Hacker (computer game)

Hacker (computer game)

Infobox VG
title = Hacker


developer = Activision
publisher = Activision
designer = Steve Cartwright
producer = Brad Fregger
engine = Custom
released = 1985, 1986, 1988
genre = Puzzle/Strategy
modes = Single player
ratings = N/A
platforms = Amiga, Amstrad CPC, Apple II, Atari XL/XE, Atari ST, Commodore 64, PC (MS-DOS), Macintosh, MSX, ZX Spectrum
media = Cassette, 3½" or 5¼" disk
requirements =
input = Keyboard, Joystick

"Hacker" is a 1985 computer game by Activision. It was designed by Steve Cartwright, produced by Brad Fregger and was released for the Amiga, Amstrad CPC, Apple II, Atari XL/XE, Atari ST, Commodore 64, Macintosh, MS-DOS, MSX and ZX Spectrum. The game was released two years after the release of the film "WarGames", when computer hacking and computer security were in the limelight.

Description

The player takes the part of a hacker, a person experienced in breaking into "secure" computer systems who accidentally acquires access to a non-public system. If they can hack in, they can gain control of nifty gadgets and access a secret global network. The game was shipped with minimal instructions to get the game going, but no information on how to play, thus building the concept that the player did hack into a system.

The player must attempt to hack into the Magma, Ltd. computer system at the beginning of the game by guessing the logon password. Access can be gained if the player knows the password, which really only ever becomes apparent to the player after gaining access, through another means of entry, to the later stage of the game. Typing help or h in the command line would give clue as to what the valid password is. Since initial attempts at entry would consist of guessing (and likely failing) access would eventually be granted to the player due a malfunction in the security system, thus allowing the player entry. Once admittance has been made, the player is then asked to identify various parts of a robot unit, by pointing the cursor at the relevant parts and pressing the fire button. Most parts of the unit have exotic and technical names, such as "asynchronous data compactor" or "phlamson joint" -- this again, allows for more room of error by initially trying to guessing which part each name belongs to. Failure to identify each part correctly and without any error, forces the player to take a retest until a 100 percent identification is made, at which point, the player is then allowed to continue.

[


thumb|The_player_guides_this_robot, as seen on the Apple II version of the game, through the extensive network of underground tunnels.] The player gains control of the robot which can travel around the globe via secret tunnels, deep within the earth. The game's text says the robot is powered in some manner by magma.

Before getting far, the player is informed that shredded portions of a secret document containing Magma, Ltd.'s plans for world domination have been stolen. The player is instructed to retrieve the document by bargaining with the spies who stole it, who are located at various locations throughout the globe. The player is warned it must be retrieved in order to prevent the US government from thwarting their plans. At this point, the player's objective is clear: retrieve the strips of the stolen document, but then deliver them to Washington DC.

The robot's tunnel system is extensive, but unmarked, so getting around is initially an exercise in trial and error. Throughout the globe, there are several cities where the robot can surface and interact with people, primarily the spies who want to bargain for their piece of the evidence.

At the various surfacing cities, the player must try to convince the agents to turn over their piece of evidence. Initially the player only has $5000 to bargain with, but his arsenal of items grows over time and bargaining. The real challenge of the game is determining what each spy wants and how to get it for them. Eventually, all the spies whims can be satisfied for all the pieces of the secret document.

If this isn't enough, however, Magma Ltd. discovers the player's break-in shortly after penetration. It launches a security satellite which, when it intersects with the player's position, questions him with information, which supposedly only a legitimate user would know. The information queried was given to the player previously in the game, but the questions will only be able to answered if the player has taken careful notes as some of the information it asks for is rather obscure.

Since the game doesn't possess a save game feature, a player who fails must start again from the beginning to try to solve the game's puzzles.

Legacy

This game was followed in 1986 by the much more difficult "". In the sequel, the player is actually recruited based upon his (assumed) success with the activities in the original game. Once again, they are tasked with controlling a robot, this time to infiltrate a secure facility in order to retrieve documents known only as "The Doomsday Papers" from a well-guarded vault to ensure the security of the United States.

ee also

*"System 15000"
*"Neuromancer"
*"System Shock"
*"Uplink"

External links

*moby game|id=/hacker|name="Hacker"
* [http://www.the-underdogs.info/game.php?id=488 The Underdogs entry on "Hacker"]
*WoS game|id=0002200|name=Hacker
* [http://nexus23.org/warfare/content/view/375/35/ List of notorious hacker videogames]


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Hacker (card game) — Hacker is a card game (not a trading card game) made by Steve Jackson Games (SJG). Published in 1992, the players impersonate hackers fighting for the control of computer networks. It is based primarily on interlocking access to different… …   Wikipedia

  • Cholo (computer game) — Infobox VG|title = CHOLO developer = Solid Image Ltd publisher = Firebird released = 1986 genre = First person shooter, Vehicle simulation game modes = Single player platforms = Amstrad CPC, BBC Micro, Commodore 64, ZX Spectrum media = Cassette… …   Wikipedia

  • Humbug (computer game) — Infobox VG| title = Humbug (computer game) developer = Graham Cluley publisher = released = 1990 genre = Adventure game modes = Single player platforms = MS DOSHumbug is a text based adventure computer game game written by British programmer… …   Wikipedia

  • Rogue (computer game) — Rogue popularized the dungeon crawling computer game dating back from 1980. A favorite on college Unix systems in the early to mid 1980scite web |url=http://www.1up.com/do/feature?cId=3123537 |title= The Essential 50 12. Rogue |accessdate=2007 12 …   Wikipedia

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • Hacker — Contents 1 Technology 2 Entertainment 3 People 3.1 Real …   Wikipedia

  • Hacker Manifesto — The Conscience of a Hacker (also known as The Hacker Manifesto ) is a small essay written January 8 1986 by a hacker who went by the handle (or pseudonym) of The Mentor (born Loyd Blankenship). It was written after the author s arrest, and first… …   Wikipedia

  • Hacker ethic — refers to the values and philosophy that are standard in the hacker community. The early hacker culture and resulting philosophy originated at the Massachusetts Institute of Technology (MIT) in the 1950s and 1960 s. The term hacker ethic is… …   Wikipedia

  • Hacker koan — Hacker culture, and especially the artificial intelligence community at MIT, have invented a number of humorous short stories dubbed hacker koans about computer science; most of these are recorded in an appendix to the Jargon File, where they are …   Wikipedia

  • Hacker (programmer subculture) — In one of several meanings of the word in computing, a hacker is a member of the programmer subculture originated in the 1960s in the United States academia, in particular around the Massachusetts Institute of Technology (MIT) s Tech Model… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”