Follow TV Tropes

Following

History Videogame / Uplink

Go To

OR

Added: 3526

Changed: 918

Is there an issue? Send a MessageReason:
None


* BeefGate: Once you step up to hacking the International Social Security Database, you'll find it's a much tougher nut to crack than the Global Academic Database and the minor computer systems you've been trying to deal with before. You'll need a lot more links to bounce your connection, and you'll need to work quickly and with better hardware and software to get things done in a timely fashion. [[spoiler: And the Proxy Server will shut down any attempts to change information until you disable it.]]



* BoringButPractical: Read/Write access. If you're just looking to alter data and not crash the system, R/W access is all you need. It doesn't give you access to the console, but it's less likely to prompt a trace immediately the way admin access does, it's less likely to be revoked when you log out, and it's usually easier to break the password than admin access. Of course, "less likely" doesn't mean "completely unlikely", so if you're going to have to deal with a trace anyway, might as well go for admin access. Some systems also don't allow read/write access (though, hilariously, all government databases do).



* KarmaMeter: Of a sort. The game keeps track of whether you're a hacker or a cracker. If you attack big (presumably evil) corporations by stealing data or trashing their system, your reputation goes up. Doing missions that affect individuals directly (including tracing other hackers) makes it go down. Going down is easier then going up. Mission givers ''will'' react to your reputation. And if you [[spoiler: sell the list of Uplink agents,]] your reputation will be ''locked'' into a completely amoral sociopath.

to:

* KarmaMeter: Of a sort. The game keeps track of Your Neuromancer rating is this, and tracks whether you're a hacker PlayfulHacker or a cracker. TheCracker. If you attack big (presumably evil) corporations by stealing data or trashing their system, steal data, adjust files for the gain of others, and trace hacking attempts, then you'll be considered a PlayfulHacker. Conversely, if you delete data, crash systems, and ruin lives, you'll be considered TheCracker. While your reputation goes up. Doing missions doesn't count for much, reaching the extremes of the scale will make it hard to take jobs that affect individuals directly (including tracing other hackers) makes it go down. Going down is easier then going up. Mission givers ''will'' react run counter to your reputation. And reputation: companies don't want to hire a PlayfulHacker to destroy a system, and they sure as hell don't want to let TheCracker into their system to trace someone else. There's only one action that is guaranteed to change your reputation immediately, however: if you [[spoiler: sell the list of Uplink agents,]] your reputation will be ''locked'' into a completely amoral sociopath.



** Notably, your mission descriptions in this case will generally require you to delete the files and ''any backups'', which presumably would require you to go through and find backups, but none exist. Instead, it's intended to prevent you from copying the data to your own system before deleting it, so that you can't "return" it after getting paid.



* OneStatToRuleThemAll: Processing power. Storage can be worked around with offsite computers[[note]]the Uplink test computer can be used as extra storage without any consequences at all[[/note]], and unless you're copying a large database for a mission[[note]]And sometimes even then: all the employer wants is all files uploaded to the FTP server. You don't have to upload it all at the same time[[/note]], 96 gigaquads is enough for most things. Upload/Download speed affects file copying and deleting, which is already pretty fast anyway with the basic 1GQ/s modem, and most systems support at least the 4GQ/s modem, which is fast enough for most things. Security is a category on it's own. But raw, unbridled processing power cannot be substituted: a faster modem and more storage will not affect how quickly you break into systems or how well your trace tracker works. You can get through the whole game without upgrading your modem or your storage. You cannot do the same with processing power.



* ViolationOfCommonSense: Did you just complete a bank robbery for hundreds of thousands of credits and want to get away scot-free? Blow up your Gateway. Sure, you'll lose the hardware, but it means that you'll be completely untraceable: even if the police manage to trace your connection, the computer they'll find ''blew up'', and you've got hundreds of thousands of credits to build an entirely new one, so what do you care?

to:

* ViolationOfCommonSense: Did you just complete a bank robbery for hundreds of thousands of credits and want to get away scot-free? Blow up your Gateway. Sure, you'll lose the hardware, but it means that you'll be completely untraceable: even if the police manage to trace your connection, the computer they'll find ''blew up'', and you've got hundreds of thousands of credits to build an entirely new one, so what do you care?care? [[spoiler: If you didn't delete the bank transfer records first, then you're still going to be arrested, though.]]


Added DiffLines:

* WakeUpCallBoss: The Global Criminal Database. There are more secure systems requiring voice print identification, but the GCD is very well protected, capable of completing an active trace faster than most other systems in the game, meaning you'll need dozens of bounces. Password breaking will take a surprising amount of time, and this is likely the first time you've seen the Quantum Cypher Key security system. In addition, the GCD uses a level 3 Firewall and a level 3 Proxy, a big step up from the Level 1 Proxy you've been seeing around (and possibly your first exposure to a firewall). Finally, the GCD is the first government database that will aggressively work on a passive trace, meaning you'd better be ready to cover your tracks. Your previous tricks won't work here, [[spoiler: but if you can save up the money to get a Connection Analyser HUD upgrade, along with a Monitor Bypass, the GCD becomes an easy source of money, as you'll almost never be traced actively, and passive traces are much slower when you don't set off the alarm.]]
Is there an issue? Send a MessageReason:
Per TRS, Feelies is now Trivia.


* {{Feelies}}: Although even these are virtual:
** The passworded "Game Bible"
** The shiny bonus disc, with old builds of the game and their ideas for Uplink 2.
Is there an issue? Send a MessageReason:
None


It's arguably one of the most realistic games out there, because you never see your character - in fact, the character is made out to simply be ''you'', operating under an alias. You never see your character because he's/she's sitting in the same chair you are, typing in commands on your keyboard with your hands.

to:

It's arguably one of the most realistic games out there, because you never see your character - in fact, the character is made out to simply be ''you'', operating under an alias. You never see your character because he's/she's they're sitting in the same chair you are, typing in commands on your keyboard with your hands.

Added: 732

Changed: 264

Is there an issue? Send a MessageReason:
None


* ForcedTutorial: While the tutorial itself is optional, the player is still required to complete the tutorial mission of breaking into the test server. Abandoning the tutorial mission will not give the player enough experience required to start other missions.



* UnwinnableByDesign: Once you make your decision in the first storyline mission, you've joined the associated faction. If you try changing your mind later (e.g. improve Faith when you first worked for ARC), your opponent in the climax will be overpowered compared to your own software.

to:

* UnwinnableByDesign: UnwinnableByDesign:
** Abandoning the tutorial mission means the player doesn't have enough experience to accept missions, and also the player wouldn't have enough funds required to purchase software to break into any bank.
**
Once you make your decision in the first storyline mission, you've joined the associated faction. If you try changing your mind later (e.g. improve Faith when you first worked for ARC), your opponent in the climax will be overpowered compared to your own software.
Is there an issue? Send a MessageReason:
None


** [[StealthPun The password to the practice machine]] is always [[spoiler: [[ItWasHisSled rosebud]] ]].

to:

** [[StealthPun The password to the practice machine]] is always [[spoiler: [[ItWasHisSled [[Film/CitizenKane rosebud]] ]].
Is there an issue? Send a MessageReason:
None


Compare with ''TabletopGame/NetRunner''. There was a fan sequel called ''VideoGame/{{Codelink}}'', and there also exists a command prompt-based SpiritualSuccessor known as ''VideoGame/{{Hacknet}}''. Not to be confused with the standalone demo for the original ''VideoGame/HalfLife1'', ''Half-Life: Uplink''.

to:

Compare with ''TabletopGame/NetRunner''. There was a fan sequel called ''VideoGame/{{Codelink}}'', and there also exists a command prompt-based SpiritualSuccessor known as ''VideoGame/{{Hacknet}}''. Not to be confused with the standalone demo SelfContainedDemo for the original ''VideoGame/HalfLife1'', ''Half-Life: Uplink''.

