Hacker (video game)

Last updated
Hacker
Hacker Coverart.png
ZX Spectrum cover art
Developer(s) Activision
Publisher(s) Activision
Producer(s) Brad Fregger
Designer(s) Steve Cartwright
Platform(s) Amiga, Amstrad CPC, Apple II, Atari 8-bit, Atari ST, Commodore 64, DOS, Macintosh, MSX2, ZX Spectrum
Release 1985, 1986, 1988
Genre(s) Puzzle, strategy
Mode(s) Single-player

Hacker is a 1985 video game by Activision. It was designed by Steve Cartwright and released for the Amiga, Amstrad CPC, Apple II, Atari 8-bit family, Atari ST, Commodore 64, Macintosh, DOS, MSX2, and ZX Spectrum.

Contents

Plot

Activision executive Jim Levy introduced Hacker to reporters by pretending that something had gone wrong during his attempt to connect on line to company headquarters to demonstrate a new game. After several attempts he logged into a mysterious non-Activision computer, before explaining, "That, ladies and gentlemen, is the game". The player assumes the role of a hacker, a person experienced in breaking into secure computer systems, who accidentally acquires access to a non-public system. The game was shipped with no information on how to play, thus building the concept that the player did hack into a system. [1]

Gameplay

The player must attempt to hack into the Magma Ltd. computer system at the beginning of the game by guessing the logon password. The password becomes obvious only after gaining access, through another means of entry, to the later stage of the game, but typing "help" or "h" in the initial command line gives a clue. Since initial attempts consist of guessing (and likely failing), access is eventually granted due to a supposed malfunction in the security system. Once the player is in, the player is asked to identify various parts of a robot unit by pointing the cursor at the relevant parts and pressing the joystick button. Most parts have exotic and technical names, such as "asynchronous data compactor" or "phlamson joint"—this again allows more room for error by initially trying to guess which part each name belongs to. Failure to identify each part correctly forces the player to take a retest until a 100 percent identification is made, at which point the player is then allowed to continue.

The player guides this robot, as seen on the Apple II version of the game, through the extensive network of tunnels. HackerRobot.gif
The player guides this robot, as seen on the Apple II version of the game, through the extensive network of tunnels.

The player gains control of the robot which can travel around the globe via secret tunnels, deep within the earth. The game's text states that the robot is powered in some manner by magma. It is evident that the player has logged into the Magma company's network and is acting as a remote user in its global subterranean transport network, with various strange messages being broadcast hinting at dangerous experiments that the company is doing.

Before getting far, the player is informed that shredded portions of a secret document containing Magma Ltd.'s plans for world domination have been stolen. The player is instructed to retrieve the document by bargaining with the spies who stole it, who are located at various locations throughout the globe. The player is warned that it must be retrieved in order to prevent the U.S. government from thwarting their plans. At this point, the player's objective is clear: retrieve the strips of the stolen document, then deliver them to Washington, D.C.

The robot's tunnel system is extensive but unmarked, so getting around is initially an exercise in trial and error. Throughout the globe, there are several cities where the robot can surface and interact with people, primarily the spies who want to bargain for their piece of the evidence.

The player must navigate tunnels which span the globe to negotiate trades at various locations. HackerPlaces.gif
The player must navigate tunnels which span the globe to negotiate trades at various locations.

At the various surfacing cities, the player must try to convince the agents to turn over their piece of evidence. Initially the player only has $5,000 to bargain with, but their arsenal of items grows over time and bargaining. The real challenge of the game is determining what each spy wants and how to get it for them. Eventually, all the spies' whims can be satisfied for all the pieces of the secret document. Note that different copies of the game, even on the same computer platform, have differences in which items the spies want.

However, Magma Ltd. discovers the player's break-in shortly after penetration. It launches a security satellite which, when it intersects with the player's position, demands information which supposedly only a legitimate user would know. The information queried is given to the player previously in the game, but the questions can only be answered if the player has taken careful notes as some of the information asked for is rather obscure. To put more pressure on the player, the Satellites will only allow the player to pass checks four times before another catch will cause the player to get disconnected due to suspicious activity. In addition, the player is under a time limit (tracked by movements the SRU makes); should the player take too long the system will automatically disconnect them anyway, regardless of the Satellites. The sensors of the network will also start to fail, limiting the player's ability to see turns in the tunnels ahead and eventually where their SRU is located, forcing the player to rely on maps of the tunnel network to make it through. If the player goes near Australia in the network, an automatic game over is issued however the knowledge may help in a future play through for evading a check.

The game lacks a save game feature. A player who fails must start again from the beginning.

