Hacker II

Aus Spieltraum
Zur Navigation springenZur Suche springen
Hacker II
Verlag: Steve Jackson Games
Autor: Steve Jackson
Typ: card game
Mitspieler: 3 bis 8
Altersempfehlung: ?
Dauer: von 90 Minuten bis 2,5 Stunden


Brush up on your hackerly skills and visit us - on the dark side!

This is an expansion Set for Hacker. If you don't have the original Hacker game, go out and buy it.

ALL the rules here are optional Black ICE and Outdials are designed to work together; other than that, you can add whichever ones you like, in any combination.

Components

  • 2 rulebooks
  • 55 cards:
    • 5 blanks (removed)
    • 35 special cards (25 of which are new)
    • 15 new system cards
  • Chips
    • 25 (hex). The Worm: These are the ones with the wiggly purple "W."
    • 10 (hex) Security +1
    • 10 (hex) Security +2
    • 5 (hex) Security +3
    • 12 (hex) Black ICE (skull on back): 4 are +1, 2 are +2.
    • 22 (hex) Regular ICE
    • 20 each account chips for Purple and Aqua: 40 (hex)
    • 10 (square) 5 each Secret Indial chips for Purple and Aqua
    • 4 (square) 2 each Back Door chips for Purple and Aqua
    • 4 extra Known Indial chips: 4 (square)
    • 3 (square) Never Housecleans!
    • 12 (square); 2 extra Secret Indial chips for each of the original 6 colors
  • Console Sheet
    • 2 new consoles, Purple and Aqua, allowing 8-player games.
    • 2 Expansion Chassis pieces, which allow players to add an extra slot to their system, for a total of four slots.
    • 5 extra Crash Markers
    • 16 "Virtual Bridge" counters
    • 12 upgrades:
      • 3 new Military Upgrades
      • 1 blank upgrade for creating your own (missed)
      • 2 Ram Card
      • 2 Yodel
      • 1 Screamer
      • 2 Hackintosh
      • 1 Amoeba 3000
    • 16 Virus Flags
      • 8 Mona Lisa virus
      • 8 Beelzebub virus

News

In fact, everybody wanted more. "How could you leave out viruses?" they asked. "Give me blank cards!" they said. "Put in some really evil hacks!" they demanded. Okay. Here we go. This expansion set adds ...

  • Viruses - to infect your rivals' systems!
  • The Internet Worm - to jam up the entire net!
  • Military upgrades - hot new hardware you're not supposed to have.
  • Virtual bridges - to add new connections!
  • Black ICE - it can follow a hacker home!
  • Outdials and multiple accounts - to make you harder to catch!

Weblink