Spectrofon #17
01 февраля 1996
  Игры  

Expertise - a detailed analysis of the second part of the game "HACKER". You to become a member of an exciting detective story.

<b>Expertise</b> - a detailed analysis of the second part of the game
          EXPERTISE


(C) Andrew Shkolnikov, 1995.


     Hacker II: The Doomsday Papers.


             Activision 1986.


            The fate of the electric cord

         easy. Clock work

         complex calculations, ill

         treatment and horseplay servicing
         equation describing the personnel - that's what you
         need to make such an unusually

         sensitive in nature

         apparatus.

                 S. Lem. Star Diaries

                            Iyona Pacific. "


             "Well be back! .. They and the camera

          is ...

                              TV spots.

   For a start - a summary of the previous series.


   In the game "Hacker" - the first game Novels
company "Activision" - a noble hacker
embedded in a huge computer network
Corporation Magma. And accidentally discovers that
management corporation nurtures Napoleonic plans - to drill the 
shaft to the layers red-hot magma, and using the difference

temperatures in the magma and on the surface, a virtually 
unlimited source of energy. And so with such a source just

sin is not to achieve world domination!


   Only trouble is - has crept into the calculations
error. Whether drilled shaft is not there, then
Does the drill have not stopped in time, but there was a danger 
the breakthrough of magma to the surface. And if that happens, 
the good do not wait. Slip crustal fracture over the world, so 
who knows what else! .. AND Corporation begins immediately 
Cleanup. 


   But the attacker went on the warpath! Capturing
control the robot company, he gathers the pieces incriminating 
documents and gives them well-intentioned FBI agent. And all

it - despite the persistent hardware failure, "Magma" and 
intrusive questions of tracking satellites. 


   The game "Hacker" is over.
Earth is saved, villains punished, good hacker famous for, the 
FBI is on guard. It would seem that something else? But the 
enemies are not asleep ... 


                  *


   So, today we consider the second
Game Novels - "Hacker II: The Doomsday
Papers ". I do not know why it happened,
but this second game was more
common than the first. At least to me it gets much more often.



   However, any follow - and stuff
generally mysterious and unpredictable. Here
take at least many of the famous and very nice boevichok 
"Action Force 2." First part - simply "Action Force" - almost 
no one saw. And tell you straight - you are a little lost. 
Banal shooter. In short, Alice worked principle: the further the

lyubopytstvennee.


    But often the case, and vice versa. Take
even the famous tin cop
- Robocop. The first game of it was just
remarkable, and the rest, in my opinion, all
duller and duller with each new extension. And it turned out, I 
think, because of the fact that the authors fall into the trap 
of endlessly repeated once udavshiysya reception. 


   But do not worry: with the "hacker" is nothing
this did not happen. The second game, perhaps,
will be even more abruptly first. But she abruptly
"On its own special style." As the first part of

(And indeed as many good games), she was born at the junction 
of genres, but this have other genres. As you must have

Remember, the first "hacker" combines
maze and the "economic" game. In the "Hacker
2 "Economy not enough to swear by, but there
elements of the simulator, plus a maze more interesting first 
(because you have not yet fall under the tracking camera), plus 
even slightly from AD'D. And, of course, add to

This entangled plot. If you remember, in the first game 
situation slowly became clear as you go. But here everything 
seems to be clear from the outset. But I can report on a 
secret: in the end (or nearly end) you will find a considerable 
surprise ... 


   So, defeating the evil corporation
"Magma", our hacker gained worldwide fame. Still - after all, a 
savior humanity! But he was not proud.

However, and not to pacify. Again he is looking
trouble. And, of course, finds them.


   It's funny, but this time all the adventures
began with the fact that the attacker climbed only in a 
database company "Activision" (Mother company did not regret!). 
He cheated verification program, and had just begun

reading the titles in the database, as
Suddenly ... Data transfer was interrupted, the screen
correct the computer was clean and the top of the lighted sign: 
"The Government of the United States of America welcomes you!" 


   If I were in his place - would have shouted, "Get thee 
hence, Satan!" and poured on display its entire supply of holy 
water. But for the mother hacker such things - a common thing, 
and he calmly passed to the text that appears on the screen.



   But things there appeared flatter; so flattering that an 
idiot would alert. Yet unknown member of the government 
overflowed nightingale: "You are recognized as the best world 
authority in the field of computer security systems ... CIA 
asks for your help in the fight against international terrorism 
... If you agree, click "Return" ... In the case of your 
refusal or failure of any record on this proposal immediately 
be destroyed ...". And as the completion of all - the 
signature. Rather, the only position to write to you the 
official, and signature itself classified. But his

post sounds impressive: "Director
Division of Special Agents. "What?"


   And the hacker succumbed to the entreaties. Swallowed
bait, together with fishing line and rod. Perhaps happily 
clicked "Enter", anticipating the wonderful new trouble of 
which can be mixed up. If so, he was not mistaken.



   For once he agreed to become
Special Agent, unnamed director,
without delay, got down to business. And it turned out that the 
promised international terrorism - a lime, or, at best, cover.

And the root of evil, as always, to the Communists.


   As the director, the leading Soviet
scholar and political strategist (strange
mix) Alexander Cherkazov developed
simple but reliable plan for overthrowing the U.S. government. 
What will happen after the overthrow, director did not specify, 
but that's obvious - final destruction of democracy, world 
revolution and the Five-Year Plan ahead of schedule. This Plan 
modestly called "the Last Document Court "(The Doomsday 
Papers). What is the plan is not yet known, but remember - it's 
happening in 1986. I remember it was the height of the alcohol 
buzz. Not decided whether Gorbachev to begin test

Plan to own? ..


   However, the CIA also on alert. Found out that the only 
available copy of the Instrument of Judgement "is stored at the 
Soviet military base in Siberia. More than that - an American 
agent was secretly smuggle and hide on the basis of three

managed at a distance of robots MRU
(Mobile Remote Unit - it means "mobile device is operated at a 
distance; apparently improved model of the underground robot 
SRU from the first game). Must be, the protection only watched, 
as if from a base which is not dragged "leading scientists and 
policymakers." 



   And the robots did not stop. Indefatigable tseerushnikam 
even managed to connect beetle to a central computer database, 
manages all security systems. That's why they needed a 
specialist in computer security systems! 

For now someone will have to deceive
countless tracking camera and avoiding people, security guards, 
to the robot through the corridors of the base and steal the 
coveted document marked "Classified" - "Secret". A

To do this you must disable alarm
signaling the main safe and bit by bit
collect opens his hand. These
pieces are stored in separate small safes
with electronic locks. The CIA has been able to figure out just 
one code. Oddly enough, He appeared in English: "RED 7".



   Guess all the other codes will be
our indefatigable attacker. More precisely - to you
its role. After all, the CIA need a document
to undertake at least some response
measures in advance. But otherwise - the end of the free
world, and says Rondarev, no
more Buble-GUM!


                  *



   So when you start the game, the screen lights up request 
security program database. At this time there are several

The password that the program will respond
differently, but, of course, until they are unknown to you. So 
enter whatever you want and start reading the TOC. A few second 
peaceful transfer of data is interrupted tseerushnikom 
intrusive. 


   You will not hesitate to agree to it
proposal - and then you dumped a bunch of
information about the Soviet base. And after that, as in the 
first game, you should test. You will have to examine the 
scheme of electronic bug built into the computer database, and 
respond, where this scheme that. Again, I as far as they try to 
help you with this Sisyphean, the more so because this scheme in

game and not really needed. In the picture all of its
of neatly painted.



   But the next exam, just before the robot will provide a
Your complete disposal, where it is necessary and
interesting. You will see the
robot's control panel (see above).


   In four screen is fed information from
cameras and monitors database. But now they
some interference. While note only
on the proper control panel - these
tiny buttons at the bottom. Each of them
marked by letters or signs; here with these
buttons, and you will now learn.


   The button "SLCT" (select - your choice) will switch between 
the four screens. The screen, which is currently selected blinks

number of the camera (or two lines, if included general view).



   The button "VHLD" (adjust vertical hold).
Why you need it, I did not understand. May
be, this button sets up the screens - because in the normal 
state image on They ran unmercifully. However, as I

this button is not pressed, no picture is not stopped, except 
that the rate has changed little. So if you will understand why 
need it - do not count them for work, please! 


   The button "CAM"
(Camera - camera) -
here everything is clear. She
shows at this
screen image with
one of the thirty
eight-camera monitoring framework. Switch to camera
camera can be the "+" and "-".



   The button "VTR" (video tape recorder)
includes a VCR. Of course, you already
noticed its buttons on the right panel -
"PLAY", "STOP", "PAUSE" and two fast.
But do not expect - action movie you will not be shown.
Just diligent CIA agents ahead of time recorded thirty-eight 
videotapes - by one for each camera. Recorded on films that 
show the camera when the base Nobody interferes. Now, using 
these film, you will be able to fool any camera

or even several at once.


