Normal to advanced computer upgrade
#1
Posted 30 March 2014 - 10:40 PM
#2
Posted 31 March 2014 - 05:21 PM
#3
Posted 01 April 2014 - 01:15 AM
#4
Posted 01 April 2014 - 06:13 PM
#6
Posted 01 April 2014 - 09:49 PM
#7
#9
Posted 02 April 2014 - 12:04 PM
#10
Posted 04 April 2014 - 02:19 AM
#11
Posted 04 April 2014 - 05:31 AM
awsmazinggenius, on 04 April 2014 - 02:19 AM, said:
Good point, I hadn't thought about that. You could always just label the computer then put it in the crafting bench. But that's a more straight forward approach.
#12
Posted 04 April 2014 - 11:06 AM
oeed, on 04 April 2014 - 05:31 AM, said:
awsmazinggenius, on 04 April 2014 - 02:19 AM, said:
Good point, I hadn't thought about that. You could always just label the computer then put it in the crafting bench. But that's a more straight forward approach.
#13
Posted 05 April 2014 - 04:21 PM
#14
Posted 07 April 2014 - 05:46 AM
Edited by Kingdaro, 07 April 2014 - 05:46 AM.
#15
Posted 09 April 2014 - 12:04 AM
Edited by Enderbane, 09 April 2014 - 12:04 AM.
#16
Posted 18 April 2014 - 02:36 PM
Basically, I have an entire concept for an access control system. Largely based around the CoFH Core access control and friends system used for tesseracts, it would consist of two simple programs - "access" and "friends." The "access" program would have three options: default "private," "restricted," and "public." The "friends" program would allow you to add and remove people to the list of those allowed on the "restricted" option. Basically, only the player who placed the computer or turtle would be allowed to break it. However, depending on players' preferences, they could restrict all other permissions (working with programs etc.) to only themselves, only themselves + the players on the "restricted" list, or allow everyone to do whatever they want with the "public" option.
Again, an easy way to understand this system is to look at how one manages a tesseract in Thermal Expansion. But what does this have to do with the upgrades thing, you ask? Well, the thing is, by requiring the person who wants to upgrade the computer/turtle to be allowed via the permissions list, the idea could be implemented in a much more secure way. In fact, if properly implemented, an access control system like this could probably allow for all kinds of new possibilities!
I have not worked out many, many details on exactly how it would all work, but I for one believe it has great potential. That said, I need feedback on this one, and I would greatly appreciate it, positive or negative. Thanks!
#17
Posted 18 April 2014 - 03:01 PM
"Hey admin PLEASE HELP! Someone upgraded my computer, BAN NAAAO!"
#18
Posted 18 April 2014 - 03:21 PM
CometWolf, on 18 April 2014 - 03:01 PM, said:
#20
Posted 18 April 2014 - 05:13 PM
jlp1528, on 18 April 2014 - 03:21 PM, said:
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users