• Content count

  • Joined

  • Last visited

Community Reputation

11 Good


About chain

  • Rank
    Founder Owner Administrator
  • Birthday 01/26/1962

Contact Methods

  • Website URL

Profile Information

  • Gender
  • Location
  • Interests
    scripting and chatting

Recent Profile Visitors

23,461 profile views
  1. By now, you might be familiar with Nintendo's Direct and Nindies Showcase streams, where the company highlights some of the games which are making their way to the Switch, with the latter of the two being focused on games from independent developers. Now, both Sony and Microsoft seem to be taking some inspiration from the Japanese rival, as both companies have announced their own streams dedicated to highlighting new and upcoming titles. Hot on the heels of this week's presentation from Nintendo, Microsoft has announced its own indie-focused presentation called ID@Xbox Game Pass. As you can probably infer from the name, this stream isn't just focused on indie games for Microsoft's console; it's specifically for those that are coming to Xbox Game Pass, the company's subscription service for games. It's also clearly a part of Microsoft's ID@Xbox program, which has been helping indie developers get their games on the platform for quite some time now. The first episode of ID@Xbox Game Pass will air on March 26 at 9AM Pacific Time, and it will focus on titles including Afterparty, Void Bastards, Supermarket Shriek, and more. Many of these were previously showcased at events like E3 or X018, so the presentation isn't as focused on new announcements as Nintendo's variant. Instead, it will offer more of a deep dive into those games, and it will also feature talks with the studios behind the games, including a visit to the studio behind Afterparty. Sony, on the other hand, is starting a more broad gaming series called State of Play, which will highlight upcoming titles for the PlayStation 4 and PlayStation VR. The company didn't reveal details about what will be in its own presentation, but it will be taking place on Monday, March 25, at 2PM Pacific Time. State of Play will be the stage for new trailer and gameplay footage, as well as announcements for new games, according to Sony. Nintendo has been using its Direct presentations - and with the Switch, variants such as the Nindies Showcase - since 2011, when it hosted the first stream dedicated to Nintendo 3DS software. After almost eight years, it's certainly interesting to see its rivals take a similar approach to game announcements.
  2. Microsoft keeps making more and more minor improvements to Skype in an attempt to win back the love of its users, who were unhappy with the release of Skype v8. Today, the messaging app is getting a couple of new additions to calls if you're an Insider, with the highlight being the ability to mute incoming audio from someone on a call. The new mute button is available both in group calls, so you can mute specific people, and one-on-one calls. Muting incoming audio might seem somewhat counter-intuitive when you're on a call, but there might be scenarios where it's a welcome temporary solution. The feature joins the ability to disable incoming video, which has been part of Skype for some time now. Another addition to calls is a "View Profile" option during calls, which, as you might have guessed, lets you view the profile of someone you're on a call with. This should make it easier to engage privately with someone you might be meeting for the first time on a group call. The two new features are available with this week's Insider update to the Skype apps on Windows. If you're using the desktop app, it'll be on version, and those using the Microsoft Store app will want to look for version Earlier this week, Microsoft added previews for files you're about to send.
  3. [ D-BoT Scripting ] 2.0

    Welcome to [ D-BoT Scripting ] 2.0 Hi there, long time no see! After being gone for a long time, [D-BoT] is back as an English bot and now supports the international versions (.com and .dm) next to the .nl version of Omerta. On this website you will find all the basic information about [D-BoT] you need, for example the commands, some handy information about IRC, some basic statistics of the game and information on how to contact us.
  4. Mass Popups

    Version 1.0.0


    Use the popups to do mass commands such as op/deop, help/dehelp, voice/devoice, kick/kickban/ban
  5. On *:connect manager

    Version 1.0.0


    This addon allows you to perform some basic actions on connect. Features included : - Nickserv Identification - Memoserv Listing - Joining certain channels (up to 8 #channels)
  6. NickServ Identifier v1.0

    Version 1.0.0


    The simplest NickServ identifier. It has the option of choosing the way you communicate with NickServ, using "/ns". or "/msg nickserv".
  7. Folks using healthcare-related Android apps: after you've handed over your private details to that software, do you know where it is sending your data? If you don't, nobody should blame you. It turns out it can be a complicated and obfuscated affair. So much so, eggheads probing the data-sharing practices of mobile health applications have urged software developers to be more transparent regarding how they're handling people's personal info, after observing all sorts of records being passed on to third parties. Parent companies, adverting networks, analytics platforms, data brokers, and more, are seemingly getting their hands on at least some part of the pile, directly or indirectly. And while the studied applications could well be above board, at least within their fine print and terms of use, and sharing data carefully and with consent, the lack of transparency and the large emission of information may deal a blow to any trust you may have in them. Furthermore, even if the information is anonymized prior to sharing, the data tends to flow through the usual few suspects – Google, Facebook, etc – which could, in theory, piece together the identity of individual netizens using these apps, seeing as they capture so many data points. Report Academics hailing from universities in Canada, Australia, and the US, together studied 24 popular Android health and medicine-related apps, and found that nearly 80 per cent were passing on at least some of their users' data to third parties. Their findings were published this week in the British Medical Journal. Check it out for the full details; we'll summarize them here. "Sharing of user data is routine, yet far from transparent," the group concluded in their paper. "Clinicians should be conscious of privacy risks in their own use of apps and, when recommending apps, explain the potential for loss of privacy as part of informed consent. Privacy regulation should emphasise the accountabilities of those who control and process user data. Developers should disclose all data sharing practices and allow users to choose precisely what data are shared and with whom." We're told that 38 per cent of the studied apps shared browser activities, such as medicines looked up and pharmacy websites visited, with third parties; the same again passed on users' email addresses; 25 per cent handed over the list of drugs people are taking; 21 per cent the users' first and last names; 17 per cent the users' medical conditions; and so on. These stats were produced by studying the network traffic of the applications, which range in install bases of 500 devices to 10 million and are among the top 100 most-used in their sector. "Although most (20/24, 83%) appeared free to download, 30% (6/20) of the 'free' apps offered in-app purchases, and 30% (6/20) contained advertising as identified in the Google Play store," the academics noted. "Of the for-profit companies (n=19), 13 had a Crunchbase profile (68%)."
  8. Facebook revealed to have stored the passwords of hundreds of millions of users in plain text, including passwords of Facebook Lite, Facebook, and Instagram users. “As part of a routine security review in January, we found that some user passwords were being stored in a readable format within our internal data storage systems.” reads the announcement published by Facebook. “This caught our attention because our login systems are designed to mask passwords using techniques that make them unreadable.” The disconcerting discovery was made in January by Facebook IT staff as part of a routine security review. The passwords were stored in plain text on internal data storage systems, this means that they were accessible only by employees. Facebook quickly fixed the issue and plans to notify the affected users. Facebook estimated that hundreds of millions of people using Facebook Lite, tens of millions of other Facebook users, and tens of thousands of Instagram users are impacted. “To be clear, these passwords were never visible to anyone outside of Facebook and we have found no evidence to date that anyone internally abused or improperly accessed them,” continues Facebook. “In the course of our review, we have been looking at the ways we store certain other categories of information — like access tokens — and have fixed problems as we’ve discovered them,” According to the popular investigator Brian Krebs that is investigating the incident, hundreds of millions of Facebook users had their account passwords stored in plain text and searchable by thousands of Facebook employees. Krebs date some cases back to 2012, anyway he did not find an indication that employees have abused access to this data. Krebs believes that the passwords of between 200 million and 600 million Facebook users may have been stored in plain text, and that over 20,000 Facebook employees may have been able to search those passwords. Krebs cited a senior Facebook employee, who is familiar with the investigation and who spoke on condition of anonymity, that revealed the company is currently investigating a series of incidents regarding employees who built applications that logged unencrypted password data for Facebook users and stored it in plain text on internal company servers.
  9. According to the media, 1600 motel guests between November 24 and March 2 were spied by the indicted individuals that now face up to five years in prison, as well as a ₩30 million fine along with a ₩10 million penalty for porn distribution. The group wireless micro IP cameras hidden in motel rooms at 30 motels in 10 cities in the North and South Gyeongsang and Chungcheong Provinces. The cameras with 1-millimeter lenses were planted in TV media boxes and power sockets. Image source: Yonhap News AgencyThe group transmitted the videos via a streaming website that was using servers abroad. According to the investigators the site had 4099 registered users, the gang sold 803 videos and earned $6,200. “The site had more than 4,000 members, 97 of whom paid a $44.95 monthly fee to access extra features, such as the ability to replay certain live streams. Between November 2018 and this month, police said, the service brought in upward of $6,000.” reported the CNN. The South Korean authorities confirmed that other similar cases have happened in the past. “There was a similar case in the past where illegal cameras were (secretly installed) and were consistently and secretly watched, but this is the first time the police caught where videos were broadcast live on the internet,” police said. South Korea authorities confirmed that spy-cam sites and revenge porn are common crimes in the country, as reported in a press release published by the Copyright Protection Division of South Korea’s Ministry of Culture, Sports and Tourism. “The police agency strictly deals with criminals who post and share illegal videos as they severely harm human dignity,” reads a statement issued by the Seoul Metropolitan Police Agency. It is quite easy to buy spy cam detectors in South Korea, The KoreaTimes revealed that the sales of these devices have a spike in March 2019 after media reported the case of a South Korean singer who secretly recorded videos of his partners and shared them with friends. In September 2018, the South Korean government carried out a campaign that led to the inspection of thousands of public toilets for hidden cams The fight against this kind of crime included doubled prison sentences for people involved in such kind of illegal activities.
  10. About Our Site

