''Hacker'' is a 1985
video game
Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, game controller, controller, computer keyboard, keyboard, or motion sensing device to gener ...
by
Activision
Activision Publishing, Inc. is an American video game publisher based in Santa Monica, California. It serves as the publishing business for its parent company, Activision Blizzard, and consists of several subsidiary studios. Activision is one ...
. It was designed by
Steve Cartwright and released for the
Amiga
Amiga is a family of personal computers introduced by Commodore International, Commodore in 1985. The original model is one of a number of mid-1980s computers with 16- or 32-bit processors, 256 KB or more of RAM, mouse-based GUIs, and sign ...
,
Amstrad CPC
The Amstrad CPC (short for ''Colour Personal Computer'') is a series of 8-bit home computers produced by Amstrad between 1984 and 1990. It was designed to compete in the mid-1980s home computer market dominated by the Commodore 64 and the S ...
,
Apple II
The Apple II (stylized as ) is an 8-bit home computer and one of the world's first highly successful mass-produced microcomputer products. It was designed primarily by Steve Wozniak; Jerry Manock developed the design of Apple II's foam-mold ...
,
Atari 8-bit family
The Atari 8-bit family is a series of 8-bit home computers introduced by Atari, Inc. in 1979 as the Atari 400 and Atari 800. The series was successively upgraded to Atari 1200XL , Atari 600XL, Atari 800XL, Atari 65XE, Atari 130XE, Atari 800XE ...
,
Atari ST,
Commodore 64,
Macintosh
The Mac (known as Macintosh until 1999) is a family of personal computers designed and marketed by Apple Inc. Macs are known for their ease of use and minimalist designs, and are popular among students, creative professionals, and software en ...
,
DOS,
MSX2
MSX is a standardized home computer architecture, announced by Microsoft and ASCII Corporation on June 16, 1983. It was initially conceived by Microsoft as a product for the Eastern sector, and jointly marketed by Kazuhiko Nishi, then vice- ...
, and
ZX Spectrum
The ZX Spectrum () is an 8-bit home computer that was developed by Sinclair Research. It was released in the United Kingdom on 23 April 1982, and became Britain's best-selling microcomputer.
Referred to during development as the ''ZX81 Colou ...
.
Plot
Activision executive
Jim Levy
Jim Levy was a music industry executive before he became the founding chief executive officer for Activision.(14 July 2011)When arcades ruled the Bay Area (photos) SFgate ("That's legendary game designer David Crane, playing his cartridge Grand P ...
introduced ''Hacker'' to reporters by pretending that something had gone wrong during his attempt to connect on line to company headquarters to demonstrate a new game. After several attempts he logged into a mysterious non-Activision computer, before explaining, "That, ladies and gentlemen, is the game". The player assumes the role of a
hacker
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
, a person experienced in breaking into secure computer systems, who accidentally acquires access to a non-public system. The game was shipped with no information on how to play, thus building the concept that the player did hack into a system.
BPL2020
The player must attempt to hack into the Magma Ltd. computer system at the beginning of the game by guessing the
logon
In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves. The user credentials are typically some fo ...
password
A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
. The password becomes obvious only after gaining access, through another means of entry, to the later stage of the game, but typing help or h in the initial command line gives a clue. Since initial attempts consist of guessing (and likely failing), access is eventually granted due to a supposed malfunction in the security system. Once the player is in, the player is asked to identify various parts of a robot unit by pointing the cursor at the relevant parts and pressing the joystick button. Most parts have exotic and technical names, such as "asynchronous data compactor" or "phlamson joint"—this again allows more room for error by initially trying to guess which part each name belongs to. Failure to identify each part correctly forces the player to take a retest until a 100 percent identification is made, at which point the player is then allowed to continue.
The player gains control of the
robot
A robot is a machine—especially one programmable by a computer—capable of carrying out a complex series of actions automatically. A robot can be guided by an external control device, or the control may be embedded within. Robots may be ...
which can travel around the globe via secret
tunnel
A tunnel is an underground passageway, dug through surrounding soil, earth or rock, and enclosed except for the entrance and exit, commonly at each end. A pipeline is not a tunnel, though some recent tunnels have used immersed tube cons ...
s, deep within the earth. The game's text states that the robot is powered in some manner by
magma
Magma () is the molten or semi-molten natural material from which all igneous rocks are formed. Magma is found beneath the surface of the Earth, and evidence of magmatism has also been discovered on other terrestrial planets and some natura ...
. It is evident that the player has logged into the Magma company's network and is acting as a remote user in its global subterranean transport network, with various strange messages being broadcast hinting at dangerous experiments that the company is doing.
Before getting far, the player is informed that shredded portions of a secret document containing Magma Ltd.'s plans for world domination have been stolen. The player is instructed to retrieve the document by bargaining with the
spies who stole it, who are located at various locations throughout the globe. The player is warned that it must be retrieved in order to prevent the
U.S. government from thwarting their plans. At this point, the player's objective is clear: retrieve the strips of the stolen document, then deliver them to
Washington, D.C.
