![]() ![]() ![]() "everyone", through smartphones, business computers to hospitals, detention centers, online game servers and even pacemakers! This goes from the simple computer of Mr. The goal of the game is therefore to hack various terminals. We have access to many orders, such as viewing active processes, moving / copying / renaming / deleting files, connecting to a remote machine (if you know the IP!), performing a port scan, running processors, viewing the contents of files, restart the computer remotely, run a firewall scan and even empty the terminal completely, play around with the CD drive or even infect the computer with viruses! In short, there is plenty to do! It is in this window that we will type all the commands to hack. The back window, called « terminal », is the window that we will use throughout the game. It is therefore important to monitor this bar, but also to know the “consumption” of the programs in order to be able to rotate and manage to use as much as possible at the same time without blocking. The latter will be essential, because each program that you use to hack will use a certain amount of memory and if this last is totally taken, it will be impossible for you to launch other programs. So we have a Network "map", a "terminal" window, a window used to see the computer or server you are entering (like a teamviewer) and one of the very important things: living memory from the computer. The game simulates a computer screen from which we will “work”. Indeed, the game is full of small "secondary" stories, sometimes funny, sometimes sad, that can be found here and there in the computers or on the servers that you hack, which adds to "realism. don't bother to “explore” everything during our hacking sessions. The story may seem weak, or even non-existent, but the "strength" of this game is that the fable is hidden throughout the adventure and that you can even miss it completely if you don't. We therefore find ourselves "hired" by this group which offers us contracts, until one of the most important members (the best hacker) disappears without leaving a trace or giving any news. ![]() We were quickly approached by groups of hackers who quickly noticed our little talent standing out from the crowd. We therefore find ourselves in the shoes of a young beginner hacker who must prove himself. ![]() Hacknet is a computer hacking simulation game developed by Team Fractal Alligator, published by Surprise Attack, released on August 13, 2015. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |