Cyberbullying Tactics 2015 – 42 Cyberbullying Examples

Cyberbullying Tactics 2015 is a prevention education article and website page resulting from my research conducted in October 2014, along with input from parents, educators and pediatric professionals. Cyberbullying is one typology included in my Information Age darkside of human consciousness construct. Of the seven typologies, cyberbullying is the only profile that requires the aggressor and target to be minors. For semantic clarity and in all my published works, cyberbullying exclusively remains a pediatric issue until consensus includes all age ranges.

Although I have always conceptualized cyberbullying as applicable to any age range, present running definitions in America restrict cyberbullying to minors. The adult forms of cyberbullying are called cyberstalking, cyber harassment, defamation, libel and slander. Each of these examples of cyber attacks resemble cyberbullying, but have slightly different meanings.

Whatever conditions are given to describe child on child online abuse, the core constructs remain the same and rooted in pediatric needs for power, control and recognition. As you will quickly learn from reading my cyberbullying tactics list, children have designed cyberbullying into both a sinister and industrious science of online abuse and deception. Provided below are 42 types of cyberbullying presently being applied by children in online and offline environments.

From a societal standpoint, cyberbullying continues to flourish infesting the hearts and minds of children, their loved ones and communities on a global scale. Unlike classic bullying, cyberbullying primarily resides within the hidden realm of cyberspace, mobile devices, social networking sites and Information and Communication Technology (ICT). Although cyberbullying is an information technology dependent behavior, it also includes classic bullying, which repeats the primary ways bullying occurred throughout history.

Cyberbullying is an abuse centered interpersonal dynamic that includes aggressors, targets and bystanders. The main developmental issues fueling cyber bullying are peer acceptance, recognition and occasionally retribution. Not all cyberbullying is fueled by dark developmental needs or perceptual distortions, because there are instances when children cyberbully other children due to their ignorance and not maladaptive perceptions.

“Not to say that Pre-Information Age bullied children were not traumatized, but Information Age cyberbullied children are relentlessly tormented 24 hours a day, 7 days a week and 365 days a year.”

Different from pre-Information Age bullying, cyberbullying is not bound by physical environments, physical attributes or gender. Causing the “veil of anonymity” afforded by cyberspace, children of the Information Age are no longer limited by the factors that once kept pre-Information Age children from becoming aggressors. In today’s world, a child who has been bullied or cyberbullied is twice as likely to become cyberbullies themselves. Given humanity thrives at the beginning of the Information Age, no one knows how far minors will go to harm their peers in order to be recognized, accepted or seek revenge.

Cyberbullying is a term describing recurrent and sustained verbal and/or physical attacks by one or more children towards another child Information and Communication Technology (ICT). Similar to classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to deprecate another child for reasons other than self-defense. Cyberbullying describes threatening or disparaging communications delivered through ICT that can occur anonymously, publicly or by using felonious identities. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyberbullying consists of data exchanged via ICT and may never involve face-to-face meetings.

By definition, classic & cyberbullying occurs among young people. When an adult is involved as the aggressor, it meets criteria for cyber harassment or cyberstalking, which in many states is a criminal act. Although the terms “bullying” and “cyberbullying” includes adult intimidation behaviors in contemporary culture, these describe pediatric behaviors as briefly mentioned above. Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, deprecate & defame a targeted child initiated and sustained by another child or group of children.

With society increasingly becoming reliant upon ICT and as the darkside of cyberspace matures, cyberbullying prevention, acceptable online behaviors and right to privacy issues will require a significant amount of attention and planning. The question to be answered is if cyberbullies, their targets and bystanders will mature differently than those of us who grew up without cyberspace, mobile device technology and social media.

For the benefit of future societies, I hope social scientists of the 22nd century and beyond will one day prove that cyberbullying is no different from classic bullying in relationship to psychological damages lasting throughout adulthood. Although I am hoping cyberbullying will be no different than classic bullying, regarding adult psychopathology, the intellectual regions of my head cannot seem to minimize one profound reality. The reality is how an Information Age cyberbullied child who is taunted, ridiculed and exploited around the clock with no escape can enter adulthood psychodynamically unscathed just as many pre-Information Age cyberbullied children did from history. Offered below is my compilation of cyberbullying tactics, used by minors, to harm and victimize other children.

Bash Boards: Bash Boards are a cyberbullying tactic describing a case of cyber attacks a cyberbully initiates in chat rooms, “virtual” rooms, online forums and message boards. Within these social exchange sites, children disseminate and exchange information they deem important, socially relevant or noteworthy for their peers to view, comment on and share with other peers. These forums are naturally frequented by cyberbullies and affiliated school acquaintances. The reason they give the slang term of Bash Boards is because cyberbullies or any child can post negative and defamatory information about another child that is public for all to read and shared among forum participants.

BlogoBullying: BlogoBullying is a cyberbullying tactic describing when a cyberbully creates a blog with the target child being the central subject and topic of blog posts. Although BlogoBullying is the least frequently used tactic in a cyberbullies cyber attack toolbox, it is by far the most content rich method and can cause long-term injury to the target child when applying for employment and college admissions. Not only does BlogoBullying include defamatory, felonious and humiliating information about the target minor, but with a universal understanding of search engine optimization (SEO) by the cyberbully, their derogatory laden posts can page rank on the first page of Google.

Cyberbullying by Proxy: Cyberbullying by Proxy is a cyberbullying tactic describing a cyberbully who encourages, deceives or persuades other online users to harass a target child. Cyberbullying by proxy is a dangerous kind of cyberbullying in that adults may become accomplices to the cyberbully. For many adult accomplices who are rigged by the primary cyberbully, they do not recognize they are abusing a minor or possibly a child of someone they know. With cyberbullying by proxy, the primary cyberbully will go to any lengths to incite counter attacks and retaliation against the target child. To control others into attacking the target child, cyberbullies use other common tactics to take on their malevolent objectives.

Cyberstalking: Cyberstalking is a cyberbullying tactic that some internet safety professionals feel should not be included with cyberbullying when abiding by the conventional definition of cyberstalking. When hanging on the softer side of the severity spectrum, cyberstalking may be categorized as a cyberbullying tactic when it includes intimidation, vilification and persistent taunting delivered via Information and Communications Technology channels that do not prioritize threatening the target child’s physical safety. Furthermore, it is acceptable to include cyberstalking as a cyberbullying tactic when the cyberbullies methods are not resoundingly communicating physical threats against the target child or anyone the target child is dependent upon in their daily lives.

Cyber Drama: Cyber Drama is a cyberbullying tactic that is a lot more common than moderate to extreme cases of cyberbullying. Cyber Drama tends to be mild cyberbullying or gossip that was not thought to be shared on a social or a “flame war” that terminates after a few messages. Most child and adolescent online users are perceptive about telling each other to refrain and will block a user or open a new account when necessary. Some children engaged in Cyber Drama can be psychologically affected due to their negative perception of the data being passed around. Cyber Drama is best identified as a passive aggressive kind of cyberbullying.

