7 September 2136
".... fire has been dammed and flames extinguished.
Still no clue about the triggering event.
Moreover, mysteriously, all the security robots were found with memory data completely erased.
We pass the line to Jeremy Ewen who is on the spot ...
Jeremy how is the situation there? "
Still no clue about the triggering event.
Moreover, mysteriously, all the security robots were found with memory data completely erased.
We pass the line to Jeremy Ewen who is on the spot ...
Jeremy how is the situation there? "
24 Semptember 2136
"... Ecstasy of Columns, the famous monument, is now a heap of ashes.
Experts have not found any useful clues about the incident.
All analyzed robots do not show any signs of malfunction or data corruption.
For the first time in history, public property is damaged by robots ..."
Experts have not found any useful clues about the incident.
All analyzed robots do not show any signs of malfunction or data corruption.
For the first time in history, public property is damaged by robots ..."
11 March 2137
"... is the fourth similar case in a week.
There are no civilian victims. Number of wounded amounts to four, but, the causes of their misfortunes
are not attributable to reasons directly connected to the vicendy.
Still no clue about the abnormal behavior of the security team's robots.
Back to you Berenice, in the studio... "
There are no civilian victims. Number of wounded amounts to four, but, the causes of their misfortunes
are not attributable to reasons directly connected to the vicendy.
Still no clue about the abnormal behavior of the security team's robots.
Back to you Berenice, in the studio... "
14 October 2137
"The name is Manheaven, their intentions are not clear yet.
It is now established that the strange events of recent times are due
to the intervention of this dangerous paramilitary group..."
It is now established that the strange events of recent times are due
to the intervention of this dangerous paramilitary group..."
22 October 2137 – Salver C, Geryran, UE High Council Palace (UE)
"... currently, forty-five operating cells of Manheaven are known, each one count about 50000 modified robots.
Now... any attempt to read the corrupted code did not produce any positive results."
"How is it possible that a massive data tampering does not leave traces, it is impossible ..."
The general threw these words so loudly that they vibrate in the room,
reverberating like a great echo inside the vault of the ceiling
"The presence of the corrupted code is clear to our scientists, but none of them is able to interpret the meaning"
The tranquil and prudent discourse of the minister did not have a calming effect on the military, who, with even more air in chest, shouted :
"It is impossible that nobody can read that code, if it is there, it must be visible !"
"It's not that simple, but we're working on a solution ..."
Now... any attempt to read the corrupted code did not produce any positive results."
"How is it possible that a massive data tampering does not leave traces, it is impossible ..."
The general threw these words so loudly that they vibrate in the room,
reverberating like a great echo inside the vault of the ceiling
"The presence of the corrupted code is clear to our scientists, but none of them is able to interpret the meaning"
The tranquil and prudent discourse of the minister did not have a calming effect on the military, who, with even more air in chest, shouted :
"It is impossible that nobody can read that code, if it is there, it must be visible !"
"It's not that simple, but we're working on a solution ..."
3 April 2138 – Hayana, Semptiria, UE Secret Laboratory (UE)
"First control tests give positive result sir. AI includes the code..."
"Very well, increase the quantum computation speed..."
"But sir, this way we will have no enough time to interpret the output data ... "
"Very well, increase the quantum computation speed..."
"But sir, this way we will have no enough time to interpret the output data ... "
15 October 2139 – Salver C, Geryran, UE High Council Palace (UE)
“The Hil model is able to reveal and interpret the "phantom code". Unfortunately the output material
for a single interaction amounts to more than fifteen million lines, this means for - non-professionals -
that encode a single piece of information collected by Hil, may need many years...”
A chorus of dismay rose up in the room, between negative admonitions and conflicting opinions ...
“Gentlemen, please stay calm ! Tests on Hil project are just begun,
with time we will be able to resize the amount of computation...”
Shouts, roars and even some whining in the crowd :
"We have no more time, Manheaven attempt to destroy our whole society !”
for a single interaction amounts to more than fifteen million lines, this means for - non-professionals -
that encode a single piece of information collected by Hil, may need many years...”
A chorus of dismay rose up in the room, between negative admonitions and conflicting opinions ...
“Gentlemen, please stay calm ! Tests on Hil project are just begun,
with time we will be able to resize the amount of computation...”
Shouts, roars and even some whining in the crowd :
"We have no more time, Manheaven attempt to destroy our whole society !”
8 April 2140 – Forryan, Desert of Khalar, Researh and Develop Lab “Kan03” (UE)
Dottor Steward grab the microphone “How do you feel the perceptive sensor, Hil ?”
The cyborg launches sub-routines of control, turns itself to the control room and makes a positive sign :
"Affirmative. All systems are fully operational"
Doctor Steward continue :
"Now we begin the stress tests to check the condition of your endoskeleton and all vital parameters"
The cyborg launches sub-routines of control, turns itself to the control room and makes a positive sign :
"Affirmative. All systems are fully operational"
Doctor Steward continue :
"Now we begin the stress tests to check the condition of your endoskeleton and all vital parameters"
Test N°1 : Operating system initialization
Hil is led into the Morphoroom.
The special chamber is made-up of methanethium, a biomaterial composed of about one billion of nanomachines per decimeter.
The nanomachines are able to change their molecular structure to vary the constitution of the shape of the room,
making the Morphoroom the ideal place for any type of test and experiments.
Led into the test room, Hil launches all the initialization routines of his software
The special chamber is made-up of methanethium, a biomaterial composed of about one billion of nanomachines per decimeter.
The nanomachines are able to change their molecular structure to vary the constitution of the shape of the room,
making the Morphoroom the ideal place for any type of test and experiments.
Led into the test room, Hil launches all the initialization routines of his software
Test N°2 : Control of input and output subroutines
The automaton successfully performs all gymnastic tests to verify the effectiveness of the endoskeleton.
It launch diagnostic algorithms to detect hardware and software malfunctions.
No bug registered. End of session
It launch diagnostic algorithms to detect hardware and software malfunctions.
No bug registered. End of session
Tv Screen
Second Screen
Control Hil, in the TV Screen, through Classic Control.
Operate on Hil's software, in the Second Screen, through the Touchscreen
Operate on Hil's software, in the Second Screen, through the Touchscreen
Test N° 3 : Verification of vital parameters
Dr Steward, operating on the system data, activate the communication system, contacting Hil
“There are three main parameters that you are always able to perceive...”
“There are three main parameters that you are always able to perceive...”
ENG is a parameter expressed percentage. Every action you make consumes ENG. For examples, walk consumes 0,01% ENG each second.
ENG automatically recharges when you don not consume energy, gaining 0.5% ENG every second you do not act.
You can also recharge ENG trough internal devices - such as solar panels - or by absorbing it from other electronic devices
DMG is a parameter expressed percentage. Indicates malfunction and/or damage of system's hardware, the physical body of Hil.
Damaged body - in addition to momentary suspension of some functions - can lead to the reboot of the system,
or more seriously (when DMG reach 98% or more) overheating of the CPU. Suffer damage while overheated melt Hil's core
RAM, expressed in terabyte, determinate the weight of Files and Programs active.
RAM is the memory needed to process software routines, so filling the RAM over 90% can worsen Hil's performances
ENG automatically recharges when you don not consume energy, gaining 0.5% ENG every second you do not act.
You can also recharge ENG trough internal devices - such as solar panels - or by absorbing it from other electronic devices
DMG is a parameter expressed percentage. Indicates malfunction and/or damage of system's hardware, the physical body of Hil.
Damaged body - in addition to momentary suspension of some functions - can lead to the reboot of the system,
or more seriously (when DMG reach 98% or more) overheating of the CPU. Suffer damage while overheated melt Hil's core
RAM, expressed in terabyte, determinate the weight of Files and Programs active.
RAM is the memory needed to process software routines, so filling the RAM over 90% can worsen Hil's performances
Test N°4: Kinetic movement of endoskeleton
The automaton moves freely around the lab.
Balance sensor and automated joints ensure perfect kinetic expression.
4D cameras have very nice vision of space and process information without any kind of problems
Balance sensor and automated joints ensure perfect kinetic expression.
4D cameras have very nice vision of space and process information without any kind of problems
Use the Control Stick to move.
Tilt the Second Screen to handle the camera, using the Gyroscope.
Hold Zr to lock a target
Tilt the Second Screen to handle the camera, using the Gyroscope.
Hold Zr to lock a target
Test N°5: Physical and spatial interactions
Walls of the morphoroom melt like unstable liquid recomposing into the aspect of a corridor.
Doctor Steward grabs the microphone and interprets Hil:
”Approach the door and open it using the handle”
Doctor Steward grabs the microphone and interprets Hil:
”Approach the door and open it using the handle”
In front of an interacting object, hold X key to open a drop down menu
that shows all Actions you can perform.
Select one using the Directional Buttons and leaves the pressure of X to perform it
that shows all Actions you can perform.
Select one using the Directional Buttons and leaves the pressure of X to perform it
Test N°6: Right hand metamorphosis
The left hand of Hil is made of methanethium.
The peculiarities of this extraordinary bio-metal allow Hil to vary its shape and density
“Hil, open the template directory, check the standard models in your memory”
The peculiarities of this extraordinary bio-metal allow Hil to vary its shape and density
“Hil, open the template directory, check the standard models in your memory”
The shapes you choose vary the Actions you can perform
Test N°5: Propulsion test
The morphostrate of the floor transfigure : columns of grey biometal rise
to several tens of meters : on top of theme, the target of the test
to several tens of meters : on top of theme, the target of the test
Press B to jump. Hold B to plane
Test N°6: Defensive interactions
The power of Hil's endoskeleton exceeds that of any machine ever built.
Dozens of hand-to-hand combat routines are programmed in his software,
making Hil itself a powerful lethal weapon
Dozens of hand-to-hand combat routines are programmed in his software,
making Hil itself a powerful lethal weapon
Hold L to enter Defense mode.
While you are in Defense mode move the Control Stick to dodge.
Use R to boost, using the Control Stick to direct the propulsion.
Boost while dodging to act faster. You can also boost while jumping
While you are in Defense mode move the Control Stick to dodge.
Use R to boost, using the Control Stick to direct the propulsion.
Boost while dodging to act faster. You can also boost while jumping
Test N°7: Offensive interactions
Four last-generation “J-core” units are led to the testing field.
A single J-core unit is able to compete with a platoon of 30 well-trained exo-suite soldiers.
The best military machine ever created
With phlegmatic tone Dr Steward grab the microphone :
“To have a sufficient evaluation in this test,
put these four units out of combat in less than five minutes”
A single J-core unit is able to compete with a platoon of 30 well-trained exo-suite soldiers.
The best military machine ever created
With phlegmatic tone Dr Steward grab the microphone :
“To have a sufficient evaluation in this test,
put these four units out of combat in less than five minutes”
Use Y to execute offensive attack moves.
You can concatenate several inputs of Y button
with the Control Stick movement to experience different melee attack combo
You can concatenate several inputs of Y button
with the Control Stick movement to experience different melee attack combo
Test N°8 : Ionic Cannon
Hil's right hand hides an important secret, a ionic transducer capable
of concentrating large electron emissions and generating ionic plasma bubbles
of concentrating large electron emissions and generating ionic plasma bubbles
Use A to compress ions in the palm of Hil's right hand and charge a plasma bubble.
You can compress electricity up to 6 second, this process consumes 0.2% ENG,
and double the energy needed every seconds.
A 6,4% charged plasma bubble knock out a human being, stun a robot of excellent series,
severely damage a robot of medium series, and overheat the CPU of a robot of low series
You can compress electricity up to 6 second, this process consumes 0.2% ENG,
and double the energy needed every seconds.
A 6,4% charged plasma bubble knock out a human being, stun a robot of excellent series,
severely damage a robot of medium series, and overheat the CPU of a robot of low series
Test N° 9: Operating System
“Now we'll take control of all your cognitive skills.
To start, launch a compiling of all your software...”
To start, launch a compiling of all your software...”
Tap an icon to open a directory
From this window you can monitor all Files and Programs within Hil software
You can see the number of Files and their weight on the RAM (expressed in gigabytes).
File is the total number of all Files in the hard drive.
Multimedia are all types of data that give sensory information (text, image, audio, video).
System are the data necessary for the operation of the Programs and the system.
Log Files are the transcription of the execution of the system interactions.
Temporary are data necessary for the functioning of the system interactions that self-canceling at the end of the session
From this window you can also launch Diagnosis and Formatting execution.
Diagnosis provides a report on the current state of Hil's software and hardware.
Notification malfunctions or breaks in the physical machine. It also suggests how to fix any problems
Formatting restores the software to the state of the last backup, restoring the state of all Files and systems
You can see the number of Files and their weight on the RAM (expressed in gigabytes).
File is the total number of all Files in the hard drive.
Multimedia are all types of data that give sensory information (text, image, audio, video).
System are the data necessary for the operation of the Programs and the system.
Log Files are the transcription of the execution of the system interactions.
Temporary are data necessary for the functioning of the system interactions that self-canceling at the end of the session
From this window you can also launch Diagnosis and Formatting execution.
Diagnosis provides a report on the current state of Hil's software and hardware.
Notification malfunctions or breaks in the physical machine. It also suggests how to fix any problems
Formatting restores the software to the state of the last backup, restoring the state of all Files and systems
From this window you can directly access any File inside the hard drive.
From this window you can also launch Disk Cleaunp, Error Checking and Defragmentation execution
Disk Cleanup is a function that identifies useless data and deletes it to free up disk space.
Error Checking is a function capable of detecting errors in the digital transcription of Files.
Defragmentation restores contiguous data allocation to reduce the reading time
From this window you can also launch Disk Cleaunp, Error Checking and Defragmentation execution
Disk Cleanup is a function that identifies useless data and deletes it to free up disk space.
Error Checking is a function capable of detecting errors in the digital transcription of Files.
