Artificial Defense is a one man made, real time strategy orbital-shooter game in an artificial, virtual reality setting. You are the machine, a mighty computer-system defending its servers against swarms of intruding creeps. Features:
- A new genre (RTS + Tower Defense + Orbital Shooter)
- 21 Offense Weapons
- 21 Defense Towers
- Evolve from Punch_tape to Quantum A.I.
- 13 Music Tracks
Firing off miniguns, launching Hellfire missiles, dropping incinerating Hades-Bombs and colossal asteroids, deploying mighty railgun and acid towers and spawning your own Intrusion Counter Measures (ICMs) to reconquer corrupted databases and firewalls are just some of the actions you can take while fending off the creeps. Earn RAM and upgrade your arsenal and hardware-level. Start as an analog punch-tape system and evolve into a quantum A.I. mainframe. 1. Offense
There are 21 offensive weapons available, reaching from outdated flintlocks, over maverick-missiles to devastating meteors and neutron-bombs. You can switch between three pre-loaded weapon categories and launch the installed weapons every few seconds. Each round you fire costs you RAM and each weapon type has its own unique cooldown so you must choose wisely and adapt quickly to different situations. But beware, aiming requires some skill. Creeps are moving targets and your projectiles need some flight time before impact. You can unlock and install new weapons in the uplab.
There are 21 defense towers available, reaching from pistol-sentry-towers, over incinerating flame-throwers to powerful long-range railgun towers. In addition there are 7 production towers which produce your main resource: RAM (Random Access Memory). Yes, building up a small RAM economy is very important, in order to keep your system routines running. Towers must be deployed by an expensive capsule drop and you have to find the sweet spot between the right amount of resource production towers and the performance of your defense perimeter. You can unlock and install new tower versions in the uplab. 3. Conquer
Spawn Intrusion Counter Measures (ICMs) in order to conquer corrupted system-structures like databases, honeypots and firewalls. Databases e.g. spawn datablips, which carry valuable data and head for your backup-devices. Every datablip successfully arriving at its destination releases a certain amount of RAM, so you should do your best to protect those important but vulnerable convoys.