<s>
Hacker	B-Application
is	O
a	O
1985	B-Application
video	O
game	O
by	O
Activision	O
.	O
</s>
<s>
It	O
was	O
designed	O
by	O
Steve	O
Cartwright	O
and	O
released	O
for	O
the	O
Amiga	B-Device
,	O
Amstrad	B-Device
CPC	I-Device
,	O
Apple	B-Device
II	I-Device
,	O
Atari	B-Device
8-bit	I-Device
family	I-Device
,	O
Atari	B-Device
ST	I-Device
,	O
Commodore	O
64	O
,	O
Macintosh	B-Device
,	O
DOS	B-Device
,	O
MSX2	B-Operating_System
,	O
and	O
ZX	B-Operating_System
Spectrum	I-Operating_System
.	O
</s>
<s>
Activision	O
executive	O
Jim	O
Levy	O
introduced	O
Hacker	B-Application
to	O
reporters	O
by	O
pretending	O
that	O
something	O
had	O
gone	O
wrong	O
during	O
his	O
attempt	O
to	O
connect	O
on	O
line	O
to	O
company	O
headquarters	O
to	O
demonstrate	O
a	O
new	O
game	O
.	O
</s>
<s>
The	O
player	O
assumes	O
the	O
role	O
of	O
a	O
hacker	B-Application
,	O
a	O
person	O
experienced	O
in	O
breaking	O
into	O
secure	O
computer	O
systems	O
,	O
who	O
accidentally	O
acquires	O
access	O
to	O
a	O
non-public	O
system	O
.	O
</s>
<s>
The	O
player	O
must	O
attempt	O
to	O
hack	O
into	O
the	O
Magma	B-General_Concept
Ltd	O
.	O
computer	O
system	O
at	O
the	O
beginning	O
of	O
the	O
game	O
by	O
guessing	O
the	O
logon	B-General_Concept
password	O
.	O
</s>
<s>
Once	O
the	O
player	O
is	O
in	O
,	O
the	O
player	O
is	O
asked	O
to	O
identify	O
various	O
parts	O
of	O
a	O
robot	B-Algorithm
unit	O
by	O
pointing	O
the	O
cursor	O
at	O
the	O
relevant	O
parts	O
and	O
pressing	O
the	O
joystick	O
button	O
.	O
</s>
<s>
The	O
player	O
gains	O
control	O
of	O
the	O
robot	B-Algorithm
which	O
can	O
travel	O
around	O
the	O
globe	O
via	O
secret	O
tunnels	O
,	O
deep	O
within	O
the	O
earth	O
.	O
</s>
<s>
The	O
game	O
's	O
text	O
states	O
that	O
the	O
robot	B-Algorithm
is	O
powered	O
in	O
some	O
manner	O
by	O
magma	B-General_Concept
.	O
</s>
<s>
It	O
is	O
evident	O
that	O
the	O
player	O
has	O
logged	O
into	O
the	O
Magma	B-General_Concept
company	O
's	O
network	O
and	O
is	O
acting	O
as	O
a	O
remote	O
user	O
in	O
its	O
global	O
subterranean	O
transport	O
network	O
,	O
with	O
various	O
strange	O
messages	O
being	O
broadcast	O
hinting	O
at	O
dangerous	O
experiments	O
that	O
the	O
company	O
is	O
doing	O
.	O
</s>
<s>
Before	O
getting	O
far	O
,	O
the	O
player	O
is	O
informed	O
that	O
shredded	O
portions	O
of	O
a	O
secret	O
document	O
containing	O
Magma	B-General_Concept
Ltd.	O
'	O
s	O
plans	O
for	O
world	O
domination	O
have	O
been	O
stolen	O
.	O
</s>
<s>
The	O
robot	B-Algorithm
's	O
tunnel	O
system	O
is	O
extensive	O
but	O
unmarked	O
,	O
so	O
getting	O
around	O
is	O
initially	O
an	O
exercise	O
in	O
trial	O
and	O
error	O
.	O
</s>
<s>
Throughout	O
the	O
globe	O
,	O
there	O
are	O
several	O
cities	O
where	O
the	O
robot	B-Algorithm
can	O
surface	O
and	O
interact	O
with	O
people	O
,	O
primarily	O
the	O
spies	O
who	O
want	O
to	O
bargain	O
for	O
their	O
piece	O
of	O
the	O
evidence	O
.	O
</s>
<s>
However	O
,	O
Magma	B-General_Concept
Ltd	O
.	O
discovers	O
the	O
player	O
's	O
break-in	O
shortly	O
after	O
penetration	O
.	O
</s>
<s>
It	O
launches	O
a	O
security	O
satellite	B-Application
which	O
,	O
when	O
it	O
intersects	O
with	O
the	O
player	O
's	O
position	O
,	O
demands	O
information	O
which	O
supposedly	O
only	O
a	O
legitimate	O
user	O
would	O
know	O
.	O
</s>
<s>
To	O
put	O
more	O
pressure	O
on	O
the	O
player	O
,	O
the	O
Satellites	B-Application
will	O
only	O
allow	O
the	O
player	O
to	O
pass	O
checks	O
four	O
times	O
before	O
another	O
catch	O
will	O
cause	O
the	O
player	O
to	O
get	O
disconnected	O
due	O
to	O
suspicious	O
activity	O
.	O
</s>
<s>
In	O
addition	O
,	O
the	O
player	O
is	O
under	O
a	O
time	O
limit	O
(	O
tracked	O
by	O
movements	O
the	O
SRU	O
makes	O
)	O
;	O
should	O
the	O
player	O
take	O
too	O
long	O
the	O
system	O
will	O
automatically	O
disconnect	O
them	O
anyway	O
,	O
regardless	O
of	O
the	O
Satellites	B-Application
.	O
</s>
<s>
By	O
late	O
1987	O
more	O
than	O
50,000	O
copies	O
of	O
Hacker	B-Application
were	O
sold	O
,	O
and	O
it	O
was	O
Activision	O
's	O
third	O
best-selling	O
Commodore	O
game	O
.	O
</s>
<s>
Info	O
rated	O
Hacker	B-Application
four	O
stars	O
out	O
of	O
five	O
,	O
describing	O
it	O
as	O
"	O
an	O
interesting	O
concept	O
"	O
with	O
"	O
fair	O
to	O
good	O
graphics	O
and	O
sound	O
"	O
.	O
</s>
<s>
Those	O
who	O
enjoy	O
a	O
protracted	O
battle	O
of	O
wits	O
will	O
find	O
Hacker	B-Application
a	O
lively	O
test	O
of	O
their	O
abilities	O
"	O
.	O
</s>
<s>
This	O
game	O
was	O
followed	O
in	O
1986	B-Application
by	O
Hacker	B-Device
II	I-Device
:	I-Device
The	I-Device
Doomsday	I-Device
Papers	I-Device
.	O
</s>
<s>
Once	O
again	O
,	O
they	O
are	O
tasked	O
with	O
controlling	O
a	O
robot	B-Algorithm
,	O
this	O
time	O
to	O
infiltrate	O
a	O
secure	O
facility	O
in	O
order	O
to	O
retrieve	O
documents	O
known	O
only	O
as	O
"	O
The	O
Doomsday	O
Papers	O
"	O
from	O
a	O
well-guarded	O
vault	O
to	O
ensure	O
the	O
security	O
of	O
the	O
United	O
States	O
.	O
</s>