Reception

By late 1987 more than 50,000 copies of Hacker were sold, and it was Activision's third best-selling Commodore game. [2] Info rated Hacker four stars out of five, describing it as "an interesting concept" with "fair to good graphics and sound". [3] Roy Wagner reviewed the game for Computer Gaming World , and stated that "The game is a real challenge (some read that frustrating)." [4] Ahoy! wrote that its puzzle nature "is certain to enthrall some and repel others ... repeated play is an integral part of reaching the solution. Those who enjoy a protracted battle of wits will find Hacker a lively test of their abilities". [5] Compute! praised the game's initial realism, and concluded that it was "a worthy addition to your software collection, especially if you enjoy adventure games that require a bit of thought and an investment of time". [6]

Reviews

Legacy

This game was followed in 1986 by Hacker II: The Doomsday Papers . In the sequel, the player is actually recruited based upon their (assumed) success with the activities in the original game. Once again, they are tasked with controlling a robot, this time to infiltrate a secure facility in order to retrieve documents known only as "The Doomsday Papers" from a well-guarded vault to ensure the security of the United States.

See also

Related Research Articles

<i>Suspended</i> (video game) 1983 video game

Suspended: A Cryogenic Nightmare is an interactive fiction video game written by Michael Berlyn and published by Infocom in 1983. Infocom's sixth game, it was released for Amstrad CPC, Apple II, Atari 8-bit family, Commodore 64, Commodore Plus/4, IBM PC, TRS-80, and TI-99/4A. It was later available for Macintosh, Amiga, and Atari ST.

The video game crash of 1983 was a large-scale recession in the video game industry that occurred from 1983 to 1985, primarily in the United States. The crash was attributed to several factors, including market saturation in the number of video game consoles and available games, many of which were of poor quality. Waning interest in console games in favor of personal computers also played a role. Home video game revenue peaked at around $3.2 billion in 1983, then fell to around $100 million by 1985. The crash abruptly ended what is retrospectively considered the second generation of console video gaming in North America. To a lesser extent, the arcade video game market also weakened as the golden age of arcade video games came to an end.

<i>Gorf</i> 1981 video game

Gorf is an arcade video game released in 1981 by Midway Manufacturing, whose name was advertised as an acronym for "Galactic Orbiting Robot Force". It is a fixed shooter with five distinct levels, the first of which is based on Space Invaders and another on Galaxian. The game makes heavy use of synthesized speech for the Gorfian robot which teases the player, powered by the Votrax speech chip. Gorf allows the player to buy two additional lives per quarter before starting the game, for a maximum of seven lives.

<i>Spy vs. Spy</i> (1984 video game) 1984 video game

Spy vs. Spy is a video game written by Michael Riedel for the Commodore 64 and published by First Star Software in 1984. A port for the Atari 8-bit family was released simultaneously. It is a two-player, split-screen game, based on Mad magazine's long-running cartoon strip Spy vs. Spy, about the slapstick antics of two spies trying to kill each other with improbably elaborate traps and weapons.

<i>Ghostbusters</i> (1984 video game) 1984 video game

Ghostbusters is a licensed game by Activision based on the film of the same name. It was designed by David Crane and released for several home computer platforms in 1984, and later for video game console systems, including the Atari 2600, Master System and Nintendo Entertainment System. The primary target was the Commodore 64 and the programmer for the initial version of the game was Adam Bellin. All versions of the game were released in the USA except for the Amstrad CPC and ZX Spectrum versions, which were released only in Europe, and the MSX version, which was released only in Europe, South America, and Japan.

<i>Impossible Mission</i> 1984 video game

Impossible Mission is a video game originally written for the Commodore 64 by Dennis Caswell and published by Epyx in 1984. The game features a variety of gameplay mechanics from platform and adventure games, and includes digitized speech. Impossible Mission, which casts the player in the role of a secret agent infiltrating an enemy stronghold, is widely considered one of the best games for several platforms.

<i>One on One: Dr. J vs. Larry Bird</i> 1983 video game

One on One: Dr. J vs. Larry Bird, commonly known as One on One, is a basketball video game written by Eric Hammond for the Apple II and published by Electronic Arts in 1983. It was initially ported to the Atari 8-bit family, ColecoVision, Commodore 64, and IBM PC. Versions followed for the TRS-80 Color Computer, Macintosh, Amiga, and ZX Spectrum. In Europe, the publisher was Ariolasoft. Atari Corporation released an Atari 7800 port in 1987.

<i>H.E.R.O.</i> (video game) 1984 video game

H.E.R.O. is a video game written by John Van Ryzin and published by Activision for the Atari 2600 in March 1984. It was ported to the Apple II, Atari 5200, Atari 8-bit family, ColecoVision, Commodore 64, MSX, and ZX Spectrum. The player uses a helicopter backpack and other tools to rescue victims trapped deep in a mine. The mine is made up of multiple screens using a flip screen style.

<i>Koronis Rift</i> 1985 video game

Koronis Rift is a 1985 computer game from Lucasfilm Games. It was produced and designed by Noah Falstein. Originally developed for the Atari 8-bit family and the Commodore 64, Koronis Rift was ported to the Amstrad CPC, Apple II, MSX2, Tandy Color Computer 3, and ZX Spectrum.

