Spectrofon #17
01 февраля 1996 |
|
Expertise - a detailed analysis of the second part of the game "HACKER". You to become a member of an exciting detective story.
EXPERTISE (C) Andrew Shkolnikov, 1995. Hacker II: The Doomsday Papers. Activision 1986. The fate of the electric cord easy. Clock work complex calculations, ill treatment and horseplay servicing equation describing the personnel - that's what you need to make such an unusually sensitive in nature apparatus. S. Lem. Star Diaries Iyona Pacific. " "Well be back! .. They and the camera is ... TV spots. For a start - a summary of the previous series. In the game "Hacker" - the first game Novels company "Activision" - a noble hacker embedded in a huge computer network Corporation Magma. And accidentally discovers that management corporation nurtures Napoleonic plans - to drill the shaft to the layers red-hot magma, and using the difference temperatures in the magma and on the surface, a virtually unlimited source of energy. And so with such a source just sin is not to achieve world domination! Only trouble is - has crept into the calculations error. Whether drilled shaft is not there, then Does the drill have not stopped in time, but there was a danger the breakthrough of magma to the surface. And if that happens, the good do not wait. Slip crustal fracture over the world, so who knows what else! .. AND Corporation begins immediately Cleanup. But the attacker went on the warpath! Capturing control the robot company, he gathers the pieces incriminating documents and gives them well-intentioned FBI agent. And all it - despite the persistent hardware failure, "Magma" and intrusive questions of tracking satellites. The game "Hacker" is over. Earth is saved, villains punished, good hacker famous for, the FBI is on guard. It would seem that something else? But the enemies are not asleep ... * So, today we consider the second Game Novels - "Hacker II: The Doomsday Papers ". I do not know why it happened, but this second game was more common than the first. At least to me it gets much more often. However, any follow - and stuff generally mysterious and unpredictable. Here take at least many of the famous and very nice boevichok "Action Force 2." First part - simply "Action Force" - almost no one saw. And tell you straight - you are a little lost. Banal shooter. In short, Alice worked principle: the further the lyubopytstvennee. But often the case, and vice versa. Take even the famous tin cop - Robocop. The first game of it was just remarkable, and the rest, in my opinion, all duller and duller with each new extension. And it turned out, I think, because of the fact that the authors fall into the trap of endlessly repeated once udavshiysya reception. But do not worry: with the "hacker" is nothing this did not happen. The second game, perhaps, will be even more abruptly first. But she abruptly "On its own special style." As the first part of (And indeed as many good games), she was born at the junction of genres, but this have other genres. As you must have Remember, the first "hacker" combines maze and the "economic" game. In the "Hacker 2 "Economy not enough to swear by, but there elements of the simulator, plus a maze more interesting first (because you have not yet fall under the tracking camera), plus even slightly from AD'D. And, of course, add to This entangled plot. If you remember, in the first game situation slowly became clear as you go. But here everything seems to be clear from the outset. But I can report on a secret: in the end (or nearly end) you will find a considerable surprise ... So, defeating the evil corporation "Magma", our hacker gained worldwide fame. Still - after all, a savior humanity! But he was not proud. However, and not to pacify. Again he is looking trouble. And, of course, finds them. It's funny, but this time all the adventures began with the fact that the attacker climbed only in a database company "Activision" (Mother company did not regret!). He cheated verification program, and had just begun reading the titles in the database, as Suddenly ... Data transfer was interrupted, the screen correct the computer was clean and the top of the lighted sign: "The Government of the United States of America welcomes you!" If I were in his place - would have shouted, "Get thee hence, Satan!" and poured on display its entire supply of holy water. But for the mother hacker such things - a common thing, and he calmly passed to the text that appears on the screen. But things there appeared flatter; so flattering that an idiot would alert. Yet unknown member of the government overflowed nightingale: "You are recognized as the best world authority in the field of computer security systems ... CIA asks for your help in the fight against international terrorism ... If you agree, click "Return" ... In the case of your refusal or failure of any record on this proposal immediately be destroyed ...". And as the completion of all - the signature. Rather, the only position to write to you the official, and signature itself classified. But his post sounds impressive: "Director Division of Special Agents. "What?" And the hacker succumbed to the entreaties. Swallowed bait, together with fishing line and rod. Perhaps happily clicked "Enter", anticipating the wonderful new trouble of which can be mixed up. If so, he was not mistaken. For once he agreed to become Special Agent, unnamed director, without delay, got down to business. And it turned out that the promised international terrorism - a lime, or, at best, cover. And the root of evil, as always, to the Communists. As the director, the leading Soviet scholar and political strategist (strange mix) Alexander Cherkazov developed simple but reliable plan for overthrowing the U.S. government. What will happen after the overthrow, director did not specify, but that's obvious - final destruction of democracy, world revolution and the Five-Year Plan ahead of schedule. This Plan modestly called "the Last Document Court "(The Doomsday Papers). What is the plan is not yet known, but remember - it's happening in 1986. I remember it was the height of the alcohol buzz. Not decided whether Gorbachev to begin test Plan to own? .. However, the CIA also on alert. Found out that the only available copy of the Instrument of Judgement "is stored at the Soviet military base in Siberia. More than that - an American agent was secretly smuggle and hide on the basis of three managed at a distance of robots MRU (Mobile Remote Unit - it means "mobile device is operated at a distance; apparently improved model of the underground robot SRU from the first game). Must be, the protection only watched, as if from a base which is not dragged "leading scientists and policymakers." And the robots did not stop. Indefatigable tseerushnikam even managed to