   And help to know which camera should cheat button "MON" 
(monitor - the monitor). It includes an image from one of two 
monitors tracking database. The fact is that the staff base, of 
course, laziness watch all thirty-eight cameras. Therefore, 
they found only two monitors, seated behind them, two men and 
the limited. Each monitor is connected

to different cells in the queue. Monitor "A"

"Responsible" for the camera 1-30, the monitor "B" -
for 31-38. (Why such an honor to some
eight cameras, you ask? Understandably, not accidentally, but 
more about that in due time.) So that the robot can be easily 
(almost) hang out in the field of view cameras; if only it was 
not there when this camera connected to the monitor. It is 
clear that to see what the camera is now monitored, very 
useful. Switch from the monitor the monitor can be any or all 
of the same button "MON", or, as with cameras, the buttons "+"

and "-".


   The button "TGS" (telemetry guidance
system) will be displayed around the base plan
robot - like the top view. Call it
"Common view" language does not turn -
painfully tiny bit you can see. But it shows the camera to
which are currently connected monitors (one
the camera can see in the picture). And the circle - this is
Guard base, patrolling on a permanent route.

   The button "BYP"
(Bypass camera) allows you to cheat
monitors. Here's how
this is done. You
turn on the video your camera and perematyvete
its at the right time.
This is necessary even if the camera is
pyalilas time in an empty corridor, because at
monitor displays time code, and need
that it coincided. Conveniently rewind the tape
for a few seconds ahead, and then press
pause and when the time matches, again let the film. 
(Incidentally, when you stop frame you will see a very 
realistic band interference.) And when the film is aligned in 
time, hit "BYP" - now on the monitor display images with no 
camera and video recording with sound. 



   And the last button - "MRU" (as you will recall, was the 
name of the robot). It includes a robot mode of movement. Now 
press Up and down moves it forward and

ago respectively, and the "right" and "left"
- Turn on the spot.


                 *


   So, you passed the exam and not leaving
his easy chair, can manage
robot on a distant Siberian-based (if
only the director does not lie). Finally you
report code for a fast connection to the CIA:
00987. Now, starting the game, you can
just enter the code and get a virtual Siberia without tedious 
testing. 


   Initially, all four screens of your
robot some noise. Well, turn on
screens and begins to master the base.


Just be sure to include one of the screens in the mode of 
"TGS", to see what is happening around you. For two more screen 
start well to submit images from security monitors, and the 
last, fourth, continues to play with cameras and deception of 
these. 


   I have already mentioned that in the regime of "TGS" on
terms of base light up the camera, which
currently connected to a monitor. Now, while you
mastered, it is very convenient: you
can mark where some cameras,
map. By the way, the council: immediately begin mapping 
database! And best of all - maintaining the scale, for example, 
one cell - one step the robot. (The base is not so great, and

such a plan is just fit for the tetrad
sheet.) Those who passed the first part, and remembers a "race 
blind" in the end, once they realize why they need it. And 
those who did not pass ... will understand later. 





Other articles:

Expertise - a detailed analysis of the second part of the game "HACKER". You to become a member of an exciting detective story.

Review - an overview of new additions to the markets of Moscow: Navy Seals, Abadia, Pirates, Wild West Seymour. As well as English hit parade of the best games late 80's - early 90's.

From the world of bat - Vyacheslav Mednanogov responds to letters chitaleteley the game UFO - Enemy Unknown.

Premiere - premiere of two software programs: "Esperanto-48" and "Gemmini Commander v.3.2".

System - discussion of the pressing issues of standardization Spectrum-compatible computers.

Designer - the problems associated with the port # FD, and also questions rassshireniya RAM up to 512 kb and the implementation of the pseudo-ROM.

Fantasy - short story on a computer game, "Lords of Chaos".

Warm greetings - an interview with the company Mythos Games, known for games such as "Laser Squad", "Rebel Star", "Lords of Chaos", etc.

Advertising - the section of free advertisements.


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
HARD and SOFT - a procedure that allows the absence of instruments to determine the duration of the signal INT.
Seven and 1 / 2 - Features a national ruleza or pure Siberian project (the story of Crazy Siberian Party 1999).
Games - Cheat, break open UFO II.
News - Ldir Chapay and released the same newspaper, Dissonator came home on leave, conduct of Nuts.

В этот день...   5 May