

#pragma once instead of headerguards a bad practice or wathsoever?It is not standard and it is not portable. It injects the hosting machine's filesystem semantics into your program, in addition to locking you down to a vendor. hmm











#include <freetype/freetype.h> and the other has #include <freetype.h>/usr/include/freetype symlinks to /usr/include#pragma once at the start















__identifier and _Identifier reserved for them

function and you also want to define function







int a[10], b; would be weird if b were an array in that declarationint (*a)[10], b; is the way to declare a pointer to an array, and int (*a), b is equivalent to int *a, b – it would be weird if it weren'tint *a, b; would change something. hmm.(int *)a, b; was possible (but that looks like a typecast) (edited)



struct A { int a[10]; }; is 10 ints big, struct B { int *b; }; is one pointer wide



sizeof(int)ints





char aBuf[128], aBuf2[256];)

int (*a)[10] and int *(a[10]) in your new syntax?


int*[] array of pointer_int, int[]* ptr of an array_int (edited)


x: *const u8 in rust 


















if ($data === false || $datalen < 15 || substr($data, 0, 15) !== "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xffdtsf5") {
continue 2;
} $data = explode("\x00", $data);
for ($i = 11; isset($data[$i + 4]); $i += 5) {
$player['name'] = (string)$data[$i];
$player['clan'] = (string)$data[$i + 1];
$player['country'] = (int)$data[$i + 2];
$player['score'] = (int)$data[$i + 3];
$player['ingame'] = (bool)$data[$i + 4];
$connection[1]['players'][] = $player;
} (edited)
SERVERBROWSE_GETINFO_64? SERVERBROWSE_GETINFO_64_LEGACY only sends 24 players per packet

SERVERBROWSE_GETINFO with some special bytes in the front, let me check the source"xe\0\0\0\0\xff\xff\xff\xffinf3"






xe\0\0\0\0\xff\xff\xff\xffgie3 instead of the xe\0\0\0\0\xff\xff\xff\xffinf3 or? (edited)

$data = "xe" . $server['_extratoken'] . "xD" . "\xff\xff\xff\xffgie3" . $server['_token'];"xD" is supposed to be "\0\0"


























xe<TWORANDOMBYTES>\0\0\xff\xff\xff\xffinf3

"xD" in the bytes that should be zeroed














sudo iptables -A INPUT -p udp \! -f -m u32 --u32 "26&0xffff=0x7865 && 32=0x7844ffff && 36=0xffff6769 && 38&0xffff=0x6533" -j REJECT