Home / the Internet / Computer games / How the cheaters play

How to play cheaters


How to play cheaters</a>

Cheaters - amateurs of computer games, finding in them ways of circumvention of rules. If the game is multi-player or keeps records on the server, this behavior of the player is considered unacceptable.

And in a single-player game running in offline mode, these actions are completely acceptable.



Cheating in computer games arose in theThe era of eight-bit computers and consoles. On consoles used devices for cheating, placed between the cartridge and a slot for it, and making changes to the code on the move as it is read. On the IBM PC with DOS executable game files edited by HEX-editors or used resident programs that change the behavior of gaming. If some game developers struggled with cheating techniques, others - on the contrary, put secret codes in them. Simplify the passage of the game could be by pressing a certain sequence of keys or by moving the joystick. Chetam devoted books, journal articles, and then sites.


Today cheaters' techniques have changed markedly, butSome remained the same. Using the HEX editor, you can also enter changes to the executable file for a modern OS, for example Linux, Mac OS or Windows. But this is not always required, because some games today are distributed on the principle of open source. In this case, you can make changes to the source code of the game, and then recompile. Players who prefer emulators of classical platforms on modern equipment, use "POKE databases" that operate automatically and are updated via the Internet. Still in the course and secret codes, but their developers are now placed in the game much less often than before.


In today's multitasking operating systems,Other, previously impossible techniques. Sometimes, in order to succeed in the game, you need to quickly press the keys in a certain sequence. Not all users are smart enough for this, but you can use a program that simulates this sequence after pressing just one key. Other programs monitor what is happening on the screen, analyze the image and automatically guide the weapon to the target, or, conversely, automatically shoot when the player points the weapon at the target manually. The first are called aimbot, the second is targetbot. There are even bots that assume the gameplay completely for the cheater or almost completely.


Reception, which requires no knowledge of programming,No additional programs - camping. The player comes to a place of the game map, from which it is difficult to see the others, and starts to shoot from there. This method of cheating is ineffective: sooner or later, the rest will notice where it shoots, or read about the location on the map of places suitable for camping.


If the multiplayer game is not conducted throughInternet, and through the local network, and all the machines are located in the same room, you can determine where the other player is, by the sound from his speakers. With this kind of cheating are struggling, using headphones instead of speakers. Poorly versed in programming, players can even use social engineering techniques, such as text messaging (which can be exchanged in many games), provoking rivals who are good at playing but who are not familiar with the interface of the game, pressing dangerous combinations of keys, etc.


Cheater programs can make on-the-goChanges to the data flow transmitted from the client application to the server. Therefore, in some modern games, data is transmitted encrypted. Often, the server is also informed of false information about packet delays, while in fact they come much faster. During these imaginary delays the player can perform actions, the results of which become visible to opponents only afterwards.


Sometimes the server passes the client applicationExcessive information, for example, about what is happening behind the walls, but the client application does not show this to the player. Modification of the client makes it display what was normally hidden from the user. Often, the drawing of walls, as well as other objects on the screen, game developers entrust graphics processor (GPU), located on the video card. Then modify not the client application of the game, but the video card driver, and the walls turn out, for example, to be semi-transparent. There are also cheating programs that allow you to see in the dark, behind your back, quickly spin around your axis, dodging enemy ammunition, etc.


Owners of game servers can take picturesOccurring on the client's screen. But he, in turn, can use the program, replacing the image with another, which has nothing to do with the game. On the one hand, at the same time evidence of the use of certain prohibited methods disappears, and on the other hand - the substitution of the picture itself becomes a prohibited technique, which immediately makes it clear that the player is a cheater.

How to play cheaters Was last modified: June 20th, 2017 By Vuekuemd
It is main inner container footer text