    Well it's great being back and doing IRC stuff and mIRC  To begin we are a scripting site but more on the IRC Networks compared to our long time partnership with Tg007We base more on IRC scripting & Networking, we have various scripts in many languages form Greek,Italian,Russian,German .... & the list goes on. We also base a few scripts on popular chat Networks but we limit it.  Buzzen ChatSpcn Chat Those are mainly the ones we deal with and are the most popular ones.I have decided to continue with the website as i see more and more IRC sites have been closed. It's been missed & happy to be among friends again which made chainscriptz what it is today. Thanks to All for the great supportEspicially err0r good friend of Wes & Mine
  11. The FBI’s crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found. The average size of distributed denial of service (DDoS) attacks decreased significantly, dropping by 85 percent in the fourth quarter of 2018. Researchers with NexusGuard said in a Tuesday report shared with Threatpost, that the number of DDoS attacks also dipped significantly, sinking by almost 11 percent in the fourth quarter of 2018. These decreases stem from a recent FBI December crackdown on DDoS for hire services, researchers said, which led the Justice Department to take offline 15 DDoS-for-hire internet domains. “The decrease was largely attributed to the FBI’s successful takedown of 15 large ‘Booter’ websites that were alleged to be responsible for having generating more than 200,000 DDoS attacks since 2014,” researchers said in their report. “The FBI’s highly effective crackdown not only suppressed the number of total attacks YoY, but also the average and maximum attack sizes, decreasing both by 85.36 percent and 23.91 percent, respectively.”
  12. Here’s the current round-up of nine scams in the news… Although these scams are occurring in specific places, each of them can happen anywhere (so you aren’t safe just because you don’t live in Sioux Falls, SD, or New Zealand, etc.) And, just because a scam is on CraigsList, doesn’t mean it can’t — or won’t — happen on other sites. 1. Say No to *72 The scam: A terrible phone call to a Sioux Falls, SD, man tells him of a death in the family, asks him to call another number for details and to begin his cell phone call with the code *72. What this actually does is transfer all calls sent to the cell phone to the number the caller has given — the scammer’s own number. The scammer then gives your number to his buddies anywhere in the world and they can phone him via your cell, with you picking up the charges — and knowing nothing about it — until you get your bill. The solution: Don’t use the *72 or any other forwarding code to forward calls to a number you don’t know or recognize. You can enter *73 to clear call forwarding. (We’re not sure if *72 and *73 are the forwarding codes for all cell phones. Check your cell phone manual or talk to your carrier.)
  13. Users tried to upload 1.5 million copies afterwards, but most were blocked. Facebook says a total of 4,000 people viewed the New Zealand mosque shooter's livestream before it was taken down. Less than 200 people were watching during the assailant's live broadcast, according to the social network, none of who reported it. Facebook says the first user report came in 29 minutes after the 17-minute live video started, which was 12 minutes after the livestream ended. The stats form part of Facebook's latest updatedetailing its ongoing response to the sharing of NZ shooting posts. They reveal the small scale reach of the original broadcast but, as we now, that ultimately didn't stop it from being widely circulated around the web. In the wake of the livestream, a version of the video surfaced on YouTubeevery second over the weekend. It was also shared to Reddit forums such as "r/watchpeopledie" and "r/Gore," both of which have since been banned. And Facebook itself scrambled to pull down 1.5 million videos of the incident in the first 24 hours. Meanwhile, New Zealand ISPs including