Hacker Evolution Duality

Hacker Evolution Duality

48 ratings
Hacker Evolution: Duality Primer
By RemyLabue
Primer for Hacker Evolution: Duality. Whether you're new to Hacker Evolution, or you're returning to the fray, this guide will help you become a top-rate hacker in no time.
   
Award
Favorite
Favorited
Unfavorite
About This Guide
This is my first Steam Guide, so please excuse any issues with format and such, I am still learning. This guide includes Tips, Tricks, and Primers to Duality. This guide will not include walkthroughs for the Duality campaign or any DLC at this time. If users enjoy this guide and want me to create walkthroughs for the main campaign or any DLC, or even the previous games in the series , then I will think about creating them in the future. With that in mind, I hope everyone finds this guide useful.
Intro To Hacker Evolution: Duality
Duality is the third game in the series after Hacker Evolution and Hacker Evolution: Untold by developer Exosyphen Studios. It's a hacker simulation game, which can be very daunting to newcomers with no experience with the genre. Don't get overly frustrated, keep cool, and I'll get you through it.

Hacker Evolution places you in the office chair of a hacker named Brian Spencer and asks you to complete objectives like hacking servers, retinal scanners, satellites, CCTV cameras, and even killing people from time to time by utilizing your collection of hacking tools. Don't worry, playing this game requires absolutely no prior hacking knowledge or experience. Duality helps alleviate some of the tension of past games by removing the need for memorizing console commands and replaces it with simple to use tools that are accessible with just a click of the mouse.
Starting The Game


Unfortunately, Duality uses a User based save system. This allows for easy replays of all missions, but is also very limiting. If you would like the ability to replay any mission you like at any time, I recommend using a naming convention that easily facilitates this. This is what I do:



If you'd like to play through a mission with every difficulty available, you can select Duality, Easy, and then name the user something like "Dual-Easy". Then after you finish with that play-through you can select Duality, Medium, and then name the user something like "Dual-Med", then again with "Dual-Hard". Doing this insures that you have quick access to every level on every difficulty.

However, there is an issue doing this. The game only allows for 6 users at a time, which isn't a problem unless you purchase the DLC. So for instance, I have all of the DLC, so when I boot up my game I can choose Duality, Hardcore Package, Inception 1, Inception 2, and Inception 3. (As of this writing I also purchased and downloaded the "Bootcamp" DLC, however I am unable to access it. I've written to the developers about this issue.) I am unable to create 3 users per campaign because of the 6 user limit. So I can only keep one user per campaign and my user list looks like this; "Dual-Hard", "Hard-Hard", "Inc1-Hard", "Inc2-Hard", and "Inc3-Hard". I have room for one more user, which will most likely go to the Bootcamp DLC. So if they release anymore DLC, I will lose quick access to the earlier DLC. It's a shame that this limit is in place, and I hope that the developers eventually remove it with a patch.

Update: The Bootcamp DLC can be accessed by moving the 'HED-Bootcamp' folder and the 'HED-Bootcamp.mod' file from the root of Hacker Evolution Duality and into the 'hed-gamemods' folder.

The Options Menu




At this time the options screen only allows you to change music volume, FX volume, select full-screen mode, enable mouse assistance, submit serial number for Open World Mode Scoring, and then actually submit the scores to the website.

There is no way to change the resolution in full-screen mode. The game plays at 1280x720 by default on widescreen monitors, and you can locate the file where that information is stored at "Hacker Evolution Duality\sys-hed-appdata\settings.ini". You can change the resolution there and save, but the next time you boot the game, it'll just revert back. Hopefully this is something else that will be resolved in a later patch. Also, this is the folder you would access to backup your user profiles if you wish. Just make sure to grab "profiles.file" and "username.profile" both to back them up.
Controls
Mouse

Left Click - Target / Lock-On To Server
Double Click - Bounce Link / Remove Bounce
Move Mouse To Sides Of Map - Scroll Map From Side To Side

Keyboard Shortcuts

[Space Bar] - Lock On To Your Server
[F] - Firewall Hacker Tool
[D] - DOS (Denial of Service) Hacker Tool
[E] - EMP (Electro Magnetic Pulse) Hacker Tool
[V] - Voiceprint Hacker Tool
[R] - Retina Scan Hacker Tool
[K] - Key Cracker Tool
[I] - Interface Window
[C] - Console Window
[H] - Hardware Window
[M] - Messages Window
[O] - Objectives Window
[A] - Achievements Window

