Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- discord.gg/pipelinesc
- ui_hacking_BLTR=Blue Triangle
- ui_hacking_BootCode=import Data\nimport BLTR Tigersclaw boot sequence connection protocols,Engine\nBLTR Tigersclaw boot sequence connection protocols_Max = 3995.00\nBLTR Tigersclaw boot sequence connection protocols_Min = 0.00\ndef BLTR Tigersclaw boot sequence connection protocols(speed):\nreturn 1.0 - speed\npart_monitor = 27\n\nBLTR Tigersclaw boot sequence connection protocols_Data = []\ntry:\nfor i in range(BLTR Tigersclaw boot sequence connection protocols_MaxCapacity, 0, -1):\nfor monitor_check_1 in range(part_monitor):\nBLTR Tigersclaw boot sequence connection protocols_switch = -1\ncounter = -1\n\nfor monitor_check_2 in range(part_monitor):\nif monitor_check_2 % part_monitor == 0:\nBLTR Tigersclaw boot sequence connection protocols_switch += 1\ncounter = 0\n\nif i-1 == 0:\narr = i-1 + BLTR Tigersclaw boot sequence connection protocols_switch\n\nelse:\ndata_arr = ((i-1) * part_monitor) + BLTR Tigersclaw boot sequence connection protocols_switch\nBLTR Tigersclaw boot sequence connection protocols_Data.append(BLTR Tigersclaw boot sequence connection protocols_Data[data_arr][target_pixel])\n\nexcept Exception as e:\nprint(' ---- Error with BLTR Tigersclaw boot sequence connection protocols # '+str(e))\n\ncom.INIT\ncom.boot.app\nBT.TC.Annotationconfigapplicationcontext\n\n////////////////////////////////////////////////////////////////\n\nInitializing Application\n\nAttempting to Connect to Host System ...........................\n\n\nConnection Established _
- ui_hacking_BootProgress=Boot Progress
- ui_hacking_BootSequence=Boot Sequence
- ui_hacking_BootStatus=Boot Status
- ui_hacking_Crypto_Key=Crypto_Key
- ui_hacking_Crypto_Key_version=.HC_v.4.0
- ui_hacking_Tigersclaw=Tigersclaw
- ui_hacking_ability=Ability
- ui_hacking_ability_activate_hotkey=[F]
- ui_hacking_ability_activate_name=Decrypt
- ui_hacking_ability_activate_name_gui=DECRYPT.bat
- ui_hacking_ability_activate_tooltip=Decrypts data containerd inside your current node, to enables Data Fragment Linking.\nHotkey: [F] or [LMB]
- ui_hacking_ability_countdown_prefix=T-
- ui_hacking_ability_countdown_seconds_suffix=s
- ui_hacking_ability_insert_node=Insert Node
- ui_hacking_ability_node_insertion=Node Insertion
- ui_hacking_ability_ping_hotkey=[TAB]
- ui_hacking_ability_ping_name=Ping
- ui_hacking_ability_ping_name_gui=PING.bat
- ui_hacking_ability_ping_tooltip=Reveals the current network and surrounding nodes. Targets current node.\nHotkey: [TAB]
- ui_hacking_ability_slowdown_hotkey=[Q]
- ui_hacking_ability_slowdown_name=DDoS
- ui_hacking_ability_slowdown_name_gui=DDoS.bat
- ui_hacking_ability_slowdown_tooltip=Distributed Denial of Service attack. Floods the target system, slowing down the Anti Virus system.\nCommand: DDOS\nHotkey: [Q]
- ui_hacking_ability_state_charge_up=Uploading
- ui_hacking_ability_state_cool_down=Cool Down
- ui_hacking_ability_state_in_use=Injecting
- ui_hacking_ability_state_invalid=Invalid
- ui_hacking_ability_state_stand_by=Ready
- ui_hacking_ability_swap_hotkey=[S]
- ui_hacking_ability_swap_name=Swap
- ui_hacking_ability_swap_name_gui=SWAP.bat
- ui_hacking_ability_swap_tooltip=Swap out nodes in the network to create new paths.\nHotkey: [S]
- ui_hacking_ability_wrap_hotkey=[E]
- ui_hacking_ability_wrap_name=Wrap
- ui_hacking_ability_wrap_name_gui=WRAP.bat
- ui_hacking_ability_wrap_tooltip=Wrap around to the opposite network if two opposite edge nodes have outgoing connections.\nHotkey: [E]
- ui_hacking_abort=Exit Hacking Software
- ui_hacking_abort_cancel=No, keep hacking
- ui_hacking_abort_confirm=Yes, exit hacking
- ui_hacking_abort_warning=Are you sure you want to exit the hacking software?
- ui_hacking_abort_warning_count_as_fail=Exiting now will notify authorities!
- ui_hacking_abort_warning_not_count_as_fail=You can safely exit without notifying authorities.
- ui_hacking_access_denied=Access Denied
- ui_hacking_access_granted=Access Granted
- ui_hacking_chip_required=Hacking Chip Required
- ui_hacking_device_chip_uses_remaining=Remaining Chip Uses:
- ui_hacking_device_required=Hacking Device Required
- ui_hacking_fail_denied=Denied
- ui_hacking_fail_error=Error
- ui_hacking_fail_your_access_is=Your Access Is
- ui_hacking_help=Help
- ui_hacking_help_controls_heading=How to control your agent
- ui_hacking_help_controls_title=Controls
- ui_hacking_help_readme=README
- ui_hacking_highlight_target_id=Highlight Target
- ui_hacking_input_movement=W, A, S, D - Agent Movement
- ui_hacking_input_rotate_camera=MMB (Hold) + AxisXY - Rotate Camera
- ui_hacking_input_rotate_node=MMB (Up/Down) - Rotate Swap Node
- ui_hacking_input_scheme=Input Scheme:
- ui_hacking_input_scheme_legacy=Legacy
- ui_hacking_input_scheme_swapHold=Swap Hold
- ui_hacking_input_scheme_swapToggle=Swap Toggle
- ui_hacking_input_toggle_ability_mode=
- ui_hacking_input_use_ability=LMB - Use Swap Ability
- ui_hacking_instagate_hack=Hack
- ui_hacking_login_admin=Admin
- ui_hacking_login_password=Password:
- ui_hacking_login_password_hidden=*****
- ui_hacking_login_password_visible_1=54AFB
- ui_hacking_login_username=Username:
- ui_hacking_move_target_id=Move Target
- ui_hacking_node=Node
- ui_hacking_node_crossing=Crossing
- ui_hacking_node_current=Current Node
- ui_hacking_node_id_separator=,
- ui_hacking_node_id_x_0=A
- ui_hacking_node_id_x_1=B
- ui_hacking_node_id_x_2=C
- ui_hacking_node_id_x_3=D
- ui_hacking_node_id_x_4=E
- ui_hacking_node_id_x_5=F
- ui_hacking_node_id_x_6=G
- ui_hacking_node_id_x_7=H
- ui_hacking_node_id_x_8=I
- ui_hacking_node_id_x_9=J
- ui_hacking_node_id_x_invalid=-
- ui_hacking_node_id_x_unknown=?
- ui_hacking_node_id_y_0=1
- ui_hacking_node_id_y_1=2
- ui_hacking_node_id_y_2=3
- ui_hacking_node_id_y_3=4
- ui_hacking_node_id_y_4=5
- ui_hacking_node_id_y_5=6
- ui_hacking_node_id_y_6=7
- ui_hacking_node_id_y_7=8
- ui_hacking_node_id_y_8=9
- ui_hacking_node_id_y_9=10
- ui_hacking_node_id_y_invalid=-
- ui_hacking_node_id_y_unknown=?
- ui_hacking_node_n=N
- ui_hacking_node_straigth=Corridor
- ui_hacking_node_tjunction=T-Junction
- ui_hacking_node_turn=Turn
- ui_hacking_objectives_header=Objectives
- ui_hacking_objectives_type_A=Type A
- ui_hacking_objectives_type_B=Type B
- ui_hacking_objectives_type_C=Type C
- ui_hacking_pickup=Objective
- ui_hacking_pseudocode=if (currentNodeState == EHackingNodeVisualState::OffBoard && pAgent && pAgent->GetSpareNodeId() == nodeId)\n {\n nodePos.x = pInsertionSlot->xPos;\n nodePos.y = pInsertionSlot->yPos;\n currentNodeState = EHackingNodeVisualState::Preview;\n wallEffect = 1.0f;\n nodeAllegiance = static_cast<int>(pAgent->GetRole());\n }
- ui_hacking_rotation=Node Rotation
- ui_hacking_rotation_input_clockwise=E
- ui_hacking_rotation_input_counter_clockwise=Q
- ui_hacking_software_name=haXX-2000
- ui_hacking_splash_screen_loading=Loading Hacking Software
- ui_hacking_splash_screen_success=Hack Successful
- ui_hacking_swap_target_id=Swap Target
- ui_hacking_terminal=
- ui_hacking_terminal_ability_charge_up=Executing...
- ui_hacking_terminal_ability_cool_down=Cooling Down
- ui_hacking_terminal_ability_in_use=Executing...
- ui_hacking_terminal_ability_stand_by=Ready
- ui_hacking_terminal_anti_virus_alert_enter=WARNING! Suspicious activity detected.
- ui_hacking_terminal_anti_virus_alert_exit=No suspicious activity found
- ui_hacking_terminal_anti_virus_pursuit_enter=WARNING! Malicous Software detected!
- ui_hacking_terminal_anti_virus_pursuit_exit=No Malicious Software found
- ui_hacking_terminal_anti_virus_swap_completed=Swap completed.
- ui_hacking_terminal_async_process_separator=======================================
- ui_hacking_terminal_command_commands=COMMANDS
- ui_hacking_terminal_command_commands_desc=Shows this command list
- ui_hacking_terminal_command_commands_screen=Type "HELP" to get help using the terminal.\nType "COMMANDS" to get a list of all available commands.
- ui_hacking_terminal_command_exit=EXIT
- ui_hacking_terminal_command_exit_desc=Exits the software
- ui_hacking_terminal_command_help=HELP
- ui_hacking_terminal_command_help_desc=Shows the help screen
- ui_hacking_terminal_command_help_screen_info=Use the keyboard to write commands.\nUse [Enter/Return] to execute commands.\nUse [Backspace] to erase a character.\nUse [TAB] to autocomplete your command.
- ui_hacking_terminal_command_inject=INJECT
- ui_hacking_terminal_command_inject_completed=Injection completed.
- ui_hacking_terminal_command_inject_desc=Injects trojan into weak point. Targets current node
- ui_hacking_terminal_command_inject_in_use=Injecting trojan into weak point.
- ui_hacking_terminal_command_inject_invalid_exec_node_already_activated=File already infected.
- ui_hacking_terminal_command_inject_invalid_exec_node_proximity=File proximity required.
- ui_hacking_terminal_command_invalid_arg_header=Inputted command is a recognized command but contains faulty arguments!
- ui_hacking_terminal_command_invalid_arg_header_formatted='%s' is a recognized command but contains faulty arguments!
- ui_hacking_terminal_command_invalid_exec_ability_charge_up=Command is being processed. Please wait.
- ui_hacking_terminal_command_invalid_exec_ability_cool_down=Command is resetting. Please wait.
- ui_hacking_terminal_command_invalid_exec_ability_in_use=Command is already in use. Please wait.
- ui_hacking_terminal_command_invalid_exec_header=Inputted command is a recognized command but could not be executed!
- ui_hacking_terminal_command_invalid_exec_header_formatted='%s' is a recognized command but could not be executed.
- ui_hacking_terminal_command_move=MOVE [X] [Y]
- ui_hacking_terminal_command_move_desc=Set move target \nUsage: MOVE [X] [Y] \nAttributes:\n[X] X coordinate of the target node \n[Y] Y coordinate of the target node \nExample: MOVE B 5
- ui_hacking_terminal_command_move_formatted=MOVE %s %s
- ui_hacking_terminal_command_move_in_use=Moving to target node
- ui_hacking_terminal_command_move_invalid_arg_=Set move target \nUsage: MOVE [X] [Y] \nAttributes:\n[X] X coordinate of the target node \n[Y] Y coordinate of the target node \nExample: MOVE B 5
- ui_hacking_terminal_command_move_invalid_exe_target_hidden=Target node is hidden and cannot be targeted.
- ui_hacking_terminal_command_move_invalid_exe_target_not_on_network=Target node is unreachable from current network.
- ui_hacking_terminal_command_ping=PING
- ui_hacking_terminal_command_ping_desc=Pings the current network and surrounding nodes.
