Feeds
75%
The Darkness II

The Darkness II

Shadow people

  • alert
  • submit to reddit

7 Elements of Radically Simple OS Migration

Review On paper, there's very little to like about The Darkness II. Take your character Jackie Estacado, for starters. Even before taking into account the unspeakable evil to which he is host, few gaming protagonists are as monstrously unsympathetic as the contract killer turned mob boss.

The Darkness II

Hit the fairground

Then consider the game's central conceit, 'quad-wielding', which augments regular gunplay with the manifestation of The Darkness: two hideous, serpent-like appendages that burst from Jackie's shoulders with an insatiable bloodlust.

And how about the clichés? The supporting cast of pasta-eating Goombahs called Vinnie or Jimmy or Chief. Or the spectre of his brutally murdered girlfriend Jenny, the “only good thing in his life”, fuelling Jackie's inexorable descent into hell?

The Darkness II

Knocking one out got a bit messy

So is there anything to prevent The Darkness II's own descent towards the hell of the pre-owned shelf? Well, surprisingly, plenty. Its mechanics might feel contrived to punch a niche into a saturated market and its narrative employ some tired conventions, but within the confines of an interactive B-movie, The Darkness II is a thrilling barnstormer of a shooter.

In remaining true to its source, it's also a game of intelligent contrast. Ripping out an enemy's spinal cord through his sphincter or eating his still-beating heart to regain health are obvious grotesqueries, even when tempered graphically by stylised cel-shading and cross-hatching. But the supernatural comic book horrors prove less shocking, splattered across the backdrop of a brutal criminal underworld.

The Darkness II

Day of the tentacle

For all its Mafia clichés and ribald humour, it's a disturbingly mature depiction of violence and vice. Here, vendettas are repaid by butchering innocent family members in front of your eyes and clients pay to beat-up prostitutes in squalid, factory-sized whorehouses.

Build a business case: developing custom apps

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?