Cyber Harassment: Cyber Harassment is a cyberbullying tactic that describes the sending of hurtful defamatory messages to a target child that is worded in a severe, persistent or pervasive manner. When persistent and disparaging, Cyber Harassment can cause the target child significant distress and undue worry. These threatening messages are hurtful, frequent and very dangerous. Like the adult form of cyber harassment, this cyberbullying tactic requires three or more harassing messages related by the theme of the message sent. As a cyberbullying tactic, Cyber Harassment is both negative in content and frequent in communication.

Cyber Threats: Cyber Threats are a cyberbullying tactic whereby a cyberbully actively engaged in passive aggressive strategies of informing the target child that he or she is in danger from unknown or felonious assailants. Although the term, Cyber Threats, is often equated with Cyber Terrorism, this cyberbullying tactic is based in using threatening or fear provoking information to frighten the target child. The cyberbully who is informing the target child is rarely the alleged child planning the assault. Given the goal of the cyberbully is to inspire fear in the target child, some cyberbullies will feign suicidal ideations and plans to cause the target child tremendous fear.

Denigration: Used in both classic and cyberbullying, denigration is a term describing when cyberbullies send, post, or publishes cruel rumors, gossip and false assertions about a target child intentionally damaging their reputation or friendships. Also known as “dissing,” this cyberbullying method is a common element and layer involved in most all of the cyberbullying tactics listed. The main goal of Denigration is to humiliate & disparage the target child.

Digital Piracy Inclusion: Digital or Internet Piracy is broadly defined as the illegal reproduction and distribution of copyrighted material on the internet using Information and Communications Technology. Although most cyberbullies do not fully understand the legal and criminal implications related to Digital Piracy, they are succinctly aware that it is an online behavior to avoid. As a cyberbullying tactic, the cyberbully encourages the target child to engage in Digital Piracy and then reports them either to the authorities, their parents or educators.

eIntimidation: eIntimidation is a colloquial expression describing a cyberbully tactic used to inspire fear in the target child by communicating threats that may be direct or implied using email as the vehicle of communication. Upon emailing the target child their threat, the cyberbully also informs other members in the peer group of the alleged threat. The cyberbully sends a threatening e-mail to the target child and then forwards or copies and pastes the threatening message to others of the implied menace. If these threats at once or indirectly suggest physical harm, they proceed to the tactic of cyberstalking.

Exclusion (aka, Social Exclusion): Exclusion is a cyberbullying tactic that is highly effective and directly targets a child’s developmental need to feel accepted and part of a social construct. Social exclusion occurs by indirectly sending a harmful message to the target child that they are not included in social activities without the need for verbal deprecation. As it is well-known children and teens are developmentally fixated being recognized by their peers; the process of designating who is a member of the peer group and who is not included can be devastating to the target child.

Exposure: Exposure is a cyberbullying tactic that includes the public display, posting or forwarding of personal communication, images or video by the cyberbully that is personal and private to the target child. Exposure becomes even more detrimental to the target child when the communications posted and displayed publicly contains sensitive personal information or images and video that are sexual in nature. As mobile device technology, images and video becomes more commonplace, the tactic of Exposure is certain to become prevalent.

Flaming: Flaming is a cyberbullying tactic defined as an online passionate argument that frequently includes profane or vulgar terminology. These online arguments occur in public communication environments for peer bystanders to see. These environments include discussion panels and groups, chat rooms, and newsgroups. Flaming may have features of a normal message, but its intent is designed differently and flamers endeavor to maintain their power or establish a posture of dominance asserted against a target child.

Griefing: Griefing is a term used to describe when a cyberbully habitually and chronically causes frustration to the target child and his/her peers by not following the rules of an interactive online video game and intentionally disrupting the immersion of another player in their gameplay. Not specific to cyberbullying, “Griefing” is often a tactic used in interactive video games and used by both cyberbullies and adults engaging in cyber harassment. Similar to Internet Trolls, cyberbullies work in teams to target a child.

Happy Slapping: Happy Slapping is a comparatively new type of cyberbullying that integrates the rapid increase of online videos with classic bullying. This occurs when a target child or unsuspecting victim is physically attacked or embarrassed in person and then an accomplice video records or takes pictures of the incident. The image or video is then posted online at video and social networking sites for public use. With the widespread growth of mobile device technology, Happy Slapping is a cyberbullying tactic likely to grow.

Non-Consensual Multimedia Bullying: The usage of images and video as a cyberbullying tactic has become a rising fear that many communities, law enforcement authorities, and schools are taking seriously. Images and videos of the target child are emailed to peers, while others are published on video sites such as YouTube. The main aim of this maneuver is to humiliate and disparage the target child. As the term denotes, this cyberbullying tactic is non-consensual and the target child either has not given consent or does not know the images or videos are being disseminated. (i.e. Keek, Snapchat, Instagram, Ask.fm)

Impersonation: Impersonation or “impinge” as a tactic in cyberbullying can only happen with the “veil of anonymity” offered by Information and Communications Technology. Cyberbullies impersonate the target child and make unpopular online comments on social networking sites, forums, message tables and in chat rooms. Using impersonation, cyberbullies also set up internet sites that include vitriolic information leading to the target child being ostracized or victimized in more classic bullying ways. Often times, the target child is unaware of these events until the tactic has been designed and implemented.

Instant Messaging Attacks: Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual. Cyberbullies use IM to send harassing and threatening messages to the target child themed with disparaging information. IM has become a very big portion of the social life of child and adolescent online users. The conversations and conflicts that arise online often give rise to behaviors that are acted out in person during school or at the local shopping mall.

Interactive Gaming Harassment: Interactive games on online gaming devices allow children to communicate by chat and live Internet phone with others they are matched with online. Having the ability to exchange information with gaming opponents and fellow peers; cyberbullies verbally abuse others, use threatening and profane language, lock others out of games, pass false information about others. Depending on their computer shrewdness, cyberbullies can also hack into the target child’s accounts. Given the competitive nature of online gaming, children are often unaware of being targeted until fellow players and peers bring the cyberbullying to their attention.

Malicious Code Dissemination: Sending malicious code is a cyberbullying tactic whereby malicious information is sent intentionally to a target child to damage or harm their ICT. Many cyberbullies will send viruses, spyware and hacking programs to a target child that can be very pricey to fix. The routine of sending malicious code as a cyberbullying tactic is commonly set aside for children and adolescents advanced in ICT. As Information Age children become more adept with information technology, the tactic of sending malicious codes will become more frequent in the cyberbullies arsenal of online assaults.

Micro-Visual Bullying: Micro-Visual Bullying is a communication channel that is a future cyberbullying tactic trend. With the increase and expansion of Mobile Device Technology and Smartphones that are mobile and image/video enabled, children will soon become enveloped by the new boom of what has been termed video. Just as Twitter restricts users to text 140 characters, Viddy users are restricted to 15-second video clip recordings to sharing with peers. Given that cyberbullies have become enamored by the speed and dissemination of Twitter, 15-second visual images and video are likely to become the new trend in traumatizing vulnerable children.

