newt's Recent Forum Activity

  • The line circled in blue.

    The premise is that projectiles at the same angle, and the same time will be at the same point, and overlap.

  • Ok look at it another way.

    You have two objects that form two parallel lines, or slopes when you get the angle between the two.

    An axis of points for each.

    Suppose one object goes up or down its axis/slope, then angle() would change.

    How would I get the new angle for the few pixels difference?

    I mean in theory I could cast the new points using trig, and angle() from those points but that seems like overkill.

  • Not quite. That's almost perpendicular.

    May have to go at it a different way.

    The second object would be in motion as well.

    So I may have to think in terms of its angle.

  • Angle() gets you the angle from object to object. That gets you a vector straight at the object.

    I want to get one object to travel parallel to another.

  • It's not going to look like you think it would look.

  • Touch?

    AngleAt()

  • With caustics.

    I love it when dev becomes serendipitous.

  • Yeah, that's a bit like Tone js that rex had integrated.

    It could probably replicate any effect, or sound you wanted, but the learning curve plus development time just don't match up just doing a recording.

  • Try Construct 3

    Develop games in your browser. Powerful, performant & highly capable.

    Try Now Construct 3 users don't see these ads
  • That's an instrument and player.

    I'm speaking of just instruments, or synth, or pads for specific sounds.

    Specifically sound effects on the fly.

  • Out of morbid curiosity, what are the chances that we could get something like a vst sound plug host to generate sounds on the fly?

    Its doable now with WASM right?

  • A hash is a bit different than encryption.

    The hash simply tells you if the data has been altered.

    They would have to alter the game code to elicit a specific response to a specific hash.

    If it were just a single character that might work, multiple, not so much.

    Keep in mind that all that is magnitudes more work then simply looking up methods to break encryption.

    Not that regular obfuscation/encryption wouldn't most likely deter 99% of would be hackers.

newt's avatar

newt

Member since 12 Nov, 2008

Twitter
newt has 27 followers

Trophy Case

  • 16-Year Club
  • Entrepreneur Sold something in the asset store
  • Jupiter Mission Supports Gordon's mission to Jupiter
  • Forum Contributor Made 100 posts in the forums
  • Forum Patron Made 500 posts in the forums
  • Forum Hero Made 1,000 posts in the forums
  • Forum Wizard Made 5,000 posts in the forums
  • Forum Unicorn Made 10,000 posts in the forums
  • Popular Game One of your games has over 1,000 players
  • Regular Visitor Visited Construct.net 7 days in a row
  • Steady Visitor Visited Construct.net 30 days in a row
  • Enduring Visitor Visited Construct.net 90 days in a row
  • Unrelenting Visitor Visited Construct.net 180 days in a row
  • Continuous Visitor Visited Construct.net 365 days in a row
  • RTFM Read the fabulous manual
  • Email Verified

Progress

31/44
How to earn trophies