<i>Summer Games</i> (video game) 1984 video game

Summer Games is a sports video game developed and published by Epyx based on sports from the Summer Olympic Games. Released in 1984 for the Commodore 64, it was ported to the Apple II, Atari 2600, Atari 7800, Atari 8-bit family, and Master System.

<i>Pitfall II: Lost Caverns</i> 1984 video game

Pitfall II: Lost Caverns is a video game developed by David Crane for the Atari 2600. It was released in 1984 by Activision. The player controls Pitfall Harry, who must explore in wilds of Peru to find the Raj Diamond, and rescue his niece Rhonda and their animal friend Quickclaw. The game world is populated by enemies and hazards that variously cause the player to lose points and return to a checkpoint.

<i>Drol</i> 1983 video game

Drol is a video game published by Broderbund in 1983. It was written for the Apple II by Benny Aik Beng Ngo, then ported to the Commodore 64 and Atari 8-bit family. Versions were released for the SG-1000 in 1985 and Amiga in 1991.

<i>Summer Games II</i> 1985 video game

Summer Games II is an Olympic sports video game developed and published by Epyx in North America, and published by U.S. Gold in Europe, based on sports featured in the Summer Olympic Games. It is a sequel to Summer Games released by Epyx the previous year. Summer Games II was originally written for the Commodore 64 and ported to the Apple II, Atari ST, MS-DOS, ZX Spectrum, Amstrad CPC and Amiga.

<i>Hacker II: The Doomsday Papers</i> 1986 video game

Hacker II: The Doomsday Papers is computer game written by Steve Cartwright and published by Activision in 1986. It is the sequel to the 1985 game Hacker. Hacker II was released for the Amiga, Apple II, Apple IIGS, Amstrad CPC, Atari ST, Commodore 64, IBM PC, Macintosh, and ZX Spectrum.

<i>Beach Head II: The Dictator Strikes Back</i> 1985 video game

Beach Head II: The Dictator Strikes Back is a 1985 video game for the Commodore 64, a sequel to Beach Head, developed and published by Access Software. It was designed by Bruce Carver and his brother, Roger, and was released for the Amstrad CPC, Apple II, Atari 8-bit family, Commodore 64, and ZX Spectrum.

<i>Beach Head</i> (video game) 1983 video game

Beach-Head is a video game developed and published in 1983 by Access Software for the Atari 8-bit family and Commodore 64 home computers in the US. Versions for the ZX Spectrum, BBC Micro, and Acorn Electron were published in Europe by U.S. Gold in 1984, followed by versions for the Amstrad CPC, Commodore 16 and Plus/4 in 1985.

<i>Shanghai</i> (video game) 1986 video game

Shanghai is a computerized version of mahjong solitaire published by Activision in 1986 for the Amiga, Atari ST, Atari 8-bit family, Commodore 64, DOS, Macintosh, Apple IIGS and Master System. Shanghai was originally programmed by Brodie Lockard. It was released as an arcade game by Sunsoft in 1988.

<i>Superman: The Man of Steel</i> (1989 video game) 1989 video game

Superman: The Man of Steel is a 1989 video game featuring the DC Comics character Superman. It was developed and published by UK software company Tynesoft under license from First Star Software.

<i>Ghostbusters II</i> (computer video game) 1989 video game

Ghostbusters II is a 1989 action game based on the film of the same name. It was published by Activision for various computer platforms. British studio Foursfield developed a version for Commodore 64, Amiga, Atari ST, Amstrad CPC and ZX Spectrum, which also got ported to the MSX by New Frontier. It features three levels based on scenes from the film. Dynamix developed a separate version for the DOS, also based on the film. The non-DOS versions were praised for the graphics and audio, but criticized for long loading times, disk swapping, and the final level. The DOS, Commodore 64 and Amiga versions were the only versions released in North America.

<i>GFL Championship Football</i> 1986 video game

GFL Championship Football is a 1986 video game published by Activision. An exclusive sequel, GFL Championship Football II, was released for the TRS-80 Color Computer 3 in 1988.

References

  1. Bateman, Selby; Yakal, Kathy (October 1985). "The New Games". Compute!. p. 32. Retrieved 16 October 2013.
  2. Ferrell, Keith (December 1987). "The Commodore Games That Live On And On". Compute's Gazette. pp. 18–22. Retrieved 24 January 2015.
  3. Dunnington, Benn; Brown, Mark R. (December 1985 – January 1986). "C-64/128 Gallery". Info. pp. 4–5, 88–93. Retrieved 2019-03-19.
  4. Wagner, Roy (Jan–Feb 1986). "The Commodore Key". Computer Gaming World. Vol. 1, no. 25. p. 19.
  5. Davidson, Steve (January 1986). "Hacker". Ahoy!. p. 54. Retrieved 2 July 2014.
  6. Heimarck, Todd (April 1986). "Hacker". Compute!. p. 65. Retrieved 8 November 2013.
  7. "GAMES Magazine #70". December 1985.