Well, besides the fact that 'magically going into the code and finding things' is about as viable as in movies when the "hacker" is "hacking the mainframes and redistributing the frontal cortex of the memory bank data storage unit and rerouting the virus to the information tanks",
It's much more challenging than one might assume. Provided you can look at all of the games building blocks, files, textures, code, sounds, etc., there isn't going to be something that says [b]THE SLEEPER SIMULANT IS OBTAINED BY USING THE POCKET INFINITY TO [REDACTED][/b] anywhere.
Your role as a moderator enables you immediately ban this user from messaging (bypassing the report queue) if you select a punishment.
7 Day Ban
7 Day Ban
30 Day Ban
Permanent Ban
This site uses cookies to provide you with the best possible user experience. By clicking 'Accept', you agree to the policies documented at Cookie Policy and Privacy Policy.
Accept
This site uses cookies to provide you with the best possible user experience. By continuing to use this site, you agree to the policies documented at Cookie Policy and Privacy Policy.
close
Our policies have recently changed. By clicking 'Accept', you agree to the updated policies documented at Cookie Policy and Privacy Policy.
Accept
Our policies have recently changed. By continuing to use this site, you agree to the updated policies documented at Cookie Policy and Privacy Policy.