Quote:
Originally Posted by nexialys
what i would suggest btw, is a policy like the one of corrupted hacks... if a hacker is not responding after X weeks/days, the hack can be overtaken by someone else that want to do the job, ...
|
Generally if an author is contacted via e-mail (I don't know if you meant via the hack's thread or just in general), they will respond either giving permission for you to continue development with the hack or not..