The ruin of cheating in the game
For a long time, fraudsters considered the online gaming community as a playground
For a long time, fraudsters considered the online gaming community as a "powerless" playground. However, game publishers cannot stand the battle over this overwhelming dominance. They went to the rescue forces more and more in this uncompromising battle.
" We are doing everything we can to wipe out all of the phishing programs that are plugged into Quake III, " said Todd Hollenshead, chief executive of id Software, which specializes in game development for Activision.
Just before the release of " Return to Castle Wolfenstein " in 2002, id Software realized that " I participated in a losing battle ," Hollenshead recounted.
When the game company reacted
Source: Download.com id Software signed a contract with Even Balance, the leading anti-phishing software company, to develop its own software. Four years later, PunkBuster technology was present in all games that Software Software released.
Now imitate id Software, MMOG game developers (role playing multiplayer) and all game publishers rush to Even Balance to equip weapons for the fight against scammers and frauds.
But all of them understand each other implicitly, the players themselves play an equally important role in capturing the con artists. " We rely on reports from users to detect and eliminate dark corners ," Sony Online Entertainment spokesman said.
Not allowed to lose
Never think about losing, Hollenshead said. Scammers harm the game industry under a domino effect, just like the "worm of the soup".
" Like doping drugs in professional sports competitions. Even if not everyone doping, the whole sports industry still has to be known. The public no longer respects athletes' achievements. Honestly, soon, no one wants to compete, no one wants to care . "
Fighting
Even Balance president Tony Ray said more and more game development companies recognize the rationality and savings when outsourcing the fight against fraud to third parties. " The amateur staff will not be able to cope with mischievous scammers ," he said. " There needs to be very high paid coder, taking the time to study how to fight fraud ".
Recently, Even Balance signed a contract with a K2 Networkd game publisher to test a security software on the Knights Online game - the most downloaded game on download.com. The operation mechanism of this software is exactly the same as an antivirus software.
Even Balance says Even Balance is promoting contracts with many other MMOG games, which are expected to be released within 2-3 weeks. Ray reveals that these are all very popular MMOG games today.
Players must also act
Both Ray and Hollenshead encourage gamers to capture the screen whenever they suspect they are being cheated or cheated, then immediately notify admin and send a picture to PunkBuster.
In addition, Ray also suggested that players should join anti-fraud groups and only play with members in that group only.
For MMOG games, players should report any behavior that violates the rules of the service to the vendor. Of course, before reporting, consider and analyze the situation carefully. " Then look and see bad guys again ," Hollenshead warned.
Thien Y
- This is how this man cheats on television to win the show game
- Game 'Disorder': suspect a second iCMS
- Discover algae fraud
- GameVui.com launches Cam Cam game
- It is possible to know whether a person is cheating or not by listening to their voice
- Children start to be competitive from 4 years old
- Identify deceitful people at work
- 'Design' ... love for the game
- AI has learned how to create video games just by watching people play
- The AI breaks the game with a hole that no one has ever found
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system