Let's Play Tron 2.0 part 16 - Digital Cattle Prod
14:39
YAH programs YAH!
Tags: Tron Legacy 2.0 Tron 2.0 Tron Legacy Daft Punk RPG FPS action adventure role playing game first person shooter Lightcycle Disney interactive cyberpunk videogame quest
Added: 1 year ago
From: countzeroLP
Views: 170
[the player walks up to a floating orb, as "CMD: Activate I/O Node" appears on screen]
NODE: Connecting to I/O Grid.
[the image of Ma3a (the computer's AI system) appears above the orb]
MA3A: Jet, what do you make of this?
[a digital transmission (featuring an unknown male voice) begins playing]
GUEST: Ma3a ... [garbled] ... you're still intact ... [garbled] ... sorry about revealing ... [garbled] ... correction ... [garbled] ... I had no choice ... [garbled] ... Tron legacy ... [garbled] ... must find it.
JET: Guest, who are you? Do you know an Alan Bradley? He works in--
NODE: User connection terminated.
[the transmission ends, and the image of Ma3a re-appears]
MA3A: Sorry Jet, the link with Guest has been broken.
JET: Tron ... that was a program my dad wrote years ago. But what's Tron Legacy?
MA3A: I have insufficient data to answer your request.
JET: There must be a connection between the correction algorithms and the Tron Legacy code.
MA3A: I'll perform a system search ... I have located a severely fragmented email that contains strings of text referring to Tron Legacy.
JET: Is it repairable?
MA3A: If you can manage to retrieve the three fragments of the email, reconstructing should not be a problem.
["Message: I/O Node conversation with Ma3a complete" appears on screen]
NODE: Node deactivated.
["Message: You have received a permission" appears on screen]
["Objective: Locate the Tron Legacy code" appears on screen]
["Tasks: enter the archive section and retrieve the Tron Legacy code email fragment #1, retrieve the Tron Legacy code email fragment #2, retrieve the Tron Legacy code email fragment #3" appears on screen]
[the player enters the archive stacks and talks to the "program" (a blue male humanoid figure) standing on a platform]
JET: Can you retrieve Tron Legacy code email fragment number one?
ELIJAH_208: Certainly.
[the platform he is standing on retracts backwards into the stacks area, then "Data Fragment (Located)" appears on screen as the platform returns to its original position]
ELIJAH_208: Here's fragment number one ... Have a nice microcycle.
[a blue screen pops up with the contents of the email fragment]
Subject: Tron Legacy Code
To: KevinFlynn[at]en dot com
From: AlanBradley[at]en dot com
Date: Aug-84
I'm a little confused. I noticed that the Tron Legacy code upgrade is no longer listed on the fourth quarter schedule. Is there something I should know?
Alan Bradley
Senior Programming Engineer
["Message: Fragment #1 received" appears on screen, as the player takes the "Data Stream" warp to "Archive Stack #2", where a yellow male humanoid is standing on a similar platform]
JET: Can you retrieve Tron Legacy code email fragment number two?
DANO_374: Sorry, that's restricted information.
JET: I need that fragment. How can I get it?
DANO_374: Eliminate the Finders scanning the stacks.
["Tasks: Eliminate the Finders scanning the stacks" appears on screen while the platform he is standing on retracts to the side, as the player uses his Identity Disc to defeat the floating enemies in the stacks area]
["Message: Finders eliminated" appears on screen, as the platform moves into the stacks area, then "Data Fragment (Located)" appears on screen as the platform returns to its original position]
DANO_374: Sorry for the delay ... Here's fragment number two.
[a blue screen pops up with the contents of the email fragment]
Subject: Tron Legacy Code
To: AlanBradley[at]en dot com
From: KevinFlynn[at]en dot com
Date: Aug-84
Sorry Alan, I'm pulling the plug on the Tron Legacy project. I know, I know ... I requested the upgrade, but as you know, research in digitization is behind schedule. In fact, destroying the Master Control Program has set us back to the stone age.
Anyway, the Board of Directors wants our top programmers moved to the project and you, my friend, are one of the best. Report to Walter on Monday.
I realize shelving Tron hurts, but look at it this way, you'll be working side by side with your lovely wife.
Kevin Flynn
Senior Executive V.P.
["Message: Fragment #2 received" appears on screen, as the player takes the "Data Stream" warp to "Archive Stack #3", where an orange male humanoid is standing on a similar platform]
JET: Can you retrieve Tron Legacy code email fragment number three?
JOSEF_805: Not while those Finders are scanning the stacks.
["Tasks: Eliminate the Finders scanning the stacks" appears on screen while the platform he is standing on rises to the top of the room, as the player uses his Identity Disc to defeat the floating enemies in the stacks area]
["Message: Finders eliminated" appears on screen, as the platform moves into the stacks area, then "Data Fragment (Located)" appears on screen as the platform returns to its original position]
JOSEF_805: Thanks for your patience ... Here's email fragment number three.
[a blue screen pops up with the contents of the email fragment]
Subject: Tron Legacy Code
To: KevinFlynn[at]en dot com
From: AlanBradley[at]en dot com
Date: Aug-84
As much as I hate the idea of putting a project half complete to the side, I can't deny the logic behind your decision. Tron Legacy is unnecessary if we are not able to digitize anything in the first place.
I'm putting the source code and the latest build notes on our dedicated memory mainframe, EN12-82.
Alan Bradley
Senior Programming Engineer
P.S. Oh, and yes, working with Lora should be great fun.
["Message: Fragmented Tron Legacy code email restored" appears on screen]
["Tasks: Access I/O Node and receive message from Ma3a" appears on screen, as the player returns to the floating orb]
NODE: Connecting to I/O Grid.
JET: Ma3a, I've got it. Tron Legacy appears to be an update to the original Tron program. My father stored the code on mainframe EN-twelve-dash-eighty-two. Are you familiar with this system?
MA3A: I am, but it is no longer online due to User-activated standby.
JET: Can we bring it back online?
MA3A: Yes, but only by routing power to its primary operating system.
JET: How do we do that?
MA3A: We can't. Power routers are ICP-occupied nodes. Without the proper set of permissions, even getting close is impossible.
JET: We'll have to find a way. Meet me at the exit port.
---
From wikipedia.org:
"Tron 2.0" is a first-person shooter computer game developed by Monolith Productions. According to Tron creator Steven Lisberger, Tron 2.0 was the official sequel to the 1982 film Tron, but was later declared non-canon by Tron: Legacy director Joseph Kosinski. The PC version of the game was released by Buena Vista Games on August 26, 2003. The Mac version was released by MacPlay on April 21, 2004.
Bruce Boxleitner reprises his role from the original film as Alan Bradley. Cindy Morgan, who also starred in the original film, voices a new character Ma3a, although Lora Bradley (now Alan's wife, deceased by the game's timeframe) is mentioned by name. Rebecca Romijn provides the voice of Mercury. A new 'light cycle' design was contributed to the game by Syd Mead. The game explained the Tron arcade game, which appears in-game, and film as based on Kevin Flynn's experiences inside ENCOM in the original film.
Plot
The story is centered around Alan's son Jethro ("Jet") Bradley. Since the film's events, ENCOM has been taken over by a company called Future Control Industries (fCon). After talking with his father who is kidnapped while on the phone with Jet, Jet is digitized by Ma3a, Alan's AI computer system, to aid her against Thorne, an executive from fCon improperly digitized into the computer who is now a virus throughout the system. Jet is mistakenly identified as the source of the corruption and captured by Kernel, the systems security control program.
After deciding that Jet is corrupted, Kernel spares Jet on the recommendation of Mercury, another program tasked to help Ma3a, and Jet is sent to the lightcycles game program. After winning several matches, Jet escapes the match with Mercury's help. After they find Ma3a, the server, corrupted beyond saving, is reformatted resulting in Mercury's demise. Jet escapes to the Internet with Ma3a and an uncompiled copy of Tron Legacy, an update of the original 'Tron' program written by Alan Bradley to protect Ma3a. After finding a compiling program on the Internet, Thorne appears to kill Ma3a while the Tron code is compiled and attached to her program. During this, Jet receives a communication from Guest, the User who had assigned Mercury to help Jet. Accessing a video uplink, Jet realizes too late that Guest is his father Alan, locked in a storage closet by fCon's officers Bazra, Popoff and Crowne, begging him not to compile the Legacy program. Legacy activates, revealing that its sole function is to kill any User in the digital world. Jet escapes, and fCon inadvertently saves him by capturing Ma3a in a search program.
Having recovered the correction algorithms necessary to digitize a human, Alan is sent to Thorne's corrupted server. Assisting the ICPs and Kernel, Jet reaches Thorne at the heart of the server and kills Kernel before he can destroy Thorne. Thorne, regaining a moment of lucidity, begs for forgiveness and tells Jet how to enter fCon's server.
Alan and Jet break into fCon's server, which the corporation is planning to use to distribute Datawraiths - digitized human hackers - across the worldwide information network. After Alan and Jet crash the server, the CEO of fCon (possibly Dillinger of the original film, though this is never confirmed) orders Baza, Popoff, and Crowne into the system themselves. Alan, wanting to verify the purity of the correction algorithms, removes them to inspect them as the three are digitized, resulting in a monstrous amalgam of the three, which chases Jet into the digitizing beam; whereupon Jet diverts the three out of the beam and escapes the computer.
Environment
The game, like the film, is set "inside" a computer and cheerfully uses and abuses computing conventions: players will find themselves in the flaming red environment of a firewall and the minimalistic white one of a PDA, battle viruses while fleeing a format, and wield a sniper rifle known as the LOL, additionally amplifying the damage with a skill called Megahurtz.
