Introduce JSON assets

This commit is contained in:
Ryan Dwyer 2021-06-11 18:36:29 +10:00
parent 6aec86ff83
commit c9b36ac9b6
5660 changed files with 5648483 additions and 192061 deletions

1
.gitignore vendored
View File

@ -17,3 +17,4 @@ src/assets/*/files/ob/ob_mid.seg
src/assets/*/fonts/*.bin
src/assets/*/sequences/*.seq
src/assets/*/textures/*.bin
src/generated

161
Makefile
View File

@ -165,6 +165,7 @@ CFLAGS = -DVERSION=$(VERSION) \
-woff 581,649,819,820,821,838,852 \
-w2 \
-I src/include \
-I src/generated/$(ROMID) \
$(OPT_LVL) \
$(MIPSISET)
@ -179,27 +180,31 @@ S_FILES := $(shell find src/lib src/game -name '*.s')
# folder at src/assets/$(ROMID) folder. Currently the former is just setup and
# tile files.
ASSET_FILES := \
$(patsubst $(A_DIR)/files/audio/%.mp3, $(B_DIR)/assets/files/A%M, $(shell find $(A_DIR)/files/audio -name '*.mp3')) \
$(patsubst $(A_DIR)/files/chrs/%.bin, $(B_DIR)/assets/files/C%Z, $(shell find $(A_DIR)/files/chrs -name '*.bin')) \
$(patsubst $(A_DIR)/files/guns/%.bin, $(B_DIR)/assets/files/G%Z, $(shell find $(A_DIR)/files/guns -name '*.bin')) \
$(patsubst $(A_DIR)/files/props/%.bin, $(B_DIR)/assets/files/P%Z, $(shell find $(A_DIR)/files/props -name '*.bin')) \
$(patsubst src/files/setup/%.c, $(B_DIR)/assets/files/U%Z, $(shell find src/files/setup -name '*.c')) \
$(patsubst $(A_DIR)/files/setup/%.bin, $(B_DIR)/assets/files/U%Z, $(shell find $(A_DIR)/files/setup -name '*.bin')) \
$(patsubst $(A_DIR)/files/bgdata/%.seg, $(B_DIR)/assets/files/bgdata/%.seg, $(shell find $(A_DIR)/files/bgdata -name '*.seg')) \
$(patsubst $(A_DIR)/files/bgdata/%_pads.bin, $(B_DIR)/assets/files/bgdata/%_padsZ, $(shell find $(A_DIR)/files/bgdata -name 'bg_*_pads.bin')) \
$(patsubst src/files/bgdata/%_tiles.s, $(B_DIR)/assets/files/bgdata/%_tilesZ, $(shell find src/files/bgdata -name 'bg_*_tiles.s')) \
$(patsubst $(A_DIR)/files/bgdata/%_tiles.bin, $(B_DIR)/assets/files/bgdata/%_tilesZ, $(shell find $(A_DIR)/files/bgdata -name 'bg_*_tiles.bin')) \
$(patsubst $(A_DIR)/files/lang/%.c, $(B_DIR)/assets/files/L%, $(shell find $(A_DIR)/files/lang -name '*[EJP].c')) \
$(patsubst $(A_DIR)/files/lang/%.c, $(B_DIR)/assets/files/L%Z, $(shell find $(A_DIR)/files/lang -name '*_str_[fgis].c')) \
$(patsubst $(A_DIR)/files/audio/%.mp3, $(B_DIR)/assets/files/A%M, $(shell find $(A_DIR)/files/audio -name '*.mp3')) \
$(patsubst $(A_DIR)/files/chrs/%.bin, $(B_DIR)/assets/files/C%Z, $(shell find $(A_DIR)/files/chrs -name '*.bin')) \
$(patsubst $(A_DIR)/files/guns/%.bin, $(B_DIR)/assets/files/G%Z, $(shell find $(A_DIR)/files/guns -name '*.bin')) \
$(patsubst $(A_DIR)/files/props/%.bin, $(B_DIR)/assets/files/P%Z, $(shell find $(A_DIR)/files/props -name '*.bin')) \
$(patsubst src/files/setup/%.c, $(B_DIR)/assets/files/U%Z, $(shell find src/files/setup -name '*.c')) \
$(patsubst $(A_DIR)/files/setup/%.bin, $(B_DIR)/assets/files/U%Z, $(shell find $(A_DIR)/files/setup -name '*.bin')) \
$(patsubst $(A_DIR)/files/bgdata/%.seg, $(B_DIR)/assets/files/bgdata/%.seg, $(shell find $(A_DIR)/files/bgdata -name '*.seg')) \
$(patsubst src/files/bgdata/%_tiles.s, $(B_DIR)/assets/files/bgdata/%_tilesZ, $(shell find src/files/bgdata -name 'bg_*_tiles.s')) \
$(patsubst $(A_DIR)/files/bgdata/%_tiles.bin, $(B_DIR)/assets/files/bgdata/%_tilesZ, $(shell find $(A_DIR)/files/bgdata -name 'bg_*_tiles.bin')) \
$(B_DIR)/assets/files/ob/ob_mid.seg.o
LANG_JSON_FILES := $(shell find $(A_DIR)/lang -name '*.json')
PADS_JSON_FILES := $(shell find $(A_DIR)/pads -name '*.json')
LANG_O_FILES := $(patsubst $(A_DIR)/lang/%.json, $(B_DIR)/assets/files/L%.o, $(LANG_JSON_FILES))
PADS_O_FILES := $(patsubst $(A_DIR)/pads/%.json, $(B_DIR)/assets/files/bgdata/bg_%_padsZ.o, $(PADS_JSON_FILES))
O_FILES := \
$(patsubst src/%.c, $(B_DIR)/%.o, $(C_FILES)) \
$(patsubst src/%.s, $(B_DIR)/%.o, $(S_FILES)) \
$(patsubst %, %.o, $(ASSET_FILES)) \
$(patsubst $(A_DIR)/animations/%.bin, $(B_DIR)/assets/animations/%.o, $(shell find $(A_DIR)/animations -name '*.bin')) \
$(B_DIR)/assets/animations/list.o \
$(LANG_O_FILES) \
$(PADS_O_FILES) \
$(B_DIR)/bootloader.o \
$(B_DIR)/assets/animations.o \
$(B_DIR)/assets/copyrightZ.o \
$(B_DIR)/assets/files/list.o \
$(B_DIR)/firingrange.o \
@ -232,7 +237,6 @@ O_FILES := \
$(B_DIR)/assets/sequences.o \
$(B_DIR)/assets/sfx.ctl.o \
$(B_DIR)/assets/sfx.tbl.o \
$(B_DIR)/assets/texturesdata.o \
$(B_DIR)/assets/textureslist.o \
$(B_DIR)/assets/textures/config.o \
$(B_DIR)/romheader.o
@ -281,24 +285,9 @@ $(B_DIR)/pd.z64: $(B_DIR)/stage3.bin
# This works a little backwards, in that the ROM has to be built to at least
# stage 2, then extract-segment is used to slice out the segments.
CHECK_FILES := \
$(B_DIR)/segments/filenames.bin \
$(B_DIR)/segments/firingrange.bin \
$(B_DIR)/segments/game.bin \
$(B_DIR)/segments/data.bin \
$(B_DIR)/segments/lib.bin \
$(B_DIR)/segments/inflate.bin \
$(B_DIR)/segments/mpconfigs.bin \
$(B_DIR)/segments/mpstringsE.bin \
$(B_DIR)/segments/mpstringsJ.bin \
$(B_DIR)/segments/mpstringsP.bin \
$(B_DIR)/segments/mpstringsG.bin \
$(B_DIR)/segments/mpstringsF.bin \
$(B_DIR)/segments/mpstringsS.bin \
$(B_DIR)/segments/mpstringsI.bin \
$(B_DIR)/segments/textureconfig.bin
CHECK_FILES := $(shell awk '{print $$2}' checksums.$(ROMID).md5)
test: rom $(CHECK_FILES) $(ASSET_FILES)
test: $(CHECK_FILES)
@md5sum --quiet -c checksums.$(ROMID).md5
$(B_DIR)/segments/%.bin: $(B_DIR)/stage2.bin
@ -326,8 +315,43 @@ $(B_DIR)/assets/sfx.ctl.o: $(A_DIR)/sfx.ctl
$(B_DIR)/assets/sfx.tbl.o: $(A_DIR)/sfx.tbl
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@
$(B_DIR)/assets/textures.o: $(A_DIR)/textures.bin
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@
################################################################################
# Asset Manager
ASSETMGR_O_FILES := \
$(B_DIR)/assets/animations.o \
$(LANG_O_FILES) \
$(PADS_O_FILES) \
$(B_DIR)/assets/sequences.o \
$(B_DIR)/assets/textureslist.o \
# Anims
$(B_DIR)/assets/animations.o: $(A_DIR)/animations.json
tools/assetmgr/mkanims
# Lang
$(B_DIR)/assets/files/L%.o: $(A_DIR)/lang/%.json
tools/assetmgr/mklang $<
# Lang - but this is the zipped non-obj, for make test
$(B_DIR)/assets/files/L%: $(A_DIR)/lang/%.json
tools/assetmgr/mklang $<
# Pads
$(B_DIR)/assets/files/bgdata/bg_%_padsZ.o: $(A_DIR)/pads/%.json
tools/assetmgr/mkpads $<
# Pads - but this is the zipped non-obj, for make test
$(B_DIR)/assets/files/bgdata/bg_%_padsZ: $(A_DIR)/pads/%.json
tools/assetmgr/mkpads $<
# Sequences
$(B_DIR)/assets/sequences.o: $(A_DIR)/sequences.json
tools/assetmgr/mksequences
# Textures
$(B_DIR)/assets/textureslist.o: $(A_DIR)/textures.json
tools/assetmgr/mktextures
################################################################################
# Files
@ -342,11 +366,6 @@ $(B_DIR)/assets/files/bgdata/bg_%.seg: $(A_DIR)/files/bgdata/bg_%.seg
@mkdir -p $(B_DIR)/assets/files/bgdata
cp $< $@
# BG pads
$(B_DIR)/assets/files/bgdata/bg_%_padsZ: $(A_DIR)/files/bgdata/bg_%_pads.bin
@mkdir -p $(B_DIR)/assets/files/bgdata
tools/rarezip $< > $@
# BG tiles
# src/assets/files/bgdata/bg_foo_tiles.s
# -> B_DIR/assets/files/bgdata/bg_foo_tiles.o (done here)
@ -376,38 +395,6 @@ $(B_DIR)/assets/files/G%Z: $(A_DIR)/files/guns/%.bin
@mkdir -p $(B_DIR)/assets/files
tools/rarezip $< > $@
# Lang
$(B_DIR)/assets/files/lang/%.o: $(A_DIR)/files/lang/%.c
@mkdir -p $(dir $@)
$(IDOCC) -c $(CFLAGS) $< -o $@
$(B_DIR)/assets/files/lang/%.elf: $(B_DIR)/assets/files/lang/%.o
TOOLCHAIN=$(TOOLCHAIN) tools/mksimpleelf $< $@
$(B_DIR)/assets/files/lang/%.bin: $(B_DIR)/assets/files/lang/%.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
$(B_DIR)/assets/files/L%E: $(B_DIR)/assets/files/lang/%E.bin
tools/rarezip $< > $@
$(B_DIR)/assets/files/L%J: $(B_DIR)/assets/files/lang/%J.bin
tools/rarezip $< > $@
$(B_DIR)/assets/files/L%P: $(B_DIR)/assets/files/lang/%P.bin
tools/rarezip $< > $@
$(B_DIR)/assets/files/L%_str_fZ: $(B_DIR)/assets/files/lang/%_str_f.bin
tools/rarezip $< > $@
$(B_DIR)/assets/files/L%_str_gZ: $(B_DIR)/assets/files/lang/%_str_g.bin
tools/rarezip $< > $@
$(B_DIR)/assets/files/L%_str_iZ: $(B_DIR)/assets/files/lang/%_str_i.bin
tools/rarezip $< > $@
$(B_DIR)/assets/files/L%_str_sZ: $(B_DIR)/assets/files/lang/%_str_s.bin
tools/rarezip $< > $@
# OB seg
$(B_DIR)/assets/files/ob/ob_mid.seg.o: $(B_DIR)/assets/files/ob/ob_mid.seg
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@
@ -475,32 +462,6 @@ $(B_DIR)/rsp/%.o: $(E_DIR)/rsp/%.bin
@mkdir -p $(dir $@)
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@
$(B_DIR)/assets/sequences.bin: $(A_DIR)/sequences/sequences.py
ROMID=$(ROMID) tools/mksequences
$(B_DIR)/assets/sequences.o: $(B_DIR)/assets/sequences.bin
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@
$(B_DIR)/assets/texturesdata.bin: $(A_DIR)/textures/textures.py
tools/mktextures
$(B_DIR)/assets/textureslist.bin: $(A_DIR)/textures/textures.py
tools/mktextures
$(B_DIR)/assets/texturesdata.o: $(B_DIR)/assets/texturesdata.bin
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@
$(B_DIR)/assets/textureslist.o: $(B_DIR)/assets/textureslist.bin
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@
$(B_DIR)/assets/animations/%.o: $(A_DIR)/animations/%.bin
@mkdir -p $(dir $@)
TOOLCHAIN=$(TOOLCHAIN) ROMID=$(ROMID) tools/mkrawobject $< $@ 0x1
$(B_DIR)/assets/animations/list.o: $(A_DIR)/animations/list.c
@mkdir -p $(dir $@)
$(IDOCC) -c $(CFLAGS) $< -o $@
$(B_DIR)/lib/ultra/libc/llcvt.o: src/lib/ultra/libc/llcvt.c
@mkdir -p $(dir $@)
/usr/bin/env python3 tools/asmpreproc/asm-processor.py $(OPT_LVL) $< | $(IDOCC) -c $(CFLAGS) tools/asmpreproc/include-stdin.c -o $@
@ -528,12 +489,12 @@ $(B_DIR)/lib/ultra/gu/scale.o: src/lib/ultra/gu/scale.c
@mkdir -p $(dir $@)
$(IDOCC) -c $(CFLAGS) $< -o $@
$(B_DIR)/lib/%.o: src/lib/%.c
$(B_DIR)/lib/%.o: src/lib/%.c $(ASSETMGR_O_FILES)
@mkdir -p $(dir $@)
/usr/bin/env python3 tools/asmpreproc/asm-processor.py $(OPT_LVL) $< | $(IDOCC) -c $(CFLAGS) tools/asmpreproc/include-stdin.c -o $@
/usr/bin/env python3 tools/asmpreproc/asm-processor.py $(OPT_LVL) $< --post-process $@ --assembler "$(TOOLCHAIN)-as -march=vr4300 -mabi=32" --asm-prelude tools/asmpreproc/prelude.s
$(B_DIR)/game/%.o: src/game/%.c
$(B_DIR)/game/%.o: src/game/%.c $(ASSETMGR_O_FILES)
@mkdir -p $(dir $@)
/usr/bin/env python3 tools/asmpreproc/asm-processor.py $(OPT_LVL) $< | $(IDOCC) -c $(CFLAGS) tools/asmpreproc/include-stdin.c -o $@
/usr/bin/env python3 tools/asmpreproc/asm-processor.py $(OPT_LVL) $< --post-process $@ --assembler "$(TOOLCHAIN)-as -march=vr4300 -mabi=32" --asm-prelude tools/asmpreproc/prelude.s
@ -544,7 +505,7 @@ $(B_DIR)/game/chr/chraction.o: src/game/chr/chraction.c
/usr/bin/env python3 tools/asmpreproc/asm-processor.py $(OPT_LVL) $< | $(QEMUCC) -c $(CFLAGS) tools/asmpreproc/include-stdin.c -o $@
/usr/bin/env python3 tools/asmpreproc/asm-processor.py $(OPT_LVL) $< --post-process $@ --assembler "$(TOOLCHAIN)-as -march=vr4300 -mabi=32" --asm-prelude tools/asmpreproc/prelude.s
$(B_DIR)/%.o: src/%.c
$(B_DIR)/%.o: src/%.c $(ASSETMGR_O_FILES)
@mkdir -p $(dir $@)
$(IDOCC) -c $(CFLAGS) $< -o $@

