Feeds
75%
The Adventures of Tin Tin

The Adventures of Tintin: the Game

Quiffly does it

  • alert
  • submit to reddit

High performance access to file storage

Review Until I was five, my dad worked at Cern and we lived in the Jura Mountains across the France-Switzerland border. At weekends my mum would take us to Jouets Weber, the largest toyshop in Geneva. It stocked a large number of Tintin books, which my mum translated to me at bedtime.

The Adventures of Tin Tin

Take a hit and throw up

The memories of this fearless boy reporter and his faithful, if slightly sarcastic hound have always stayed with me and as soon as I got an albino ferret he was destined to be called Milou - better known to non-Francophones as Snowy.

So on receiving The Adventures of Tintin, my first thought was please let Snowy be a playable character. To give developer Ubisoft credit, it anticipated this and I'm pleased to report that, during certain segments, you can indeed play the white mutt. He can even sniff down a baddie or two, just to help out. Barking at rats has never been better!

The Adventures of Tin Tin

Pull a bird

I start the game as a very Justin Beiber-looking Tintin embarks on a hunt for some priceless scrolls from the pirate golden age that will surely lead to wealth and treasure beyond imagination. I have collect my motley crew to outwit various caricature criminals and crooks to discover the truth surrounding the Secret of the Unicorn.

Tying in to the movie of the same name, the game uses the themes and locations introduced in the film. Ubisoft has boasted that it worked alongside the film's producers and has tried to preserve the Tintin legacy - if not the slightly worrying throw-away racism.

The Adventures of Tin Tin

Crouching writer, hidden badly

From the outset, I want to convince myself this isn’t just another cash in, and I'm please that it oozes quality, from the voice acting to the pretty, pretty graphics. Visual highlights include the watery escape sequences and a very stormy plane ride.

High performance access to file storage

Next page: Horn of the unicorn

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.