Game Face of War - effective online shooter in which to lay or defuse bombs lead the battle on the side of the militant group or a special police unit.
The user indicates on whose side the tasks will be executed. Depending on the option chosen, he is offered several models of weapons to change guns during the match. You also need to decide on a uniform and even customize your clothes. Terrorists plant bombs and try to kill the special forces, and they intend to defuse an explosive device and kill the bandits. When all the decisions have been made, notify about the desire to start the task, and wait for the rapid automated formation of teams consisting of real players.
The character appears in the face of war in one of the gorgeous three-dimensional locations. There are no paid upgrades in the project, which equalizes users as much as possible, makes it possible to concentrate on the art of armed confrontation. You can control the movement of the ward using the joystick on the left, and on the right side there are action keys. A timer counting down the time of each task is located in the upper center panel.
Distinctive features of the game Face of War:
confrontation between special forces and terrorists;
automatic selection of teams for PvP matches;
an impressive selection of weapons;
cool detailed arenas;
customization of the form and guns.
The shooter has many similarities with CS, weapons and dialogues are similar. In addition to the high-quality adaptation of the gameplay to mobile gadgets, you can notice the difference in the nuances of the sites. Also, the project provides for a third-person view, and not from the first, as in the legendary predecessor. This allows you to conduct a thorough assessment of the situation, to respond more quickly to force majeure, which is inevitable when participating in complex missions, no matter which side you have to fight for the goal. Thanks to intuitive controls, the player quickly masters the available maneuvers, easily adjusts tactics in the process, changes weapons and behavior style according to the circumstances. Save or destroy, achieve what you want and get a lot of unforgettable emotions!
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Attention! All files represented on this site either were found freely distributed on the internet or by their authors’ permission. If any of materials on this site violates your rights,
report us