Forums » Suggestions
Incarnate, could you or raybondo tell us if the documentation on TCPSocket() is complete? Specifically I'm curious if there is supposed to be a method for identifying the local address. I noticed there is the method GetPeerName(), but that only identifies the address of the remote end.
Inc, if I do not have your blessing I will certainly discontinue my work. However, please allow me to alleviate some of your concerns with a real life example; the distress call and response system.
Lets say you’re flying along and you spot enemy targets in your sector... the plugin allows you to push a bound key and announce this fact over guild chat. Its really no different than manually typing out “hey guys theres enemy here.”
Other instances of the plugin can interpret this message, and because the sector location is already included in the guild chat event, they are given the option to automatically set their nav-route to the sector from which the announcement came.
All in all, its just one line of text that closely mimics a common manually entered phrase.
Is that kind of thing acceptable?
Lets say you’re flying along and you spot enemy targets in your sector... the plugin allows you to push a bound key and announce this fact over guild chat. Its really no different than manually typing out “hey guys theres enemy here.”
Other instances of the plugin can interpret this message, and because the sector location is already included in the guild chat event, they are given the option to automatically set their nav-route to the sector from which the announcement came.
All in all, its just one line of text that closely mimics a common manually entered phrase.
Is that kind of thing acceptable?
Yeah you're not pushing a bunch of data through the game client. That's no worse than using a chat message to synchronize torpedo launches.
"There's a difference between one person betraying you and you having to boot them out of the system and one person betraying you forcing you to change or replace the entire system."
That's easily accounted for. The most obvious way is to simply have the encryption key change daily, and if somebody betrays you, you remove them from the list of people who you send the key to and then change the key early.
That's easily accounted for. The most obvious way is to simply have the encryption key change daily, and if somebody betrays you, you remove them from the list of people who you send the key to and then change the key early.
99% of you people reading this already know this, but for the 1%....
A dedicated virtual server would not be required to do this. Any web hosting account that allows a scripting language like PHP could be the hub for this data. The calls through TCPsocket() in the plugin would just be structured to be web traffic and all kinds of standard stuff can be used. This can be done on a home computer during development and possibly after, depending on your needs.
A dedicated virtual server would not be required to do this. Any web hosting account that allows a scripting language like PHP could be the hub for this data. The calls through TCPsocket() in the plugin would just be structured to be web traffic and all kinds of standard stuff can be used. This can be done on a home computer during development and possibly after, depending on your needs.