Skip to content

NeXuS23 Brøderbund

Retro 8-16Bit Remakes Cyberpunk and Beyond Base

  • Home
  • About
  • Videogames
    • Fighting Games
  • Amiga
    • Hardware
    • Remix
    • Software
    • Videogames
  • Amstrad
  • Atari
  • C64
    • Hardware
    • Remix
    • Software
    • Videogames
  • MSX
  • ZX Spectrum
  • Computers
  • Remakes
  • Cyberpunk VideoGames
  • Cyberpunk Shorts
  • Galleries
  • Privacy Policy
  • Contact
  • Donate
  • Harkonnens
  • ipfilterX

C64 MAH

Posted on September 6, 2015 - September 8, 2023 by Rumblefish

Last updated on September 8th, 2023 at 10:23 am

A few years ago, mankind survived the attack of the Evil Masters. Now , an even bigger threat endangers the existence of the whole world… mankind itself.

After the liberation, total chaos ruled, and humans returned to one of their old habits : making war.

A group of fanatics whose hate-rooted objective was to exterminate the human race, made a plan to gain control over the Apocalypser, the pinnacle of the defenses developed against the Evil masters , and to use it.

Its inventors , well aware that such a weapon had the unthinkable potential of destroying the Earth, stored it in a secret abandoned nuclear waste repository. Sadly one fatal day the site was discovered.

Codename Plan : MALEFICA ANNIHILATION HUMANITATIS .

So the fanatics switched to ON the Apocalypser then settings to increase maximum power and hid its deactivation mechanism behind many software bitwalls, constantly protected by sentient and tireless virtual guards.

Countdown started. Maybe somebody can still hack their way into the system, crack the bitwalls , and give humankind another chance .

Your objective : Try to stop the countdown within 90 minutes , while obstructed by the ApocalypShield , a software made of 24 security bitwalls and virtual guards.

Your only tool is named PeekPoker and to disable a bitwall, You must clear a number of bitbricks , Phase A , then enter a password , Phase B.

Any bitwall got a different port, unlocking it you get to Phase C .

Furthermore, any three bitwall you have to pass through a protected channel and collect enough keys, Phase D.

Remember that if you get caught many times on Phase C and D you will be “ejected” from the System but you can re hack your access stealing a key and then opening a cell , Phase J.

Finally, you have to defeat the last defenses and switch the countdown interrupts , Phase E.

[DOWNLOAD]

Read more at its website for Map and Schema.

Credits :

Code  …. saimo of Retream
Music  …. saimo of Retream
Graphics  …. saimo of Retream
Design  …. saimo of Retream
Docs  …. saimo of Retream

C64 Download

Visited 1 times, 1 visit(s) today

Related Posts:

  • megalom
    Megalomania Remake
  • terror_of_the_deep_01
    Terror Of The Deep : Hunt For Lochness
  • cia-amigax
    Amiga Unreleased Games
  • winckler
    Exclusive Hollywood Interview : Meet Mr. William Winckler
  • dashillus
    Illuminati BBS
  • 86769
    Tape Master Pro
  • 5pyxb8sqynmvnx86lxeac5p1orhq1fl6
    YF-23 Raid Over Moscow Remakes
  • NSA_eagle
    Anonymous FTP In MIL
Posted in C64 VideoGames

Post navigation

C64 Design Tools
C64 Donkey Kong Series and Remakes

Top Posts

  • The Ultimate C64 Disk Drive Tool : DracopyThe Ultimate C64 Disk Drive Tool : Dracopy
  • axcopyCommodore Amiga X-Copy
  • castlevamigaAmiga’s Castlevania AGA
  • megalomMegalomania Remake
  • c64crashpokepeekC64 Poke and Peek Commands
  • numberstatPersephone Number Stations

Categories

____ipfilterX ____Website

Donate

Copyrighted.com Registered & Protected

AD:

Proudly powered by WordPress | Theme: micro, developed by DevriX.