0
€0

Xenonauts 2

Price
€39.99
Genres
Strategy, Simulators, Steam
Release date:
18/07/2023
Publisher:
Hooded Horse
Developer:
Goldhawk Interactive
Localization:
EN

Note: This Early Access game is not complete and may or may not change further.

Xenonauts 2 is a strategy game that puts you in charge of a multinational military organization tasked with eliminating an extraterrestrial threat. Working from the shadows, you must seek out and engage the growing alien presence wherever it appears. Expand and manage a covert network of bases across the globe. Pursue research and development to bridge the technological gap with the alien invaders. Train, arm, and command your ground troops wherever the alien threat emerges.

THE ENEMY IS EVERYWHERE

It is 2009 - the Cold War continues, and the Berlin Wall still stands. In the shadows, a secret organization works beyond arbitrary political boundaries to gather information about a greater threat to humanity. Mysterious sightings of unidentified flying objects and unknown beings have grown more common, coinciding with escalating international tensions and panic. Those who report such sightings frequently disappear without a trace, and it is clear that the aliens grow bolder with each passing day. Time is of the essence.

A MYSTERIOUS THREAT

Knowledge is power - unfortunately, little is known about the alien menace when you take charge. You will need to engage in combat operations around the globe to learn what you're up against. Eliminate extraterrestrial forces in deadly tactical battles to recover research samples, allowing your scientists to improve your equipment and slowly uncover the truth about the alien invasion.

  • A massive variety of enemy types will keep you on your toes as you fight against a multitude of species, each with their own strengths, weaknesses, and fighting styles. Securing alien bodies to perform autopsies on will give you insights into their potential weaknesses, allowing you to prepare accordingly.
  • Aliens aren't all you'll be fighting - human agents known as Cleaners work in tandem with the extraterrestrial threat, bringing with them added varieties of troops, combat locations, and mission objectives. The Cleaners work to further alien goals and objectives, operating directly under their influence - any strike against the Cleaners is an indirect strike against their alien overlords. You will have the opportunity to gather intel by infiltrating their bases, securing data, and seeing how far the conspiracy goes.
  • Every combat engagement is an opportunity to learn more about the enemy force and how it fights - if you're willing to take the risk. Will you look to quickly eliminate active threats using explosives, grenades, and missiles, or will you take a more tempered approach to secure bodies and alien technology that can be taken back to HQ for autopsies and reverse-engineering? Will you focus on the development of airpower to bring down UFOs and investigate their crash sites for additional intel? Your adversary has the advantage in both technology and equipment – any choice you make will involve tradeoffs.

IN-DEPTH STRATEGIC LAYER

The war against the alien force takes on a global scale - as they attack indiscriminately, your troops must be prepared to operate across the globe using multiple bases, taking time between operations to rest, recuperate, rearm, research, and eventually reengage the enemy. No two campaigns are the same as complex simulations ensure even the smallest variances in decisions will have far-reaching impacts across the entire game.

  • A small radar station in Alaska detects an anomaly over the Bering Strait. Air Bases in Kamchatka and Yukon scramble jets to investigate, chasing multiple bogeys each, bringing them down over the water. Thousands of miles away, a radar station in Italy works in tandem with response teams stationed at a base in Algeria and an air base in France to take down alien operations on the Iberian Peninsula. Meanwhile, a new base is being built in Southeast Asia where the invaders have slipped through the cracks multiple times, inciting panic. Build, design, and manage multiple bases, each with its own squadrons of fighter jets and transports, radar arrays, research teams, operatives, and more. Consider the limitations of fuel ranges when you place them and use a grid-based construction system to optimally lay each of your bases out. Specialize your bases for detection, rapid response teams, research, manufacturing, and defenses as you see fit.
  • Pursue multiple avenues of research to acquire a vast variety of aircraft, vehicles, weapons, armor, and other battlefield equipment to experiment with. Your approach on the battlefield will be determined by a combination the terrain you're engaging in and what equipment you've chosen to bring to the field. The presence of mechanized combat platforms and vehicles can tilt many situations in your favor as they break through cover and deliver particularly devastating ordnance, though their use can come at the cost of the ability to procure valuable resources from intact alien bodies and equipment. The research tree is vast, with over one hundred projects to unlock, allowing you to take on the alien threat with your own personal strategic and tactical touches.
  • Infuse alien technology across all manner of equipment, and even develop autonomous battlefield combat platforms and sentry guns to assist with your forward operations as well as the defense of your bases. If you give your engineering teams enough time, money, and resources, you'll find yourself well equipped for the threat - unfortunately, all three are perpetually scarce. Will you rush to produce automated combat platforms to minimize the threat to your operatives? Or produce additional dropships to respond to more threats at a time? Or will you seek improved armaments for your fighters to strengthen their ability to intercept and take down alien squadrons?
  • Training centers you build at your bases allow soldiers to improve their combat capabilities during downtime, but actual combat experience is of course of unparalleled value. Each mission gives your operatives an opportunity to improve their abilities according to the actual actions they take in combat, and even earn medals for their deeds.

