Log In  

Cart #cybercrush-0 | 2020-12-13 | Code ▽ | Embed ▽ | License: CC4-BY-NC-SA
9

CYBERCRUSH

In Cybercrush, you are a netrunner hacking into a corporate mainframe to steal confidential files…
In typical cyberpunk fashion, this mainframe is abstracted as an old-school low-res icon-based grid of swappable binary numbers (which you are naturally accessing through a glitchy old cyberdeck ;-)

The rules are simple: you steal files by matching identical binary icons (there are four: 00, 01, 10 and 11) in multiples of 4 (so 4, 8, 12 etc.) Doing so is called a hack: the files are downloaded, then erased from the corporate database. The higher the number of tiles in the group, the more advanced the hack and the more files are transfered. In summary: the first four binary icons are worth one file each, the next four (i.e. 5 to 8) are worth two files each, the next four (9 to 12) are worth four files each and so on and so forth. For example, matching 12 icons increases your tally by 4 x (1+2+4) = 28 files, 16 icons by 4 x (1+2+4+8) = 60 files!

Whenever files are erased, the increasingly amnesic AI reorganises the database in an attempt to defragment it, which the interface interprets as a reconfiguration of the grid of binary icons. Conveniently, there is a pattern to this reconfiguration. Icons “fall” into the direction corresponding to their value: 00s move left, 01s move right, 10s move up and 11s move down. The skilled netrunner can exploit this feature to create cascades, dealing enormous damage and stealing many valuable files in just a few advanced hacks.

You move the cursor using the arrow keys. Holding “Z” will swap the icon under the cursor with its neighbour in the corresponding direction. Pressing “X” will reveal the current score (which is also displayed automatically when the entire grid is cleared). It is possible to swap an icon with an empty space, although of course this will have no effect if the space in question is in the opposite direction to the icon’s movement (as it will instantly revert to its previous location).

The first hack starts the clock (jacking in), which stops when the grid is cleared (jacking out). Any good netrunner will try to maximise their tally (number of files downloaded/erased) while keeping the intrusion as short as possible to minimise the risk of detection and counterattack (you can’t sell stolen information if your brain is fried)!

Good luck!

P#85340 2020-12-13 09:33

not a very intuative game but the graphics are amzing

P#87046 2021-02-01 00:24

[Please log in to post a comment]

Follow Lexaloffle:          
Generated 2024-03-29 15:00:01 | 0.010s | Q:18