Solved

tetrinet chat codes

Posted on 1998-12-13
5
416 Views
Last Modified: 2013-12-26
Can someone tell me the tetrinet chat codes?  I don't want that french trainer thing, it sucks.  I mean the ones you type in the chat.
0
Comment
Question by:hambone39
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 

Expert Comment

by:Pegasus_Punk
ID: 1105108
i've been analising tetrinet for far too long and i think there's
no such thing as codes for it... I'm working on a english/portuguese path so soon you'll can get this !
0
 
LVL 2

Expert Comment

by:TTMan
ID: 1105109
Yes there are codes
0
 
LVL 6

Expert Comment

by:thresher_shark
ID: 1105110
Care to share with us your knowledge TTMan?
0
 

Expert Comment

by:Darksheer
ID: 1105111
its me again, Darksheer.. i wonder if anyone remembers me, i used to know nearly all the codes for tetrinet, there not "cheats" lets get that straight, they are commands that tetrinet reconizes, it send them to and from the game so the server knows whats going on, all your doing is sending custom codes "beating the system" if thats what you want to call it, i will try and remember the codes for you guys, i had them all done in a nicely presented .doc file, but i lost them all, i used to know so many, yeah, i used to know nearly all the ascii y command codes, damn why didnt i continue playing it, i dont even have tnet 113 anymore, is 114 or something released yet?

well, ill try and help,.cya guys, more info, email me at Darksheer@earthling.net or icq me at.. actually, bad idea.
0
 

Accepted Solution

by:
savages11 earned 50 total points
ID: 1105112
yes there are a lot cheat codes. some of them are ÿ endgame 0,
ÿ sb # a #, ÿ sb # c #.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

See the related links at the bottom of the tutorial for downloads and supplemental information. Introduction The Nvidia 3D Vision Kit is a [not so] new gaming technology which allows you to play the newest computer games in "Stereo 3D" (like …
Programming  of  forecasting lottery numbers for self use  on Turbo C++ is done by use of random number generator code by a program algorithm logic. Random numbers usually generates numbers between definite interval. Therefore, when entering the c…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question