DEVASTATING TACTICAL COMBAT

Whether fighting in the air or on the ground, your tactical prowess is put to the test when engaging alien attackers. Battles are extremely dangerous affairs, asking you to manage positioning, ammunition, lines of sight, cover, and much more besides - many of your operatives will get wounded, and many of them will die, but those that survive grow more experienced and are more capable of taking on future dangers.

  • Scramble jets to respond to UFO sightings, engaging them in real-time tactical battles that put you in command of your fighter wings. Tell your pilots how to maneuver and who to target, ensuring their victory while also keeping an eye on their fuel gauge and the proximity of your nearby hangers. No forced 1-1 duals here – if the aliens bring a technologically advanced and heavily armed space craft to the fight, gang up and send a whole squadron of your best planes to bring it down. The strategic layer and air battles are closely intertwined, and your careful planning of your global network of bases is of the utmost importance.
  • Put boots on the ground by sending in your operatives for a variety of mission types, pursuing a range of objectives, but beware – your adversaries will not passively wait for you to discover them. Aliens will actively maneuver and seek you out from across the map, moving intelligently to strike at you from beyond visual range, hiding behind cover and taking advantage of the high ground. Maximize your chance of success through effective reconnaissance and lay ambush to eliminate the enemy.
  • The battlefield is a dangerous place, and with an alien threat that will not stand idly by as you try to hunt them down, losses are inevitable. This isn’t the story of an elite squad of heroes winning battle after battle without loss – war is hell, and many of your troops will give their lives to resist the alien invasion. Your veteran troops will be invaluable, but even your basic recruits are skilled soldiers ready for combat. It is up to you to enable them to become the veterans of tomorrow.

Xenonauts 2 is a standalone title that does not need any experience playing the original Xenonauts to follow the story or enjoy the gameplay experience. The punishing battles, in-depth strategic layer, and complex simulations will take fans of the series and newcomers alike through a dark and deadly story about the defense of Earth and all humankind.

 

Trademarks, tradenames, and copyrights are property of their respective owners, Goldhawk Interactive (2023) and Hooded Horse Inc.™ (2023). All Rights Reserved.

System requirements:


MINIMUM:

  • OS: Windows 10
  • Processor: i5-4690 (or equivalent)
  • Memory: 8 GB RAM
  • Graphics: GTX 770 (or equivalent)
  • DirectX: Version 12
  • Storage: 6 GB available space

RECOMMENDED:

  • OS: Windows 10
  • Processor: i5-7600 (or equivalent)
  • Memory: 16 GB RAM
  • Graphics: GTX 970 (or equivalent)
  • DirectX: Version 12
  • Storage: 10 GB available space
These Terms of use ("Terms") set out the legally binding terms for your use of the Website - https://gama-gama.net/ and your continued use of Website represents your consent to these Terms. The validity of this public offer is until February 1, 2025. 1. TERMS AND DEFINITIONS 1.1. “Administration” is GAMING ENTERTAINMENT FZE, a company incorporated in accordance with and by virtue of the laws of the United Arab Emirates, a Delaware corporation with its registered office at Business Centre 103-104, Al Shmookh Building, Umm Al Quwain Free Trade Zone Authority, Umm Al Quwain, United Arab Emirates. 1.2. “Website” - https://gama-gama.net/ 1.3. “User” - an individual who intends to purchase the right to use the Content in the Website. 1.4. “Content” – the results of intellectual activity and the right to use the results of intellectual activity, submitted for purchase in the Internet store. The list of the Content is determined by the Administration. 1.5. “Description” – the information available in the Internet store and designed to familiarize the user with the properties of the Content.). 1.6. “Activation key”– a computer program or code that is a sequence of symbols that allows access to the use of Content, if the Content is protected from unauthorized access to it by technical means of copyright protection. 1.7. “Territory” - European Union countries, the UK and the USA 2. General terms 2.1. This Terms regulate the relations between the Administration and Users related to granting the User the right to use Content within the limits and on the terms provided for in this Terms. 2.2. The Administration, for a fee, grants the User the right to reproduce Content limited by the right to Download and Install (create an instance on the User's Terminal) for personal purposes for further use for its direct functional purpose on the Territory. 2.3. The list of Content is posted on the Website in the program interface of links to the relevant Websites (resources) of the Administration or third parties for downloading/purchasing/ using and/or paying for such Content. The scope of the transferred rights is limited by the terms of this user agreement and/or the terms of the end user license agreement, if such an agreement is present in the Description of the Content or the resource of a third party.. 2.4. You can make a request for Content using Website interface. 2.5. The User gets acquainted with information about the Content, including the characteristics of digital devices and computers necessary for the normal reproduction of Content. If the normal reproduction of the Content is impossible for reasons related to the characteristics of the User's Terminal, the User is deprived of the right to make appropriate claims to the Administration. 2.6. The Content and its contents, including text, graphics, logos, button icons, images, audio clips, digital downloads, data compilations and software, are the property of the Content copyright holders. The content is protected by national and international copyright laws. 2.7. The User is fully responsible for providing incorrect information, which resulted in the inability of the Administration to properly fulfill its obligations to the User. 2.8. The User is fully responsible for the carelessness with respect to his personal data reported on the Website page, as well as for the damage that arose as a result of such an attitude, including, but not limited to, in the case when personal data became known to third parties through no fault of the Administration. 2.9. The User's acceptance of this User Agreement is to make a payment in accordance with the terms of the order, which is simultaneously considered an expression of the User's intention to purchase Content. 2.10. The rights to use the Content are considered transferred to the User from the moment the User pays and provides the Activation Key to the User, or sends the Activation Key to the User via electronic communication to the email address and/or to the User's Personal Account. 2.11. The Administration has the right to assign or otherwise transfer its rights and obligations arising from its relationship with the User to third parties, provided that the rights and interests of the User are respected 2.12. The Administration undertakes not to disclose the information received from the User. It is not considered a violation for the Administration to provide information to agents and third parties acting on the basis of an agreement with the Administration to fulfill obligations to the User. Disclosure of information in accordance with reasonable and applicable requirements of the law is not considered a violation of obligations. The Administration is not responsible for the information provided by the User on the Website in a publicly available form. 3. REGISTRATION AND AUTHORIZATION 3.1. Registration on the Website is carried out by the User on his own by filling out an electronic form posted on the Website 3.2. For the purposes of registration, the User provides the following data: 3.2.1. E-mail address, which in the future will be the login for the User's Account, and to which the Activation Key will be sent if its receipt is necessary for the use of the Content. 3.2.2. The unique password that protects the User Account. 3.3. You should enter your login and password for authorization 3.4. 3.4. The User is responsible for the safety of his login and password, including the possibility of access to them by other persons and excessive ease of password. The Administration is not responsible for the disclosure of the User's login and password, if this happened due to the User's negligent attitude to their data and User Terminals, and other means of recording where the specified information is stored. 