Mobile Device Image Sharing: Not just a tactic used in cyberbullying, but a pattern of information exchange that can be a criminal act if the pictures are pornographic or graphic enough depicting under aged children. Children can receive images directly on their phones and then send them to everyone in their address books. Some children actually post these images on video sites, their social networking profiles and other programs for anyone to download or view. With the development and widespread usage of mobile device technology, this cyberbullying tactic will become dominant.

Password Theft & Lockout: A cyberbully steals the target child’s password and begins to chat with other people, pretending to be the target child (a.k.a. Impersonation.) Confident that others think he/she is the target child, they begin to communicate provocative and adversarial messages that are offensive and anger the target child’s friends or strangers. In addition to impersonating the target child, the cyberbully locks out the target child from his/her accounts by changing his/her password. Without having access to his/her username or email account, the target child is unable to shut down or prove he/she is not the culprit spreading the vitriolic information.

Phishing: Phishing is a cyberbully tactic that requires tricking, persuading or manipulating the target child into revealing personal and/or financial information about themselves and/or their loved ones. Once the cyberbully acquires this information, they begin to use the information to access their profiles if it may be the target child’s password. Phishing, also includes purchasing unauthorized items with the target child’s or parents’ credit cards.

Porn & Marketing List Insertion: A frustrating and embarrassing tactic committed by cyberbullies is signing the target child up with numerous pornography and/or junk marketing e-mailing and instant messaging marketing lists. By doing this, the target child receives hundreds of e-mails and instant messages from pornography sites and advertising companies. Often times, the target child’s parents are made aware of these pornographic emails, assume their child signed up for receipt of pornographic information and punish them without due process.

Pseudonym Stealth: A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target child. When using instant messaging services like MSN Messenger or Yahoo Messenger, an online user has a nickname they have chosen. Cyberbullies use this same feature to change their name to something that a target child would not expect. Having a nickname, then the cyberbully proceeds to taunt, tease and humiliate the target child without the ability of the target child to know their identity.

Screen Name Mirroring: Screen Name Mirroring is a cyberbullying tactic used against a target child by constructing a screen name or user name that is very similar to the target child’s name. The name may have additional or removed letters, numbers or combinations of the two to appear the same as the target child’s screen name. With Screen Name Mirroring, the cyberbully uses screen names and user names almost identical to the target child’s requiring the respondent of the information to be attentive in differentiating the minor differences.

Sexting: Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature. It can also refer to text messages of a sexually charged theme. Sexting is both a sexually oriented form of communication and a cyberbullying tactic. As a cyberbullying tactic, the cyberbully creates and/or disseminates sexually themed information about the target child that is both highly embarrassing and humiliating.

Sextortion: Sextortion is a cyberbullying tactic by which children exploit other children for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target child. If the target child does not submit to their sexual directives, they threaten to disclose sensitive information to loved ones, employers, educators, peers or organizations if the victim does not submit to their demands.

Slut Shaming: Slut Shaming is a cyberbullying tactic primarily targeting a female. A form of sexual cyberbullying, Slut Shaming occurs when a cyberbully records images or videos of the target child that can easily be construed as sexually provocative. Often times, the images and video used to shame the target child have been captured without the child’s consent or knowledge. Once these images and videos have been obtained, the cyberbully publishes this information throughout the school and within social networking sites.

Social Media Bullying: Social Media Bullying is a tactic used by which the cyberbully persuades the target child to include them in their “friends” or “buddy” lists and then begins to contact the target child’s friends, peers and loved ones disseminating disparaging information about the target child. The cyberbully will also encourage the target child to accept the cyberbullies accomplices on their “friends” or “buddy” lists without the target child knowing the cyberbullies true motivations.

Text Wars and Text Attacks: Text Wars and Text Attacks are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target child by sending hundreds of emails or text messages. Besides the emotional toll it can take on the target child, their cell phone charges may escalate causing parental admonishment. Text Wars and Text Attacks are cyberbullying tactics that encourage other children to engage in harmful behaviors against the target child.

Tragedy News Mirroring: Local/National Tragedy Mirroring is a cyberbullying tactic whereby a cyberbully threatens a target child that he/she will allege that the target child is planning and preparing to engage in a violent activity directed at the targeted child’s school or community. Using Information and Communications Technology, the cyberbully disseminates felonious information to the target child’s peers and loved ones that he/she is planning a violent attack.

Trickery: Trickery (aka, Hoodwinking) is a tactic similar to phishing in that a cyberbully purposely tricks a target child into divulging secrets, private information and/or embarrassing information about themselves and then publishes that information online. Like phishing, Trickery requires the target child to have some element of trust or respect for the cyberbully by agreeing to post sensitive information about them thinking the cyberbullies rationale will be beneficial and/or positive. With this tactic, the target child is led to believe the sensitive information they consensually give the cyberbully will somehow be presented in a positive light.

Trolling: Trolling is the pediatric cyberbullying method of what has been termed, Internet Troll. Internet Trolls are often adults who disparage and harass unidentified online users, but the cyberbullying troll knows the identity of the target child. They appear in all forms of online mediums ranging from online video gaming gatherings, chat rooms and forum discussions. In cases where the cyberbully has a personal relationship with the target child, the cyberbully provokes the child into reactionary behaviors.

Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target child. Given that Tweets are restricted to 140 characters, Twitter Pooping tends to be frequent insults and provocations that often use “net lingo” to fit the harmful message the cyberbully is attempting to convey. Because Tweets can be disseminated in a rapid and hidden manner, cyberbullies are using this method of taunting at greater rates. If the Tweet is creatively and skillfully designed, the cyberbully will receive accolades on their skillful use of “net lingo”.

Virtual World Bullying: Virtual World Bullying are 3D online sites where users are encouraged to design their own avatars (the figures that represent them in the virtual world), explore and create their own environments are becoming increasingly popular. Virtual worlds can be used to explore and bring to life a range of topics such as recreating ancient cities or building virtual prototypes. Using their avatar, a cyberbully engages in the same types of taunting and provocations, but uses his/her avatar within the virtual environment the target minor is playing.

VLE Bullying: VLE or Virtual Learning Environments schools now use software that creates a site specially designed for education, called a Virtual Learning Environment (or VLE). Programs such as Moodle allow school staff to set assignments, tests and activities and to track their students’ progress. A VLE might only be available from the school network, or might be accessible from any internet connection (i.e. from home). Although most students are tracked, cyberbullies can still use the VLE message boards, chat rooms and instant messaging functions to ridicule a target minor.

Voting & Polling Booth Bullying: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post. Cyberbullies use these websites to create web pages that allow others to vote online for categories that are deemed highly embarrassing by the target child. Examples of voting and polling include the ugliest, fattest, dumbest, more sexually promiscuous and a plethora of other deprecating attributes. The primary purpose of this cyberbullying tactic is to encourage group consensus by encouraging peers to engage in disparaging the target child.

