...it's like TV Tropes, but LINKED DATA!
Ghost Hacker (Video Game)
- 406 statements
- 77 feature instances
- 6 referencing feature instances
Ghost Hacker (Video Game) | type |
TVTItem | |
Ghost Hacker (Video Game) | label |
Ghost Hacker (Video Game) | |
Ghost Hacker (Video Game) | page |
GhostHacker | |
Ghost Hacker (Video Game) | comment |
Ghost Hacker is a Tower Defense Web Game where you play as a Digitized Hacker trying to take back cyberspace from rogue AIs. What makes it unique from other Tower Defense games is the "shape" that each tower occupies. Each tower has up to four "nodes" sticking from it, and the tower can only be placed on an area where both it and the nodes fit. These nodes are used for equipping upgrades on, which enhance the tower's capabilities.The first game focuses on the player character, Alpha, as they get accustomed to their new life as a Ghost — a digitized human who can act at the speeds of a computer. While hunting down rogue AIs at the behest of Cypher One, they come into contact and clash with the Ghost Collective and a rogue AI that calls himself "Axon".A sequel, Ghost Hacker 2, was released in 2013. This focuses on Jeth, a newly-converted Ghost looking to fix his friend Sil with the assistance of fellow hacker Spook. While clashing with Sigil, the corporation that has her captive, they uncover a virus that infects and controls Ghosts and must work to contain it. | |
Ghost Hacker (Video Game) | fetched |
2024-04-25T00:47:57Z | |
Ghost Hacker (Video Game) | parsed |
2024-04-25T00:47:57Z | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to AngryBirds: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to Batman: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to CriticalHit: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to FightClub: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to Minecraft: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to PacMan: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to Portal2: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to Portal: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to SouthPark: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to SuperMarioBros: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to TheLegendOfZeldaOcarinaOfTime: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to TheLordOfTheRings: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | processingComment |
Dropped link to WallE: Not a Feature - ITEM | |
Ghost Hacker (Video Game) | isPartOf |
DBTropes | |
Ghost Hacker (Video Game) / int_11ad560b | type |
Control Freak | |
Ghost Hacker (Video Game) / int_11ad560b | comment |
Control Freak: Sigil developed the virus that drives Ghosts insane, allowing them to terminate the whole Ghost community should they lose control of too many Ghosts. Given that they are Cypher One under a different name, this behaviour is no surprise. | |
Ghost Hacker (Video Game) / int_11ad560b | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_11ad560b | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_11ad560b | |
Ghost Hacker (Video Game) / int_143fd94a | type |
Starting Units | |
Ghost Hacker (Video Game) / int_143fd94a | comment |
Starting Units: In level 19, you start with a Tracer and Slicer, both towers that haven't been unlocked for construction yet. In level 21, you start with the special Transcoder tower, which is never buildable anywhere in the game. All of these pre-built towers differ from normal towers in that they can't be moved or sold. | |
Ghost Hacker (Video Game) / int_143fd94a | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_143fd94a | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_143fd94a | |
Ghost Hacker (Video Game) / int_1d364dbd | type |
Heavily Armored Mook | |
Ghost Hacker (Video Game) / int_1d364dbd | comment |
Heavily Armored Mook: Two types: Reavers (which take 3 less damage from all attacks) and Avatars (which can only take at most 2 damage from all attacks). Attacks that are effective against one are nearly useless against the other. | |
Ghost Hacker (Video Game) / int_1d364dbd | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_1d364dbd | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_1d364dbd | |
Ghost Hacker (Video Game) / int_1e122f24 | type |
Boss Banter | |
Ghost Hacker (Video Game) / int_1e122f24 | comment |
Boss Banter: Boss levels will have the rival Ghost taunt you at the start of each wave. | |
Ghost Hacker (Video Game) / int_1e122f24 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_1e122f24 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_1e122f24 | |
Ghost Hacker (Video Game) / int_1f7b2d59 | type |
Law of Chromatic Superiority | |
Ghost Hacker (Video Game) / int_1f7b2d59 | comment |
Law of Chromatic Superiority: All the Version 2.0 mooks have a red color palette and a red glow. | |
Ghost Hacker (Video Game) / int_1f7b2d59 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_1f7b2d59 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_1f7b2d59 | |
Ghost Hacker (Video Game) / int_1fdc1aa | type |
See the Invisible | |
Ghost Hacker (Video Game) / int_1fdc1aa | comment |
See the Invisible: The normally invisible Ghosts can only be attacked when in range of a Scanner. | |
Ghost Hacker (Video Game) / int_1fdc1aa | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_1fdc1aa | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_1fdc1aa | |
Ghost Hacker (Video Game) / int_21f3e32e | type |
Chekhov's Boomerang | |
Ghost Hacker (Video Game) / int_21f3e32e | comment |
Chekhov's Boomerang: The game starts with Jeth looking to fix Sil from what turns out to be a virus. As the virus breaks out and becomes the main problem, Sil fades into the background... but then becomes a vital lead to tracking down the Final Boss. | |
Ghost Hacker (Video Game) / int_21f3e32e | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_21f3e32e | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_21f3e32e | |
Ghost Hacker (Video Game) / int_24fa70e3 | type |
Bandit Mook | |
Ghost Hacker (Video Game) / int_24fa70e3 | comment |
Bandit Mook: Data Leeches can temporarily steal your resources to heal themselves. Destroy them to get your resources back (but not immediately — you'll need a Recycle program if you don't want it to slowly regenerate back). | |
Ghost Hacker (Video Game) / int_24fa70e3 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_24fa70e3 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_24fa70e3 | |
Ghost Hacker (Video Game) / int_2be271c7 | type |
Hollywood Hacking | |
Ghost Hacker (Video Game) / int_2be271c7 | comment |
Hollywood Hacking: The game is based on an Extreme Graphical Representation of the player defending themselves from foreign programs. Some levels reverse the roles with the player needing to break through the AI's own security. At one point in the second game the player hacks themselves to apply a cure for a virus. | |
Ghost Hacker (Video Game) / int_2be271c7 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_2be271c7 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_2be271c7 | |
Ghost Hacker (Video Game) / int_2da1421 | type |
Booby Trap | |
Ghost Hacker (Video Game) / int_2da1421 | comment |
Booby Trap: The Mine script places a mine on the path that deals damage to and stuns an enemy that steps on it. | |
Ghost Hacker (Video Game) / int_2da1421 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_2da1421 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_2da1421 | |
Ghost Hacker (Video Game) / int_3121e8df | type |
Split-Personality Merge | |
Ghost Hacker (Video Game) / int_3121e8df | comment |
Split-Personality Merge: Axon's erratic behaviour when the player first meets him is explained by him having merged with one of his defective copies. The boss level involved deleting the aggressive Axon so that the real Axon can speak clearly with the player. | |
Ghost Hacker (Video Game) / int_3121e8df | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_3121e8df | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_3121e8df | |
Ghost Hacker (Video Game) / int_33351187 | type |
Asteroids Monster | |
Ghost Hacker (Video Game) / int_33351187 | comment |
Asteroids Monster: Splitters will split into smaller splitters when killed. | |
Ghost Hacker (Video Game) / int_33351187 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_33351187 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_33351187 | |
Ghost Hacker (Video Game) / int_33fa230b | type |
Your Princess Is in Another Castle! | |
Ghost Hacker (Video Game) / int_33fa230b | comment |
FireCastle.com quotes Your Princess Is in Another Castle! verbatim. | |
Ghost Hacker (Video Game) / int_33fa230b | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_33fa230b | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_33fa230b | |
Ghost Hacker (Video Game) / int_363e9631 | type |
Sequential Boss | |
Ghost Hacker (Video Game) / int_363e9631 | comment |
Sequential Boss: Technically, each boss consists of five individual enemies (numbered 1.0 to 5.0), each of which spawns at the even-numbered waves in their levels. | |
Ghost Hacker (Video Game) / int_363e9631 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_363e9631 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_363e9631 | |
Ghost Hacker (Video Game) / int_3700d6d8 | type |
Pinball Projectile | |
Ghost Hacker (Video Game) / int_3700d6d8 | comment |
Pinball Projectile: The Linker upgrade makes attacks ricochet to another enemy. | |
Ghost Hacker (Video Game) / int_3700d6d8 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_3700d6d8 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_3700d6d8 | |
Ghost Hacker (Video Game) / int_3bb81225 | type |
Recurring Boss | |
Ghost Hacker (Video Game) / int_3bb81225 | comment |
Recurring Boss: Axon, the Final Boss of the first game, reappears as the first boss in the second game. | |
Ghost Hacker (Video Game) / int_3bb81225 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_3bb81225 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_3bb81225 | |
