NFOmation.net - Your Ultimate NFO Upload Resource! Viewing NFO file: reloaded.nfo reloaded

                                      ▀▄▄ ▀
                              ▄▄▄▄▄▄▓▌ ▐██▄ ▓█▄ ▀▄
                          ░▓▓███████▀ ▄████▌▐██▌ ▐▓
                ▄▄▄▄▄▄ ▄  █▀██████▓░▄▓█████▄███▓ ░█▌▄▄▄ ▄ ▄▄▄▄▄▄
                █      ▐▌▐▌▐██████▌▐████████████▌ █▌   ▐▌      █
                █       ▓  ▓███████▄████████████▌▐██   ▓       █
                █   ▄  ▐▌  ▐▓███████████████████▄███   ▐▌  ▄   █
                █   ▐▌▐█     ▀▀▀▀▀▓▓█████████▀▀▀  ▓▓░   █▌▐▌   █
                █   █░▓▌  ▄▓▄        █████░       ░█▌   ▐▓░█   █
                ▌▄ ▐▌ ▐█   ▀   ▓▓▄▄▄▄▓▓  █▄▄██████▌ ▀   █▌ ▐▌ ▄▐
                ▐▌  ▓▄ ▀▓▄     ███████    ███████▓▓   ▄▓▀ ▄▓  ▐▌
                ▌▀▄  ▀▀▄▄░▀▄   ▀▀▓▓███▌  ▐█░▄▄▄▄ ▀▀ ▄▀░▄▄▀▀  ▄▀▐
         ▄      █  ▀▀▄▄  ▀▀▄▀▄    ███▀▀▀▀▀▀ ▓███░ ▄▀▄▀▀  ▄▄▀▀  █
         ▐▌     █     ▀▓▓▄ ▐▌▐▌   ▄▄▄ ▐███▌ ▐██▓▌▐▌▐▌ ▄▓▀      █  ▄      ▄
        ▄▀      █   ▄  ▐██▌░█▓   ▐█▓▌ ░▓██▓       ▓█░▐█▄       █  ▐▌     ▐▌
      ▄▀▄▄▀     █   ▐▌ ██▐▓▄▀           ▄▄▀▀▀██▄▄  ▀▄▓▌▐▌      ▀▄▄█░    ▄▀
     ▐▌▓█▌      ▀ ▄▄█░▐█▓▀           ▄███     ██▓▓    ▓▀     ▄▓██▀    ▄▀▄▄▀
     ▓███▓     ▄▓██▀  ██▌           ▓▓██▌    ▐████▌ ▄▀▄▄▀   ▐███▌    ▐▌▓█▌
     ▐████▌   ▐███▌  ▐▓▓           ▐████     █████ ▐▌▓█▌    ░▓███    ▓███▓
      █████   ░▓███ ░██▌    ▄▄▄▄████████    ▐████▌ ▓███▓    ▄▄███▓░  ▐████▌
      ░█████  ▄▄███▓▐██▌ ░███▓▓▀   ▀████▌   █████  ▐████▌░██████▀ ▐███████▓
  ▓▓█▌ ▐████▌▓▓███▀ ███  ▓▓███     ▄████████████▓▓██████▓▐█████▌  ▐███░█████
  ████  █████████▌ ░███ ▐████▌    ▓▓████▌  ▐████████░██████████   ▐█▓▓ ▐████▓
  ████  ▐████████  ▐███░▐████▌   ▐███████   ▓███████ ▐█████████▌  ███▌  █████▌
  ████▌▄█████████▌ ▐███▌▓▓███    ██████▓▓    ▀▀▓▓██▌  ██████████▄▄███▌  ▐████▓
  ▐███████▓▓▀▓████▄▓▓████████    █████▌        ░███▌  ▐████▓ ▀▀▀▓▓███▌ ▄█████▌
  ▐███▓▓███▄▄▄░░▀▀▀██████████▄▄▄███▓▓▀         ▐███▌ ▄█████▌   █ ▐████████▓▓▀
   ████    ▀▀▀████▄▄▄▄▄░░   ▀▀▀▀▀       nERv   ▐████████▓▓▀    █ ▐▓▓████▀▀▀
   ▀▀▀▀         ▄▀▀▀██████                     ▐▓▓████▀▀▀      █
                █     ▓▓██                                     █
                █                                              █
                █    ▄▀▀█ ▄▀▀  ▓   ▄▀▀▄ ▄▀▀▄ ▄▀▄  ▄▀▀  ▄▀▄     █
                █▄▄▄ █▀▓  ▓▀ ▄ █   █  ▓ █▀▀▓ ▓  █ ▓▀ ▄ █  ▓ ▄▄▄█
                       █  ▀▀▀▀ ▀▀▀  ▀▀  ▀    ▀▀▀  ▀▀▀▀ ▀▀▀

                         Clandestine (c) Logic Artists

        11/2015 :..... RELEASE.DATE .. PROTECTION .......: Steam
              1 :.......... DISC(S) .. GAME.TYPE ........: Action, Indie

                   ▄▀▀  ▄▀▀▄ ▄▀▄▀▄ ▄▀▀  ▀ ▄▀▀▄ ▄▀▀▄ ▄▀▀▄ ▄▀
  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ █ ▀▓ █▀▀▓ █   ▓ ▓▀ ▄ █ █  ▓ ▓▀   █  ▓ ▀▀▀█ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
                    ▀▀  ▀    ▀   ▀ ▀▀▀▀ ▀ ▀    ▀     ▀▀   ▀▀

  Summary
  Clandestine is a 2-player or singleplayer stealth/hacking game set in 1996.
  Asymmetrical co-op allows one player to take the role of the spy while a
  friend provides overwatch and assistance as the hacker, and unravel a
  post-Cold War espionage conspiracy.

  The year is 1996, five years after the dissolution of the Soviet Union. A
  string of accidents and murders gone mostly unnoticed by the public eye
  have put the world of international espionage on high alert - veteran Cold
  War operatives from both sides of the former Iron Curtain are being
  assassinated around the globe. High-ranking officials of the CIA and the
  FSB secretly establish a joint task force to investigate the leaks.
  Codenamed The Kingbridge Executive, the group is funded with whatever money
  could be skimmed off of official projects and staffed by whoever could be
  spared from official operations. As field operative Katya Kozlova or hacker
  Martin Symborski, you will be deployed on dangerous missions across Europe
  and North America, chasing the source of the leaks.

  Key Features

  * Single Player & Asymmetrical co-op: Play as the spy while a friend
    guides you through the missions or take on the role of the hacker to
    crack infrastructure and defeat security systems.
  * A return to hard-core stealth games where the enemies are lethal and
    combat is unforgiving.
  * A deep hacking system built around core stealth game mechanics, rife
    with options to manipulate the game world and mess with your enemies.
  * Use social engineering in cooperative dialogue sequences to bypass
    security checkpoints and gain entry to restricted areas.
  * Your actions won't go unnoticed - the story will respond to how much
    evidence you leave in each mission and how many dead bodies you leave in
    your wake.

  Playing as the Spy
  The role of the Spy will be familiar to fans of stealth/action games. As
  the Spy, you will experience Clandestine as a 3rd person game, controlling
  the movements and actions of Katya in the game world. Katya is the boots on
  the ground, armed with weapons and gadgets that you can use to stay alive
  and evade your opponents. Katya is also well trained in hand-to-hand
  combat, and can use lethal or non-lethal stealth takedowns to take down
  enemies, leaving behind as little evidence as possible. During the mission,
  it also falls to the Spy to search for dossiers and intel to unlock new
  equipment and software for subsequent missions.

  Playing as the Hacker
  Martin operates in an entirely different way than the spy, which is
  reflected in the hacker player's interface and game mechanics. As the
  Hacker, players have access to four game windows and a toolbar. These game
  windows are: the Camera Feed, the Console, the Network View, and the
  Tactical Map.

  Camera Feed

  The Camera Feed allows the hacker to observe the game world and scout ahead
  for the Spy. By default, the Camera Feed displays the Operative Camera (a
  hidden camera worn by Katya), but you can also jump into surveillance
  cameras on the Tactical Map (see below) to look through them and scout the
  levels for enemies and other threats. The Camera Feed also displays the
  status of the Spy's health.

  Console

  The Console always displays game Objectives at the top of the window and
  prints important information in the Message Log such as cracked keypad
  codes. You can also use it to communicate with the Spy via the in-game text
  chat.

  Network View

  The Network View window is where Hackers can access the computer network(s)
  which run all of the electronic infrastructure in the mission area. This
  includes door keypads, PCs, Servers, Firewalls, and Hazards (steam pipes
  and electrical boxes which can be triggered to cause "accidents"). Hackers
  must be mindful of the Network Admin, an enemy AI which searches for
  changes in the Network and tries to correct them. Not only will the Admin
  kick a hacker from the Network if caught, the Admin will also reset
  firewalls and pass-codes. Hackers can unlock Viruses and DDOS attacks to
  keep the Admin busy when trying to escape or complete an objective.

  Tactical Map

  The Tactical Map is the window Hackers use to provide direct support to
  their Spy partners. This includes gaining access to cameras for scouting
  and observation, tagging enemies so the spy can track their location
  without maintaining line-of-sight, and use Local Assets to drop ammo or
  health, "clean up" bodies, cancel alarms before they sound, and even bribe
  enemies.

             ▀ ▄▀▀▄ ▄▀   ▓▄▄  ▄▀▀▄ ▓   ▓   ▄▀▀▄ ▄▀▀▄ ▓▄▄  ▄▀▀  ▄▀
  ▀▀▀▀▀▀▀▀▀▀ █ █  ▓ ▀▀▀█ █  ▄ █▀▀▓ █   █   █  ▓ █  ▓ █  ▄ ▓▀ ▄ ▀▀▀█ ▀▀▀▀▀▀▀▀▀▀
             ▀ ▀     ▀▀   ▀▀▀ ▀    ▀▀▀ ▀▀▀ ▀     ▀▀   ▀▀▀ ▀▀▀▀  ▀▀

  1. Unrar.
  2. Burn or mount the image.
  3. Install the game.
  4. Copy over the cracked content from the /Crack directory on the image to
     your game install directory.
  5. Play the game.
  6. Support the software developers. If you like this game, BUY IT!

               ▄▀▀  ▄▀▀█ ▄▀▀▄ ▓  ▄ ▄▀▀█ ▄▀▀▄ ▄▀▀▄ ▓▄▄  ▄▀▀  ▄▀
  ▀▀▀▀▀▀▀▀▀▀▀▀ █ ▀▓ █▀▓  █  ▓ █  ▓ █▀▀  █  ▓ █  ▓ █  ▄ ▓▀ ▄ ▀▀▀█ ▀▀▀▀▀▀▀▀▀▀▀▀▀
                ▀▀    █   ▀▀   ▀▀  ▀    ▀     ▀▀   ▀▀▀ ▀▀▀▀  ▀▀