View File

@ -347,31 +347,10 @@ SECTIONS
*/
__rompos = _inflateSegmentRomEnd + ROMALLOCATION_GAME;
__refpos = .;
#define ANIM(id, filename) \
anim##id = . - __refpos; \
build/ROMID/assets/animations/filename (.data)
BEGIN_SEG(animations) SUBALIGN(1)
BEGIN_SEG(animations)
{
#if VERSION == VERSION_JPN_FINAL
#include "../src/assets/jpn-final/animations/list.ld"
#elif VERSION == VERSION_PAL_FINAL
#include "../src/assets/pal-final/animations/list.ld"
#elif VERSION == VERSION_PAL_BETA
#include "../src/assets/pal-beta/animations/list.ld"
#elif VERSION == VERSION_NTSC_FINAL
#include "../src/assets/ntsc-final/animations/list.ld"
#elif VERSION == VERSION_NTSC_1_0
#include "../src/assets/ntsc-1.0/animations/list.ld"
#elif VERSION == VERSION_NTSC_BETA
#include "../src/assets/ntsc-beta/animations/list.ld"
#endif
. = ALIGN(0x10);
build/ROMID/assets/animations/list.o (.data);
build/ROMID/assets/animations.o (.data);
}
END_SEG(animations)

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -1,116 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/* 4*/ " NULL3",
/* 5*/ " NULL4",
/* 6*/ " NULL5",
/* 7*/ " NULL6",
/* 8*/ " NULL7",
/* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.",
/* 10*/ "0230 Hours 15 AUG 2023\n",
/* 11*/ "Obtain De Vries' necklace.\n",
/* 12*/ "Cassandra De Vries'\n",
/* 13*/ "Necklace\n",
/* 14*/ "De Vries' necklace\n",
/* 15*/ "Picked up De Vries' necklace.\n",
/* 16*/ "Disable internal security hub\n",
/* 17*/ "Obtain keycode necklace\n",
/* 18*/ "Download project files\n",
/* 19*/ "Disable external comms hub\n",
/* 20*/ "Gain entrance to laboratory\n",
/* 21*/ "Who are you and what are you doing here?\n",
/* 22*/ "Look out! She's got a gun.\n",
/* 23*/ "You won't shoot me, foolish child!\n",
/* 24*/ "Don't you know who I am?\n",
/* 25*/ "Let's see how you deal with security.\n",
/* 26*/ "PLEASE!!!! Don't kill me!\n",
/* 27*/ "If I were you, I'd leave... NOW!\n",
/* 28*/ "Badly placed ECM Mine.\n",
/* 29*/ "ECM Mine placed correctly.\n",
/* 30*/ "MISSION FAILED - objectives incomplete.\n",
/* 31*/ " MISSION SUCCESSFUL \n",
/* 32*/ "CANNOT complete all objectives.\n",
/* 33*/ "Time to erase those files.\n",
/* 34*/ "Computer executive erased.\n",
/* 35*/ "I'll do what you want!\n",
/* 36*/ "HELP - Intruder!\n",
/* 37*/ "You talk too much.\n",
/* 38*/ "HELP, HELP!\n",
/* 39*/ "I'll do what you want...\n",
/* 40*/ "Logging on now...\n",
/* 41*/ "Okay, I'm in...\n",
/* 42*/ "Goodbye, Dr. Caroll.\n",
/* 43*/ "You've written your last bug, traitor!\n",
/* 44*/ "File download initiated.\n",
/* 45*/ "File download completed.\n",
/* 46*/ "ACCESS DENIED - password needed.\n",
/* 47*/ "Door unlocked.\n",
/* 48*/ "DOH!\n",
/* 49*/ "Unable to download - Data Uplink needed.\n",
/* 50*/ "LIGHTS NOW ON\n",
/* 51*/ "LIGHTS NOW OFF\n",
/* 52*/ "Erase Dr. Caroll conversation...\n",
/* 53*/ "Don't shoot, don't shoot!\n",
/* 54*/ "Critical mission object destroyed.\n",
/* 55*/ "Unacceptable civilian casualties.\n",
/* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/* 57*/ "Critical mission personnel killed.\n",
/* 58*/ "Obtain ECM Mines.\n",
/* 59*/ "Dr. Caroll's\n",
/* 60*/ "ECM Mine\n",
/* 61*/ "An ECM Mine\n",
/* 62*/ "Picked up an ECM Mine.\n",
/* 63*/ "Obtain Data Uplink.\n",
/* 64*/ "\n",
/* 65*/ "Data Uplink\n",
/* 66*/ "A Data Uplink\n",
/* 67*/ "Picked up a Data Uplink.\n",
/* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n",
/* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n",
/* 70*/ "I'll begin at once. Goodbye.\n",
/* 71*/ "Move it!\n",
/* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n",
/* 73*/ "Don't shoot, don't shoot!\n",
/* 74*/ "Datalink broken - connection terminated.\n",
/* 75*/ "Datalink error - incomplete file download.\n",
/* 76*/ "Internal security system temporarily disabled.\n",
/* 77*/ "External communications hub disabled.\n",
/* 78*/ "Laboratory lift located.\n",
/* 79*/ "Security... Help me!\n",
/* 80*/ "ECM Mine needed to disable security hub.\n",
/* 81*/ "ECM Mine needed to disable comms hub.\n",
/* 82*/ "Dummy\n",
/* 83*/ "How dare you disturb me!\n",
/* 84*/ "You will regret this intrusion, girl!\n",
/* 85*/ "If I were you, I'd leave...NOW!\n",
/* 86*/ "Please don't kill me!\n",
/* 87*/ "Don't shoot!\n",
/* 88*/ "Obtain CamSpy.\n",
/* 89*/ "Dr. Caroll's\n",
/* 90*/ "CamSpy\n",
/* 91*/ "A CamSpy\n",
/* 92*/ "Picked up a CamSpy.\n",
/* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n",
/* 94*/ "You're on the same floor as \nCassandra's office.\n",
/* 95*/ "The other hub has got to be in the \nSecurity Room.\n",
/* 96*/ "The basement elevator must be around \nthere somewhere.\n",
/* 97*/ "Security system is now back online.\n",
/* 98*/ "You vandal, you've broken it!\n",
/* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n",
/*100*/ "Why the big hurry?\n",
/*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n",
/*102*/ "Are they all expendable?\n",
/*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n",
/*104*/ "What's the target location?\n",
/*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n",
/*106*/ "How will I recognize him?\n",
/*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n",
/*108*/ "Right, I'm in...\n",
/*109*/ "I...I'm logging on now.\n",
/*110*/ NULL,
/*111*/ NULL,
};

View File

@ -1,116 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|€€竄п<EFBD82>\n\n€゚≧€€<EFBFBD>€ヅataDyne€пメ€〟橿ラ€€<EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>ぢ≫<EFBFBD><EFBFBD><EFBFBD>∩≒€≠艪<EFBFBD>€€<EFBFBD>€縲マぅう<EFBFBD><EFBFBD><EFBFBD>∵⊆≪€÷㏍腐ス♂€゚≧€€マ┨<EFBFBD>∩≒おぁ<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>∵⊆<EFBFBD>€ツくぞぽ<EFBFBD><EFBFBD>ふ£€<EFBFBD>€€縺メ€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>└∈<EFBFBD><EFBFBD>€≠、<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∧⊂Å€<EFBFBD>≫∀<EFBFBD><EFBFBD><EFBFBD>ぽ∈<EFBFBD>Ρ<EFBFBD>€<EFBFBD>€<EFBFBD>€€縺ク<EFBFBD>なτ<EFBFBD><EFBFBD><EFBFBD>√≒√≫≡⊂<EFBFBD>€≠ロ∈€蕫ム€マ♀€€€縲冾о<EFBFBD>ナ≡⊂∀<EFBFBD>⇔⊇≫≒<EFBFBD><EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>пÅ∵€≠艪<EFBFBD><EFBFBD>求マ∀<EFBFBD><EFBFBD><EFBFBD><EFBFBD>χャ∃€<EFBFBD>€€€マÅ<EFBFBD>€<EFBFBD>€€€艢ツ♀€€€<EFBFBD>€€<EFBFBD>メき<EFBFBD>が∩∵づ<EFBFBD><EFBFBD><EFBFBD>€≠ェ∀<EFBFBD>⇔⌒お⊇ぁ<EFBFBD><EFBFBD><EFBFBD>∃≒∃⊇€<EFBFBD>€о゚≧€€<EFBFBD><EFBFBD>€<EFBFBD>€€縺謔モ汲ェ∃<EFBFBD>€<EFBFBD>⊃⇔<EFBFBD>ョャ⌒⊆≫€€<EFBFBD>€€€マン<EFBFBD><EFBFBD><EFBFBD>τ∃┛Χ<EFBFBD>€÷㏍クのは<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ご∈<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Κ<EFBFBD>⇔⊇≫<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭⊆≫<EFBFBD>∀∈り√∃⊇≡⊂<EFBFBD>€\n\n|しじ€操セ<E6938D><EFBDBE>€€<EFBE95><C280>驍黷ヘ∈あい<E38182>\n\n€<EFBFBD>氏メ<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>るれは€<EFBFBD>ヒぶ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫€€梳怙ヲ€蕫ム€マ∈<EFBFBD><EFBFBD>⇔は∈あい<EFBFBD><EFBFBD>€梟朽ユ€<EFBFBD><EFBFBD>マが⌒Γ≒∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€€梳怙ヲ€蕫ム€<EFBFBD><EFBFBD><EFBFBD>∈な<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€≠ヘ<EFBFBD><EFBFBD><EFBFBD>€€€縺ナ∃<EFBFBD><EFBFBD>∃≒∃⊇€<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>ォΞ∃<EFBFBD>€香閨メÅ€\n\n|しじ€逐セ€轢ハ€€<EFBE97>€<EFBE9C><EFBD84><EFBFBD>\n\n€゚≧€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭⊆≫€€€マ♀€<EFBFBD><EFBFBD>堰項<EFBFBD>пメモ€<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€€€÷轢ハ€€<EFBFBD><EFBFBD><EFBFBD>⇔ぷ¬<EFBFBD>⊇⇔⊇≫€<EFBFBD><EFBFBD>€÷<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>蛟゚<EFBFBD>€<EFBFBD>€<EFBFBD>€≠ロま<EFBFBD>€<EFBFBD>€<EFBFBD><EFBFBD>∵ヱ⊃≫∀€÷ヨ<EFBFBD><EFBFBD><EFBFBD>∃≫€ツ∃<EFBFBD>♭ぽま∩≒€轢ハ€€<EFBFBD>€<EFBFBD><EFBFBD>⊂ン<EFBFBD>も♭べ<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≒∃⊇€\n\n|しじ€凍セχ<EFBDBE><CF87>€<EFBFBD>€€<EFBE91>クλえ<CEBB>\n\n€€€<EFBFBD>€€<EFBFBD>メざ<EFBFBD><EFBFBD>€<EFBFBD>€゚≧€€<EFBFBD>λΑ<EFBFBD><EFBFBD>⊥≒⇔⊇≫€ツぽ<EFBFBD>€<EFBFBD>€€縺ク<EFBFBD><EFBFBD>⇔⊇≫χ<EFBFBD>€<EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD>€ツχ<EFBFBD>€€<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>€逐冝<EFBFBD>€€<EFBFBD><EFBFBD>€€<EFBFBD>€€€€<EFBFBD><EFBFBD>€€€€€<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD>€ユ∈<EFBFBD><EFBFBD>€÷<EFBFBD>€€<EFBFBD>クぅう<EFBFBD>λえ<EFBFBD><EFBFBD>€\n\n|しじ€楳セ<E6A5B3>ρ<E383AD>€€€<C280>クあい<E38182>\n\n<EFBFBD><EFBFBD>€<EFBFBD>兤ミ<EFBFBD>€€€€<EFBFBD>窶ニ€<EFBFBD><EFBFBD>о<EFBFBD><EFBFBD>ρ<EFBFBD>€€€<EFBFBD><EFBFBD>るれは∵⊆≫€<EFBFBD><EFBFBD>€梳怙ヲ€蕫ム€マ∈<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€€€縺ナ⇔€о゚≧€€<EFBFBD><EFBFBD>ρΖ€轢ハ€縺ク<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>√♭€<EFBFBD>磨ヨ<EFBFBD><EFBFBD>ρ<EFBFBD>€€€<EFBFBD><EFBFBD>フあい∀∃≫Å∽⊂€\n\n|しじ€斧セ<EFBDBE><EFBD98><EFBFBD>€€<EFBE93>о<EFBE9F>ぢ√\n\n<EFBFBD><EFBFBD><EFBFBD>Ρ<EFBFBD>√⇔⊇≫♀€€€<EFBFBD>€€<EFBFBD>メ∀<EFBFBD><EFBFBD>ρ<EFBFBD>€≦オ<EFBFBD><EFBFBD>€€<EFBFBD>оо<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>せ∃リ<EFBFBD><EFBFBD>ゎ≒∩<EFBFBD><EFBFBD>√⇔⊇∃⊇∵€≠怩捩<EFBFBD>兤ミ<EFBFBD><EFBFBD>∩♭に⇒∩≫<EFBFBD><EFBFBD>€\n\nEND\n",
/* 1*/ "€<EFBFBD>€€<EFBFBD>€福Ыn",
/* 2*/ "|€€竄п<EFBD82>\n\n€゚≧€€<EFBFBD>€ヅataDyne€пメ€〟橿ラ€€<EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>ぢ≫<EFBFBD><EFBFBD><EFBFBD>∩≒€≠艪<EFBFBD>€€<EFBFBD>€縲マぅう<EFBFBD><EFBFBD><EFBFBD>∵⊆≪€÷㏍腐ス♂€゚≧€€マ┨<EFBFBD>∩≒おぁ<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>∵⊆<EFBFBD>€ツくぞぽ<EFBFBD><EFBFBD>ふ£€<EFBFBD>€€縺メ€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>└∈<EFBFBD><EFBFBD>€≠、<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∧⊂Å€<EFBFBD>≫∀<EFBFBD><EFBFBD><EFBFBD>ぽ∈<EFBFBD>Ρ<EFBFBD>€<EFBFBD>€<EFBFBD>€€縺ク<EFBFBD>なτ<EFBFBD><EFBFBD><EFBFBD>√≒√≫≡⊂<EFBFBD>€≠ロ∈€蕫ム€マ♀€€€縲冾о<EFBFBD>ナ≡⊂∀<EFBFBD>⇔⊇≫≒<EFBFBD><EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>пÅ∵€≠艪<EFBFBD><EFBFBD>求マ∀<EFBFBD><EFBFBD><EFBFBD><EFBFBD>χャ∃€<EFBFBD>€€€マÅ<EFBFBD>€<EFBFBD>€€€艢ツ♀€€€<EFBFBD>€€<EFBFBD>メき<EFBFBD>が∩∵づ<EFBFBD><EFBFBD><EFBFBD>€≠ェ∀<EFBFBD>⇔⌒お⊇ぁ<EFBFBD><EFBFBD><EFBFBD>∃≒∃⊇€<EFBFBD>€о゚≧€€<EFBFBD><EFBFBD>€<EFBFBD>€€縺謔モ汲ェ∃<EFBFBD>€<EFBFBD>⊃⇔<EFBFBD>ョャ⌒⊆≫€€<EFBFBD>€€€マン<EFBFBD><EFBFBD><EFBFBD>τ∃┛Χ<EFBFBD>€÷㏍クのは<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ご∈<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