AngelCode.com > Reference Database

Game Development/Cheat & crack prevention

.NET  7
Artificial Intelligence  7
  Group behavior  2
  Path finding  16
    A* and its derivatives  6
  Pattern recognition  1
  Steering behavior  2
  World interaction  4
Audio  0
  DirectX  8
  DSP  5
  Ogg Vorbis  2
  OpenAL  1
  Windows  1
Computer Science  2
  Algorithms & data structures  12
    BSP trees  8
  Encryption  12
  Randomness & noise  11
Data storage  4
  File formats  14
    Image  10
  Resource files  2
Game Development  20
  Cheat & crack prevention  10
  Input  3
  Timing  4
Graphics  27
  Character animation  6
  DirectX  24
    Optimizing  8
  Illumination  5
    Deferred lighting  7
    Global illumination  8
    Lighting models  6
    Screen Space Ambient Occlusion  4
    Shadow maps  18
    Shadow volumes  15
  Image processing & synthesizing  19
  Non-polygonal rendering  3
    Ray tracing  3
  OpenGL  12
  Particle systems  7
  Shaders  32
  Simulation  4
    Cloth  2
    Clouds & sky light  7
    Fire & smoke  4
    Liquids  12
  Surfaces & Meshes  8
    Implicit surfaces  6
    Parametric curves & surfaces  7
    Polygon reduction & LOD  3
    Subdivision surfaces  7
  Terrain  7
    Continuous LOD  12
    Generating data  4
    Voxel engines  2
  Text  6
  Transparency  1
  Visibility determination  16
Languages  5
  Assembler  20
  C & C++  26
    C++ exceptions  5
    Calling conventions  12
    Debugging  5
    Memory management  7
    Optimizations  6
  C#  4
  Creating your own language  13
    Garbage collection  7
  D  2
  Java  4
  Scripting  3
    JScript & VBScript  1
    Lua  6
    Other languages  8
    Perl  2
    Python  5
    Ruby  4
Mathematics  3
  Fourier transform  4
  Geometry  6
  Linear algebra, vectors & matrices  9
  Wavelet transform  5
Object design  3
Physics  5
  Body dynamics  8
  Collision detection  10
    Polytopes  6
Platform  2
  Linux  1
  Mac  2
  Windows  13
    COM, ATL & WTL  8
    Dynamically loaded libraries  6
    Hooks  5
    Input  2
    Networking  6
    Screensavers  3
    Services  1
    Shell  2
    Small executables  3
    Windows  8
Web Technologies  8

Keeping the Pirates at Bay: Implementing Crack Protection for Spyro: Year of the Dragon
October 2001 - Gavin Dodd
This article describes how Sony battled the crackers with crack-protection on their game. The articles gives some interesting ideas how to make it difficult to crack your product.

Bitwise Operator: The Plain Truth About Piracy
February 2002 - fprefect
This article explains how Ambrosia Software tries to battle piracy by requiring users to renew their license codes if they are out of date.

Game Cheats and Cheat Prevention
April 2002 - Mike O'Brien, Gaile Gray
This article deals with cheating in multiplayer games. It mentions how different networking models are vulnerable to different types of cheating.

Game Download Registration Roadblocks
Feb 2003 - Bob Mandel
This article discusses some valid points about how it is important to make it easy for the consumer to register shareware products.

How to Hurt the Hackers: The Scoop on Internet Cheating and How You Can Combat It
July 2000 - Matt Pritchard
This article discusses various cheats and hacks that affect multiplayer games, both FPS and RTS.

Another Take on Game Piracy
August, 2003 - Windaria
This article gives an interesting point in the fight against piracy.

Piracy and Unconvential Wisdom
June, 2004 - Chad Z. Hower aka Kudzu
This article discusses software piracy and what should and shouldn't be done to prevent it.

Inside Windows Product Activation
July, 2001
This article shows in details how the Windows Product Activation keys are generated.

Fravia’s How to protect better
Fravia
There can be found lots of tips on how to make a better protection scheme against software crackers on this page. It also have links to a few other interesting pages.

A simple software key useful to protect software components
Nov, 2004 - Manuele Sicuteri
This article gives an example of how to protect a software using an unlocking key. The scheme is rather simple and should only be used as an idea on how it can be done. The article also shows how the protection can be bypassed, and discusses what can be done to improve the protection. In short, very interesting article.