Vodafone, Spark and Vocus were forced to block access at the DNS level to websites that didn't respond to takedown requests. Together they cut off controversial messageboards such as 4chan and 8chan (where the shooter was a member and, according to Facebook he shared a link to a copy of the video hosted on a file-sharing site). Worse still, mainstream media like The Daily Mail and Sky News Australia ran excerpts from the shooter's Facebook livestream, forcing Sky New Zealand to pull the latter off air. As usual, Facebook has been transparent in its response. But it's facing a chorus of condemnation from lawmakers worldwide, who've grown tired of its meek attempts at self-regulation. Germany has already set penalties for social media sites that fail to swiftly remove harmful content and the UK is following suit. Though Facebook is pumping more money and manpower into its moderation systems, this latest failure will only result in more scrutiny of its reviews process.
  14. The eight-episode choose-your-own-adventure show drops April 10th. Netflix is wasting no time capitalizing on the success of its choose-your-own-adventure experiment with Black Mirror: Bandersnatch. The company announced today that it already has another user-controlled experience in the works that will put viewers in control of a Bear Grylls adventure. The eight episode series, called You vs. Wild, will be available to stream starting April 10th.
  15. Hi there :] In this tutorial, I will try to explain how to to make some dialog "animations", but before that, some basic info : #1 - This tutorial is (obviously) in *.html format, 'cause of it's many advantages. #2 - All code is placed inside <textarea> tags, and is READONLY, so you don't have to worry about accidental overwrite of the code. #3 - All code will automaticaly do the Select All part when clicking on it, so all you have to do is do the Copy (Ctrl+C) part. First step is to make a dialog (we need one if we are planning to animate it :P). So let's do it. For our needs we will make one that has the same width and height (it's easier to understand that way, we'll do the rectangular ones too later). So, here's the dialog code : (Danim like Dialog animation :P) OK, now that we've wrote our dialog and saw that it's good (no ID conflict, nice layout, good functionality...) there is one little thing to do before moving on. Change the size -1 -1 100 100into size -1 -1 1 1. It will be explained later why. Now, we have to write the basic alias for calling out dialog. Normaly, I would do it this way : This is actualy pretty good way for calling dialogs, cause this way you are avoiding the * /dialog: 'Danim' name in use error if dialog with that name already exists (it is done with if ($dialog(Danim)) part of code). But, our alias will look like this : You must be asking yourself why in heavens name would I close and reopen dialog if it exists, instead of just bringing it to front/restoring it. It can be done that way, but this way whenever dialog is called, it will animate ;] (this is just for tutorial purposes, I wouldn't do it that way for script. Too much animations can be quite anoying). And now, the very essence. The actual animation code. Notice the while (%i <= 100) line, the number 100 is the height and width of our dialog, so "%i" variable depends from your dialog dimensions. Anyway, what do we do here ?? We are using a "while loop", and "dialog -s". Cause I'm not the mIRC help file, nor is this tutorial, I will not explain each command separately, you will have to do that yourself :] Anyway, basicaly, I'm increasing the value of %i from 0 to 100, thus increasing the width and height of my dialog from 0 to 100, meaning that I'm animating it. The parameters -srb are for Size, Center dialog and DBU (dialog base units) in that order. The aditional : var %t 1 while (%t <= 80) inc %t is here just to slow down the first while loop, cause without it, it just runs so fast that you can hardly notice anything. You can change the value of 80, to find out which speed