3.5. The User is fully responsible for providing incorrect information about the email address 3.6. If the User doesn’t want to use the Website, he has the right to delete his Account. The User must notify the Administration about this. The user can register again using a different email address 3.7. The User agrees to the processing of personal data by the Administration in accordance with the Privacy Policy of the Website https://gama-gama.net/ 4. REMUNERATION 4.1. The User pays remuneration to the Administration for the right to access the Content. 4.2. The User must familiarize himself with the information about the Content, including the characteristics of digital devices and computers necessary for the normal reproduction of the Content. If normal reproduction of the Content is impossible or the User's digital device or computer has been damaged as a result of an attempt to reproduce the Content due to a discrepancy between the required and existing characteristics of the digital device or computer, the User is deprived of the right to make appropriate claims to the Administration. 4.3. Payment is made using bank cards and a payment system. The moment of payment for the Content is considered to be the receipt of information from the payment system about the transfer of funds from the User in full. User must read the terms of commissions and other conditions terms before the time of payment.. 4.4. The Administration shall refund funds only in the event of technical failures in the operation of the Website caused by the Administration for more than 24 hours from the moment the User notifies the technical support service. The funds will not be refunded for the User's use of training tariffs (test version). 4.5. The refund is made by non-cash transfer of funds to the User no later than 30 (thirty) calendar days from the date of receipt of the relevant request, this period may be extended due to the conditions of money transfer by the payment system, in this case the Administration is not responsible. 5. ADDITIONAL TERMS 5.1. The User receives an Activation Key within 48 (Forty-eight) hours from the date of payment of the Remuneration in accordance with section 4 of the Тerms 5.2. If the User has not received the Activation Key at the specified time, the User may request a refund of the money paid. The funds are returned to the bank card within 30 (thirty) calendar days from the date of providing information about the card details , only if the Administration has received bank details. Time of the refund depend on the payment system and the bank 5.3. If there is no indication of the price or other conditions necessary for the User to purchase Content or a promotional offer on the Website, the User must contact technical support. 6. THE USER GUARANTEES THE FOLLOWING 6.1. The User will use the Content for personal purposes. 6.2. The User is not a person who, in accordance with the legislation of his state, of which this person is a resident or from whose territory he purchases Content, is prohibited from purchasing this type of Content. 6.3. The User has a sufficient degree of legal capacity to acquire the rights to use the Content selected by him. 6.4. The User hereby confirms that he understands, accepts and agrees that any Content may contain audio and/or video effects that, under certain circumstances, may cause people prone to epileptic or other disorders of the central nervous system to worsen such conditions. 6.5. The User understands and agrees that the constant use of a personal computer for a long period of time may lead to various complications of the physical condition, including, but not limited to, vision problems, scoliosis, various forms of neuroses, as well as other undesirable and negative consequences for the User's body. 6.6. If the User is a minor, he guarantees permission and approval from his parents or legal representatives to conclude this Agreement, register an Account, dispose of funds provided by parents, legal representatives or with their consent by third parties. The use of any payment method is a confirmation of the above permission and approval. 6.7. The Administration takes child safety seriously and recommends that parents and legal representatives of children spend more time with children while they are on the Internet to know what information their children receive using the Internet, as well as to control the use of Content. Parents and legal representatives of children should try to control the use of e-mail and other communication methods by children, as well as payment for services. If necessary, parents and legal representatives of children can use special programs that allow children to restrict access to certain Websites, which will help make the Internet space safer for children 6.8. The Administration reserves the right to request documentation from a parent or other legal representative of a minor User, to require any other written confirmation or permission from a minor User, which the Administration considers necessary to use the Content and make payments 7. GUARANTEES 7.1. The Administration guarantees that the Website does not distribute malicious programs that can harm the User's Terminal, software, files and information on the User's Terminal 7.2. The Website and Content are provided on an "as is" basis. As a result, the User agrees that the Content may not meet his individual preferences and expectations. The Administration will make all commercially reasonable efforts to ensure the continuous operation of the Website, accordingly, the User agrees that the operation of the Website and the activation of Content may contain errors and may be interrupted. The Administration does not guarantee that the performance of Users' personal computers or other devices will be sufficient to use the Content. 