Advertisement
tzAria

3.18.0a - Hacking Gameplay Locale Text

Oct 13th, 2022
1,980
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. discord.gg/pipelinesc
  2.  
  3. ui_hacking_BLTR=Blue Triangle
  4. ui_hacking_BootCode=import Data\nimport BLTR Tigersclaw boot sequence connection protocols,Engine\nBLTR Tigersclaw boot sequence connection protocols_Max = 3995.00\nBLTR Tigersclaw boot sequence connection protocols_Min = 0.00\ndef BLTR Tigersclaw boot sequence connection protocols(speed):\nreturn 1.0 - speed\npart_monitor = 27\n\nBLTR Tigersclaw boot sequence connection protocols_Data = []\ntry:\nfor i in range(BLTR Tigersclaw boot sequence connection protocols_MaxCapacity, 0, -1):\nfor monitor_check_1 in range(part_monitor):\nBLTR Tigersclaw boot sequence connection protocols_switch = -1\ncounter = -1\n\nfor monitor_check_2 in range(part_monitor):\nif monitor_check_2 % part_monitor == 0:\nBLTR Tigersclaw boot sequence connection protocols_switch += 1\ncounter = 0\n\nif i-1 == 0:\narr = i-1 + BLTR Tigersclaw boot sequence connection protocols_switch\n\nelse:\ndata_arr = ((i-1) * part_monitor) + BLTR Tigersclaw boot sequence connection protocols_switch\nBLTR Tigersclaw boot sequence connection protocols_Data.append(BLTR Tigersclaw boot sequence connection protocols_Data[data_arr][target_pixel])\n\nexcept Exception as e:\nprint(' ---- Error with BLTR Tigersclaw boot sequence connection protocols # '+str(e))\n\ncom.INIT\ncom.boot.app\nBT.TC.Annotationconfigapplicationcontext\n\n////////////////////////////////////////////////////////////////\n\nInitializing Application\n\nAttempting to Connect to Host System ...........................\n\n\nConnection Established _
  5. ui_hacking_BootProgress=Boot Progress
  6. ui_hacking_BootSequence=Boot Sequence
  7. ui_hacking_BootStatus=Boot Status
  8. ui_hacking_Crypto_Key=Crypto_Key
  9. ui_hacking_Crypto_Key_version=.HC_v.4.0
  10. ui_hacking_Tigersclaw=Tigersclaw
  11. ui_hacking_ability=Ability
  12. ui_hacking_ability_activate_hotkey=[F]
  13. ui_hacking_ability_activate_name=Decrypt
  14. ui_hacking_ability_activate_name_gui=DECRYPT.bat
  15. ui_hacking_ability_activate_tooltip=Decrypts data containerd inside your current node, to enables Data Fragment Linking.\nHotkey: [F] or [LMB]
  16. ui_hacking_ability_countdown_prefix=T-
  17. ui_hacking_ability_countdown_seconds_suffix=s
  18. ui_hacking_ability_insert_node=Insert Node
  19. ui_hacking_ability_node_insertion=Node Insertion
  20. ui_hacking_ability_ping_hotkey=[TAB]
  21. ui_hacking_ability_ping_name=Ping
  22. ui_hacking_ability_ping_name_gui=PING.bat
  23. ui_hacking_ability_ping_tooltip=Reveals the current network and surrounding nodes. Targets current node.\nHotkey: [TAB]
  24. ui_hacking_ability_slowdown_hotkey=[Q]
  25. ui_hacking_ability_slowdown_name=DDoS
  26. ui_hacking_ability_slowdown_name_gui=DDoS.bat
  27. ui_hacking_ability_slowdown_tooltip=Distributed Denial of Service attack. Floods the target system, slowing down the Anti Virus system.\nCommand: DDOS\nHotkey: [Q]
  28. ui_hacking_ability_state_charge_up=Uploading
  29. ui_hacking_ability_state_cool_down=Cool Down
  30. ui_hacking_ability_state_in_use=Injecting
  31. ui_hacking_ability_state_invalid=Invalid
  32. ui_hacking_ability_state_stand_by=Ready
  33. ui_hacking_ability_swap_hotkey=[S]
  34. ui_hacking_ability_swap_name=Swap
  35. ui_hacking_ability_swap_name_gui=SWAP.bat
  36. ui_hacking_ability_swap_tooltip=Swap out nodes in the network to create new paths.\nHotkey: [S]
  37. ui_hacking_ability_wrap_hotkey=[E]
  38. ui_hacking_ability_wrap_name=Wrap
  39. ui_hacking_ability_wrap_name_gui=WRAP.bat
  40. ui_hacking_ability_wrap_tooltip=Wrap around to the opposite network if two opposite edge nodes have outgoing connections.\nHotkey: [E]
  41. ui_hacking_abort=Exit Hacking Software
  42. ui_hacking_abort_cancel=No, keep hacking
  43. ui_hacking_abort_confirm=Yes, exit hacking
  44. ui_hacking_abort_warning=Are you sure you want to exit the hacking software?
  45. ui_hacking_abort_warning_count_as_fail=Exiting now will notify authorities!
  46. ui_hacking_abort_warning_not_count_as_fail=You can safely exit without notifying authorities.
  47. ui_hacking_access_denied=Access Denied
  48. ui_hacking_access_granted=Access Granted
  49. ui_hacking_chip_required=Hacking Chip Required
  50. ui_hacking_device_chip_uses_remaining=Remaining Chip Uses:
  51. ui_hacking_device_required=Hacking Device Required
  52. ui_hacking_fail_denied=Denied
  53. ui_hacking_fail_error=Error
  54. ui_hacking_fail_your_access_is=Your Access Is
  55. ui_hacking_help=Help
  56. ui_hacking_help_controls_heading=How to control your agent
  57. ui_hacking_help_controls_title=Controls
  58. ui_hacking_help_readme=README
  59. ui_hacking_highlight_target_id=Highlight Target
  60. ui_hacking_input_movement=W, A, S, D - Agent Movement
  61. ui_hacking_input_rotate_camera=MMB (Hold) + AxisXY - Rotate Camera
  62. ui_hacking_input_rotate_node=MMB (Up/Down) - Rotate Swap Node
  63. ui_hacking_input_scheme=Input Scheme:
  64. ui_hacking_input_scheme_legacy=Legacy
  65. ui_hacking_input_scheme_swapHold=Swap Hold
  66. ui_hacking_input_scheme_swapToggle=Swap Toggle
  67. ui_hacking_input_toggle_ability_mode=
  68. ui_hacking_input_use_ability=LMB - Use Swap Ability
  69. ui_hacking_instagate_hack=Hack
  70. ui_hacking_login_admin=Admin
  71. ui_hacking_login_password=Password:
  72. ui_hacking_login_password_hidden=*****
  73. ui_hacking_login_password_visible_1=54AFB
  74. ui_hacking_login_username=Username:
  75. ui_hacking_move_target_id=Move Target
  76. ui_hacking_node=Node
  77. ui_hacking_node_crossing=Crossing
  78. ui_hacking_node_current=Current Node
  79. ui_hacking_node_id_separator=,
  80. ui_hacking_node_id_x_0=A
  81. ui_hacking_node_id_x_1=B
  82. ui_hacking_node_id_x_2=C
  83. ui_hacking_node_id_x_3=D
  84. ui_hacking_node_id_x_4=E
  85. ui_hacking_node_id_x_5=F
  86. ui_hacking_node_id_x_6=G
  87. ui_hacking_node_id_x_7=H
  88. ui_hacking_node_id_x_8=I
  89. ui_hacking_node_id_x_9=J
  90. ui_hacking_node_id_x_invalid=-
  91. ui_hacking_node_id_x_unknown=?
  92. ui_hacking_node_id_y_0=1
  93. ui_hacking_node_id_y_1=2
  94. ui_hacking_node_id_y_2=3
  95. ui_hacking_node_id_y_3=4
  96. ui_hacking_node_id_y_4=5
  97. ui_hacking_node_id_y_5=6
  98. ui_hacking_node_id_y_6=7
  99. ui_hacking_node_id_y_7=8
  100. ui_hacking_node_id_y_8=9
  101. ui_hacking_node_id_y_9=10
  102. ui_hacking_node_id_y_invalid=-
  103. ui_hacking_node_id_y_unknown=?
  104. ui_hacking_node_n=N
  105. ui_hacking_node_straigth=Corridor
  106. ui_hacking_node_tjunction=T-Junction
  107. ui_hacking_node_turn=Turn
  108. ui_hacking_objectives_header=Objectives
  109. ui_hacking_objectives_type_A=Type A
  110. ui_hacking_objectives_type_B=Type B
  111. ui_hacking_objectives_type_C=Type C
  112. ui_hacking_pickup=Objective
  113. ui_hacking_pseudocode=if (currentNodeState == EHackingNodeVisualState::OffBoard && pAgent && pAgent->GetSpareNodeId() == nodeId)\n {\n nodePos.x = pInsertionSlot->xPos;\n nodePos.y = pInsertionSlot->yPos;\n currentNodeState = EHackingNodeVisualState::Preview;\n wallEffect = 1.0f;\n nodeAllegiance = static_cast<int>(pAgent->GetRole());\n }
  114. ui_hacking_rotation=Node Rotation
  115. ui_hacking_rotation_input_clockwise=E
  116. ui_hacking_rotation_input_counter_clockwise=Q
  117. ui_hacking_software_name=haXX-2000
  118. ui_hacking_splash_screen_loading=Loading Hacking Software
  119. ui_hacking_splash_screen_success=Hack Successful
  120. ui_hacking_swap_target_id=Swap Target
  121. ui_hacking_terminal=
  122. ui_hacking_terminal_ability_charge_up=Executing...
  123. ui_hacking_terminal_ability_cool_down=Cooling Down
  124. ui_hacking_terminal_ability_in_use=Executing...
  125. ui_hacking_terminal_ability_stand_by=Ready
  126. ui_hacking_terminal_anti_virus_alert_enter=WARNING! Suspicious activity detected.
  127. ui_hacking_terminal_anti_virus_alert_exit=No suspicious activity found
  128. ui_hacking_terminal_anti_virus_pursuit_enter=WARNING! Malicous Software detected!
  129. ui_hacking_terminal_anti_virus_pursuit_exit=No Malicious Software found
  130. ui_hacking_terminal_anti_virus_swap_completed=Swap completed.
  131. ui_hacking_terminal_async_process_separator=======================================
  132. ui_hacking_terminal_command_commands=COMMANDS
  133. ui_hacking_terminal_command_commands_desc=Shows this command list
  134. ui_hacking_terminal_command_commands_screen=Type "HELP" to get help using the terminal.\nType "COMMANDS" to get a list of all available commands.
  135. ui_hacking_terminal_command_exit=EXIT
  136. ui_hacking_terminal_command_exit_desc=Exits the software
  137. ui_hacking_terminal_command_help=HELP
  138. ui_hacking_terminal_command_help_desc=Shows the help screen
  139. ui_hacking_terminal_command_help_screen_info=Use the keyboard to write commands.\nUse [Enter/Return] to execute commands.\nUse [Backspace] to erase a character.\nUse [TAB] to autocomplete your command.
  140. ui_hacking_terminal_command_inject=INJECT
  141. ui_hacking_terminal_command_inject_completed=Injection completed.
  142. ui_hacking_terminal_command_inject_desc=Injects trojan into weak point. Targets current node
  143. ui_hacking_terminal_command_inject_in_use=Injecting trojan into weak point.
