Code: Select all
.chanset #channel ap:limit 10
Code: Select all
tag when posting logs, code
Code: Select all
tag when posting logs, code
Code: Select all
proc ap:cf str {
set str [stripcodes bcruag $str]
}
I'm positive, I have tested it multiple times. I have 2 users on the same host with different idents, the flood-chan is set to 8:10, I got one of them to type 7 times, and the other to type once, and the user that typed once got kicked for flooding.De Kus wrote:are you sure that is the behavior of this script? I quick checked the code and found what I had suggested to him: spam logging of $uhost which is ident@host.com.
i also .chanset * ap:codes r:1 b:1 u:250 c:300 and tested it in various channels, with various ppl trying it. i dont get any errors on the partyline.## 7 ## Control codes.
#
# Use .chanset #channel ap:codes r:<n> b:<n> u:<n> c:<n> (in DCC)
# Example: If you set ap:codes to: r:35 b:35 u:35 c:35
# Then 35 (or more) characters affected by Reverse or Bold or Underline or Color
# will be considered an offence.
# Set default rate here:
lappend ap:udefs {ap:codes "r:1 b:1 u:250 c:300"}
# Control codes punishment method:
set codesf(pmeth) 5
# Control codes ban type.
set codesf(btype) 2
# control codes ban time in minutes. (0 for no ban time)
set codesf(btime) 2
# Control codes kick msg.
set codesf(kmsg) "Excess codes detected. 2 min tempban"