790:" style. For example, symmetric encryption keys could be read from the game's memory, granting access to inbound packets. These packets could be edited to provide the client game with information that does not reflect the server's reality. I.e. if an enemy player uses an ability that should slow your movement, the packet detailing the slow factor could be modified to a lower value, manipulating the client game into applying the lower value. Techniques like this are not as common as simple memory manipulation and are typically only used in specific scenarios.
566:
951:. The rise of virtual economies has led to cheating where a gamer uses macros to gain large amounts of in-game money which the player will then trade for real cash. The Terms of Service of most modern online games now specifically prohibit the transfer of accounts or the sale of in-game items for 'real-world' money. The enforcement of these terms varies however from one company to another, many turning a blind-eye to such trading as detection and prevention requires resources and banning players also results in losses of revenue.
389:. Some say that as many people do not have the time to complete a video game on their own, cheats are needed to make a game more accessible and appealing to a casual gamer. In many cases, developers created cheats to facilitate testing, then left them in the game as they expanded the number of ways people could play it. With the rise in popularity of gaming, cheating using external software and hardware raised a number of copyright legal issues related to modifying game code.
83:
783:
player’s character technically remained in the safe position from the server’s (and enemy's) perspective. Once the player had gathered the necessary information about enemy locations, they could deactivate the lag switch and resume normal play. Many games have since implemented "anti-desync" measures to limit the effectiveness of lagswitches. This may include the client game preventing player movement if connection is lost.
185:
42:
536:
683:. When the game was first started, the trainer would typically show a splash screen of its own, sometimes allowing modifications of options related to the trainer, and then proceed to the actual game. In the cracker group release lists and intros, trained games were marked with one or more plus signs after them, one for each option in the trainer, for example: "the Mega Krew presents:
882:. While there have always been cheat codes and other ways to make single-player games easier, developers often attempt to prevent it in multiplayer games. With the release of the first popular internet multiplayer games, cheating took on new dimensions. Previously it was rather easy to see if the other players cheated, as most games were played on local networks or consoles. The
519:, there is a sizeable community of players who will use macros to showcase levels too difficult for them to complete, or simply too difficult for a human to do. When recording macros, generally software in the form of a mod is used. Often, these mods can slow down the game, reverse time, among other ways of making it easier to record. These are also often called
2140:
532:
of a game, or even using the same game at different times or on different hardware, may result in different memory usage and hence the trainer program might have no effect, or stop the game from running altogether. Modifying game data usually constitutes a violation of a software license agreement that prohibits modifying the program at all.
763:
item from the chest, and continue play using the treasure chest file before the item was picked up, and the inventory file from afterward -- allowing the player to pick up the item repeatedly, gaining multiple instances of the item, if the program's logic does not prevent them from having more than one of the item.
762:
If a saved game is stored in multiple files, it may also be possible to cheat simply by mixing and matching these files. For example, if one file represents the items in a treasure chest, while another represents the player's inventory, then the player can save the game before and after picking up an
531:
Cheating can easily be achieved by modifying the game's data while it is running. These methods of cheating are often less reliable than cheat codes included in a game by its creators. This is due to the fact that certain programming styles or quirks of internal game logic, different release versions
438:
Cheat codes are usually activated by typing secret passwords or pressing controller buttons in a certain sequence. Less common activation methods include entering certain high score names, holding keys or buttons while dying, picking up items in a particular order and otherwise performing unintuitive
333:
add-on to freeze the running program, enter POKEs, and resume. Some games tried to detect the
Multiface and refused to load if it was present. The earliest models had no ability to "hide". Later revisions either included a switch, hid if the menu had been opened and closed before loading the game, or
664:
The most basic way of achieving this is by means of memory editor software, which allows the player to directly edit the numeric values in a certain memory address. This kind of software usually includes a feature that allows the player to perform memory searches to aid the user to locate the memory
404:
Many games which use in-game purchases consider cheating to be not only wrong but also illegal, seeing as cheats in such games would allow players to access content (like power-ups and extra coins) that would otherwise require payment to obtain. However, cheating in such games is nonetheless a legal
375:
condemned cheaters, taking the stance that cheating was not part of their philosophy of fairness. They also applied this in reverse; games should also not be allowed to cheat the player. Guides, walkthroughs, and tutorials are sometimes used to complete games but whether this is cheating is debated.
320:
In a computer game, all numerical values are stored "as is" in memory. Gamers could reprogram a small part of the game before launching it. In the context of games for many 8-bit computers, it was a usual practice to load games into memory and, before launching them, modify specific memory addresses
368:
Cheating was exploited by technology-oriented players due to the difficulty of early cheats. However, a cheat industry emerged as gaming systems evolved, through the packaging and selling of cheating as a product. Cheat-enablers such as cheat books, game guides, cheat cartridges helped form a cheat
697:
Emulators also frequently offer the additional advantage of being able to save the state of the entire emulated machine at any point, effectively allowing saving at any point in a game even when save functionality is not provided by the game itself. Cheating hardware such as "Instant Replay" also
983:
In single-player games, there are a number of plug-ins available to developers to use to stop cheaters. An obfuscator will scramble code so it is unreadable by decompilers, rename events/properties/methods and even add fake code. An obscurer will encrypt variables in memory and mask out strings.
782:
For example, if a player was unsure whether an enemy was present in a room, they could activate the lag switch to block network traffic momentarily. This would allow the player to enter the room and scout for enemies without their movements being transmitted to the game server. As a result, the
392:
Many modern games have removed cheat codes entirely, except when used to unlock certain secret bonuses. The usage of real-time achievement tracking made it unfair for any one player to cheat. In online multiplayer games, cheating is frowned upon and disallowed, often leading to a
620:
and Code
Breaker which modify the game code from a large database of cheats. In later generation consoles, cheat cartridges have come to be replaced by cheat discs, containing a simple loader program which loads a game disc and modifies the main executable before starting it.
774:
One early implementation of this concept was seen with lag switches. A lag switch refers to any hardware or software mechanism that temporarily limits network traffic. They grew popular as, unlike most cheats, they could be used on the Xbox 1 and PS4 consoles. In
665:
areas where known values (such as the number of lives, score or health level) are located. Provided a memory address, a memory editor may also be able to "freeze" it, preventing the game from altering the information stored at that memory address.
802:
records, or both, cheats by nature allow the player to attain achievements too easily or score point totals not attainable or extremely difficult to attain through legitimate means by a non-cheating player. Notable examples include the following:
838:
turns this barrier into a continuing obstacle if a player saves the game with cheats activated. The game will then record that fact in the save file and automatically cause subsequent reloads from the relevant save file to reactivate cheat
443:
console that can be used to edit game parameters. Effects might include unlocking a character or improving a character's performance: for example providing a car with greater acceleration, or just visual gags such as "big-head mode" in
385:, dedicated to listing cheats and walkthroughs for consoles and computer systems. POKE cheats were replaced by trainers and cheat codes. Generally, the majority of cheat codes on modern day systems are implemented not by gamers, but by
746:
Editing a saved game offers an indirect way to modify game data. By modifying a file in persistent storage, it is possible to effectively modify the runtime game data that will be restored when the game attempts to load the save game.
272:, usually in order to make the game easier. Cheats may be activated from within the game itself (a cheat code implemented by the original game developers), or created by third-party software (a game trainer or debugger) or hardware (a
465:
Unlike other cheating methods, cheat codes are implemented by the game developers themselves, often as a tool to playtest certain aspects of the game without difficulty. One of the earliest known examples of this type of cheat is the
759:). However, as happened with game editors, dedicated game-editing utilities soon became available, including functions to effortlessly edit saved data for specific games, rendering hex editing largely obsolete for this purpose.
317:(1981) promised that the $ 15 product "remodels every feature of the game. Stop startup delays, crashes and chest waiting. Get any item, in any quantity. Start in any room, at any rank. Handicap your aim. Even add items".
863:. Bungie and Ubisoft both convinced cheat-makers to stop operating, at the threat of paying damages at trial. Take-Two was successful against a cheat-maker in an Australian court, who awarded damages to the publisher.
984:
Anti-cheat toolkits have a variety of tools such as: detecting speed hacks, encrypting player prefs, detecting time cheats, detecting wall hacks and more. These can be used in most multi-player games as well.
506:
A bot is a type of artificial intelligence (AI)–based expert system software that plays a video game in the place of a human, to perform actions (repetitive or not) that enable advantages to be achieved.
556:
Cheating via memory editing involves modifying the memory values where the game keeps its status information. The way to achieve this will vary depending on the environment in which the game is running.
1858:
980:. However, much like anti-virus companies, some anti-cheat tools are constantly and consistently bypassed until further updates force cheat creators to find new methods to bypass the protection.
694:. Some emulators take this method a step further and allow the player to export and import data edits. Edit templates of many games for a console are collected and redistributed as cheat packs.
912:
In online trading card games, creating multiple accounts by jailbreaking a device to get more rewards can be considered as cheating because it is unfair to players who have only one account.
580:
A cheat cartridge is attached to an interface port on a home computer or console. It allows a user to modify the game code either before or during its execution. An early example is the
817:
does not allow the player to finish the game if any cheat codes are applied; instead, after a cheating player defeats the game's penultimate level, the game simulates a program exit to
1192:
1271:
Stevens, Reed; Tom
Satwicz & Laurie McCarthy (2008). "In-Game, In-Room, In-World: Reconnecting Video Game Play to the Rest of Kids' Lives.". In Katie Salen (ed.).
706:
Somewhat more unusual than memory editing, code injection consists of the modification of the game's executable code while it is running, for example with the use of
901:, which is the action of pushing an item/npc/player into the graphic boundary of another object/player/location in a manner not intended by the game developer, and
292:
purposes. Playtesters had to rigorously test the mechanics of a game and introduced cheat codes to make this process easier. An early cheat code can be found in
848:
has any cheats activated when a chamber is completed in
Challenge mode, the game will display "CHEATED!" above the performance summary screen for that level.
676:. When distributed, trainers often have a single + and a number appended to their title, representing the number of modifications the trainer has available.
626:
886:
changed that by increasing the popularity of multiplayer games, giving the players relative anonymity, and giving people an avenue to communicate cheats.
365:
and locate the critical point where the number of lives is decreased, impacts detected, etc. Sometimes the term POKE was used with this specific meaning.
690:
Many emulators have built-in functionality that allows players to modify data as the game is running, sometimes even emulating cheating hardware such as
1145:
2141:
Notice of the
National Press and Publication Administration on Further Strict Management and Effective Prevention of Minors' Addiction to Online Games
2098:
1118:
1669:
2088:
492:
is really difficult, right? I never played it that much, and there was no way I could finish the game, so I inserted the so-called Konami Code."
771:
An alternative method for cheating in online games involves modification of inbound or outbound network traffic between the client and server.
397:. However, certain games may unlock single-player cheats if the player fulfills a certain condition. Yet other games, such as those using the
304:
405:
grey area because there are no laws against modifying software which is already owned, as detailed in the
Digital Millennium Copyright Act.
2167:
1626:
1196:
462:
gives the opposite of the desired effect, such as instant death instead of invulnerability or stripping weapons instead of providing them.
369:
industry and cemented cheating as part of gaming culture. However, cheating was not universally accepted in early gaming; gaming magazine
321:
in order to cheat, getting an unlimited number of lives, currency, immunity, invisibility, etc. Such modifications were performed through
1277:. The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning. Cambridge, MA: The MIT Press. pp. 41–46.
147:
119:
100:
55:
2174:
1961:
1865:
1725:
1357:
1990:
126:
1302:
753:
were the most basic means of editing saved game files (e.g. to give the player a large sum of money in strategy games such as
1956:
1978:
1662:
2103:
1927:
1538:
1430:
1272:
905:, with which the information of other players is displayed. There are also cheats that increase the size of the target's
605:
401:, allow developer consoles to be used to activate a wide variety of cheats in single-player or by server administrators.
133:
669:
668:
Game trainers are a special type of memory editor, in which the program comes with predefined functions to modify the
450:. Some games humorously penalise the player for using another game's cheat codes. For example, using cheat codes from
1689:
1282:
924:
916:
246:
228:
166:
69:
210:
115:
2221:
2022:
1820:
299:
311:
s 1981 release, at least two commercial trainers appeared. 1983 advertisements for "The Great Escape
Utility" for
1872:
1655:
446:
2113:
195:
104:
779:, a common use for lagswitches was the ability to understand enemy positions without any risk to the player.
2034:
1786:
1772:
1067:
601:
485:
358:
1149:
1779:
1711:
61:
1122:
832:
games do not record player achievements if they are attained while cheat mode is activated. For example,
1502:
1983:
1973:
1173:
902:
17:
280:; this may or may not be considered cheating based on whether the bug is considered common knowledge.
2093:
584:
for the ZX Spectrum, and almost every format since has had a cheat cartridge created for it; such as
140:
1463:
1254:
2056:
2029:
2005:
1935:
1903:
1828:
1678:
920:
873:
834:
787:
30:
435:
itself, that will cause any type of uncommon effect that is not part of the usual game mechanics.
965:
897:, which allows a player to see through solid or opaque objects or manipulate or remove textures,
860:
458:
206:
202:
93:
1630:
1583:
2118:
2066:
1910:
1888:
1222:
879:
852:
813:
520:
452:
1404:
2061:
1951:
1920:
1758:
1450:
1241:
1072:
893:, which assists the player in aiming at the target, giving the user an unfair advantage, the
515:
Macros are files that, when played, will repeat inputs in a game. As an example, in the game
431:
The most basic type of cheat code is one created by the game designers and hidden within the
679:
In the 1980s and 1990s, trainers were generally integrated straight into the actual game by
2188:
2012:
1995:
1853:
1814:
776:
735:
480:
398:
386:
1095:
947:
has resulted in the trading of in-game currency for real-world currency. This can lead to
724:
in the program (which was responsible for decrementing the number of lives by one) with a
8:
2181:
1898:
1718:
1042:
844:
422:
1223:"FROM OZANS TO GOD-MODES: CHEATING IN INTERACTIVE ENTERTAINMENT FROM DIFFERENT CULTURES"
379:
Later, cheating grew more popular with magazines, websites, and even a television show,
2195:
2000:
1694:
1477:
1193:"Victory for Consumers: Library of Congress and 5th Circuit Clarify Exceptions to DMCA"
1013:
973:
822:
471:
329:, Amstrad CPC range and ZX Spectrum also allowed players with the proper cartridges or
313:
1361:
565:
2145:
1278:
1008:
731:
680:
418:
2128:
1310:
977:
960:
349:
786:
More modern methods typically involve lower level packet editing or forgery in a "
1526:
948:
659:
643:
624:
The legality of this type of devices has been questioned, such as in the case of
273:
1332:
1834:
1800:
1288:
829:
738:. Users use a third party program to inject the DLL into their game of choice.
501:
414:
1546:
1434:
2215:
2150:
2123:
1968:
1601:
1375:
1178:
712:
707:
673:
589:
516:
354:
322:
2108:
1765:
1751:
1647:
597:
362:
326:
277:
1568:
2017:
1744:
1003:
993:
955:
574:
467:
371:
343:
294:
1807:
1732:
1270:
998:
969:
799:
750:
726:
691:
639:
593:
540:
432:
265:
923:, which automatically find items or defeat enemies. The prevalence of
1220:
717:
647:
617:
613:
581:
570:
330:
909:, allowing shots striking close to the target to register as hits.
213:. Statements consisting only of original research should be removed.
82:
2133:
2049:
1915:
1076:(advertisement). Vol. 4, no. 1. February 1984. p. 15
894:
883:
631:
609:
523:, or TAS-es for short, in the speedrunning community or elsewhere.
289:
269:
1503:"Tricks and Techniques for Cheating | Game Hacking 101 | InformIT"
1274:
The
Ecology of Games: Connecting Youth, Games, and Learning, Pages
716:
on the ZX Spectrum computer, a popular cheat involved replacing a
268:
player using various methods to create an advantage beyond normal
2044:
1793:
1627:"Eternal Lands' MMORPG Postmortem: Mistakes and Lessons, Part II"
898:
755:
535:
475:
906:
890:
818:
635:
547:
allows a player to insert codes to edit a game's memory values.
381:
2039:
889:
Examples of cheats in first-person shooter games include the
856:
585:
440:
394:
347:
for the ZX Spectrum, immunity is achieved. Magazines such as
1584:"Lawsuits suggest some video game cheating could be illegal"
1031:
Retro Gamer
Magazine issue 48 – Interview with Matthew Smith
734:, a common type of video game hacking is through the use of
1738:
413:"Cheat Codes" redirects here. For the gaming website, see
302:
driving license) enables the cheat mode. Within months of
1221:
Sezen, Tonguc
Ibrahim; Isikoglu, Digdem (27 April 2007).
808:
616:
game consoles. Modern disc-based cheat hardware includes
544:
1391:
851:
Several video game companies have sued cheat-makers for
488:. Hashimoto is quoted as saying "The arcade version of
730:, effectively granting the player infinite lives. On
417:. For the American electronic dance music group, see
1146:"Why Use Cheats and Codes for Console and PC Games?"
627:
Lewis Galoob Toys, Inc. v. Nintendo of America, Inc.
526:
421:. For the Danger Mouse and Black Thought album, see
1171:"The Next Generation 1996 Lexicon A to Z: Cheats".
107:. Unsourced material may be challenged and removed.
1478:"How Do Online Gamers Use a Lag Switch to Cheat?"
2213:
357:instructions for games. In order to find them a
1068:"If they won't fix Castle Wolfenstein, we will"
766:
1663:
954:Cheating in online games is common on public
305:Wizardry: Proving Grounds of the Mad Overlord
2168:Brown v. Entertainment Merchants Association
1677:
1148:. The New York Times Company. Archived from
1040:
1034:
592:devices. Another popular example of this is
288:The first cheat codes were put in place for
1119:"Cheating: Gaining Advantage in Videogames"
867:
798:In games having attainable achievements or
276:). They can also be realized by exploiting
70:Learn how and when to remove these messages
1670:
1656:
653:
560:
1266:
1264:
247:Learn how and when to remove this message
229:Learn how and when to remove this message
167:Learn how and when to remove this message
1387:
1385:
1116:
1060:
698:allows such behavior for some consoles.
564:
534:
1216:
1214:
1143:
964:, include specific features to counter
14:
2214:
1581:
1261:
1195:. Scottandscottllp.com. Archived from
638:stating that its cheating device, the
470:, created in 1986 by Konami developer
1651:
1602:"Game exchange dispute goes to court"
1382:
741:
439:actions. Some games may also offer a
2175:Entertainment Software Ass'n v. Foti
1539:"Game Help Q&A 2006 September 1"
1394:at About.com's Video Game Strategies
1358:"Cracking the Code: The Konami Code"
1211:
178:
105:adding citations to reliable sources
76:
35:
2104:Family Entertainment Protection Act
1582:Totilo, Stephen (6 December 2022).
298:, where typing "6031769" (based on
24:
925:massively multiplayer online games
793:
29:For cheating in online games, see
25:
2233:
1860:California v. Activision Blizzard
1690:List of controversial video games
1569:"Portal Cheats on CheatCodes.com"
968:, by incorporating tools such as
701:
551:
527:Modification of runtime game data
353:regularly featured lists of such
51:This article has multiple issues.
183:
81:
40:
1619:
1594:
1575:
1561:
1531:
1520:
1495:
1470:
1423:
1397:
1368:
1350:
1325:
1295:
92:needs additional citations for
59:or discuss these issues on the
2114:Truth in Video Game Rating Act
1185:
1164:
1137:
1110:
1088:
1041:Maher, Jimmy (26 March 2012).
1025:
408:
13:
1:
1773:Super Columbine Massacre RPG!
1019:
958:. Some online games, such as
486:Nintendo Entertainment System
2089:Intellectual property rights
1433:. BigPackets. Archived from
1405:"Hacking Away: "Jump To It""
1096:"Celebrity Cookbook, Cheat!"
767:Network traffic manipulation
7:
1629:. DevMaster. Archived from
1527:Doom Cheat Codex – IGN FAQs
987:
646:of games and thus violated
209:the claims made and adding
10:
2238:
1376:"Game trainers and cheats"
871:
657:
499:
412:
283:
28:
2159:
2099:1993 U.S. Senate hearings
2094:Video Recordings Act 1984
2084:
2077:
1962:regionally censored games
1944:
1881:
1844:
1703:
1685:
1360:. 1up.com. Archived from
1181:. March 1996. p. 31.
1043:"The Wizardry Phenomenon"
710:commands. In the case of
510:
116:"Cheating in video games"
1936:Corrupted Blood incident
1829:Digital Homicide Studios
1679:Video game controversies
1411:(6). Future. August 1984
1106:(10): 57. February 1989.
917:online multiplayer games
878:Cheating exists in many
874:Cheating in online games
868:Cheating in online games
835:Half-Life 2: Episode Two
788:Man-in-the-middle attack
31:Cheating in online games
2222:Cheating in video games
1894:Cheating in video games
1047:The Digital Antiquarian
880:multiplayer video games
828:Some PC games and most
654:Memory editing software
561:Memory editing hardware
521:tool-assisted speedruns
495:
262:Cheating in video games
2119:Video Game Decency Act
1911:Death of Brandon Crisp
1889:Blitzchung controversy
1458:Cite journal requires
1303:"GoldenEye 007 Cheats"
1249:Cite journal requires
853:copyright infringement
577:
548:
1979:Gender representation
1921:2017 Wichita swatting
1364:on 27 September 2007.
1121:. MIT. Archived from
1073:Computer Gaming World
777:first-person shooters
672:memory of a specific
573:cheat device for the
568:
538:
478:the 1985 arcade game
361:had to interpret the
2189:Epic Games v. Google
1931:match fixing scandal
1866:ABK Workers Alliance
1847:workplace misconduct
1815:Six Days in Fallujah
1313:on 28 September 2008
1291:on 28 November 2012.
855:, with a successful
821:and displays a mock
634:unsuccessfully sued
101:improve this article
2182:Epic Games v. Apple
1882:Other controversies
919:, a player may use
685:Ms. Astro Chicken++
337:For instance, with
334:automatically hid.
2196:Strickland v. Sony
2001:Simulator sickness
1695:Video game culture
1378:. 8 December 2023.
1152:on 17 October 2007
1125:on 29 January 2007
1014:Video game modding
974:nProtect GameGuard
927:(MMORPGs) such as
742:Saved game editors
578:
549:
472:Kazuhisa Hashimoto
314:Castle Wolfenstein
194:possibly contains
2209:
2208:
2205:
2204:
2146:Video game piracy
2129:Microtransactions
1633:on 6 January 2007
1199:on 19 August 2010
1009:Xyzzy (computing)
966:cheating exploits
949:virtual economies
929:World of Warcraft
732:Microsoft Windows
636:Lewis Galoob Toys
419:Cheat Codes (DJs)
257:
256:
249:
239:
238:
231:
196:original research
177:
176:
169:
151:
74:
16:(Redirected from
2229:
2082:
2081:
1787:Ethnic Cleansing
1719:Custer's Revenge
1672:
1665:
1658:
1649:
1648:
1643:
1642:
1640:
1638:
1623:
1617:
1616:
1614:
1612:
1598:
1592:
1591:
1579:
1573:
1572:
1565:
1559:
1558:
1556:
1554:
1545:. Archived from
1535:
1529:
1524:
1518:
1517:
1515:
1513:
1507:www.informit.com
1499:
1493:
1492:
1490:
1488:
1474:
1468:
1467:
1461:
1456:
1454:
1446:
1444:
1442:
1427:
1421:
1420:
1418:
1416:
1401:
1395:
1389:
1380:
1379:
1372:
1366:
1365:
1354:
1348:
1347:
1345:
1343:
1333:"Heretic cheats"
1329:
1323:
1322:
1320:
1318:
1309:. Archived from
1299:
1293:
1292:
1287:. Archived from
1268:
1259:
1258:
1252:
1247:
1245:
1237:
1235:
1233:
1227:
1218:
1209:
1208:
1206:
1204:
1189:
1183:
1182:
1168:
1162:
1161:
1159:
1157:
1141:
1135:
1134:
1132:
1130:
1114:
1108:
1107:
1092:
1086:
1085:
1083:
1081:
1064:
1058:
1057:
1055:
1053:
1038:
1032:
1029:
978:Valve Anti-Cheat
961:Battlefield 1942
729:
723:
644:derivative works
474:as he worked on
340:
325:statements. The
310:
252:
245:
234:
227:
223:
220:
214:
211:inline citations
187:
186:
179:
172:
165:
161:
158:
152:
150:
109:
85:
77:
66:
44:
43:
36:
21:
2237:
2236:
2232:
2231:
2230:
2228:
2227:
2226:
2212:
2211:
2210:
2201:
2155:
2073:
1991:Health problems
1940:
1877:
1846:
1840:
1780:Muslim Massacre
1699:
1681:
1676:
1646:
1636:
1634:
1625:
1624:
1620:
1610:
1608:
1600:
1599:
1595:
1580:
1576:
1567:
1566:
1562:
1552:
1550:
1549:on 13 July 2011
1537:
1536:
1532:
1525:
1521:
1511:
1509:
1501:
1500:
1496:
1486:
1484:
1476:
1475:
1471:
1459:
1457:
1448:
1447:
1440:
1438:
1437:on 16 July 2018
1429:
1428:
1424:
1414:
1412:
1403:
1402:
1398:
1390:
1383:
1374:
1373:
1369:
1356:
1355:
1351:
1341:
1339:
1331:
1330:
1326:
1316:
1314:
1301:
1300:
1296:
1285:
1269:
1262:
1250:
1248:
1239:
1238:
1231:
1229:
1225:
1219:
1212:
1202:
1200:
1191:
1190:
1186:
1177:. No. 15.
1174:Next Generation
1170:
1169:
1165:
1155:
1153:
1142:
1138:
1128:
1126:
1115:
1111:
1094:
1093:
1089:
1079:
1077:
1066:
1065:
1061:
1051:
1049:
1039:
1035:
1030:
1026:
1022:
990:
876:
870:
842:If a player of
796:
794:Countermeasures
769:
744:
725:
721:
704:
681:cracking groups
662:
660:Trainer (games)
656:
563:
554:
529:
513:
504:
498:
484:for use on the
429:
411:
387:game developers
338:
308:
300:Matthew Smith's
286:
274:cheat cartridge
253:
242:
241:
240:
235:
224:
218:
215:
200:
188:
184:
173:
162:
156:
153:
110:
108:
98:
86:
45:
41:
34:
23:
22:
15:
12:
11:
5:
2235:
2225:
2224:
2207:
2206:
2203:
2202:
2200:
2199:
2192:
2185:
2178:
2171:
2163:
2161:
2157:
2156:
2154:
2153:
2148:
2143:
2138:
2137:
2136:
2126:
2121:
2116:
2111:
2106:
2101:
2096:
2091:
2085:
2079:
2075:
2074:
2072:
2071:
2070:
2069:
2059:
2054:
2053:
2052:
2047:
2042:
2035:Sexual content
2032:
2027:
2026:
2025:
2015:
2010:
2009:
2008:
2003:
1998:
1988:
1987:
1986:
1976:
1971:
1966:
1965:
1964:
1959:
1948:
1946:
1945:Social aspects
1942:
1941:
1939:
1938:
1933:
1929:Counter-Strike
1925:
1924:
1923:
1913:
1908:
1907:
1906:
1901:
1891:
1885:
1883:
1879:
1878:
1876:
1875:
1870:
1869:
1868:
1856:
1854:Crunch culture
1850:
1848:
1845:Harassment and
1842:
1841:
1839:
1838:
1835:Active Shooter
1831:
1826:
1818:
1811:
1804:
1801:V-Tech Rampage
1797:
1790:
1783:
1776:
1769:
1762:
1755:
1748:
1741:
1736:
1729:
1722:
1715:
1707:
1705:
1701:
1700:
1698:
1697:
1692:
1686:
1683:
1682:
1675:
1674:
1667:
1660:
1652:
1645:
1644:
1618:
1593:
1574:
1560:
1530:
1519:
1494:
1469:
1460:|journal=
1422:
1396:
1381:
1367:
1349:
1324:
1294:
1283:
1260:
1251:|journal=
1210:
1184:
1163:
1136:
1117:Mia Consalvo.
1109:
1087:
1059:
1033:
1023:
1021:
1018:
1017:
1016:
1011:
1006:
1001:
996:
989:
986:
933:Anarchy Online
872:Main article:
869:
866:
865:
864:
849:
840:
826:
823:command prompt
795:
792:
768:
765:
743:
740:
703:
702:Code injection
700:
658:Main article:
655:
652:
562:
559:
553:
552:Memory editing
550:
528:
525:
512:
509:
502:Video game bot
500:Main article:
497:
494:
415:CheatCodes.com
410:
407:
339:POKE 47196,201
285:
282:
255:
254:
237:
236:
191:
189:
182:
175:
174:
89:
87:
80:
75:
49:
48:
46:
39:
9:
6:
4:
3:
2:
2234:
2223:
2220:
2219:
2217:
2198:
2197:
2193:
2191:
2190:
2186:
2184:
2183:
2179:
2177:
2176:
2172:
2170:
2169:
2165:
2164:
2162:
2158:
2152:
2151:Skin gambling
2149:
2147:
2144:
2142:
2139:
2135:
2132:
2131:
2130:
2127:
2125:
2124:Law 3037/2002
2122:
2120:
2117:
2115:
2112:
2110:
2107:
2105:
2102:
2100:
2097:
2095:
2092:
2090:
2087:
2086:
2083:
2080:
2076:
2068:
2065:
2064:
2063:
2060:
2058:
2055:
2051:
2048:
2046:
2043:
2041:
2038:
2037:
2036:
2033:
2031:
2028:
2024:
2021:
2020:
2019:
2016:
2014:
2011:
2007:
2004:
2002:
1999:
1997:
1994:
1993:
1992:
1989:
1985:
1984:LGBTQ+ themes
1982:
1981:
1980:
1977:
1975:
1972:
1970:
1969:Cyberbullying
1967:
1963:
1960:
1958:
1955:
1954:
1953:
1950:
1949:
1947:
1943:
1937:
1934:
1932:
1930:
1926:
1922:
1919:
1918:
1917:
1914:
1912:
1909:
1905:
1902:
1900:
1897:
1896:
1895:
1892:
1890:
1887:
1886:
1884:
1880:
1874:
1871:
1867:
1864:
1863:
1862:
1861:
1857:
1855:
1852:
1851:
1849:
1843:
1837:
1836:
1832:
1830:
1827:
1825:
1823:
1822:Mass Effect 3
1819:
1817:
1816:
1812:
1809:
1805:
1803:
1802:
1798:
1796:
1795:
1791:
1789:
1788:
1784:
1782:
1781:
1777:
1775:
1774:
1770:
1768:
1767:
1763:
1761:
1760:
1756:
1754:
1753:
1749:
1747:
1746:
1742:
1740:
1737:
1735:
1734:
1730:
1728:
1727:
1726:Mortal Kombat
1723:
1721:
1720:
1716:
1714:
1713:
1709:
1708:
1706:
1704:Game-specific
1702:
1696:
1693:
1691:
1688:
1687:
1684:
1680:
1673:
1668:
1666:
1661:
1659:
1654:
1653:
1650:
1632:
1628:
1622:
1607:
1603:
1597:
1589:
1585:
1578:
1570:
1564:
1548:
1544:
1540:
1534:
1528:
1523:
1508:
1504:
1498:
1483:
1479:
1473:
1465:
1452:
1436:
1432:
1426:
1410:
1409:Your Spectrum
1406:
1400:
1393:
1388:
1386:
1377:
1371:
1363:
1359:
1353:
1338:
1334:
1328:
1312:
1308:
1304:
1298:
1290:
1286:
1284:9780262693646
1280:
1276:
1275:
1267:
1265:
1256:
1243:
1224:
1217:
1215:
1198:
1194:
1188:
1180:
1179:Imagine Media
1176:
1175:
1167:
1151:
1147:
1144:Jason Rybka.
1140:
1124:
1120:
1113:
1105:
1101:
1097:
1091:
1075:
1074:
1069:
1063:
1048:
1044:
1037:
1028:
1024:
1015:
1012:
1010:
1007:
1005:
1002:
1000:
997:
995:
992:
991:
985:
981:
979:
975:
971:
967:
963:
962:
957:
952:
950:
946:
942:
938:
934:
930:
926:
922:
921:macro scripts
918:
913:
910:
908:
904:
900:
896:
892:
887:
885:
881:
875:
862:
858:
854:
850:
847:
846:
841:
837:
836:
831:
827:
824:
820:
816:
815:
810:
806:
805:
804:
801:
791:
789:
784:
780:
778:
772:
764:
760:
758:
757:
752:
748:
739:
737:
733:
728:
719:
715:
714:
713:Jet Set Willy
709:
699:
695:
693:
688:
686:
682:
677:
675:
674:computer game
671:
666:
661:
651:
649:
645:
641:
637:
633:
629:
628:
622:
619:
615:
611:
607:
603:
599:
595:
591:
590:Action Replay
587:
583:
576:
572:
567:
558:
546:
542:
537:
533:
524:
522:
518:
517:Geometry Dash
508:
503:
493:
491:
487:
483:
482:
477:
473:
469:
463:
461:
460:
455:
454:
449:
448:
447:GoldenEye 007
442:
436:
434:
427:
425:
420:
416:
406:
402:
400:
399:Source engine
396:
390:
388:
384:
383:
377:
374:
373:
366:
364:
360:
356:
352:
351:
346:
345:
335:
332:
328:
324:
318:
316:
315:
307:
306:
301:
297:
296:
291:
281:
279:
278:software bugs
275:
271:
267:
263:
259:
251:
248:
233:
230:
222:
219:December 2021
212:
208:
204:
198:
197:
192:This article
190:
181:
180:
171:
168:
160:
157:December 2021
149:
146:
142:
139:
135:
132:
128:
125:
121:
118: –
117:
113:
112:Find sources:
106:
102:
96:
95:
90:This article
88:
84:
79:
78:
73:
71:
64:
63:
58:
57:
52:
47:
38:
37:
32:
27:
19:
2194:
2187:
2180:
2173:
2166:
2109:Shutdown law
1957:banned games
1928:
1904:online games
1893:
1859:
1833:
1821:
1813:
1799:
1792:
1785:
1778:
1771:
1766:JFK Reloaded
1764:
1757:
1752:The Guy Game
1750:
1743:
1731:
1724:
1717:
1710:
1635:. Retrieved
1631:the original
1621:
1609:. Retrieved
1605:
1596:
1587:
1577:
1563:
1551:. Retrieved
1547:the original
1542:
1533:
1522:
1510:. Retrieved
1506:
1497:
1485:. Retrieved
1481:
1472:
1451:cite journal
1439:. Retrieved
1435:the original
1425:
1413:. Retrieved
1408:
1399:
1370:
1362:the original
1352:
1340:. Retrieved
1336:
1327:
1315:. Retrieved
1311:the original
1306:
1297:
1289:the original
1273:
1242:cite journal
1230:. Retrieved
1201:. Retrieved
1197:the original
1187:
1172:
1166:
1154:. Retrieved
1150:the original
1139:
1127:. Retrieved
1123:the original
1112:
1103:
1099:
1090:
1078:. Retrieved
1071:
1062:
1050:. Retrieved
1046:
1036:
1027:
982:
959:
956:game servers
953:
944:
940:
936:
932:
928:
914:
911:
888:
877:
843:
833:
825:("C:\>").
812:
797:
785:
781:
773:
770:
761:
754:
749:
745:
720:instruction
711:
705:
696:
689:
684:
678:
667:
663:
625:
623:
588:'s range of
579:
555:
530:
514:
505:
489:
479:
464:
457:
451:
445:
437:
430:
423:
403:
391:
380:
378:
370:
367:
363:machine code
348:
342:
336:
327:Commodore 64
319:
312:
303:
293:
290:play testing
287:
261:
260:
258:
243:
225:
216:
193:
163:
154:
144:
137:
130:
123:
111:
99:Please help
94:verification
91:
67:
60:
54:
53:Please help
50:
26:
2018:Review bomb
2006:VR sickness
1974:Form of art
1745:Islamic Fun
1553:15 December
1317:29 December
1080:17 November
1004:Konami Code
994:Cheating AI
811:version of
751:Hex editors
630:, in which
575:Nintendo 64
468:Konami Code
424:Cheat Codes
409:Cheat codes
372:Amiga Power
344:Knight Lore
295:Manic Miner
264:involves a
2134:Loot boxes
1952:Censorship
1808:No Russian
1759:Hot Coffee
1733:Night Trap
1712:Death Race
1392:"Trainers"
1232:24 January
1020:References
999:Debug menu
970:PunkBuster
941:Guild Wars
861:settlement
800:high score
692:Game Genie
642:, created
640:Game Genie
594:Game Genie
541:Game Genie
433:video game
266:video game
203:improve it
127:newspapers
56:improve it
18:Cheat code
1996:addiction
1873:Gamergate
1637:2 January
1611:2 January
1415:1 January
1156:3 January
1129:3 January
945:RuneScape
937:EverQuest
648:copyright
618:GameShark
614:Game Gear
606:Super NES
582:Multiface
571:GameShark
331:Multiface
207:verifying
62:talk page
2216:Category
2160:Lawsuits
2057:Violence
2050:Shotacon
2030:Religion
1916:Swatting
1482:Lifewire
988:See also
895:wallhack
884:Internet
722:DEC (HL)
670:run time
632:Nintendo
610:Game Boy
543:for the
270:gameplay
2045:Lolicon
1899:esports
1794:RapeLay
1512:30 June
1487:30 June
1441:16 July
1431:"Hacks"
1342:26 June
899:meshing
756:Dune II
598:Genesis
490:Gradius
481:Gradius
476:porting
459:Heretic
426:(album)
284:History
201:Please
141:scholar
2067:Sexism
1824:ending
1281:
1203:12 May
1052:9 July
943:, and
907:hitbox
891:aimbot
845:Portal
612:, and
511:Macros
382:Cheat!
359:hacker
143:
136:
129:
122:
114:
2078:Legal
2062:Women
2040:Eroge
1588:Axios
1226:(PDF)
1100:Antic
976:, or
857:trial
839:mode.
650:law.
586:Datel
441:debug
350:Crash
309:'
148:JSTOR
134:books
2023:List
2013:Race
1739:Jynx
1639:2007
1613:2007
1606:CNET
1555:2009
1514:2024
1489:2024
1464:help
1443:2018
1417:2007
1344:2009
1319:2008
1279:ISBN
1255:help
1234:2009
1205:2014
1158:2007
1131:2007
1082:2017
1054:2014
830:Xbox
814:Doom
807:The
736:DLLs
708:POKE
596:for
539:The
496:Bots
453:Doom
355:POKE
323:POKE
120:news
1543:IGN
1337:IGN
1307:IGN
1228:: 8
915:In
903:ESP
859:or
819:DOS
809:32X
727:NOP
718:Z80
687:".
602:NES
545:NES
456:in
395:ban
341:in
205:by
103:by
2218::
1604:.
1586:.
1541:.
1505:.
1480:.
1455::
1453:}}
1449:{{
1407:.
1384:^
1335:.
1305:.
1263:^
1246::
1244:}}
1240:{{
1213:^
1102:.
1098:.
1070:.
1045:.
972:,
939:,
935:,
931:,
608:,
604:,
600:,
569:A
65:.
1810:"
1806:"
1671:e
1664:t
1657:v
1641:.
1615:.
1590:.
1571:.
1557:.
1516:.
1491:.
1466:)
1462:(
1445:.
1419:.
1346:.
1321:.
1257:)
1253:(
1236:.
1207:.
1160:.
1133:.
1104:7
1084:.
1056:.
428:.
250:)
244:(
232:)
226:(
221:)
217:(
199:.
170:)
164:(
159:)
155:(
145:·
138:·
131:·
124:·
97:.
72:)
68:(
33:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.