Hacker 2
   HOME

TheInfoList



OR:

''Hacker II: The Doomsday Papers'' is
computer game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This feedbac ...
written by
Steve Cartwright Steve Cartwright is an American video game designer. He is best known as one of the original Activision game designers, credited with such games as ''Barnstorming'', '' Megamania'', ''Seaquest'' and ''Hacker''. Activision In 1982, Cartwright jo ...
and published by
Activision Activision Publishing, Inc. is an American video game publisher based in Santa Monica, California. It serves as the publishing business for its parent company, Activision Blizzard, and consists of several subsidiary studios. Activision is one ...
in 1986. It is the sequel to the
1985 The year 1985 was designated as the International Youth Year by the United Nations. Events January * January 1 ** The Internet's Domain Name System is created. ** Greenland withdraws from the European Economic Community as a result of a ...
game ''
Hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
''. ''Hacker II'' was released for the
Amiga Amiga is a family of personal computers introduced by Commodore International, Commodore in 1985. The original model is one of a number of mid-1980s computers with 16- or 32-bit processors, 256 KB or more of RAM, mouse-based GUIs, and sign ...
,
Apple II The Apple II (stylized as ) is an 8-bit home computer and one of the world's first highly successful mass-produced microcomputer products. It was designed primarily by Steve Wozniak; Jerry Manock developed the design of Apple II's foam-mold ...
,
Apple IIGS The Apple IIGS (styled as II), the fifth and most powerful of the Apple II family, is a 16-bit personal computer produced by Apple Computer. While featuring the Macintosh look and feel, and resolution and color similar to the Amiga and Atari S ...
,
Amstrad CPC The Amstrad CPC (short for ''Colour Personal Computer'') is a series of 8-bit home computers produced by Amstrad between 1984 and 1990. It was designed to compete in the mid-1980s home computer market dominated by the Commodore 64 and the S ...
, Atari ST, Commodore 64,
IBM PC The IBM Personal Computer (model 5150, commonly known as the IBM PC) is the first microcomputer released in the IBM PC model line and the basis for the IBM PC compatible de facto standard. Released on August 12, 1981, it was created by a tea ...
,
Macintosh The Mac (known as Macintosh until 1999) is a family of personal computers designed and marketed by Apple Inc. Macs are known for their ease of use and minimalist designs, and are popular among students, creative professionals, and software en ...
, and
ZX Spectrum The ZX Spectrum () is an 8-bit home computer that was developed by Sinclair Research. It was released in the United Kingdom on 23 April 1982, and became Britain's best-selling microcomputer. Referred to during development as the ''ZX81 Colou ...
.


Plot

''Hacker II'' is more difficult and involved than the first game. In ''Hacker II'', the player is actually recruited based upon their (assumed) success with the activities in the original game. Once again, they are tasked with controlling a
robot A robot is a machine—especially one programmable by a computer—capable of carrying out a complex series of actions automatically. A robot can be guided by an external control device, or the control may be embedded within. Robots may be ...
, this time to infiltrate a secure facility in order to retrieve documents known only as "The Doomsday Papers" from a well guarded vault to ensure the security of the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
. Eventually, as they escape with the papers, the player is confronted by agents of the United States who reveal that they have actually been working for a former Magma employee, who wanted the papers in revenge for what had happened to the company the player had presumably exposed in the first game. The building that the player had unwittingly broken into was a government facility. The player then has to go back into the facility as part of a gambit to expose the Magma agent, avoiding the same security that had threatened the player before.


