This page is a wiki. Please login or create an account to begin editing.

Hacker II: The Doomsday Papers

Your rating: None Average: 4 (2 votes)
Year released:
[www].se [ftp].se [mirror].us [mirror].de
Hacker_II_-_DiskDup_Format.img (400.00 KB)
MD5: bec309459a17968c0356a56195626370
For System 1 - 5 - System 6.x
[www].se [ftp].se [mirror].us [mirror].de
Hacker_II_-_Disk_Copy_Format.img (409.46 KB)
MD5: f54550606cb212edd42f0d967c16ca7f
For System 1 - 5 - System 6.x
[www].se [ftp].se [mirror].us [mirror].de (5.92 MB)
MD5: 723b712d083f29006286fba4cff06365
For System 1 - 5 - System 6.x
[www].se [ftp].se [mirror].us [mirror].de (440.81 KB)
MD5: 087c42f668032deb6482873b4bc25cff
For System 1 - 5 - System 6.x
[www].se [ftp].se [mirror].us [mirror].de (157.13 KB)
MD5: c583e9758f8e6755b878d2739f4b6dca
For System 1 - 5 - System 6.x
Guides on emulating older games

The sequel to Hacker.
DL #1 & #2 are nonfunctional images of a copy-protected disks.
DL #5 is a disk image containing the unprotected application. It will start the game successfully. No further testing done.

This was taken from an immaculate, seemingly unplayed disk found on eBay. I locked the disk before inserting it and playing the game, which worked on my Mac Plus.

Four disk images are attached. First is in DiskDup format. The second is in Apple's Disk Image format. Both were captured using DiskDup Pro 1.3.2a set to tolerate two bad sectors. The imaging completed successfully with one bad sector detected. The disk images boot in Mini vMac, but the copy protection prevents you from playing the game. The bad sector is 642. I examined this sector using Copy ][ Mac 7.2's sector editor. The only interesting thing I could see was a single failed checksum.

The third disk image is a flux-based disk image (A2R) captured with an Applesauce FDC. Its contents can be viewed using the Applesauce client software.

The last disk image is the A2R flux image converted into WOZ format, suitable for writing back to another floppy disk using an Applesauce FDC. Future emulators will also be able to make use of this image.

The game description below was taken from the Wikipedia article.

Hacker II: The Doomsday Papers is a 1986 computer game developed and published by Activision. It is the sequel to the 1985 game, Hacker. It was released for several platforms of the home computer era. As with the first game, it was designed by Steve Cartwright.

Hacker II is notably more difficult and involved than the first game. In Hacker II, the player is actually recruited based upon his (assumed) success with the activities in the original game. Once again, they are tasked with controlling a robot, this time to infiltrate a secure facility in order to retrieve documents known only as "The Doomsday Papers" from a well guarded vault to ensure the security of the United States.

Eventually, as they escape with the papers, the player is confronted by agents of the United States who reveal that he or she have actually been working for a former Magma employee, who wanted the papers in revenge for what had happened to the company the player had presumably exposed in the first game. The building that the player had unwittingly broken into was a government facility. The player then has to go back into the facility as part of a gambit to expose the Magma agent, avoiding the same security that had threatened the player before.

Gameplay is considerably changed from the previous game and the packaging is notable for including a "manual" describing the function of a four way monitor system provided to the player. It is hooked into the camera security network of the facility the player is asked to infiltrate. A handful of robots are available, hidden in the facility, in case some are lost. By using the camera system and in-game map that helps track guard patrols and the location of the robots, the player must explore the one floor facility and find the codes needed to open the vault and escape with the papers.

Discovery by the guards must be avoided at all costs because once alerted, they will call in a huge machine that resembles a large plate hung from what looks like a metal frame on wheels. This machine pursues the player's defenseless robot and attempt to crush it with the plate. The player can try and avoid the drone, although it is relentless in its pursuit and is much faster than the player's robot. If all the player's robots are destroyed, the game is over.

The game also featured escalating problems as part of the player's interface begins to fail, the ingame map starts to lose progress of the player's robot, monitored security cameras, the guard and eventually the map itself as the player defeated the system, eventually to get into the vault the player may well be forced to control the robot blindly relying on maps that should have been made by the player.

There are no saves available in the game as in the first title.

Architecture: 68k


jkheiser's picture
by jkheiser - 2019, May 18 - 7:21am

The WOZ-format disk image I added to this archive can be written back to another floppy disk with an Applesauce FDC. I verified playability with a 4-megabyte Macintosh Plus.