8. MESSAGES FROM THE ADMINISTRATION 8.1. The User hereby gives his consent to receive advertising information from the Administration to the email address provided during registration on the Website. In case of disagreement, the User has the right to unsubscribe from the mailing list. 8.2. The User has no right to refuse to receive non-advertising information from the Administration, which may relate to the use of the Website and Content, for example, changes in the amount of Remuneration, warnings about preventive maintenance, etc. 9. APPLICABLE LAW 9.1. US law applies to the relations between the Administration and the User. All disagreements are resolved through negotiations, if it is impossible to settle disagreements through negotiations within 30 calendar days from the date of receipt of the claim. 9.2. Under no circumstances shall the Administration be liable for any indirect, special, punitive, collateral damages, lost profits, etc., even if the Administration was aware of the possibility of such. 10. Contact 10.1. Users can contact the Administration through the page https://gama-gama.net / for more information and sending support requests.
PRIVACY POLICY 16/03/2022 Please read carefully our Privacy Policy for the processing of personal data. This Privacy Policy covers the processing of information (“Personal Data”) collected while using the Website. For the purposes of this Privacy Policy, the terms "personal data" and "personal information" have the same meaning and are used interchangeably. By using the Website, you agree to the collection, use and exchange of information about you by the Company in accordance with this Privacy Policy. If you have any questions or concerns regarding the confidentiality of the website http://gama-gama.net/ («Website»,) please send us a detailed message us. We will try our best to solve your problems. If you do not agree with the Privacy Policy and do not give your consent to the processing of personal data of you and your children, do not use the Website. Following the principles of good faith and acting in your own interest, if you started using the Website, it is considered that you have agreed with all the provisions of this Regulation, without exception, and have given consent to the processing of personal data. It is important for the user of the Website to carefully read the Privacy Policy. The privacy policy may change over time in accordance with changes to the Website or for other reasons. The company indicates the date of revision of the Privacy Policy, which reflects the date of the last update of this Privacy Policy, so that users can be aware of the current Privacy Policy at any time. We encourage all users to review this Privacy Policy to stay updated on our current privacy practices. GENERAL TERMS AND CONDITIONS This Privacy Policy is an official document of the Website http://gama-gama.net/ and determines the procedure for processing and protecting information of individuals (hereinafter referred to as Users) using the Website. The company providing the Website: GAMING ENTERTAINMENT FZE, a company incorporated in accordance with and by virtue of the laws of the United Arab Emirates, a Delaware corporation with its registered office at Business Centre 103-104, Al Shmookh Building, Umm Al Quwain Free Trade Zone Authority, Umm Al Quwain, United Arab Emirates. (the "Company"). The terms “we,” “us,” or “our,” as used in this Privacy Policy, refer to the Company. Confidentiality compliance is important for the Company, because the purpose of this Privacy Policy is to ensure the protection of human rights and freedoms while processing personal data, including the protection of life, personal and family secrets from unauthorized access and disclosure. This Privacy Policy describes how we process personal data - any actions (operations) or a set of actions (operations) performed using automation tools or without using such tools with personal data, including collection, recording, systematization, accumulation, storage, clarification (update, change), extraction, use, transfer (distribution, provision, access), depersonalization, blocking, deletion, destruction of personal data. Relations related to the processing of personal data and information about users of the Website is governed by this Policy and other documents, if such are accepted and communicated to the Use. The processing of personal data is carried out on a legal and fair basis, acting reasonably and in good faith and on the basis of the principles: - the legality of the purposes and methods of processing personal data; - conscientiousness; - compliance of the purposes of processing personal data with the purposes predetermined and declared in the collection of personal data, as well as the powers of the Company; - compliance of the volume and nature of the processed personal data, methods of processing personal data with the purposes of processing personal data The Company collects only those personal data that are necessary for the successful operation of the Website and only the data provided by the User. The purpose of processing personal data is to fulfill the obligations of the Company to the Users in relation to the use of the Website. WHAT PERSONAL DATA WE COLLECT The information that is collected by the Company allows you to personalize, improve and continue using the Website. In connection with certain aspects of the Website, we may request, collect and / or display some of your personal information. The company collects various data and information provided by you as an adult user. The company does not collect information from children. When a user creates an account User provides information that may be personally identifiable information, such as a password and email address. The User acknowledges that this information may be personal, and by creating an account on the Website and providing