Warning Wars: Internet Service Providers (ISP) offer a way for consumers to report an online user who is posting inappropriate or abusive information. As a tactic used in cyberbullying and harassment, children engage in “warning wars” by making false allegations to the ISP regarding the target child posting inappropriate information. By doing this frequently enough, often times the target child has their profile and/or account suspended by the ISP. Concurrent with this tactic, the cyberbully informs the target child’s parents causing additional admonishment.

Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target child. The cyberbully creates, designs, and posts web pages specifically designed to insult the target child, their peers or groups of people who share similar characteristics as the target child such as their race, religion or sexual orientation. Although website creation has become an easy task with contemporary information technology software, many cyberbullies have acquired skills enabling them to create websites that are both appealing to viewers, but presenting the target child in a negative light.

YouTube Channeling: YouTube Channeling is a cyberbullying tactics in which the target minor becomes the central character in a YouTube Channel. Therefore, as long as the cyberbully (s) does not breach YouTube’s Community Guidelines, the content of the video clips and posted content can be quite defamatory. Being the target of a defamatory YouTube Channel, the target minor is taunted by both the content of the videos posted and the number of views online users have viewed. In addition to the number of views used to humiliate the minor, the comments made by others can be very malicious.

Children of the 21st century are targeted via classic bullying, cyberbullying, or a combination of the two. Although cyberbullying is a rapidly growing societal epidemic, classic bullying (aka physical bullying) will remain part of the bullying arena. Given the evolution of digital technology and growth of the internet, cyberbullying has reached epidemic proportions among the pediatric segments of society and has become a permanent weapon in the bully’s toolbox. At the core of all bullying, cyber and classic, are victimization, disparagement and abuse of a targeted child. Child abuse, whether perpetrated by a child or adult, is detrimental to all aspects of pediatric development, following them into adulthood and throughout their lifespan.

Given humanity is at the beginning of the Information Age, it is vital for all communities to address the use and abuse of Information and Communications Technology (ICT) by children harming other children. What is not apparent and will not be available for 2-3 decades to follow are the cyberbullies who enter adulthood with the ability to harm others using ICT. Prior to the Information Age, classic bullies grew up, became adults and most lead non-violent and productive lives. The question remains is if today’s cyberbullies will develop into adults the same as classic bullies or will they bring with them the tactics and methods they used as children, but applied to the adult environments of cyberspace.

“Cyberspace may be an abstract electronic universe and virtual illusion, but cyberbullying is real to children of the Information Age who are tormented and ridiculed 24/7/365.”

Chaos Theory – A Gamer’s Review

“Chaos Theory” is one of the sleuth-based video games in the series of video games provide by Tom Clancy’s Splinter cell series of video games. The game has been developed and published by Ubisoft. This game is the third in the series of Splinter Cell series and one of the most intriguing video games that has ever hit the market. As usual the hero is Sam Fisher, the lone splinter from the Splinter Cell of the Third Echelon of black-ops branch of NSA in United States.

The arrival of “Chaos Theory”

Though the game was scheduled to be released in early 2004, it could not be so and was finally released as version compatible to Xbox, Play Station 2, and Game cube as late as in March, 2005. At the same time its version for PC also came out. A few versions meant for the Nintendo DS and Nokia N-Gage were also released. Background music and soundtrack of this video game was composed by Amon Tobin who framed it on Ninja Tune record label. For the cinematic effects of the game, composer Jesper Kyd composed the music. For voice, actor Michael Ironside and Don Jordan lent their voice for Sam Fisher and Lambert, the boss of Sam Fisher respectively. The game earned excessive popularity all over the world and as a result was declared as the game of the year in 2005. The video game was applauded all over the world for its outstanding game play and lively graphics. The graphics in this game of Chaos Theory has made several improvements over the traditional system of the video game that includes both normal mapping and HDR lighting.

Get to know more here: Splinter Cell for PC, Xbox and PS2

The process of Stealth

In the game of Chaos theory, the Stealth mechanics have been refined quite a lot. There is the traditional light bar but the addition is an aural monitor to measure the noises exactly what Sam makes during the operation he undertakes. Because in the endeavors Sam undertakes, it is extremely important that the sound is minimal or else he may be tracked down and eliminated himself. Another alteration that has taken place in the game is the AI detection. In the previous version unconscious or dead bodies were automatically detected and an alarm ringed but now in the newer version they are to be specifically detected and an alarm will have to be ringed. An alarm will be a great help for the enemies to spot Sam and they will be ready for the combat. Two peculiar features that have been added lately to this video game are interesting. The first one is that repeated alarms will not automatically terminate the game. Secondly, for killing civilians, Sam may be heavily chastised by his boss and authorities. Consequentially, his mission scores may reduce to a great extent. The “Chaos Theory” is the first of such games that keeps track of the performance of players during the mission and a summarized report is available at the end of it.

Chaos Theory combat and weaponry

Even for the hand to hand combat, Chaos Theory provides a knife to Sam that can be used for threatening to killing. The attacking prowess is from all sides and not only from behind as in the older version. Even while hanging upside down Sam can choke or strangle his enemy. Pulling people over railings, throwing bodies of the cliff or over railing or pull them over. Though the capability of shooting round the corner is removed, the same is balanced by allowing the gun to be on either side of the body. In the field of weaponry, there are three kits to choose from. The first one is the Redding’s Recommendation kit which provides a fine balance between lethal and non-lethal weapons. The Assault Kit has more ammunition and less non-lethal weapon while the Stealth Kit is just the reverse of the Assault Kit. Then there is the 5.72 mm pistol with OCP which means Optically Channeled Potentiator that can disable electronics for the time being. A green light indicates hitting the target while a red like indicates a miss. The SC-20K modular assault rifle now have multifarious new gadgets like a launcher, under mount shotgun for close range firings and a 20mm sniper scope for long range combat. Non-lethal weaponry is multitude in number and has items like sticky shocker that shocks and numbs all targets. There are also multiple type of grenades and a gas to make the enemy unconscious. On the other hand the enemy prowess has improved too with various new features.

Get to know more here: Splinter Cell Cheats

The Plot

Main focus of the game is on Far-Eastern countries like North and South Korea and Japan. The information warfare of Splinter cell stages a return here. The plot is as intriguing as the game and you can have a feel of the same when you play the game of Chaos Theory.

