Takumf

intro.txt

Dec 26th, 2014
101
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.06 KB | None | 0 0
  1. Hello everybody, sorry for long and awful post.
  2. I recently found my old computer and was able to rescue most of a command line game I was developing in Junior High and now I would like to have a bit of a show of hands: would you be interested in playing, and if yes what operating systems are you using?
  3. A bit about the game itself: Here is a poor excuse for entry flavour text along with manual. Basically, you are a Technocracy (Mage the Ascension) agent tasked along with two other agents to infiltrate strange system of vaults of dubious origin. Term did not exist back then, so instead of SCP I created TR&R (Technocratic Rescue and Reconnaissance) division specialised in such tasks. Most of the things you will do is hacking accounts and internal network of vault system, along with discovering history of compound. As far as interface works, you can train a bit in Telehack.
  4. The knowledge of system and general World of Darkness is not needed, since it was basically my creation loosely based on available materials about Technocracy. There are no mechanical elements, most of the 'magic' done is with your own wits and a bit of programs that act in a bit of guided hacking. You don't need to be UNIX guru to play, some knowledge of command line is a plus but not required.
  5. How does story progress? From time to time, after particular actions, player will get a code to type in another program, it will provide flavour text associated with it and likely change some of the progression further down the line. Game is linear, but provides (iirc) 5 different paths to 5*n endings. I don't remember for certain what was the value of n and if it was a constant or variable ;). Now I know how to make multi-threaded programs, so flavour text program will likely be integrated into game itself as a separate command.
  6. Where is the problem? First of all, I did not rescue all of the data, some of it will be lost forever and I will have to recreate it from semi-coherent notes I left in my draft book. Other parts are actually encrypted and... I'll have to crack my own work to get all the data. Plus 14 years ago I was only a beginner and code quality is atrocious with dire need of attention. Good thing I did it in C and not something else or I would likely have to redo all of it from ground up. Work purely done under Linux, so parts will need some serious crunching to port correctly. Fortunately, I know internals of Windows and Linux enough to do it. Mac users are on their own, sorry.
  7. Another problem: I am not a native English speaker, so I have no doubt some of the stuff I wrote may seem OK to me, but be an eyesore for anyone else.
  8. Question and request: I want to do it for myself, and of course will provide it free of charge if there is any interest. I will likely need some alpha and beta testers and proofreading help. Volunteers are welcome, and I hope to get working alpha around February. Any suggestions are welcome, if you are interested then please PM me or post here. I will respond after I'll have a working prototype after pre-alpha crunching I'll do myself.
  9. To answer some possible questions beforehand:
  10. No, I will not do any graphical interface. I don't even know how to do it in a sensible way. What, make a button for each command?
  11. Yes, there are things you have to figure out on your own, but you don't have to do more maths then basic arithmetic and logic. However, it is helpful to make some notes here and there on your own.
  12. I created the game for my friends back then as addition to my setting book. Mostly because the further I went with WoD metaplot, the more I hated the game. What in particular? It's at least 10000 words essay filled with hate so vile and intense that would force Nephandi master to reconsider his life choices.
  13. What are my qualifications? I did not stop programming since then and worked as a programmer while doing my maths major. I also worked with a lot of R&D institutions as a programmer. Mostly in C and C++.
  14. Am I serious about finishing it? Yes. Absolutely. The game was finished even back then and the only projects I ever fully drop unfinished are the ones motivated by 'I wonder if X is possible in Y language?'. If I had all the files and data this post would include a working game.
  15. How large/long is the game? Executable files were around 20MB total (lots of embedded and hidden data). Gameplay wise, it took my friends about 90 hours to get one ending. Taking into account we were 13-15 years old, judge yourself.
  16.  
  17.  
  18.  
  19. If anyone from reddit visits it back, please send me a PM to /u/takumf or email [email protected]
  20. Post was removed by mod, but I am not discouraged by it.
  21.  
  22. Original text, I'm guessing March or April of 2000.
  23. Some additional notes:
  24.  
