yes, seriously check this http://rathena.org/board/topic/70841-r16771-client-md5-hash-check/?p=139834
long ago, ive read an openkore forum about how to bypass the login pin. and they did bypass it.
hmm, oh yes you're right. here's the thing i did for them not to know my hash. i did use secure grf and next i use Geromes game guard call rocshield, when you use secure grf it will change the hash of your client and then use the rocshield on your client it will also change the hash of your client(but i think it is a fake hash) because when i compute the hash of the client from secure grf & rocshield my server wont let me login, but when i used the hash of the client from secure grf only it let me login. i really dont know what happen, but i think because of the rocshield, the client is given a false hash when you try to compute it using the tool here in rathena,
Do not use two different anti-hack programs. It's overkilling And possibly do not work. And if does work, it will produces a slight lag spikes.
go to your phpmyadmin, install it if you do not have one. go to you your ragnarok db, find the bk_config, find the table row $@BKNextUse and $@BKNextUseVariation. according to the author, the sum of the two row table values are the time allowance on the next interrogation on the same player. $@BKRate if set to 0, it will be disabled. The rates base on my understanding are the chances on how each of the module will be use. for example rates 10% to module 1, rates 50% to module 2 and so on.
I hope I answer your questions well
Edit: I didnt touch the default config for it is already working and stable. So I cannot give you the instructions on how-to, I might misguide you.
hmm, as of now i haven't encounter any problem with my settings, good so far.