Hacker Evolution Collection – Review
I quite enjoy typing. I certainly enjoy computers. I definitely like the hit 1983 film which launched the career of Matthew Broderick, War Games and, as such, I happen to be in a lot of luck as I have the pleasure of bringing to you a review of exosyphen studios Hacker Evolution Collection, typed on a computer, whilst watching the hit 1983 film War Games.
The hacking game is nothing new. The idea has ultimately evolved from the text adventures of days sadly gone by and then trickled its way back into gaming culture through nifty browser based html or flash games, mini game easter eggs and the dedicated few who challenge the cult classic Uplink in the retail market. Having been originally released in 2007, the Hacker Evolution series has since been graciously decorated with a full sequel, along with expansion packs for each version, warranting a complete ‘Collection’ release this month.
For the un-initiated, Hacker Evolution is an entirely console based game relying on the entry of computer based commands, issued in text form only and carefully selected in order to complete mission objectives. There is no reward given to a proficiency in typing speed or efficiency beyond an arbitrary time elapsed high score and the game is welcoming to all, being less dependent on skill and more reliant on a solid logical mind.
Puzzles vary from the destruction of virtual property, theft of digital resources and detection type mysteries which see you combing through servers to uncover who else is hacking their way through cyberspace. All of this is tied together into the perspective of Brian Spencer, a former intelligence agent living in the year 2015 who left the spying game a few years previously after having failed a mission, followed by the death of his whole family in a freak car accident. ‘The cause remains unclear’ and this looks like exceptionally bad writing on my part. Sadly this is simply the character profile as presented to you by the game’s Romanian development team and I’ll spare you any further criticism of some odd translations and redirect your focus back to the game itself.
Brian’s personal story actually bears no relevance to the game’s central plot line and isn’t actually a mystery to be solved. Your family is dead and you happily retired to your own private island until the Federal Services Agency got in touch, asking you to do a little freelance work for them by helping to track down a hacker who managed to get inside the New York Exchange. Tracking down the culprit leads you on a multistage, nine mission campaign which, again, has very little to do with the game’s opening cut-scene in which exosyphen details how the Xenti Corporation has developed data transmission speeds so fast, it has caused the space time continuum to rupture and allow for files to be received before they were even sent. With this apparently being some sort of problem, the developing company created an AI to control package delivery, which, as I’m sure you have already guessed, spread throughout time and alternate realities, giving it unrivalled processing power, evolving beyond its programming and falling out of the control of its creators. Thankfully it doesn’t want to kill anyone, it just wants to survive.
I’ll give you a moment to digest all of that.
It’s a lot to take in and even more so to then completely ignore. Whilst Hacker’s internal mission plot lines are compelling and follow on from mission to mission, the weird world of a dead intelligence agent’s family and super computers which occupy simultaneous dimensions is beyond a sub-plot and more akin to an episode of your favourite TV show where the main character wakes up at the end (only he’s waking up on his own private island and his family are still dead). It certainly helps to give you a sense of paranoia however, crucial to the success of a good hacking game. If you don’t feel as though at any moment, a time travelling AI can manipulate company records and have your family murdered, well then you’re not going to get as much of an experience out of this and you may as well pretend you’re just doing some bizarre admin work for a temping agency.
Back to the game itself; Hacker Evolution presents itself as basically as it needs to. The User Interface comprises of a console window in which for you to input commands and review data, a global map representing the geographical locations of servers around the world, a Systems Panel detailing your computers hardware, active operations and connection information and an inbox for you to receive helpful e-mails. It’s a simple design with no complications, no extra interfaces to flit between or any information hidden in a sub-menu. At best, you’ll only ever find yourself tapping PgUp and PgDn to scroll through the text displayed on the console.
The only dynamic aspects of the UI occur when trace programs are ran against your connection, creating a visual representation of just how long you have before your location is discovered. Failure to complete an operation before the trace is made can result in a total mission failure and so the added little touch of being able to see how long you have left really does help to build the tension.
In the follow up, Hacker Evolution: Untold the UI becomes more dynamic, simply by making the map pane display images as a background which is more relative to the mission, swapping the traditional world map out for more immediate locales. It’s a minor addition to the series but when tasked with hacking a traffic light system to slow down the hit-men hired by the company you just hacked into whilst sat in a cafe across the street from their offices, the tiny visual addition really does make for a more immersive experience.
With such a simplistic UI, it should come as little surprise to learn that control is implemented in a similar way. The mouse cursor will find little to do beyond speeding up a few commands relative to the map pane or flicking through emails in the inbox; all control is literally at your fingertips, right there on your keyboard.
If you’re anything like me, the only action your keyboard will have ever really seen when gaming exists around the WASD keys. It’s the default position my hand moves too whenever I sit at my keys. Occasionally the 1-4 keys see some use, Shift, Ctrl and Alt make an appearance as a modifier and the spring in my space bar takes a light pounding as a I bounce around like a bunny on crack laced carrots. To make use of the whole keyboard in a game is as alien a concept to me as getting up in front of my 360 and flailing my limbs randomly in the hope I accomplish something.
Having to fully type out a command rather than just activating hotkeys or clicking on an action bar helps you feel right at home in your new role as a widowed former intelligence agent and this more manual execution of abilities has a genuine, initial feeling of gratification to it. There’s something deeply satisfying in the input of commands where the product of your actions was a direct contribution by you, the gamer, rather than an expression of your on screen avatar.
That said, the magic does begin to wear thin when having typed ‘connect server-hacker.evolution.com 699′ you discover that what you were actually supposed to type was ‘connect server.hacker-evolution.com 699′ and then have to type it all out again after the obligatory stare at the screen professing that you did absolutely nothing wrong. It’s at this point when you begin to question the quirky Windows 1.0 approach to a future world where A.Is exist in both space and time (a market which even Wal-Mart are yet to enter) why it is you don’t have the ability to highlight text from within the console, using your mouse to right click copy or left click paste nor to be able to click highlight any part that’s wrong and quickly correct your mistake.
Whilst the initial feeling is bizarrely authentic to the world of hacking, you soon find yourself wondering if the iPad is yet to make it to the Romanian markets. The lack of functionality in the controls doesn’t quite seem to fit the game’s 2015 setting despite the inclusion of time saving functions such as the TAB key to auto-complete partially typed commands or the ability of the Up/Down keys to cycle through anything you previously entered. These functions are essential to stave off the irritation of having to repeatedly enter the same lengthy commands but unless you’re already familiar with games of this ilk, don’t expect to be told that these functions even exist.
Which leads me neatly on to the game’s tutorial. Newcomers to the field would certainly be put off by the lack of visual applications and the idea of navigating a world purely through the correct use of command lines. Typing ‘HELP’ into the console generates a list of input commands, their function and an example of its usage. Most commands are fairly self explanatory with ‘CRACK’ providing the ability to bypass password protection on hosted computers and ‘DECRYPT’ breaking any encryption protection on the servers network. As the missions become more complex, more console commands come into play, further complicated by commands which are strictly context specific.
It is hoped that the tutorial would gently break you into the world of cyber crime and detection but the experience is perhaps more akin to being given a tour through the Musée du Louvre by a drunk Terry Wogan, on a fighter jet during a Parisian blackout. Whilst there are no time constraints on the tutorial, the manner in which the tutorial is delivered (through procedurally generated tooltips appearing in your teeny tiny inbox window) only directs you through the level, in no way offering any explanation of any of the tasks you need to perform that you’re ultimately performing in preparation for tackling the main game. You are simply told ‘How’ to complete the mission objectives, leaving the ‘What, Who, Why and Where’ completely up to you.
It’s a cruel introduction and once you begin the game proper, you really will be making good use of the ‘HELP’ command. I even found myself restarting the game several times in an effort to better understand the available commands but it still took me a trip around Google to find more approachable, user friendly help. I have criticised games in the past which have perhaps gone too far in holding your hand through a games introduction, stopping to patronisingly teach, refresh and retrain every little detail, but I can see how many would be put off by this rather more sadistic approach.
As an example, the game eventually requires you set up ‘Bounced Links’ – a linking of servers prior to the connection you intend to make which increases the time before your location is traced. It’s a fairly key aspect of the game as 50 percentage points will be added to your total trace amount should you fail to complete a command before the trace is made. With a 100% trace resulting in mission failure, you really do need to have a good grasp of how to bounce your signal so that you can safely crack longer passwords or decrypt tougher servers. Sadly the instructions are a little vague and ‘BOUNCEHELP’ providing little more than a splash of water in a pint of whiskey. With each server being restricted to a set number of ‘bounces’, using links surplus to a requirement you’re unaware of can result in creating an impossible situation further along the mission where you find yourself unable to complete a command without incurring that 50 point fail trace.
With no avenue to pursue any training, you simply find yourself experimenting like the game doesn’t matter until you eventually get the hang of it and then can re-start the campaign, convincing yourself that you’re ready to tackle the game properly. Once you’ve subjected yourself to this rather torturous approach to self tutorial, you can then start to appreciate the complex nature of the game that separates it from rivals within this niche sub-genre of the PC gaming world.
You need to be able to understand the capabilities of your system and be confident that you can complete a task using what you estimate to be the bare minimum of bounced links, each carefully selected so that when it comes to connecting to a server along that link, you still have a viable chain in order to delay that all important trace. It gets a little close at times with some actions completing 0.2 of a second before the trace can be made but it sure does feel rewarding in those early stages, in the days before you have transferred enough money from servers to your own bank account in order to purchase upgrades for your machine.
Beyond your own Einstein like mathematic calculations, you then need to have a Sherlock Holmes eye for the details and the cunning to unravel the mystery behind each mission. Again, this isn’t so much a skill you are slowly made to realise you have but more one you are shown to be in dire need of a weekend watching Poirot. The very first mission will punish you severely for failing to register an altered document, signed by a group of hackers. It’s a tiny alteration to the original that is presented to you, with no indication given that the document had ever been tampered with but in failing to notice it and deduce that the group of hackers must have a server that they could have hacked from, you would not gain access to their server to use as a bounce-link, nor the information and finances contained on their server.
The game is positively littered with these tiny little requirements that elevate Hacker way beyond a basic console command hacking game and very much into the world of puzzle and strategy. With a little acknowledgement already made to the compelling internal plot lines of the missions, the game really does challenge you to beat it so that you can learn more and happily punish you for simply not being up to the task.
Beyond the initial campaign to investigate the mysterious crashes in the New York Exchange and other key institutions around the globe, the Reinsertion expansion picks up from where Hacker Evolution leaves off, providing three complete missions to explore. In Hacker Evolution: Untold, you return to the life of Brian Spencer only this time, you’re the one being investigated. As well as having to discover who it is that is trying to track you, the game becomes even more difficult by simultaneously tasking you with delaying the same shadowy organisation from finding you – a very simple story element that doesn’t alter any of the existing gameplay but really draws you deeper into the game’s world. If you’re not content with your fill after all of that the, so far, final addition to the series rounds off the collection with Hacker Evolution: Untold – Flight Zero, another three mission add-on pack in which a mysterious operative waltzes into and steals technology from the corporation you just closed down in an attempt to restart the whole project. Of course you’re the only man for the job and so they drag you out and beat you with a stick until you start to yield some results which contribute towards the unmasking of the Scooby-Doo villain.
Again, it’s not Shakespeare, but once you get started you just can’t help but to fail the mission majestically and come right back at it with a renewed vigour, determined to get into the next mission and find out what’s really going on. Replay wise, Hacker will hold very little extra for you with no greater reward than achieving the mission objectives more flawlessly than your first attempt and earning a higher score in order to place better on the global leaderboards. There are no moral decisions to be made here with no endings other than your predetermined fate which is something of a missed opportunity considering that there’s a time travelling computer somewhere on the planet.
For those still hungry for more, the game features full mod support and comes packaged with its own editor, installed into the game’s directory and is dutifully supported by the dedicated community on exosyphen studios forums. It makes for a nice addition to the game that I’m sure will see a renewed sense of creativity after the collection’s release.
Beyond the major criticism of Hacker Evolution’s almost vertical learning curve, little more can be ill spoken of the game. It’s soundtrack is a little jarring to anyone who isn’t into any Techno/Trance music but it’s nothing that can’t be disabled in the options and rectified with BBC Radio 2 or a Jive Bunny Mega-mix. The sound effects are as simple as the UI, with typing noises played as text is presented to you, beeps to confirm data entry and more angry and urgent beeps to warn you of impending doom. It may not sound like much but it’s hardly an experience that would benefit from Skywalker Sound THX Dolby Digital 8.1 Surround Brain Sound. Those who are at first hoping for another open world to hack through and take randomly generated tasks to raise notoriety and cash as found in Uplink will be at first disappointed by the game’s narrow direction but immediately lured in by the same challenge experienced by those new to the genre. It could certainly benefit from a better tutorial but where would the sadomasochistic fun be in that?Pros
- A great, unique experience
- Simply presented
- Compelling Missions
- Little replay value
- Incredibly daunting for newcomers
- Extremely challenging for the faint of heart
- Would benefit from more advanced functionality
The Hacker Evolution Complete Collection is niche product in a niche market. That said, it's not one to turn your nose up at and not one to punish for bending your nose a little out of shape if you do make time for it. The games challenge doesn't lie in any failure on it's own part but simply from within those willing to invest their time in it. The experience on offer is a carefully directed and well thought out mystery for you to solve. It's closest rival in the market may make for a more approachable game than exosyphen studios creation, but the two are catering to very different tastes. If you're looking for a good, solid puzzler with a leaning towards those with an open, strategic mind, look no further.
If you'd rather have the experience without the brain hemorrhaging, well then War Games is available on DVD these days. Poor Matthew Broderick, to think he had a bright career in front of him back then.
Last five articles by Adam
- Party Pooper
- Battlefield 3 - Review
- Red Orchestra 2: Heroes of Stalingrad - Review
- Burnout CRASH! - Review
- Dead Island - Review