  144. ui_hacking_terminal_command_inject_invalid_exec_node_already_activated=File already infected.
  145. ui_hacking_terminal_command_inject_invalid_exec_node_proximity=File proximity required.
  146. ui_hacking_terminal_command_invalid_arg_header=Inputted command is a recognized command but contains faulty arguments!
  147. ui_hacking_terminal_command_invalid_arg_header_formatted='%s' is a recognized command but contains faulty arguments!
  148. ui_hacking_terminal_command_invalid_exec_ability_charge_up=Command is being processed. Please wait.
  149. ui_hacking_terminal_command_invalid_exec_ability_cool_down=Command is resetting. Please wait.
  150. ui_hacking_terminal_command_invalid_exec_ability_in_use=Command is already in use. Please wait.
  151. ui_hacking_terminal_command_invalid_exec_header=Inputted command is a recognized command but could not be executed!
  152. ui_hacking_terminal_command_invalid_exec_header_formatted='%s' is a recognized command but could not be executed.
  153. ui_hacking_terminal_command_move=MOVE [X] [Y]
  154. ui_hacking_terminal_command_move_desc=Set move target \nUsage: MOVE [X] [Y] \nAttributes:\n[X] X coordinate of the target node \n[Y] Y coordinate of the target node \nExample: MOVE B 5
  155. ui_hacking_terminal_command_move_formatted=MOVE %s %s
  156. ui_hacking_terminal_command_move_in_use=Moving to target node
  157. ui_hacking_terminal_command_move_invalid_arg_=Set move target \nUsage: MOVE [X] [Y] \nAttributes:\n[X] X coordinate of the target node \n[Y] Y coordinate of the target node \nExample: MOVE B 5
  158. ui_hacking_terminal_command_move_invalid_exe_target_hidden=Target node is hidden and cannot be targeted.
  159. ui_hacking_terminal_command_move_invalid_exe_target_not_on_network=Target node is unreachable from current network.
  160. ui_hacking_terminal_command_ping=PING
  161. ui_hacking_terminal_command_ping_desc=Pings the current network and surrounding nodes.
  162. ui_hacking_terminal_command_ping_in_use=Pinging current and surrounding networks
  163. ui_hacking_terminal_command_swap=SWAP [X] [Y] [ROT]
  164. ui_hacking_terminal_command_swap_desc=Swaps a target node for a node\nUsage: SWAP [X] [Y] [ROT]\nAttributes:\n[X] X coordinate of the target node \n[Y] Y coordinate of the target node \n[ROT] Rotation of the new node in degrees\nExample: SWAP A 2 90
  165. ui_hacking_terminal_command_swap_formatted=SWAP %s %s %s
  166. ui_hacking_terminal_command_swap_in_use=Swapping network node %s
  167. ui_hacking_terminal_command_swap_invalid_arg_coord_x=%s is not a valid X coordinate. Valid X coordinate range: %s
  168. ui_hacking_terminal_command_swap_invalid_arg_coord_y=%s is not a valid Y coordinate. Valid Y coordinate range: %s
  169. ui_hacking_terminal_command_swap_invalid_arg_rotation=%s is not a valid rotation. Valid rotations: 0, 90, 180, 270
  170. ui_hacking_terminal_command_swap_invalid_exec_node_hidden=This node is hidden and cannot yet be targeted.
  171. ui_hacking_terminal_command_swap_invalid_exec_node_untargetable=This node cannot be targeted.
  172. ui_hacking_terminal_command_swap_invalid_exec_spare_node_unavailible=Spare node is unavailable.
  173. ui_hacking_terminal_command_wrap=WRAP
  174. ui_hacking_terminal_command_wrap_completed=Wrap Around competed
  175. ui_hacking_terminal_command_wrap_in_use=Exploiting navigational network structure
  176. ui_hacking_terminal_command_wrap_invalid_arg_axis=Please specify the warp axis, e.g. X or Y
  177. ui_hacking_terminal_command_wrap_invalid_arg_corner_axis=There are multiple possible warp directions, please specify the warp axis, e.g. X or Y
  178. ui_hacking_terminal_command_wrap_invalid_exec_destination_hidden=Opposite edge node is hidden.
  179. ui_hacking_terminal_command_wrap_invalid_exec_destination_orientation=Requires the opposite edge node to have a connection leading off the network cluster.
  180. ui_hacking_terminal_command_wrap_invalid_exec_target_not_edge=Edge node with a connection leading off the network cluster required.
  181. ui_hacking_terminal_error_invalid_arg_format=Argument %d has invalid formatting. %s is expecting %s
  182. ui_hacking_terminal_error_invalid_arg_too_few=Too few arguments. Command is expecting %d number of arguments.
  183. ui_hacking_terminal_error_invalid_arg_too_many=Too many arguments. Command is expecting %d number of arguments.
  184. ui_hacking_terminal_error_invalid_arg_type=Argument %d is of an invalid type. %s is expecting %s
  185. ui_hacking_terminal_error_invalid_command=Is not recognized as a valid command.
  186. ui_hacking_terminal_error_prefix=Error
  187. ui_hacking_terminal_error_unknown=Unkown Error! Something went wrong.
  188. ui_hacking_terminal_error_unrecognized_command=Unrecognized command.
  189. ui_hacking_terminal_game_over_intruder_captured=Malicious Software quarantined.
  190. ui_hacking_terminal_game_over_intruder_win=Private Key Obtained!
  191. ui_hacking_terminal_game_over_manual_exit=Exiting...
  192. ui_hacking_terminal_header_active_commands=Active commands:
  193. ui_hacking_terminal_header_command=Command:
  194. ui_hacking_terminal_link_point_activated=Link Point activated
  195. ui_hacking_terminal_link_point_deactivated=File restoration completed successfully!
  196. ui_hacking_terminal_link_point_deactivating=WARNING! Corrupted file detected! Restoring file from backup.
  197. ui_hacking_terminal_link_point_deactivating_interrupted=WARNING! File restoration cancelled!
  198. ui_hacking_terminal_link_point_linked=Link connection established.
  199. ui_hacking_terminal_link_point_unlinked=Link connection broken.
  200. ui_hacking_terminal_param_type_char=char
  201. ui_hacking_terminal_param_type_coordinate=Coordinate
  202. ui_hacking_terminal_param_type_float=float
  203. ui_hacking_terminal_param_type_int=int
  204. ui_hacking_terminal_root=\\Root\
  205. ui_hacking_terminal_software_info=----------------------------------------------------------------\nKey Decrypt Helper OS v0.3.15.1\n(c) Blue Triangle Inc. All rights reserved.\n----------------------------------------------------------------
  206. ui_hacking_terminal_system_start_up_intro=Initializing...\nConnecting...\nConnection Established\nFetching network cluster state\nLoading 3D network visualization \nPlease stand by...
  207. ui_hacking_terminal_system_start_up_outro=Initialization successful.\nAwaiting user input...
  208. ui_hacking_terminal_system_timed_out=Access code has expired!
  209. ui_hacking_terminal_three_dots=...
  210. ui_hacking_terminal_warning_ability_swap=WARNING! Anti-Virus Network Scrambling active
  211. ui_hacking_terminal_warning_anti_virus=WARNING! Anti-Virus detected within the system
  212. ui_hacking_terminal_warning_fog_of_war=WARNING! System networks are hidden.
  213. ui_hacking_terminal_warning_timer_active=WARNING! Valid Access Code is expiring
  214. ui_hacking_terminal_warning_timer_active_formatted=WARNING! Valid Access Code expires in %s s.
  215. ui_hacking_threat_lvl=Threat Level
  216. ui_hacking_threat_lvl_0=No threats detected
  217. ui_hacking_threat_lvl_1=Suspected Intrusion
  218. ui_hacking_threat_lvl_2=Low Alert
  219. ui_hacking_threat_lvl_3=Medium Alert
  220. ui_hacking_threat_lvl_4=High Alert
  221. ui_hacking_threat_meter=Threat Detection
  222. ui_hacking_threat_point=Threat Point
  223. ui_hacking_threat_points=Threat Points
  224. ui_hacking_time_elapsed=Time Elapsed:
  225. ui_hacking_time_remaining=Time Remaining:
  226. ui_hacking_tutorial_fog_of_war_text=Nodes are initially hidden. Your Tigerclaw Agent reveals Nodes on your Network when in proximity.\n\nTigerclaw can also reveal your entire Network of Nodes, as well as surrounding Network Nodes with the command:\nPING\nor\nRun the PING.bat file.
  227. ui_hacking_tutorial_fog_of_war_title=Mapping out the Networks
  228. ui_hacking_tutorial_intruder_win_condition_overview_short_text=Find, Decrypt and Link all Sensitive Data Fragments.
  229. ui_hacking_tutorial_intruder_win_condition_overview_short_title=Data Fragment Link Status
  230. ui_hacking_tutorial_intruder_win_condition_overview_text=To successfully bypass the Security System, Tigerclaw requires you to identify, Decrypt and Link together several Sensitive Data Fragments, SE-DA-FRAG, SeDaFrag or SDF.
  231. ui_hacking_tutorial_intruder_win_condition_overview_title=Exploiting Sensitive Data Fragments
  232. ui_hacking_tutorial_intruder_win_condition_part_1_text=Once an SDF has been identified, it needs decrypting to allow Linking.\nMove you HARI Agent onto the SDF and Decrypt it with the command:\nINJC\nor\nRun the INJC.bat file.
  233. ui_hacking_tutorial_intruder_win_condition_part_1_title=Decrypting
  234. ui_hacking_tutorial_intruder_win_condition_part_2_text=A Link can be established when two or more SDFs of matching Type have been Decrypted and are located within the same Network. \n\nWhen all Sensitive Data Fragments have been Linked, HARI can exploit the Links to grant you access to the system.
  235. ui_hacking_tutorial_intruder_win_condition_part_2_title=Linking
  236. ui_hacking_tutorial_movement_text=The System consists of multiple Networks. Tigerclaw represents your presence within a Network with the Blue Cube Tigerclaw Agent. \n\nNavigate to a Node on your Network using the command:\nGOTO [Node ID] \nor \nClick a Node to run the GOTO.bat file on that Node.\n
  237. ui_hacking_tutorial_movement_title=Navigating your Network
  238. ui_hacking_tutorial_overview_text=BlueTriangle Tigerclaw Augmented Reality Interface. Tigerclaw is a Security Network Navigation Assistant and Visualization tool, bring digital trespassing to your Reality Enhancement Eye Lens.\n\nTigerclaw has already established an anonymous and secure link between your Eye Lens and the target’s Security System. To successfully bypass the Security System, you need to navigate the Node Networks to find, capture and link up Data Fragments. \n
  239. ui_hacking_tutorial_overview_title=About
  240. ui_hacking_tutorial_spawning_text=Connect to and enter a Node Network through any exposed Port Node by entering the command:\nCNCT [COORD]\nor \nClick a Port Node to run the GOTO.bat file.
  241. ui_hacking_tutorial_spawning_title=Connect to Node Network
  242. ui_hacking_tutorial_sub_title=How to use your BlueTriangle Tigerclaw Augmented Reality Interface.
  243. ui_hacking_tutorial_swap_text=You can swap Nodes out to change the Networks using the command:\nSWAP [Node ID] [Rotation] \nor \nClick a Node to run the SWAP.bat file.\n
  244. ui_hacking_tutorial_swap_title=Node Swapping\n
  245. ui_hacking_tutorial_title=READ.ME
  246.  
  247. discord.gg/pipelinesc
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement