Uplink is a game that could best be described as a Hollywood Hackingsimulation. The whole premise is that you, an unnamed agent of the Uplink Corporation (an underground hacker-for-hire service), have just joined up in the ranks. Using your PC, you move up the ranks of Uplink agents by hacking different companies' computers and servers.It's arguably one of the most realistic games out there, because you never see your character - in fact, the character is made out to simply be you, operating under an alias. You never see your character because he's/she's sitting in the same chair you are, typing in commands on your keyboard with your hands.Compare with Net Runner. A fan sequel, called Codelink, is on the works.
This game provides examples of:
AFGNCAAP: You have no photo in your school records, Social Security, or bank account. During the secret mission to steal the agent roster from the Uplink Internal Services machine, there's always one of the ten files missing - the one containing your own record.
All Crimes Are Equal: An unintentional example, but someone will go to jail just as readily for rape, murder, and arson as for jaywalking, spitting, and littering. Just so long as they've violated parole.
Arson, Murder, and Jaywalking: Also unintentional, but as a result of All Crimes Are Equal above, you can indeed send someone to prison for, say, genocide, conspiracy to overthrow the government, and parking on a double yellow line. They also have to be violating parole, as you cannot authorize arrest without that particular crime. So you can turn someone into a genocidal, mass murdering jaywalker...who was successfully paroled and subsequently violated their parole.
Computer Virus: Version 1.0 doesn't spread across systems, but the speed run takes out the global network by running it on enough computers.
Copy Protection: Actually meant as a bit of nostalgia, as they posted the shiny grid that comes with the game as a free PDF on their website.
Cosmetic Award: There are 12 "Special Awards" to achieve, mostly tied to the completion of the storyline missions. However, since one can only take one branch of the storyline, it's impossible to earn all of them in a single playthrough.
The Cracker: The player. You can destroy a company's servers completely - at least datawise - and doing so will net you a nice little news article about how a mysterious hacker has cost the company millions. They don't seem to ever actually go bankrupt, although their stock will tank. You can hack into a bank and funnel money into your account - possibly even bouncing it around several times and keeping it in accounts on other bank websites, rather than storing it all on the Uplink Corporation Bank.
The Trace Tracker. The lack of any other significant sound in the game except a quiet music soundtrack can make the slow but subtle beep rate increase into Nightmare Fuel, particularly if you've only got about five seconds left.
The motion detector will flash red regardless of who is near the computer, as long as there is more than one person (one person only makes it flash yellow; any computer upgrades you order are carried out by one person per upgrade). This could either be the FBI coming with your game over, or those 5 new processors you just ordered.
Disc One Nuke: If you know how, it's fairly easy to rob a bank and funnel a couple million dollars into your bank account, thereby allowing you to buy all the best hardware and software early on.
There are supposedly encrypted easter eggs hidden in the game's code. No, the game doesn't find and decrypt them for you when you do something, it's up to you to find and decrypt the right pieces of code.
At the beginning of the game, you're asked for a two-character code as part of the game's copy protection. The code sheet is written in hexadecimal coding, and it does say something.
Exact Progress Bar: Almost every program the player can utilize logs progress in this way. The v3 and below Trace Tracker will sometimes jump around a little, but still stays fairly consistent. V4 shows your Exact Time to Failure. The MapTrace HUD upgrade, despite costing more than the best Trace Tracker, does not show how much time you have until the trace is complete, only many bounces your hack has been traced through.
Final Death: Get caught during a hack or passive traced, and your account will be suspended. To all intents and purposes, that game file is dead (justified in that Uplink disavows all knowledge of your actions, prevents you from ever reconnecting your gateway computer, and generally pulls the plug on your actions, while also implying that your gateway contains the only information that can lead directly back to you). You can go a bit meta and back up your saves, however.
Hoist by His Own Petard: If you're working for Arunmor, this can happen in the final mission - you can destroy ARC's central mainframe with their own virus. The exact sequence of events: Be sure to hang on to the Revelation 1.0 virus file - you have two opportunities to get your hands on it. When the final mission starts, immediately infiltrate the ARC mainframe. Copy Revelation to their fileserver, use the console to delete the contents of /sys, then run Revelation. Don't forget to clear the transfer logs after that, and then you can start fighting the virus everywhere else. Since the version you've unleashed is 1.0, it won't spread.
Hollywood Hacking: The entire game can basically be described as a simulation based off Hollywood's portrayal of hacking.
Hyperspace Arsenal: Not per se, but by the end of the game you'll probably have a rather respectable collection of hacking tools at your disposal - from a simple password cracker, to software designed to help you map out and then abuse the hell out of a LAN.
Karma Meter: Of a sort. The game keeps track of whether you're a hacker or a cracker. If you willfully destroy systems, ruin lives, and destroy data, then you'll earn a reputation for doing so. If you alter records, trace other hackers, and prefer to leave systems intact, you'll earn a reputation for being "mostly harmless". Mission givers will react to your reputation. And if you sell the list of Uplink agents, your reputation will be locked into a completely amoral sociopath.
