Feeds
55%
Resident Evil: Operation Raccoon City

Resident Evil: Operation Raccoon City

Dead again

  • alert
  • submit to reddit

High performance access to file storage

When in roam

The freedom to roam through these iconic, once-rendered locales makes for an enjoyable trip down memory lane. As do occasions when you cross paths with famous characters and monsters – from an early encounter with the G-Virus-infected Brad Vickers and repeated fights against Tyrants, to shoot-outs with Leon S. Kennedy and Ada Wong.

Resident Evil: Operation Raccoon City

Don't shoot, or I'll kill this dead thing

In principle, it also plays like a Resident Evil – at least, RE4 and onwards. Killing zombies with headshots remains as irresistible as ever, but that's where the mechanical similarities with Capcom's work end.

Everywhere else Six Slant Games imposes its own trademark sensibilities and, aside from an impressively diverse stream of zombie types, Bio-Organic Weapons and human Special Forces opposition throughout, the results are mostly disappointing.

Resident Evil: Operation Raccoon City

Dead as a claw nail

Just how disappointing depends if you're playing solo or with human team-mates. So often the case with squad shooters, there are obvious drawbacks to both. Go it alone and you're at the mercy of the game's egregious AI. Indeed, you may witness team-mates using their class-specific abilities but then again you are just as likely to watch them emptying full magazines into walls for no apparent reason or standing blithely in fire as they burn to death.

However undependable they might be, AI team-mates are still preferable to the lack of challenge presented by co-op, even on the highest difficulty setting. There's scant requirement for teamwork outside of perfunctory heal and revive mechanics, and gameplay rarely demands use of class-specific abilities.

Resident Evil: Operation Raccoon City

Warming corpses

Devoid of distinguishing co-operative features, it's a serviceable campaign at best. It's one where dubious enemy AI conspires with monotonous level design and strict linearity to make for a four-player turkey shoot that is as mindless as it is forgettable.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.