Ghost Hacker (Video Game) / int_3c0a4666 | type |
Noodle Incident | |
Ghost Hacker (Video Game) / int_3c0a4666 | comment |
Noodle Incident: Something happened between the two games that brought about the downfall of Cypher One. Nobody elaborates on what it is. | |
Ghost Hacker (Video Game) / int_3c0a4666 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_3c0a4666 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_3c0a4666 | |
Ghost Hacker (Video Game) / int_3d585167 | type |
Damage-Increasing Debuff | |
Ghost Hacker (Video Game) / int_3d585167 | comment |
Damage-Increasing Debuff: Scanners, towers with the Amplifier upgrade and the Focus script cause targets to take extra damage from attacks. | |
Ghost Hacker (Video Game) / int_3d585167 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_3d585167 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_3d585167 | |
Ghost Hacker (Video Game) / int_40a533db | type |
Guest-Star Party Member | |
Ghost Hacker (Video Game) / int_40a533db | comment |
Guest-Star Party Member: The Transcoder, a tower that combines the special abilities of the Tracer and Slicer and possesses 8 upgrade slots, is unbuildable and only appears at the start of level 21. | |
Ghost Hacker (Video Game) / int_40a533db | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_40a533db | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_40a533db | |
Ghost Hacker (Video Game) / int_40e2ac3f | type |
Flunky Boss | |
Ghost Hacker (Video Game) / int_40e2ac3f | comment |
Flunky Boss: All the boss enemies in both games have the ability to spawn regular Mooks to divert your attention. | |
Ghost Hacker (Video Game) / int_40e2ac3f | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_40e2ac3f | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_40e2ac3f | |
Ghost Hacker (Video Game) / int_50345f8e | type |
Multishot | |
Ghost Hacker (Video Game) / int_50345f8e | comment |
Multi Shot: Towers with the Fork upgrade attack two enemies at once. | |
Ghost Hacker (Video Game) / int_50345f8e | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_50345f8e | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_50345f8e | |
Ghost Hacker (Video Game) / int_52094ed | type |
Team Killer | |
Ghost Hacker (Video Game) / int_52094ed | comment |
Team Killer: Reaper viruses will drain HP from other viruses in order to refill their own, and can even kill other viruses this way. | |
Ghost Hacker (Video Game) / int_52094ed | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_52094ed | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_52094ed | |
Ghost Hacker (Video Game) / int_52281b4e | type |
Segmented Serpent | |
Ghost Hacker (Video Game) / int_52281b4e | comment |
Segmented Serpent: Centipede enemies have an energy chain attached to them or other Mooks. This allows them to share a pool of Hit Points. | |
Ghost Hacker (Video Game) / int_52281b4e | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_52281b4e | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_52281b4e | |
Ghost Hacker (Video Game) / int_539179db | type |
Synchronization | |
Ghost Hacker (Video Game) / int_539179db | comment |
Synchronization: Centipedes form a chain with each other and other enemies, causing the damage taken by one to be distributed among the others. | |
Ghost Hacker (Video Game) / int_539179db | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_539179db | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_539179db | |
Ghost Hacker (Video Game) / int_53e6f4a | type |
Diminishing Returns for Balance | |
Ghost Hacker (Video Game) / int_53e6f4a | comment |
Diminishing Returns for Balance: Placing additional copies of towers or upgrade parts now costs extra memory — 5 for duplicate upgrades, 10 for duplicate towers. | |
Ghost Hacker (Video Game) / int_53e6f4a | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_53e6f4a | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_53e6f4a | |
Ghost Hacker (Video Game) / int_589e54d3 | type |
Charged Attack | |
Ghost Hacker (Video Game) / int_589e54d3 | comment |
Charged Attack: When idle, the Compressor can store up to a stock of 5 shots (upgradable to 10). The Charge upgrade allows a tower to store up to five shots per upgrade. | |
Ghost Hacker (Video Game) / int_589e54d3 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_589e54d3 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_589e54d3 | |
Ghost Hacker (Video Game) / int_58bec5a6 | type |
Digitized Hacker | |
Ghost Hacker (Video Game) / int_58bec5a6 | comment |
Digitized Hacker: Ghost Hackers are actually people who upload their mind onto the internet. | |
Ghost Hacker (Video Game) / int_58bec5a6 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_58bec5a6 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_58bec5a6 | |
Ghost Hacker (Video Game) / int_58efc711 | type |
The Goomba | |
Ghost Hacker (Video Game) / int_58efc711 | comment |
The Goomba: Bytes, which are slow, weak, and have no special abilities. | |
Ghost Hacker (Video Game) / int_58efc711 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_58efc711 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_58efc711 | |
Ghost Hacker (Video Game) / int_5b1a2f4e | type |
Ain't Too Proud to Beg | |
Ghost Hacker (Video Game) / int_5b1a2f4e | comment |
Ain't Too Proud to Beg: After his defeat, Jynx tries to distract the player by pointing out that Sigil intended to use the virus as a killswitch for the whole Ghost community, and offers to cooperate to stop this. Jeth has none of it and deletes him. | |
Ghost Hacker (Video Game) / int_5b1a2f4e | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_5b1a2f4e | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_5b1a2f4e | |
Ghost Hacker (Video Game) / int_617f0563 | type |
Heel–Face Turn | |
Ghost Hacker (Video Game) / int_617f0563 | comment |
Heel–Face Turn: Axon, the Final Boss of the first game, becomes an ally after you beat him. | |
Ghost Hacker (Video Game) / int_617f0563 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_617f0563 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_617f0563 | |
Ghost Hacker (Video Game) / int_64cf3b3f | type |
Damage Reduction | |
Ghost Hacker (Video Game) / int_64cf3b3f | comment |
Damage Reduction: Reavers reduce all damage they take by 3. | |
Ghost Hacker (Video Game) / int_64cf3b3f | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_64cf3b3f | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_64cf3b3f | |
Ghost Hacker (Video Game) / int_66f763c0 | type |
Interface Screw | |
Ghost Hacker (Video Game) / int_66f763c0 | comment |
Interface Screw: The ticker at the bottom of the level select screen starts with displaying bulletins or notifications. When the player gets infected with the virus, it turns into virus warnings. After Jynx broadcasts his mind-control virus cure, the ticker fills with Jynx propaganda. The level select screen will regularly distort while the player is infected with the virus. | |
Ghost Hacker (Video Game) / int_66f763c0 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_66f763c0 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_66f763c0 | |
Ghost Hacker (Video Game) / int_6ec1f343 | type |
Mook Medic | |
Ghost Hacker (Video Game) / int_6ec1f343 | comment |
Mook Medic: The aptly-named Medics, which constantly heals nearby enemies. | |
Ghost Hacker (Video Game) / int_6ec1f343 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_6ec1f343 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_6ec1f343 | |
Ghost Hacker (Video Game) / int_726df893 | type |
Equipment Upgrade | |
Ghost Hacker (Video Game) / int_726df893 | comment |
Equipment Upgrade: You now earn data cores for completing levels, with harder difficulties giving more data cores. These data cores can be spent to improve your towers, upgrade parts, scripts, or various passive perks. You can refund upgrades at no cost before entering a level to redistribute your upgrades for your current loadout. | |
Ghost Hacker (Video Game) / int_726df893 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_726df893 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_726df893 | |
Ghost Hacker (Video Game) / int_72b8af59 | type |
Stealthy Mook | |
Ghost Hacker (Video Game) / int_72b8af59 | comment |
Stealthy Mook: Ghosts are normally invisible and can only be detected when in range of a Scanner tower. | |
Ghost Hacker (Video Game) / int_72b8af59 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_72b8af59 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_72b8af59 | |
Ghost Hacker (Video Game) / int_78255ad7 | type |
Passing the Torch | |
Ghost Hacker (Video Game) / int_78255ad7 | comment |
Passing the Torch: After his defeat, Axon entrusts the player with the responsibility of protecting the Ghost community from Cypher One. | |
Ghost Hacker (Video Game) / int_78255ad7 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_78255ad7 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_78255ad7 | |
Ghost Hacker (Video Game) / int_79a0e313 | type |
Bolivian Army Ending | |
Ghost Hacker (Video Game) / int_79a0e313 | comment |
Bolivian Army Ending: The game ends with the player character being mobbed by several Cypher One Ghosts intending to delete him. | |
Ghost Hacker (Video Game) / int_79a0e313 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_79a0e313 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_79a0e313 | |
Ghost Hacker (Video Game) / int_7a59a6d6 | type |
Mass Hypnosis | |
Ghost Hacker (Video Game) / int_7a59a6d6 | comment |
Mass Hypnosis: After retrieving a cure for a virus, the player hands it to Jynx so that he can modify it to be broadcast and cure all infected Ghosts on the net. Jynx further modifies the "cure" to enact this trope, planning to have an army of Ghosts under his command. | |
Ghost Hacker (Video Game) / int_7a59a6d6 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_7a59a6d6 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_7a59a6d6 | |
