The software upgrades come in the form of new available commands that allow you to bypass firewalls, automatically delete conspicuous logs, and other hacking related programs. There are certain strategic dynamics at work that help to keep things interesting (logging off before being detected, making sure you have enough storage space to download a particular file, etc), but after three or four missions you’ll have the process down to a science.īy completing missions you’ll accumulate credits that can be spent on hardware and software upgrades. ![]() Things get a bit more intricate as you progress through the later portions of the game but for the most part you’ll approach every mission the same gain access to a server and input a few essential keystrokes. The missions that entail the modification of college records, for example, allow you to sift through emulated on-line records complete with student snapshots. Not all missions are as cut and dry as copying a particular file or deleting certain information, however. Once you complete the mission you'll receive a certain amount of credits and gain a slight status upgrade. You'll copy/delete/modify a particular file, erase incriminating logs if necessary, and log off. Once you gain root access you'll be presented with a simple menu that will allow you to access the server's files and logs. You'll bounce your virtual internet connection through various IP addresses so that you can't be easily traced and then run a password cracking utility at the specific site's log-on screen. After you accept a job you'll receive an email from the company who solicited it that details the specifics (ie - destroy/copy company data, modify scholastic records, etc). You'll start by checking out the mission board which details available hacking jobs. But the missions themselves, around which the entire foundation of the game revolves, is incredibly linear requiring only that you input the correct commands and codes in a specific order within a certain duration of time. ![]() ![]() The process of progressing through Uplink: Hacker Elite is nonlinear in the sense that you choose what missions you want to take on and how to upgrade your system. And Uplink: Hacker Elite solidifies this fact by requiring the player to institute security precautions, specialized software, and powerful hardware in order to progress – all within the confines of a relatively simple strategy-based formula. Hacking isn’t merely a matter of fervently tapping away at a keyboard, attempting to brute force your way through a log-on screen. This isn’t an entirely original concept (Activision released a similar type of PC game titled, simply, “Hacker” nearly 20 years ago), but the people who brought this game together have done so in such a way as to include a surprising amount of authentic dynamics. As a computer “hobbyist” who’s had his fair share of FBI visits, Uplink: Hacker Elite seems like an intriguing prospect: work your way through the ranks of elite hackers by remotely infiltrating sensitive computer networks.
0 Comments
Leave a Reply. |