This NFO File was rendered by NFOmation.net

                                      ßÜÜ ß
                              ÜÜÜÜÜÜ²Ý ÞÛÛÜ ²ÛÜ ßÜ
                          °²²ÛÛÛÛÛÛÛß ÜÛÛÛÛÝÞÛÛÝ Þ²
                ÜÜÜÜÜÜ Ü  ÛßÛÛÛÛÛÛ²°Ü²ÛÛÛÛÛÜÛÛÛ² °ÛÝÜÜÜ Ü ÜÜÜÜÜÜ
                Û      ÞÝÞÝÞÛÛÛÛÛÛÝÞÛÛÛÛÛÛÛÛÛÛÛÛÝ ÛÝ   ÞÝ      Û
                Û       ²  ²ÛÛÛÛÛÛÛÜÛÛÛÛÛÛÛÛÛÛÛÛÝÞÛÛ   ²       Û
                Û   Ü  ÞÝ  Þ²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÜÛÛÛ   ÞÝ  Ü   Û
                Û   ÞÝÞÛ     ßßßßß²²ÛÛÛÛÛÛÛÛÛßßß  ²²°   ÛÝÞÝ   Û
                Û   Û°²Ý  Ü²Ü        ÛÛÛÛÛ°       °ÛÝ   Þ²°Û   Û
                ÝÜ ÞÝ ÞÛ   ß   ²²ÜÜÜܲ²  ÛÜÜÛÛÛÛÛÛÝ ß   ÛÝ ÞÝ ÜÞ
                ÞÝ  ²Ü ß²Ü     ÛÛÛÛÛÛÛ    ÛÛÛÛÛÛÛ²²   Ü²ß Ü²  ÞÝ
                ÝßÜ  ßßÜÜ°ßÜ   ßß²²ÛÛÛÝ  ÞÛ°ÜÜÜÜ ßß Üß°ÜÜßß  ÜßÞ
         Ü      Û  ßßÜÜ  ßßÜßÜ    ÛÛÛßßßßßß ²ÛÛÛ° ÜßÜßß  ÜÜßß  Û
         ÞÝ     Û     ß²²Ü ÞÝÞÝ   ÜÜÜ ÞÛÛÛÝ ÞÛÛ²ÝÞÝÞÝ Ü²ß      Û  Ü      Ü
        Üß      Û   Ü  ÞÛÛÝ°Û²   ÞÛ²Ý °²ÛÛ²       ²Û°ÞÛÜ       Û  ÞÝ     ÞÝ
      ÜßÜÜß     Û   ÞÝ ÛÛÞ²Üß           ÜÜßßßÛÛÜÜ  ßܲÝÞÝ      ßÜÜÛ°    Üß
     ÞݲÛÝ      ß ÜÜÛ°ÞÛ²ß           ÜÛÛÛ     ÛÛ²²    ²ß     ܲÛÛß    ÜßÜÜß
     ²ÛÛÛ²     ܲÛÛß  ÛÛÝ           ²²ÛÛÝ    ÞÛÛÛÛÝ ÜßÜÜß   ÞÛÛÛÝ    ÞݲÛÝ
     ÞÛÛÛÛÝ   ÞÛÛÛÝ  Þ²²           ÞÛÛÛÛ     ÛÛÛÛÛ ÞݲÛÝ    °²ÛÛÛ    ²ÛÛÛ²
      ÛÛÛÛÛ   °²ÛÛÛ °ÛÛÝ    ÜÜÜÜÛÛÛÛÛÛÛÛ    ÞÛÛÛÛÝ ²ÛÛÛ²    ÜÜÛÛÛ²°  ÞÛÛÛÛÝ
      °ÛÛÛÛÛ  ÜÜÛÛÛ²ÞÛÛÝ °ÛÛÛ²²ß   ßÛÛÛÛÝ   ÛÛÛÛÛ  ÞÛÛÛÛÝ°ÛÛÛÛÛÛß ÞÛÛÛÛÛÛÛ²
  ²²ÛÝ ÞÛÛÛÛݲ²ÛÛÛß ÛÛÛ  ²²ÛÛÛ     ÜÛÛÛÛÛÛÛÛÛÛÛÛ²²ÛÛÛÛÛÛ²ÞÛÛÛÛÛÝ  ÞÛÛÛ°ÛÛÛÛÛ
  ÛÛÛÛ  ÛÛÛÛÛÛÛÛÛÝ °ÛÛÛ ÞÛÛÛÛÝ    ²²ÛÛÛÛÝ  ÞÛÛÛÛÛÛÛÛ°ÛÛÛÛÛÛÛÛÛÛ   ÞÛ²² ÞÛÛÛÛ²
  ÛÛÛÛ  ÞÛÛÛÛÛÛÛÛ  ÞÛÛÛ°ÞÛÛÛÛÝ   ÞÛÛÛÛÛÛÛ   ²ÛÛÛÛÛÛÛ ÞÛÛÛÛÛÛÛÛÛÝ  ÛÛÛÝ  ÛÛÛÛÛÝ
  ÛÛÛÛÝÜÛÛÛÛÛÛÛÛÛÝ ÞÛÛÛݲ²ÛÛÛ    ÛÛÛÛÛÛ²²    ßß²²ÛÛÝ  ÛÛÛÛÛÛÛÛÛÛÜÜÛÛÛÝ  ÞÛÛÛÛ²
  ÞÛÛÛÛÛÛÛ²²ß²ÛÛÛÛܲ²ÛÛÛÛÛÛÛÛ    ÛÛÛÛÛÝ        °ÛÛÛÝ  ÞÛÛÛÛ² ßßß²²ÛÛÛÝ ÜÛÛÛÛÛÝ
  ÞÛÛÛ²²ÛÛÛÜÜÜ°°ßßßÛÛÛÛÛÛÛÛÛÛÜÜÜÛÛÛ²²ß         ÞÛÛÛÝ ÜÛÛÛÛÛÝ   Û ÞÛÛÛÛÛÛÛÛ²²ß
   ÛÛÛÛ    ßßßÛÛÛÛÜÜÜÜÜ°°   ßßßßß       nERv   ÞÛÛÛÛÛÛÛÛ²²ß    Û Þ²²ÛÛÛÛßßß
   ßßßß         ÜßßßÛÛÛÛÛÛ                     Þ²²ÛÛÛÛßßß      Û
                Û     ²²ÛÛ                                     Û
                Û                                              Û
                Û    ÜßßÛ Üßß  ²   ÜßßÜ ÜßßÜ ÜßÜ  Üßß  ÜßÜ     Û
                ÛÜÜÜ Ûß²  ²ß Ü Û   Û  ² Ûßß² ²  Û ²ß Ü Û  ² ÜÜÜÛ
                       Û  ßßßß ßßß  ßß  ß    ßßß  ßßßß ßßß