Ghost Hacker (Video Game) / int_7c0bfb83 | type |
Obviously Evil | |
Ghost Hacker (Video Game) / int_7c0bfb83 | comment |
Obviously Evil: Jynx. Glowing red eyes and an evil smirk, and the fact that he made a Slayer virus that killed many Ghost Hackers pretty much gives it away. | |
Ghost Hacker (Video Game) / int_7c0bfb83 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_7c0bfb83 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_7c0bfb83 | |
Ghost Hacker (Video Game) / int_84685817 | type |
Life Drain | |
Ghost Hacker (Video Game) / int_84685817 | comment |
Life Drain: Reaper Viruses drain HP from other mooks to refill their own. You can take advantage of this. | |
Ghost Hacker (Video Game) / int_84685817 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_84685817 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_84685817 | |
Ghost Hacker (Video Game) / int_863fa679 | type |
What Happened to the Mouse? | |
Ghost Hacker (Video Game) / int_863fa679 | comment |
What Happened to the Mouse?: We never find out what happened to Sil, Axon, or Spook after the defeat of Jynx. | |
Ghost Hacker (Video Game) / int_863fa679 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_863fa679 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_863fa679 | |
Ghost Hacker (Video Game) / int_88e5fcbc | type |
One-Hit Polykill | |
Ghost Hacker (Video Game) / int_88e5fcbc | comment |
One-Hit Polykill: The Slicer, Transcoder and towers with the Beam upgrade fire a straight beam that deals damage to all foes on a straight line. | |
Ghost Hacker (Video Game) / int_88e5fcbc | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_88e5fcbc | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_88e5fcbc | |
Ghost Hacker (Video Game) / int_8a9eb844 | type |
Perspective Flip | |
Ghost Hacker (Video Game) / int_8a9eb844 | comment |
Perspective Flip: The first game has unlockable "monster mode" levels where you field viruses to bypass defenses and steal data cores. The second game expands on this concept and turns it into levels where you're infiltrating security systems. | |
Ghost Hacker (Video Game) / int_8a9eb844 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_8a9eb844 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_8a9eb844 | |
Ghost Hacker (Video Game) / int_90965cc7 | type |
Hive Mind | |
Ghost Hacker (Video Game) / int_90965cc7 | comment |
Hive Mind: The Collective are a collection of Ghosts who speak as one to the player. | |
Ghost Hacker (Video Game) / int_90965cc7 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_90965cc7 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_90965cc7 | |
Ghost Hacker (Video Game) / int_9183215d | type |
Last Disc Magic | |
Ghost Hacker (Video Game) / int_9183215d | comment |
Last Disc Magic: The last program you receive on completing the penultimate level is always the Brute Force script, which temporarily buffs all your towers. The final level's hint always reads "When all else fails, use the Brute Force script". | |
Ghost Hacker (Video Game) / int_9183215d | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_9183215d | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_9183215d | |
Ghost Hacker (Video Game) / int_933576c8 | type |
Mighty Glacier | |
Ghost Hacker (Video Game) / int_933576c8 | comment |
Mighty Glacier: The Sentry and Slicer are both slow-firing towers with very high individual damage per shot; the best way to overcome the Reavers' Damage Reduction, but nigh-useless against the Avatars which take a maximum of 2 damage per hit. | |
Ghost Hacker (Video Game) / int_933576c8 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_933576c8 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_933576c8 | |
Ghost Hacker (Video Game) / int_957e5fc2 | type |
Villainous Breakdown | |
Ghost Hacker (Video Game) / int_957e5fc2 | comment |
Villainous Breakdown: The Final Boss goes from mocking to furious as you hold out through the enemy waves of the final level. | |
Ghost Hacker (Video Game) / int_957e5fc2 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_957e5fc2 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_957e5fc2 | |
Ghost Hacker (Video Game) / int_95f972d2 | type |
Nitro Boost | |
Ghost Hacker (Video Game) / int_95f972d2 | comment |
Nitro Boost: Flamers gain a temporary 100% speed boost if they take any damage. | |
Ghost Hacker (Video Game) / int_95f972d2 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_95f972d2 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_95f972d2 | |
Ghost Hacker (Video Game) / int_9d12bbc1 | type |
Foreshadowing | |
Ghost Hacker (Video Game) / int_9d12bbc1 | comment |
Foreshadowing: The classified document the player discovers details the history of Alpha, but is partially censored. Astute readers can work out what it is before the twist is revealed at the end of the game. | |
Ghost Hacker (Video Game) / int_9d12bbc1 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_9d12bbc1 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_9d12bbc1 | |
