lennaert's Recent Forum Activity

  • Ajax is generally used to call a file from a specific URL with some parameters.

    You could use this method to make a working API, but it would require to create a processing method in the background for example with a PHP/MySql server.

    The other more obvious approach would be to build your own plugin for it.

    This way the plugin could be shared or sold so others would be able to use the api as well.

  • mahdi71, you been around long enough and build more then enough to know various limitations.

    Why has it suddenly become an issue to rant about ?

    Also,

    so yes c2 is not so fast after all . and its really not good for big projects.

    That construct 2 is not so fast is more a matter of personal opinion here I think.

    To me it is one of the quickest development tools around.

    And handling large projects is just another skill set you need to acquire.

  • Try Construct 3

    Develop games in your browser. Powerful, performant & highly capable.

    Try Now Construct 3 users don't see these ads
  • Just keep focusing on what you deem important. There will always be users attempting to take the easy way anywhere.

    Good luck

  • Hehehe

    I fully understand PixelPower

    Just imagine the following, I have seen users here pretend to know what a sprite is .... they just needed to be told It's an image

  • I was very intrigued with what you had build there and I hope that the following adaption will help you on your way <img src="{SMILIES_PATH}/icon_e_smile.gif" alt=":)" title="Smile">

    I added a for each loop on event 14 and combined the two events following into that, mixed that up with a correct version of picking the required objects by evaluation.

    Also added a picking action on event 10 for correct energy updates.

    I see there is still room for improvement, but it's your project and this should help you greatly already.

    https://dl.dropboxusercontent.com/u/713 ... ntEvo.capx

  • A bit of a dick tbh hahaha

    Why?

    He asks for help, you give some, he wants more, you complain

    no hard feelings though

    In your first reply you offer them a solution in which you obviously pored some effort, which you willingly offer.

    What stops them from wanting your arm if you offer them your fingers ?

    I tend to give descriptive text solutions based on their needs which they need to design and implement themselves in their own project. Thus offering my mind.

    When things go awry, these developers often post their attempts at the implementation suggested which I then feel obliged to edit or give comments on.

  • I give up you win but, if you get hacked you will know

    If someone hacks one of my servers they would still need to crack the encrypted stored passwords in my database ??

    It is far more likely someone installs some stupid browser addon which records keystrokes and then sends it over to some 3rd party which basically abused the users lack of security knowledge for browsers on their end.

    I actually know a little about this ??

  • The php file should reside on your webserver, not within your project. (Unless it's a html5 project on a webserver)

    The url your calling should be the Web address of the php file on your webserver .

    Try and read up on info how php files are served up.

    Google how WAMP works. (Windows apache mysql php)

  • lennaert Well you bumped a thread where I made comments about three years ago, and my stance has changed: as long as you have a decent SSL implementation, you should be OK - but you should still send password hashes and not actual passwords, so they're not even plaintext on the receiving endpoint. Anyways I don't consider myself a security expert so don't ask me.

    Ashley ASHLEY SAID

    If you had the slightest idea what the above meant... you likely would not have quoted.

    Even ashley's stance on the hash for the endpoint is useless unless you consider your server as hacked/unsafe and I will point out his last comment as a good guide on the matter.

    The end point is your server receiving the name and password. (Or your webhost)

    Which performs the decryption of the SSL connection.

  • Your welcome 😊

    Occasionally the old KISS approach is still best 😁

  • Oh please give break

    Perhaps give yourself a break if you haven't got the faintest idea what your commenting about.

    SSL is https:// connections.

  • Single event

    is clicking/touching image

    is not clicking/touching UI (inverted is touching UI)

lennaert's avatar

lennaert

Early Adopter

Member since 8 Oct, 2013

Twitter
lennaert has 13 followers

Connect with lennaert

Trophy Case

  • 11-Year Club
  • Forum Contributor Made 100 posts in the forums
  • Forum Patron Made 500 posts in the forums
  • Forum Hero Made 1,000 posts in the forums
  • x5
    Popular Game One of your games has over 1,000 players
  • Famous Game One of your games has over 10,000 players
  • x2
    Coach One of your tutorials has over 1,000 readers
  • Educator One of your tutorials has over 10,000 readers
  • Regular Visitor Visited Construct.net 7 days in a row
  • Steady Visitor Visited Construct.net 30 days in a row
  • Enduring Visitor Visited Construct.net 90 days in a row
  • RTFM Read the fabulous manual
  • x2
    Great Comment One of your comments gets 3 upvotes
  • Delicious Comment One of your comments gets 10 upvotes
  • Email Verified

Progress

25/44
How to earn trophies