Feeds

Top Ten Arcade Classics

Shinryuken! Feel my burning vigour!

High performance access to file storage

Product Round-up What do you remember about being twelve? I remember spending a whole summer wishing I could hang out with the cool kids but instead nicking stuff from Woolworths and ramming coin after coin into Dragon’s Lair and Defender.

Seventeen? Sometimes I ponder my misspent youth playing pool in Sneaky Dee’s and ramming coin after coin into Street Fighter while waiting for the pool table. It didn’t matter that the graphics were basic - these games were addictive because of the simplicity. High-score name-check FTW. The only arcade action I get these days is shooting aliens at the cinema but luckily when I get all nostalgic the web is on hand with the arcade classics just a click away.

And don’t worry, it wasn’t just me that put Woolies out of business.

Taito/Midway Space Invaders

1978

Did you get leg and back cramps sitting round that bloody table, hunched over for hours on end without so much as blinking? I know I did. Using just a single laser, this game managed to wipe out all competition and become the first coin-op video arcade game to go global. Trying to defeat a sheet of alien invaders who marched from side to side, slowly but threateningly advancing on Earth may have made for a very simplistic game, but it was incredibly addictive. Each time you wipe the lot out you get another army but one row closer, creating a no-win situation that you still couldn’t tear yourself away from - arghhhhh! Shoot down the fast spaceship flying across the top to up your high score.

Space Invaders

Namco Pac-man

1980

I hate that maze – it’s eaten too many hours of my life. Desperately fleeing from the four ghosts coming for you, I still remember the sense of relief when you get a pill and know you can switch on them. I don’t know why this game makes my heart pound but it does. Maybe it's the lightning-fast pace making your hand-eye co-ordination look like that of a sloth. The fact I have this on my iphone too - and I know I’m not the only one - shows its lasting appeal. Wakka wakka wakka.

Pac-man

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.