                         Clandestine (c) Logic Artists

        11/2015 :..... RELEASE.DATE .. PROTECTION .......: Steam
              1 :.......... DISC(S) .. GAME.TYPE ........: Action, Indie

                   Üßß  ÜßßÜ ÜßÜßÜ Üßß  ß ÜßßÜ ÜßßÜ ÜßßÜ Üß
  ßßßßßßßßßßßßßßßß Û ß² Ûßß² Û   ² ²ß Ü Û Û  ² ²ß   Û  ² ßßßÛ ßßßßßßßßßßßßßßßß
                    ßß  ß    ß   ß ßßßß ß ß    ß     ßß   ßß

  Summary
  Clandestine is a 2-player or singleplayer stealth/hacking game set in 1996.
  Asymmetrical co-op allows one player to take the role of the spy while a
  friend provides overwatch and assistance as the hacker, and unravel a
  post-Cold War espionage conspiracy.

  The year is 1996, five years after the dissolution of the Soviet Union. A
  string of accidents and murders gone mostly unnoticed by the public eye
  have put the world of international espionage on high alert - veteran Cold
  War operatives from both sides of the former Iron Curtain are being
  assassinated around the globe. High-ranking officials of the CIA and the
  FSB secretly establish a joint task force to investigate the leaks.
  Codenamed The Kingbridge Executive, the group is funded with whatever money
  could be skimmed off of official projects and staffed by whoever could be
  spared from official operations. As field operative Katya Kozlova or hacker
  Martin Symborski, you will be deployed on dangerous missions across Europe
  and North America, chasing the source of the leaks.

  Key Features

  * Single Player & Asymmetrical co-op: Play as the spy while a friend
    guides you through the missions or take on the role of the hacker to
    crack infrastructure and defeat security systems.
  * A return to hard-core stealth games where the enemies are lethal and
    combat is unforgiving.
  * A deep hacking system built around core stealth game mechanics, rife
    with options to manipulate the game world and mess with your enemies.
  * Use social engineering in cooperative dialogue sequences to bypass
    security checkpoints and gain entry to restricted areas.
  * Your actions won't go unnoticed - the story will respond to how much
    evidence you leave in each mission and how many dead bodies you leave in
    your wake.