Non Standard Game Over: The normal game over is the feds getting their hands on your gateway. There is basically only one non-standard game over and two ways to acquire it. You can run any version of Revelation on your own system which, unsurprisingly, completely breaks it. When you follow the ARC missions, getting Revelation on your system is impossible to avoid and the end of the game.
Partially averted - admins will normally use random strings of letters and numbers, but give their co-workers passwords from a list of common words shared by every company. Presumably, God won a survey of easily remembered words, closely followed by admin and then password
Although the password changes with each game, the Inter NIC passcode will always remain the same on that savegame.
Initially, even admins use highly insecure passwords, but as the game goes on and your notoriety rises, the cheap and cheerful Dictionary Cracker is about as much use as... well, a cream cracker. With the spate of hackings, massive amounts of data theft, data loss, server wipes, etc. etc., it's actually a nice touch that they do appear to wise up.
Piecemeal Funds Transfer: Averted; delete the logs stating a millionaire transfer and the disappearance of thousands of credits from dozens of angry customers will be forever shrouded in mystery.
Playful Hacker: You, if you so choose, anyway. Gain access to someone's academic record and give them a qualification as a Registered Sex Worker! Change someone's government records from reading 'Single' to 'Married' (or vice versa)! Plant a Bestiality charge on some poor random bastard's criminal record for the lulz! Give them a qualification in Mathsology, Archeomatics or Truthiness! Given that this is a British game, the most appropriate crime to pin on people is probably buggery.
Post Modern: A borderline example, as rather than having a distinct character that the player acts as, the player is the character.
Real Time: Time moves in real time, even though people reply to messages instantly. You can speed up time though.
Save Scumming: Most clever players will back up their files, like any smart hacker should do. It's the only way to use a certain cheat code after the patch. TooManySecrets no longer works as a cheat
Scare Chord: While not a literal chord, any first time LAN hacker will jump at the shrill sound when the System Administrator logs on.
Schmuck Bait: ARC's email spells it out very, very clearly: "DO NOT ATTEMPT TO RUN REVELATION LOCALLY." And yet there are still reports of people who have destroyed their own gateways in that very manner...
Sequence Breaking: Instead of following ARC's instructions, you can destroy the whole Internet by yourself as soon as they send you the first version of Revelation. In fact is easier than sticking to the storyline since nobody else knows about the existence of the virus, therefore Faith hasn't even been conceived. The only difficulty added to this shortcut is that one must infect about twice the amount of computers that Revelation 3.0 would need, as well as amassing loads of money early to build a decent rig for the task (usually via bank hacking).This speedrun demonstrates it.
Self-Destructing Security: One security measure you can purchase for your gateway is a Self-Destruct Mechanism, intended as a last resort if the Feds are closing in on you. You lose all the hardware, but at least you avoid getting Game Over'd; if you have extra bank accounts set up you can use them to rebuild.
Sensor Suspense: The Trace Tracker is an absolute necessity, since it shows you how close you are to being backhacked and identified. Much of the strategy in the game consists of finding ways to increase the amount of time you can spend on a system before they start getting too close.
Protovision's machine is a homage to WarGames (it's the only machine you can't crack with the Password Breaker - you need to recognise the shout out to get the password (JOSHUA, of course), and Introversion (the developers) have an in-game website which mentions Johnny Mnemonic and Mission: Impossible. And then there's the Steve Jackson Games server, which has of course been pinched by the US Secret Service.
Also, the use of "Quads" as a measurement of data storage could be a Shout-Out to Star Trek, as quads are what the Federation computers use.
Subversion, which was explicitly declared a successor to Uplink, and was supposed to be more physical, with a more Cyberpunk look and feel. Sadly, in late 2011 the game officially descended into Development Hell, and was finally and definitely cancelled soon after.
The Protovision machine's depiction of The Big Board is like a foreshadowing of the their following game DEFCON.
Take That: "Once again, the Global Criminal Database has been hacked. The system appears to have more security holes than the popular 'Micro Software' written in the late 20th Century". OUCH.
Tech Marches On: Inverted - the developers apparently assumed that technology would progress much, much, much faster than it did in real life. In the Uplink universe a 60 GHz processor is considered slow.
This can happen if you try playing both the ARC and Arunmor missions at the same time. If you forward for ARC, Revelation will never reproduce if Faith is even one version level higher. If aiding Arunmor, you may be overwhelmed with virus infections, but you can slow them down by crashing ARC's Central Mainframe.
You cannot start the storyline if you wait too long, as it will play out on its ownnote You have to be almost consciously ignoring the storyline to do this, though, as the email that starts the storyline shows up unsolicited, and only by not acting on it, will you miss out on the storyline entirely. Doing even the bare minimum investigation will result in an email from ARC for the first mission.
Well-Intentioned Extremist: ARC seem like straight-up villains at first, but it's eventually revealed that they're a group of radical hacktivists who are appalled at the overly commercialized, corrupt state of the Internet and the danger to privacy and insecurity posed by the global governmental databases and wish to destroy it so they can start again from scratch.
Wide Open Sandbox: There's nothing to stop you from ignoring the storyline entirely and focus on freelance hacking.