Show Categories
1.8k
0
misiu posted Jan 15 '20 at 4:39 pm

Global tibia server download in version 12.x.

1st open source server with Protocol 12!

Protocol 12! Golden Outfit

Map Features
Secret Library
Mota Extension
New Asuras
Falcon Bastion
Warzones 4, 5, 6
Cults of Tibia
First Dragon
Darashia Elite Dungeon
New Asuras
Cursed Spreads (Full Grimvale)
New Deathlings

Extra Features
New Depot
New Spawn
New Npc System via Bank Balance
New Critical Boost System
New Potions

New Features Source / Lua
New Actions .lua
New Monsters .lua
New onDropLoot .lua
New onRemoveCount Source
New Talkactions .lua
New QuestLog .lua
New Weapons .lua

Security Features (Source)
Exhausted onLooks
Exhausted Speaks (playerYell and playerSpeakTo)
Exhausted playerMarketOffers

Datapack Features
Exhausted in all actions
(In Progress)
Exhausted in conversations with npc's.
And others.



OTS Pack Download

https://shortenx.com/w3SV

Client 12 Downloads

https://shortenx.com/3d00
Note: To connect with client 12 (localhost), go to 127.0.0.1_client.exe which is in the bin folder.

How to run client 12

https://forums.otserv.com.br/index.php?/forums/topic/167611-cliente-tibia-1112-com-hexeditorxvi32/
or
https://forums.otserv.com.br/index.php?/forums/topic/168716-editor-rsa-e-webservice-url-cliente-tibia-11-cliente-tibia-12/


46
0

Twisto: 100 zł premii na start za samą rejestrację oraz wyrobienie darmowej karty wielowalutowej!

Szybka rejestracja, bez dokumentów i zaświadczeń o dochodach. Twisto to tak jakby darmowy kredyt odnawialny z mozliwością odroczenia spłaty.

  • Darmowa karta wielowalutowa
  • Darmowy limit kredytowy, do 45 dni na spłatę z możliwością przedłużenia spłaty
  • Na sam start po rejestracji dostajesz 50zł
  • Przewalutowania po kursach rzeczywistych
  • Twisto nie wymaga jakichkolwiek zaświadczeń, czy też sprawdzania w BIK S.A.
  • Limity przyznawane są na oświadczenie, zaś Twisto nie wymaga wysyłania skanu/zdjęcia dowodu osobistego
  • Program poleceń znajomym w ramach którego obie strony dostają po 50zł premii

Jeśli przejdziemy proces rejestracji to obiecana premia zostanie przypisana do naszego konta, a w ciągu 5 dni powinna do nas dotrzeć sama karta płatnicza.

Zanim jeszcze dojdzie karta można wydać przyznane 100 zł, możemy skorzystać z metody płatności Twisto Pay, która dostępna jest w niektórych sklepach internetowych. Jak z niej skorzystać? W sklepie internetowym wystarczy wybrać Twisto Pay jako metodę płatności, a wpisując dane zamówienia użyć tego samego adresu e-mail co do logowania do Twisto. Po zakończeniu zakupu w sklepie zamówienie zostanie dodane na koncie Twisto.

Najpopularniejsze sklepy, z obsługą Twisto Pay to Diverse, Tania Ksiażka, Born2Be, eZebra, Szopi.

Twisto to nie bank, ale tak zwany fintech – firma zajmująca się szeroko rozumianymi innowacjami technologicznymi w świecie finansów. W ostatnim czasie podmiotów tego typu pojawia się na rynku całkiem sporo, a że oferują różnego rodzaju premie na start.

Pamiętajmy jednak, że fintechy to nieco inna liga niż banki. Z jednej strony mogą one działać znacznie sprawniej: nie mają na głowie tylu przepisów, nie zatrudniają takiej ilości osób, a że tworzą produkt od podstaw, to ich koszty działania są zazwyczaj znacząco niższe. Oznacza to, że mogą oferować bardziej atrakcyjne produkty, ale równocześnie – że nie mają takiego budżetu marketingowego – w związku z tym musimy zapomnieć o premii na start w wysokości kilkuset złotych, a raczej zadowolić się kwotą od kilkunastu do około stu złotych. Z drugiej strony warunki jej zdobycia są zazwyczaj niesamowicie proste.

Rejestracja Twisto

457
0
Administrator1511831957 posted Oct 10 '19 at 10:53 pm

Problems with Remere's Map Editor

So for ease of research, I will put some common RME errors and their solution in this topic along with a simple mapping introduction tutorial, to make searching and solutions easy, all together in one topic.

troubleshooting:

Could not locate tibia.dat and / or tibia.spr, please navigate to your tibia insalation folder.