What is WHITE HOT in the Luxury Market

SQUA.RE, eVelvet Rope, IN, Nico’s world, Diane Fay, Diamond Lounge, A Cool World, 740 Park, A Small World, Linked In, Hamptons Under Cover, Decayenne, Black Diamond, Plaxo, Pulse, Qube, LStyle…

It may sound like a list of old album covers but actually it is a new media source put to work. They are just a few of the more popular on line social networking clubs. There has been a mass entry of new on line communities. People spend more time on the web then in front of the TV and these clubs, which are free to members, hoping to capture the advertiser’s eye. A recent study done by The Luxury Institute found that Luxury consumers were disappointed in the weakness of luxury brands to meet their on line needs. The truth is that the mass retailers were much earlier to enter the web media and have a much more sophisticated platform now than the luxury brands. The Premium brands turned up their noses initially and their arrogance cost them dearly. They were slow to the high tech world of on line media….but the highly educated, high-net worth individuals are insisting that luxury adapt to their needs. The Luxury Report showed that the majority of the Ultra High Net worth (minimum of 30 million liquid assets) individuals preferred to do their shopping on line. The elite brands now must fight to claim their territory on the web. These private social clubs are hoping that they offer the advertisers the perfect media entre. The plethora of new exclusive social networking clubs is competing for unique features to meet the demands of their audience. Several of the most elite social clubs air video podcast (on demand viewing on your computer) from THE LUXURY CHANNEL on iTunes & Zune. The video podcasts are small web TV shows that you watch on your computer or down load to a cell phone or iPod. iTunes is enormous and offers the largest market as it is truly world wide. Zune directory was founded this year as a joint venture between Microsoft and Adobe. Experts believe it will take 10 years for it to be as big as iTunes.

The grand daddy of the successful social networking clubs was A Small World, referred to as ASW, which was started in Europe with the time appropriate fact that the world has become a small place and people of a certain financial and social prestige are doing business with each other around the globe. As one climbs the pyramid, the degree of separation decreases. ASW created an on line social network to assist this group in connecting with other like minded people to socialize, get restaurant recommendations, travel tips, the hot local party, event information, etc. It is an invitation only club with approximately 130,000 members. The founders have stepped out of the management and so it is run by “middle management types” with no real authority or inspiration. Some members feel that it is lacking the creativity that it takes to keep it from going stale. ASW has no video, no podcasts, the staff is surly, etc. ASW did a great job initially of keeping it exclusive. I personally have been impressed when I use it traveling in Europe or the Middle East more than in the U.S. Many members complain about Germanic rigid structure of the rules for membership. Most find it too confining and the website itself is not “sexy” but archaic and slow. .

I find that many of the individuals on my ASW network use Facebook much more on a daily basis for staying in touch with friends. The fact that so many ASWers are on Facebook means that they are not meeting their member’s needs. Facebook has the easiest format to use and the most fun and creative ways to stay in touch with friends from sending them a virtual drink, fashion accessory, poke, bumper sticker, etc. You can add video and photos and it seems to have been successful in not attracting the My Space crowd despite the fact that anyone can join.

Several other new generation sites have grown out of ASW to fill niches that they find that ASW missed. SQUA.RE was founder by two 25 year old ASW members and they target a young urban international jet set crowd. Their format allows all members a channel to run their videos instead of a static page. It is invitation only. They are targeting the tech savvy affluent 18 to 35 year olds. My interaction with the owners was positive; they seem like a sharp hip fun group.

eVelvet Rope is an invitation only social club also founded by an ASW member. EVR is going after the young professional single and newly married that have a lot of expendable income, like to go out and eat and can travel and stay at nice hotels (But not like the ASWers that take their private jet to their own villa). They have EVRMag.com which is an on line magazine open to the public. Again my interactions with the founder were very positive. He is very professional and serious about having a great club.

Diane Fay is trying to do the same thing but is focused on Asia primarily, although the founders are Europeans. They seem to have some bugs to work out of their site. There is a fundamental flaw in a networking site that won’t allow you to connect to build a network. I spent several days attempting to grow my network, but all my connections said they had never figured out how to connect either. I sent off an email to the website for help on 3 occasions and no one answered. Initially upon joining I got several nice welcome emails from the partners and senior staff telling me they want to speak with me in 2 weeks when they returned from traveling……..it has now been 5 weeks and I still have not heard back from them. I did attempt to reach out to them again 2 weeks ago. I’d have to say pleasant, but no follow through as far as management is concerned.

Qube is new and is an off shoot of Quintessentially which is an international concierge service. This allows their members to reach out to their non members in an on line social format. It kind of works on the “friends of rich people are probably rich too” theory. It is very new and I had difficulty setting up my page, but was nicely assisted by their IT person. I have reached out to management and will see if and how they respond. When I clicked on one of the founders names of Quintessentially on the Qube membership network and it said he had not been on line for a year!

LinkedIN is a big networking service focused on work. They have really grown. I have to say that my first LinkedIn event I attended was in NYC at a bad art gallery where they had bags of pretzels poured out on paper plates and “pour your own” Glen Ellen jug wine. Needless to say it was also my last LinkedIN event.

Plaxo and Pulse seem to be trying to combine social and work but anyone can join so no exclusivity and it often just becomes annoying.

A Cool World runs Stealth Wealth and has different degrees of “√©liteness” as you can be an Alpha or a Beta member. The membership is by approval only and I was shocked that when I joined they already had my photo and professional title. Alpha membership allows you into the exclusive 740 Park club.

LStyle is another new European club more concentrated in Scandinavian countries. There is nothing particularly unique about it. I did reach out to the owners and they seemed more confused than anything. I think it will take them a while to figure things out.

Hampton’s Under Cover is brand new…they haven’t even taken the bubble wrap off…too soon to tell.

You are the asset and these on line clubs are vying for. They need the demographic mix to sell advertising to the “trying to catch up” luxury brands. The web based social clubs can be a very affective tool if you use them correctly. What ever your situation there will be a club with a unique twist to make it your perfect match….and if not, start your own!

YouTube Secret Weapon Review

Today, I see a lot of Internet marketers promoting Traffic Geyser as a Video Marketing Secret Weapon. I do agree it is a fantastic tool for mass distribution of your videos and for positioning higher on Google search engine. However, even today, most of the video marketing traffic still comes from YouTube. YouTube is literally a gold mine and can deliver phenomenal results if your videos are positioned and branded correctly.

Lets look at some of YouTube statistics
– #3 Largest Site on the Internet
– #1 Largest video site on the web
– 100 Million Visitors per Month
– 5 Billion Video Streams Every month – 40% of all videos online (Do the Math – 5 Billion / 300 million worldwide visitors = 17 streams a month per person)
– 15 Hours of video uploaded every minute

Aren’t these statistics phenomenal? Don’t you think it pays to brand yourself as a leader on YouTube to generate traffic to your website and make money? Absolutely.

I came to know about YouTube Secret weapon through a tweet on Twitter and thought it was worth checking out considering the traffic generation potential of YouTube.