Κ<EFBFBD>⇔⊇≫<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭⊆≫<EFBFBD>∀∈り√∃⊇≡⊂<EFBFBD>€\n\n|しじ€操セ<E6938D><EFBDBE>€€<EFBE95><C280>驍黷ヘ∈あい<E38182>\n\n€<EFBFBD>氏メ<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>るれは€<EFBFBD>ヒぶ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫€€梳怙ヲ€蕫ム€マ∈<EFBFBD><EFBFBD>⇔は∈あい<EFBFBD><EFBFBD>€梟朽ユ€<EFBFBD><EFBFBD>マが⌒Γ≒∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€€梳怙ヲ€蕫ム€<EFBFBD><EFBFBD><EFBFBD>∈な<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€≠ヘ<EFBFBD><EFBFBD><EFBFBD>€€€縺ナ∃<EFBFBD><EFBFBD>∃≒∃⊇€<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>ォΞ∃<EFBFBD>€香閨メÅ€\n\n|しじ€逐セ€轢ハ€€<EFBE97>€<EFBE9C><EFBD84><EFBFBD>\n\n€゚≧€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭⊆≫€€€マ♀€<EFBFBD><EFBFBD>堰項<EFBFBD>пメモ€<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€€€÷轢ハ€€<EFBFBD><EFBFBD><EFBFBD>⇔ぷ¬<EFBFBD>⊇⇔⊇≫€<EFBFBD><EFBFBD>€÷<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>蛟゚<EFBFBD>€<EFBFBD>€<EFBFBD>€≠ロま<EFBFBD>€<EFBFBD>€<EFBFBD><EFBFBD>∵ヱ⊃≫∀€÷ヨ<EFBFBD><EFBFBD><EFBFBD>∃≫€ツ∃<EFBFBD>♭ぽま∩≒€轢ハ€€<EFBFBD>€<EFBFBD><EFBFBD>⊂ン<EFBFBD>も♭べ<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≒∃⊇€\n\n|しじ€凍セ<E5878D>ρ<E383AD>€€€<C280>クあい<E38182>\n\n<EFBFBD><EFBFBD>€<EFBFBD>兤ミ<EFBFBD>€€€€<EFBFBD>窶ニ€<EFBFBD><EFBFBD>о<EFBFBD><EFBFBD>ρ<EFBFBD>€€€<EFBFBD><EFBFBD>るれは∵⊆≫€<EFBFBD><EFBFBD>€梳怙ヲ€蕫ム€マ∈<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€€€縺ナ⇔€о゚≧€€<EFBFBD><EFBFBD>ρΖ€轢ハ€縺ク<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>√♭€<EFBFBD>磨ヨ<EFBFBD><EFBFBD>ρ<EFBFBD>€€€<EFBFBD><EFBFBD>フあい∀∃≫Å∽⊂€\n\n|しじ€楳セ<EFBDBE><EFBD98><EFBFBD>€€<EFBE93>о<EFBE9F>ぢ√\n\n<EFBFBD><EFBFBD><EFBFBD>Ρ<EFBFBD>√⇔⊇≫♀€€€<EFBFBD>€€<EFBFBD>メ∀<EFBFBD><EFBFBD>ρ<EFBFBD>€≦オ<EFBFBD><EFBFBD>€€<EFBFBD>оо<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>せ∃リ<EFBFBD><EFBFBD>ゎ≒∩<EFBFBD><EFBFBD>√⇔⊇∃⊇∵€≠怩捩<EFBFBD>兤ミ<EFBFBD><EFBFBD>∩♭に⇒∩≫<EFBFBD><EFBFBD>€\n\nEND\n",
/* 3*/ "|€€竄п<EFBD82>\n\n€゚≧€€<EFBFBD>€ヅataDyne€пメ€〟橿ラ€€<EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>ぢ≫<EFBFBD><EFBFBD><EFBFBD>∩≒€≠艪<EFBFBD>€€<EFBFBD>€縲マぅう<EFBFBD><EFBFBD><EFBFBD>∵⊆≪€÷㏍腐ス♂€゚≧€€マ┨<EFBFBD>∩≒おぁ<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>∵⊆<EFBFBD>€ツくぞぽ<EFBFBD><EFBFBD>ふ£€<EFBFBD>€€縺メ€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>└∈<EFBFBD><EFBFBD>€≠、<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∧⊂Å€<EFBFBD>≫∀<EFBFBD><EFBFBD><EFBFBD>ぽ∈<EFBFBD>Ρ<EFBFBD>€<EFBFBD>€<EFBFBD>€€縺ク<EFBFBD>なτ<EFBFBD><EFBFBD><EFBFBD>√≒√≫≡⊂<EFBFBD>€≠ロ∈€蕫ム€マ♀€€€縲冾о<EFBFBD>ナ≡⊂∀<EFBFBD>⇔⊇≫≒<EFBFBD><EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>пÅ∵€≠艪<EFBFBD><EFBFBD>求マ∀<EFBFBD><EFBFBD><EFBFBD><EFBFBD>χャ∃€<EFBFBD>€€€マÅ<EFBFBD>€<EFBFBD>€€€艢ツ♀€€€<EFBFBD>€€<EFBFBD>メき<EFBFBD>が∩∵づ<EFBFBD><EFBFBD><EFBFBD>€≠ェ∀<EFBFBD>⇔⌒お⊇ぁ<EFBFBD><EFBFBD><EFBFBD>∃≒∃⊇€<EFBFBD>€о゚≧€€<EFBFBD><EFBFBD>€<EFBFBD>€€縺謔モ汲ェ∃<EFBFBD>€<EFBFBD>⊃⇔<EFBFBD>ョャ⌒⊆≫€€<EFBFBD>€€€マン<EFBFBD><EFBFBD><EFBFBD>τ∃┛Χ<EFBFBD>€÷㏍クのは<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ご∈<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>√∬√⌒ぽ≒<EFBFBD><EFBFBD><EFBFBD>も∈べ<EFBFBD><EFBFBD>∃⊇≡⊂<EFBFBD>€\n\n|しじ€操セ<EFBDBE><EFBD98><EFBFBD>€€<EFBE93>о<EFBE9F>ぢ√\n\n<EFBFBD><EFBFBD><EFBFBD>Ρ<EFBFBD>√⇔⊇≫♀€€€<EFBFBD>€€<EFBFBD>メ∀<EFBFBD><EFBFBD>ρ<EFBFBD>€≦オ<EFBFBD><EFBFBD>€€<EFBFBD>оо<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>せ∃リ<EFBFBD><EFBFBD>ゎ≒∩<EFBFBD><EFBFBD>√⇔⊇∃⊇∵€≠怩捩<EFBFBD>兤ミ<EFBFBD><EFBFBD>∩♭に⇒∩≫<EFBFBD><EFBFBD>€\n\nEND\n",
/* 4*/ " NULL3",
/* 5*/ " NULL4",
/* 6*/ " NULL5",
/* 7*/ " NULL6",
/* 8*/ " NULL7",
/* 9*/ "♂d€゚≧€ム€マ\n<EFBFBD><EFBFBD>€準ロ€ユ÷€÷ョ€€<EFBFBD>",
/* 10*/ "€逐逗逐宕操<EFBFBD>逐操符ク€純ヲ<EFBFBD><EFBFBD>€逗逐セ€凍申n",
/* 11*/ "Obtain De Vries' necklace.\n",
/* 12*/ "Cassandra De Vries'\n",
/* 13*/ "€轢ハ€€<EFBFBD>\n",
/* 14*/ "€轢ハ€€<EFBFBD>\n",
/* 15*/ "€€€マ♀€<EFBFBD>€轢ハ€€<EFBFBD>ワ∈み<EFBFBD><EFBFBD>\n",
/* 16*/ "<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>驍黷ヘ∈あい<EFBFBD>\n",
/* 17*/ "€轢ハ€€<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>\n",
/* 18*/ "χ<EFBFBD><EFBFBD>€<EFBFBD>€€<EFBFBD>クλえ<EFBFBD>\n",
/* 19*/ "<EFBFBD>ρ<EFBFBD>€€€<EFBFBD>クあい<EFBFBD>\n",
/* 20*/ "<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD>о<EFBFBD>ぢ√\n",
/* 21*/ "⊆∃<EFBFBD><EFBFBD>€€盾モ求テ<EFBFBD>♭が∈<EFBFBD>⇔⊇≫<EFBFBD>€\n",
/* 22*/ "€€€€潤テ<EFBFBD><EFBFBD>€≠焉クぷ<EFBFBD>⇔≫∝€\n",
/* 23*/ "<EFBFBD>∋∃<EFBFBD><EFBFBD>€煤クべ⇔≫∝<EFBFBD>∵∃⊇∝€\n",
/* 24*/ "ヴ∈<EFBFBD>Å∀━<EFBFBD>⇔⊇≫<EFBFBD>€\n",
/* 25*/ "€<EFBFBD>€<EFBFBD>€<EFBFBD>ヮ∈€<EFBFBD>竅ケ<EFBFBD><EFBFBD>∃⊇∝≡€\n",
/* 26*/ "<EFBFBD>∵⊇€<EFBFBD>€€\n",
/* 27*/ "ヴ∵⊆∃<EFBFBD><EFBFBD>リ∃≒€ニ∬<EFBFBD><EFBFBD><EFBFBD>≫∝<EFBFBD>€\n",
/* 28*/ "€梳怙ヲ€蕫ム€マ∵<EFBFBD><EFBFBD><EFBFBD>€€€縺ト√⇔⊇<EFBFBD><EFBFBD>\n",
/* 29*/ "€梳怙ヲ€蕫ム€マ∵<EFBFBD><EFBFBD><EFBFBD>€€€縺ト√\n",
/* 30*/ "しじん<EFBFBD>\n",
/* 31*/ "€準準盾オじ<EFBFBD><EFBFBD>€準準十n",
