1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
6

Gmod how to make someone admin on a lan server

Computers and Technology
2 answers:
dedylja [7]3 years ago
7 0

Answer:

Garry's Mod is a modification made for the Half Life 2 game (and related games) that lets you manipulate in-game objects and create pictures and videos. If you are running a Garry's Mod server you can issue a command through the in-game console that will let you make another player in the mod into an admin which gives them more powers over what they can do in the server.

Start Garry's Mod, select the server you want to join from the master server list on the screen and double-click on it to enter the server.

Open the administrative console by pressing the tilde key (~).

Type "sv_add_admin /username" into the console where "username" is the username of the player who you want to be an admin.

Press "Enter," then type in your server administrator password and press "Enter" again to make the user an admin.

Explanation:

andrezito [222]3 years ago
4 0
In case you're playing on a local multiplayer server

There is no such thing as admin on a normal local server. You're able to do everything.

In case you're playing on a dedicated server

<span>In the server command prompt, make a RCON command which states: ulx adduser <your user name> superadmin. This will add you as superadmin, using the </span><span>ULX admin addon.</span>
You might be interested in
Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four
PSYCHO15rus [73]

Answer: Find answers in the attachments

Explanation:

3 0
3 years ago
What Active Directory object enables an administrator to configure password settings for users or groups that are different from
e-lub [12.9K]

Answer:

Password Settings object

Explanation:

Active Directory is made up of different services that are aimed at handling the access and permissions to resources over a network. It was developed by Microsoft and was originally used for centralized domain management but has evolved past that now.

In AD, the data stored are also known as Objects, these objects can be

  1. users or a group that has been given passwords and/or
  2. resources such as computers or printers.
  3. Organizational Units (OUs)

The object responsible for handling the configuration of passwords configuration is the Password Settings object.

Here, all settings relating to password setup, configuration, reset and so on takes place here. The settings can be applied to groups or users which can show the complexity, length, history of the password and so on.

8 0
3 years ago
Why is it preferable to code web pages in html format?
Ronch [10]
Depends on what you are working on.

If you are working on a website I recommend Adobe Dreamweaver CC.

if its small assignments that doesnt involve major work, I'd use something like notepad++
8 0
3 years ago
Read 2 more answers
A simple system is to be designed to allow for the selling of old books. There are two different types of users: buyers and sell
Sidana [21]

Answer:

The  UML diagram and the story is shown on the first uploaded image

Explanation:

3 0
3 years ago
A favorite pastime of information security professionals is ____, which is a simulation of attack and defense activities using r
GenaCL600 [577]

Answer:

war gaming

Explanation:

Wargaming in hacking is a cyber security challenge where competitors must exploit or defend a loophole/vulnerability in a system or application or gain or prevent access to a particular computer system, it is in a form of competition but it really helps them in securing systems/application when it arises.

5 0
3 years ago
Other questions:
  • "is it important to have a firewall on a home network
    10·1 answer
  • Which is an example of a screenshot?
    7·2 answers
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • How would you describe the difference between a syntax error and a logic error?
    13·2 answers
  • What does the following code print?
    15·1 answer
  • What is contained in the Open Files section of Shared Folders? ​
    13·1 answer
  • How many 2/8 pound patties can she make from 7/8 of a pound of hamburger
    10·1 answer
  • 7.2.4 Area of Triangle HELP PLEASE!! (JAVA SCRIPT) I WILL WAIT FOR THE SOLUTION.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!