Jump to content

Recommended Posts

@Woodside235, Can you give a little more detail on the situation where it can't attack? I don't think doing this will be easy (I believe it will require separate solutions for the host and clients, for example), so it would be nice to have some context.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
  • Create New...