove that wrong.
I am surprised you remember the name from back then, I rarely bump into anyone any more from those days. Add to that people are using my name, so I tagged an 'X' on the end when OSX was first released.
And I am getting bored of it, PD better counter soon.
I am a little curious as to who are/were though. Did you know me personally or just through my work back then? You mentioned 2600 and later CCing, that wasn't something I did much of due to my location, other than making a tool for obtaining CCs by exploiting Compuserve's dial ups.
Edit: reread your post thought you meant 2600Hz not baud
I started with 110 baud, later the 300 baud Pocket Modem was so awesome we could push it to 450 reliably and 600 not so reliably.
One thing is for sure, you're no programmer.
Look, when I say few parts, I mean few parts for a program or database. It means not hundreds of thousands or millions. And the very reason you use a hash is to avoid large calculations. A hash is a long list of stuff reduced to a single number. If anything in that list changes the final number changes. It is perfect for checking car specs.
If you think there is a problem with it then I'd like to hear your explanation. What you have said so far is not valid and frankly does not make sense.
Is it a shame you feel attacking a person is a valid form of expressing your augments. Reminds me of my youth.
Keep saying parts over and over all you like, I get it, I know that is what you are thinking. But I am not referring to a number of parts, I was referring to the number of valid combinations of those parts. You do not seem to be grasping that important difference. And using a hash to check is only useful if the number of available hashes far exceeds the number of valid hashes. As I demonstrated the number of possible valid hashes far exceeds any usable sized hash.
Just because you can not understand the basis of someone's argument does not invalidate it.
The biggest factor in determining how long or how hard it would be is the way the file is structured. I can't be specific because I do not know that info and really have no desire to look into it.
I am a software designer and have did a bit of game programming in the past and I can assure you that given the correct file structure a test that could detect any modification beyond what is allowed in game would not take anywhere near a lifetime, not even the lifetime of a fly. more like a few seconds up to possibly a minute.
Again the file structure is the key as is how the file is used by the system. Assuming a good design that considered this type of problem in advance the test would be pretty fast and it would not have to do a complete test on all the cars. Of course no matter what is done there is always a possibility of hacking. From a programming POV you just have to make it difficult to do and then address hacks as they arise.
I believe having a single hacked car in your garage is valid grounds for not allowing your profile to play online at all. Of course ideally if you get rid of the hacked cars you should be allowed online again but if not then so be it.
There really is no place for using hacked cars online and no excuse for it
I think you are referring to doing a SQL lookup of the car's options and using parent tables to check for validity. No, the data is not arranged that way. It is an encrypted sqlite database but there are no tables linking the parts back to the possible cars, the relationship is one way. Adding the tables required is possible but would be a data size issue given the level of detail GT6 uses. It was probably a decision that had to be made at one point in development concerning size/speed vs security. Rebuilding the dbase to add that functionally on the server only (not clients due to size/speed) would be a far better solution than what the hash people are calling for but does not solve the issue that the client only sends what it wants to send to the server.