/* 32*/ "ュ⇔<EFBFBD>しじ∈<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∵♭<EFBFBD><EFBFBD><EFBFBD>\n",
/* 33*/ "<EFBFBD><EFBFBD>€<EFBFBD>€€<EFBFBD>クヱ<EFBFBD><EFBFBD>≫∀<EFBFBD><EFBFBD>\n",
/* 34*/ "χ<EFBFBD>∵ほ<EFBFBD>\n",
/* 35*/ "か∝√ρ€≠ェ♭⌒<EFBFBD>≫≡€\n",
/* 36*/ "ν<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€\n",
/* 37*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∫Å€\n",
/* 38*/ "ν<EFBFBD>€<EFBFBD>€\n",
/* 39*/ "か∝√ρ€≠ェ♭⌒<EFBFBD>≫≡€\n",
/* 40*/ "<EFBFBD><EFBFBD>€÷兤<EFBFBD>€€<EFBFBD>€蚕n",
/* 41*/ "€€€逗ワ€福п梶ク<EFBFBD><EFBFBD>€蚕n",
/* 42*/ "€<EFBFBD>€ハ°€€橿ラ€€<EFBFBD>€€<EFBFBD>\n",
/* 43*/ "<EFBFBD>√∵くΒ<EFBFBD>°€<EFBFBD>Å∃€辟磨痺﨟ロ€\n",
/* 44*/ "€<EFBFBD>€€<EFBFBD><EFBFBD>€€€€Τ€スλえ<EFBFBD><EFBFBD>\n",
/* 45*/ "€<EFBFBD>€€<EFBFBD>メλえ<EFBFBD><EFBFBD>\n",
/* 46*/ "€€€€<EFBFBD><EFBFBD>€潤逗ワ€福п梶諠㏍ソn",
/* 47*/ "€€兤ハ€<EFBFBD>\n",
/* 48*/ "€捩ィ€。€エ\n",
/* 49*/ "€€<EFBFBD>€ユ∵ョャ♭<EFBFBD>\n",
/* 50*/ "ろゎ€ィ€ァ\n",
/* 51*/ "ろゎ€€麾歃n",
/* 52*/ "€€€<EFBFBD>€€<EFBFBD>メうΑ∈ヱ<EFBFBD><EFBFBD>≫∋Å€蚕n",
/* 53*/ "べ∨∃⊇♭€≠ラ∨∃⊇♭€エ\n",
/* 54*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 55*/ "<EFBFBD><EFBFBD>┳∵ほ<EFBFBD>\n",
/* 56*/ "しじん<EFBFBD>\n€盾オじ∈<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n",
/* 57*/ "しじメぼ<EFBFBD>あぃモ∃┳Σ∵ほ<EFBFBD>\n",
/* 58*/ "Obtain ECM Mines.\n",
/* 59*/ "Dr. Caroll's\n",
/* 60*/ "€梳怙ヲ€蕫ム€マ\n",
/* 61*/ "€梳怙ヲ€蕫ム€マ\n",
/* 62*/ "€梳怙ヲ€蕫ム€マ∈み<EFBFBD><EFBFBD>\n",
/* 63*/ "Obtain Data Uplink.\n",
/* 64*/ "\n",
/* 65*/ "€€<EFBFBD>€\n",
/* 66*/ "€€<EFBFBD>€\n",
/* 67*/ "€€<EFBFBD>€ユ∈み<EFBFBD><EFBFBD>\n",
/* 68*/ "<EFBFBD>€ネ⊂Å€€℡ア<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n€<EFBFBD>€€<EFBFBD><EFBFBD>⇔⌒∩<EFBFBD>∝∋€\n",
/* 69*/ "⊇∂€煤メ€€<EFBFBD>€<EFBFBD><EFBFBD>β∩≒\n<EFBFBD><EFBFBD>€<EFBFBD>€€<EFBFBD>クヱ<EFBFBD><EFBFBD>∽⊂€\n",
/* 70*/ "<EFBFBD><EFBFBD>⊥≫≡€÷<EFBFBD>€ハ♀°€€\n",
/* 71*/ "<EFBFBD><EFBFBD><EFBFBD>∀て⊇⇔€\n",
/* 72*/ "⊆∃<EFBFBD>€€福п梶諠㏍メホ<EFBFBD>€\n<EFBFBD><EFBFBD>√≫∝≡<EFBFBD>€\n",
/* 73*/ "べ∨∃⊇♭€≠ラ∨∃⊇♭€エ\n",
/* 74*/ "€€轢ラ€€€€€<EFBFBD>о<EFBFBD>だ∵で<EFBFBD><EFBFBD><EFBFBD>\n",
/* 75*/ "€€轢ラ€€€€€<EFBFBD>оセくΒ<EFBFBD>♭λえ♭<EFBFBD><EFBFBD><EFBFBD>∋♭<EFBFBD>\n",
/* 76*/ "€<EFBFBD>氏メ<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>謔ャ塔ム<EFBFBD>あい∀∃<EFBFBD>\n",
/* 77*/ "€<EFBFBD>磨ヨ<EFBFBD><EFBFBD>ρ<EFBFBD>€€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n",
/* 78*/ "<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD>о∈なに\n",
/* 79*/ "€<EFBFBD>п橿蕫マ€€純ヒ<EFBFBD><EFBFBD>€\n",
/* 80*/ "<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>驍黷ヘ∈あい<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n€梳怙ヲ€蕫ム€マ∵ョャ\n",
/* 81*/ "<EFBFBD>ρ<EFBFBD>€€€<EFBFBD>クあい<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n€梳怙ヲ€蕫ム€マ∵ョャ♭<EFBFBD>\n",
/* 82*/ "€<EFBFBD>о\n",
/* 83*/ "<EFBFBD>ユ∩<EFBFBD>⇔が∀⊇⊂<EFBFBD>Ξ∃<EFBFBD>€\n",
/* 84*/ "<EFBFBD>Β<EFBFBD><EFBFBD>≫≡€蚕n",
/* 85*/ "ヴ∵⊆∃<EFBFBD><EFBFBD>リ∃≒€ニ∬<EFBFBD><EFBFBD><EFBFBD>≫∝<EFBFBD>€\n",
/* 86*/ "♪⊂∩€<EFBFBD>€\n",
/* 87*/ "べ∨∃⊇♭€エ\n",
/* 88*/ "Obtain CamSpy.\n",
/* 89*/ "Dr. Caroll's\n",
/* 90*/ "€€<EFBFBD>€\n",
/* 91*/ "€€<EFBFBD>€\n",
/* 92*/ "€€<EFBFBD>€ム∈み<EFBFBD><EFBFBD>\n",
/* 93*/ "€€€€艪пマ<EFBFBD><EFBFBD>⊆≪\n<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>るれは<EFBFBD>ぞ⊇<EFBFBD>\n",
/* 94*/ "€€€マ♀€<EFBFBD>€€<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>兤ミ€\n",
/* 95*/ "€€€€<EFBFBD>窶ニ€<EFBFBD><EFBFBD>о<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
/* 96*/ "<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD>о<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n",
/* 97*/ "<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>驍黷ヘ∵ぴт<EFBFBD>\n",
/* 98*/ "€€€<EFBFBD>エぱ<EFBFBD>∂∵<EFBFBD>€\n",
/* 99*/ "€噫捩逐逗逐宕操純ヲ<EFBFBD><EFBFBD>€逐逐操楳о゚≧€€マ┨<EFBFBD>€÷<EFBFBD>€€<EFBFBD>€福Ыn",
/*100*/ "€<EFBFBD><EFBFBD><EFBFBD>∋∃<EFBFBD>ロ∫∃<EFBFBD>€\n",
/*101*/ "<EFBFBD>€€€<EFBFBD>€€<EFBFBD>\n€蕫ム€マ♀€€€縲冾о<EFBFBD>マ∩<EFBFBD>≒√⇔<EFBFBD><EFBFBD>€\npレ<EFBFBD>ν<EFBFBD>∃⊇∀€о゚≧€€<EFBFBD><EFBFBD>\n<EFBFBD><EFBFBD>€烙ヒ€€ワ∈ん⊂€\n",
/*102*/ "<EFBFBD>€ツ♭€<EFBFBD>唐ラ¬ほ<EFBFBD>⇔⌒⊇⊇<EFBFBD>€\n",
/*103*/ "<EFBFBD>のは<EFBFBD><EFBFBD>∈べ<EFBFBD><EFBFBD>∃≒∃⊇∀⊇⊂\n<EFBFBD>€<EFBFBD>о<EFBFBD>クり√<EFBFBD>€\np€氏ワ¬∽∋のはワ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⊇≒∋<EFBFBD>€\n",
/*104*/ "€€<EFBFBD>€€縺モ♪<EFBFBD><EFBFBD>⊇≫<EFBFBD>€\n",
/*105*/ "<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>€曹ス<EFBFBD><EFBFBD>≪≫<EFBFBD>€\np♀€€€<EFBFBD>€€<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⊇≫∀<EFBFBD><EFBFBD>∀Å∩≒€\n",
/*106*/ "♪⊂∂<EFBFBD>⇔ぽ∈に<EFBFBD><EFBFBD>√†⊇⊇<EFBFBD><EFBFBD>€\n",
/*107*/ "<EFBFBD>€<EFBFBD>€縺マ<EFBFBD>にふ≒∃⊇<EFBFBD>€蚕n<EFBFBD><EFBFBD><EFBFBD>が⌒∝∩≒∋∵€゚∽<EFBFBD><EFBFBD><EFBFBD>€\n",
/*108*/ "€€€÷モ€€<EFBFBD><EFBFBD>€蚕n",
/*109*/ "€<EFBFBD>€<EFBFBD>€€<EFBFBD>≫≡€蚕n",
/*110*/ NULL,
/*111*/ NULL,
};