)
, image_skyline =
, image_caption = Clockwise from top left: the Washington Monument and Lincoln Memorial on the National Mall, United States Capitol, Logan Circle, Jefferson Memorial, White House, Adams Morgan, ...
The robot's tunnel system is extensive but unmarked, so getting around is initially an exercise in trial and error. Throughout the globe, there are several cities where the robot can surface and interact with people, primarily the spies who want to bargain for their piece of the evidence.
At the various surfacing cities, the player must try to convince the agents to turn over their piece of evidence. Initially the player only has $5,000 to bargain with, but their arsenal of items grows over time and bargaining. The real challenge of the game is determining what each spy wants and how to get it for them. Eventually, all the spies' whims can be satisfied for all the pieces of the secret document. Note that different copies of the game, even on the same computer platform, have differences in which items the spies want.
However, Magma Ltd. discovers the player's break-in shortly after penetration. It launches a security
satellite
A satellite or artificial satellite is an object intentionally placed into orbit in outer space. Except for passive satellites, most satellites have an electricity generation system for equipment on board, such as solar panels or radioiso ...
which, when it intersects with the player's position, demands information which supposedly only a legitimate user would know. The information queried is given to the player previously in the game, but the questions can only be answered if the player has taken careful notes as some of the information asked for is rather obscure. To put more pressure on the player, the Satellites will only allow the player to pass checks four times before another catch will cause the player to get disconnected due to suspicious activity. In addition, the player is under a time limit (tracked by movements the SRU makes); should the player take too long the system will automatically disconnect them anyway, regardless of the Satellites. The sensors of the network will also start to fail, limiting the player's ability to see turns in the tunnels ahead and eventually where their SRU is located, forcing the player to rely on maps of the tunnel network to make it through. If the player goes near
Australia in the network, an automatic game over is issued however the knowledge may help in a future play through for evading a check.
The game lacks a save game feature. A player who fails must start again from the beginning.
Reception
By late 1987 more than 50,000 copies of ''Hacker'' were sold, and it was Activision's third best-selling Commodore game.
''
Info
Info is shorthand for "information". It may also refer to:
Computing
* .info, a generic top-level domain
* info:, a URI scheme for information assets with identifiers in public namespaces
* info (Unix), a command used to view documentation produ ...
'' rated ''Hacker'' four stars out of five, describing it as "an interesting concept" with "fair to good graphics and sound".
Roy Wagner reviewed the game for ''
Computer Gaming World
''Computer Gaming World'' (CGW) was an American computer game magazine published between 1981 and 2006. One of the few magazines of the era to survive the video game crash of 1983, it was sold to Ziff Davis in 1993. It expanded greatly through t ...
'', and stated that "The game is a real challenge (some read that frustrating)."
''
Ahoy!
''Ahoy!'' was a computer magazine published between January 1984 and January 1989 in the US, focusing on all Commodore color computers, but especially the Commodore 64 and Amiga.
History
The first issue of ''Ahoy!'' was published in January 1 ...
'' wrote that its puzzle nature "is certain to enthrall some and repel others ... repeated play is an integral part of reaching the solution. Those who enjoy a protracted battle of wits will find ''Hacker'' a lively test of their abilities".
''
Compute!
''Compute!'' (), often stylized as ''COMPUTE!'', was an American home computer magazine that was published from 1979 to 1994. Its origins can be traced to 1978 in Len Lindsay's ''PET Gazette'', one of the first magazines for the Commodore PET c ...
'' praised the game's initial realism, and concluded that it was "a worthy addition to your software collection, especially if you enjoy adventure games that require a bit of thought and an investment of time".
Legacy
This game was followed in 1986 by ''
Hacker II: The Doomsday Papers''. In the sequel, the player is actually recruited based upon their (assumed) success with the activities in the original game. Once again, they are tasked with controlling a robot, this time to infiltrate a secure facility in order to retrieve documents known only as "The Doomsday Papers" from a well-guarded vault to ensure the security of the United States.
See also
*''
System 15000''
*''
Neuromancer
''Neuromancer'' is a 1984 science fiction novel by American-Canadian writer William Gibson. Considered one of the earliest and best-known works in the cyberpunk genre, it is the only novel to win the Nebula Award, the Philip K. Dick Award, and ...
''
References
External links
*
*
*{{Internet Archive game, id=a8b_Hacker_1985_Activision
1985 video games
Activision games
Amiga games
Amstrad CPC games
Apple II games
Atari 8-bit family games
Atari ST games
Commodore 64 games
Cyberpunk video games
DOS games
Classic Mac OS games
MSX games
MSX2 games
ZX Spectrum games
Puzzle video games
Hacking video games
Video games designed by Steve Cartwright
Video games developed in the United States