Инсталирайте Steam
вход
|
език
Опростен китайски (简体中文)
Традиционен китайски (繁體中文)
Японски (日本語)
Корейски (한국어)
Тайландски (ไทย)
Чешки (Čeština)
Датски (Dansk)
Немски (Deutsch)
Английски (English)
Испански — Испания (Español — España)
Испански — Латинска Америка (Español — Latinoamérica)
Гръцки (Ελληνικά)
Френски (Français)
Италиански (Italiano)
Индонезийски (Bahasa Indonesia)
Унгарски (Magyar)
Холандски (Nederlands)
Норвежки (Norsk)
Полски (Polski)
Португалски (Português)
Бразилски португалски (Português — Brasil)
Румънски (Română)
Руски (Русский)
Финландски (Suomi)
Шведски (Svenska)
Турски (Türkçe)
Виетнамски (Tiếng Việt)
Украински (Українська)
Докладване на проблем с превода
client.connect 91.200.101.83:28066
The server flooding protection is supposed to weaken DDoS attacks.
Say the client is configured to send its position to the server every second.
The server might have to do a lot of work when it receives position data, so a client could modify his game to send its position a lot more regularly, to spam the server.
Flooding protection attempts to protect from this by simply ignoring packets sent too quickly.
Keep in mind that the rate at which the server receives packets from clients is nondeterministic (e.g.: your ping spikes to 1s and back to 30ms - the first packet might take a route that's way longer than that of the second packet, meaning they might arrive shortly after each other).
Assuming flooding protection is properly done (you never know ;)), a warning like this might be caused by someone trying to DDoS your server via client packet spam or by players that have ping spikes.