View File

@ -1,116 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/* 4*/ " NULL3",
/* 5*/ " NULL4",
/* 6*/ " NULL5",
/* 7*/ " NULL6",
/* 8*/ " NULL7",
/* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.",
/* 10*/ "0230 Hours 15 AUG 2023\n",
/* 11*/ "Obtain De Vries' necklace.\n",
/* 12*/ "Cassandra De Vries'\n",
/* 13*/ "Necklace\n",
/* 14*/ "De Vries' necklace\n",
/* 15*/ "Picked up De Vries' necklace.\n",
/* 16*/ "Disable internal security hub\n",
/* 17*/ "Obtain keycode necklace\n",
/* 18*/ "Download project files\n",
/* 19*/ "Disable external comms hub\n",
/* 20*/ "Gain entrance to laboratory\n",
/* 21*/ "Who are you and what are you doing here?\n",
/* 22*/ "Look out! She's got a gun.\n",
/* 23*/ "You won't shoot me, foolish child!\n",
/* 24*/ "Don't you know who I am?\n",
/* 25*/ "Let's see how you deal with security.\n",
/* 26*/ "PLEASE!!!! Don't kill me!\n",
/* 27*/ "If I were you, I'd leave... NOW!\n",
/* 28*/ "Badly placed ECM Mine.\n",
/* 29*/ "ECM Mine placed correctly.\n",
/* 30*/ "MISSION FAILED - objectives incomplete.\n",
/* 31*/ " MISSION SUCCESSFUL \n",
/* 32*/ "CANNOT complete all objectives.\n",
/* 33*/ "Time to erase those files.\n",
/* 34*/ "Computer executive erased.\n",
/* 35*/ "I'll do what you want!\n",
/* 36*/ "HELP - Intruder!\n",
/* 37*/ "You talk too much.\n",
/* 38*/ "HELP, HELP!\n",
/* 39*/ "I'll do what you want...\n",
/* 40*/ "Logging on now...\n",
/* 41*/ "Okay, I'm in...\n",
/* 42*/ "Goodbye, Dr. Caroll.\n",
/* 43*/ "You've written your last bug, traitor!\n",
/* 44*/ "File download initiated.\n",
/* 45*/ "File download completed.\n",
/* 46*/ "ACCESS DENIED - password needed.\n",
/* 47*/ "Door unlocked.\n",
/* 48*/ "DOH!\n",
/* 49*/ "Unable to download - Data Uplink needed.\n",
/* 50*/ "LIGHTS NOW ON\n",
/* 51*/ "LIGHTS NOW OFF\n",
/* 52*/ "Erase Dr. Caroll conversation...\n",
/* 53*/ "Don't shoot, don't shoot!\n",
/* 54*/ "Critical mission object destroyed.\n",
/* 55*/ "Unacceptable civilian casualties.\n",
/* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/* 57*/ "Critical mission personnel killed.\n",
/* 58*/ "Obtain ECM Mines.\n",
/* 59*/ "Dr. Caroll's\n",
/* 60*/ "ECM Mine\n",
/* 61*/ "An ECM Mine\n",
/* 62*/ "Picked up an ECM Mine.\n",
/* 63*/ "Obtain Data Uplink.\n",
/* 64*/ "\n",
/* 65*/ "Data Uplink\n",
/* 66*/ "A Data Uplink\n",
/* 67*/ "Picked up a Data Uplink.\n",
/* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n",
/* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n",
/* 70*/ "I'll begin at once. Goodbye.\n",
/* 71*/ "Move it!\n",
/* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n",
/* 73*/ "Don't shoot, don't shoot!\n",
/* 74*/ "Datalink broken - connection terminated.\n",
/* 75*/ "Datalink error - incomplete file download.\n",
/* 76*/ "Internal security system temporarily disabled.\n",
/* 77*/ "External communications hub disabled.\n",
/* 78*/ "Laboratory lift located.\n",
/* 79*/ "Security... Help me!\n",
/* 80*/ "ECM Mine needed to disable security hub.\n",
/* 81*/ "ECM Mine needed to disable comms hub.\n",
/* 82*/ "Dummy\n",
/* 83*/ "How dare you disturb me!\n",
/* 84*/ "You will regret this intrusion, girl!\n",
/* 85*/ "If I were you, I'd leave...NOW!\n",
/* 86*/ "Please don't kill me!\n",
/* 87*/ "Don't shoot!\n",
/* 88*/ "Obtain CamSpy.\n",
/* 89*/ "Dr. Caroll's\n",
/* 90*/ "CamSpy\n",
/* 91*/ "A CamSpy\n",
/* 92*/ "Picked up a CamSpy.\n",
/* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n",
/* 94*/ "You're on the same floor as \nCassandra's office.\n",
/* 95*/ "The other hub has got to be in the \nSecurity Room.\n",
/* 96*/ "The basement elevator must be around \nthere somewhere.\n",
/* 97*/ "Security system is now back online.\n",
/* 98*/ "You vandal, you've broken it!\n",
/* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n",
/*100*/ "Why the big hurry?\n",
/*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n",
/*102*/ "Are they all expendable?\n",
/*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n",
/*104*/ "What's the target location?\n",
/*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n",
/*106*/ "How will I recognize him?\n",
/*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n",
/*108*/ "Right, I'm in...\n",
/*109*/ "I...I'm logging on now.\n",
/*110*/ NULL,
/*111*/ NULL,
};

