Actually, I can combat that by adding that its automatic adding of any IP connecting that's using a particular DLL, and running it in the process memory on the host machine. It adds any IP before the user even has a chance to connect to the host's server. The attacker can change their IP as many times as they want, that IP will be blocked instantaneously, and so will any other IP that is linked to the injected script that is caught.
This isn't the normal blacklisting of an IP address, it's something a little different, and it's not on the market, its all custom.
Edited:
That is why I wanted to test it out on a server of my own, or a server that will allow me to test it on. It could be of great use if its setup properly. I'd like to mess around with the setting a little bit once I have it all setup on the machine, then it's just the waiting game to see how many people we can get to try to hack our server. It ain't gonna happen..
What happens with other anti-cheat programs is they put all these "chains" on the process/host machine. Then when an attacker tries his luck, he either gets caught or gets around it. But the "chains" that are put up by the program actually disallow it from doing exactly what you'd like it to...
What I have to offer is something that drops all the chains on the host machine, and puts all the walls down so it allows the attacker to try his luck on ours, but oh wait, hes using "example.dll" to inject his script, so we then take action by blocking the rule against that DLL usage. Then next time he tries to connect with a new IP, he gets denied instantly and turned right back around and won't be able to connect, he just gets denied.
That is the main difference with what I use, and what other people use. They have chained down programs, and mine drops everything giving you full control of what your blocking and protecting against. This can also pose a threat to your machine if you are inexperienced and don't know what your doing, that is why you run a test server (since it's in Alpha stage right now) and work out all the correct main DLL's that people are using to get in, then block em out. Then after that its simple monitoring through the alarm console, and rebanning of new DLL's that attackers are using to get in. It's all about the rules you use, and I use very powerful rules to keep people out (for my Minecraft server) and I have yet to be hacked or injected on.
Chances are this wont get looked at by a Mod or someone who has power to do anything about it since there are so many other people throwing similar requests out there and get more views than me. But I think it would be neat if I got a shot at it
Cheers!
