Solved

Counter-Strike Source Config Files

Posted on 2010-11-19
5
784 Views
Last Modified: 2013-11-08
I used to have custom config files in the past so that I would get the best registry possible.  There have been many updates and now that config file is outdated.  I wanted to see what everyone is using now for a custom config.cfg/autoexec.cfg/userconfig.cfg?  I'm not looking for max FPS as my machine is not lacking there I'm looking for the best registry type configs.
0
Comment
Question by:N R
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 5

Accepted Solution

by:
DigitalTechy earned 250 total points
ID: 34176063
0
 
LVL 11

Author Comment

by:N R
ID: 34177914
That's an FPS config, I don't want my graphics turned down, I don't have FPS issues, just want the correct hitboxes, resgistry ect...
0
 
LVL 62

Assisted Solution

by:☠ MASQ ☠
☠ MASQ ☠ earned 250 total points
ID: 34262466
Gallitin it would probably be more useful to look at your current cfg files and comment on them than start from scratch.  You can change the file extension to .txt and upload them as attachments to your post using the File link or post them directly into a comment using the Code link below the comment box.
0

Featured Post

Enroll in May's Course of the Month

May’s Course of the Month is now available! Experts Exchange’s Premium Members and Team Accounts have access to a complimentary course each month as part of their membership—an extra way to increase training and boost professional development.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question