View File

@ -1,116 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être fixé sur le relais pour fonctionner. Faites vite, l'effet ne dure qu' une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte la clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Accéder aux fichiers ordi dirigeant\n\nLe sort du Dr. Caroll est à l'ordre du jour d'une réunion, dans l'un des bureaux. Le dirigeant chargé du projet du Dr. Caroll sera présent. Suivez-le jusqu'à son bureau et accédez à ses fichiers, puis téléchargez-les grâce à votre récepteur.\n\n|Objectif 4: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 5: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n",
/* 1*/ "TOUR LUCERNE\n",
/* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, et elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être appliquée sur le relais pour fonctionner. Faites vite, l'effet ne dure qu'une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte sa clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 4: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n",
/* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n",
/* 4*/ " NULL3",
/* 5*/ " NULL4",
/* 6*/ " NULL5",
/* 7*/ " NULL6",
/* 8*/ " NULL7",
/* 9*/ "dataDyne:\nQG central Chicago IL USA.",
/* 10*/ "Heure: 02:30 15 AOUT 2023\n",
/* 11*/ "Obtenir collier de De Vries.\n",
/* 12*/ "Cassandra De Vries:\n",
/* 13*/ "Collier\n",
/* 14*/ "Collier de De Vries\n",
/* 15*/ "Collier de De Vries obtenu.\n",
/* 16*/ "Neutraliser relais intérieur\n",
/* 17*/ "Obtenir collier-clé\n",
/* 18*/ "Télécharger fichiers\n",
/* 19*/ "Neutraliser relais extérieur\n",
/* 20*/ "Accéder au laboratoire\n",
/* 21*/ "Qui êtes-vous? Que faites-vous là?\n",
/* 22*/ "Attention! Elle est armée!\n",
/* 23*/ "Vous n'oserez pas... Jeune sotte!\n",
/* 24*/ "Savez-vous qui je suis?\n",
/* 25*/ "J'appelle la sécurité.\n",
/* 26*/ "PITIE!!!! Ne me tuez pas!\n",
/* 27*/ "Un conseil: partez, MAINTENANT!\n",
/* 28*/ "Mine CME mal placée.\n",
/* 29*/ "Mine CME placée correctement.\n",
/* 30*/ "MISSION ECHOUEE - objectifs incomplets.\n",
/* 31*/ " MISSION ACCOMPLIE \n",
/* 32*/ "Objectifs inatteignables.\n",
/* 33*/ "Il est temps d'effacer les fichiers.\n",
/* 34*/ "Ordinateur dirigeant effacé.\n",
/* 35*/ "Je ferai ce que vous voulez!\n",
/* 36*/ "A L'AIDE - Intrus!\n",
/* 37*/ "Vous parlez trop.\n",
/* 38*/ "AU SECOURS! A MOI!\n",
/* 39*/ "Je ferai ce que vous voulez...\n",
/* 40*/ "Je me connecte...\n",
/* 41*/ "OK. Connexion terminée...\n",
/* 42*/ "Adieu, Dr. Caroll.\n",
/* 43*/ "La fin est proche, sale traître!\n",
/* 44*/ "Téléchargement en cours.\n",
/* 45*/ "Téléchargement complet.\n",
/* 46*/ "ACCES REFUSE - mot de passe requis.\n",
/* 47*/ "Porte déverrouillée.\n",
/* 48*/ "HEIN?!\n",
/* 49*/ "Erreur télécharg. - Récepteur absent.\n",
/* 50*/ "LUMIERES ON\n",
/* 51*/ "LUMIERES OFF\n",
/* 52*/ "Effacez la conversation du Dr. Caroll.\n",
/* 53*/ "Ne...ne tirez pas!\n",
/* 54*/ "Objet crucial détruit.\n",
/* 55*/ "Pertes civiles inacceptables.\n",
/* 56*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n",
/* 57*/ "Personnel crucial tué.\n",
/* 58*/ "Obtenir mines CME.\n",
/* 59*/ "Dr. Caroll: \n",
/* 60*/ "Mine CME\n",
/* 61*/ "Une Mine CME\n",
/* 62*/ "Mine CME obtenue.\n",
/* 63*/ "Obtenir récepteur.\n",
/* 64*/ "\n",
/* 65*/ "Récepteur\n",
/* 66*/ "Un récepteur\n",
/* 67*/ "Récepteur obtenu.\n",
/* 68*/ "Oui, oui, je suis d'accord. On peut se passer\n de sa personnalité.\n",
/* 69*/ "Non, je peux y travailler depuis mon ordinateur\n de bureau et effacer les fichiers\n en même temps.\n",
/* 70*/ "Je m'y mets tout de suite. Au revoir.\n",
/* 71*/ "Au pied!\n",
/* 72*/ "J'ai un problème de mot de passe, et vous \nallez le résoudre.\n",
/* 73*/ "Ne tirez pas! Ne tirez pas!\n",
/* 74*/ "Transfert interrompu - connexion perdue.\n",
/* 75*/ "Erreur transfert - téléchargement incomplet.\n",
/* 76*/ "Système de sécurité temporairement annulé.\n",
/* 77*/ "Communications extérieures coupées.\n",
/* 78*/ "Ascenseur du laboratoire localisé.\n",
/* 79*/ "Sécurité!!! A l'aide!\n",
/* 80*/ "Mine CME requise pour brouiller sécurité.\n",
/* 81*/ "Mine CME requise pour brouiller coms.\n",
/* 82*/ "Leurre\n",
/* 83*/ "Vous osez me déranger?\n",
/* 84*/ "Vous allez le regretter, jeune fille!\n",
/* 85*/ "Un conseil: partez...MAINTENANT!\n",
/* 86*/ "Ne me tuez pas!\n",
/* 87*/ "Pitié!\n",
/* 88*/ "Obtenir CamSpy.\n",
/* 89*/ "La CamSpy du\n",
/* 90*/ "Dr. Caroll\n",
/* 91*/ "Une CamSpy\n",
/* 92*/ "CamSpy obtenue.\n",
/* 93*/ "Signal positif - \nle relais de com intérieur est proche.\n",
/* 94*/ "Le bureau de Cassandra est à \ncet étage.\n",
/* 95*/ "L'autre relais doit être dans la \nsalle de surveillance.\n",
/* 96*/ "L'ascenseur souterrain doit être dans \nle coin.\n",
/* 97*/ "Système de sécurité opérationnel.\n",
/* 98*/ "Bravo...ça ne marche plus!\n",
/* 99*/ "2023, H: 22:14 Tour Lucerne - QG dataDyne\n",
/*100*/ "Pourquoi agir si vite?\n",
/*101*/ "Si le Dr. Caroll n'est pas sauvé ce soir, \nses supérieurs conditionneront son \nesprit et nous ne pourrons découvrir \nles plans de la dataDyne. \n",
/*102*/ "Peut-on les éliminer?\n",
/*103*/ "Pas de bêtises: une clé de sécurité ne \nfonctionne que si le détenteur est \nen vie. Ne tuez donc pas n'importe \nqui. Vous pouvez vous occuper des \ngardes armés...\n",
/*104*/ "Où se trouve la cible?\n",
/*105*/ "Descendez l'immeuble jusqu'aux niveaux \ninférieurs. Le Dr. Caroll se trouve \ndans un laboratoire souterrain.\n",
/*106*/ "Comment le reconnaître?\n",
/*107*/ "Nous n'avons aucune photo, ni document \nd'archive. Nous ne connaissons que \nson nom. Bonne chance, Perfect Dark.\n",
/*108*/ "OK. J'y suis...\n",
/*109*/ "Je...Je me connecte.\n",
/*110*/ NULL,
/*111*/ NULL,
};