  • To solve this problem, open your RME, go to preferences and uncheck the "Check file singatures" box. If the error continues, download the tibia version corresponding to your map (if you want to open a 8.6 server, download tibia 8.6) copy and paste tibia.dat and tibia.spr to your RME destination.

Invalid Items (gets one red floor, or certain item sprite from another)

  • To solve the problem, copy items.otb from your server (data / items) and paste it into the RME folder that contains your server version.

    If you can't find the RME folder, open execute (windows + r) and type% appdata% and enter.

Lag in the RME

  • Often inevitable and caused by the machine itself. Something that may help is to "clear" the screen, so in the "view" tab uncheck things like: Ghost higer floor Show shades Show Spawns (if necessary turn it on and off) Gird show or any other show that may be disabled at the time of editing.

Rme stop working

  • The rme stop working out of nowhere can be caused by several things so i will cite solutions by topic. Disable your anti-virus. Upgrade Your Visual Studio and DirectX Search for invalid items on map and remove them See if you are using a compatible version.
61
0

Get free SSL certificate by enabling encrypted HTTPS on web servers. In this tutorial, you will use Certbot to get a free SSL certificate for Nginx on Ubuntu 16.04 and set your certificate to renew automatically.

All I script is the command you will use on the ubuntu connection terminal.

Step 1 - Installing Certbot:

sudo add-apt-repository ppa: certbot / certbot

You will need to press ENTER to accept. Then update the package list to get the package information from the new repository:

sudo apt-get update

And finally, install the Certbot Nginx package:

sudo apt-get install python-certbot-nginx

Certbot is now ready for use, but in order for it to configure SSL for Nginx, we need to check some of the Nginx settings.

Step 2 - Configuring Nginx:

Certbot can automatically configure SSL for Nginx, but it needs to be able to find the correct server block in your configuration. It does this by looking for a server_name directive that matches the domain for which you are requesting a certificate.

If you are starting with a new installation of Nginx, you can update the default configuration file. Open it with your favorite text editor at / etc / nginx / sites-available / default and find the existing servername line and replace the underscore with your domain name.

Save the file and exit its editor. Reload Nginx to load the new configuration.

sudo systemctl reload nginx

Certbot can now find the correct server block and update it. We will then update our firewall to allow HTTPS traffic.

Step 3 - Enabling HTTPS Through the Firewall:

To additionally allow HTTPS traffic, we can allow the Nginx Full profile and then exclude the redundant Nginx HTTP profile tolerance:

sudo ufw allow 'Nginx Full'
sudo ufw delete allow 'Nginx HTTP'

To check your status use:

sudo ufw status

Your status should look like this now:

Output
Status: active

To Action From


OpenSSH ALLOW Anywhere
Nginx Full ALLOW Anywhere
OpenSSH (v6) ALLOW Anywhere (v6)
Nginx Full (v6) ALLOW Anywhere (v6)
We are now ready to run Certbot and fetch our certificates.

Report post
Posted March 24, 2018 (edited)
Hello everyone, today I will teach you how to make your website more secure by getting a free SSL certificate by enabling encrypted HTTPS on web servers. In this tutorial, you will use Certbot to get a free SSL certificate for Nginx on Ubuntu 16.04 and set your certificate to renew automatically.

All I script is the command you will use on the ubuntu connection terminal.

Step 1 - Installing Certbot:

sudo add-apt-repository ppa: certbot / certbot
You will need to press ENTER to accept. Then update the package list to get the package information from the new repository:

sudo apt-get update
And finally, install the Certbot Nginx package:

sudo apt-get install python-certbot-nginx
Certbot is now ready for use, but in order for it to configure SSL for Nginx, we need to check some of the Nginx settings.

Step 2 - Configuring Nginx:

Certbot can automatically configure SSL for Nginx, but it needs to be able to find the correct server block in your configuration. It does this by looking for a servername directive that matches the domain for which you are requesting a certificate. If you are starting with a new installation of Nginx, you can update the default configuration file. Open it with your favorite text editor at / etc / nginx / sites-available / default and find the existing server_name line and replace the underscore with your domain name. Save the file and exit its editor. Reload Nginx to load the new configuration. 

sudo systemctl reload nginx
Certbot can now find the correct server block and update it. We will then update our firewall to allow HTTPS traffic.

