Feeds

Hey frumious Reg gamers: BANG-or-SNATCH? We look at Second Son and Thief

Lawless abiding citizens

Security for virtualized datacentres

Power games

Therefore large-scale encounters are not only genuinely tough, but also ever evolving in terms of available approaches. Think of it as something similar to completing the same task over and over, but being actively challenged to change your method each time.

Second Son

Zap! Pow!

As Delsin is in essence a power sponge, it means you'll spend the fruits of such battles levelling-up his abilities too. By focusing on underhand or heroic mission types, you can unlock either light side or dark side powers, so giving the game enough content for a second run-through.

Missions do vary more than I'm giving the game credit for, however, as the campaign has you investigating crime scenes, chasing down fugitives or even battling the odd boss. The city serves up ad hoc missions too, which eventually lead to chunks of Seattle becoming fast travel zones.

Second Son

Purple nasties

If you're a PS4 owner then you really should treat yourself to Second Son. There's nothing quite like casting a temporal grenade into the midst of your enemy, seeing them all blasted away in slow motion, before carefully picking them off from a distance. Or else flying to the top of the nearest skyscraper, before plummeting down to cause a Hulk-sized shockwave.

And though a little more variety would have been nice, the fact I've yet to put down Second Son for over a week speaks volumes. My advice would be to buy it, gaze admiringly at those stunning visuals, fly up buildings, blow up concrete wielding bad guys and try not to overthink it.

Score 4.0/5.0

Thief

Square Enix are the masters of the reboot these days, having already tackled Deus Ex and Tomb Raider to great effect. Next up on the hit list is Thief. A sneak-em-up that first saw the light of day back in 1998.

Thief

Oh darn it, the safe is guarded, might as well go back home...

If you remember that game, and its successors, then you'll find a lot of familiar ground in Thief, circa 2014. The return of master thief, Garrett, his same old stomping grounds, a surplus of shadows and the handy water arrow – perfect for extinguishing pesky torches.

You'll also find all kinds of new trappings too. Not content with simply updating the old 'sneak, steal, get away' formula, the studio has bolted on extras, with fair-to-middling success. On the good side, is the character's new 'swoop' move that sees him elegantly dash from cover to cover at the press of a button.

Protecting users from Firesheep and other Sidejacking attacks with SSL

Next page: Crooked customiser

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.