Knowledge (XXG)

Cheating in online games

Source đź“ť

369:
the Ethernet cord going to the client, causing a disruption in the player's internet connection. Other methods, called a software or wireless lag switch, involve using a computer program. In this method, the cheater runs an application on a computer connected to the same network as the client. The application hogs the network bandwidth, disrupting the communication between the client and its server. However, one cannot do this for an unlimited amount of time. At some point, if no traffic is being received, most game clients and/or game servers will decide that the connection has been lost and will remove the player from the game. In some P2P games, it can result in all players lagging or being disconnected from the game.
360:
server, while their own client queues up the actions performed. The goal is to gain advantage over another player without reciprocation; opponents slow down or stop moving, allowing the lag switch user to easily outmaneuver them. From the opponent's perspective, the player using the device may appear to be teleporting, invisible or invincible, while the opponents suffer delayed animations and fast-forwarded game play, delivered in bursts. Some gaming communities refer to this method as "tapping" which refers to the users "tapping" on and off their internet connection to create the lag.
799:
or during runtime. This is the moment at which an attacker will breakpoint, reverse, and inject custom code. Runtime decryption may also add significant processing overhead and lower the game's framerate. Alternatively, some solutions focus on obfuscating the code by inserting jump statements and seemingly random instruction paths. The final and strongest alternative is virtualization. In this approach the encrypted code runs on a virtual CPU that can be markedly different from generic x86 and x64 CPUs as the command set can be unique for each protected file.
259: 655:
checking will synchronize all of the clients with all of the information about all of the other clients. The server will be very fast, but any wallhack program will reveal where all the players in the game are, what team they are on, and what state they are in — health, weapon, ammo etc. At the same time, altered and erroneous data from a client will allow a player to break the game rules, manipulate the server, and even manipulate other clients.
449: 2865: 517:
addition to modifying a console or its controller, it is possible to achieve a similar effect on the PC by binding the firing button to the scroll wheel of a mouse, or by using a macro setting that will simulate rapid key presses automatically. However, most games limit the rate at which weapons can be fired, regardless of how fast a player presses the button, in order to limit this form of cheating.
1039:. Parts of their claims were settled via arbitration with Bungie being awarded $ 4.3 million, but a jury trial found for Bungie on copyright infringement claims, and while Bungie was awarded around $ 60,000 based on revenue made by AimJunkies, it was the first time that a jury trial had ruled on cheat software for video games, potentially setting future case law for further challenges. 113: 72: 175: 850:
the need for banning game community members as cheats simply do not work. Additionally, strong prevention mechanisms can stop many game hackers from targeting the game because of elevated skill requirements. Compared to pattern detection systems, sandboxing is generally not privacy invasive, as the approach requires no data to be uploaded to foreign back-end systems.
467:
players could be seen moving around in what appears to be empty space. Complete map hiding offers no advantage to a cheater as they would be unable to navigate the invisible map pathways and obstacles. However, if only certain surfaces are made transparent or removed, this leaves just enough of an outline of the world to allow the cheater still to navigate it easily.
536:
often issue sanctions against players found to be exploiting. There is some contention by exploiters that exploiting should not be considered cheating as it is merely taking advantage of actions allowed by the software. Some players view exploiting as a skill because certain exploits take a significant amount of time to find, or dexterity and timing to use.
617:
providing a player or team with an advantage by outfitting them with better (or more familiar) weapons or equipment, or creating a play field that caters to a certain player, team or playing style. Many games prevent this by preventing players from joining a team with more players than the opposing side, forcing newcomers to balance the teams.
251: 825:
that it cannot always be clear whether or not a player is cheating. Highly skilled players can for example develop such a map sense that they may end up being flagged for the use of a wallhack and/or aimbot. On the other hand, players may also cheat in a way that is under the detection thresholds and remain uncaught.
838:
has shown that keeping detection-based systems up to date is relatively slow and labor-intensive as one needs to constantly track down cheats and update detection patterns. End–users may also be concerned with privacy issues, such as has been the case with VAC (Valve Anti-Cheat) accessing browsing history.
952:
In general kicking is perceived as a mild punishment, serving as a warning for the player in question. Some anti-cheat systems may decide to kick players out of a game server when the system integrity cannot be enforced nor be determined with certainty. Other anti-cheat methods may also utilize kicks
828:
To reduce the amount of false positives, statistical detection systems are often combined with a supervision system that either is community driven or managed by a professional administrator team. In such implementations unusual player behavior can trigger a client-side component to create and upload
802:
The shared weakness of protectors and virtualizers is that they impact performance, either by requiring decryption or by introducing unnecessary CPU instructions. To reduce the overhead code virtualizers are often only used to secure the critical parts of the code base, such as those interfacing with
516:
In many games, weapons can be fired in burst fire or single shot fire modes. Modifying a controller or keyboard/mouse to gain the advantage of having a faster firing weapon than the standard player can be considered a method of cheating. These modifications can create an imbalance within the game. In
346:
Some servers allow inactive players to spectate, watching the game from the viewpoints of the active players. Recording of gameplay actions is also often possible. If someone was using a targeting aimbot, the bot would be obvious to the spectator as unnatural exact position tracking. Some aimbots and
994:
Historically, some game companies have also taken legal measures against individuals that have created and sold cheating tools in video games as a means to curb their use. Anti-cheat experts have argued that it is particularly important to take legal steps against entities who profit from making and
903:
Some game publishers may decide to try to permanently ban players who are persistent in cheating and ruining the game community. Such bans are typically placed based on hardware ID or IP address. Consequently, cheaters may develop ways of getting around these bans, by either playing through proxy or
849:
a software process can protect against potentially malicious actions such as code injection and memory modifications that would otherwise tamper with the game. One of the key benefits of sandboxing is that it can effectively prevent the underlying cheat mechanisms from working, and thereby can avoid
798:
Encryption solutions will encrypt the code instructions and typically use a multi–layered defense mechanism against any reversing or tampering attempts that target the decryption code directly. Most protection systems in this category encrypt the code and then decrypt it at the application's startup
654:
game design. It means that no information sent from a client should be accepted by a server if it breaks the game rules or the basic mechanics of the game, and that no information should be sent to a client unless it is "need-to-know." For example, a server with no rule enforcement or data integrity
625:
Scripting is the use of a program or game feature to automate certain actions or behaviors. The use of scripts may or may not be considered cheating, depending on the behavior involved, and whether said behaviour is replicable without the use of such script. A script may give the user unusually fast
580:
Most games allow other participants to observe the game as it is played from a variety of perspectives; depending on the game, perspectives allow an observer a map overview or attach a "camera" to the movement of a specific player. In doing so, the observer can communicate with an accomplice using a
571:
player versus player, a type of multiplayer interactive conflict). Most MMORPGs tolerate it, provided that the twinked character is not used in PvP combat against non-twinked characters. Often limits on twinking are placed into the game, usually through strict level or stat requirements to equip the
935:
In some cases a ban may not be permanent and will expire after a certain period of time. Suspensions are commonly used as a punitive measure for abuse of game glitches, harassing players, or benefiting from hacks. Temporary bans may also be utilized in case a violation cannot be fully proven, as is
772:
Server-side game code makes a trade-off between calculating and sending results for display on a just-in-time basis or trusting the client to calculate and display the results in appropriate sequence as a player progresses. It can do this by sending the parts of the world state needed for immediate
736:
There are many facets of cheating in online games which make the creation of a system to stop cheating very difficult; however, game developers and third-party software developers have created or are developing technologies that attempt to prevent cheating. Such countermeasures are commonly used in
679:
Rather than modifying the game code (which the game itself or a 3rd-party protection system may detect), some cheats modify underlying system components. An example of this is graphics driver modifications that ignore depth checking and draw all objects on the screen—a primitive wallhack. System or
507:
points. Certain games also have a 'disconnect delay' period before the player can disconnect that can last 10–30 seconds. This prevents a player from instantly disconnecting if they are about to die or lose. In some games, if a player disconnects they can receive a warning or even get locked out of
493:
Players will set up multiple accounts to play against each other. Usually, the primary account will be allowed to win through a deliberate lack of resistance from the secondary account(s) due to those accounts being unplayed or those players agreeing to lose. Some players will reverse roles between
990:
In recent years, countries including South Korea and China have criminalized the sale or use of cheats in video games. In South Korea, cheaters could be punished with up to 5 years in jail or fines exceeding $ 40,000. The presence of cheaters in online games may push away the legitimate playerbase
837:
Pattern detection systems scan the player's hard drives and system memory for known cheat code or programs. Compared to statistical detection the key advantage is that also the subtle cheaters are detected. Other than this, a pure pattern detection approach generally has few advantages. Experience
768:
Generally, the better the server is at enforcing the rules, the less of a problem cheating will be in the game. In this approach all client functionality either runs purely on the game server or alternatively the game server mirrors the client gameplay and continuously validates the game state. In
502:
In games where wins and losses are recorded on a player's account, a player may disconnect when they are about to lose in order to prevent that loss from being recorded. This is usually done by activating known in-game glitches or through third-party sources via "IP booting" (a feature of firewall
466:
World-hacking relies on the fact that an FPS server usually sends raw positional information for all players in the game, and leaves it up to the client's 3D renderer to hide opponents behind walls, in plant foliage, or in dark shadows. If the game map rendering could be turned off completely, all
368:
hardware have started to introduce built-in protection against lag switches in the form of voltage detectors, which detect a change in voltage when the switch is flipped. Some manufacturers have taken counter measures to bypass or trick this detector. This can also be achieved by simply unplugging
359:
In the peer-to-peer gaming model, lagging is what happens when the stream of data between one or more players gets slowed or interrupted, causing movement to stutter and making opponents appear to behave erratically. By using a lag switch, a player is able to disrupt uploads from the client to the
824:
Anomalies in player behavior can be detected by statistically analyzing game events sent by the client to the server. The benefit is that this anti–cheat method is non–intrusive to the player's privacy and guaranteed to work on all end–user system configurations. The restriction of this method is
342:
Aimbotting relies on each player's client computer receiving information about all other players, whether they are visible from the player's position or not. Targeting is a matter of determining the location of any opponent relative to the player's location and pointing the player's weapon at the
811:
Spectator functionality can allow server administrators to monitor individual players and thereby determine whether or not a cheat is in place. One risk of the spectator mode is that in competitive matches the spectator could abuse the mode for spying on specific players and communicating player
592:
as an active player, on the grounds that they are probably in close physical proximity; when all players from a single IP address are no longer active participants, they are all allowed to observe. However, this restriction can be easily evaded if there are multiple IP addresses available at one
566:
Twinking is the act of transferring gear intended for higher level characters to lower level characters that would be incapable of obtaining the gear on their own. Twinked characters have a huge advantage over non-twinked characters, as well as the rest of the game world. This is usually used by
535:
that gives the player an advantage not intended by the game design. Exploiting is generally considered cheating by the gaming community at large due to the unfair advantage usually gained by the exploiter. Most software developers of online games prohibit exploiting in their terms of service and
436:
objects through the fog that would not normally be visible. In multiplayer modes, this allows for a distinct advantage against the other players who are subject to the intended settings. The advantage gained can be substantial, especially for the average real-time strategy games that rely on the
363:
The term "lag switch" encompasses many methods of disrupting the network communication between a client and its server. One method is by attaching a physical device, called a hardware lag switch, to a standard Ethernet cable. By flipping the switch on and off, the physical connection between the
462:
World-hacking may also allow a player to see through solid or opaque objects and/or manipulate or remove textures, to know in advance when an opponent is about to come into targeting range from an occluded area. This can be done by making wall textures transparent, or modifying the game maps to
785:
were restricted by limited available resources such as storage, memory, internal bandwidth, and computational capacity due to the technologies available and the cost of the hardware, coupled with internet connections that were slow, it was believed to be necessary to compromise on security for
616:
Stacking involves altering game settings or team lineups to give one or more teams an unfair advantage over others. One example includes arranging a team composed of skilled or professional players against a team with members of lesser skill. Less ethical rigging involves weighting the game by
347:
triggerbots attempt to hide from spectators the fact they are being used through a number of methods, such as delaying firing to hide the fact it shoots the instant an opponent is in the cheater's crosshair. Some triggerbot programs can be easily toggled on and off using the mouse or keyboard.
301:
As methods of cheating have advanced, video game publishers have similarly increased methods of anti-cheating, but are still limited in their effectiveness. Punishments for cheaters also have various forms, with legal measures also being taken against those who create or use cheats. While some
646:
gaming model, clients run equal code but are still subject to most of the same type of cheats found in the client–server multiplayer model; however, the peer-to-peer multiplayer model has been deprecated in favor of the client–server model with the wider adoption of high-speed networks.
794:
Additionally to storing data in non-standard formats, some games also utilize runtime protection through software protectors. The key target is to keep attackers from directly inspecting or modifying compiled software. Protectors utilize any of three methods to protect software.
473:
released wireframe display drivers in 2001 that enabled players to use wallhacks, announcing the settings as "special weapons" that users could employ in multiplayer games. In a poll by the Online Gamers Association, 90% of its members were against the release of the drivers.
708:
Some computer and console devices sold under the guise of "accessibility peripherals" have been used to gain unfair advantages over other players of games, such as eliminating recoil completely and boosting aim assistance, and some may even include additionally downloadable
815:
Some games have systemized player supervision by allowing the community to review reports of disruptive behavior, determine whether those reports are valid, and apply temporary bans if appropriate. Reports can include data such as screenshots, videos, and chatlogs.
973:
When a violation is the result of farming or stat-padding, it may be too severe of a punishment to suspend or ban players. Some games, therefore, implement a system of demotion in which the offender is moved to a lower rank (demoting), the opposite of a promotion.
777:
under bandwidth constraints, or sending the player the entire world state, which results in faster display for the player under the same bandwidth constraints, but exposes that data to interception or manipulation—a trade-off between security and efficiency.
293:
online games, but it is difficult to measure. Various methods of cheating in online games can take the form of software assistance, such as scripts and bots, and various forms of unsporting play taking advantage of exploits within the game. The Internet and
389:; the outgoing packet is forged by attaching a time-stamp that is prior to the actual moment the packet is sent, thereby fooling other clients into thinking that the action was sent at the correct time, but was delayed in arrival. A partial solution is the 907:
Some companies and leagues ban suspected cheaters by blacklisting specific installation or serial keys, or user accounts, meaning that the player is effectively prevented from playing the game online. Certain games are known to identify cheaters and
882:
started cracking down on the users of these peripherals, with Activision updating its RICOCHET cheat detection software to detect such devices, while Bungie has just announced that while they are fine with using peripherals for the sake of genuine
427:
games is the player's partial limitation or complete inability to see beyond the visibility range of individual game objects that are under their ownership (typically units and structures); this concept is controlled by a mechanism known as the
372:
Simpler methods are firewall or router rules that apply bandwidth shaping and network latency, a cheat is able to adjust limits on both bandwidth and latency to stay relevant to a P2P network yet have considerable advantage over other players.
786:
optimization to minimize the impact on the end-user. Today however, with the increased speed and power of multi-core computers, lower-priced hardware, and the increased availability of broadband internet, this has become less of an issue.
381:
Look-ahead cheating is a method of cheating within a peer-to-peer multiplayer gaming architecture where the cheating client gains an unfair advantage by delaying their actions to see what other players do before announcing its own action.
769:
many mobile games, it is a common practice to run the client game sessions synchronously on the server, using exactly the same user input. The client session is reset when the game sessions become unsynced, thereby preventing cheating.
1046:
as the reason for the lawsuit. While some argue against the merit of this claim, grounds for copyright infringement include damaging the company's intellectual property, affecting the experience of other users, and circumventing the
2583: 350:
Cheat suites may incorporate these in addition to other features, including adjustments to extrasensory perception, move speed, ammo count, and player radar. Neophytes may colloquially define these suites as aimbot programs.
956:
Some games may also provide the community with the option of voting for particular players to be kicked. Such a system provides the power to self-regulate and effectively get rid of abusive players without depending on
503:
software). Some players do this if they feel their opponent is being unfair. Some games implement a disconnection penalty, usually by recording the disconnect as a loss, a deduction of experience, or even
585:, third party communication, or even off-line) to inform friendly players of traps or the position of opponents. An observer can be an active player, using a separate computer, connection and account. 724:
players are matched with other console players. A console peripheral allowing the use of mouse and keyboard can be used to trick the console system to provide additional aim assistance provided to
858:
Anti-cheat software commonly use low-level system interfaces not intended by the OS vendor for public use. As a result, they are a common source of incompatibilities with newer versions of
760:
Exploits of bugs are usually resolved/removed via a patch to the game; however, not all companies force the patches/updates on users, leaving the actual resolution to individual users.
1937: 874:
With the additional scrutiny directed towards the rising popularity of the third-party peripherals being used to gain unfair advantages in competitive games, game developers such as
866:. For example, Windows enables Hypervisor-protected Code Integrity (HVCI) by default in every market except Chinese and Korean installations due to anti-cheat compatibility issues. 339:
to the player. They are sometimes used along with a triggerbot, which automatically shoots when an opponent appears within the field-of-view or aiming reticule of the player.
626:
firing rate, unobtainable otherwise, or may perform seemingly trivial tasks such as reloading. Some scripts can also tamper with other players' systems by spoofing commands.
982:
In several games where points are used, if a player is caught cheating they will get their score reset to the base value that is applied when a new player joins the server.
1643: 696:). Interception can be passive or result in active manipulation; either method can be performed on the client machine itself or via an external communication proxy; some 463:
insert polygonal holes into otherwise solid walls. This variation is commonly known as a "wallhack" since it basically allows to the player to see enemies through walls.
2823: 2394: 2813: 1767: 1409: 1295: 2892: 2303: 302:
countries include laws that prohibit and punish cheating, video game companies have a history of citing copyright infringement in lawsuits against cheaters.
1794: 1461: 2251: 915:
While game publishers are known to ban players employing cheats, the actual number of players banned is usually not revealed. Exceptions to this include
812:
positions and tactics to the opposing team. Some games get around this limitation by not allowing spectator mode at all, or by delaying the video feed.
2866:
Notice of the National Press and Publication Administration on Further Strict Management and Effective Prevention of Minors' Addiction to Online Games
1607: 85: 1178: 2686: 2590: 2450: 2899: 2715: 1248: 2223: 927:, known for banning cheaters in batches, and publicising the number of banned accounts, presumably in order to discourage others from cheating. 2195: 2681: 2340: 2327: 1582: 1221: 671:
is possible. Also game data files can be edited separately from the main program and thereby circumvent protections implemented in software.
1945: 2703: 2387: 1509: 2828: 2652: 1994: 1557: 1270: 2956: 2414: 1746: 237: 219: 156: 99: 2279: 2031: 1862: 1491: 912:" them by placing them in matchmaking with other cheaters only, so as not to let the cheaters know that they have been identified. 123: 2150: 1844: 2946: 2747: 2545: 1826: 1048: 991:
and reduce overall profits in the industry, leading to game developers working with legislative bodies or enforcement agencies.
2597: 2380: 1968: 548:. With rare exception, this has no direct effect on the gaming experience of other players; instead, it is a violation of most 2099: 2838: 1888: 1350: 405: 279: 2169: 2759: 2511: 2497: 1664: 1628: 1434: 1100: 567:
players who wish to create a new character, either to help them level more rapidly or to gain an unfair advantage in PvP (
433: 91: 298:
can provide players with the methodology necessary to cheat in online games, with software often available for purchase.
2504: 2436: 1122: 961:
or other anti-cheat methods. Even though vote kicking brings many benefits, it may also serve as a tool for trolling or
1413: 1019:
sued Bossland GMBH for distributing software hacks for several of its games, and was awarded $ 8.5 million in damages.
278:
subverts the rules or mechanics of the games to gain an unfair advantage over other players, generally with the use of
38: 2951: 2125: 1388: 846: 680:
driver modification is harder to detect, as there are a large number of system drivers that differ from user to user.
650:"Never trust the client" is a maxim among game developers (as well as other developers) that summarizes the model of 343:
target. This targeting works regardless of whether the opponent is behind walls or too far away to be seen directly.
138: 1299: 1151: 2708: 2698: 1539: 667:
which forbid modification. While game software distributed in binary-only versions makes it harder to modify code,
664: 549: 1202:
Consalvo, Mia; Vazquez, Irene Serrano (January 2014). "Cheating, Social Network Games and the Role of Platforms".
134: 2818: 1804: 1029:
have sued two cheaters partnered with AddictedCheats, who offer cheating services for a variety of online games.
283: 1458: 887:, they are ready to take countermeasures if they detect players using these devices to gain unfair advantages. 2781: 2754: 2730: 2660: 2553: 2403: 710: 693: 2362: 1366: 635: 1768:"Gabe takes to Reddit to clear up Valve Anti-Cheat rumours; "Do we send your browsing history to Valve? No."" 2618: 1065: 594: 544:
The term farming may refer to the practice of garnering achievements or virtual property for the purpose of
526: 432:. World-hacking usually enables the user to bypass this mechanism, either by removing it entirely and/or by 263: 2843: 2791: 2635: 2613: 1043: 1016: 916: 688:
The security of game software can be circumvented by intercepting and/or manipulating data (divided into "
597:
on their computer, thus enabling their computer screen to be viewed by select other players in real time.
290: 1009:
successfully sued the LeagueSharp service, which offered a subscription-based hacking service for Riot's
2961: 2786: 2676: 2645: 2483: 1912: 386: 2074: 2913: 2737: 2720: 2578: 2539: 417: 328: 185: 2906: 2623: 2443: 2352: 1477: 1060: 668: 488: 438: 413: 258: 458:, where players concealed in the corridors to the left and right are indicated with red rectangles 2920: 2725: 2419: 2027: 1227: 721: 424: 365: 332: 651: 1517: 266:(ESP) hack showing the health, name and bounding box of an entity that is not otherwise visible 2870: 2336: 2323: 1658: 1622: 1346: 1217: 1080: 1011: 717: 504: 390: 324: 1435:"Gartner Says 17 Countries to Surpass 60 Percent Broadband Penetration into the Home by 2012" 965:
by allowing for legitimate players to be removed out of the game through the voting process.