Added: 227

Changed: 588

Removed: 227

Is there an issue? Send a MessageReason:
None


Compare with TabletopGame/NetRunner. There was a fan sequel called ''VideoGame/{{Codelink}}'', and there also exists a command prompt-based SpiritualSuccessor known as ''VideoGame/{{Hacknet}}''. Not to be confused with the standalone demo for the original ''VideoGame/HalfLife1'', ''Half-Life: Uplink''.

to:

Compare with TabletopGame/NetRunner.''TabletopGame/NetRunner''. There was a fan sequel called ''VideoGame/{{Codelink}}'', and there also exists a command prompt-based SpiritualSuccessor known as ''VideoGame/{{Hacknet}}''. Not to be confused with the standalone demo for the original ''VideoGame/HalfLife1'', ''Half-Life: Uplink''.



* {{AFGNCAAP}}: You have no photo in your school records, Social Security file, or criminal record. During the secret mission to [[spoiler:steal the agent roster from the Uplink Internal Services machine, there's always one of the ten files missing - the one containing your own record.]]

to:

* {{AFGNCAAP}}: You have no photo in your school records, Social Security file, or criminal record. During FiveFiveFive:
** The computers you hack into use nonsense [=IP=] addresses.
** And
the secret mission to [[spoiler:steal the agent roster from the Uplink Internal Services machine, there's always one of the ten files missing - the one containing your own record.]]phonelines you ring for voice print [=IDs=] use nonsense phone numbers.
** Your gateway is ''always'' 127.0.0.1. [[IncrediblyLamePun No place like home]]...



* FiveFiveFive:
** The computers you hack into use nonsense [=IP=] addresses.
** And the phonelines you ring for voice print [=IDs=] use nonsense phone numbers.
** Your gateway is ''always'' 127.0.0.1. [[IncrediblyLamePun No place like home]]...

to:

* FiveFiveFive:
** The computers you hack into use nonsense [=IP=] addresses.
** And
FeaturelessProtagonist: You have no photo in your school records, Social Security file, or criminal record. During the phonelines you ring for voice print [=IDs=] use nonsense phone numbers.
** Your gateway is ''always'' 127.0.0.1. [[IncrediblyLamePun No place like home]]...
secret mission to [[spoiler:steal the agent roster from the Uplink Internal Services machine, there's always one of the ten files missing - the one containing your own record.]]

Added: 91

Changed: 2

Is there an issue? Send a MessageReason:
None


** Also, when you connect to the Uplink Public Access Server and Gateway for the first time in the intro, the logo on your computer screen changes based on whether you’re playing the Windows, Mac or Linux version.

to:

** Also, when you connect to the Uplink Public Access Server and Gateway for the first time in the intro, the logo on your computer screen changes based on whether you’re you're playing the Windows, Mac or Linux version.


Added DiffLines:

* SchoolGradeHacking: Hacking the International Academic Database is an early game mission.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* CripplingOverspecialization: The high-end Gateways tend to do one thing very well, to the detriment of their other abilities. The UNITY High-Security Platform has multiple redundant security options (but see UselessUsefulSpell), and can hold 1 more CPU that most other Gateways, but has very little memory. The AM-CORE File Server has the most memory storage (256 [=Gq=]) and the fastest available bandwidth (10 [=Gqs=]), but can only hold three [=CPUs=], which means the actual hacking process will be slow. The OMEGA Parallel Supercomputer can hold a whopping ''sixteen'' [=CPUs=], which will allow it to crack ''any'' system extremely fast, but it has only 48 [=Gq=] memory, a slow 4 [=Gqs=] bandwidth, and only one security slot (which is bad, see UselessUsefulSpell, again). The [=TRINITY-1686a=] Gateway is, however, the MasterOfNone gateway: able to use 8 [=CPUs=], with 128 [=Gq=] of storage and the second-fastest bandwidth (8 [=Gqs=]), it will nonetheless have difficulty completing more specialized missions, such as "Copy a Large Database".


Added DiffLines:

* DifficultButAwesome: Robbing a bank to get a 6 digit payoff. Getting a mission that points you to a target account is relatively quick: they start showing up as "Trace a recent bank transfer" missions around rank 7, which is the rank after you start getting missions to hack into the Global Criminal Database, a particularly tough nut to crack. Banks, by comparison, are pretty easy. You only need a proxy disabler, a password breaker, and a voice analysis recorder, all of which are relatively inexpensive. But banks ''hate'' getting hacked: your trace time will be ridiculously short unless you bounce your connection through dozens of links, and if you leave ''any'' record, you're going to get caught. It's not enough to transfer the money and delete your connection log: you also have to [[spoiler: delete the actual transfer log from the sending account AND your receiving account]]. And the passive trace is the fastest you're ever going to see: from time of transfer to completion of passive trace is less than ''five minutes'', where other passive traces can take ''hours or days''. It's very possible to complete the hack without all the tools, rush back to Uplink Services and buy all the software you need to cover your tracks, but it's ''very difficult''. If you manage to pull it off, though, you'll easily jump up 4-5 ranks in Uplink, and have enough money to buy the best of, well, everything, trivializing hacks until you decide to start working on LAN hacks. There is an extremely easy way to get away with it that requires some preparation, however: [[spoiler: hack the bank, transfer the funds, delete the transfer logs, and blow up your gateway. You don't have to worry about any passive trace, and this is much cheaper to do as it only requires Proxy Disable (because banks for some reason never have firewalls), Password Breaker and Log Deleter software. The preparation, however, requires a gateway with a security option, and installation of the gateway nuke.]]


Added DiffLines:

* LastChanceHitPoint: Of a sort. The Gateway Nuke and Motion Sensor will give you a ''very'' short time to blow up your Gateway if an unauthorized person approaches it. Obviously, this is detrimental to the hardware (and any software you didn't back up somewhere), but as the alternative results in your agent being completely disavowed and forcing you to start a new game, it's a last opportunity to keep going with your current agent if you ''really'' messed up somewhere.


Added DiffLines:

** The Gateway Nuke, at least on its own: it ''will'' destroy your Gateway computer without fail if you set it off, but you have no way of knowing if you ''need'' to without the Motion Sensor package, which notifies you if someone is approaching you Gateway (yellow = 1 person, red = 2 people, and more than 1 person is usually bad). Without the Motion Sensor to know when the feds are about to grab your highly incriminating computer, the Gateway Nuke is useless. This ''also'' makes the KRONOS Corp 80-860 and the OMEGA Parallel Supercomputer Gateways have functionally no security slots at all, as they can only have one security option (either the Nuke or the Motion Sensor, not both).
*** The UNITY High-Security Platform gateway is relatively decent, allowing for 4 [=CPUs=] (but only 64 [=Gq=] of data, generally not enough), but the main selling point is that it has 4 security slots. Unfortunately, there's only two security options, and multiple Motion Sensors are no more helpful than having just one (to say nothing of having multiple redundant Gateway Nukes). It's generally advised to ignore it and save up for the [=TRINITY-1686a=] Gateway, which is superior all around (though it still has a redundant security slot).
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* UnintentionallyUnwinnable: It's possible to render some of the data retrieval missions unwinnable by purposefully vandalizing and wiping everything on the servers you hack.
Is there an issue? Send a MessageReason:
removing links to non-work page


* CreatorCameo: Introversion Software is one of the companies that hires you from time to time, and they have a website in-game about possible ideas for a sequel. [[spoiler: Their IP has to be manually looked up first, as it is initially hidden from the list Website/InterNIC has]]

to:

* CreatorCameo: Introversion Software is one of the companies that hires you from time to time, and they have a website in-game about possible ideas for a sequel. [[spoiler: Their IP has to be manually looked up first, as it is initially hidden from the list Website/InterNIC has]][=InterNIC=] has]].

Top