As cheaters play

As cheaters play

Cheaters - the fans of computer games finding in them ways of a circumvention of rules. If the multiplayer game or saves records on the server, such behavior of the player is considered unacceptable. And in the single-user game working in offline mode, these actions are quite valid.

Instruction

1. The cheating in computer games arose during an era of eight-bit computers and prefixes. On prefixes used the devices for a cheating placed between the cartridge and the slot for it, and making changes to the code on the run in process of its reading. On IBM PC with DOS the executable files of games edited HEX editors or used the resident programs changing behavior of game. If some developers of games fought against chitersky receptions, then others - opposite, placed in them confidential codes. It was possible to simplify playing the game clicking of a certain sequence of keys or the movement of the joystick. Devoted to couples books, journal articles, and then and the websites.

2. Today receptions of cheaters considerably changed, but some remained the same. Using the HEX editor, it is possible to enter changes and into the executable file for modern OS, for example Linux, Mac OS or Windows. But it is required not always, some games extend by the principle of open source today. In this case it is possible to make changes to the source code of a game, and then to recompile. The players preferring emulators of classical platforms on the modern equipment use the "POKE databases" existing automatically and updated online. Still in the course and confidential codes, but their developers place in games considerably now less than earlier.

3. In modern multitask OS also others became available, receptions impossible earlier. Sometimes, to achieve success in a game, it is necessary to key quickly in a certain sequence. Not all users are rather dexterous for this purpose, but it is possible to use the program imitating this sequence after clicking of only one key. Other programs monitor the events on the screen, analyze the image and automatically aim weapon at the target or, on the contrary, automatically shoot when the player aims weapon at the target manually. The first are called aimbot, the second - targetbot. There are even bots assuming game process completely for the cheater or almost completely.

4. The reception which is not requiring neither knowledge of programming, nor additional programs - a kempering. The player comes to such place of the game card from where it it is badly visible to others, and begins to shoot from there. This way of a cheating is inefficient: sooner or later the others will notice from where it shoots, or will read about arrangement on the map of the places suitable for a kempering.

5. If the multiplayer game is played not online, and through a local area network, and all machines are located in one room, it is possible to define where there is other player, on a sound from its columns. Fight against this type of a cheating, using earphones instead of columns. The players who are badly understanding programming can even use methods of social engineering, for example text messages (exchange of which is possible in many games), provoking the rivals who are well playing, but it is not enough acquaintances with the interface of a game, on clicking of the dangerous keyboard shortcuts, etc.

6. Chitersky programs can make changes to the data stream transferred from the client application to the server on the run. Therefore data are transferred in some modern games encrypted. Quite often also the server is given false information about delays of passing of packages while actually they come much quicker. During these imaginary delays the player can perform operations which results become visible to rivals already then.

7. Sometimes the server transfers to the client application the redundant information, for example, on what occurs behind the walls, but the client application does not show to the player of it. Modification of the client forces it to show what in the normal mode disappeared from the user. Quite often plotting of walls, as well as other screen objects, developers of games charge to the graphic processor (GPU) located on the video card. Then modify not the client application of a game, but the driver of the video card, and walls are, for example, translucent. There are also chitersky programs allowing to see in the dark behind the back, quickly to rotate round its pivot-center, turning aside from the opponent's ammunition, etc.

8. Owners of game servers can photograph the events on the client's screen. But that, in turn, can use the program substituting the image on another which does not have any relation to a game. On the one hand, at the same time proofs of application of any given low blows vanish, and with another - substitution of the picture in itself becomes low blow on which it is clear at once that the player - the cheater.

Author: «MirrorInfo» Dream Team


Print