Step 3 - Enabling HTTPS Through the Firewall:

To additionally allow HTTPS traffic, we can allow the Nginx Full profile and then exclude the redundant Nginx HTTP profile tolerance:

sudo ufw allow 'Nginx Full'
sudo ufw delete allow 'Nginx HTTP'

To check your status use:

sudo ufw status

Your status should look like this now:

Output
Status: active

To Action From


OpenSSH ALLOW Anywhere
Nginx Full ALLOW Anywhere
OpenSSH (v6) ALLOW Anywhere (v6)
Nginx Full (v6) ALLOW Anywhere (v6)
We are now ready to run Certbot and fetch our certificates.

Step 4 - Obtain an SSL Certificate

Certbot provides a variety of ways to obtain SSL certificates through various plugins. The Nginx plugin will take care of reconfiguring Nginx and reloading the configuration as needed:

sudo certbot --nginx -d example.com -d www.example.com

Where is example in the above command change to your domain.

If this is your first time running certbot, you will be prompted to enter an email address and agree to the terms of service. After that, certbot will communicate with the Let's Encrypt server and perform a challenge to verify that you control the domain for which you are requesting a certificate. If this succeeds, certbot will ask how you would like to configure your HTTPS settings.

 Output 
 Please choose whether or not to redirect HTTP traffic to HTTPS by removing HTTP access.
 -------------------------------------------------- -----------------------------
 1: No Redirection - No more changes to the web server configuration.
 2: Redirect - Redirect all requests to secure HTTPS access. Choose this for
 new sites, or if you're sure your site works over HTTPS. You can undo it
 change by editing the configuration of your web server.
 -------------------------------------------------- -----------------------------
 Select the appropriate number [1-2] and then [enter] (press 'c' to cancel):

Select your choice and press ENTER. The setting will be updated and Nginx will be reloaded to get the new settings. certbot will end with a message stating that the process was successful and where your certificates are stored:

Output 
 IMPORTANT NOTES:
 Congratulations! Your certificate and chain have been saved to
    /etc/letsencrypt/live/example.com/fullchain.pem. Your certificate
    expire on 2017-10-23. To obtain a new or adjusted version of this
    certified in the future, simply run certbot again with the
    "certonly" option. Non-interactively renew * all * your
    certificates, perform "certbot renew"
  - Your account credentials have been saved to your Certbot
    configuration directory in / etc / letsencrypt. You should do a
    Secure backup of this folder now. This configuration directory
    also contains certificates and private keys obtained by Certbot as well
    Making regular backups of this folder is ideal.
  - If you like Certbot, consider supporting our work:

    Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
    Donating to EFF: https://eff.org/donate-le

Your certificates are downloaded, installed, and loaded automatically. Try reloading your site using https: // and watch your browser's security indicator. It should indicate that the site is protected properly, usually with a green lock icon. Let's finish by testing the renewal process.

Step 5 - Verifying Certbot Automatic Renewal

Certificates are only valid for ninety days . This is to encourage users to automate their certificate renewal process. The certbot package we installed takes care of this for us. To test the renewal process, you can do a dry run with certbot:

sudo certbot renew --dry-run

If you don't see any errors, it's all set. When necessary, Certbot will renew your certificates and reload Nginx for changes. If the automated renewal process fails, the software will send a message to the email you specified notifying you when your certificate is about to expire.

686
0

FEATURES

  • NEW DEPOT,
  • NEW SPAWN,
  • NEW CAST SYSTEM,
  • NEW NPC SYSTEM
  • BANK BALANCE,
  • NEW CRITICAL BOOST SYSTEM,
  • NEW POTIONS,
  • REWARD SYSTEM,
  • PREY SYSTEM,
  • IMBUIMENT SYSTEM,
  • DAILY REWARD SYSTEM,
  • EXERCISE WEAPONS...

MAP

  • FULL GLOBAL MAP WITH DREAM LABYRINTH,
  • HAUNTED HOUSE CELLAR,
  • HAUNTED TEMPLE,
  • HAUNTED TOMB,
  • BURIED CATHEDRAL,
  • WINTER COURT,
  • SUMMER COURT
  • CARNIRVOR'S ROCK

How to compile and use client + websites checkout here

IP Changer

OTX SERVER FULL Download

148
0
misiu2 posted Mar 7 '19 at 10:21 am

Thora Layout Gesior ACC

  • Added latest version of boostrap
  • Added Cast System Page
  • Added Glyphicons
  • Reformulated Characters page.
  • Reformulated Team Support (with functions)
  • Added World Map (mouse over map and appear information)

Probably need to use this sql command

ALTER TABLE `players` ADD `function` VARCHAR(100) NOT NULL DEFAULT '';


Categories
Actions
Hide topic messages
Enable infinite scrolling
All posts under this topic will be deleted ?
Previous
12345 ... 15
Next
Pending draft ... Click to resume editing
Discard draft