2853: 1207: 1070: 859: 750: 601: 409: 1704: 1465: 863: 754: 725: 582: 545: 195: 2019: 604:
to observe the player and their team's position and stats. This is often referred to as
2559: 2525: 1678: 909: 689: 605: 588:
Some systems prevent inactive players from observing the game if they are on the same
448: 191: 2940: 2875: 2848: 2693: 1152:"How to Hurt the Hackers: "The Scoop on Internet Cheating and How You Can Combat It"" 996: 884: 692:") in real-time while in transit from the client to the server or vice versa (i.e. a 638:, the server is responsible for information security and enforcing game rules. (See " 1583:"Bungie announces major crackdown on third-party peripheral cheaters, bans incoming" 593:
location (a common feature of broadband subscriptions), or if the observer installs
2833: 2490: 2476: 1389:"Wired Magazine: 16.12, The Decline and Fall of an Ultra Rich Online Gaming Empire" 1231: 643: 532: 442: 2151:"JUDGMENT by Judge Michael W for Nexon America Inc et al v. Gameanarchy LLC et al" 1410:"Twinking Is Just Another Form Of Cheating | We Fly Spitfires - MMORPG Blog" 895:
Game publishers can implement a wide array of consequences for cheating players.
282:. What constitutes cheating is dependent on the game in question, its rules, and 2742: 2469: 1995:"'Call Of Duty: Warzone' players report being shadowbanned despite not cheating" 1001: 782: 454: 336: 271: 61:
Practice of subverting video game rules or mechanics to gain an unfair advantage
2126:"The four kinds of video game cheaters (and what developers can do about them)" 1438: 600:
Additionally, this may be used against players livestreaming to platforms like
385:
A client can cheat using this method by acting as if it is suffering from high
2532: 2457: 1020: 1006: 879: 746: 589: 429: 2252:"Blizzard awarded $ 8.5M in damages following copyright infringement lawsuit" 1459:
https://www.contrib.andrew.cmu.edu/~ayahyavi/files/Yahyavi-CSUR13-P2PMMOG.pdf
572:
item. Circumventing these level requirements would then be further cheating.
2256: 2228: 2200: 1799: 1156: 1035: 862:
and security measures as well as alternative OS API implementations such as
742: 2372: 1212: 999:
for operating GameAnarchy, a popular subscription based cheat provider for
286:
opinion as to whether a particular activity is considered to be cheating.
250: 2858: 2774: 2640: 1772: 1075: 1025: 738: 561: 275: 2304:"A jury hands Bungie a landmark victory in a Destiny 2 cheating lawsuit" 1249:"South Korea cracks down on cheaters with law targeting illicit game mo" 1123:"Medal of dishonour: why do so many people cheat in online video games?" 17: 2769: 2518: 2053: 962: 924: 716:
Some games use different pools for matchmaking purposes, for instance,
295: 1042:
Often, game company lawsuits against cheaters or cheat providers cite
2224:"Blizzard seeks $ 8.5M from hack-maker Bossland over DMCA violations" 1679:"Watch Dogs 2 Anti-Cheat System Preventing Users from Playing Online" 1540:"Simple techniques against cheating using SpatialOS - Improbable IMS" 1320: 1030: 875: 697: 1725: 1005:, and lost, Nexon being awarded $ 1.4M in damages. In January 2017, 141:. Statements consisting only of original research should be removed. 2170:"'League of Legends' creator wins $ 10 million in cheating lawsuit" 953:
as an instant punishment for presumably unfair game play behavior.
904:
VPN servers, or spoofing or changing their hardware configuration.
2764: 2366: 920: 447: 257: 249: 188:, speculative material, or accounts of events that might not occur 2196:"Riot awarded $ 10 million following lawsuit against LeagueSharp" 995:
selling cheats. In April 2013, coder DrUnKeN ChEeTaH was sued by
2463: 1478:
https://pdos.csail.mit.edu/archive/6.824-2005/papers/p2p-mmg.pdf
663:
Many cheats are implemented by modifying game software, despite
470: 2376: 2359:
The Electronic Library, volume 20, number 2, pages 87–97, 2002.
1610:. The Inquirer. Archived from the original on December 3, 2013 168: 106: 65: 1179:"Report: Cheating Is Becoming A Big Problem In Online Gaming" 1863:"'Call of Duty' can detect and ban XIM-style cheat hardware" 1204:
2014 47th Hawaii International Conference on System Sciences
1889:"Call of Duty is the latest to detect and ban XIM cheaters" 1646:. the Inquirer. Archived from the original on April 8, 2011 2280:"Epic Games Taking Legal Action Against Fortnite Cheaters" 1827:"An update on Easy Anti-Cheat support for Wine and Proton" 639: 531:
Exploiting is the application of an unintended feature or
445:
out individual objects' varying strengths and weaknesses.
2100:"Inside The 'World's Largest' Video Game Cheating Empire" 1271:"Can cheating on a video game be copyright infringement?" 2093: 2091: 1558:"Destiny 2 is cracking down on Cronus and XIM cheating" 201: 130: 42: 1412:. Blog.weflyspitfires.com. 2009-09-17. Archived from 1145: 1143: 552:
and could devalue the virtual property being farmed.
494:
games, giving each account an equal win–loss record.
364:
client and the server is disrupted. The designers of
1492:"Have hackers and cheats ruined The Division on PC?" 737:
video games, with notable anti-cheat software being
2884: 2802: 2669: 2606: 2569: 2428: 2353:
Aspects of Networking in Multiplayer Computer Games
