Jump to content

VETERANS-GAMING is celebrating 10 Years of COOP Gaming! For the last ten years, VG has been proud to host our servers and website for so many COOP gamers and teamwork focused players, and we are thrilled to be a home away from home for anyone looking for a casual place to hang out and play games with friends!  It's been a long road and many people have come and gone over the years, some even come back after awhile, happy to see their old stomping grounds still filled with the best COOP gamers and games, and with plenty of Bots ready to give a fight and to eat some virtual lead!  We hope you all will stay with us through the next ten years, and on!  Long live VETERANS-GAMING!!


  • Content count

  • Joined

  • Last visited

Community Reputation

54 Good


About Aori

  • Rank
    Lance Corporal
  • Birthday 08/18/2000

Profile Information

  • Location

Recent Profile Visitors

1,038 profile views
  1. Merch?

    VG edition spyderco paramilitary 2 ? I would love to buy that.
  2. Well 64bit Win10 is not "unstable" or smt unless you run special app that need to be 32bit it run and if soo 64bit can run most of normal everyday use 32bit app just finee. Honestly for normal causal user everything work just fine. Your laptop is old but doesn't mean it bad or anything, it actually quite good compare to Big_Papa 's "everyfastgaminglaptop" and it also run Win10 64. Beside you can just download win 10 on Microsoft website and try it for free. I like Linux too especially kubutu, lubuntu is also an light os but I recommend you try win 10 cause it faster than all the laptop I ever own or even use. So yeah your laptop has and gt720m right? Also you might can upgrade your cpu too but it didn't necessarily at all. You just need lilbit more ram, an SSD and everything will be quite snappy
  3. I know PR is going to DIE!! Whats next?

    7 days to die seem fun
  4. Well your spec is ok for win 10 but I highly recommend you upgrade your ram and put an SSD in it. Having dual channel ram will help alot too. Win 10 is... Well let's just say that can be tune better. You can disable lots of services you don't need to make it smoother. Also what is your laptop and also make sure you run Win10 64bit if you want a ram upgrade
  5. SERVER DOWN 8/13/2019

    Whattttttt againnnnn?
  6. Frame drops on kashan (not khamisiyah)

    Yepp some crash right out on khasan some with ok pc will have around 15fps
  7. Radio =VG=