In this course, Julie Perry along with Paul Colligan discuss the effective traffic strategies for your videos on YouTube. Julie Perry was a writer and host of Boater TV and was able to generate more than 500000 views for her video episodes on YouTube alone with her techniques, stealth tactics and traffic strategies. By the way, this course only talks about traffic strategies that you can use without spending a DIME(not pay per click)

I believed myself to be a savvy YouTube user and thought would learn a trick or two from this course. But, I was humbled and YouTube Secret Weapon gave me a new perspective about marketing my online business on YouTube. You will be exposed to marketing strategies and techniques that you may not have heard before like

- How to utilize Emails and Activity Feeds effectively
– How to implement YouTube Algorithm for competing with top ranked videos
– How to use YouTube Insight to tweak and rank your videos high
– How to use Frozen view counts
– YouTube advanced playlist tips.
– Best day and time of the day to upload your videos for maximum exposure

And lot more. Also, You can get access to the tips and stealth techniques ( being regularly updated in her blog and are synchronized with the YouTube channel changes by Google) that Julie Perry has been using to dominate YouTube. This becomes especially critical with the channel designs being changed currently by YouTube/Google.

Remember, YouTube is much more than video hosting. It is about search engine optimization, lead generation and list building and should be an essential element of your Online Social marketing strategy.
I truly believe that YouTube Secret Weapon is worth your money and would catapult you ahead in your online marketing business. What are you waiting for?. Grab your copy now and get exposed to secrets of YouTube traffic generation.

The Arrogance of Inevitability – McCain’s Victory Due to Giuliani’s Missteps

If Barack Obama’s rise in popularity is due to his “Audacity of Hope,” then Hillary’s downfall could be proportionately attributed to her “Arrogance of Inevitability.” If this inverse relationship seemed obvious in the Democratic primaries, it was perhaps less obvious, though no less true, on the Republican side of the ballot box. As the GOP faithful set our clocks forward to the Spring hangover of John McCain, we’ve begun to ponder just how it happened that a man whose campaign was all but dead last summer, and who is so reviled by so many quarters of the party, could so easily be waltzing to a September coronation in Minneapolis. In short, I would argue, McCain has Rudolph Giuliani’s own arrogance of inevitability to thank for his ascendancy.

The real mystery of Campaign 2008 remains why Giuliani’s campaign imploded to the point of irrelevancy. Why didn’t he challenge in Iowa? Why did he retreat from New Hampshire? And why did he count on Florida so much when the campaign was effectively over by then?

As a sometime advisor to the Giuliani campaign, I had a bit of an insider’s view of how the campaign lost the double-digit lead we enjoyed last summer. As you may recall, that was the time of the soft primaries of fundraising, organization, low-cost trial balloons and online campaigning. It was also the summer of Obama Girl. The gyrating, singing vixen was the first real sign to America that we had an election going on. It was the beginning of the YouTube-ification of the campaign, and every candidate knew it. Except one.

While Obama Girl battled a lurid Hot-4-Hillary user-generated campaign ad to gin up excitement for the Democratic primary, an equally provocative ad shook up the Republican blogs and YouTube channels. A series of anonymous ads, featuring a middle-aged valet driving a minivan and spouting out sometimes funny, sometimes incoherent diatribes, didn’t get the national attention that the more well-endowed Democratic eye candy got. The ads, known only by their YouTube channel name “Abrad2345″, portrayed the driver as a self-proclaimed Giuliani supporter, but so over-the-top, that it comes across as a satirical jab at Giuliani himself. To make matters more pointed, the ads all ended with a tagline for the Giuliani campaign and a link to the official campaign website.

Not surprisingly, the ads were dismissed by the Giuliani campaign as harmless pranks that had no relevancy to the real business of raising money and preparing for primary season. But as ABC News and The New York Times starting looking into who was behind the ads, they linked them to a consulting company that had been responsible for the infamous Swift Boat ads from the 2004 campaign. Naturally, that firm denied any involvement with the stealth ads. The whole point of a stealth campaign is to have plausible deniability. It’s worth noting, though, that at a time last July when the McCain campaign was literally reduced to buying coach tickets for the Senator, one of their few existing consulting contracts was with these very same consultants.

And let’s think for a moment about what would have been going through the minds of the few staff left on the McCain campaign: They needed to slowly chip away at fellow traveler Rudy Giuliani’s base of support, and to do it in the lowest-budget way possible: on the internet, and without a paper-trail back to McCain who had to maintain the moral highground that would be consistent with his “Straight Talk Express” reputation. Sure enough, the McCain campaign denied any involvement with the Abrad2345 ads. It’s relevant to note that of all the candidates supposedly attacked by the unhinged Giuliani supporter in the ads, only the “attack” on McCain becomes an ironically clear-cut comparison between McCain the heroic POW and Giuliani, the draft dodger, in its tagline: “Rudy: No war hero.” In vying for the same set of national security Republicans, this was Giuliani’s one vulnerability versus McCain. Whether the ads were officially sanctioned by the skeletal McCain campaign, or the work of rogue elements in his organization, they were effective nonetheless.

Ultimately, it doesn’t really matter who authored the videos. Some have plausibly argued that they were the work of left-wing agitators just stirring up the Republican pot. The relevant point is that the Giuliani campaign completely dismissed them. At the same time, while every other primary candidate was developing an aggressive online component to their campaign, the Giuliani team floundered. We did not have an official MySpace page until September, by which point Obama, Clinton and Romney had racked up tens of thousands of online “friends.” The Giuliani team didn’t feel the need to: Rudy was the presumptive front runner and was racking up a war chest built on big donors. The internet was for Ron Paul and his crazy minions. Right?

Wrong. As Giuliani found out two months ago, and Hillary is finding out now, it is your broad base of internet supporters who will sustain a campaign deep into the primaries. With individual contributions capped at $2,300 a person, it’s all those MySpace friends and YouTubers out there whose small donations have buoyed Obama, to say nothing of McCain, Huckabee, and yes, Ron Paul (even in the face of actual primary defeats).

By the time the Giuliani campaign hired a new team of media consultants in the early fall, its solution was to start posting clips from a young campaign volunteer on YouTube and MySpace. The guy in question, a likable enough junior staffer named Dan Meyers, was what you might have expected for a young Republican: Clean cut, shirt and tie, and all the charisma of burnt melba toast. With no humor, production value or edge of any kind, these YouTube clips were doomed. In short, when the satirical anti-Giuliani videos are averaging ten times as many hits as the official videos, that does not bode well for your online strategy.

By September, McCain had retooled his campaign team, started posting effective campaign videos that reminded voters of his war record and his support of the Iraq War surge. A similar strategy worked for Huckabee, who ultimately shot to the lead in the Iowa caucases after a hilariously effective YouTube clip of himself with Chuck Norris. The difference is that Huckabee siphoned votes off of Romney, while McCain succeeded at the expense of Giuliani. And now we see McCain has learned another lesson: Unlike the stuffy Dan Meyer videos, McCain has his pretty, perky daughter Meghan and her two gal pals Shannon and Heather YouTubing their campaign. Who wouldn’t want to watch them?

Did a handful of satirical YouTube videos sink the Giuliani campaign? No. Giuliani and a handful of his own advisors sunk the campaign with their myopic vision of their own inevitability. And that’s a lesson that Hillary learned, too.

Stealth Rides: Another Innovative Toy From Hot Wheels

Mattel introduced the first revolutionary die-cast car toys. Renowned for its details, small size and being authorized by reputable car makers such as General Motors, Ford Motor Company and Chrysler, Hot Wheels continue to be favorite die-cast car toys for collectors around the world. Compared to its competitor this Mattel cars have low friction wheels that perform superbly well in small track racing.

