Uplink 2: My Freak Idea ^^

Ideas for future addons and sequels

Moderators: jelco, bert_the_turtle, Chris, Icepick, Rkiver, Punisher Bass

DiNeSat4
level0
Posts: 2
Joined: Mon Nov 08, 2004 3:15 pm

Uplink 2: My Freak Idea ^^

Postby DiNeSat4 » Tue Oct 10, 2006 2:43 am

Well... i'm boring....very boring, so, i'm created a little story of Uplink 2:


This is the history of George, a boy of 23 years
Her mother died during the childbirth and his father is instructor of a special unit of the military forces.

In the school, George demonstrates his interest by the mathematical one, but he is to the 11 years where its liking by the computation began. Acquiring knowledge on design, programming languages of networks, protocols of security, hardware and electronics, among others.

At the age of 12 he mounts his first attack to the data base of his school, and from in ahead he mounts several attacks to Web sites there, halls chat and with data small corporations.

At the age of 15 it is united to a group of hackers where is received, taking its attacks until the data bases of the banks, where George obtains money for the improvement of his computer.

At the age of 17 George create the first virus known like “VO-7” , infecting 20 million of personal computers and shutdown the service of network of several corporations. The brigade of "cybercrime" finds it, and although to its early age to be sent to a jail, its computer confiscates itself to him and is sent with its father.

During following the two years his father teaches all type to him of military training, specializes in light armament and heavy, knowledge of pumps, martial and technical arts of silence movement (to enter a enemy field without being detected) After two years, his father sends it to an institute to study electronics, showing excellent results in the area of the telecommunications.

At the age of 21 George returns to the subject of the computation, designing security systems and systems of control for companies and organizations. to the 22 years, it enters the community of a game online called “Legend of Dragoons” where he is the one in charge of the mantención of the data base next to other companions. In his free time, George enters the game under the pseudonym of “Dahaka”, knowing friends and being united to an alliance. during months I appear in events, barbecues and to leave with its friends, where it knows Camila, a beautiful girl of who enamored George.

During the following months several strange problems happen, data of the data base disappear mysteriously without leaving evidence, blackouts of the service of video games and personages with additional information. It is logical, single George has access to the data base and their criminal data of years ago indicates it like only culprit, although George denies all this, his friends and the people who play in this community lose the confidence in, and the girl of who this enamored, moves away. To George the access to the data base takes off to him while an internal investigation begins to know if in fact it were or no. The whole community throws the fault to him to reason why it did. To the week later it is discovered that George sold information of the data base to groups of hackers and the police begins its search, George hides in his department while the community is hurt to the knowledge that one of its better administrators made such act.
He himself George resigns and begins his own investigation to know that step, with their abilities of the hack computer different networks from Internet and their only tracks aim at an industry of supplier of Internet and hosting call RedNet . It enters RedNet looking for some information, something that says to him that he is not guilty, in return, RedNet discovers it and is demanded to enter without authorization to its network. At the same time, one of the partners of George, who worked in the mantention of the data base and affluent person appreciated by the community of players, appears dead in its department, the only thing that is known is that George has been discussed strongly with, becomes suspect and is looked for to interrogate it.

During some days George hides asking itself who him this doing this and because, without no computer, no tool of tired aid and, decides to give itself, but in its way to the police station it is stopped by a black car, where it is forced to enter. Within the car this a dressed type or that says that works for an agency of hackers call “Uplink” and that there are it been watching per months, know or the situation and the tools necessary can offer him to look for the truth. George accepts.

The car parks in a dark alley, lower and in a briefcase there is hundreds of computation tools, one palm, mini notebook… and armament. The mysterious man offers all this to him, to use all means necessary to enter, to hack, rob and to obtain data. And sure if it is necessary… to kill George equips of arms and electronic devices to facilitate his hack, a connection to the agency, where he will be able to obtain data.

They leave you in the entrance of your university, with your equipment and begins your search.
======================

The game is ... style: Max Payne, Splinter Cell, Deus Ex and Solid Snake, but oriented to Hacking Computers.

The subject more hard is the one of the identity and the conspiracy .
Subjects like the infantile pornography in Internet, internal drug sale and Mafias will be touched.

The game is based in 3r person and RPG
You can move live Max Payne, Sam Fisher or the prince of persia
you can kill like... Max Payne (Bullet Time)
You have equipment with computer and network components

More components, examples:
Compilers: You make a scripter and execute in a machine
Advanced Proxys, Routers and Firewalls.
Buy hardware components (Memory, Modems, processors)
Enter to chatrooms to talk with another persons (bots)
Web Browsers
Technology like DNS, WINS, DHCP, Database Server, FTP and Mail Servers.
Sniffing network traffic

... and more...and more....and more

Well... this is from...my freak mind

thanks ^^ :roll:
Rkiver
level5
level5
Posts: 6405
Joined: Tue Oct 01, 2002 10:39 am
Location: Dublin, Ireland

Postby Rkiver » Tue Oct 10, 2006 9:32 am

So it's just System Shock 2, with a bit more thrown in....yawn.
Uplink help: Read the FAQ
ReconMikel
level1
level1
Posts: 37
Joined: Tue Jan 03, 2006 2:29 am
Location: The Matrix
Contact:

Postby ReconMikel » Thu Oct 12, 2006 5:03 am

hey DiNeSat4, have you started coding this project idea of yours?
DiNeSat4
level0
Posts: 2
Joined: Mon Nov 08, 2004 3:15 pm

Postby DiNeSat4 » Sat Oct 14, 2006 3:56 am

I don't know
I want to fix my story, or to make my own project, under the saying "Who controls the information, controls the world"

or maybe "Who controls the information, controls the true"
Rkiver
level5
level5
Posts: 6405
Joined: Tue Oct 01, 2002 10:39 am
Location: Dublin, Ireland

Postby Rkiver » Sat Oct 14, 2006 12:14 pm

If "fixing the story" is the top of your list, then I never imagine seeing this game.

You want to make a game, learn to prioritise.
Uplink help: Read the FAQ

Return to “The Future”

Who is online

Users browsing this forum: No registered users and 7 guests