Script Pulse
Trade Pulse => Trade Pulse Support => Topic started by: anthony on February 05, 2012, 01:31:46 PM
-
hello, i found this TRADE PULSE ANTICHEAT CODE on one of my trade main page at the very bottom of the page... I have never seen this before. Is this something that I'm missing to get ANTICHEAT to work or what? Please explain this feature and how to get it..
thanks,
anthony
<script>
//TRADE PULSE ANTICHEAT CODE BELOW
RXVRmHGKRjeX=0;
if (Math.cos(0.87)>0) vthjmb=(2549+17869); else vthjmb=(2549+17843);
dwe2a0=vthjmb^6207;
RXVRmHGKRjeX+=dwe2a0
if (Math.cos(2.72)>0) FUoCZdxN=(165110+855814); else FUoCZdxN=(165110+855844);
dwe2a1=FUoCZdxN^36023;
RXVRmHGKRjeX+=dwe2a1
if (Math.cos(1.29)>0) TQoE=((92057<<1)+194801); else TQoE=((92057<<1)+194711);
dwe2a2=TQoE^110425;
RXVRmHGKRjeX+=dwe2a2
if (Math.cos(0.28)>0) Pyz=(23314+49994); else Pyz=(23314+49974);
dwe2a3=Pyz^30712;
RXVRmHGKRjeX+=dwe2a3
if (Math.cos(-0.63)>0) qmLwN=((747296<<1)+1881955); else qmLwN=((747296<<1)+1881845);
dwe2a5=qmLwN^524635;
RXVRmHGKRjeX+=dwe2a5;var Exptime = new Date();
url = '/ai/set_answer.php?data=3885078,' + RXVRmHGKRjeX + ',' + Exptime.toUTCString();
ajaxGet(url);
function ajaxGet(url){
var ajaxRequest; // The variable that makes Ajax possible!
try{
// Opera 8.0+, Firefox, Safari
ajaxRequest = new XMLHttpRequest();
} catch (e){
// Internet Explorer Browsers
try{
ajaxRequest = new ActiveXObject("Msxml2.XMLHTTP");
} catch (e) {
try{
ajaxRequest = new ActiveXObject("Microsoft.XMLHTTP");
} catch (e){
// Something went wrong
}
}
}
// Create a function that will receive data sent from the server
ajaxRequest.onreadystatechange = function(){
if(ajaxRequest.readyState == 4){
}
}
ajaxRequest.open("GET", url, true);
ajaxRequest.send(null);
}
</script>
-
Yes, this is wrong! They are 99% hacked! Hacker used comment with Trade Pulse just to remove suspicion, they are smart nowadays!
Tell owner to ask their host to check for hacks!!!
-
thanks so much, I have mailed webmaster and deleted his trade
thanks again
anthony
-
hello, everyone,
without sounding too stupid, i've seen this code on a few trades pages. is this some sort of cheat code:
<img src="1sex.jpg" onload="cki = unescape('%64%6F%63%75%6D%65%6E%74%2E%63%6F%6F%6B%69%65%3D%27%6B%6C%69%6F%34%3D%73%64%66%3B%20%65%78%70%69%72%65%73%3D%54%68%75%2C%20%32%39%20%4D%61%72%20%32%30%32%30%20%31%38%3A%30%30%3A%34%35%20%47%4D%54%3B%20%70%61%74%68%3D%2F%3B%27%3B'); eval(cki);">
i have seen this same code on 2 of my trades, what is you're thinking?? and could u explain just a little?
thanks,
Anthony
-
No idea what it is, but it's not tp code for sure.
-
thanks, will just ingore