“ | No system is safe. - Hacker, emerging from the Barracks |
” |
Hackers were highly trained computer experts recruited by China to serve in their armed forces.
Background[]
Since hackers are not intended to be front-line fighters to be thrown straight into harm's way, they have no weapons training or body armor. However, their skills in computers can give the Chinese a boost in their war resources or even wreak havoc on the enemy's base if they managed to infiltrate behind enemy lines. Hackers could remotely disable enemy structures using sophisticated computer programs. More often, however, they were employed in hacking insecure bank accounts of unsuspecting Internet users, covertly diverting money into China's military coffers. First the general gets $5 cash every few seconds with them; after generating $500, the hacker gets promoted, generating $6 at a slightly faster rate, then $8 at an even faster rate after generating an additional $1200, reaching full rank after generating an additional $1600. At full rank hackers give a general $10 cash every second.
Later in the conflict, the Internet center was developed to protect and aid Hackers in this task by providing them with improved internet access and a shelter that can withstand a direct hit from a superweapon. The Hacker could also disable an enemy building, but needed to stay in contact with the building.
General Shin Fai created a core of elite hackers, the Super Hackers that were trained by Black Lotus herself.
Game unit[]
Abilities[]
Disable Building
The Hacker uses a strong computer virus to disable enemy buildings.
|
Hack Internet
The Hacker sits down and deploys his laptop in order to hack money from the internet. Generates a constant stream of money and experience for the Hacker, but the Hacker is undefended.
|
Strategy[]
“ | Preparing for credit transfer! - Hacker |
” |
Most of the time Chinese generals would train Hackers midway through a battle in order to stop their funds running out. The Internet center was useful for keeping Hackers safe from enemy units, but was not always considered essential. As they gained experience, Hackers could acquire more and more money at a time. Should a Hacker is ordered to hack either a building or unsecured bank account, they will stand down, deploy their laptop and stay in the position until the hacker activity is stopped. Hacking money can gain experience value to them and earn them veterancy, this in turn increase the hacking value of each hacker. Dollar per dollar, a heroic hacker can gain more funds compared to Black market and Supply drop zone.
Counters[]
However, being defenseless infantry units, Hackers required protection at all times, and were ripe targets of opportunity for any enemy unit, whether being run over by vehicles or simply shot at freely by any infantry unit. Hackers have absolutely no kind of protection whatsoever against nuclear radiation or toxic chemicals, and were vulnerable to such weapon strikes.
Should the ability be available, the GLA's Rebel Ambush can easily pick off a group of unsuspecting Hackers, which is a heavy loss to any Chinese general who is relying on them for income in the late-game phase.
Selected Quotes[]
“ | No system is safe. - When emerging from the Barracks |
” |
“ | Laptop in hand. - When selected |
” |
“ | I can cripple their facilities. - When selected |
” |
“ | Batteries charged. - When selected |
” |
“ | Uplink cables ready. - When selected |
” |
“ | (Heh) There's always a way in. - When selected |
” |
“ | I will be there soon. - When moving |
” |
“ | Instruction recieved. - When moving |
” |
“ | Okay, give me a sec. - When moving |
” |
“ | Going to next linkup - When moving |
” |
“ | Set up there? - When moving |
” |
“ | Hey, this hardware is expensive! - Under fire |
” |
“ | I'm unarmed! - Under fire |
” |
“ | Leave me alone, you bully! - Under fire |
” |
“ | They're picking on me! - Under fire |
” |
“ | Hacking algorithms ready. - When ordered to hack |
” |
“ | Terminal ready. - When ordered to hack |
” |
“ | Let's get connected! - When ordered to hack |
” |
“ | Preparing for credit transfer. - When ordered to hacking money |
” |
“ | I'll suck the Internet dry! - When ordered to hacking money |
” |
“ | Nobody will notice their money is missing! - When ordered to hacking money |
” |
“ | Security is minimal! - When ordered to disable building |
” |
“ | Encryption code is primitive! - When ordered to disable building |
” |
“ | No backup for this! - When ordered to disable building |
” |
“ | I'll let myself in, thanks. - When ordered to disable building |
” |
“ | Let's exchange information! - When ordered to disable building |
” |
“ | Booting up! - When ordered to disable building |
” |
“ | I'm in! - When a building is disabled |
” |
“ | Hack complete! - When a building is disabled |
” |
“ | Hehe, I've disabled their building! - When a building is disabled |
” |
“ | Enemy building is disabled! - When a building is disabled |
” |
“ | Okay, okay, I give up! - When surrender |
” |
“ | You got me! - When surrender |
” |
“ | I, I surrender - just don't hurt my computer! - When surrender |
” |
Cut Nuclear Hacker Quotes[]
“ | This briefcase is heavy. - When selected |
” |
“ | Uh... where should I deploy this? - When selected |
” |
“ | I'll start a chain reaction! - When selected |
” |
“ | I'll be careful not to trip it. - When moving |
” |
“ | This is expensive equipment! - When moving |
” |
“ | Hmm... what does this button do? - When planting a suitcase nuke |
” |
“ | Inputting detonation codes! - When planting a suitcase nuke |
” |
“ | I hope I have time to get away...! - When planting a suitcase nuke |
” |
“ | Preparing activation sequence! - When planting a suitcase nuke |
” |
Trivia[]
“ | Hmm... what does this button do? - Nuclear Hacker's unused quote |
” |
- Nuke General Tsing Shi Tao was originally meant to have his own unique version of the hacker dubbed the Nuclear Hacker, which had the ability to plant suitcase nuclear bombs at any location. Only the voiceset for this hacker remains, as the unit itself was scrapped early on before release.
- An audio glitch exists in Zero Hour whenever a Hacker is killed: In Generals, a dying hacker does its own unique death cry, while in Zero Hour, it does the death cry of a Red Guard.
See also[]
|
|