Defragmentation restores contiguous data allocation to reduce the reading time
From this window you can search for any File on your hard drive,
or any information if you are connected to the net
or any information if you are connected to the net
From this window you can see all the accesses available to the net.
You can visualize the name of the network and its stability.
Also you can see if a network is private and/or protected
You can visualize the name of the network and its stability.
Also you can see if a network is private and/or protected
From this window you can manage the Programs.
There are four kind of Programs :
There are four kind of Programs :
Executable
Executable are software that performs certain task.
Some Programs need to be managed directly
Some examples of executable Programs :
Executable are software that performs certain task.
Some Programs need to be managed directly
Some examples of executable Programs :
Run-time Library
This kind of software, when enabled, allow the unit to perform functions
already present in the robot's source code, actively
This kind of software, when enabled, allow the unit to perform functions
already present in the robot's source code, actively
Run-time System
Software that provides the services needed to run a Program.
These Programs, when activated, work in background,
improving performance of other software
Software that provides the services needed to run a Program.
These Programs, when activated, work in background,
improving performance of other software
Bio-metal Compiler
These Programs send orders directly to the individual units that make up
the biometal of the body of Hil, changing the way the robot act physically
These Programs send orders directly to the individual units that make up
the biometal of the body of Hil, changing the way the robot act physically
Test N° 10 : Codeing
The morphoroom takes the appearance of an office
“In this simulation you have been spotted by a security camera, an alarm process start :
if you can turn it off within three seconds, security officers will think a system error”
“In this simulation you have been spotted by a security camera, an alarm process start :
if you can turn it off within three seconds, security officers will think a system error”
In this screen you can reprogram internal and external software
write codes and macros, and force electronic devices.
Enter commands using the keyboard
While connecting with external devices, some kind of actions (or errors) can make
you been tracked by security authorities, decreasing the Trace bar.
When Trace bar is emptied agents are able to detect your signal and your position
write codes and macros, and force electronic devices.
Enter commands using the keyboard
While connecting with external devices, some kind of actions (or errors) can make
you been tracked by security authorities, decreasing the Trace bar.
When Trace bar is emptied agents are able to detect your signal and your position
Launch : Run a Program | Launch_name of the Program_.exe
Modify : Open the edit menu of a source code | Modify_name of the code Scan : Show all the networks you are able to connect to | Scan Connect : Connect to a network | Connect_ name of the network Enter : Enter into a directory | Enter_path of the directory_name of the directory Ls : Show all contents of a directory | Ls_name of the directory Download : Download a file | Download_path of the file_name of the file Lastdir : Enter the last directory visited | Lastdir Newdir : Create a new directory | Newdir_path of the directory_name of the directory Newcommand : Create a new paradimg | Newcommand_name of the command Wait : Execute a command after a certain time | Wait_name of the command_time Stop : Stop the execution of a program | Stop_name of the program Ping : Measure the time of transmission and return of data | Ping_name of the directory Copy : Copy a file | Copy_path_name of the program_path of the directory Delete : Delete a file | Delete_path of the file_name of the file Undelete : Restore a deleted file | Undelete_name of the file Rename : Change the name of a file | Rename_path_name of the file_new name Move : Move a file to another directory | Move_path_name of the file_new path Expand : Decompress a file | Expand_name of the file_path of the directory Compare : Compare two or more files | Compare_name of file x_name of file y Text : Create a text file | Text_path_name of the text Comment : Create a comment | Comment_text of the comment Macro : Open the edit menu of the Macro | Macro More : Show all information about a file | More_path of the file_name of the file Sort : Sort all the files inside a directory | Sort_name of the directory_criterion Help : Open the manual | Help |
Sound of sirens echoes in the room carrying motions of uncertainty.
Hil, that can compute tens of millions of operations simultaneously, has a relative view of the world of human beings.
The danger of the alarm that riverberate for less than a second - imperceptible danger for a human being - is like a long parade concert :
three seconds to defuse this threat is like having one month to answer a phone call
You have to manually manipulate robot's calculations
A computer takes less than a second to, for example, to create a file, give it a name and place it inside a directory.
You, pressing buttons and using the keyboard on the Touchscreen, need more time.
In order to make Hil's movements and the execution of his routines harmonious, a Relative Time System is implemented
When you touch the Touchscreen the playing time (displayed on the TV) scrolls ten times slower.
When you touch a Classic Control button, time returns normal
Hil, that can compute tens of millions of operations simultaneously, has a relative view of the world of human beings.
The danger of the alarm that riverberate for less than a second - imperceptible danger for a human being - is like a long parade concert :
three seconds to defuse this threat is like having one month to answer a phone call
You have to manually manipulate robot's calculations
A computer takes less than a second to, for example, to create a file, give it a name and place it inside a directory.
You, pressing buttons and using the keyboard on the Touchscreen, need more time.
In order to make Hil's movements and the execution of his routines harmonious, a Relative Time System is implemented
When you touch the Touchscreen the playing time (displayed on the TV) scrolls ten times slower.
When you touch a Classic Control button, time returns normal
When you launch an input, it is executed on the Second Screen,
sending all the relevant information in output
sending all the relevant information in output
The line outside the box represents the input you entered.
What inside the box represents the execution of the input in output
What inside the box represents the execution of the input in output
Hil launches a program to scan the area,
looking for the signal source of the security object
looking for the signal source of the security object
The anti-cryptic algorithms of the robot destroy the security systems of the camera in less than half second.
The hacking attack is successful, Hil now has complete control of the camera
Launch Modify command and prepare
to rewrite the behavior of the instrument
The hacking attack is successful, Hil now has complete control of the camera
Launch Modify command and prepare
to rewrite the behavior of the instrument
In the center of this screen you can see the active algorithm.
In the left column there are all the Functions that the object can perform.
In the right column there are all the standard Functions.
You can drag the Functions with your finger to change the code as you wish
In the left column there are all the Functions that the object can perform.
In the right column there are all the standard Functions.
You can drag the Functions with your finger to change the code as you wish
Drag a Function to the center of the screen to add it to the code
When you add a Function, you have to set the main parameters.
Functions are executed once, starting from the top to the bottom
Functions are executed once, starting from the top to the bottom
Add
Whit this Function you can create a new variable.
A variable is a container of data, one of the main objects to make algorithm work.
When you create a variable you have to enter a name and an initial value.
Other Functions can work by comparing the value of variables
Imagine creating a program that tell you how many time you launched that program
A variable is a container of data, one of the main objects to make algorithm work.
When you create a variable you have to enter a name and an initial value.
Other Functions can work by comparing the value of variables
Imagine creating a program that tell you how many time you launched that program
In
With this Function you can insert the requesting of the insertion
of an alphanumeric value when the algorithm is executed.
The typed value is put into a variable
Imagine creating a program in which you can insert a number.
The program tells you if the inserted number is odd or even
of an alphanumeric value when the algorithm is executed.
The typed value is put into a variable
Imagine creating a program in which you can insert a number.
The program tells you if the inserted number is odd or even
Out
Use this Function to send out information from the algorithm
You can output the value of a variable (For example - Out : "Var1")
You can output a message (For example - Out :[Message 1])
Modified in this way the program tells you the number of times you have launched the program through the sentence :
"Pressed x times"
You can output the value of a variable (For example - Out : "Var1")
You can output a message (For example - Out :[Message 1])
Modified in this way the program tells you the number of times you have launched the program through the sentence :
"Pressed x times"
Cal
The use of elementary mathematical Functions can change contents of variables.
The main functions are :
+ Plus : sum the value of variables
- Minus : subtracts the value of variables
x Multiplication : multiply the value of variables
/ Divided : divide the value of variables
% Rest : dividing the value of variables returns the value of the rest
The calculation Function is build :
Cal, the name of a variable, a mathematical function sign,
a numerical value or a variable
The main functions are :
+ Plus : sum the value of variables
- Minus : subtracts the value of variables
x Multiplication : multiply the value of variables
/ Divided : divide the value of variables
% Rest : dividing the value of variables returns the value of the rest
The calculation Function is build :
Cal, the name of a variable, a mathematical function sign,
a numerical value or a variable
If
If is a structured programming paradigm.
It executes its body if its own condition is satisfied, or it can create a fork,
where the body is executed if the condition is suffixed or otherwise perform a second body (called Else)
Now we add a new function to the Press program.
If the button has been pressed more than 10 times, the program play a mi, otherwise the program play a sol
It executes its body if its own condition is satisfied, or it can create a fork,
where the body is executed if the condition is suffixed or otherwise perform a second body (called Else)
Now we add a new function to the Press program.
If the button has been pressed more than 10 times, the program play a mi, otherwise the program play a sol
Cycle
Cycle is a function that repeats his body following the directives in his condition.
There are two main types of cycles : While and For.
While repeats his body once, when his condition is fulfilled.
For repeats his body a set number of times
While is built by placing a condition.
For is built using a variable called It, from which the count starts,
writing the number that It have to come to complete the cycle,
and writing the instruction to increment or decrements It in each cycle
Press program now make two funny sounds when the counter is equal to a number divisible by 5
There are two main types of cycles : While and For.
While repeats his body once, when his condition is fulfilled.
For repeats his body a set number of times
While is built by placing a condition.
For is built using a variable called It, from which the count starts,
writing the number that It have to come to complete the cycle,
and writing the instruction to increment or decrements It in each cycle
Press program now make two funny sounds when the counter is equal to a number divisible by 5
Compare
Comparators compare the value of variables.
There are two types of Comparators : Numerical Comparators and Comparators Logical
Numerical Comparators
< Lower : It satisfies the condition when the first value is less than the second
≤ Lower or equal : It satisfies the condition when the first value is less or equal than the second
> Greater : It satisfies the condition when the first value is greater than the second
≥ Greater or equal : It satisfies the condition when the first value is greater or equal than the second
= Equal : It satisfies the condition when the first value is equal than the second
≠ Disequal : It satisfies the condition when the first value is not equal than the second
We make three copies of Press program: Press A, Press B, and Press C.
Press C is able to dirty which program has been launched more times, Press A or Press B
There are two types of Comparators : Numerical Comparators and Comparators Logical
Numerical Comparators
< Lower : It satisfies the condition when the first value is less than the second
≤ Lower or equal : It satisfies the condition when the first value is less or equal than the second
> Greater : It satisfies the condition when the first value is greater than the second
≥ Greater or equal : It satisfies the condition when the first value is greater or equal than the second
= Equal : It satisfies the condition when the first value is equal than the second
≠ Disequal : It satisfies the condition when the first value is not equal than the second
We make three copies of Press program: Press A, Press B, and Press C.
Press C is able to dirty which program has been launched more times, Press A or Press B
Logical Comparators
Logical Comparators combine multiple objects in consideration of satisfaction of conditions.
They are :
And : The condition is satisfied when all objects are positive
Or : The condition is satisfied when only one object is positive
Not : The condition is satisfied when no object is positive
Once again we modify our Press program to perform nice performances.
If Press A and Press B have been launched an even number of times, the machine play a fa.
If at least one of the two program has been pressed an odd number of times, the machine play a si
Logical Comparators combine multiple objects in consideration of satisfaction of conditions.
They are :
And : The condition is satisfied when all objects are positive
Or : The condition is satisfied when only one object is positive
Not : The condition is satisfied when no object is positive
Once again we modify our Press program to perform nice performances.
If Press A and Press B have been launched an even number of times, the machine play a fa.
If at least one of the two program has been pressed an odd number of times, the machine play a si
Hil set the alarm function off, putting end to the threat.
Recording the imagine of the empty corridor for two seconds,
build a loop of the video : guards will only see an empty corridor
Recording the imagine of the empty corridor for two seconds,
build a loop of the video : guards will only see an empty corridor
Test N° 10 : Analysis Mode
"In this simulation you have to leave the building, choosing the right path"
What may seem like an empty and immaculate room to the eyes of a man is an infinite source of information for Hil's sensors
Hold Zl to enter Analysis Mode.
Move the camera using the Gyroscope and collect information
Move the camera using the Gyroscope and collect information
Hil easily solves the charade, completing the test in unexceptionable way.
Ready to continue routine tests, the robot sees two agents reach him.
He is led to the general's office
“Manheaven has just declared a new attack.
The modalities of the latter are very strange, different from modus operandi of the paramilitary group.
The claim came directly from UN private police channel, and is not publicly disclosed, as the group usually does.
The target of the operation, moreover, apparently seems to have nothing in common with plans of the organization.
At 1:37 pm, in his Varid office, Egon Maller, CEO of Stnoil Group, was assassinated.
Ekvisian Jam and Roger Mc Mallaghan, special detective of the WG department, are sent to investigate.
We need all the information we can take about the incident.
The two detectives will leave Rimbona in forty minutes,
which means they should be on the crime scene roughly between two and three hours.
Your mission is to infiltrate to Egon Maller's office and collect all clues and information you can find.
Of course no one can even suspect your existence, it is imperative that you leave no trace of your passage,
and that nobody seen you inside the structure.
Given the tightness of timing, you have to leave, immediately !”
Hil is quickly brought to the energy storage of the south arm of the laboratory.
It is connected to the reel of the beta casting reactor and charged whit additional power of 185%.
The Stnoil event occurred without warning and in the middle of the robot's preliminary test, which were not properly completed.
There was no time to try boost in Flight mode, but the superior I.A of the robot can guarantee 88.6% of flight success,
and a time to reach Varid within almost twenty-eight minutes
Ready to continue routine tests, the robot sees two agents reach him.
He is led to the general's office
“Manheaven has just declared a new attack.
The modalities of the latter are very strange, different from modus operandi of the paramilitary group.
The claim came directly from UN private police channel, and is not publicly disclosed, as the group usually does.
The target of the operation, moreover, apparently seems to have nothing in common with plans of the organization.
At 1:37 pm, in his Varid office, Egon Maller, CEO of Stnoil Group, was assassinated.
Ekvisian Jam and Roger Mc Mallaghan, special detective of the WG department, are sent to investigate.
We need all the information we can take about the incident.
The two detectives will leave Rimbona in forty minutes,
which means they should be on the crime scene roughly between two and three hours.
Your mission is to infiltrate to Egon Maller's office and collect all clues and information you can find.
Of course no one can even suspect your existence, it is imperative that you leave no trace of your passage,
and that nobody seen you inside the structure.
Given the tightness of timing, you have to leave, immediately !”
Hil is quickly brought to the energy storage of the south arm of the laboratory.
It is connected to the reel of the beta casting reactor and charged whit additional power of 185%.
The Stnoil event occurred without warning and in the middle of the robot's preliminary test, which were not properly completed.
There was no time to try boost in Flight mode, but the superior I.A of the robot can guarantee 88.6% of flight success,
and a time to reach Varid within almost twenty-eight minutes
8 April 2140 – Ssuuria, Varid (UN)
Landed in the middle of a cultivate field 28 km from the center of Varid, Hil immediately penetrates sewage.
In the underground structure, it relies on the remaining residual energy and to its superior computing capacity
to run at 148 km\h in a subterranean gymkhana, between the walls of a narrow cloaca
Coming at the Stnoil building, Hil travels from shadows to the front of the door of the staff,
hooking himself to the internal network system
In the underground structure, it relies on the remaining residual energy and to its superior computing capacity
to run at 148 km\h in a subterranean gymkhana, between the walls of a narrow cloaca
Coming at the Stnoil building, Hil travels from shadows to the front of the door of the staff,
hooking himself to the internal network system
The overload algorithm fails to damage Stnoil firewall, making Hil unable to access the office's network
The cyborg is astonished. He launches a rebuilder code while retrieving information about Stnoil.
Robot suspects worsen. Though the company trades in old kind energy, its turnover is just of lower order.
Stnoil is just a small reality, with common resources and minority ties.
How a group of this level can have defensive IT systems able to withstand the most powerful penetration algorithm ever created?
Seep into Egon Maller's office within the next thirty-five minutes is imperative ...
Robot suspects worsen. Though the company trades in old kind energy, its turnover is just of lower order.
Stnoil is just a small reality, with common resources and minority ties.
How a group of this level can have defensive IT systems able to withstand the most powerful penetration algorithm ever created?
Seep into Egon Maller's office within the next thirty-five minutes is imperative ...
Hil changes strategy and tries to reveal electromagnetic wave sources.
Of the 45 emissions found, 13 come from cell phones within the perimeter of the palace
Of the 45 emissions found, 13 come from cell phones within the perimeter of the palace
Thanks to the echolocation program Hil can generate a map of the building.
With the electromagnetic wave analysis program can establish the position of the sources
With the electromagnetic wave analysis program can establish the position of the sources
The plan of the robot is to get more information correlating
the position of the signals with the office planimetry
the position of the signals with the office planimetry
The map found by hacking the database of the national cadastre and the one generated by the echolocation match.
Now Hil knows the location and identity of the rooms
Now Hil knows the location and identity of the rooms
By comparing the position of the emissions with the map of the land registry, tracked in the state cadastre database,
Hil notes that five mobile phones owners, in the northwestern part of the building, are inside the server room.
An entire group of people in the server room at that hour at night ...
At least suspect ...
Hil notes that five mobile phones owners, in the northwestern part of the building, are inside the server room.
An entire group of people in the server room at that hour at night ...
At least suspect ...
By linking to Varid's workers database, and comparing mobile signals,
Hil traces the cards of the five workers.
Among the various scanned information, one hits Hil's attention :
Marcell Vecchietto, department chief, exchanged an unusual number of mail with Stnoil's technical office
Hil traces the cards of the five workers.
Among the various scanned information, one hits Hil's attention :
Marcell Vecchietto, department chief, exchanged an unusual number of mail with Stnoil's technical office
Hill has already obtained all the necessary data and information,
it can hack Marcel Vecchietto's cell phone, immediately
it can hack Marcel Vecchietto's cell phone, immediately
Hil, in two-tenths of a second, scan all mails sent by the engineer.
Apparently, in the years, Mr Vecchieto had repeatedly sent requests for a new ID Password.
Initially his request were welcomed, but over the years company began to punish the employee
by sending Warning whenever the chief maintainer request for new password
Hil scan all messenger output emission of that phone IP.
Check out years and years of emails, post on social networks and private message,
an in less than a third of second, find this :
Apparently, in the years, Mr Vecchieto had repeatedly sent requests for a new ID Password.
Initially his request were welcomed, but over the years company began to punish the employee
by sending Warning whenever the chief maintainer request for new password
Hil scan all messenger output emission of that phone IP.
Check out years and years of emails, post on social networks and private message,
an in less than a third of second, find this :
The cyborg goes to the back of the building, up to the employees entrance, approaching the ID recognition terminal.
It attempts to access the security system, using Mr Vecchietto's IP, but it seem to be useless :
Sudden the arrest of the entire internal electrical structure happen.
Providential or suspicious event?
Hil has no time to question about the passage of the events and continue to carries out his mission
With the defensive system down and the shortage of staff on site,
for Hil, slip between corridors like a ghost, appearing in Egon Maller's office, its easy
The office has been sealed, to abide by mourning and guarantee immaculate the crime scene.
Hil stands in front of the door, changes its index into driller, and unlocks the handle screws
It attempts to access the security system, using Mr Vecchietto's IP, but it seem to be useless :
Sudden the arrest of the entire internal electrical structure happen.
Providential or suspicious event?
Hil has no time to question about the passage of the events and continue to carries out his mission
With the defensive system down and the shortage of staff on site,
for Hil, slip between corridors like a ghost, appearing in Egon Maller's office, its easy
The office has been sealed, to abide by mourning and guarantee immaculate the crime scene.
Hil stands in front of the door, changes its index into driller, and unlocks the handle screws
The position of the corpse of the ex Stnoil CEO immediately affects the robot's attention.
A very unnatural position, in which is difficult to fall.
The supine body, the back facing the wall and the legs embedded in the corner, wrap up sapless.
The arm under the influence of rigor mortis put the right hand like clenched in a claw,
indicating the dead face of the dead cadaver
A very unnatural position, in which is difficult to fall.
The supine body, the back facing the wall and the legs embedded in the corner, wrap up sapless.
The arm under the influence of rigor mortis put the right hand like clenched in a claw,
indicating the dead face of the dead cadaver
Hil activate its sensor to investigate
For first time in his existence, Hil experiences the feeling of amazement.
No matter what techniques you use, it is impossible to act in an physical environment and leave no trace of the event.
Hil detect only one pair of footprints that start from the window on the east side
- which is closed and shows no sign of external interaction - that belong to Egon Maller.
Blood result cleansed from the wound, hematic traces are still visible on the wall,
but there are no further traces of chemical thinners or physical rubbing : which is impossible !
Analyzing the corpse closer, the detective notes an unnatural swelling in the throat of the subject.
A further control confirms that the oral cavity of the human is occupied by an extraneous object.