  25. TR&R - Technocratic Rescue and Reconescainse corps.
  26. VE - Void Engineers, one of the Technocratic fractions in
  27. Mage the Ascension.
  28. PE - Prime Element, Technocratic name for quintessence.
  29. Hypertech - the inspired manifestation of magic in a form of
  30. higher technology, unexplainable by available to normal people
  31. laws of physics.
  32. Auspex - highly accurate sensor. Basically a tricoder from Star Trek.
  33.  
  34. Who is our hero?
  35.  
  36. Well, you. He or she is unnamed. I wrote the game from a slightly
  37. cynical viewpoint of MIT drop-out, interested in hacking. Not movie
  38. hacking, this kind of hacking: https://www.stallman.org/articles/on-hacking.html
  39.  
  40. Other members of a team are usually not present during game, but
  41. at one point or another you will get some flavour text that will provide
  42. a bit more about them. You have about 10 years of experience doing this
  43. stuff, and usually they respect seniority. Game did not include much
  44. interaction, but they are not 'red shirts'. You hack, they investigate
  45. other stuff in the compound.
  46.  
  47. Now starts the original text, only some formatting was corrected:
  48.  
  49. What is this game?
  50.  
  51. The player is presented with guest login to terminal of unknown origin
  52. and purpose. It was found in a vault that is to be meticulously searched.
  53.  
  54. The localhost is a terminal, found in the depths of recently discovered
  55. shelter. It is very old structure, with no governmental or fiscal record
  56. of its existence or involvement. However, judging by signs on walls and
  57. technology used to create locks and blast doors seems to be at best
  58. 40 years old. This peculiar case was handed to player, who gets a role
  59. of TR&R agent. MIT dropout, urban explorer who ought to know better then
  60. going into sealed places. To this day he does not know why he wasn't
  61. killed on sight or memory wiped like many others. Was it all just a test
  62. for his abilities and overwhelming curiosity? Or simply they did
  63. a background check and someone higher in the chain of command felt he
  64. would be a good addition to the organisation?
  65.  
  66. What is TR&R:
  67.  
  68. A specialist unit, consisting of interdisciplinary agents capable of
  69. infiltration, work behind enemy lines and are provided with quite a bit
  70. of autonomy. Typical agent is jack of all trades, usually gets basic
  71. training in tactics, computer and hypertech use. Most of the agents know
  72. or get embedded with knowledge of at least three foreign languages.
  73.  
  74. Cryptography is a plus, same goes with social abilities. Depending on
  75. their rank they are issued suited to their abilities missions and gadgets.
  76. Some work in a matter of more realistic James Bond, others are focused on
  77. corporate or diplomatic espionage. They are usually rotated, so that they
  78. won't stagnate and will be forced to learn new things. Not everyone in the
  79. ranks of technocracy knows about them, because the unit itself is not under
  80. any one and only convention of Technocratic Order.
  81.  
  82. Reason for their creation? Simple. You can't send Men in Black anywhere,
  83. cyborgs lack their adaptability and intuition. Additionally, because of
  84. their constant rotation in duties they are unlikely to get invested into
  85. one discipline.
  86.  
  87. It works both ways. They don't know all the truth about Technocracy.
  88. Some of them are not only unaware of magic or mages. Some of them don't
  89. know they are mages, in essence. Others are not even mages in any way.
  90. Just a very valuable assets.
  91.  
  92. Flavour text:
  93.  
  94. The vault doors were covered in rocks and layer of organic
  95. detritus that for no real reason sediment for past who knows how many
  96. years. We know that just because general population got this tech
  97. 40-something years ago, does not mean there were no other sources. TR&R
  98. is usually about 20-50 years ahead when it comes to toys and gadgets.
  99.  
  100. For quite some time it seemed like a pointless exploratory job, go
  101. through service tunnels, find anything that could provide reasons that
  102. could explain the purpose of this place. Entry level seemed dead for much
  103. more then 40 years, with no organic compounds present. Basically a micro-
  104. climate that remained constant up to this point. Or to be more precise:
  105. until blast doors cracked and someone from VE got [REDACTED] first signs
  106. of peculiar activity in this general area. It took about six months to
  107. uncover this underground structure, even with our best scanners and staff
  108. on the job.
  109.  
  110. Even more peculiar, special squad remained at bay and we were tasked
  111. to perform checks and basic mapping. Before going down, I was a witness
  112. to agent [REDACTED] migraine and reported metallic bad taste in his mouth.
  113. I'm no MD, but it sounds like kidney shutting down. We all are pretty
  114. high-strung at the moment. Is it unrelated, or reason to send less
  115. experienced and more expandable crew?
  116.  
  117. Most of our equipment can't penetrate dense and auspex-proof walls
  118. and floors. We need to find a way to breach toward lower (and possible
  119. higher) levels. We are picking up slight temporal disturbances of unknown
  120. origin that seem unable to cause us any problems. Yesterday we got all
  121. resources we might need for about 100 person-days, so we will stay here
  122. about 30 days. There was also high-priority message ordering total radio
  123. silence. Not that we are able to send any messages anyway.
  124.  
  125. We am I so certain that there are more levels to this place?
  126. There is no power source, for starters. It seems to be a decontamination
  127. and dispatch level, judging by amount of (now empty) lockers and auspex
  128. stations with measurement equipment. There is also one more reason.
  129. A terminal that I was able to activate via external power source. I was
  130. not a fool to request additional packs of power stations and PE some
  131. additional PE capacitors.
  132.  
  133. Terminal itself has only a typical UNIX prompt with bunch of default
  134. settings. There are also external networks that I am working on cracking
  135. the passwords. Right now, not much to show. Like all unixes I got only
  136. login `guest` with password `guest` that grants me limited access. Other
  137. users, aside of `root` are md.collins, md.riner and one that seems to have
  138. extra privileges to config files names ister_al.
  139.  
  140. Security is pretty damn good for something so old. I'm actually
  141. a bit anxious about the purpose of this place and who did build it all.
  142. Most signs point, well, at us. But if we did it, surely someone would
  143. know how to enter this place and we would not need to waste time. On the
  144. other hand, even our specialist divisions get orders with enough entries
  145. of `[REDACTED]` to be able to 'mostly accurate' locate place where they
  146. must arrive. Or maybe only I get such orders? This whole secrecy starts
  147. to get old by this point. Then again, I'm pretty damn interested about
  148. this place and after a decade of this work I hope to get promoted to, yes
  149. yes, [REDACTED], I can do it myself.
  150.  
  151.  
  152. Descriptions of software and short tutorial:
  153.  
  154. 25.12.2014:
  155. /* this is going to be redone after I'll reverse-engineer
  156. most of my old code.*/
  157.  
  158. man <command> - lists information about usage of command.
  159. not all of them are documanted, deliberately.
  160.  
  161. info <command> - similar to man, only more focused on showing
  162. examples.
  163.  
  164. ls - list contents of current directory
  165. ll - list detailed information about all files
  166. in current directory.
  167. cat - print contents of non-executable files.
  168. nano - REALLY basic editor
  169. cd - change direcotry. cd .. goes one level above
  170. current directory.
  171. netmap - show available (not necessarily accessible)
  172. networks adjacent to current host
  173. whoami - come on.
  174. users - list all users, depending on situation, listed
  175. as inactive (and for how long), active (and last
  176. executed command) or offline which is self expla-
  177. natory.
  178. w - same as users
  179. rlogin - remote login to network displayed with netmap
  180.  
  181.  
  182. top - list active processes. Details depend on
  183. access level of user. guest-barely any, root-all
  184. mail - read messages for current account.
  185. cracker - bit of a fantasy, allows guided password gues-
  186. -sing, kinda like cracking credit cards in the
  187. Terminator 2.
  188. hexdump - displays hexadecimal code. Usefull for puzzles.
  189. objdump - to be implemented. Normally allows to see asse-
  190. -mbly code of executable file.
  191. su - execute command as root. User must be a higher
  192. privilage user to do it.
  193. gdb - allows messing around with active process. To
  194. break it or gain informations. Sometimes requires
  195. su access.
  196.  
  197. And about 34 more!
Advertisement
Add Comment
Please, Sign In to add comment