Personal Information to the Company, it allows the Company to potentially identify the user and, therefore, the user cannot be anonymous. We may use your account contact information to send you information about the Website when we believe that information is important and useful to you, as well as for advertising and newsletter purposes. You can unsubscribe from these messages through your account settings, although we nevertheless reserve the right to contact you when we deem it necessary, for example, to reset your account password. We may collect information related to the specific device from which you access the Website, network information and hardware model, and information of device interaction with our Website. The Company doesn’t provide services to children under the age of 13. This policy do not contradict and is applied consistently and in accordance with the Children's Online Privacy Protection Act (COPPA), the 2018 California Consumer Privacy Act (CCPA) and European Union General Data Protection Regulation (GDPR) depending on the application. INFORMATION SECURITY Your account information will be password protected for ensuring your privacy and security. You should prevent unauthorized access to your account and Personal Information by choosing and protecting your password appropriately and restricting access to your device If you ever decide to delete your account, you can do so by emailing to Company. If you terminate your account, any link between your Account and the information we hold will no longer be accessible through your Account. The Company takes precautionary measures - including legal, organizational, administrative, technical and physical - in order to ensure safety of personal data against unauthorized or accidental access to them, destruction, alteration, blocking, distribution, as well as against other illegal actions of third parties. The company cannot guarantee security of any information that you transmit over the Internet. No data transmission over the Internet is guaranteed to be completely secure. Third parties not under the control of the Company may illegally intercept or access transmissions or private messages. You are responsible for the personal data that you use on public platforms. Please take precautions when disclosing your data. ANALYTICAL DATA In order to measure performance indicators and optimize our Website, and conduct analysis to improve the Websites we provide and prevent fraudulent activities, the Company may use the SDK in the Website to collect and analyze information and data related to the user and device, including the number of views, clicks on ads, installations and other indicators that allow you to assess the effectiveness of the Website and, as well as the actions performed in the Website after installation. USE OF PERSONAL DATA Personal information that is collected by the Company is used for the performance of the Website, also may be used for the provision, development, support, operation and improvement of the Website; processing your requests; communicating with you, including, for example, sending you information; for our own marketing purposes: we may notify you of new contests, promotions, awards, upcoming events and other news about our and chosen partners; carry out or comply with any applicable laws, regulations, legal procedures or other legal obligations; protect or prevent harm, fraud or financial loss; or encourage, detect, investigate and help prevent security, fraud, or technical problems; and to protect our legitimate business interests and legal rights. The company does not share any data with third parties or external organizations without your consent. In special circumstances, the Company may transfer your information, including Personal Information, including but not limited to when it may be legally necessary, required for compliance with laws or in response to legal requests or legal process. CORRECTION OF YOUR PERSONAL INFORMATION You can request to review and, if necessary, correct the Personal Information that we collect about you. To do this, please contact us using one of the contact methods. REFUSAL FROM ADVERTISING LETTERS We allow you to choose what forms of communication you receive from us. You can opt out of receiving promotional emails from us by following the instructions in those emails. If you choose not to receive promotional emails, we may still send you non-promotional emails, such as emails about our current business relationship. STORAGE AND TRANSFER OF YOUR PERSONAL INFORMATION Personal data provided under this Policy will be stored in secure servers. We take many steps to protect your privacy. By using our Website, you understand and agree to the provisions of this Policy. We store your personal data so that you can continue to use the Websites for as long as it is necessary to fulfill the relevant purposes described in this Privacy Policy, as may be required by law, for example, for tax and accounting purposes, or as it may be otherwise delivered to you. By interacting with the Company, you can easily keep your personal data and information up to date. We will store your personal data and information for the period that is necessary to fulfill the purposes described in this Privacy Policy, except in cases of when longer period of data and information storage is required in accordance with mandatory requirements. CHANGES TO THIS PRIVACY POLICY The company may make changes to this Privacy Policy. The use of the information we currently collect is regulated by the Privacy Policy in effect at the time that information was used. If we change the way we collect or use information, we will notify you by posting an announcement on the Website and / or sending you an email. The user is bound by any changes to the Privacy Policy when he or she uses the Websites after such changes were first posted.