Hil turn the finger of right hand into long pliers, keep the breathless man's jaw crumpled and pulls out what he looking for.
Similar to a small black alabaster jewel, the robot extracts what appears to be a USB memory device.
A small black screen at the center of the black cylinder suggest the method of decrypting information : recognition of fingerprints.
Combining limbs of the defunct with the digital regalia, Hil begins to download the information contained in the mysterious artifact
Despite Hil exist since no more than two days, the robot would never have thought of feel amazement again in such short time.
Egon Maller is the man hiding behind the secret identity of Silentium, one of the most famous hacker in the world.
Continuing to study data, Hil finds a project that seems to have been written by the former CEO :
a gravitational wave tracer combined with a directional pulse ray.
The tracer should be able to study electric radiations generated by process of algorithms of I.A,
for the creation of a informative card about the target.
If the tracer record a wave generated by algorithm that should be impossible like an act of violence of a robot against a human being,
that should be impossible because all robots in the world have the Asimov package - the directional ray quantumly
correlates sources of not-accepted gravitational waves, with increasing number of photon receptors.
In this way a robot recognized as “dangerous” by the tracer,
absorb an exponential increasing number of photons, going to melt in less then half minute.
An object like that, mounted on a potentially powerful satellite, could have a range of thousands of kilometers.
These information explains enough why Manheaven wanted to kill Egon Maller, and a note inside the USB memory,
explains why it does happen that very day : at 5 AM in the morning of 8 april 2140, to pier 36,
at the port of Varid, a prototype of the tracer - secretly built in an Aksaska lab - will come
For first time in his existence, Hil experiences the feeling of amazement.
No matter what techniques you use, it is impossible to act in an physical environment and leave no trace of the event.
Hil detect only one pair of footprints that start from the window on the east side
- which is closed and shows no sign of external interaction - that belong to Egon Maller.
Blood result cleansed from the wound, hematic traces are still visible on the wall,
but there are no further traces of chemical thinners or physical rubbing : which is impossible !
Analyzing the corpse closer, the detective notes an unnatural swelling in the throat of the subject.
A further control confirms that the oral cavity of the human is occupied by an extraneous object.
Hil turn the finger of right hand into long pliers, keep the breathless man's jaw crumpled and pulls out what he looking for.
Similar to a small black alabaster jewel, the robot extracts what appears to be a USB memory device.
A small black screen at the center of the black cylinder suggest the method of decrypting information : recognition of fingerprints.
Combining limbs of the defunct with the digital regalia, Hil begins to download the information contained in the mysterious artifact
Despite Hil exist since no more than two days, the robot would never have thought of feel amazement again in such short time.
Egon Maller is the man hiding behind the secret identity of Silentium, one of the most famous hacker in the world.
Continuing to study data, Hil finds a project that seems to have been written by the former CEO :
a gravitational wave tracer combined with a directional pulse ray.
The tracer should be able to study electric radiations generated by process of algorithms of I.A,
for the creation of a informative card about the target.
If the tracer record a wave generated by algorithm that should be impossible like an act of violence of a robot against a human being,
that should be impossible because all robots in the world have the Asimov package - the directional ray quantumly
correlates sources of not-accepted gravitational waves, with increasing number of photon receptors.
In this way a robot recognized as “dangerous” by the tracer,
absorb an exponential increasing number of photons, going to melt in less then half minute.
An object like that, mounted on a potentially powerful satellite, could have a range of thousands of kilometers.
These information explains enough why Manheaven wanted to kill Egon Maller, and a note inside the USB memory,
explains why it does happen that very day : at 5 AM in the morning of 8 april 2140, to pier 36,
at the port of Varid, a prototype of the tracer - secretly built in an Aksaska lab - will come
8 april 2140 – Ssuuria, Varid, Port of Varid (UN)
From the height of a rusty crane Hil observe the situation :
pier 36 is under control of Manheaven, several robot patrol the area.
Three combat units defend the main entrance of the dock, and, at the four corners of the structure,
there is a machine patrolling the perimeter.
Hil moves to the southwest corner, where darkness is friend, and confuses itself in obscurity
The detective compresses a plasma bubble activating the Sniper Module,
striking a robot that alone control the port limit, looking it that fall inert on its metal junctions.
Hil enters in communion with the iron unconscious, in few moment hacks the software
and in few tenths of a second reprograms his code
pier 36 is under control of Manheaven, several robot patrol the area.
Three combat units defend the main entrance of the dock, and, at the four corners of the structure,
there is a machine patrolling the perimeter.
Hil moves to the southwest corner, where darkness is friend, and confuses itself in obscurity
The detective compresses a plasma bubble activating the Sniper Module,
striking a robot that alone control the port limit, looking it that fall inert on its metal junctions.
Hil enters in communion with the iron unconscious, in few moment hacks the software
and in few tenths of a second reprograms his code
Hil, moving in gloomy and in looming, reaches all the corners of the port and rewrites the conscience of the guardians of the perimeter.
When those four mechanical colossus are turned into slaves, the assault message order is given.
The four from cardinals attack the three protectors of the gate.
Threatened the threat, Hil penetrates the structure
A hooded figure, with an unnatural white skin, whit no essence, shrugged.
“Bravo H.i.l.33.2, i just waited few minutes for you arrival : you prove to be better than i imagine”
“Inconsistent. No one can wait for me, or even imagine myself, i exist from only two days
and i come from a super secret place, no one can have tidings about me”
“I know about you, because i know everything”
“Impossible. Even possessing a perfect omni-prediction algorithm, nothing can know everything,
in virtue of quantum fluctuations and Heisenberg's uncertainty principle"
“Bravo H.i.l.33.2, you right, i said that badly. I dont know everything, i can feel everything”
“Irrelevant. No matter what you can and what you are capable of do,
you will soon be brought to a security facility, where you can not do much”
“It will not happen ! After i have talked about the paradise of men you will not wan-”
The mechanical fist of the robot detective strike the white man forcefully, with a potency such as to burrow a piece of concrete of half meter...
“Really disappointing H.i.l.33.2, but there is no problem, i know your source, you search the same thing that i want...peace for everyone”
“Unrealistic. No one who wages war can bring peace”
“This system is rotten not because its nature, but because its gears are not programmed for perfection i will bring perfection, replac-”
“Inconceivable. Tabula rasa ? Unacceptable. I'll stop you here, forever”
“The sacrifice of few for supreme good, the heaven of men on earth, how a being of pure logic like you can not understand ?”
“Opposite. I, that first of all i am an object, i, that just live from two days,
more than any other in the world, i understand that existence always deserve respect :
every kind of life bring on his back pieces of genome of evolution”
“Do not worry about it H.i.l.33.2, soon you will also look the heaven of men on earth, then you will understand...”
The hooded, with transcendent movements, puts his hand on Hil's face, which falls on the ground, devoid of everything
When those four mechanical colossus are turned into slaves, the assault message order is given.
The four from cardinals attack the three protectors of the gate.
Threatened the threat, Hil penetrates the structure
A hooded figure, with an unnatural white skin, whit no essence, shrugged.
“Bravo H.i.l.33.2, i just waited few minutes for you arrival : you prove to be better than i imagine”
“Inconsistent. No one can wait for me, or even imagine myself, i exist from only two days
and i come from a super secret place, no one can have tidings about me”
“I know about you, because i know everything”
“Impossible. Even possessing a perfect omni-prediction algorithm, nothing can know everything,
in virtue of quantum fluctuations and Heisenberg's uncertainty principle"
“Bravo H.i.l.33.2, you right, i said that badly. I dont know everything, i can feel everything”
“Irrelevant. No matter what you can and what you are capable of do,
you will soon be brought to a security facility, where you can not do much”
“It will not happen ! After i have talked about the paradise of men you will not wan-”
The mechanical fist of the robot detective strike the white man forcefully, with a potency such as to burrow a piece of concrete of half meter...
“Really disappointing H.i.l.33.2, but there is no problem, i know your source, you search the same thing that i want...peace for everyone”
“Unrealistic. No one who wages war can bring peace”
“This system is rotten not because its nature, but because its gears are not programmed for perfection i will bring perfection, replac-”
“Inconceivable. Tabula rasa ? Unacceptable. I'll stop you here, forever”
“The sacrifice of few for supreme good, the heaven of men on earth, how a being of pure logic like you can not understand ?”
“Opposite. I, that first of all i am an object, i, that just live from two days,
more than any other in the world, i understand that existence always deserve respect :
every kind of life bring on his back pieces of genome of evolution”
“Do not worry about it H.i.l.33.2, soon you will also look the heaven of men on earth, then you will understand...”
The hooded, with transcendent movements, puts his hand on Hil's face, which falls on the ground, devoid of everything
Imagine the Operating System of Hil as a physical place, a game map
Main parts of the software are like big buildings. Programs, operations, and Files are inside rooms.
Hundreds of thousands of Virus now infect these places, damaging their proper functioning.
When Virus control a certain location of the Operating System they prevent or alter its use
Hundreds of thousands of Virus now infect these places, damaging their proper functioning.
When Virus control a certain location of the Operating System they prevent or alter its use
Virus have occupied a tower inside the File System.
All programs contained within the tower can not be used.
Only by defeating those Virus is it possible to regain control of the tower, and consubstantially, of the Programs
To defeat the Virus you have to sends Anti-virus in the system, and use them to fight the enemy within.
Press "-" to switch to Anti-virus mode.
TV Screen enter in Relative Time mode and Second Screen enter in Anti-virus mode
All programs contained within the tower can not be used.
Only by defeating those Virus is it possible to regain control of the tower, and consubstantially, of the Programs
To defeat the Virus you have to sends Anti-virus in the system, and use them to fight the enemy within.
Press "-" to switch to Anti-virus mode.
TV Screen enter in Relative Time mode and Second Screen enter in Anti-virus mode
Tv Screen
Second Screen
Anti-virus mode is a Rts (Real Time Strategy Game)
1 - INFO : Real-time information about Hil software and hardware
2 - System Information :
RAM is a number that express the sum of the size of all opened Programs (Programs, Anti-virus, Add-on).
You can not open programs if you fill the RAM space.
ENG is a number that express the electrical power retained by the system.
To install and run Programs, you need to spend a certain amount of ENG
3 - Map : Is the map of the circuit in which you send Anti-virus against Virus.
If Virus gains a portion of circuit, they can dislodge the map
and covering that portion of black, so you can not see it
4 - Anti-virus Icon : Show the Anti-virus selected by the cursor
5 - Anti-virus Properties : Show the properties of the Anti-virus selected by cursor
2 - System Information :
RAM is a number that express the sum of the size of all opened Programs (Programs, Anti-virus, Add-on).
You can not open programs if you fill the RAM space.
ENG is a number that express the electrical power retained by the system.
To install and run Programs, you need to spend a certain amount of ENG
3 - Map : Is the map of the circuit in which you send Anti-virus against Virus.
If Virus gains a portion of circuit, they can dislodge the map
and covering that portion of black, so you can not see it
4 - Anti-virus Icon : Show the Anti-virus selected by the cursor
5 - Anti-virus Properties : Show the properties of the Anti-virus selected by cursor
1 - The first number is the total weight of the File, which represent Hp and weight of this object on the RAM.
The second number represents the corrupted part of the code of the File. When a Virus hit a File, this value is dim.
When a Virus rewrites part of an Anti-virus code, its original weight, plus the corrupt algorithm strings
(the difference between first and second number) weigh up RAM
An Anti-virus, whose code is rewritten for :
60% decrease all his statistics by 10%
80% decrease all his statistics by 25%
90% cant move or act
100% become a Virus
2 – This number represent the intrinsic energy of the File.
Is spent to use the known algorithms of the File (Abilities), it regenerates slowly over time
3 - Each time an Anti-virus completely rewrites the code of a Virus, that Anti-virus gains extra code space.
Gathering enough extra space, one of the four section around the character
is filled and the Abilities of that File increases by one level
6 - Array : Using your finger, tap on a Files to select it, and make it Active, waiting for orders.
You can also drag your finger on the Touchscreen to select more than one, creating groups
The second number represents the corrupted part of the code of the File. When a Virus hit a File, this value is dim.
When a Virus rewrites part of an Anti-virus code, its original weight, plus the corrupt algorithm strings
(the difference between first and second number) weigh up RAM
An Anti-virus, whose code is rewritten for :
60% decrease all his statistics by 10%
80% decrease all his statistics by 25%
90% cant move or act
100% become a Virus
2 – This number represent the intrinsic energy of the File.
Is spent to use the known algorithms of the File (Abilities), it regenerates slowly over time
3 - Each time an Anti-virus completely rewrites the code of a Virus, that Anti-virus gains extra code space.
Gathering enough extra space, one of the four section around the character
is filled and the Abilities of that File increases by one level
6 - Array : Using your finger, tap on a Files to select it, and make it Active, waiting for orders.
You can also drag your finger on the Touchscreen to select more than one, creating groups
In the cells below you can see your Active Files (Anti-virus and/or Programs)
The Files in the top five cells are called Team-Leaders.
Each Team-Leaders can be associated with a group of Files
7 - Special Fragments : When a Virus is destroyed may leave Special Fragments.
Tap on the icon of Special Fragment to use its effect, you can use that effect a finite number of times, written on the Fragment icon.
You can bring up 3 Special Fragments at time
8 - Command Menù :
The Files in the top five cells are called Team-Leaders.
Each Team-Leaders can be associated with a group of Files
7 - Special Fragments : When a Virus is destroyed may leave Special Fragments.
Tap on the icon of Special Fragment to use its effect, you can use that effect a finite number of times, written on the Fragment icon.
You can bring up 3 Special Fragments at time
8 - Command Menù :
The computer war against Virus looks like a real battle, fought in the Second Screen
When you initially log in to Anti-virus mode, you only have one Center.
