Complete.Org: Mailing Lists: Archives: tetrinext: February 2000:
[tetrinext] Re: Network protocols
Home

[tetrinext] Re: Network protocols

[Top] [All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index] [Thread Index]
To: tetrinext@xxxxxxxxxxxx
Subject: [tetrinext] Re: Network protocols
From: Jonathan Hall <jonhall@xxxxxxxxxxxx>
Date: Sun, 13 Feb 2000 21:23:43 -0600
Reply-to: tetrinext@xxxxxxxxxxxx

On Mon, Feb 14, 2000 at 12:43:20PM +1100, Ka-shu Wong wrote:
> 
> Hi all,
> 
> I would like to start a discussion about the network protocol.  (Did we
> decide to call this the 'TetriNext' protocol?  I can't remember)
> 
> I have been wondering about ways of preventing cheating without using
> 'blessed' binaries and encrypted connections.

Have the server check each move... if it's invalid, simply discard it.


--
"So we went to Atari and said, 'Hey, we've got this amazing thing, even
built with some of your parts, and what do you think about funding us? Or
we'll give it to you. We just want to do it. Pay our salary, we'll come work
for you.' And they said, 'No.' So then we went to Hewlett-Packard, and they
said, 'Hey, we don't need you. You haven't got through college yet.'" --
Apple Computer Inc. founder Steve Jobs on attempts to get Atari and H-P
interested in his and Steve Wozniak's personal computer.
--
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
  Jonathan Hall  *  jonhall@xxxxxxxxxxxx  *  PGP public key available
 Systems Admin, Future Internet Services; Goessel, KS * (316) 367-2487
         http://www.futureks.net  *  PGP Key ID: FE 00 FD 51
                  -=  Running Debian GNU/Linux  =-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



[Prev in Thread] Current Thread [Next in Thread]