  Playing as the Spy
  The role of the Spy will be familiar to fans of stealth/action games. As
  the Spy, you will experience Clandestine as a 3rd person game, controlling
  the movements and actions of Katya in the game world. Katya is the boots on
  the ground, armed with weapons and gadgets that you can use to stay alive
  and evade your opponents. Katya is also well trained in hand-to-hand
  combat, and can use lethal or non-lethal stealth takedowns to take down
  enemies, leaving behind as little evidence as possible. During the mission,
  it also falls to the Spy to search for dossiers and intel to unlock new
  equipment and software for subsequent missions.

  Playing as the Hacker
  Martin operates in an entirely different way than the spy, which is
  reflected in the hacker player's interface and game mechanics. As the
  Hacker, players have access to four game windows and a toolbar. These game
  windows are: the Camera Feed, the Console, the Network View, and the
  Tactical Map.

  Camera Feed

  The Camera Feed allows the hacker to observe the game world and scout ahead
  for the Spy. By default, the Camera Feed displays the Operative Camera (a
  hidden camera worn by Katya), but you can also jump into surveillance
  cameras on the Tactical Map (see below) to look through them and scout the
  levels for enemies and other threats. The Camera Feed also displays the
  status of the Spy's health.

  Console

  The Console always displays game Objectives at the top of the window and
  prints important information in the Message Log such as cracked keypad
  codes. You can also use it to communicate with the Spy via the in-game text
  chat.

  Network View

  The Network View window is where Hackers can access the computer network(s)
  which run all of the electronic infrastructure in the mission area. This
  includes door keypads, PCs, Servers, Firewalls, and Hazards (steam pipes
  and electrical boxes which can be triggered to cause "accidents"). Hackers
  must be mindful of the Network Admin, an enemy AI which searches for
  changes in the Network and tries to correct them. Not only will the Admin
  kick a hacker from the Network if caught, the Admin will also reset
  firewalls and pass-codes. Hackers can unlock Viruses and DDOS attacks to
  keep the Admin busy when trying to escape or complete an objective.

  Tactical Map

  The Tactical Map is the window Hackers use to provide direct support to
  their Spy partners. This includes gaining access to cameras for scouting
  and observation, tagging enemies so the spy can track their location
  without maintaining line-of-sight, and use Local Assets to drop ammo or
  health, "clean up" bodies, cancel alarms before they sound, and even bribe
  enemies.

             ß ÜßßÜ Üß   ²ÜÜ  ÜßßÜ ²   ²   ÜßßÜ ÜßßÜ ²ÜÜ  Üßß  Üß
  ßßßßßßßßßß Û Û  ² ßßßÛ Û  Ü Ûßß² Û   Û   Û  ² Û  ² Û  Ü ²ß Ü ßßßÛ ßßßßßßßßßß
             ß ß     ßß   ßßß ß    ßßß ßßß ß     ßß   ßßß ßßßß  ßß

  1. Unrar.
  2. Burn or mount the image.
  3. Install the game.
  4. Copy over the cracked content from the /Crack directory on the image to
     your game install directory.
  5. Play the game.
  6. Support the software developers. If you like this game, BUY IT!

               Üßß  ÜßßÛ ÜßßÜ ²  Ü ÜßßÛ ÜßßÜ ÜßßÜ ²ÜÜ  Üßß  Üß
  ßßßßßßßßßßßß Û ß² Ûß²  Û  ² Û  ² Ûßß  Û  ² Û  ² Û  Ü ²ß Ü ßßßÛ ßßßßßßßßßßßßß
                ßß    Û   ßß   ßß  ß    ß     ßß   ßßß ßßßß  ßß



This NFO File was rendered by NFOmation.net


<Mascot>

aa21