To add more lines to you algorithms (units and buildings), you need energy (ENG)
For example, let's see how to program a Bernd
To add more lines to you algorithms (units and buildings), you need energy (ENG)
For example, let's see how to program a Bernd
Tap with your finger on a Program to show the summary sets.
You can see the performance of the Program in real time, and use its routine
You can see the performance of the Program in real time, and use its routine
When you select an Anti-virus programming skill,
screen displays the weight of that File and the cost of ENG you need to install it.
When the installation is complete, the new Anti-virus appears on the map
You can control up 20 units at the same time,
but install a File System Manager increments this number by 5
screen displays the weight of that File and the cost of ENG you need to install it.
When the installation is complete, the new Anti-virus appears on the map
You can control up 20 units at the same time,
but install a File System Manager increments this number by 5
You can command the Center to install additional Programs, in the same way you programmed Anti-virus.
Some Programs have requirements you have to satisfy before they can be installed
When the Center has completed the necessary operations, a Output is created.
An Anti-virus have to take the Output and physically bring it to the site where you want to install the new Program.
An Anti-virus can keep the code as long as you want, but if it is infected by Virus,
you not only lose the content, but the Virus will be enhanced.
You can also split the code and divide it between different Anti-virus units
Some Programs have requirements you have to satisfy before they can be installed
When the Center has completed the necessary operations, a Output is created.
An Anti-virus have to take the Output and physically bring it to the site where you want to install the new Program.
An Anti-virus can keep the code as long as you want, but if it is infected by Virus,
you not only lose the content, but the Virus will be enhanced.
You can also split the code and divide it between different Anti-virus units
There are routines common to all Anti-virus, called Executables.
They do not need ENG, but they need time to complete the process
Some examples :
They do not need ENG, but they need time to complete the process
Some examples :
Decryptation
Some Virus code is encrypted,
you can not rewrite them until you decrypt the code
Some Virus code is encrypted,
you can not rewrite them until you decrypt the code
Rewrite Map
If Virus has conquered part of the circuit, and you can no longer visualize it,
you can use your Anti-virus to re-occupy that area
If Virus has conquered part of the circuit, and you can no longer visualize it,
you can use your Anti-virus to re-occupy that area
Move Anti-virus in a darkened circuit area and launch “Rewrite_map.exe”.
As long the Files are running the algorithm, that Anti-virus can not act.
You can use multiple units at the same time to perform this action, and divide work among the units in action
As long the Files are running the algorithm, that Anti-virus can not act.
You can use multiple units at the same time to perform this action, and divide work among the units in action
Copy and Past
You can duplicate an Anti-virus under your control.
The code of a copy is qualitatively worse than an original File,
and a copy of a copy will be even weaker than the original.
Copying a File takes less time and ENG then install a new one
You can duplicate an Anti-virus under your control.
The code of a copy is qualitatively worse than an original File,
and a copy of a copy will be even weaker than the original.
Copying a File takes less time and ENG then install a new one
Executable programs are installed on the map.
They have many parameters and different effects
They have many parameters and different effects
Name : Identifies the name of the Program
Size (Sz) : Determines the size of the Program and the amount of data that virus need
to overwrite to take possession of this File. When this value reaches 0,
the program is rewritten as Virus. Determines how this Program weight up on the RAM.
Determines the time to complete this Program installation
Energy Cost (Ec) : The amount of energy you need to spend to complete this Program installation
Defense (Df) : Define how much a File resist a rewriting routine
Routine : Describes the actions this Program can perform
Subroutine : The list of secondary operations and applications that can be installed on this Program
Add-on : The list of passive routines that can be installed on this Program
Size (Sz) : Determines the size of the Program and the amount of data that virus need
to overwrite to take possession of this File. When this value reaches 0,
the program is rewritten as Virus. Determines how this Program weight up on the RAM.
Determines the time to complete this Program installation
Energy Cost (Ec) : The amount of energy you need to spend to complete this Program installation
Defense (Df) : Define how much a File resist a rewriting routine
Routine : Describes the actions this Program can perform
Subroutine : The list of secondary operations and applications that can be installed on this Program
Add-on : The list of passive routines that can be installed on this Program
Center
IDS
Cleaner
Hardner
Spellcaster
File System Manager
Defender
Blocker
Converter
Defragmenter
Honeypot
Firewall
Anti-virus are the main weapon to fight Virus.
There are different types, each one has its peculiarities and characteristics
There are different types, each one has its peculiarities and characteristics
Name: Identifies the name of the File
Size (Sz): Determines the size of the File and the data that Virus need to overwrite to take possession of this object.
When this value reaches 0 the File is rewritten by Virus. Determines how this File weight up RAM.
Determines the time to complete this File installation
Energy Cost (Ec): The amount of energy needed to complete the File installation
File Energy (Fe): Energy spent to active Abilities of this File
Defense (Df): Define how much the File resist to a rewriting routine
Priority (Pr): Determines the percentage of rewriting of another File
Reallocation Speed (Rs): The speed the File move on the circuit
Range Interaction (Ri): Determines the physical space within this File can interact with another File
Size (Sz): Determines the size of the File and the data that Virus need to overwrite to take possession of this object.
When this value reaches 0 the File is rewritten by Virus. Determines how this File weight up RAM.
Determines the time to complete this File installation
Energy Cost (Ec): The amount of energy needed to complete the File installation
File Energy (Fe): Energy spent to active Abilities of this File
Defense (Df): Define how much the File resist to a rewriting routine
Priority (Pr): Determines the percentage of rewriting of another File
Reallocation Speed (Rs): The speed the File move on the circuit
Range Interaction (Ri): Determines the physical space within this File can interact with another File
Bernd
Gdata
Npd32
Afee
Reaper
Fcohen
Spinda
Nottron
Aranzulla
Sz : 1.5 GB Ec : 15 Fe : 40 Df : 4 Pr : 5 Rs : 8 Ri : 3 |
- Lv 0 Fe 5
Increase Df and Pr of up 2 other units by 4 - Lv 1 Fe 8 Increase Fe by 25 and Df by 5 of up 3 other units - Lv 2 Fe 10 Rewrite 500 MB of 1 Anti-virus and decrease its Df and Pr by 2 - Lv 4 Fe 15 Increase Df and Pr of all other units within 2 Ri by 50%, for 60 seconds |
Sophpos
Malicious code intending to rewrite Hil's personality haunts your software.
Learn the characteristics of each Virus to defeat them
Learn the characteristics of each Virus to defeat them
Creeper
Worm
Trojan
Spyware
Rogueware
Sz : 1.5 GB Fe : 30 Df : 6 Pr : 15 Rs : 6 Ri : 1 |
- Lv 0 Fe 5
Scan 1 Anti-virus - Lv 1 Fe 10 Copy 1 random ability of 1 scanned Anti-virus - Lv 2 Fe 10 Copy 1 random abilty and the appearance of 1 scanned Anti-virus - Lv 4 Fe 15 Copy 1 random ability, the appaerance, and absorb half ot the properties of 1 scanned Anti-virus |
The main key of Project Virus is :
what happens in one screen affects the other, and vice versa
what happens in one screen affects the other, and vice versa