Keyboard Controls

[F1] - Opens Help Screen
[F2] - Reopens Level Introduction Window
[F8] - Pause Music
[F9] - Next Music Track
[F10] - Volume Down
[F11] - Volume Up
[Esc] - Exit To Main Menu
[Pause] - Pause Game
The Game Screen


Information Bar

The Information Bar is located at the top of the screen above the map.



  • Bounced Links - Displays the number of times your link bounces off of hacked servers before reaching your target server.
  • Total CPU Count - Displays the total CPU count including added CPU power from bounced links.
  • Trace-Time - The amount of time it will take for a trace to start after selecting a target server.
  • Time Left To Complete The Level - Self explanatory. If there is a time limit, it will be displayed here. If not it will simply say 'Unlimited'.
  • Trace Level % - Once this number reaches 100% it's game over. The authorities have located your server. However, keep in mind that some levels require you to keep this number below a certain amount.
  • Score - Your current score.
  • Money - The amount of money you currently have for upgrades and mission costs.

If you don't understand this data yet, don't worry. We'll go over each part in greater detail later.

Target Map

The Target Map is the majority of your game screen. It shows you where on earth each target server resides. You can scroll the map left and right to see more of it. The target servers themselves will appear as a crosshair icon on the map, followed by the name of the server and security details. Again, we'll go over this information in greater detail later.



The Toolbar

The Toolbar is located at the bottom of the screen. It lists all of the hacking tools at your disposal.



  • Hacking Devices - The tools you will use to complete mission objectives.
  • Hardware Button - Opens the Hardware window and displays your current specifications. You can upgrade your equipment here by clicking on the buttons at the bottom of the window.
  • Messages Button - Opens the Messages window and displays all messages received during the current level.
  • Objectives Button- Opens the Objectives window and displays all of the levels objectives. A green checkmark next to the objective means it has been completed.
  • Achievement Button - Opens the achievement window and shows your progress towards completing them.
  • Question Mark Button - Opens a help window that displays the controls.
  • Event Screen - Displays event logs for the current level.
How To Play The Game
Completing Levels in Hacker Evolution: Duality requires you to master 3 basic steps. Attacking Servers, Hacking Servers, and Interfacing with Servers. Master these steps and you'll be finishing the game in no time. Just remember these tips:

  • Don't rush into actions. Carefully evaluate the situation and think multiple steps in advance.
  • Don't spend any money unless absolutely necessary. You never know when you'll need it.
  • Watch the countdown on each hacked server you are bouncing through. The loss of trace time that can occur when servers regenerate can hurt you, especially if you're in the middle of using a hacking device.
  • In the campaigns, (Not Open World Mode), you can transfer money to an AI controlled server to bribe them into being less aggressive. Use this trick if you need the break from constant attack.
  • Plan ahead and decide which servers you will be attacking in this level. You can attack servers even if you don't intend on hacking them for a while. That way you won't have to wait for the DOS and EMP to recharge when you need them the most.

Time Limit

Some levels do have a time limit, but not all. Keep an eye on this, but you will always have way more time than required to complete the levels, don't worry too much about it.



The time limit info can be found in the Information Bar at the top of the screen under 'Time Left', and the amount of time taken so far can be found in the bottom right of the Target Map. Both are highlighted yellow in the screenshot above.

Scoring

The game scores you on how well you complete each level and there is a leader board, unfortunately, neither the game nor the instruction manual shed any light on how the score is tallied, and it looks like the leader board on Steam actually posts the highest score you have received on any one level, not a total score for the entire campaign, which is unexpected. My only advice, if you are going for a high score, would be to select the level with the most target servers, and take your time doing things that you don't have to just to complete the mission objectives. For example, after you complete all of your objectives, stay in the level and destroy all the target servers that are left. This will be easier in levels with no time limit. These actions add to your total score, even if they don't serve a purpose.

Achievements

You can check on the progress of your achievements by clicking the achievement button in the toolbar.



