Feeds
45%
Star Wars: Force Unleashed II

Star Wars: The Force Unleashed II

Bantha poodoo?

  • alert
  • submit to reddit

High performance access to file storage

Lightsabre duels with dual lightsabres

Force Unleashed II starts off promisingly enough. But, of course, Star Wars games always do. The explosion of the LSO's brass section and the trapezoidal prologue rolling off into the field of stars maintains its magical ability to blow away cynicism and replace it with childlike wonderment.

Star Wars: Force Unleashed II

A slice of the action

This impetus is sustained through Force Unleashed II's opening hour. Despite glaring paradoxes in continuity – the severity of which depends upon your choice at the end of the original – the narrative initially engrosses through impressive cut-scenes. Graphics and physics are palpably improved over the original. And the new dismemberment system, twin lightsabres and refinement to Force Power controls make opening encounters feel fresh and entertaining.

But it's not long before you begin to feel a great disturbance in the Force, as if a couple of hundred developers' imaginations suddenly cried out in terror and were suddenly silenced. All too quickly, Force Unleashed II reveals itself as genre by numbers, with combat proving particularly shallow compared with the best brawlers, such as God of War and Castlevania: Lord of Shadows.

Where those games struck a fine balance between player abilities and enemy attack patterns, Force Unleashed II debases its combat. Stereotyping enemies with one-dimensional attack patterns and vulnerabilities, combat feels patently formulaic as you weaken enemy type 4 with Force Power B, before killing them with attack pattern X.

Star Wars: Force Unleashed II

Roundhouse flick

Combat is easy enough wielding lightsabres alone, but Force Powers are all too powerfully reductive. With the vast majority of levels based around vertiginous walkways, the predominant Stormtrooper classes can simply be picked up and tossed over the side with Force Grip. And heavier, resistant enemies need only a few blasts of Force Lightning before taking them down with a couple of button presses in woefully perfunctory QTEs.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.