1969:"Twitch streamer Aydan "shadow-banned" in Warzone" 2369:'s anti-cheat research initiative and technology. 1845:"Hypervisor-protected Code Integrity enablement" 1015:, with a $ 10 million award to be paid to Riot. 1510:"Gaffer on Games | Never Trust the Client" 720:players are matched with other PC players, and 1644:"More on Intel anti-cheat technology revealed" 2388: 1269:Firm, On Behalf of The Russell (2022-01-06). 581:secondary communication methodology (in-game 331:games to provide varying levels of automated 8: 2893:Brown v. Entertainment Merchants Association 2098:Franceschi-Bicchierai, Lorenzo (June 2021). 1343:Algorithms and Networking for Computer Games 936:common with anti-cheating methods based on 100:Learn how and when to remove these messages 26: 2806: 2395: 2381: 2373: 2322:, Hoglund, Greg, 2008, Pearson Education, 1033:had sued AimJunkies for cheats related to 204:by removing unsourced speculative content. 2333:Cheating: Gaining Advantage in Videogames 2075:"Griefing and voting in Competitive CSGO" 1211: 1051:, which could be applied to video games. 238:Learn how and when to remove this message 220:Learn how and when to remove this message 157:Learn how and when to remove this message 764:Authoritative and mirrored server design 32:This is an accepted version of this page 1091: 1049:Digital Millennium Copyright Act (DMCA) 958: 937: 28: 1656: 1620: 1023:, producers of the battle royale game 941: 412:to exploit bugs and to view more of a 1551: 1549: 1341:Jouni Smed and Harri Hakonen (2006). 1321:"What Our Competitors Won't Tell You" 732:Anti-cheating methods and limitations 640:Anti-cheating methods and limitations 7: 2900:Entertainment Software Ass'n v. Foti 1967:Patterson, Calum (6 February 2021). 1264: 1262: 1243: 1241: 1101:"What Type of Game Cheater Are You?" 773:display, which can result in client 684:Packet interception and manipulation 2829:Family Entertainment Protection Act 1642:Charlie Demerjian (June 24, 2007). 1367:"ASUS releases games cheat drivers" 753:(specifically used on games on the 2335:, Consalvo, Mia, 2007, MIT Press, 2222:McAloon, Alissa (March 15, 2017). 2034:from the original on 18 April 2015 1724:Oreans Technologies (2015-06-22). 1121:Stuart, Keith (24 February 2021). 57: 2585:California v. Activision Blizzard 2415:List of controversial video games 2250:McAloon, Alissa (April 4, 2017). 2194:McAloon, Alissa (March 3, 2017). 2124:Totilo, Stephen (23 March 2022). 1993:Singh, Surej (30 December 2020). 1913:"This Week at Bungie - 4/13/2023" 1803:. 5 November 2014. Archived from 1766:Peel, Jeremy (19 February 2014). 1726:"Themida technology introduction" 1150:Pritchard, Matthew (2000-07-24). 512:Rapid Fire Modifications (Macros) 81:This article has multiple issues. 1490:Stanton, Rich (April 26, 2016). 1323:. Premium Lag. September 3, 2009 704:Third-party hardware peripherals 508:online play for a short period. 173: 111: 70: 642:" below for drawbacks.) In the 89:or discuss these issues on the 2839:Truth in Video Game Rating Act 1387:Dibbell, Julian (2008-11-24). 870:Third-party hardware detection 803:the game state and rendering. 757:platform), and EasyAntiCheat. 1: 2498:Super Columbine Massacre RPG! 1606:Wily Ferret (June 22, 2007). 1556:Lowry, Brendan (2023-04-14). 1437:. Gartner.com. Archived from 1099:Clive Thompson (2007-04-23). 2814:Intellectual property rights 2168:Fingas, Jon (6 March 2017). 2155:Justia Dockets & Filings 1369:. The Register. May 10, 2013 675:System software modification 306:Bots and software assistance 289:Cheating is present in most 184:possibly contains unsourced 2278:Stewart, Sam (2017-10-12). 2054:"Voting in Team Fortress 2" 1745:Eddie Makuch (2014-12-15). 1298:. About.com. Archived from 137:the claims made and adding 2978: 1887:Warren, Tom (2023-04-04). 559: 524: 486: 196:reliable published sources 2824:1993 U.S. Senate hearings 2819:Video Recordings Act 1984 2809: 2687:regionally censored games 2410: 1936:Tryst (16 January 2015). 1663:: CS1 maint: unfit URL ( 1627:: CS1 maint: unfit URL ( 1608:"Intel plays tattle-tale" 1581:Clark, Tim (2023-04-13). 700:incorporate this method. 355:Artificial lag/lag switch 2957:Video game controversies 2661:Corrupted Blood incident 2554:Digital Homicide Studios 2404:Video game controversies 1795:"RoboShield description" 694:man-in-the-middle attack 630:Implementation of cheats 39:latest accepted revision 2947:Cheating in video games 2619:Cheating in video games 2320:Exploiting Online Games 1705:"The Server is the Man" 1296:"What Is a Lag Switch?" 1066:Cheating in video games 595:remote desktop software 527:Exploit (online gaming) 311:Aimbots and triggerbots 264:extrasensory perception 254:A video game cheat menu 2844:Video Game Decency Act 2636:Death of Brandon Crisp 2614:Blitzchung controversy 1213:10.1109/HICSS.2014.216 1206:. pp. 1687–1694. 1044:copyright infringement 1017:Blizzard Entertainment 917:Blizzard Entertainment 891:Penalties for cheating 854:System incompatibility 659:Game code modification 483:Boosting / Win trading 459: 327:most commonly used in 267: 255: 190:. Information must be 2704:Gender representation 2646:2017 Wichita swatting 2020:"Mapplestory banlist" 1938:"Nexon hardware bans" 1747:"Halo spectator mode" 1275:www.russellfirmip.com 942:statistical detection 451: 416:than intended by the 261: 253: 2914:Epic Games v. Google 2656:match fixing scandal 2591:ABK Workers Alliance 2572:workplace misconduct 2540:Six Days in Fallujah 1441:on December 17, 2008 829:reports for review. 790:Software obfuscation 329:first-person shooter 280:third-party software 2907:Epic Games v. Apple 2607:Other controversies 1807:on 30 November 2016 1255:. December 2, 2016. 1061:Cheating in esports 669:reverse engineering 636:client–server model 489:Video game boosting 439:rock paper scissors 423:A common aspect of 406:third-party program 29:Page version status 2952:Esports techniques 2921:Strickland v. Sony 2726:Simulator sickness 2420:Video game culture 2363:Fair Online Gaming 2028:Nexon America Inc. 1849:docs.microsoft.com 1685:. 30 November 2016 1464:2017-08-29 at the 1294:Bradley Mitchell. 1177:Granados, Nelson. 807:Player supervision 546:real-money-trading 460: 425:real-time strategy 366:video game console 333:target acquisition 268: 256: 122:possibly contains 35: 2934: 2933: 2930: 2929: 2871:Video game piracy 2854:Microtransactions 2365:. Information on 2341:978-0-262-03365-7 2328:978-0-13-227191-2 1514:gafferongames.com 1223:978-1-4799-2504-9 1081:Warden (software) 1012:League of Legends 860:operating systems 833:Pattern detection 820:Anomaly detection 391:lockstep protocol 325:computer game bot 248: 247: 240: 230: 229: 222: 167: 166: 159: 124:original research 104: 16:(Redirected from 2969: 2807: 2512:Ethnic Cleansing 2444:Custer's Revenge 2397: 2390: 2383: 2374: 2308: 2307: 2300: 2294: 2293: 2291: 2290: 2275: 2269: 2268: 2266: 2264: 2247: 2241: 2240: 2238: 2236: 2219: 2213: 2212: 2210: 2208: 2191: 2185: 2184: 2182: 2180: 2165: 2159: 2158: 2147: 2141: 2140: 2138: 2136: 2121: 2115: 2114: 2112: 2110: 2095: 2086: 2085: 2083: 2082: 2071: 2065: 2064: 2062: 2061: 2050: 2044: 2043: 2041: 2039: 2016: 2010: 2009: 2007: 2005: 1990: 1984: 1983: 1981: 1979: 1964: 1958: 1957: 1955: 1953: 1944:. Archived from 1933: 1927: 1926: 1924: 1923: 1909: 1903: 1902: 1900: 1899: 1884: 1878: 1877: 1875: 1874: 1859: 1853: 1852: 1841: 1835: 1834: 1823: 1817: 1816: 1814: 1812: 1791: 1785: 1784: 1782: 1780: 1763: 1757: 1756: 1754: 1753: 1742: 1736: 1735: 1733: 1732: 1721: 1715: 1714: 1712: 1711: 1700: 1694: 1693: 1691: 1690: 1675: 1669: 1668: 1662: 1654: 1652: 1651: 1639: 1633: 1632: 1626: 1618: 1616: 1615: 1603: 1597: 1596: 1594: 1593: 1578: 1572: 1571: 1569: 1568: 1553: 1544: 1543: 1536: 1530: 1529: 1527: 1525: 1516:. Archived from 1506: 1500: 1499: 1487: 1481: 1475: 1469: 1456: 1450: 1449: 1447: 1446: 1431: 1425: 1424: 1422: 1421: 1406: 1400: 1399: 1397: 1396: 1384: 1378: 1377: 1375: 1374: 1363: 1357: 1356: 1338: 1332: 1331: 1329: 1328: 1317: 1311: 1310: 1308: 1307: 1291: 1285: 1284: 1282: 1281: 1266: 1257: 1256: 1245: 1236: 1235: 1215: 1199: 1193: 1192: 1190: 1189: 1174: 1168: 1167: 1165: 1164: 1147: 1138: 1137: 1135: 1133: 1118: 1112: 1111: 1109: 1108: 1096: 1071:Gaming etiquette 978:Progress-removal 751:Valve Anti-Cheat 243: 236: 225: 218: 214: 211: 205: 177: 176: 169: 162: 155: 151: 148: 142: 139:inline citations 115: 114: 107: 96: 74: 73: 66: 21: 2977: 2976: 2972: 2971: 2970: 2968: 2967: 2966: 2937: 2936: 2935: 2926: 2880: 2798: 2716:Health problems 2665: 2602: 2571: 2565: 2505:Muslim Massacre 2424: 2406: 2401: 2349: 2316: 2314:Further reading 2311: 2302: 2301: 2297: 2288: 2286: 2277: 2276: 2272: 2262: 2260: 2249: 2248: 2244: 2234: 2232: 2221: 2220: 2216: 2206: 2204: 2193: 2192: 2188: 2178: 2176: 2167: 2166: 2162: 2149: 2148: 2144: 2134: 2132: 2123: 2122: 2118: 2108: 2106: 2097: 2096: 2089: 2080: 2078: 2073: 2072: 2068: 2059: 2057: 2052: 2051: 2047: 2037: 2035: 2030:21 April 2015. 2018: 2017: 2013: 2003: 2001: 1992: 1991: 1987: 1977: 1975: 1966: 1965: 1961: 1951: 1949: 1948:on 10 July 2015 1935: 1934: 1930: 1921: 1919: 1911: 1910: 1906: 1897: 1895: 1886: 1885: 1881: 1872: 1870: 1861: 1860: 1856: 1851:. 7 April 2023. 1843: 1842: 1838: 1833:. 20 June 2020. 1825: 1824: 1820: 1810: 1808: 1793: 1792: 1788: 1778: 1776: 1765: 1764: 1760: 1751: 1749: 1744: 1743: 1739: 1730: 1728: 1723: 1722: 1718: 1709: 1707: 1702: 1701: 1697: 1688: 1686: 1677: 1676: 1672: 1655: 1649: 1647: 1641: 1640: 1636: 1619: 1613: 1611: 1605: 1604: 1600: 1591: 1589: 1580: 1579: 1575: 1566: 1564: 1562:Windows Central 1555: 1554: 1547: 1538: 1537: 1533: 1523: 1521: 1508: 1507: 1503: 1489: 1488: 1484: 1476: 1472: 1466:Wayback Machine 1457: 1453: 1444: 1442: 1433: 1432: 1428: 1419: 1417: 1408: 1407: 1403: 1394: 1392: 1386: 1385: 1381: 1372: 1370: 1365: 1364: 1360: 1353: 1340: 1339: 1335: 1326: 1324: 1319: 1318: 1314: 1305: 1303: 1293: 1292: 1288: 1279: 1277: 1268: 1267: 1260: 1247: 1246: 1239: 1224: 1201: 1200: 1196: 1187: 1185: 1176: 1175: 1171: 1162: 1160: 1149: 1148: 1141: 1131: 1129: 1120: 1119: 1115: 1106: 1104: 1098: 1097: 1093: 1089: 1057: 988: 980: 971: 950: 933: 901: 899:Banning players 893: 872: 856: 844: 835: 822: 809: 792: 766: 734: 706: 686: 677: 661: 632: 623: 614: 583:private message 578: 564: 558: 542: 529: 523: 514: 500: 491: 485: 480: 478:Unsporting play 452:Wallhacking in 408:that enables a 404:is a method or 399: 379: 357: 313: 308: 244: 233: 232: 231: 226: 215: 209: 206: 199: 178: 174: 163: 152: 146: 143: 128: 116: 112: 75: 71: 62: 55: 54: 53: 52: 51: 50: 34: 22: 15: 12: 11: 5: 2975: 2973: 2965: 2964: 2959: 2954: 2949: 2939: 2938: 2932: 2931: 2928: 2927: 2925: 2924: 2917: 2910: 2903: 2896: 2888: 2886: 2882: 2881: 2879: 2878: 2873: 2868: 2863: 2862: 2861: 2851: 2846: 2841: 2836: 2831: 2826: 2821: 2816: 2810: 2804: 2800: 2799: 2797: 2796: 2795: 2794: 2784: 2779: 2778: 2777: 2772: 2767: 2760:Sexual content 2757: 2752: 2751: 2750: 2740: 2735: 2734: 2733: 2728: 2723: 2713: 2712: 2711: 2701: 2696: 2691: 2690: 2689: 2684: 2673: 2671: 2670:Social aspects 2667: 2666: 2664: 2663: 2658: 2654:Counter-Strike 2650: 2649: 2648: 2638: 2633: 2632: 2631: 2626: 2616: 2610: 2608: 2604: 2603: 2601: 2600: 2595: 2594: 2593: 2581: 2579:Crunch culture 2575: 2573: 2570:Harassment and 2567: 2566: 2564: 2563: 2560:Active Shooter 2556: 2551: 2543: 2536: 2529: 2526:V-Tech Rampage 2522: 2515: 2508: 2501: 2494: 2487: 2480: 2473: 2466: 2461: 2454: 2447: 2440: 2432: 2430: 2426: 2425: 2423: 2422: 2417: 2411: 2408: 2407: 2402: 2400: 2399: 2392: 2385: 2377: 2371: 2370: 2360: 2348: 2347:External links 2345: 2344: 2343: 2330: 2315: 2312: 2310: 2309: 2306:. 25 May 2024. 2295: 2270: 2242: 2214: 2186: 2160: 2142: 2116: 2087: 2066: 2045: 2011: 1985: 1959: 1928: 1917:www.bungie.net 1904: 1879: 1869:. 5 April 2023 1854: 1836: 1818: 1786: 1758: 1737: 1716: 1695: 1670: 1634: 1598: 1573: 1545: 1531: 1520:on 10 May 2017 1501: 1482: 1470: 1451: 1426: 1401: 1379: 1358: 1351: 1333: 1312: 1286: 1258: 1253:Game Developer 1237: 1222: 1194: 1169: 1139: 1113: 1090: 1088: 1085: 1084: 1083: 1078: 1073: 1068: 1063: 1056: 1053: 987: 986:Legal measures 984: 979: 976: 970: 967: 949: 946: 932: 929: 900: 897: 892: 889: 871: 868: 855: 852: 843: 840: 834: 831: 821: 818: 808: 805: 791: 788: 765: 762: 733: 730: 705: 702: 685: 682: 676: 673: 660: 657: 631: 628: 622: 619: 613: 610: 606:stream sniping 577: 574: 560:Main article: 557: 554: 541: 538: 525:Main article: 522: 519: 513: 510: 499: 496: 487:Main article: 484: 481: 479: 476: 398: 395: 378: 375: 356: 353: 312: 309: 307: 304: 246: 245: 228: 227: 181: 179: 172: 165: 164: 119: 117: 110: 105: 79: 78: 76: 69: 60: 56: 36: 30: 27: 25: 24: 23: 14: 13: 10: 9: 6: 4: 3: 2: 2974: 2963: 2960: 2958: 2955: 2953: 2950: 2948: 2945: 2944: 2942: 2923: 2922: 2918: 2916: 2915: 2911: 2909: 2908: 2904: 2902: 2901: 2897: 2895: 2894: 2890: 2889: 2887: 2883: 2877: 2876:Skin gambling 2874: 2872: 2869: 2867: 2864: 2860: 2857: 2856: 2855: 2852: 2850: 2849:Law 3037/2002 2847: 2845: 2842: 2840: 2837: 2835: 2832: 2830: 2827: 2825: 2822: 2820: 2817: 2815: 2812: 2811: 2808: 2805: 2801: 2793: 2790: 2789: 2788: 2785: 2783: 2780: 2776: 2773: 2771: 2768: 2766: 2763: 2762: 2761: 2758: 2756: 2753: 2749: 2746: 2745: 2744: 2741: 2739: 2736: 2732: 2729: 2727: 2724: 2722: 2719: 2718: 2717: 2714: 2710: 2709:LGBTQ+ themes 2707: 2706: 2705: 2702: 2700: 2697: 2695: 2694:Cyberbullying 2692: 2688: 2685: 2683: 2680: 2679: 2678: 2675: 2674: 2672: 2668: 2662: 2659: 2657: 2655: 2651: 2647: 2644: 2643: 2642: 2639: 2637: 2634: 2630: 2627: 2625: 2622: 2621: 2620: 2617: 2615: 2612: 2611: 2609: 2605: 2599: 2596: 2592: 2589: 2588: 2587: 2586: 2582: 2580: 2577: 2576: 2574: 2568: 2562: 2561: 2557: 2555: 2552: 2550: 2548: 2547:Mass Effect 3 2544: 2542: 2541: 2537: 2534: 2530: 2528: 2527: 2523: 2521: 2520: 2516: 2514: 2513: 2509: 2507: 2506: 2502: 2500: 2499: 2495: 2493: 2492: 2488: 2486: 2485: 2481: 2479: 2478: 2474: 2472: 2471: 2467: 2465: 2462: 2460: 2459: 2455: 2453: 2452: 2451:Mortal Kombat 2448: 2446: 2445: 2441: 2439: 2438: 2434: 2433: 2431: 2429:Game-specific 2427: 2421: 2418: 2416: 2413: 2412: 2409: 2405: 2398: 2393: 2391: 2386: 2384: 2379: 2378: 2375: 2368: 2364: 2361: 2358: 2354: 2351: 2350: 2346: 2342: 2338: 2334: 2331: 2329: 2325: 2321: 2318: 2317: 2313: 2305: 2299: 2296: 2285: 2281: 2274: 2271: 2259: 2258: 2253: 2246: 2243: 2231: 2230: 2225: 2218: 2215: 2203: 2202: 2197: 2190: 2187: 2175: 2171: 2164: 2161: 2156: 2152: 2146: 2143: 2131: 2127: 2120: 2117: 2105: 2101: 2094: 2092: 2088: 2076: 2070: 2067: 2055: 2049: 2046: 2033: 2029: 2025: 2021: 2015: 2012: 2000: 1996: 1989: 1986: 1974: 1970: 1963: 1960: 1947: 1943: 1939: 1932: 1929: 1918: 1914: 1908: 1905: 1894: 1890: 1883: 1880: 1868: 1864: 1858: 1855: 1850: 1846: 1840: 1837: 1832: 1831:GamingOnLinux 1828: 1822: 1819: 1806: 1802: 1801: 1796: 1790: 1787: 1775: 1774: 1769: 1762: 1759: 1748: 1741: 1738: 1727: 1720: 1717: 1706: 1703:Tim Sweeney. 1699: 1696: 1684: 1680: 1674: 1671: 1666: 1660: 1645: 1638: 1635: 1630: 1624: 1609: 1602: 1599: 1588: 1584: 1577: 1574: 1563: 1559: 1552: 1550: 1546: 1541: 1535: 1532: 1519: 1515: 1511: 1505: 1502: 1497: 1493: 1486: 1483: 1479: 1474: 1471: 1467: 1463: 1460: 1455: 1452: 1440: 1436: 1430: 1427: 1416:on 2010-07-27 1415: 1411: 1405: 1402: 1390: 1383: 1380: 1368: 1362: 1359: 1354: 1348: 1344: 1337: 1334: 1322: 1316: 1313: 1302:on 2011-07-07 1301: 1297: 1290: 1287: 1276: 1272: 1265: 1263: 1259: 1254: 1250: 1244: 1242: 1238: 1233: 1229: 1225: 1219: 1214: 1209: 1205: 1198: 1195: 1184: 1180: 1173: 1170: 1159: 1158: 1153: 1146: 1144: 1140: 1128: 1124: 1117: 1114: 1102: 1095: 1092: 1086: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1058: 1054: 1052: 1050: 1045: 1040: 1038: 1037: 1032: 1028: 1027: 1022: 1018: 1014: 1013: 1008: 1004: 1003: 998: 997:Nexon America 992: 985: 983: 977: 975: 968: 966: 964: 960: 954: 947: 945: 943: 939: 930: 928: 926: 922: 918: 913: 911: 905: 898: 896: 890: 888: 886: 885:accessibility 881: 877: 869: 867: 865: 861: 853: 851: 848: 841: 839: 832: 830: 826: 819: 817: 813: 806: 804: 800: 796: 789: 787: 784: 779: 776: 770: 763: 761: 758: 756: 752: 748: 744: 740: 731: 729: 727: 723: 719: 714: 712: 703: 701: 699: 695: 691: 683: 681: 674: 672: 670: 666: 658: 656: 653: 652:client–server 648: 645: 641: 637: 629: 627: 620: 618: 611: 609: 607: 603: 598: 596: 591: 586: 584: 575: 573: 570: 563: 555: 553: 551: 547: 539: 537: 534: 528: 520: 518: 511: 509: 506: 498:Disconnecting 497: 495: 490: 482: 477: 475: 472: 468: 464: 457: 456: 450: 446: 444: 440: 435: 431: 426: 421: 419: 415: 411: 407: 403: 402:World-hacking 397:World-hacking 396: 394: 392: 388: 383: 376: 374: 370: 367: 361: 354: 352: 348: 344: 340: 338: 334: 330: 326: 323:is a type of 322: 318: 310: 305: 303: 299: 297: 292: 287: 285: 281: 277: 273: 265: 260: 252: 242: 239: 224: 221: 213: 203: 197: 194:and based on 193: 189: 187: 182:This article 180: 171: 170: 161: 158: 150: 140: 136: 132: 126: 125: 120:This article 118: 109: 108: 103: 101: 94: 93: 88: 87: 82: 77: 68: 67: 64: 59: 48: 44: 40: 33: 19: 2962:Online games 2919: 2912: 2905: 2898: 2891: 2834:Shutdown law 2682:banned games 2653: 2629:online games 2628: 2584: 2558: 2546: 2538: 2524: 2517: 2510: 2503: 2496: 2491:JFK Reloaded 2489: 2482: 2477:The Guy Game 2475: 2468: 2456: 2449: 2442: 2435: 2356: 2332: 2319: 2298: 2287:. Retrieved 2283: 2273: 2261:. Retrieved 2255: 2245: 2233:. Retrieved 2227: 2217: 2205:. Retrieved 2199: 2189: 2177:. Retrieved 2173: 2163: 2154: 2145: 2133:. Retrieved 2129: 2119: 2107:. Retrieved 2104:www.vice.com 2103: 2079:. Retrieved 2077:. 2013-02-24 2069: 2058:. Retrieved 2056:. 