Gameplay

Gameplay is considerably changed from the previous game, and the packaging notably includes a "manual" describing the function of a four-way monitor system provided to the player. It is hooked into the camera security network of the facility the player is asked to infiltrate. A handful of robots are available, hidden in the facility, in case some are lost. By using the
camera system In 3D video games, a virtual camera system aims at controlling a camera or a set of cameras to display a view of a 3D virtual world. Camera systems are used in video games where their purpose is to show the action at the best possible angle; ...
and in-game map that helps track guard patrols and the location of the robots, the player must explore the one floor facility and find the codes needed to open the vault and escape with the papers. To aid the player there is also a pre-recorded security tape of a typical day for every camera in the facility, which the player can bypass the actual camera feed with when they need to be in an area for an extended time although care is needed to ensure the time stamp matches with the actual time of the game. Discovery by the guards must be avoided at all costs because once alerted, they will call in a huge machine that resembles a large plate hung from what looks like a metal frame on wheels. This machine pursues the player's defenseless robot and attempt to crush it with the plate. The player can try to avoid the drone, although it is relentless in its pursuit and is much faster than the player's robot. If all the player's robots are destroyed, the game is over. Things that can set off the alarms include being seen by the patrolling guard who has constant line of sight in the corridors, having one of the cameras see the robot, incorrectly disabling the vault security or failing to sync a bypassed camera feed with actual time giving evidence there is tampering going on. The game also featured escalating problems as part of the player's interface begins to fail, the in-game map starts to lose progress of the player's robot, monitored security cameras, the guard and eventually the map itself as the player defeated the system, eventually to get into the vault the player may well be forced to control the robot blindly relying on maps that should have been made by the player. There are no saves available in the game, as in the first title.


Reception

''
Compute! ''Compute!'' (), often stylized as ''COMPUTE!'', was an American home computer magazine that was published from 1979 to 1994. Its origins can be traced to 1978 in Len Lindsay's ''PET Gazette'', one of the first magazines for the Commodore PET c ...
'' described ''Hacker II'' as not having an original plot and criticized the inability to save, but favorably reported on the game's graphics, detail, and user interface. The magazine stated that it had "some of the most exciting and harrowing scenarios you'll find in a computer game" and advised, "I do not recommend it to anyone with a weak heart". ''
Computer Gaming World ''Computer Gaming World'' (CGW) was an American computer game magazine published between 1981 and 2006. One of the few magazines of the era to survive the video game crash of 1983, it was sold to Ziff Davis in 1993. It expanded greatly through t ...
'' praised ''Hacker II''s graphics and design on the Atari ST, and stated that the game more accurately depicted
system cracking A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge ...
than ''Hacker'', but cautioned that its difficulty and scale would not appeal to everyone. ''
Info Info is shorthand for "information". It may also refer to: Computing * .info, a generic top-level domain * info:, a URI scheme for information assets with identifiers in public namespaces * info (Unix), a command used to view documentation produ ...
'' gave the Commodore 64 version four stars out of five, describing it as "a superior sequel to the original ... An engrossing and challenging espionage game".


Reviews

*''
Isaac Asimov's Science Fiction Magazine ''Asimov's Science Fiction'' is an American science fiction magazine which publishes science fiction and fantasy named after science fiction author Isaac Asimov. It is currently published by Penny Publications. From January 2017, the publication ...
'' v11 n5 (1987 05) *''
Jeux & Stratégie ''Jeux'' (''Games'') is a ballet written by Claude Debussy. Described as a "poème dansé" (literally a "danced poem"), it was written for Sergei Diaghilev's Ballets Russes with choreography by Vaslav Nijinsky. Debussy initially objected to the ...
'' #42 *''
Jeux & Stratégie ''Jeux'' (''Games'') is a ballet written by Claude Debussy. Described as a "poème dansé" (literally a "danced poem"), it was written for Sergei Diaghilev's Ballets Russes with choreography by Vaslav Nijinsky. Debussy initially objected to the ...
'' HS #3


References


External links

* * * *{{Internet Archive game, id=msdos_Hacker_2_-_The_Doomsday_Papers_1986, platform=MS-DOS 1986 video games Activision games Amiga games Amstrad CPC games Apple II games Apple IIGS games Atari ST games Commodore 64 games Hacking video games Classic Mac OS games MSX games Puzzle video games Video game sequels Video games about robots ZX Spectrum games Video games designed by Steve Cartwright Video games developed in the United States Single-player video games