Jump to content

Tiffany Seville

Members
  • Posts

    11
  • Joined

  • Last visited

Reputation

3 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. You and I drew very different conclusions from the situation. For me, Island Rum works fine right now. Catalina isn't out yet and even when it is, I don't have to upgrade immediately. Do I believe CodeWeavers will have support ready in Crossover before Catalina launches? I don't know ... I don't use Crossover today, but I have used it in the past. It is a good product with pretty passionate developers who seem to believe they can deliver. Maybe they will, maybe they won't. In the meantime, Island Rum is a very reliable solution.
  2. Yeah, there‘s really nothing in the danger calculation that jumps out for MEZ or Healing effects. Although it is a massive block of code with all sorts of weird edge behaviors. Back during live, I ran a bunch of taunt experiments where it was evident a tanker could intermittently lose taunt to a mass hold. It was never clear why that was happening and the code hasn‘t helped much so far. Along this line, I‘Ve been curious about what conditions zero out the damage accumulator that also factors into the danger calculation. My poor memory seems to think just going down isn‘t enough and you can reasonably reclaim Aggro if you are Rez-ed at some point. But, if you zone (for example, come back from the hospital), does your accumulated damage zero out making it difficult to regain Aggro if you return to a long fight. I remember somebody experiencing behavior like this back in live that we struggled to explain. Oof ... yeah, I just went back and looked at the code and realized I completely missed the duration update and only saw the multiplier (i.e. tauntFactor) assignment. So, my mistake! Need to start wearing those stupid reading glasses.
  3. I was also just realizing "nullified" is an important word in this sentence. Your taunt isn't actually removed in this case - it is still active. So, if conditions change, your taunt will be un-nullified. You don't have to re-taunt for this to happen. Edit - jack_nomind (see following posts) pointed out I misread that code block. Just strinking-through my comment so as not to mislead anybody.
  4. From what I hear, CodeWeavers is working on a solution for Crossover that might provide a path for supporting this. Crossover is not a free product (although there is a trial), but like Wine it is an emulator. So it doesn't require a Windows license. Of course, with a Windows license, any number of virtual instance programs (e.g. VirtualBox) would let you run Windows without having to back into Bootcamp - though not sure how good graphics support would be.
  5. That's pretty interesting. I'd be interested in hearing more about that. Sigh ... makes me wish I had as much time as I used to to dig into these things ... Edit: I was looking at the code for this - it's an oddly simple check that is only relevant if you have an active taunt. It looks like you are basically guaranteed to re-up your own taunt if you are the current target. The duration link is interesting. It makes you wonder if you could stack enough recharge on Taunt to be able to reliably hit it right at the time when the current target's taunt duration falls below the 2x mark against your taunt. It's also interesting to see how easy it is to get your taunt dropped to null. It's easy to assume that Taunt accumulates, like damage, but it really doesn't. You basically have a cap based on your max taunt duration. So, no matter how many times you taunt, you don't accumulate aggro.You just reset your aggro to its max possible value. It looks like there is only one taunt counted for a target. So, there must be code somewhere that decides if you have multiple taunt sources on a target, which one gets counted - presumably the one with the longest duration?
  6. Always "6" on the first power tray.
  7. You might try out a solution like Splashtop or Chrome Remote Desktop, assuming your work-managed device allows you to install/use a product like that. They do a surprisingly good job of minimizing network traffic to remotely run even games from your home computer and display them on a your remote laptop.
  8. Just to be clear, this is not what the alert is telling you. SONAR.ProcHijack!g45 is an alert that triggers based on behavior, not as a result of a specific virus or trojan signature. Basically, Symantec (aka Norton) is saying that homecoming.exe behaved in a way that could be considered suspicious. In other words, it performed an action that a virus or trojan might also perform. However, Symantec doesn't actually know if homecoming.exe's behavior is malicious. That's why the guidance (link) asks you to submit the file that triggered the alert to Symantec. In fact, it might be a good idea for people seeing this alert to go through Symantec's submission process. You can read more about Symantec's SONAR component and it's "zero-day" detection capability here; LINK.
  9. It looks like Tequila logs its download activity in the TequilaActivityLog file in the Tequila directory. Anybody experiencing the problem should probably try to see the last download attempted in that file - or if there are any errors attempting to download files (assuming your security software is stopping the download). It would probably also be a good idea to then check the IP address of the download site on that same computer, just in case something is mis-resolving the hostname to a malicious site. For example, if the failed download was from "blah.blah.com" you would want to fire up a cmd prompt and check what IP is returned by "nslookup blah.blah.com" It's certainly also possible that a.) some of these security packages have mistakenly tagged some of these IP's as hosting malicious content or even that b.) some of these sites are actually hosting malicious content (or as was already pointed out, hosted bad content in the past). That doesn't necessarily mean that Tequila is actually downloading bad content. But the first step is to try to figure out what site / IP address is being flagged by the security software. If you just want to quickly get around the error, presumably you could just point Tequila to a customized manifest file that doesn't include the site your software is flagging. Although, FWIW - I ran all the Tequila mirror URLs through Trend Micro's Malicious URL list and through ThreatMine and didn't get any untoward results.
  10. Any thoughts on starting Tanker Tuesday’s back up?
×
×
  • Create New...