Global Operations (+2 Trainer)

Global Operations (+2 Trainer)

Global Operations (+2 Trainer)

Text file description:

            Ferrex                         MYTH
               MYTH IS PROUD TO PRESENT :
                           Global Operations Trainer +2
       SUPPLIED BY : MYTH TEAM        RELEASE SIZE : 1 * 2.88MB
       PROTECTION  :                  RELEASE DATE : 04/2002
              [ RELEASE NOTES ]
    ALWAYS READ THIS NFO PROPERLY!
    Trainer Notes:
    ~~~~~~~~~~~~~~
    1. God-mode. FOR USE THIS YOUR INGAME CALLSIGN MUST BE EXACTLY
       'Cheater' WITHOUT QUOTES. CASE SENSETIVE! DOESN'T WORK ON FALLING
       DAMAGE! DOESN'T WORK ON NEUTRAL FIRE (BIG EXPLOSIONS, AIRSTRIKE
       ETC..)! DOESN'T WORK IN THE MULTIPLAYER!
    2. +20000 cash on primary, secondary or sidearm weapon purchase. Just
       buy/sell some times for get a lot of cash. DOESN'T WORK IN THE
       MULTIPLAYER!
    Trainer goes ON automaticaly.
                [ INSTALL NOTES ]
    1) Unrar to gamedir.
    2) Start trainer.
    3) Start game.
              [ NEWS + APPLICATION iNFO ]
    You think you can contribute to the scene too? You have one or more
    talents in:
    - supplying NEW unreleased games (maybe you work at a game/util
      magazine, courier delivery firm, newspaper, game press/marketing
      company, distributor, publisher, duplicator, tv/radio show, shop,
      warehouse, store etc.) You do not need a fast internet connection
      for the above!
    - supplying unreleased NEW store/shop games & have a fast UPLOAD
      300k+ internet connection and time to spare on weekday mornings.
      Of course we shall reimburse you for the costs of the games you
      buy.
    - you are a coder with lots of experience in Debugging/ASM & C/C++.
      You also can code your OWN tools to automatically remove
      commercial iso protections like the latest versions of any of the
      following: SafeDisc or Securom or TAGES or VOB or Laserlok or
      Copylok. Using tools created by others does NOT count and we
      check! You will also need advanced knowledge of PE File Formats.
    - you are a Unix guru with good Ansi-C software developing knowledge
      and understanding how to prevent network security vulnerabilities.
      That means you must be able to code to ansi-c guru level. And you
      must also have a good coder perspective of hostbase and network
      based intrusion detection systems. You should be able to code tools
      to generically prevent stack and heap buffer overflows on unix in
      Ansi-C. And Be able to code tools to look after a group of systems
      and code sniffing avoidance tools. And you can configure a system
      in ways to prevent packet sniffers and "man in the middle" attacks.
      No window's lamers ;p
    - supplying linux/BSD eggdrop/bnc shells to the group (for free).
      They should have 2mbit MINIMUM link. We shall require flexible
      control over the shell. Root access on the box with dynamic
      ident such as midentd for bncs, but just normal shell accounts
      are fine for eggdrop shells. All boxes must have legitimate
      IP's, they should not be running NAT or a firewalling system
      that will constantly interfere with the link. Ideal shells will
      have multiple vhosts, reasonably good uptime (20+ days), and a
      low system load. Public shells such as JEAH.NET or similar with
      25+ load averages and 3 day uptimes are not acceptable. The more
      reverse ips you have the better. We are only interested in LEGIT,
      NON-HACKED/CARDED shells. These shells will be used only for the
      purposes listed above and will NOT be used for any kind of
      'dump site' or for spreading any kind of releases. We are NOT
      interested in modem, cable, or DSL shells. The shells should be
      up 24/7 with minimum downtime for upgrades, etc and should not be
      overloaded with processes.
    - If you know the difference between reindexing and unpacking
      large files. Or if you can identify ANY major file formats by
      looking at the hex byte code of the header. Or if you can tell
      and show the difference between MPQ & HAPI.
      And can code your own tools to rip apart the above technologies
      (to show you fully understand them) then apply at once.
    - making trainers for newly released games (menu driven, must work
      in Win9x and Win2K/WinXP).
    If you can meet one or more of those requirements and want to join
    the finest active group in the scene today, e-mail us.
    Use the contact information given below.
    And always remember: we do this just for FUN. We are against any
    profit or commercialisation of piracy. In fact, we BUY all our
    own games with our own money, as we love game originals.
    And if you like this game, BUY it. We did!
                 [ RELEASE COMMENT ]
                                 " Enjoy! "
                    [ CONTACT ]
           READ BELOW FIRST OR YOU WILL BE IGNORED!
         MYTH DOES NOT PASSWORD FILES, OTHERS DO THAT!
         MYTH DOES NOT MAIL/SEND/PASSWORD MISSING FILES!
         MYTH DOES NOT PUBLISH FILES ON WEB SITES, NEVER!
         MYTH DOES NOT USE IRC TO PUBLISH FILES, NEVER!
         MYTH DOES NOT DO TECHNICAL SUPPORT, NEVER EVER!
         MYTH DOES NOT HAVE, WANT OR NEED ANY WEB SITES!
         MYTH DOES NOT GIVE OUT ANY LINKS OR FILENAMES!
         WWW  : NEVER (WE DON'T USE WEB & WE DON'T WANT ONE
         MAIL : GODS@MYTHELITE.COM (READ NOTES ABOVE)
       NFO LAYOUT + HEADER BY FERREX OF SUPERIOR ART CREATIONS
                              [ UPDATED ]
                          [ ON 14/DEC/2001 ]
       Support the software companies. If you play this game, BUY it!
           . .. ..,. D . E . E . P  .  I . M . P . A . C . T ... .. .     
                     CORE HQ; DEVINE HQ; PARADOX HQ; RAiD HQ
                             CORE PDA HQ ; BLZ PDA HQ
                                 GDS HQ;pHASE HQ
         .stSSs.
        '  `Ss.               .sS;.        .sS;.
            ;,           ,S,     S,
           a,         ,,  ,,
          aJ' `         J' `  J' `
          sF   .         F   .  F    
           L .y         )L .y  L.    I
           .'         ,'    ,.
        .2.      .Y`   ..2.
       2,    '`        S '2,
      ;J' `2   ;J'           ;S'  ;2,
     ;F   .; ;F   .,       ;S, .s;
     L .y; L .sS.      
     ?  .     ?
     '  .     '
      ;'    .    ';'
       `Y'       `J,     Y'
          `''`             `''`        `''`
                         B i T S . P E R . S E C O N D
This File Passed Through...
 The Desert Inn           The Desert Inn
              roy
                              <sac>

File information

Trainers are memory resident programs that alter the behaviour of a game.

Your anti-virus software and web browser may detect them as malware (viruses, worms, trojans, bots etc.).

This is almost always a false alarm.

File name: GLOBAL.OPERATIONS.PLUS2.MYTH.ZIP

File size: 56.7 KB

Mime type: application/x-dosexec; charset=binary compressed-encoding=application/zip; charset=binary

Trainer FAQ