    How about Man in Black by Johnny Cash
  8. AA w/ hun

  9. Hmmm

  10. Shijia valley bugged

    Dad we are on tv xD
  11. I found the vpn that stable i enough guys. If they forgot the pass I gonna be able to play Pr again!
  12. A new Law on Cybersecurity (Luật an ninh mạng) (theCSL 2018) will come into effect from 1 January 2019 in Vietnam. Not only providing measures to secure the cyber-environment which to some extent has been regulated by the Law on Cyber-information Safety dated 19 November 2015, the CSL 2018 also includes various provisions to control the contents posted or published on the cyber-network. Below are some salient issues of the CSL 2018. SCOPE OF THE CSL 2018 The CSL 2018 applies to all agencies, organizations and individuals involving in the protection of cybersecurity, which is broadly defined as the assurance that activities in cyberspace not causing harm to the national security, social order and safety, lawful rights and interests of agencies, organizations and individuals. In particular, the CSL 2018 will apply to overseas organisations, which have users residing in Vietnam such as Google or Facebook. The CSL 2018 covers all networks of IT infrastructure, telecommunication, Internet, computer systems, databases, information processing, storage and controlling systems, and regulates activities of every enterprise providing services in cyberspace and Internet users including e-commerce, websites, online forums, social networking and blogs. OPERATORS OF INFORMATION SYSTEM (CHỦ QUẢN HỆ THỐNG THÔNG TIN) The CSL 2018 imposes various obligations on an operator of an information system. Under the Law on Cyber-information Safety according to which, an operators of information systems means any agencies, organizations or individuals having directly managing authority to an information system. CRITICAL INFORMATION SYSTEMS AND NON-CRITICAL INFORMATION SYSTEM The CSL 2018 categorizes information systems into (i) the information systems critical to national security (Critical Information Systems) and (ii) those not falling under the Critical Information Systems (Non-critical Information Systems). Critical Information Systems are generally defined as the information systems which, if subject to an incident, infiltration, hijacking or operational control, distortion, interruption, stoppage, paralysis, attack destruction will seriously compromise cybersecurity. It appears that the list of Critical Information System under the CSL 2018 is broader than those already prescribed under Decision 632 of the Prime Minister dated 10 May 2017 (Decision 632). Currently, Decision 632 covers telecommunication areas and the information network within the Communist Party’s and governmental agencies of which the Ministry of Information and Communication (the MIC) or the Government Office is the administrator (chủ quản). The Critical Information Systems now include, inter alia, the information system in the areas of energy, finance, banking, telecommunication, transportation, natural resource and environment, chemical, healthcare, culture, and press. Probably, Decision 632 could be supplemented with more areas being critical to national security and involvement of relevant ministries other than the MIC. Non-critical Information Systems, though not defined clearly, should be any information systems administered by private organizations and enterprises. PROHIBITED ACTS ON CYBERSPACE The CSL 2018 prohibits using cyberspace to conduct any of the following acts: Using cyberspace, IT and electronic media in order to breach the laws on national security, social order and safety; Organizing, activating, colluding, instigating, bribing, cheating or tricking, manipulating, training or drilling people to oppose the State of the Socialist Republic of Vietnam; Distorting history, denying revolutionary achievements, destroying the national solidarity block, conducting offences against religion, gender discrimination or racist acts; Providing false information, causing confusion among the citizens, causing harm to socioeconomic activities, causing difficulties for the operation of State agencies or of people performing public duties, or infringing the lawful rights and interests of other agencies, organizations and individuals; Activities being prostitution, social evils or human trafficking; publishing information which is lewd, depraved or criminal; or destroying the fine traditions and customs of the people, social ethics or health of the community; and Inciting, enticing or activating other people to commit crime. One could see that the list of prohibition is quite general and vague (e.g. distorting history or rejecting revolutionary achievement) allowing the authority to substantial discretion. DATA LOCALIZATION REQUIREMENT “Personal information”, “data of relations of services users”, “data created by service users” in Vietnam collected, analyzed, processed by either domestic or foreign enterprises providing services in the telecommunication network, internet and value-added services in cyberspace in Vietnam must be stored in Vietnam. In addition, foreign enterprises having these activities have to set up representative office or branches in Vietnam. Currently many foreign companies are supplying services to users in Vietnam on the cross-border basis. To comply with these requirements, foreign companies would probably have to increase their costs for setting up and maintaining storage equipment in Vietnam. SUPERVISION OF CRITICAL INFORMATION SYSTEMS Critical Information Systems are subject to assessment by the competent authorities and can only be put into operation after certified as satisfying cyber-security conditions. Critical Information Systems may be inspected on a regular basis or upon the occurrence of an event specified under this law. The operators of the Critical Information Systems are responsible for supervising the systems, formulating mechanisms for automatic warnings and receipts of warnings of threats to cyber-security, and making plans to deal with those situations. SUPERVISION OF NON-CRITICAL INFORMATION SYSTEMS Non-critical Information Systems may be put under a cyber-security inspection by the Cybersecurity Task Force when there is a violation of cybersecurity law infringing national security or causing serious damages to the social order and safety. The Cybersecurity Task Force may conduct the examination after delivering a written notice at least 12 hours before the examination to the administrator of a Non-critical Information System. The components subject to an examination include software, hardware, digital equipment; data stored, processed and transferred within the system; and State secret protection methods. That having said, the CSL 2018 does not set out clear basis and procedures to determine there is a violation of the CSL 2018. For example, the CSL 2018 prohibits using cyberspace to distorting history, denying revolutionary achievements, destroying the national solidarity block, conducting offences against religion, gender discrimination or racist acts. It would be difficult and arguable to determine an act as distorting history and thus violating that provision. As such, the provisions may create uncertainty for enterprises that provide services in cyberspace and hold customers’ data during their provision of services. CONTENT MONITORING Service providers on the cyber space in Vietnam have to comply with many requirements to monitor content uploaded and disseminated in cyberspace: All websites, portals or specialized pages on social networks of agencies, organizations and individuals must not provide, upload or transmit the information with propaganda against the State, incites riots, or which disrupts security or causes public disorder, causes embarrassment or which is slanderous or violates economic management orders (prohibited content); To verify users’ account registration and to provide users’ information when receiving written requests from the competent authorities of cyber security; To prevent the sharing of information and delete prohibited content within 24 hours upon receiving a request by the Cyber-security Task Force or the MIC, and to archive the relevant system log (nhật ký hệ thống) for investigation purposes; and To cease the provision of service to organizations and individuals who upload prohibited information. It could be very difficult and costly for a network administrator to determine and filter the prohibited content as some of them are ambiguous. For example, the CSL 2018 defines the information being propaganda against the State to comprise content (i) distorting or defaming the people’s administrative authorities; (ii) initiating psychology warfare, inciting invasive war, causing division or hatred between ethnic groups, religions and people of all countries; and (iii) insulting people, the national flag, national emblem, national anthem, great men, leaders, famous people or national heroes. When reading these restrictions, one may be confused, for example, who are considered as “great men”, leaders, famous people or national heroes? whether a new public research with a different viewpoint about achievements of a “national hero” can be considered as insulting the “national hero”? can this regulation deprive the rights of people to criticize the leadership and governance of an administrative system or certain officials of that system? ENFORCEMENT Specialized forces responsible for enforcing the CSL 2018 (Cybersecurity Task Forces) will be appointed under the Ministry of Public Security and the Ministry of National Defense. The Cybersecurity Task Forces have broad power under the CSL 2018 with limited oversight. For example, the Cybersecurity Task Forces is not required to follow the procedures similar to those under the Criminal Proceeding Codes for conducting inspection of an information system or collecting user data and is not required to keep confidential the information that they are collecting. Under the CSL 2018, consequences of violating the laws on cybersecurity may be in disciplinary forms, administrative or criminal responsibilities. In the case of commercial legal entity, when considering whether criminal responsibilities is applicable for its violation of the CSL 2018, the entity should determine whether such violation falls under the scope of crimes applicable to commercial legal entities under the new Criminal Code 2015. CONCLUSION The requirements of the CSL 2018 could increase expenses, compliance responsibilities for and pose a dilemma for service providers between compliance and customer data protection. Many requirements under the CSL 2018 will be subject to further guidance of the Government. Therefore, affected organizations and individuals should keep following the instruments guiding this law.
  13. Guys this is my last hours again thank you for all the support. It been a great time. I never gonna forget about you guy. From Vietnam with love. Aori
  14. Paratroopers?

    Paratroopers is a great Idea myself is a big fan of arvn paratrooper. Maybe if paratrooper available in the future I can bring back the red hat angels sq