Over the following years, Mattel introduced lines of Hot Wheels cars featuring popular cars including Custom Camaro and Volkswagen. The company also develop tires, paint and performance to reduce friction and increase speed. This year Mattel releases Stealth Rides series, featuring several types that include Hot Wheels Stealth Rides Racing Car, Power Tread and Batmobile Tumbler.

Unlike its predecessors, Stealth Rides are the first ever collapsible RC (Radio Control) Vehicle by Mattel. Each of the cars can be folded and tucked into their slim pocket-size carrying cases, which also function as infrared transmitter that perform as remote controller. The cars folds flat and transform into fully functioning RC by the push of a button. All cars in this series transform into 3D car easily with a single push on the transformation button and they just run. Once you open the package, no need to charge the car as it comes with ready-to-use AG13 (LF44) batteries.

At a price of about less than $25, these tiny but mighty toys would surely bring the racing track excitement to any living room. Children ages 8 and up will enjoy playing with these cars indoor. The cars come with extra batteries and instructions, and the infrared channel settings allow players to set different channels during multiplayer racing. Being mini R/C cars that are durable, easy to assemble, fast, foldable and lightweight, the portable Stealth Rides are must-have items for any Hot Wheels collector this holiday.

World of Warcraft Enchanting Profession

In this article, I will show you how to make the most of your enchanting profession in the game of World of Warcraft. I will also give you helpful tips to further utilize this profession such as picking the best race.

Does race really matter if you’re an enchanting? The obvious answer is yes, but you’re wrong. Rogues have a stealth skill unlike the skill of the druid, rogues stealth are better and they can stealth again by using vanish in combat unlike the druid race.

Believe it or not, enchanting is best way to make gold in the game especially if you’re a rogue race. As a rogue, you can stealth through dungeons and straight for the boss. After you have downed the boss, it’ll drop a blue item which you can disenchant for a value of five plus gold. The best dungeon for a rogue and enchanting profession is Razorfen Downs. I can do five runs in less than 30 minutes. Each run will drop two or three blues which is around 15G per run. After five runs, you can get up to 75G in less than 30 minutes.

Honestly, I don’t use the enchanting professional itself as it’s supposed to be used. Instead of wasting time advertising your profession in the trade channel and doing enchants for about 10G per hour, you can use the disenchanting skill which you do not need to level up and earn up to 150G in an hour. As an enchanter, you would need to level your skill up to 300 in order to do the good enchants. So how long does it take and the money involved in leveling your profession skill to 300? It can take up to a week and 1000G.

The summary is don’t waste time leveling up your enchanting skill because it’s not worth it. Spend your time leveling up your character and spend your gold on your mount. Pick up the enchanting profession and roll a rogue in order to take advantage of the best profession in the game.

WoW PvP Strategy – Strategies and Tips to Easily Dominate WoW PvP

The Player vs. Player (PvP) is a very fun feature in World of Warcraft where you get to test your skills against other players. PvP keeps the gameplay exciting and never boring. There are many types of PvP including dueling, Battlegrounds, Arena, etc. Regardless of the game type, there is a fundamental WoW PvP Strategy for each class to give you the upper hand and dominate your opponents.

Dueling AKA 1v1 is the only type of PvP where you can prove yourself to be better than other player. An essential WoW PvP strategy is to be flexible during the fight. This is very crucial since you are not up against mindless NPC who repeat the same attack pattern again and again; when your strategies seem don’t work, quickly revise it and try to do something different with your current skills.

These are a WoW PvP strategy for each class; use it according to your build.

Death Knight WoW PvP Strategy

1. Use Raise Dead; your Ghoul can Gnaw your opponent and give you extra time to do deal more damage. Don’t forge to use Army of the Death.

2. Use Anti-Magic Shell, Anti-Magic Zone, Mind Freeze, Strangulate, and Death Grip when you are up against spellcaster. Attack them with Chains of Ice to keep them from running.

3. Use Icebound Fortitude against stunner.

4. Use Icy Touch (you may consider to take Icy Reach) and Death Coil to attack from distance. For melee range, use Rune Strike, Death Strike, Frost Strike, or Obliterate. Use Plague Strike only to refresh the DoT damage and Scourge Strike against opponent with thick armor.

5. Use Mark of Blood against melee fighter or pets.

6. If you go Unholy, try to keep your opponent within the area of your Death & Decay or Desecration.

7. Use Unholy Blight or Summon Gargoyle against vanished opponent.

8. If necessary, use Frost Presence, Blood Presence, or Unholy Presence to enhance your performance.

Druid WoW PvP Strategy

1. Use Prowl to go stealth. From there, you can Ravage, Pounce, or Shred your opponent. Use Bear Form against melee character and Cat form against spellcaster. Use Tiger’s Fury and Savage Roar when you are in Cat form.

2. Use Maim, Bash, or Cyclone when you require time to heal yourself.

3. Use Barkskin to defend yourself when you are stunned, feared, frozen, etc.

4. Use Moonkin Form to free yourself from Polymorph or other movement impairing effects.

5. Equip yourself with Regrowth, Rejuvenation, or Lifebloom before fight against high DPS opponent. Against poison user, use Abolish Poison. Lifebloom is a good choice against opponent that can dispel. Depend on the situation, put Nature’s Grasp may be a good idea.

6. Use Faerie Fire against opponent with stealth skill.

7. Use Insect Swarm and Moonfire as your DoT spell. For direct damage spells, use Starfire and Wrath.

8. Use Force of Nature to help you in the fight.

9. Use Feral Charge to interrupt a spell.

10. Use Travel Form to run away from your opponent when necessary. For example: waiting an effect to wear of.

11. Use Hibernate or Entangling Roots to keep the enemy’s pet to interfere.

Hunter WoW PvP Strategy

1. Use Wing Clip to keep the enemy away

2. Use Viper Sting to drain your opponent’s mana (mage is an exclusion since his/her mana pool is too large).

3. Use Freezing Trap on melee opponents or pets. Use Counterattack and Entrapment to immobilize your opponent. If you got him/her immobile, run away (if he/she is a melee character) and use Aimed Shot.

4. If you go melee, use Raptor Strike and Mongoose Bite for critical melee attacks.

5. Use Silencing Shot or Intimidation against spellcaster.

6. Against melee opponent, use Concussive Shot and Scatter Shot. Use Disengage if they get close. Activate Aspect of the Monkey is a good idea when fight against melee opponent with high DPS.

7. Use Track Hidden, Flare, and Hunter’s Mark against stealth enemy.

8. Use Serpent Sting or Immolation Trap to put DoT on your opponent.

9. Use Bestial Wrath and Intimidation on your pet.

10. Use Scare Beast on Feral Druid.

11. For damage, use Auto Shot, Multi Shot, and Arcane Shot.

Mage WoW PvP Strategy

1. Against melee opponent with high DPS, use Frost Nova and Polymorph at the beginning of the match to widen the distance. Use Frostbolt, Frost Nova, Cone of Cold, Slow, and Blink to keep the distance.

2. Use Arcane Explosion against stealth enemy. Also use DoT spell such as Fireball, Pyroblast, and Frostfire Bolt to keep him/her visible.

3. Use Blink, Mana Shield, Ice Barrier, and Ice Block according to the situation to save yourself.

4. Cone of Cold is an alternative is your Frost Nova still in cooldown period. If you have Water Elemental, use his Freeze skill.

5. Remember to use Counterspell on your opponent, especially healing spell.

6. Use Scorch, Pyroblast, Arcane Blast, or Fire Blast for greater damage.

7. Use Spellsteal against buffed opponent.

8. Use Dampen Magic against spellcaster.

Paladin WoW PvP Strategy

1. Learn to use proper Judgement, Seal, and Blessing; you will need different type for each fight.

2. When your Art of War procs, cast Flash of Light immediately. Use Flash of Light often; it is one of your best healing spell.

3. Use Hammer of Justice to stun your opponent. Use Repetance to daze him/her.

4. Use Crusader Strike with Seal of Command to burst high damage. Don’t forget to throw in Divine Storm.

5. If you take Protection, use Shield of Righteousness and Hammer of the Righteous as your damage dealer abilities.

6. Use Fire, Frost, or Shadow Resistance Aura according to your opponent.

7. Against melee opponent with high attack speed, use Retribution Aura. Complement it with Holy Shield, Consecration, and Blessing of Sanctuary

8. Use Cleanse to remove poison, disease, DoT, or immobilize effect. The alternative for poison and disease is Purify. You can also use Hand of Freedom to protect against any movement impairing effect.

9. Use Divine Shield and Lay on Hands according to the situation.

10. Pay attention to your opponent’s health and use Hammer of Wrath when the time comes.

11. Use Seal of Justice on spellcaster to prevent him/her from getting away.

12. Use Eye for an Eye against spellcaster, which usually have less health than you.

Preist WoW PvP Strategy

1. Use Fear immediately and use it a lot.

2. Cast Dispel Magic early on the match to debuff your opponent.

3. Use Mind Flay to slow any melee opponent that runs towards you.

4. Use Mind Blast for your damage dealer spell. Complement it with Vampiric Embrace.

5. Use Shackle Undead on Death Knight’s pets.

6. Use Power Word: Shield or Inner Fire to protect yourself.

7. Use Abolish Disease to remove disease effect.

8. Use Dispersion to save yourself when you are stunned, feared, or silenced.

9. Use Silence to prevent your opponent to heal or cast other spells. Complement it with Mana Burn against opponents who rely heavily on mana.

10. Use Shadow Word: Pain or Devouring Plague as your DoT spell and use Renew on yourself. Don’t forget to spam Flash Heal whenever necessary.

11. Use Psychic Scream against vanished opponent or any melee opponent that try to shorten the distance.

12. Use Unbreakable Will or Fear Ward against Fear.

13. Use Shadowform, but remember to quickly remove if you are low on health.

14. Use Holy Fire to surprise your opponent when they’re ready for a Shadow Spell.

15. Use Psychic Horror if you are forced to engage them in melee combat.

Rogue WoW PvP Strategy

1. Use Vanish to go stealth; then Sap or Cheap Shot. If you are up against spellcaster, Garrote is a better choice.

2. To buy time and go back to stealth, use Blind, Gouge, or Kidney Shot.

3. You can also use Blind, Gouge, or Kidney Shot to move into melee range with your opponent. Sprint also helps in this matter.

4. Use Crippling Poison to slow your opponent. Use Deadly Poison in the other hand for DoT.

5. Use Slice and Dice or Rupture as your finisher.

6. Use Evasion against melee opponent. Also use Dismantle against melee opponent with high DPS.

7. Use Preparation according to the situation.

8. Use Shadowstep according to situation. Example: chasing a blinking mage.

9. Use Kick, Gouge, Blind, and Clock of Shadows to save your life in difficult situation.

Shaman WoW PvP Strategy

1. Use Lightning Bolt coupled with Shocks to deal damage. Add Searing Totem and Lightning Shield to deal extra damage.

2. Use Flame Shock as DoT spells and prevents your opponent to vanish/stealth.

3. Use Nature’s Swiftness + Healing Wave to heal yourself when necessary.

4. Use Earth Shield to protect yourself.

5. Use Frost Shock and Earthbind Totem as your kite tool.

6. Use Purge to debuff your opponent.

7. Use Wind Shear to interrupt channeling spells.

8. Use Tremor Totem against opponent who use Fear, Charm, and Sleep.

9. Use Resistance Totems according to your opponents spec.

10. Use Grounding Totem against spellcaster.

11. Use Poison Cleansing Totem and Cure Poison against poison user.

Warlock WoW PvP Strategy

1. Use Demonic Circle Summon and Teleport to escape from snare effects.

2. Use Succubus to seduce your opponent. The combination of Her Seduction and your Fear will work great.

3. Use Death Coil and Soul Link to heal yourself/reduce damage.

5. Use Drain Mana against spellcaster; carefully timing your time when use it since it is a channeling spell.

6. Use Curse of Exhaustion to slower your opponent, especially melee character that try to get closer.

7. Use Curse of Agony or Corruption to deal DoT; add Siphon Life and Haunt for greater effects. For direct damage spell, use Immolate and Shadow Bolt

8. Use Metamorphosis and Immolation Aura when fighting head to head.

9. Use Unstable Affliction against classes that can dispel your DoT.

10. Use Felhunter against spellcaster for its Silence and Devour Magic abilities. Curse of Tongue and Spell Lock also works great.

11. Use Howl of Terror instead of Fear when surrounded. For Fear; use it a lot.

12. Use Detect Invisibility against stealth opponent.

Warrior WoW PvP Strategy

1. Use Intercept to get close and Hamstring to keep your opponent at melee range.

2. Use Battle Shout or Commanding Shout active.

3. Use Disarm, Thunderclap, Overpower, and Revenge against melee opponent.

4. Use Demoralizing Shout against stealth opponent.

5. Use Berserker Stance and Berserker Rage against melee opponent with lower health.

6. Use Pummel against spellcaster.

7. If your opponent use bubble, Bloodrage to attain extra Rage.

8. Use Mortal Strike when fight against opponent who can heal themselves. It can be followed with Execute.

9. Use Shield Slam to debuff your opponent.

10. Use Concussion Blow before you bandage yourself.

As I said before, there is no real WoW PvP strategy that works for all of the classes; you need to know your own strength and weakness as well as EACH of your opponent strength and weakness. If you already learn it, you can adapt and counter anything that they throw at you during the fight. The best way to get good at PvP is to learn from a detailed WoW PvP strategy guide and of course, practice a lot. Check out the author’s resource box below from a good WoW PvP strategy guide.