connect beetle to a central computer database, manages all security systems. That's why they needed a specialist in computer security systems! For now someone will have to deceive countless tracking camera and avoiding people, security guards, to the robot through the corridors of the base and steal the coveted document marked "Classified" - "Secret". A To do this you must disable alarm signaling the main safe and bit by bit collect opens his hand. These pieces are stored in separate small safes with electronic locks. The CIA has been able to figure out just one code. Oddly enough, He appeared in English: "RED 7". Guess all the other codes will be our indefatigable attacker. More precisely - to you its role. After all, the CIA need a document to undertake at least some response measures in advance. But otherwise - the end of the free world, and says Rondarev, no more Buble-GUM! * So when you start the game, the screen lights up request security program database. At this time there are several The password that the program will respond differently, but, of course, until they are unknown to you. So enter whatever you want and start reading the TOC. A few second peaceful transfer of data is interrupted tseerushnikom intrusive. You will not hesitate to agree to it proposal - and then you dumped a bunch of information about the Soviet base. And after that, as in the first game, you should test. You will have to examine the scheme of electronic bug built into the computer database, and respond, where this scheme that. Again, I as far as they try to help you with this Sisyphean, the more so because this scheme in game and not really needed. In the picture all of its of neatly painted. But the next exam, just before the robot will provide a Your complete disposal, where it is necessary and interesting. You will see the robot's control panel (see above). In four screen is fed information from cameras and monitors database. But now they some interference. While note only on the proper control panel - these tiny buttons at the bottom. Each of them marked by letters or signs; here with these buttons, and you will now learn. The button "SLCT" (select - your choice) will switch between the four screens. The screen, which is currently selected blinks number of the camera (or two lines, if included general view). The button "VHLD" (adjust vertical hold). Why you need it, I did not understand. May be, this button sets up the screens - because in the normal state image on They ran unmercifully. However, as I this button is not pressed, no picture is not stopped, except that the rate has changed little. So if you will understand why need it - do not count them for work, please! The button "CAM" (Camera - camera) - here everything is clear. She shows at this screen image with one of the thirty eight-camera monitoring framework. Switch to camera camera can be the "+" and "-". The button "VTR" (video tape recorder) includes a VCR. Of course, you already noticed its buttons on the right panel - "PLAY", "STOP", "PAUSE" and two fast. But do not expect - action movie you will not be shown. Just diligent CIA agents ahead of time recorded thirty-eight videotapes - by one for each camera. Recorded on films that show the camera when the base Nobody interferes. Now, using these film, you will be able to fool any camera or even several at once. And help to know which camera should cheat button "MON" (monitor - the monitor). It includes an image from one of two monitors tracking database. The fact is that the staff base, of course, laziness watch all thirty-eight cameras. Therefore, they found only two monitors, seated behind them, two men and the limited. Each monitor is connected to different cells in the queue. Monitor "A" "Responsible" for the camera 1-30, the monitor "B" - for 31-38. (Why such an honor to some eight cameras, you ask? Understandably, not accidentally, but more about that in due time.) So that the robot can be easily (almost) hang out in the field of view cameras; if only it was not there when this camera connected to the monitor. It is clear that to see what the camera is now monitored, very useful. Switch from the monitor the monitor can be any or all of the same button "MON", or, as with cameras, the buttons "+" and "-". The button "TGS" (telemetry guidance system) will be displayed around the base plan robot - like the top view. Call it "Common view" language does not turn - painfully tiny bit you can see. But it shows the camera to which are currently connected monitors (one the camera can see in the picture). And the circle - this is Guard base, patrolling on a permanent route. The button "BYP" (Bypass camera) allows you to cheat monitors. Here's how this is done. You turn on the video your camera and perematyvete its at the right time. This is necessary even if the camera is pyalilas time in an empty corridor, because at monitor displays time code, and need that it coincided. Conveniently rewind the tape for a few seconds ahead, and then press pause and when the time matches, again let the film. (Incidentally, when you stop frame you will see a very realistic band interference.) And when the film is aligned in time, hit "BYP" - now on the monitor display images with no camera and video recording with sound. And the last button - "MRU" (as you will recall, was the name of the robot). It includes a robot mode of movement. Now press Up and down moves it forward and ago respectively, and the "right" and "left" - Turn on the spot. * So, you passed the exam and not leaving his easy chair, can manage robot on a distant Siberian-based (if only the director does not lie). Finally you report code for a fast connection to the CIA: 00987. Now, starting the game, you can just enter the code and get a virtual Siberia without tedious testing. Initially, all four screens of your robot some noise. Well, turn on screens and begins to master the base. Just be sure to include one of the screens in the mode of "TGS", to see what is happening around you. For two more screen start well to submit images from security monitors, and the last, fourth, continues to play with cameras and deception of these. I have already mentioned that in the regime of "TGS" on terms of base light up the camera, which currently connected to a monitor. Now, while you mastered, it is very convenient: you can mark where some cameras, map. By the way, the council: immediately begin mapping database! And best of all - maintaining the scale, for example, one cell - one step the robot. (The base is not so great, and such a plan is just fit for the tetrad sheet.) Those who passed the first part, and remembers a "race blind" in the end, once they realize why they need it. And those who did not pass ... will understand later.
Other articles:
Similar articles:
В этот день... 21 November