Feeds
90%
Counter-Strike: Global Offensive

Counter-Strike: Global Offensive

Gang bang

  • alert
  • submit to reddit

3 Big data security analytics techniques

Review Take a good close look at your favourite multiplayer first-person shooter and chances are it owes much of its weapon balancing, map structure and pacing to Counter-Strike. A tactical, team-based Half-Life mod which first saw light of day in 1999 – having itself been influenced by the brilliant but glitchier Action Quake 2 – which was subsequently honed to perfection as various updates were applied.

Counter-Strike: Global Offensive

Huff and I puff and I...

One thing that Counter-Strike's development team never meddled with, however, was how the action flowed. Indeed, true to its predecessors, CS:GO eschews such modern FPS staples as sticky cover, iron sight aiming and predictable gun pick-up points. Instead, it continues with the magic ingredient which made it so different in the first place – an ingredient that few have dared to copy – that once you die you're dead... for a few minutes at least.

So is born the eternal dilemma: do I rush the enemy, so possibly gaining an advantageous position, perhaps even getting the drop on their flank or rear? Or will I be risking running into a wall of instant death in the shape of a well-organised opposing team? Or do I choose to keep away from any initial conflicts, perhaps meaning I stay alive for longer but at the expense of John McClane type moments where everything falls into place and I get to play hero? Decisions, decisions.

Counter-Strike: Global Offensive

Tin hat alley

Before I get too lost in whimsy, introductions are in order. Counter-Strike, which even those with no experience of the game should have grasped by now, is a FPS. It is one which pits terrorists against counter-terrorists in some of the most perfectly planned maps ever to be created. At the beginning of rounds, weapons are bought – limited to knife, pistol and one larger gun – with money earned from kills and objective completion.

SANS - Survey on application security programs

Next page: In the mode

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Hearthstone: Heroes of Warcraft – A jolly little war for lunchtime
Free-to-play WoW turn-based game when you have 20 minutes to kill
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.