These achievements are easy to complete. I understand that there is a way to hack the file structure of the game to automatically complete them, however it should not be necessary and as long as you play the game, they will unlock naturally on their own. Don't be a cheater.

Keep in mind, that your achievments progress individually for each mod. So cracking encryption keys in the Inception DLC will not add to your count in Duality. The counts are seperate.

Server Information

The first thing you should locate when starting a new level is your CPU level and the target servers with the lowest firewall level, that will usually be the first server you will start hacking.



The name of your server will always be your username.localhost and will include the same information as any target server including; Firewall Level, CPU Level, and Integrity Level. The Integrity Level of any server is essentially the Health of the server. Once the Integrity reaches 0, it's game over. The Firewall, CPU, and Integrity Levels can be upgraded by spending money in the Hardware screen.



A target server looks like this at first. It includes a name which will turn red once it's been hacked, the Firewall Level, CPU Level, Integrity Level, and any special security protocols below that. To hack the server, you must have a CPU Level that meets or exceeds the Firewall Level of the target. So for the above example, your CPU Level has to be at least 18 to be able to use the Firewall Attack Tool. After you hack this particular server, you still won't be able to Interface with it until you deal with the Voiceprint Authentication. If there is nothing under the Firewall, CPU, and Integrity Levels, then there is no special security protocols on the server and you can Interface with it immediately. Information on how to use your hacking devices will be covered in greater detail later.



This target is controlled by an AI, (Artificial Intelligence). If this target is attacked in any way, the AI will become hostile. When it does, it will display the % of hostility and the time until the next attack. The more you attack the server, the higher the hostility % will climb, and the more frequently the AI will attack your server. Enemy AI's have the ability to attack your server with an EMP or DOS attack just like you, and you can see their recharge rates. When they hit 100%, the AI can choose to attack with them when the Attack timer counts down.



This is what a server will look like once hacked. This server was AI controlled, so it became hostile once we hacked it. The red number under the crosshair will countdown to 0, and once it does, the name will turn white again, and the server's firewall will need to be hacked again before you can Interface with it.

Locking On And Trace

Once you locate a target server that you can hack, you must lock onto it. You can do this by clicking on the server once. Once you click on that server, your Trace-Time will start to count down. Once the Trace-Time counts down to 0, your Trace Level % will begin to increase. Each level may include an objective to keep the % below a predetermined amount, but if there isn't one, then you won't lose until you hit 100%. This means the authorities know where you're at and are coming for you. Avoid being traced by locking onto your server before the Trace-Time counts down. Quickly do this by pressing Space. You will be doing this a lot, so get used to it. You can increase the Trace-Time by either bouncing the link, or upgrading you Firewall and CPU. We'll cover link bouncing next.

Bouncing Links

Bouncing Links is the act of bouncing your signal through already hacked servers to increase your Trace-Time and borrow the bounced server's CPU level temporarily. The CPU Level that is listed in the Information Bar at the top of the screen includes these 'borrowed' CPU's and gives you a total. So if your CPU Level is 5, and the server you're trying to hack has a Firewall Level of 7, then you either need to purchase more CPU, attack the target with a DOS or EMP, or bounce your link through a server that has a CPU Level of at least 2 before you can attempt the hack. You bounce your link by double-clicking on the hacked server. Remove the bounced link by double-clicking again. You can see that you are now bounced through that server with a thick orange line between your server and the bounced target. If a sever you are bounced through resets, the bounce will automatically be removed. Keep an eye on the timers to make sure this doesn't happen while you're hacking targets. Losing the added Trace-Time while you're in the middle of using a hacking device can be devastating.
Upgrading Your Server
You can access the Hardware Upgrade window by clicking on Hardware or pressing [H] on the keyboard.