Ghost Hacker (Video Game) / int_9edbda07 | type |
Elite Mooks | |
Ghost Hacker (Video Game) / int_9edbda07 | comment |
Elite Mooks: SuperUsers are resistant to Status Effects, can carry 2 data cores, and have the highest amount of health among non-boss enemies. | |
Ghost Hacker (Video Game) / int_9edbda07 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_9edbda07 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_9edbda07 | |
Ghost Hacker (Video Game) / int_9f3857d5 | type |
Draw Aggro | |
Ghost Hacker (Video Game) / int_9f3857d5 | comment |
Draw Aggro: Gravitons suck in all projectiles, so you'll need the Beam upgrade, Tracer, Slicer or Ping to hit other enemies. | |
Ghost Hacker (Video Game) / int_9f3857d5 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_9f3857d5 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_9f3857d5 | |
Ghost Hacker (Video Game) / int_a5fb0d24 | type |
Healing Factor | |
Ghost Hacker (Video Game) / int_a5fb0d24 | comment |
Healing Factor: Reassemblers regenerate 2 hit points per second (3 for the 2.0 version). | |
Ghost Hacker (Video Game) / int_a5fb0d24 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_a5fb0d24 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_a5fb0d24 | |
Ghost Hacker (Video Game) / int_ac320c0e | type |
Nuke 'em | |
Ghost Hacker (Video Game) / int_ac320c0e | comment |
Nuke 'em: In a bid to end Cypher One, Axon attempts to launch a nuclear missile at their headquarters. The Collective is opposed to that for it will also harm innocents. | |
Ghost Hacker (Video Game) / int_ac320c0e | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_ac320c0e | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_ac320c0e | |
Ghost Hacker (Video Game) / int_b1f18adb | type |
Ray Gun | |
Ghost Hacker (Video Game) / int_b1f18adb | comment |
Ray Gun: The attack of the Tracer, Slicer, Transcoder and towers with the Beam upgrade take the form of a laser-like beam. | |
Ghost Hacker (Video Game) / int_b1f18adb | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_b1f18adb | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_b1f18adb | |
Ghost Hacker (Video Game) / int_b4d6aa7d | type |
Dungeon Bypass | |
Ghost Hacker (Video Game) / int_b4d6aa7d | comment |
Dungeon Bypass: Seekers are able to pass over corrupted squares created by Corruptors. Pathfinders can do both of this, and will calculate the shortest path to a data core, corrupting and crossing squares on that path. | |
Ghost Hacker (Video Game) / int_b4d6aa7d | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_b4d6aa7d | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_b4d6aa7d | |
Ghost Hacker (Video Game) / int_be3e7584 | type |
Brutal Bonus Level | |
Ghost Hacker (Video Game) / int_be3e7584 | comment |
Brutal Bonus Level: GhostClub.com, unlocked after you finish Champion difficulty on every level. 30 waves that include boss versions of the normal enemies, and the final wave contains multiple Axons AND Jynxes! | |
Ghost Hacker (Video Game) / int_be3e7584 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_be3e7584 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_be3e7584 | |
Ghost Hacker (Video Game) / int_c3e4b9fd | type |
Final-Exam Boss | |
Ghost Hacker (Video Game) / int_c3e4b9fd | comment |
Final-Exam Boss: The final boss of this game participates in many waves throughout the level, acting as a souped up version of the enemy type that you just fended off. He mimics almost every enemy you've faced thus far. | |
Ghost Hacker (Video Game) / int_c3e4b9fd | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_c3e4b9fd | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_c3e4b9fd | |
Ghost Hacker (Video Game) / int_c420a553 | type |
We Can Rule Together | |
Ghost Hacker (Video Game) / int_c420a553 | comment |
We Can Rule Together: Jynx tries to pull this off near the end of the game, and after his defeat. It doesn't work, of course. | |
Ghost Hacker (Video Game) / int_c420a553 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_c420a553 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_c420a553 | |
Ghost Hacker (Video Game) / int_c513249 | type |
Harder Than Hard | |
Ghost Hacker (Video Game) / int_c513249 | comment |
Harder Than Hard: Beating the game unlocks the Challenge difficulty for every non-Monster level, which restricts the player to a predetermined program loadout for that level. | |
Ghost Hacker (Video Game) / int_c513249 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_c513249 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_c513249 | |
Ghost Hacker (Video Game) / int_c75df49a | type |
Shout-Out | |
Ghost Hacker (Video Game) / int_c75df49a | comment |
Shout-Out: Several of the optional level characters: Creepy, who had a vocal processor error that made him talk like a Creeper. BlockE, a program resembling WALL-E. WakkaMan, a green Pac-Man expy who only makes the sound Wakka. Witley, a Wheatley expy. Catman, an obvious Batman expy who is cat-themed instead. Chario and Bluigi, Mario and Luigi expies, the second of which loves to set others on fire, including his brother Chario. Kini, an unintelligible guy in an orange anorak who gets killed after you complete his level. Novi, a green fairy whose only dialogue is "Hey, Listen!". You shut off her vocal processors once you complete the stage. Various level descriptions also apply. AngryPigs.com advertises building tips to withstand bird attacks. One does not simply hack into Mordor.com. FireCastle.com quotes Your Princess Is in Another Castle! verbatim. The level description for GhostClub.com reads "The first rule of GhostClub is that you don't talk about GhostClub." Axon makes multiple references to cake during the level where the player fights him. | |
Ghost Hacker (Video Game) / int_c75df49a | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_c75df49a | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_c75df49a | |
Ghost Hacker (Video Game) / int_cadf2d2a | type |
Death of a Thousand Cuts | |
Ghost Hacker (Video Game) / int_cadf2d2a | comment |
Death of a Thousand Cuts: The Tracer and Transcoder (which deal continuous damage to the target), the Infector and Memory Leak upgrade (which infects enemy, dealing damage per second), and to a lesser degree the fast-firing, low-damage towers like the Compressor and Scanner. They are the best way to deal with Avatars (which can only take at most 2 damage from any attack), but are very weak against Reavers (which take 3 less damage from all attacks). | |
Ghost Hacker (Video Game) / int_cadf2d2a | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_cadf2d2a | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_cadf2d2a | |
Ghost Hacker (Video Game) / int_d6f284a3 | type |
Anti-Frustration Features | |
Ghost Hacker (Video Game) / int_d6f284a3 | comment |
Anti-Frustration Features: In the first game, before you place your towers, the upgrade nodes around them will regularly cycle through different color permutations which would determine what kinds of upgrades you can install onto them. The second game removes the color limitation so that the player can upgrade their towers on the fly with ease. | |
Ghost Hacker (Video Game) / int_d6f284a3 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_d6f284a3 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_d6f284a3 | |
Ghost Hacker (Video Game) / int_d89e305a | type |
Area of Effect | |
Ghost Hacker (Video Game) / int_d89e305a | comment |
Area of Effect: The Ping tower releases a circular blast that hits all enemies within. The projectiles fired by a Command Shell or any tower with the Splash upgrade deals splash damage to enemies around the initial target, all of which will take the same amount of damage. | |
Ghost Hacker (Video Game) / int_d89e305a | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_d89e305a | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_d89e305a | |
Ghost Hacker (Video Game) / int_db602541 | type |
Reflecting Laser | |
Ghost Hacker (Video Game) / int_db602541 | comment |
Reflecting Laser: The Linker upgrade (which causes attacks to bounce to a secondary target) will become this if combined with towers with laser or beam attacks (which fire a straight beam). | |
Ghost Hacker (Video Game) / int_db602541 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_db602541 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_db602541 | |
Ghost Hacker (Video Game) / int_dee6ef31 | type |
Enemy Summoner | |
Ghost Hacker (Video Game) / int_dee6ef31 | comment |
Enemy Summoner: The Spawn and Decoy have the ability to spawn Baby Spawn and Decoy minions, which can carry a data core each. The Baby Spawn have an actual health bar but only spawn once per 10 seconds, while the mini-Decoys can be churned out much faster but die in one hit. | |
Ghost Hacker (Video Game) / int_dee6ef31 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_dee6ef31 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_dee6ef31 | |
Ghost Hacker (Video Game) / int_e38268b5 | type |
Helpful Mook | |
Ghost Hacker (Video Game) / int_e38268b5 | comment |
Helpful Mook: Reaper Viruses drain a huge chunk of life from nearby enemies to refill their own. Useful when they do it to a tough enemy, and it's essential for beating 2's Brutal Bonus Level. | |
Ghost Hacker (Video Game) / int_e38268b5 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_e38268b5 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_e38268b5 | |
Ghost Hacker (Video Game) / int_e3f34fb4 | type |
Featureless Protagonist | |
Ghost Hacker (Video Game) / int_e3f34fb4 | comment |
Featureless Protagonist: All that's known of the player character is through their dialogue. | |
Ghost Hacker (Video Game) / int_e3f34fb4 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_e3f34fb4 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_e3f34fb4 | |
Ghost Hacker (Video Game) / int_e57bd3dd | type |
Wolfpack Boss | |
Ghost Hacker (Video Game) / int_e57bd3dd | comment |
