Search
message 1 unit of Games and the Ensemble Cast is in your order.

Proceed to checkout.

Proceed to checkout.







My Shopping Cart

[ 3 ] items in cart

View Cart | Checkout


Game Developer Research
bullet Research Reports

Gamasutra
bullet Contractor Listings

GDC Vault
bullet Individual Subscription

GDC Audio Recordings
bullet App Developers Conference 2013
bullet GDC Next 2013
bullet GDC Europe 2013
bullet GDC 2013
bullet GDC Online 2012
bullet GDC Europe 2012
bullet GDC 2012
bullet GDC 2011
bullet GDC 10
bullet GDC 09
bullet GDC Austin 08
bullet GDC Mobile 08
bullet GDC 08
bullet GDC Austin 07
bullet GDC Mobile 07
bullet GDC 07
bullet GDC 06
bullet GDC 05
bullet GDC 04
bullet GDC 03
bullet GDC 01
bullet GDC 2000 & Before


Newest Item(s)
bullet

Why Now Is the Best Time Ever to Be a Game Developer

Ingress: Design Principles Behind Google's Massively Multiplayer Geo Game

Playing with 'Game'

Gathering Your Party with Project Eternity (GDC Next 10)

D4: Dawn of the Dreaming Director's Drama (GDC Next 10)

Using Plot Devices to Create Gameplay in Storyteller (GDC Next 10)

How I Learned to Stop Worrying and Love Making CounterSpy (GDC Next 10)

Luck and Skill in Games

Minimalist Game Design for Mobile Devices

Broken Age: Rethinking a Classic Genre for the Modern Era (GDC Next 10)


Storefront > GDC Vault Store - Audio Recordings > Austin GDC 2007


View larger image
 


QTY:

Dupes, Speed Hacks and Black Holes: How Players Cheat in MMOs
Price $7.95
Adjustment
Type
Stock Unlimited
Status
Weight 0 lb, 0 oz
SKU GDCA07-5883
Statistics
Description
Speaker: Tim Keating (Director of Development, Heatwave Interactive)
Date/Time: Thursday (September 6, 2007) 11:00am — 12:00pm
Location (room): 5
Track: Online Games - Technology and Services
Experience Level: Intermediate

Session Description
This talk is an overview of problems encountered by the speaker during his tenure on Ultima Online. The focus is on issues that were exploited by players to achieve a game advantage, to grief other players, or grief the service itself. The talk is comprised of anecdotes about real incidents, with discussion of the conditions (and errors) that enabled the exploits and how developers remedied the problem. A cautionary tale, this talk offers practical suggestions for developers on up and coming products who wish to avoid making the same kinds of mistakes.

Please leave this field blank.

There are no related products to display.

Related Products...

Please leave this field blank.