Feeds
60%
Hunted: The Demon's Forge

Hunted: The Demon's Forge

Take a bow

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Who's in control?

You control Caddoc and E'lara, two mercenaries embroiled in a thinly-sketched and woefully-familiar adventure centreing around evil hordes and enslaved villagers. A human warrior and elven archer, Caddoc and E'lara's traits form the game's cornerstone mechanic. Although both wield mêlée and long-range weapons, Caddoc's naturally suited to close combat, while E'lara's most effective at distance from behind cover.

Hunted: The Demon's Forge

Light at the end of the arrow

That's nothing new, of course – archers have provided ranged support for warriors since the inception of the fantasy genre. But the combination of real-time combat, third-person perspective and cover-based shooting makes for a novel take on the Action-RPG formula.

Of the two characters, E’lara steals the show – and not just for her scant attire and willowy elven figure. Despite a decent range of combos and magical abilities, Caddoc’s hack-and-slash combat proves unsatisfying beyond the first couple of hours, whereas pulling off headshots with E’lara’s bow and arrows entertains throughout.

Hunted: The Demon's Forge

If at first you don't succeed, leg it

A suite of combinable magic abilities adds tactical variation to combat. For instance, Caddoc can hurl multiple enemies into the air where they’re more vulnerable to E’lara’s arrows. The system works admirably in split-screen and on-line co-op, but largely fails when playing alone. Constrained by the real-time mechanics, and without the aid of traditional RPG action cues, your partner’s AI, although competent in basic combat, is much less dependable when pulling off combined attacks.

Application security programs and practises

Next page: Switch it up

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.