Wolfpack Boss: The final wave of the Brutal Bonus Level GhostClub.com involves fighting three Axons 5.0 and four Jynxes 5.0 (the final forms of the two bosses of the game), plus their minions. | |
Ghost Hacker (Video Game) / int_e57bd3dd | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_e57bd3dd | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_e57bd3dd | |
Ghost Hacker (Video Game) / int_e5d8460d | type |
Unexplained Recovery | |
Ghost Hacker (Video Game) / int_e5d8460d | comment |
Unexplained Recovery: Axon is present in this game, despite his copies being mostly deleted by the conclusion of the previous game. | |
Ghost Hacker (Video Game) / int_e5d8460d | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_e5d8460d | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_e5d8460d | |
Ghost Hacker (Video Game) / int_e8ea58a4 | type |
Scratch Damage Enemy | |
Ghost Hacker (Video Game) / int_e8ea58a4 | comment |
Scratch Damage Enemy: Avatars reduce all damage dealt to them to a maximum of 2. They're therefore highly resistant to Mighty Glacier towers but vulnerable to Death of a Thousand Cuts. | |
Ghost Hacker (Video Game) / int_e8ea58a4 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_e8ea58a4 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_e8ea58a4 | |
Ghost Hacker (Video Game) / int_eb4086e3 | type |
Big Creepy-Crawlies | |
Ghost Hacker (Video Game) / int_eb4086e3 | comment |
Big Creepy-Crawlies: Spiders and Bugs take the form of abnormally-sized arthropods. | |
Ghost Hacker (Video Game) / int_eb4086e3 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_eb4086e3 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_eb4086e3 | |
Ghost Hacker (Video Game) / int_eb5cbe42 | type |
Me's a Crowd | |
Ghost Hacker (Video Game) / int_eb5cbe42 | comment |
Me's a Crowd: Axon reveals that he has many copies of himself, and simply deleting one of his avatars will not stop him. Alpha is also an example — after Cypher One failed to create other Ghosts, they settled with making copies of Alpha, their only successful Ghost, with minor tweaks to personality to give the illusion of individuality. | |
Ghost Hacker (Video Game) / int_eb5cbe42 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_eb5cbe42 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_eb5cbe42 | |
Ghost Hacker (Video Game) / int_f3cf30d9 | type |
Arbitrary Headcount Limit | |
Ghost Hacker (Video Game) / int_f3cf30d9 | comment |
Arbitrary Headcount Limit: You start with the capacity to hold six programs, but you also unlock the ability to increase this capacity up to sixteen, be it through natural progression (in the first game) or by spending your data cores (second game). You'll reach a point where you have more programs than slots and must pick your loadout based on the enemy preview. | |
Ghost Hacker (Video Game) / int_f3cf30d9 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_f3cf30d9 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_f3cf30d9 | |
Ghost Hacker (Video Game) / int_f6f2ff1 | type |
Insult Backfire | |
Ghost Hacker (Video Game) / int_f6f2ff1 | comment |
Insult Backfire: | |
Ghost Hacker (Video Game) / int_f6f2ff1 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_f6f2ff1 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_f6f2ff1 | |
Ghost Hacker (Video Game) / int_fc2f4def | type |
Non-Indicative Difficulty | |
Ghost Hacker (Video Game) / int_fc2f4def | comment |
Non-Indicative Difficulty: Surprisingly, the Brutal Bonus Level is easier on Hard than on Medium, because it's harder to accidentally destroy the Reaper Viruses due to them having more hit points on Hard. | |
Ghost Hacker (Video Game) / int_fc2f4def | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_fc2f4def | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_fc2f4def | |
Ghost Hacker (Video Game) / int_fd4f8299 | type |
Well-Intentioned Extremist | |
Ghost Hacker (Video Game) / int_fd4f8299 | comment |
Well-Intentioned Extremist: Axon opposes both the Collective and Cypher One, but only because he doesn't believe the Collective can protect the Ghost community from Cypher One's attacks. | |
Ghost Hacker (Video Game) / int_fd4f8299 | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_fd4f8299 | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_fd4f8299 | |
Ghost Hacker (Video Game) / int_name | type |
ItemName | |
Ghost Hacker (Video Game) / int_name | comment |
||
Ghost Hacker (Video Game) / int_name | featureApplicability |
1.0 | |
Ghost Hacker (Video Game) / int_name | featureConfidence |
1.0 | |
Ghost Hacker (Video Game) | hasFeature |
Ghost Hacker (Video Game) / int_name | |
Ghost Hacker (Video Game) / int_name | itemName |
Ghost Hacker (Video Game) |
The following is a list of statements referring to the current page from other pages.
Copyright of DBTropes.org wrapper 2009-2013 DFKI Knowledge Management. Imprint. - Thanks to Bakken&Baeck for hosting. Contact.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.