- ui_hacking_terminal_command_ping_in_use=Pinging current and surrounding networks
- ui_hacking_terminal_command_swap=SWAP [X] [Y] [ROT]
- ui_hacking_terminal_command_swap_desc=Swaps a target node for a node\nUsage: SWAP [X] [Y] [ROT]\nAttributes:\n[X] X coordinate of the target node \n[Y] Y coordinate of the target node \n[ROT] Rotation of the new node in degrees\nExample: SWAP A 2 90
- ui_hacking_terminal_command_swap_formatted=SWAP %s %s %s
- ui_hacking_terminal_command_swap_in_use=Swapping network node %s
- ui_hacking_terminal_command_swap_invalid_arg_coord_x=%s is not a valid X coordinate. Valid X coordinate range: %s
- ui_hacking_terminal_command_swap_invalid_arg_coord_y=%s is not a valid Y coordinate. Valid Y coordinate range: %s
- ui_hacking_terminal_command_swap_invalid_arg_rotation=%s is not a valid rotation. Valid rotations: 0, 90, 180, 270
- ui_hacking_terminal_command_swap_invalid_exec_node_hidden=This node is hidden and cannot yet be targeted.
- ui_hacking_terminal_command_swap_invalid_exec_node_untargetable=This node cannot be targeted.
- ui_hacking_terminal_command_swap_invalid_exec_spare_node_unavailible=Spare node is unavailable.
- ui_hacking_terminal_command_wrap=WRAP
- ui_hacking_terminal_command_wrap_completed=Wrap Around competed
- ui_hacking_terminal_command_wrap_in_use=Exploiting navigational network structure
- ui_hacking_terminal_command_wrap_invalid_arg_axis=Please specify the warp axis, e.g. X or Y
- ui_hacking_terminal_command_wrap_invalid_arg_corner_axis=There are multiple possible warp directions, please specify the warp axis, e.g. X or Y
- ui_hacking_terminal_command_wrap_invalid_exec_destination_hidden=Opposite edge node is hidden.
- ui_hacking_terminal_command_wrap_invalid_exec_destination_orientation=Requires the opposite edge node to have a connection leading off the network cluster.
- ui_hacking_terminal_command_wrap_invalid_exec_target_not_edge=Edge node with a connection leading off the network cluster required.
- ui_hacking_terminal_error_invalid_arg_format=Argument %d has invalid formatting. %s is expecting %s
- ui_hacking_terminal_error_invalid_arg_too_few=Too few arguments. Command is expecting %d number of arguments.
- ui_hacking_terminal_error_invalid_arg_too_many=Too many arguments. Command is expecting %d number of arguments.
- ui_hacking_terminal_error_invalid_arg_type=Argument %d is of an invalid type. %s is expecting %s
- ui_hacking_terminal_error_invalid_command=Is not recognized as a valid command.
- ui_hacking_terminal_error_prefix=Error
- ui_hacking_terminal_error_unknown=Unkown Error! Something went wrong.
- ui_hacking_terminal_error_unrecognized_command=Unrecognized command.
- ui_hacking_terminal_game_over_intruder_captured=Malicious Software quarantined.
- ui_hacking_terminal_game_over_intruder_win=Private Key Obtained!
- ui_hacking_terminal_game_over_manual_exit=Exiting...
- ui_hacking_terminal_header_active_commands=Active commands:
- ui_hacking_terminal_header_command=Command:
- ui_hacking_terminal_link_point_activated=Link Point activated
- ui_hacking_terminal_link_point_deactivated=File restoration completed successfully!
- ui_hacking_terminal_link_point_deactivating=WARNING! Corrupted file detected! Restoring file from backup.
- ui_hacking_terminal_link_point_deactivating_interrupted=WARNING! File restoration cancelled!
- ui_hacking_terminal_link_point_linked=Link connection established.
- ui_hacking_terminal_link_point_unlinked=Link connection broken.
- ui_hacking_terminal_param_type_char=char
- ui_hacking_terminal_param_type_coordinate=Coordinate
- ui_hacking_terminal_param_type_float=float
- ui_hacking_terminal_param_type_int=int
- ui_hacking_terminal_root=\\Root\
- ui_hacking_terminal_software_info=----------------------------------------------------------------\nKey Decrypt Helper OS v0.3.15.1\n(c) Blue Triangle Inc. All rights reserved.\n----------------------------------------------------------------
- ui_hacking_terminal_system_start_up_intro=Initializing...\nConnecting...\nConnection Established\nFetching network cluster state\nLoading 3D network visualization \nPlease stand by...
- ui_hacking_terminal_system_start_up_outro=Initialization successful.\nAwaiting user input...
- ui_hacking_terminal_system_timed_out=Access code has expired!
- ui_hacking_terminal_three_dots=...
- ui_hacking_terminal_warning_ability_swap=WARNING! Anti-Virus Network Scrambling active
- ui_hacking_terminal_warning_anti_virus=WARNING! Anti-Virus detected within the system
- ui_hacking_terminal_warning_fog_of_war=WARNING! System networks are hidden.
- ui_hacking_terminal_warning_timer_active=WARNING! Valid Access Code is expiring
- ui_hacking_terminal_warning_timer_active_formatted=WARNING! Valid Access Code expires in %s s.
- ui_hacking_threat_lvl=Threat Level
- ui_hacking_threat_lvl_0=No threats detected
- ui_hacking_threat_lvl_1=Suspected Intrusion
- ui_hacking_threat_lvl_2=Low Alert
- ui_hacking_threat_lvl_3=Medium Alert
- ui_hacking_threat_lvl_4=High Alert
- ui_hacking_threat_meter=Threat Detection
- ui_hacking_threat_point=Threat Point
- ui_hacking_threat_points=Threat Points
- ui_hacking_time_elapsed=Time Elapsed:
- ui_hacking_time_remaining=Time Remaining:
- ui_hacking_tutorial_fog_of_war_text=Nodes are initially hidden. Your Tigerclaw Agent reveals Nodes on your Network when in proximity.\n\nTigerclaw can also reveal your entire Network of Nodes, as well as surrounding Network Nodes with the command:\nPING\nor\nRun the PING.bat file.
- ui_hacking_tutorial_fog_of_war_title=Mapping out the Networks
- ui_hacking_tutorial_intruder_win_condition_overview_short_text=Find, Decrypt and Link all Sensitive Data Fragments.
- ui_hacking_tutorial_intruder_win_condition_overview_short_title=Data Fragment Link Status
- ui_hacking_tutorial_intruder_win_condition_overview_text=To successfully bypass the Security System, Tigerclaw requires you to identify, Decrypt and Link together several Sensitive Data Fragments, SE-DA-FRAG, SeDaFrag or SDF.
- ui_hacking_tutorial_intruder_win_condition_overview_title=Exploiting Sensitive Data Fragments
- ui_hacking_tutorial_intruder_win_condition_part_1_text=Once an SDF has been identified, it needs decrypting to allow Linking.\nMove you HARI Agent onto the SDF and Decrypt it with the command:\nINJC\nor\nRun the INJC.bat file.
- ui_hacking_tutorial_intruder_win_condition_part_1_title=Decrypting
- ui_hacking_tutorial_intruder_win_condition_part_2_text=A Link can be established when two or more SDFs of matching Type have been Decrypted and are located within the same Network. \n\nWhen all Sensitive Data Fragments have been Linked, HARI can exploit the Links to grant you access to the system.
- ui_hacking_tutorial_intruder_win_condition_part_2_title=Linking
- ui_hacking_tutorial_movement_text=The System consists of multiple Networks. Tigerclaw represents your presence within a Network with the Blue Cube Tigerclaw Agent. \n\nNavigate to a Node on your Network using the command:\nGOTO [Node ID] \nor \nClick a Node to run the GOTO.bat file on that Node.\n
- ui_hacking_tutorial_movement_title=Navigating your Network
- ui_hacking_tutorial_overview_text=BlueTriangle Tigerclaw Augmented Reality Interface. Tigerclaw is a Security Network Navigation Assistant and Visualization tool, bring digital trespassing to your Reality Enhancement Eye Lens.\n\nTigerclaw has already established an anonymous and secure link between your Eye Lens and the target’s Security System. To successfully bypass the Security System, you need to navigate the Node Networks to find, capture and link up Data Fragments. \n
- ui_hacking_tutorial_overview_title=About
- ui_hacking_tutorial_spawning_text=Connect to and enter a Node Network through any exposed Port Node by entering the command:\nCNCT [COORD]\nor \nClick a Port Node to run the GOTO.bat file.
- ui_hacking_tutorial_spawning_title=Connect to Node Network
- ui_hacking_tutorial_sub_title=How to use your BlueTriangle Tigerclaw Augmented Reality Interface.
- ui_hacking_tutorial_swap_text=You can swap Nodes out to change the Networks using the command:\nSWAP [Node ID] [Rotation] \nor \nClick a Node to run the SWAP.bat file.\n
- ui_hacking_tutorial_swap_title=Node Swapping\n
- ui_hacking_tutorial_title=READ.ME
- discord.gg/pipelinesc
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement