If you are looking for software to use, go to Huajun Software Park! software release AI product list

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card and a photo of yourself holding the ID card), and send it to email http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: Home pagePC softwarefree gamesOther games Public enemy of the whole network
Public enemy of the whole network

Public Enemy on the Internet Chinese version

QR code
  • Software licensing: shareware
  • Software size: 447.75MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2024-12-31
  • Application platform: winall
  • Software language: Simplified Chinese
  • Edition: Chinese version

Software introduction Related topics FAQ Download address

Basic introduction
Public Enemy’s first LOGO
The Chinese version of Public Enemy is a brand new independent hacker simulation game. The Chinese version of Public Enemy is Aluba. Produced and published by Studio, in the game Public Enemy on the Internet, players will become a top hacker and find information that is beneficial to themselves among various complex information to complete various tasks they receive. The game combines real-life issues such as network security, big data, and privacy leaks.
Similar software
Release Notes
Software address

Screenshot of Public Enemy All Network

Public enemy of the whole networkGame introduction

During the "friendly" communication in the team project meeting, we discovered that when the Internet continues to penetrate people's lives and accelerate the transmission of information, a negative event can quickly spread throughout the entire Internet.

In this process, crimes will be exposed and punished, which will make people happy; but some people will also suffer malicious curses and insults from network keyboard warriors. When these online violence continue to escalate, the consequences often go beyond the incident itself, and some even end their precious lives due to the pressure.

Therefore, we decided to develop a game related to the themes of "hacking", "human flesh" and "private data leakage". We hope that players can play the role of a hacker or social engineer (human flesh) target person and find out their privacy secrets. We hope that through this process, players can think and make their own correct judgments.

Screenshot of Public Enemy All Network

Public enemy of the whole networkGame Highlights

​​ 1. Players will accept a series of tasks as a top hacker

2. Then use various social engineering techniques to accomplish the goal and find out the truth of the incident

3. In the process of accepting the entrustment from reporters and completing one social work incident after another

4. We need to use a variety of different social engineering methods to achieve our ultimate goal

5. Each different social work method will have corresponding conditions for use.

​ 6. When used successfully, you will get clues

Public enemy of the whole networkGame description

After more than a year of hard work, we have completed part of the game concept, implemented some social engineering (human flesh) methods, and integrated them into our game:

      web search

​ ​ Players collect basic information about the target object through the browser search function.

      database

Use known information to enter into the database, and after filtering, there may be other information about the target object.

      crack

​ ​ Generate passwords through the obtained target person information, which can be used to log in to accounts on various platforms (including email, social platforms, chat software, etc.).

      Disguise

Obtain the target’s needs, social circle, etc., choose a disguise based on the information, and obtain more information by contacting the target.

      chat idioms

After adding the target person as a friend, use chat routines to obtain information.

      Image analysis

​ ​ Obtain valuable information and related clues from pictures.

      fishing

​​Send phishing links to invade the target person’s hardware devices (computers, mobile phones) and obtain private information.

Of course, more advanced social engineering methods will be unlocked later!

Screenshot of Public Enemy All Network

Public enemy of the whole networkGame features

      Strong sense of immersion

In the fictional world, the player plays the role of a hacker, accepts the commission of a company, completes different social engineering events, and experiences real hacking operations.

      Various ways to play

There are multiple systems in the game. In addition to the social engineering system, there are also reasoning, tracking, puzzle solving, destruction and invasion systems that players need to break through one by one.

The plot is complicated

You will face a large number of choices and puzzles in the game, and different choices may lead to different endings.

   Many characters

There are many characters, each with their own personality traits, and there are unknown stories behind them. It is up to you, as a hacker, to discover the truth of the events one by one.

Screenshot of Public Enemy All Network

Public Enemy Network Update Log

​​ 1.Fix some bugs

​​ 2. Optimized some functions

      特别说明:本站为您提供的全网公敌中文版是steam官方发行平台下载,请支持正版哦~

Huajun editor recommends:

Public Enemy is one of the best software in the industry. I believe that many friends will have used it. If you don’t use it anymore, you will be OUT. This site also prepares for you"Plants vs. Zombies: Garden Warfare",Mount & Blade Fire & Sword,Dancing online PC version,Dr. Mary mini game,Forest Ice and Fire Man 2 Invincible Edition

FAQ

Public enemy of the whole network

Public Enemy on the Internet Chinese version

close