Free

Summary

Extender Information Security 2015 R2, the second release of our an all-in-one security solution for GTA Online, provides a slew of improved options and features after being significantly rewritten and optimized from the original release. As with the original release, Extender Information Security 2015 R2 (or EIS for short) ships as an ASI bundled with with Alexander Blade's native ScriptHookV Library and Loader.

 

Details

Extender Information Security 2015 R2 aims to build on the reliability and security of the original Extender Information Security 2015 with a slew of new under-the-hood features and optimizations. Like the original, Extender Information Security 2015 R2 ships as an ASI bundled with with Alexander Blade's native ScriptHookV Library and Loader.

Key Features of Extender Information Security 2015 R2 include its modular subsystems that can be individually and dynamically enabled or disabled:

  • Player Security System (PSEC)
  • Threat Protection System (TPS)
  • Custom Threat Protection System (CTPS)
  • Network Violation Detection System (NVDS)
  • Player Connection Logging (PCL)

Using the Player Security System (or PSEC), Extender Information Security can help keep players from being tortured or killed with malicious objects attached by other cheaters. Additionally, the PSEC system defends players against having their weapons taken away from them by malicious cheaters. The Threat Protection System (or TPS) enables EIS to help protect players against a known blacklist of cheaters and other threats. Threats can be detected in real-time and quarantined before they even get to spawn. In addition, the Custom Threat Protection System (or CTPS) allows players to custom maintain their own custom danger blacklist so they can keep safe as they spot their own threats when they play, without ever needing to leave the game. The Player Connection Logging (or PCL) system can help keep track of every single player that joined and left their game, making it easier to find threats that try to hop from session to session to cause havoc, and even connect with lost acquaintances.

The Network Violation Detection System (or NVDS) has also been significantly improved and optimized. By using improved analysis tactics in network traffic and improved heuristic algorithms on co-session players, the system is able to swiftly detect other cheaters in the session, with real-time notifications about new and evolving threats, without making any interference with yourself or other players in the session. Optional sample submission can allow Extender Information Security to automatically submit detected cheaters to Extender Information Security Services for analysis to be added to our database of known threats, empowering users with a simple set-and-forget system to ensure better protection for themselves.

All of these subsystems can integrate directly with Extender Information Security Services, a set of cloud services for Extender Information Security, to get features like live updates streamed directly from our servers so that players can remain protected and get threat protection and important security updates without ever having to leave their game.

 

System Requirements

Operating System:

Microsoft® Windows® 7 (with Service Pack 1) / 8 / 8.1 / 10 / 11

Processor:

Intel Core 2 Quad CPU Q6600 @ 2.40GHz (4 CPUs) / AMD Phenom 9850 Quad-Core Processor (4 CPUs) @ 2.5GHz

Storage:

65GB (GTA Online) + Less than 4MB (Extender Information Security)

Memory:

4GB (GTA Online)

Video:

N/A

Network:

Stable 250Kbps or faster Internet recommended

Additional Hardware:

Microsoft® Visual C++ Redistributable 2013 64-bit

 

License

This software product is licensed as proprietary freeware. It can be downloaded and used by anyone, free of charge, and there are no restrictions or limitations on personal or commercial use. Redistribution of the software is allowed, under the stipulation that it is in its unmodified form.

 

Copyright © 2015—2018 DBMXPCA Technologies. All rights reserved.

Copyright © 2015—2018 New Team of Weapons and Tactics Organization. All rights reserved.

All other registered trademarks or trademarks are property of their respective owners.

THIS SOFTWARE IS PROTECTED BY COPYRIGHT LAW AND INTERNATIONAL TREATIES. UNAUTHORIZED REDISTRIBUTION OF THIS SOFTWARE OR ANY PART OF IT WILL RESULT IN SEVERE CIVIL AND CRIMINAL PENALTIES AND WILL BE PROSECUTED TO THE MAXIMUM EXTENT POSSIBLE UNDER THE LAW.

FURTHER, THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

 

Download

Effective January 1st, 2018, all download links permanently defunct at the request of Take-Two Interactive Software, Inc., wholly-owner of Rockstar Games, the software developer and publisher of the parent software for which this software add-on was designed to accompany.