Your current levels can be seen next to the three attributes, as well as the price of each upgrade. You can upgrade each attribute by clicking on the corresponding button at the bottom of the window. Each Firewall upgrade increase will add 5 seconds to your Trace-Time and each Integrity upgrade will subtract 10% from your Trace Level %. You can complete every level without upgrading your hardware, however it is likely you will at least have to buy integrity upgrades to keep yourself alive against the constant barrage of attacks from AI Controlled servers. So save your money and purchase only when necessary.
Using Hacking Devices
You have a multitude of devices at your disposal for hacking target servers, and using them is as easy a clicking a mouse, if you have the Trace-Time of course. Which devices to use and when, depends on the situation. The EMP, (Electro Magnetic Pulse), and DOS, (Denial of Service), attacks are used to bring down the Firewall and Integrity Levels of a target. The Firewall Attack tool is used to bring down the Integrity of the server and bypass the firewall so you can Interface with it. The Voiceprint Password, Retinal Scan Authentication, and Encryption Key Cracker tools are used when those particular security protocols are in place. The Interface tool allows you to access a hacked server to browse it's files, control CCTV cameras, or transfer funds. We'll go over the use of each one of these devices one by one.

The Firewall Attack Tool

This device will bypass the target's firewall to allow Interfacing as long as no other Special Security protocols are in place. By using this tool, you will decrease the Integrity of the server by 1, however the firewall level will remain unchanged. Use this device by clicking the Firewall Button, or by pushing [F] of the keyboard.



Once all of the red cells in the grid disappear, the attack is complete and you can click the Logout button and target your server to stop the Trace-Time. There is no recharge time on this device.

The Denial Of Service Attack Tool

Using this device will lower the Firewall and Integrity Levels of the target server by 1. It has a recharge time, and once used, you have to wait until it is fully recharged before using it again. You can access it by clicking the DOS button or by pressing [D] on the keyboard.



To complete the attack, you have to slide all four sliders to the amount listed to the right in red. Once all four are matched, the attack will initiate and the window will close automatically once it's complete. You can click Cancel at the top right to cancel the attack if you need to reset the Trace-Time.

The Electro Magnetic Pulse Attack Tool

Using this device will lower the Firewall and Integrity Levels of the target by 2 each. It has the longest recharge, so once used you will have to wait until it's fully charged to use again. You can access it by clicking the EMP button or by pressing [E] on the keyboard.



Using this device is completely different from any other, in that a window does not appear, but a satellite appears in the bottom left corner of the Target Map. Once it appears, you have to click anywhere on the screen to start it spinning so that the arrow aligns with the white line coming out of the satellite which points to the target server. Click again to stop the rotation and watch the attack ensue. If you miss the line the first time around you will have to wait for the satellite to complete another rotation and try again. Once the attack is complete, the satellite will disappear and you can hit [Space] on the keyboard to target your server and reset the Trace-Time. The starting point of the arrow seems to be random as well. To cancel this attack you will have to press [Esc] on the keyboard.

The Voiceprint Password Tool

If the target server has a special security protocol that states "Voiceprint Authentication Present", then after you use the Firewall Attack tool successfully, you'll need to use this device before you can Interface. You can access it by clicking the Voiceprint button or by pressing [V] on the keyboard.



This device is used practically the same way as the Denial of Service attack tool in the you use the sliders to match the numbers on the right. There are three sliders instead of four, and after you match them you will have to click the Login button. This will close the window so you can target your server to reset the Trace-Time.

The Retinal Scan Authentication Tool

Use this device if the target server has a special security protocol that states "Retinal Scan Authentication Present". You can access it by clicking on the Retina button or by pressing [R] on the keyboard.



When the tool window appears, you will have to click on the numbers in descending order starting with 24. Once done you can click Login and reset the Trace-Timer. This isn't very difficult and can be done quickly.

The Encryption Key Cracking Tool

Use this tool when the target server has a special security protocol that states "Encryption Key Present". You can access this device by clicking the Key Crack button or by pressing [K] on the keyboard.



This device works just like the Retinal Scan Authentication tool in that you have to click on the numbers in descending order. However now there are 63 numbers. This tool can take a considerable amount of time to use, so make sure your Trace-Time is as high as you can make it before using. After clicking on all of the numbers you can click Login to exit the window and reset your Trace-Time. If you hesitate for a few seconds, the number you are stuck on will be highlighted to assist you.

The Server Interface Tool

Once a target has been hacked, the name is red, and the special security protocols have been dealt with, you can Interface with it. Access the Interface tool by clicking on the Interface button or by pressing [I] on the keyboard.



