Feeds
75%
The Darkness II

The Darkness II

Shadow people

  • alert
  • submit to reddit

Business security measures using SSL

Let's shed some light...

Brutal as its world may be, the story is written with remarkable subtlety. It's starts out as regular comic book sequel stuff, naturally. After finally managing to control The Darkness, Jackie has turned his back on his superpowers.

The Darkness II

One too many disco biscuits and you go mad

Cue the appearance of the Brotherhood of The Darkness, a seemingly indomitable enemy, hell-bent on controlling The Darkness for their own nefarious purposes.

With half his mob killed in the prologue and, he himself, torched alive, Jackie is left with a simple choice: repress his superpowers and go straight to hell, or re-embrace The Darkness to rise from the dead and exact his bloody revenge.

The Darkness II

I'll make you shake

So far, so humdrum. The plot's saved, however, by some expertly-crafted twists and turns. These are centred around frequent jolts into an alternative reality, where Jackie is simply a nut-job in an asylum, and his mob friends are nothing more sinister than doctors, nurses, orderlies and fellow inmates.

Is Jackie evil personified or simply a tortured soul? Are the horrors he commits real or just a figment of a sick mind?

The Darkness II

Dead can usually be found underground

It's a device that injects the narrative with unexpected pathos, teasing redemption for the irredeemable Jackie. And it's one that brings welcome regular respite from the incessant carnage of combat.

New hybrid storage solutions

Next page: Exterminate...

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.