- Hacker (computer game)
Infobox VG
title = Hacker
developer =Activision
publisher = Activision
designer =Steve Cartwright
producer =Brad Fregger
engine = Custom
released = 1985, 1986, 1988
genre = Puzzle/Strategy
modes =Single player
ratings = N/A
platforms =Amiga ,Amstrad CPC , Apple II, Atari XL/XE,Atari ST ,Commodore 64 , PC (MS-DOS ),Macintosh ,MSX ,ZX Spectrum
media = Cassette, 3½" or 5¼" disk
requirements =
input = Keyboard,Joystick "Hacker" is a 1985
computer game byActivision . It was designed bySteve Cartwright , produced byBrad Fregger and was released for theAmiga ,Amstrad CPC , Apple II, Atari XL/XE,Atari ST ,Commodore 64 ,Macintosh ,MS-DOS ,MSX andZX Spectrum . The game was released two years after the release of the film "WarGames ", whencomputer hacking andcomputer security were in the limelight.Description
The player takes the part of a hacker, a person experienced in breaking into "secure" computer systems who accidentally acquires access to a non-public system. If they can hack in, they can gain control of nifty gadgets and access a secret global network. The game was shipped with minimal instructions to get the game going, but no information on how to play, thus building the concept that the player did hack into a system.
The player must attempt to hack into the Magma, Ltd. computer system at the beginning of the game by guessing the logon
password . Access can be gained if the player knows the password, which really only ever becomes apparent to the player after gaining access, through another means of entry, to the later stage of the game. Typing help or h in the command line would give clue as to what the valid password is. Since initial attempts at entry would consist of guessing (and likely failing) access would eventually be granted to the player due a malfunction in the security system, thus allowing the player entry. Once admittance has been made, the player is then asked to identify various parts of a robot unit, by pointing the cursor at the relevant parts and pressing the fire button. Most parts of the unit have exotic and technical names, such as "asynchronous data compactor" or "phlamson joint" -- this again, allows for more room of error by initially trying to guessing which part each name belongs to. Failure to identify each part correctly and without any error, forces the player to take a retest until a 100 percent identification is made, at which point, the player is then allowed to continue.
thumb|The_player_guides_this_robot , as seen on the Apple II version of the game, through the extensive network of undergroundtunnel s.] The player gains control of therobot which can travel around the globe via secrettunnel s, deep within the earth. The game's text says the robot is powered in some manner bymagma .Before getting far, the player is informed that shredded portions of a secret document containing Magma, Ltd.'s plans for world domination have been stolen. The player is instructed to retrieve the document by bargaining with the spies who stole it, who are located at various locations throughout the globe. The player is warned it must be retrieved in order to prevent the US government from thwarting their plans. At this point, the player's objective is clear: retrieve the strips of the stolen document, but then deliver them to Washington DC.
The robot's tunnel system is extensive, but unmarked, so getting around is initially an exercise in trial and error. Throughout the globe, there are several cities where the robot can surface and interact with people, primarily the spies who want to bargain for their piece of the evidence.
At the various surfacing cities, the player must try to convince the agents to turn over their piece of evidence. Initially the player only has $5000 to bargain with, but his arsenal of items grows over time and bargaining. The real challenge of the game is determining what each spy wants and how to get it for them. Eventually, all the spies whims can be satisfied for all the pieces of the secret document.
If this isn't enough, however, Magma Ltd. discovers the player's break-in shortly after penetration. It launches a security
satellite which, when it intersects with the player's position, questions him with information, which supposedly only a legitimate user would know. The information queried was given to the player previously in the game, but the questions will only be able to answered if the player has taken careful notes as some of the information it asks for is rather obscure.Since the game doesn't possess a save game feature, a player who fails must start again from the beginning to try to solve the game's puzzles.
Legacy
This game was followed in 1986 by the much more difficult "". In the sequel, the player is actually recruited based upon his (assumed) success with the activities in the original game. Once again, they are tasked with controlling a robot, this time to infiltrate a secure facility in order to retrieve documents known only as "The Doomsday Papers" from a well-guarded vault to ensure the security of the United States.
ee also
*"System 15000"
*"Neuromancer"
*"System Shock "
*"Uplink"External links
*moby game|id=/hacker|name="Hacker"
* [http://www.the-underdogs.info/game.php?id=488 The Underdogs entry on "Hacker"]
*WoS game|id=0002200|name=Hacker
* [http://nexus23.org/warfare/content/view/375/35/ List of notorious hacker videogames]
Wikimedia Foundation. 2010.