Once you interface with a target server, you can download files from it, upload files to it, transfer funds to and from it, (you can transfer all funds from or to it, not a designated amount), you can view the surveillance camera if there is one, and there might be a few switches for you to hit as well. You can view and delete files on both the target and your server. Be careful, certain tasks within this window can have dire repercussions. For example, some switches can be traps that increase you Trace Level % by 10. Also, AI Controlled servers will increase their Hostility % if any files are downloaded or money is transferred from the target. However, if the hostility of the AI Controlled server is high and you want to bring it down, you can transfer money to the server as a sort of bribe to calm it down. You can only do this in Single Player campaigns though. Click Logout to close the window and reset the Trace-Time.
The Console Tool
The Console tool is available, however is not used in the main campaign. It was added for later use in DLC campaigns, including Bootcamp, and the Inception DLC's. Console commands can be used in along side the hacking devices to help complete objectives.

The console can be used for the main Duality campaign as well, however not all commands will work all the time. Killtrace can be used at all times which is a cheap way to bring down your trace level %, and using Crack can lower the firewall and integrity of a target server without making AI's hostile.



  • Help - Format: "help"

Use the help command to get a list of all possible console commands. (The list does not include "Crack" for some reason.)

  • Spoiler - Format: "spoiler"

The spoiler command is suppose to provide a hint on the current level, or added information on an objective. However, usually I just get some dashes when I attempt to use it.

  • LS - Format: "ls _ server name"

Lists the files on the server specified.

  • CAT - Format: "CAT _ filename"

Opens the file specified.

  • Next Level - Format: "nextlevel"

Use this command to continue to the next level if the current one has been completed.

  • Sys Info - Format: "sysinfo"

This command will list some useful info on the current state of your server.

  • CLS - Format: "cls"

Clears the console screen.

  • Close - Format: "close"

Closes the console window. Hitting [Esc] will also accomplish this.

  • Scan - Format: "scan _ server name"

Use this command to reveal servers on the map. Some files may list server names that you can't see on the map currently, scan will give you access to them.

  • Bypass - Format: "bypass _ voiceprint \ retinalscan \ authenticationkey _ server name _ passowrd"

Use the bypass command to remove the special security protocols from a server for instant access, but only if you know the password which sometimes can be found in files found while digging through files.

  • Delete - Format: "delete _ file name"

Self-explanatory. Delete files.

  • DNS - Format: "dns _ ip address \ server name"

If you give this command an IP address, it will give you a server name, and vice-versa.

  • Ping - Format: "ping _ server name"

Sends a data packet from your server to the specified server and back to see if there are any connectivity issues.

  • Killtrace - Format: "killtrace"

Drops your trace level by 10% at the cost of $1000. Which is much cheaper than the $10000 for an Integrity upgrade that also drops it.

  • Crack - Format: "crack _ server name"

This command is considered an attack on a specified server. It will drop the firewall and integrity levels by 1 each, at the cost of raising your trace level 5%.
Epilogue
I believe we have covered everything that you'll need to know at this point. Thank you for reading my guide, I hope that it has been helpful. Please comment as much as you can and let me know what you think. I will update the guide as issues are pointed out to me.

12 Comments
Witcher- 21 May, 2016 @ 9:15pm 
ty :D
moonlight 21 May, 2016 @ 8:28pm 
.
yjk4135 17 Feb, 2016 @ 6:42pm 
Thank you for your guide. It's very useful because the tutorial in the game omits detailed explanations.
Someone Wicked 5 May, 2015 @ 7:46am 
Very helpful, especially for someone like me, who was expecting something more like the first two games! Thanks!
InTo_The_Sun 8 Apr, 2015 @ 5:13am 
Really helpful! Thank you!
RemyLabue  [author] 6 Jan, 2015 @ 11:36pm 
Thanks for the catch hobbithawk, should pay more attention in the future. Fixed.
Redwing73 6 Jan, 2015 @ 2:04pm 
A big help for me. Thanks for the great guide.
Hobbithawk 25 Dec, 2014 @ 8:07pm 
if it's at the end, it should be a epilogue
UnExcited 30 Sep, 2014 @ 11:14am 
I don't remember the game being that hard ...
BeerZ_ 27 Jun, 2014 @ 7:57pm 
...........