In this game, you take on the role of the Secret User, working within a shady computer application. Your task is to communicate with clients referred to you by high-ranking bosses and solve their problems. To address each client's issues, you must create the correct requests.
First Contact with the Client: Each client explains their problem to you, typically involving three distinct requests. You need to understand these requests clearly and craft the right solution.
Request Structure: Each client is allowed three requests. These requests are based on three key elements.
User: The name of the person making the request. This shows on whose behalf the request is made.
Command: The title or subject of the request. This defines the area where you need to take action.
Action: The specific action required. This is what you need to do to resolve the issue.
Answering the Door: Opening the door can lead to sudden and potentially deadly consequences if the visitor is a hitman. Therefore, make sure that the person knocking is not a hitman before opening the door.
Hiding Under the Bed: Instead of opening the door, hiding under the bed can be a way to protect yourself from a hitman, provided you are well-prepared. However, if the visitor is not a hitman, this could lead to them leaving or becoming suspicious. So, consider your decision carefully.
When someone knocks on your door, it could be a girl you do business with, a delivery person or someone else. However, if the visitor is a hitman, it is very important to know how to handle the situation. Here are some ways and items you can use to protect yourself from a hitman:
Alarm System: If your hunger, thirst, or mental health levels are low, you can use the alarm system to distract the hitman. The alarm detects any movement in your house, catches the hitman's attention, and may help you avoid danger.
Security Camera: If the person at the door is a hitman and notices the camera, they might delay their attack, break the camera, and wait for another opportunity to strike.
Bulletproof Vest: If you get shot by the hitman, the bulletproof vest can give you a second chance at survival by reducing the impact of the bullets. However, remember—if the hitman realizes you survived, they’ll make sure to finish the job the next time.Hitman Alert
In the hitman world, things can get complicated and dangerous. One of the most important keys to survival is keeping your digital footprint to a minimum. There are four critical factors that can trigger the hitman. If you pay attention to these, you can stay hidden and safe.
Window: Keep your windows closed at all times! This is crucial to avoid being watched from outside. Hitmen can spot your location and track your movements through windows. Always ensure your windows are shut to avoid being monitored.
XWeb Application: Don’t make incorrect requests! Creating faulty requests through the XWeb application could expose your location. Make sure your requests are accurate, and always stay vigilant. A single wrong move could lead the hitmen straight to you.
VPN Usage: Always run a VPN! Use a VPN to hide your online activity and prevent tracking. Ensure your VPN is active at all times, or your location could be revealed.
Virus Scan: Regularly scan for viruses! Spyware and viruses can compromise your device, allowing hitmen to track you. Keep your system clean by running frequent virus scans and ensure you leave no digital trace.
Ordinary: 5% chance
Low thirst: 10% chance
Low hunger: 10% chance
Low mental health: 10% chance
Open window: 100% chance
Closed Vpn: 100% chance
Virus scan not performed: 100% chance
Incorrect request: 100% chance
Extra- The window lock might break: 5% chance
Extra- The hitman might introduce himself as a delivery person: 5% chance
Did you like this post? Tell us
Leave a comment
Log in with your itch.io account to leave a comment.