Difference between revisions of "Decker"

From RogueBasin
Jump to navigation Jump to search
m
m (Updated links and theme)
Line 1: Line 1:
{{game-stable| name = Decker
{{game-stable| name = Decker
|developer = [[Shawn Overcash]]
|developer = [[Shawn Overcash]]
|theme = [[Sci-Fi]],[[Cyberpunk]]
|theme = [[List of roguelikes by theme#Cyberpunk|Cyberpunk]]
|released = 2002
|released = 2002
|relver = ?
|relver = ?
Line 8: Line 8:
|language = [[Cpp|C++]]
|language = [[Cpp|C++]]
|platforms = [[Windows]]
|platforms = [[Windows]]
|site = http://www.caro.net/dsi/decker/
|site = http://sourceforge.net/projects/decker/
|licensing = [[Open Source]], [[freeware]]
|licensing = [[Open Source]], [[freeware]]
|interface = [[Tiles]], [[Keyboard]]
|interface = [[Tiles]], [[Keyboard]]
Line 21: Line 21:


=== Related links ===
=== Related links ===
* [http://www.caro.net/dsi/decker/ ''Decker'' homepage]
* [http://sourceforge.net/projects/decker ''Decker'' SourceForge page]
* [http://sourceforge.net/projects/decker ''Decker'' SourceForge page]
* [http://www.homeoftheunderdogs.net/game.php?id=3193 Review on Home of the Underdogs]
* [http://www.homeoftheunderdogs.net/game.php?id=3193 Review on Home of the Underdogs]

Revision as of 05:20, 3 March 2014

Decker
Stable game
Developer Shawn Overcash
Theme Cyberpunk
Influences unspecified
Released 2002 (?)
Updated 2004 (v.1.12)
Licensing Open Source, freeware
P. Language C++
Platforms Windows
Interface Tiles, Keyboard
Game Length no storyline
Official site of Decker


Decker is the name of the ones who break into corporate mainframes to perform missions from rival companies. In this tile-based cyberpunk RL, you are one of the deckers, running in cyberspace to earn skill and money to upgrade your equipment.

Description

The player takes on the role of a hacker who wants to earn reputation and money. To achieve this, a decker signs contracts and enters systems to fulfil the current mission. Objectives include disabling security devices, crashing systems, retrieval and/or deletion of data, creation of backdoors and many more. For completing a contract, the player is awarded with reputation and money. Any valuable files downloaded while in cyberspace are sold and also added to credits. On the other hand, reputation may suffer if many missions are failed. In cyberspace, the player may hack into databases, fight various ICE (Intrusion Countermeasure programs), collect information, and several more activities. Sometimes source code is found and upon downloading can prove to be a valuable tool for the hacker to use. Gained money may be used to upgrade hardware, pay for treatment, new software and rental payment.

Related links