Virtualization would be an option yes, although I prefer Virtualbox for that. I could install Ubuntu Server in Virtual Box and make a virtual share/shared harddrive with the host OS (Windows) so that Statsgen would be able to grab it's logfiles. The drawback is that this costs quite some overhead in terms of CPU and RAM.
Many many thanks for your kindness, time and expertise! I will test it out! Also thanks for the instructions/source, 'Give a hungry man a fish, you feed him for a day, but if you teach him how to fish, you feed him for a lifetime.'
Which program do you use to modify the exe files? IDA Pro or an Hex editor?
PS. Did you modify the original cod2mp_s? We're using the one from Mitch, which allows Windows based COD servers to also show up on the masterlist. His exe can be found here:
https://killtube.org/showthread.php?...ll=1#post12540
Kind regards.
EDIT: It works! Well, I don't how to test if the exploit is being blocked (because I don't know how to execute the exploit), but at least I was able to connect to our server and walk around etc, so the server functions seem to be in working order.
As explained above, we use a modified COD2mp_s.exe by Mitch, which allows cracked servers to show up in the master list.
Thanks to your explanation/source how you patched/fixed the .exe, I managed to patch the modified COD2mp_s.exe by Mitch by myself. At least I hope I did it properly. I've attached it to this post: CoD2MP_s_cracked_patched_snaps.7z
Again, server functions seem to be in working order, but I don't know if it actually blocks the exploit because I don't know how to execute it.
Once again, many many thanks!