Steam'i Yükleyin
giriş
|
dil
简体中文 (Basitleştirilmiş Çince)
繁體中文 (Geleneksel Çince)
日本語 (Japonca)
한국어 (Korece)
ไทย (Tayca)
Български (Bulgarca)
Čeština (Çekçe)
Dansk (Danca)
Deutsch (Almanca)
English (İngilizce)
Español - España (İspanyolca - İspanya)
Español - Latinoamérica (İspanyolca - Latin Amerika)
Ελληνικά (Yunanca)
Français (Fransızca)
Italiano (İtalyanca)
Bahasa Indonesia (Endonezce)
Magyar (Macarca)
Nederlands (Hollandaca)
Norsk (Norveççe)
Polski (Lehçe)
Português (Portekizce - Portekiz)
Português - Brasil (Portekizce - Brezilya)
Română (Rumence)
Русский (Rusça)
Suomi (Fince)
Svenska (İsveççe)
Tiếng Việt (Vietnamca)
Українська (Ukraynaca)
Bir çeviri sorunu bildirin
Also, the URL has to be a direct image URL, meaning it has to end in ".jpg", ".jpeg", ".png" etc.
You can see what websites and image URL suffixes are whitelisted by clicking the "Help & Info" button in the spray manager. The whitelist will vary from server-to-server.
Using ServerDL is rather simple, you need to have sv_allowdownload enabled and you need to mark the files that you want to be downloadable with resource.AddFile and resource.AddSingleFile after that clients will automatically download the content when they join your server. However this is considered obsolete as its incredibly slow at 64kb/s and you should avoid using it.
From what it seems, without a backdoor the only files that will be downloadable are the ones that are "marked" with resource add file. Which is nice! Seems the exploit is not as bad as it was
⠀⠀⢸⣀⠏⠘⢻⡂⠒⠒⢻⣷⡿⠯⣋⡹⡬⡇⠀
⠀⠀⢸⢬⡂⠀⢀⠜⠀⢀⠀⠈⠉⠂⢌⣹⡇⡇⠀
⠀⠀⢸⣄⣤⣆⢅⠀⠀⡎⠀⠀⠸⡄⠈⠑⠾⡧⠀
⠀⢰⠃⢀⢞⡴⠏⠀⡘⢇⠀⢠⣀⠷⡀⣦⡗⡽⠀
⠀⠏⠀⢸⠈⢠⠊⡏⠉⠉⠳⣮⠛⡏⠉⠙⠀⢹⡇
⠸⢲⠀⢸⡀⠈⣦⣱⠄⣀⠔⠙⢦⣇⡠⣾⠀⢸⢼
⠀⠀⠷⢆⣣⣸⠹⣦⡀⠑⠒⠁⢊⣠⠔⡹⢄⣼⠀
⢀⣀⡀⠀⠈⠁⢓⡽⡎⠻⠭⠏⢳⡞⠘⠁⠀⠀⠀
⠇⢀⡗⠀⠀⢠⠎⠀⡀⠀⠀⠀⠸⠙⢄⠀⠀⠀⠀
⡇⠘⣄⣀⡠⠧⣄⣠⡇⠀⠀⠀⠀⢇⡼⠒⢤⡀⠀
⠈⠢⢠⡇⠀⠀⠘⡽⢅⣀⣀⠀⢠⡾⣅⡀⣀⠇⠀
⠀⠀⠀⠻⠦⠄⠴⢁⣀⠁⠀⡀⠀⣀⠙⠙⠁⠀⠀
⠀⠀⠀⠀⠀⠀⠀⡼⢿⠟⠉⡸⠿⡇⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⣸⣓⣸⠀⢸⢗⣺⡗⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⢠⠇⠀⠘⠀⢨⣄⠀⠙⠆⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠸⣀⣀⡄⠀⠀⠀⠑⠒⠃⠀⠀⠀⠀