suits your needs. So, let's see how it works. copy/paste the Danim and alias and dialog code into empty script file, then add this : and save file as eg. danim.mrc (the name of $script I will be using from now on, you may choose another one). Now type "/danim" (without quotes), and POOF ! Magic ?? No, basic logic and scripting knowledge ;] Why the timer ?? Why shouldn't we just put the alias into the On Init event ?? Because my mIRC is acting quite strange now, and it won't accept it that way, but if I do it with timer, it works :P (you feel free to experiment) And now is the right time to explain why we changed the size of our dialog to 1 x 1. Well, if we left the size 100 x 100, the dialog would first flash in it's full size, and then dissapeared to nothing and started to grow (animate). This way we avoided that ;] (users just love to find a bug in a script... so let's don't give 'em that pleasure). Well, this would be the end of the first part of this tutorial. Here we explained how to do the On Init animation. Now, it's time for some neat tricks ;] Trick 1 : animate the titlebar of your dialog Hey, while we're here, let's animate the dialog titlebar also. It will take longer for the actual dialog to appear, but it looks nice :] So, here it is : OK, for those who don't understand how this exactly works, here's a brief explanation. First we need to find how long is our titlebar text. We can always count character by character, or we can do the : //echo -a lenght is $len(Animate your dialogzz ;]) We see that it has 24 characters. Thats the value in our first while loop. Dialog -t command changes the titlebar. So, what we're doing is next : We're "writing" the titlebar text letter by letter, from left to right, using $left() identifier. (for more help, read mIRC Help, "Text and Number Identifiers"). The second loop, the one with the %t var is here again just to slow down the first one. Now paste the dan.tbar alias into your danim.mrc and change the alias into : and type "/danim". See what I mean ?? :D The titlebar animation will occure when (not before) the dialog animation is finished. That is achieved by placing the .timer -m 1 1 dan.tbar line AFTER the dialog animation code. This way, users can see everything, first the dialog, and then the titlebar animation. Trick 2 : animate the closing of dialog While we're here, we can also make the dialog closing more nicer by adding another animation. This time we're doing the growing animation reverse way, meaning that we're decreasing the size from 100 x 100 to 1 x 1, and finaly closing it. Here's the code See what I mean ?? Nothing hard, just playing with with basic dialog commands. And all that is left is to add the sclick events and thats it :D Place this into your danim.mrc : So, the full script file used for this example should look like this : Or, you can download the Danim.mrc here (right click, Save Target As). Don't you just love mIRC scripting ??!? With a little of imagination and effort, you can do bunch of stuff.. And now, as promised, the code for dialogs that don't have the same height/width : Basicaly, this one first does the animation stretching the dialog horizontaly, and then verticaly. For example, if we have a dialog called MyDialog that is 80 x 40, and we want to animate it, the code will look like this : All in all, you can just experiment with while's and %var's. And it's fun to do it, cause you can make nice stuff that way. Dialog animation can be a nice touch to even a mediocre script, but don't get carried away. I know I would hate to wait like a whole minute just to see a dialog for some basic script. Make your animations nice and fast ;] have fun :D Changes : 1. Added some info about tutorial. 2. Changed the color pallete (replaced colored with bold text). 3. Added example for rectangular dialog with dimensions. 4. Added "versions info". 5. Explained some parts better 6. Placed code in readonly <textarea> tags. 7. Made the code auto Select All 8. Remade in light/dark gray color pallete, to match the rest of site.