Programs in the systems also bear various names - ordinary programs have ordinary first names such as Frank_381 or Brian.exe; ICP programs have names resembling system tools such as servwatch.exe or sssys.dll; viruses have garbled names such as HA-HA-HA-0X0??? or 0XFFOOXXOR; resource hogs are named after parodies of popular software such as reelplyr.exe, netscope.exe or ImageShop5.0.exe; major viruses have script names such as viral_launcher.pyc and viral_pickup.pl; and Datawraiths (being in essence digitized humans) feature email addresses such as AndyG[at]fcon.net or GeoffK[at]fcon.net.
The leveling / experience point is represented as software versioning, and skills are subroutines Jet must earn. Depending on the environment, the player can only arm itself with a given amount that fits in the available memory. If attacked by viruses, subroutines can get fragmented or infected, and cannot be used before Jet defragments or disinfects them. If Jet encounters a program unknown to him, he can port it to his own system. Communication between programs is done via IO ports.
Jet can also find and read e-mail messages in certain systems, which partly reveal the game's background story, but also provide insight into the relationship between Alan and his son.
---
From ign.com:
Walkthrough Part 8: Legacy Code
Location: Alan's Desktop PC
As soon as you regain control of Jet you will be asked to reconfigure your Subroutines so do so immediately and disinfect anything that may have been corrupted by those bothersome Z-Lots. To the left of Ma3a there will be Health and Energy Downloads so if need be, fill up before you talk to her.
Ma3a will tell you to access the Archive Bin next to her; do so and download the Video Archive to learn a little bit more about what happened in the lab earlier. Talk to Ma3a three times to learn about fCon, correction algorithms, and Jet's chances of going home. She will receive a signal and take off to the right. Find Ma3a next to an I/O Node and talk to her for your next task: reconfigure the system's com-ports.
Walk down the corridor and you will see four programs lined up; before you get to them, turn left to find two Archive Bins. The first one has 2 emails and an LOL (Alpha) so go ahead and download anything you need from there. You can't access the second bin yet so go back to the programs and talk to each one to get them to start working on the com-ports. After a moment you may notice that only one of the programs is actually working. In order to fix this, walk to the second I/O Node (near where the programs are lined up) and turn to the right to see a Com-port Configuration Panel. Cycle the Com-port Rings once and then talk to the program whose port is now accessible (example: if com-port three becomes accessible, talk to program three) and they will begin fixing the problem. Repeat this process until all four programs are at work and Ma3a will request an I/O Node Link with you. Activate the node to receive a cryptic transmission from an unknown guest. Ma3a will give you a permission and tell you to locate three pieces of a fragmented email regarding something called the Tron Legacy Code.
Go back to the inaccessible Archive Bin and walk past it. Activate the bridge and walk across it until you reach Health and Energy Downloads on the right side, and a program on the left. Talk to the program to receive Tron Legacy Code Email Fragment #1. Continue across the bridge and destroy the Finders that have appeared before entering the Data Stream to reach Archive Stack #2. The first Archive Bin holds a Triangulate (Beta) and an Unknown Subroutine (Beta). Both downloads will consume a LOT of energy so choose wisely. The second Archive Bin contains Permission 5 and an email. Activate the energy bridge, walk down it until you see Health and Energy Downloads and refill your energy to download whatever you skipped over at the bins. When you are ready talk to the program across from the Health and Energy Downloads and three Finders will attack you. Make the Archive a safe place by defeating the Finders and the program will retrieve Tron Legacy Code Email Fragment #2. Continue across the bridge through the Data Stream to Archive Stack #3.
Search the Archive Bin for an email and activate the bridge. Talk to the program located across from the Health and Energy Downloads and he will tell you that Finders are all over the archive. When he moves out of the way you will be attacked by an angry group of Finders. Dodge their attacks and defeat them as quickly as possible but watch out -- Finders coming in from the left and right sides of the bridge will also attack you. The best way to get rid of them is to crouch down on behind the left wall and take turns blasting the Finders in the archive and the Finders coming from the left; or you can do it the super easy way and use the LOL to snipe the Finders inside the Archive at super-human speed, taking them out and stopping the mad flow of Finders behind you (they will still be released, but nowhere near as quickly). Once the archive is cleared out you will receive Tron Legacy Code Email Fragment #3. Continue across the bridge and activate the I/O Node for Ma3a's message. Go into the next room and ride the platform back to the First Archive Floor. ICPs are up here now so be careful. The Archive Bin near the elevator cannot be accessed just yet so beat up on some ICP's and exit this corridor and go back to the energy bridge. Defeating the ICPs here gains you Permission 3. Go back to the previously unattainable Archive Bin to download Permission 8, an email, LOL (Alpha) an Unknown Subroutine, and a Suffusion (Beta). Run back to the exit platform where you first talked to Ma3a; she will be there near a switch. Configure the Exit Port to the Power Router Destination (push the switch) and get the hell out of there.
No comments:
Post a Comment