Advertisement
nutter666

TerrorByte

Aug 23rd, 2014
631
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.95 KB | None | 0 0
  1. TerrorByte
  2.  
  3. After accessing the internet for the vey first time, the player must now defend their hard drive from a group of invading viruses, the only thing standing between the viruses and total infection is their trusty mouse pointer. Player collects Bits by killing enemies which are spent on upgrades and also count as the score.
  4.  
  5. Player battles normal viruses in normal waves and faces a boss Viruses every 5 waves
  6.  
  7. ========================
  8. Enemies
  9. ========================
  10. Creepy Crawler
  11. Appearance: Purple
  12. Movement: Vertical Movement, Slow
  13. Threat Level: Low
  14.  
  15. The Creeper Crawler virus is an early and basic variant of the NetCrawler type infection. Whilst it is commonly encountered, due to it's predictable behaviour of crawling direct network paths, it is easy to detect and destroy making it's overall threat level low.
  16.  
  17. -----------------------------------
  18. Bitter Lemon
  19. Appearance: Yellow
  20. Movement: Randomised movement, Slow
  21. Threat Level: Medium
  22.  
  23. An early example of a polymorphic virus, Bitter Lemon uses a basic randomiser algorithm to alternate it's movement between multiple network paths making it less predictable and therefore harder to detect and destroy. This makes it slightly more of a threat than most other commonly encountered viruses.
  24.  
  25. -----------------------------------
  26. Mean Green
  27. Appearance: Green
  28. Movement: Randomised movement, Medium
  29. Threat Level: Medium
  30.  
  31. A more advanced variant of a polymorphic virus, Mean Green's better randomiser algorithm still allows to alternate it's movement between multiple network paths, however it does in a more intelligent way, allowing it to reach and damage critical system sooner. This makes it slightly more of a threat than most other commonly encountered viruses.
  32.  
  33. -----------------------------------
  34. Cherry Bomb
  35. Appearance: Red
  36. Movement: Vertical Movement, slow
  37. Threat Level: High
  38.  
  39. An advanced boot virus containing a secondary payload, Cherry Bomb infects systems in a 2 step process, the initial payload infects the system's boot process and once activated begins to replace files with copies of it's secondary payload, the Code Red virus. Upon detection these payloads are activated, which then attack the core directly.
  40.  
  41. -----------------------------------
  42. Code Red
  43. Appearance: Red
  44. Movement: Randomised movement, Fast
  45. Threat Level: Medium
  46.  
  47. The payload virus spawned by the Cherry Bomb infection.
  48.  
  49. -----------------------------------
  50.  
  51. Deep Blue
  52. Appearance: Blue
  53. Movement: Vertical Movement, Very Fast
  54. Threat Level: Very High
  55.  
  56. An advanced variant of the NetCrawler virus, Deep Blue moves through network paths incredibly rapidly. Further increasing it's threat level, it is often found as the payload in Trojan type infections allowing it to breach a system without initial detection, making it even more dangerous if not destroyed quickly once it is detected.
  57.  
  58. -----------------------------------
  59. Octo Tango
  60. Appearance: Orange
  61. Movement: Snaking, randomised movement, Medium, Turns invisible
  62. Threat Level: High
  63.  
  64. A variant of a stealth virus, Octo Tango uses memory redirection to disguise itself within a system allowing it to avoid detection for short periods of time. Whilst it is disguised, it is unable to be destroyed, this makes it an incredibly dangerous threat.
  65.  
  66. ========================
  67. Bosses
  68. ========================
  69.  
  70. AdSpawner
  71. Appearance: A collection of pop-up ad windows
  72.  
  73. Movement: None, each pop-up blocks the mouse from clicking/destroying viruses under it
  74. Threat Level: Medium
  75.  
  76. -----------------------------------
  77. Trojan
  78. Appearance: A Large Blue Trojan Horse
  79. Movement: Vertical Movement, Slow-Medium,
  80.  
  81. Pretends to be a bonus, passively generating bits every few seconds.
  82. Releases a group of Deep Blues when destroyed.
  83. Will automatically die and release it's Deep Blue payload at a certain Y value.
  84. Threat Level: High
  85.  
  86. -----------------------------------
  87.  
  88. ========================
  89. Upgrades
  90. ========================
  91. More Clicking
  92. Effect: Decreases the Reload speed on the Mouse Pointer.
  93. Cost: 50 Bits
  94. Requires: Nothing
  95.  
  96. More Bits
  97. Effect: Increases the amount of Bits earned for killing an enemy virus with the mouse pointer.
  98. Cost: 100 Bits
  99. Requires: More Clicking
  100.  
  101. Even More Clicking
  102. Effect: Decreases the Reload speed on the Mouse Pointer so it can be used almost constantly.
  103. Cost: 500 Bits
  104. Requires: More Bits
  105.  
  106. Virus Exterminator
  107. Effect: Gives the Mouse Pointer an Area of Effect attack
  108. Cost: 1000 Bits
  109. Requires: Even More Clicking
  110. -----------------------------------
  111. Bit Digger
  112. Effect: A small program which generates 2 Bits for the Player every few seconds.
  113. Cost: 150 Bits
  114. Requires: Nothing
  115.  
  116. Bit Miner
  117. Effect: Increases the number of Bits generated every few seconds to 5
  118. Cost: 350 Bits
  119. Requires: Bit Digger
  120.  
  121. Bit Generator
  122. Effect: Increases the number of Bits generated every few seconds to 10
  123. Cost: 750 Bits
  124. Requires: Bit Miner
  125.  
  126. Bit Flooder
  127. Effect: Increases the number of Bits generated every few seconds to 20
  128. Cost: 1500 Bits
  129. Requires: Bit Generator
  130.  
  131. -----------------------------------
  132. Firewall
  133. Effect: Blocks and destroys 5 Viruses per wave
  134. Cost: 250
  135. Requires: Nothing
  136.  
  137. Improved Firewall
  138. Effect: Blocks and destroys 10 Viruses per wave
  139. Cost: 1000
  140. Requires: Firewall
  141.  
  142. Super Firewall
  143. Effect: Blocks and destroys 20 Viruses per wave
  144. Cost: 2500
  145. Requires: Improved Firewall
  146.  
  147. Ultra Firewall
  148. Effect: Blocks and destroys 30 Viruses per wave
  149. Cost: 5000
  150. Requires: Super Firewall
  151. -----------------------------------
  152. Full Sweep Scan
  153. Effect: Slowly sweeps the entire screen horizontally, eliminating all (non-boss) enemies instantly
  154. Cost: 250
  155. Requires: Nothing
  156.  
  157. Rapid Scanner
  158. Effect: Increases how quickly the Scanner sweeps across the screen
  159. Cost: 1000
  160. Requires: Full Sweep Scan
  161.  
  162. Speed Booter
  163. Effect: Further increases how quickly the Full Sweep Scan recharges between uses
  164. Cost: 2500
  165. Requires: Rapid Scanner
  166.  
  167. Ultra Booter
  168. Effect: Further increases how quickly the Full Sweep Scan recharges between uses
  169. Cost: 5000
  170. Requires: Speed Booter
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement