Инсталирайте Steam
вход
|
език
Опростен китайски (简体中文)
Традиционен китайски (繁體中文)
Японски (日本語)
Корейски (한국어)
Тайландски (ไทย)
Чешки (Čeština)
Датски (Dansk)
Немски (Deutsch)
Английски (English)
Испански — Испания (Español — España)
Испански — Латинска Америка (Español — Latinoamérica)
Гръцки (Ελληνικά)
Френски (Français)
Италиански (Italiano)
Индонезийски (Bahasa Indonesia)
Унгарски (Magyar)
Холандски (Nederlands)
Норвежки (Norsk)
Полски (Polski)
Португалски (Português)
Бразилски португалски (Português — Brasil)
Румънски (Română)
Руски (Русский)
Финландски (Suomi)
Шведски (Svenska)
Турски (Türkçe)
Виетнамски (Tiếng Việt)
Украински (Українська)
Докладване на проблем с превода
Also, the URL has to be a direct image URL, meaning it has to end in ".jpg", ".jpeg", ".png" etc.
You can see what websites and image URL suffixes are whitelisted by clicking the "Help & Info" button in the spray manager. The whitelist will vary from server-to-server.
Using ServerDL is rather simple, you need to have sv_allowdownload enabled and you need to mark the files that you want to be downloadable with resource.AddFile and resource.AddSingleFile after that clients will automatically download the content when they join your server. However this is considered obsolete as its incredibly slow at 64kb/s and you should avoid using it.
From what it seems, without a backdoor the only files that will be downloadable are the ones that are "marked" with resource add file. Which is nice! Seems the exploit is not as bad as it was
⠀⠀⢸⣀⠏⠘⢻⡂⠒⠒⢻⣷⡿⠯⣋⡹⡬⡇⠀
⠀⠀⢸⢬⡂⠀⢀⠜⠀⢀⠀⠈⠉⠂⢌⣹⡇⡇⠀
⠀⠀⢸⣄⣤⣆⢅⠀⠀⡎⠀⠀⠸⡄⠈⠑⠾⡧⠀
⠀⢰⠃⢀⢞⡴⠏⠀⡘⢇⠀⢠⣀⠷⡀⣦⡗⡽⠀
⠀⠏⠀⢸⠈⢠⠊⡏⠉⠉⠳⣮⠛⡏⠉⠙⠀⢹⡇
⠸⢲⠀⢸⡀⠈⣦⣱⠄⣀⠔⠙⢦⣇⡠⣾⠀⢸⢼
⠀⠀⠷⢆⣣⣸⠹⣦⡀⠑⠒⠁⢊⣠⠔⡹⢄⣼⠀
⢀⣀⡀⠀⠈⠁⢓⡽⡎⠻⠭⠏⢳⡞⠘⠁⠀⠀⠀
⠇⢀⡗⠀⠀⢠⠎⠀⡀⠀⠀⠀⠸⠙⢄⠀⠀⠀⠀
⡇⠘⣄⣀⡠⠧⣄⣠⡇⠀⠀⠀⠀⢇⡼⠒⢤⡀⠀
⠈⠢⢠⡇⠀⠀⠘⡽⢅⣀⣀⠀⢠⡾⣅⡀⣀⠇⠀
⠀⠀⠀⠻⠦⠄⠴⢁⣀⠁⠀⡀⠀⣀⠙⠙⠁⠀⠀
⠀⠀⠀⠀⠀⠀⠀⡼⢿⠟⠉⡸⠿⡇⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⣸⣓⣸⠀⢸⢗⣺⡗⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⢠⠇⠀⠘⠀⢨⣄⠀⠙⠆⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠸⣀⣀⡄⠀⠀⠀⠑⠒⠃⠀⠀⠀⠀