Intrusion Protocol
COMPARE PRICES
LOWEST
CURRENT
GAME DESCRIPTION

About This Game
Intrusion Protocol
is a classic challenging retro 2-D platformer. Play as a computer virus tasked with infiltrating an enemy network to retrieve mission-critical data. As you find the data you will uncover a story that reveals the secrets of your mysterious purpose. Your only health bar is the clock, and the enemy defenses will quickly drain your precious time. Will you be able to overcome the defenses and access the data? Or will you find yourself out of time? Be quick. Be careful.
There's a reason this is at the top of this page. We want this experience to be a tough one. Players will crash and burn countless times until they figure out how to reach the end of each level in time. Though the game will bring players seemingly endless death, Intrusion Protocol is designed from the ground up to give the player the drive to keep going until they reach the data. If you think you have what it takes, show our unforgiving levels who's boss!
Some games are difficult because they are impossible to control. Not Intrusion Protocol.
The controls are designed with the controller in mind
and focus on closely connecting the player to their gaming experience. We have created a simple, tight, responsive system to make the player feel like they are in complete control. Considering the intense difficulty, it is crucial that the game has solid controls so the player doesn't feel like faulty mechanics were the reason for their (many) deaths.
The levels in Intrusion Protocol are certainly designed to provide a challenge. Moving enemies will quickly drain your time, and stationary obstacles will immediately send you back to your last checkpoint. Though it will be difficult for the average gamer, there are tricks and specific timings that will allow the true masters of the game to speedrun with blazing fast times.
Everything in Intrusion Protocol is designed to keep the player moving while not overloading the senses. The environment itself is in constant motion. The tail is only active when moving, and allows players to savor moments when they hit that perfect arc. These constant motion visuals immerse the player, and give them the drive to keep moving forward.
Why were you created? What is your destiny? Answers to these questions will unfold as the player completes levels. At the end of each level the player will see dialogue between two of the creators of Intrusion Protocol. Hearing this discussion will shed light on the program's purpose.

SYSTEM REQUIREMENT

Minimum:
OS:
Windows 7/8/10
Processor:
2.4GHz Dual Core
Memory:
4 GB RAM
Graphics:
Intel HD Graphics 520
Recommended:
OS:
Windows 7/8/10
Processor:
3GHz Quad Core
Memory:
4 GB RAM
Graphics:
GeForce GTX 760 / R9 280 or bette

Intrusion Protocol is a classic challenging retro 2-D platformer. Play as a computer virus tasked with infiltrating an enemy network to retrieve mission-critical data. As you find the data you will uncover a story that reveals the secrets of your mysterious purpose.
Action
Steam score: 0%
Languages: English
Developer: Somber Dawn Studios
Publisher: Somber Dawn Studios
GAME FEATURES
Single-player
Full controller support
Steam Achievements
YOU MAY ALSO LIKE
FEEDBACK
Intrusion Protocol
$2.99
New Price:
Sold At:
URL:
By participating in Razer Giveaway, I consent that I am above 18 years of legal age. Additionally I agree to all Terms and Conditions and Privacy Policy.
FEEDBACK
Subject
Description
Legal Notices
All third party copyright, trademarks and trade names are the property of their respective owners or licensors. We make no warranty or representation in relation to them We do not claim or assert any rights, title or interest in these properties.

Except where indicated, Razer is not affiliated to the various third party sites in these listings. The accessing of sites, use and purchase of all games titles through the third party sites are subject to the Terms of User/Service of those respective sites.

If you believe that your copyrighted work is posted or made available on this software without your authorization and you claim infringement, please contact us with the relevant information.