No, they activate on the Uplay client.Pardon the ignorance, but how do these FarCry 3 Uplay codes I'm seeing work? Are they Steam activated?
I figured it was something as obvious. Thanks for humoring me.No, they activate on the Uplay client.
This out to get you pretty close.I can't find anyone with this bundle lol. :/
Ya someone sent me a PM about it. Thanks for the heads up . I think it actually includes 1 more then the Humble Bundle .This out to get you pretty close.
http://store.indiegala.com/index.php/the-king-s-war-bundle.html
Our esteemed trader-friend -- DarkCsarX Aka Eren Jaeger -- served up some weak shit that I promptly slapped into a lava pit.
I'm hard as like that.
http://www.cheapassgamer.com/user/387960-darkcsarx/
Am I missing something here? Whats up with Dark? I have dealt with him several times and have had no problems whatsoever. He always sent the codes over first.
[HAVE]
Men of War: Condemned Heroes
Hydrophobia: Prophecy
iBomber Defense Pacific
Renegade Ops Reinforcement Pack (DLC)
Galactic Arms Race
[WANT]
50¢ Each (Paypal Only)
Send me a message if interested in any.
What are you talking about? All I see from the links you posted are his Steam profile and his CAG profile. I don't see any attempt at a scam. At all. Please clarify because calling someone a scammer without proof isn't cool.Look at the link. Go to the link if you must.
"nooooooooooo" Sorry I'm not gullible, mah man. Maybe next time.
What are you talking about? All I see from the links you posted are his Steam profile and his CAG profile. I don't see any attempt at a scam. At all. Please clarify because calling someone a scammer without proof isn't cool.
EDIT1: I see it now. The link to a supposed "new" steam profile is at a site called: steamcoNNMNUITY.COM. This is NOT the Steam community site. Probably a phishing one. However, it is possible that his account was hacked. I don't know.
EDIT2: Actually his account probably was hacked. It follows the basic rule of phishing scams. Same thing happens if your e-mail is hacked.
Step 1: Lure the unsuspecting onto infected site
Step 2: Infect computer
Step 3: Steal login data
Step 4: Use the profile's contacts to infect other machines.
Repeat ad infinitum.