2011-04-14 2048: 2036:. Retrieved 2023: 2014: 2002:. Retrieved 1998: 1988: 1976:. Retrieved 1972: 1962: 1950:. Retrieved 1946:the original 1941: 1931: 1920:. Retrieved 1916: 1907: 1896:. Retrieved 1892: 1882: 1871:. Retrieved 1866: 1857: 1848: 1839: 1830: 1821: 1809:. Retrieved 1805:the original 1798: 1789: 1777:. Retrieved 1771: 1761: 1750:. Retrieved 1740: 1729:. Retrieved 1719: 1708:. Retrieved 1698: 1687:. Retrieved 1683:gamerant.com 1682: 1673: 1648:. Retrieved 1637: 1612:. Retrieved 1601: 1590:. Retrieved 1586: 1576: 1565:. Retrieved 1561: 1534: 1522:. Retrieved 1518:the original 1513: 1504: 1496:The Guardian 1495: 1485: 1473: 1454: 1443:. Retrieved 1439:the original 1429: 1418:. Retrieved 1414:the original 1404: 1393:. Retrieved 1382: 1371:. Retrieved 1361: 1342: 1336: 1325:. Retrieved 1315: 1304:. Retrieved 1300:the original 1289: 1278:. Retrieved 1274: 1252: 1203: 1197: 1186:. Retrieved 1182: 1172: 1161:. Retrieved 1155: 1130:. Retrieved 1127:the Guardian 1126: 1116: 1105:. Retrieved 1094: 1041: 1034: 1024: 1010: 1000: 993: 989: 981: 972: 955: 951: 948:In-game kick 934: 914: 906: 902: 894: 873: 857: 845: 836: 827: 823: 814: 810: 801: 797: 793: 783:game servers 780: 774: 771: 767: 759: 735: 715: 707: 687: 678: 662: 649: 644:peer-to-peer 633: 624: 615: 599: 587: 579: 568: 565: 543: 530: 515: 501: 492: 469: 465: 461: 453: 422: 401: 400: 384: 380: 371: 362: 358: 349: 345: 341: 320: 316: 314: 300: 288: 272:online games 269: 234: 216: 210:January 2017 207: 200:Please help 183: 153: 144: 121: 97: 90: 84: 83:Please help 80: 63: 58: 47:17 July 2024 46: 37:This is the 31: 2743:Review bomb 2731:VR sickness 2699:Form of art 2470:Islamic Fun 1391:. Wired.com 1103:. Wired.com 1002:Combat Arms 959:supervision 938:supervision 726:controllers 455:AssaultCube 441:dynamic to 337:calibration 291:multiplayer 186:predictions 2941:Categories 2859:Loot boxes 2677:Censorship 2533:No Russian 2484:Hot Coffee 2458:Night Trap 2437:Death Race 2355:by J.Smed 2289:2022-04-04 2081:2015-07-08 2060:2015-07-08 2024:MapleStory 1922:2023-04-15 1898:2023-04-15 1873:2023-04-15 1752:2015-07-06 1731:2015-07-06 1710:2015-07-06 1689:2019-12-25 1650:2012-12-15 1614:2012-12-15 1592:2023-04-15 1567:2023-04-15 1524:11 January 1445:2009-09-15 1420:2010-07-28 1395:2015-01-05 1373:2013-06-06 1352:0470029749 1327:2012-12-15 1306:2012-12-15 1280:2022-04-04 1188:2021-07-05 1163:2009-09-15 1107:2009-09-15 1087:References 1021:Epic Games 1007:Riot Games 931:Suspension 910:shadow ban 880:Activision 847:Sandboxing 842:Sandboxing 747:PunkBuster 590:IP address 430:fog of war 377:Look-ahead 202:improve it 192:verifiable 147:April 2013 131:improve it 86:improve it 2721:addiction 2598:Gamergate 2257:Gamasutra 2235:March 15, 2229:Gamasutra 2207:March 15, 2201:Gamasutra 1942:ccplz.net 1893:The Verge 1800:Robocraft 1345:. Wiley. 1157:Gamasutra 1036:Destiny 2 743:GameGuard 621:Scripting 434:rendering 418:developer 284:consensus 135:verifying 92:talk page 2885:Lawsuits 2782:Violence 2775:Shotacon 2755:Religion 2641:Swatting 2263:April 4, 2174:Engadget 2032:Archived 1867:Engadget 1773:PCGamesN 1659:cite web 1623:cite web 1587:PC Gamer 1480:(page 2) 1468:(page 2) 1462:Archived 1076:Metagame 1055:See also 1026:Fortnite 969:Demotion 963:griefing 739:BattlEye 612:Stacking 576:Ghosting 562:Twinking 556:Twinking 521:Exploits 296:darknets 276:cheating 262:Typical 43:reviewed 18:Wallhack 2770:Lolicon 2624:esports 2519:RapeLay 2135:5 April 1973:Dexerto 1232:1900780 925:CipSoft 722:console 698:aimbots 690:packets 634:In the 540:Farming 443:balance 387:latency 321:autoaim 129:Please 2792:Sexism 2549:ending 2357:et al. 2339:  2326:  2179:2 June 2109:2 June 2038:8 July 2004:5 July 1978:5 July 1952:8 July 1811:6 July 1779:6 July 1349:  1230:  1220:  1183:Forbes 1132:5 July 1031:Bungie 923:, and 876:Bungie 711:macros 602:Twitch 317:aimbot 2803:Legal 2787:Women 2765:Eroge 2367:Intel 2130:Axios 1228:S2CID 921:Nexon 781:When 755:Steam 665:EULAs 550:EULAs 414:level 2748:List 2738:Race 2464:Jynx 2337:ISBN 2324:ISBN 2265:2017 2237:2017 2209:2017 2181:2021 2137:2022 2111:2021 2040:2015 2006:2021 1980:2021 1954:2015 1813:2015 1781:2015 1665:link 1629:link 1526:2022 1347:ISBN 1218:ISBN 1134:2021 878:and 864:Wine 569:i.e. 471:Asus 410:user 335:and 2284:IGN 1999:NME 1208:doi 940:or 775:lag 533:bug 505:Elo 319:or 315:An 270:On 133:by 45:on 2943:: 2282:. 2254:. 2226:. 2198:. 2172:. 2153:. 2128:. 2102:. 2090:^ 2026:. 2022:. 1997:. 1971:. 1940:. 1915:. 1891:. 1865:. 1847:. 1829:. 1797:. 1770:. 1681:. 1661:}} 1657:{{ 1625:}} 1621:{{ 1585:. 1560:. 1548:^ 1512:. 1494:. 1273:. 1261:^ 1251:. 1240:^ 1226:. 1216:. 1181:. 1154:. 1142:^ 1125:. 944:. 919:, 749:, 745:, 741:, 728:. 718:PC 713:. 608:. 420:. 393:. 274:, 95:. 41:, 2535:" 2531:" 2396:e 2389:t 2382:v 2292:. 2267:. 2239:. 2211:. 2183:. 2157:. 2139:. 2113:. 2084:. 2063:. 2042:. 2008:. 1982:. 1956:. 1925:. 1901:. 1876:. 1815:. 1783:. 1755:. 1734:. 1713:. 1692:. 1667:) 1653:. 1631:) 1617:. 1595:. 1570:. 1542:. 1528:. 1498:. 1448:. 1423:. 1398:. 1376:. 1355:. 1330:. 1309:. 1283:. 1234:. 1210:: 1191:. 1166:. 1136:. 1110:. 908:" 241:) 235:( 223:) 217:( 212:) 208:( 198:. 160:) 154:( 149:) 145:( 127:. 102:) 98:( 49:. 20:)

Index

Wallhack
latest accepted revision
reviewed
improve it
talk page
Learn how and when to remove these messages
original research
improve it
verifying
inline citations
Learn how and when to remove this message
predictions
verifiable
reliable published sources
improve it
Learn how and when to remove this message
Learn how and when to remove this message


extrasensory perception
online games
cheating
third-party software
consensus
multiplayer
darknets
computer game bot
first-person shooter
target acquisition
calibration

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