View File

@ -1,116 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Erlangen Sie Zugang zu den geheimen Daten!\n\nZur Stunde wird über Dr. Carolls Zukunft verhandelt. Das Meeting, bei dem der Manager, der für Dr. Carolls Projekt verantwortlich zeichnet anwesend ist, findet in einem der Bürotrakte statt. Folgen Sie ihm in sein Büro, greifen Sie auf die Projektdaten zu und übertragen Sie sie an uns mit Hilfe Ihres Data Uplink-Gerätes.\n\n|4. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|5. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|4. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n",
/* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n",
/* 4*/ " NULL3",
/* 5*/ " NULL4",
/* 6*/ " NULL5",
/* 7*/ " NULL6",
/* 8*/ " NULL7",
/* 9*/ "dataDyne\n Abteilungshauptquartier Chicago IL USA.",
/* 10*/ "0230 Uhr 15 AUG 2023\n",
/* 11*/ "Bringen Sie die De Vries' Halskette in Ihren Besitz!\n",
/* 12*/ "Cassandra De Vries'\n",
/* 13*/ "Halskette\n",
/* 14*/ "De Vries' Halskette\n",
/* 15*/ "De Vries' Halskette aufgenommen\n",
/* 16*/ "Blockieren Sie das Sicherheitssystem!\n",
/* 17*/ "Finden Sie den Schlüssel!\n",
/* 18*/ "Kopieren Sie die Projektdaten!\n",
/* 19*/ "Blockieren Sie die externe Sicherheit!\n",
/* 20*/ "Verschaffen Sie sich Zutritt zum Labor!\n",
/* 21*/ "Wer sind Sie, und was haben Sie hier verloren?\n",
/* 22*/ "Vorsicht! Sie hat eine Waffe!\n",
/* 23*/ "Du wirst nicht auf mich schießen, dummes Kind!\n",
/* 24*/ "Du weißt wohl nicht, wer ich bin.\n",
/* 25*/ "Mal sehen, wie du mit der Security klarkommst.\n",
/* 26*/ "BITTE!!!! Tun Sie mir nichts!\n",
/* 27*/ "Wäre ich du, würde ich verschwinden... und zwar JETZT!\n",
/* 28*/ "ECM-Mine wurde nicht korrekt platziert.\n",
/* 29*/ "ECM-Mine wurde korrekt platziert.\n",
/* 30*/ "MISSION FEHLGESCHLAGEN - Zielerreichung unvollständig.\n",
/* 31*/ " MISSION ERFOLGREICH \n",
/* 32*/ "Erreichung aller Ziele UNMÖGLICH.\n",
/* 33*/ "Es ist an der Zeit, diese Daten zu löschen.\n",
/* 34*/ "Festplatte gelöscht\n",
/* 35*/ "Ich tue alles, was Sie verlangen!\n",
/* 36*/ "HILFE - Ein Eindringling!\n",
/* 37*/ "Du sprichst zuviel.\n",
/* 38*/ "HILFE, HILFE!\n",
/* 39*/ "Ich tue alles, was Sie verlangen...\n",
/* 40*/ "Ich logge mich jetzt ein...\n",
/* 41*/ "Okay, ich bin drin...\n",
/* 42*/ "Auf Wiedersehen, Dr. Caroll.\n",
/* 43*/ "Du hast deinen letzten Virus geschrieben, Verräter!\n",
/* 44*/ "Kopiervorgang gestartet\n",
/* 45*/ "Kopiervorgang abgeschlossen\n",
/* 46*/ "ZUGRIFF VERWEIGERT - Passwort erforderlich\n",
/* 47*/ "Türverriegelung aufgehoben\n",
/* 48*/ "HÄH!\n",
/* 49*/ "Kopiervorgang kann nicht gestartet werden - Data Uplink erforderlich.\n",
/* 50*/ "BELEUCHTUNG AKTIVIERT\n",
/* 51*/ "BELEUCHTUNG DEAKTIVIERT\n",
/* 52*/ "Löschen Sie die Konversation mit Dr. Caroll...\n",
/* 53*/ "Nicht schießen, nicht schießen!\n",
/* 54*/ "Wichtiges Objekt zerstört\n",
/* 55*/ "Anzahl der zivilen Opfer ist unakzeptabel.\n",
/* 56*/ "MISSION FEHLGESCHLAGEN \n - Gesamtzielerreichung unmöglich\n",
/* 57*/ "Wichtige Person neutralisiert\n",
/* 58*/ "Erlangen Sie ECM-Minen.\n",
/* 59*/ "Dr. Carolls\n",
/* 60*/ "ECM-Mine\n",
/* 61*/ "Eine ECM-Mine\n",
/* 62*/ "ECM-Mine aufgenommen\n",
/* 63*/ "Erlangen Sie das Data Uplink-Gerät.\n",
/* 64*/ "\n",
/* 65*/ "Data Uplink\n",
/* 66*/ "Ein Data Uplink\n",
/* 67*/ "Data Uplink aufgenommen\n",
/* 68*/ "Ja, ja, dem stimme ich zu. Personen sind in diesem\nFall entbehrlich.\n",
/* 69*/ "Nein, ich kann den Vorgang von meinem Büro\naus initiieren und die entsprechenden Files löschen.\nJa, das erfolgt gleichzeitig.\n",
/* 70*/ "Ich fange sofort an. Wiederhören.\n",
/* 71*/ "Beweg dich!\n",
/* 72*/ "Ich habe ein Passwort-Problem, und du bist\nderjenige, der mir aus der Patsche helfen wird.\n",
/* 73*/ "Nicht schießen, nicht schießen!\n",
/* 74*/ "Datalink defekt - Verbindung terminiert\n",
/* 75*/ "Datalink Error - Kopiervorgang unvollständig\n",
/* 76*/ "Internes Sicherheitssystem temporär außer Kraft gesetzt.\n",
/* 77*/ "Externe Kommunikationssysteme außer Kraft gesetzt.\n",
/* 78*/ "Aufzug zum Labor geortet.\n",
/* 79*/ "Security... Hilfe!\n",
/* 80*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine benötigt.\n",
/* 81*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine benötigt.\n",
/* 82*/ "Dummy\n",
/* 83*/ "Wie kannst du es wagen, mich zu stören?\n",
/* 84*/ "Du wirst dieses Eindringen bereuen, Kleine!\n",
/* 85*/ "Wäre ich du, würde ich verschwinden,... und zwar JETZT!\n",
/* 86*/ "Bitte tun Sie mir nichts!\n",
/* 87*/ "Nicht schießen!\n",
/* 88*/ "Erlangen Sie den CamSpy.\n",
/* 89*/ "Dr. Carolls\n",
/* 90*/ "CamSpy\n",
/* 91*/ "Ein CamSpy\n",
/* 92*/ "CamSpy aufgenommen\n",
/* 93*/ "Wir empfangen ein deutliches Signal - \nder Schaltblock für die internen Sicherheitssysteme muss in der Nähe sein.\n",
/* 94*/ "Sie befinden sich im gleichen Stockwerk wie\nCassandras Büro.\n",
/* 95*/ "Der andere Schaltblock muss im \nSecurity Raum sein.\n",
/* 96*/ "Der Aufzug zum Keller muss hier \nirgendwo sein.\n",
/* 97*/ "Das Sicherheitssystem ist wieder online.\n",
/* 98*/ "Du Vandale, du hast es zerstört!\n",
/* 99*/ "2023 AD, 2214 Uhr Lucerne Tower - dataDyne HQ\n",
/*100*/ "Warum die Hektik?\n",
/*101*/ "Wenn Dr. Caroll heute nicht gerettet wird, \nwird er von dataDyne einer gedanklichen \nKonditionierung unterzogen. So würden wir \nunsere beste Chance verlieren, um herauszufinden, \nwas dataDyne beabsichtigt.\n",
/*102*/ "Sind dort alle Personen entbehrlich?\n",
/*103*/ "Machen Sie keine Witze! Sie müssen vorsichtig sein, Joanna. \nCodeschlüssel nützen nur, solange ihre Besitzer \nam Leben sind; wenn Sie sie ausschalten, verliert der \nSchlüssel seinen Wert. Bewaffnete Wachen sind natürlich \nein anderes Thema...\n",
/*104*/ "Wie lautet der Zielbereich?\n",
/*105*/ "Arbeiten Sie sich von oben vor, bis Sie das unterste Stockwerk \nerreichen. Dr. Caroll befindet sich irgendwo in einem der \nLabors in den unterirdischen Trakten.\n",
/*106*/ "Woran erkenne ich ihn?\n",
/*107*/ "Wir verfügen über kein Bildmaterial, und wir können \nauch keine offiziellen Akten finden. Alles was wir haben, \nist sein Name. Viel Glück, Perfect Dark.\n",
/*108*/ "Ich bin jetzt drin...\n",
/*109*/ "Ich...Ich logge mich jetzt ein.\n",
/*110*/ NULL,
/*111*/ NULL,
};

View File

@ -1,116 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\nSi trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Trova i file nel PC del direttore\n\nIn uno dei piani dell'edificio principale si tiene una riunione per decidere del futuro del Dr. Caroll, vi partecipa anche il direttore responsabile del suo progetto. Seguilo nel suo ufficio e trova i file di tale progetto, scaricali sulla nostra rete usando il tuo Connettore Dati.\n\n|Obiettivo 4: - Disattiva sistema di sicurezza esterno\n\nMetti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 5: - Trova l'ascensore segreto\n\nTrova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\n Si trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Disattiva sistema di sicurezza esterno\n\n Metti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 4: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n",
/* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n",
/* 4*/ " NULL3",
/* 5*/ " NULL4",
/* 6*/ " NULL5",
/* 7*/ " NULL6",
/* 8*/ " NULL7",
/* 9*/ "dataDyne\nQG Div. Centrale Chicago IL USA.",
/* 10*/ "Ore 0230 15 AGO 2023\n",
/* 11*/ "Prendi collana di De Vries.\n",
/* 12*/ "Cassandra De Vries:\n",
/* 13*/ "Collana\n",
/* 14*/ "Collana di De Vries\n",
/* 15*/ "Presa collana di De Vries.\n",
/* 16*/ "Disattiva sistema di sicurezza interno\n",
/* 17*/ "Prendi collana-chiave\n",
/* 18*/ "Scarica file del progetto\n",
/* 19*/ "Disattiva sistema di sicurezza esterno\n",
/* 20*/ "Cerca di entrare nel laboratorio\n",
/* 21*/ "Chi sei e che ci fai qui?\n",
/* 22*/ "Attenzione! È armata.\n",
/* 23*/ "Non lo farei se fossi in te!\n",
/* 24*/ "Tu non sai chi sono io!\n",
/* 25*/ "Vediamo come fai con la sicurezza.\n",
/* 26*/ "TI PREGO!!! Non sparare!\n",
/* 27*/ "Se fossi in te girerei i tacchi!\n",
/* 28*/ "Mina in posizione errata\n",
/* 29*/ "Mina piazzata correttamente\n",
/* 30*/ "MISSIONE FALLITA - Obiettivi incompleti\n",
/* 31*/ " MISSIONE COMPIUTA \n",
/* 32*/ "IMPOSSIBILE completare obiettivi!\n",
/* 33*/ "È ora di cancellare i file.\n",
/* 34*/ "Cancellato PC direttore.\n",
/* 35*/ "Farò quel che vuoi!\n",
/* 36*/ "ALLARME - Intrusione!\n",
/* 37*/ "Tu parli troppo!\n",
/* 38*/ "AIUTO! AIUTO!\n",
/* 39*/ "Farò quel che vuoi...\n",
/* 40*/ "Connessione in corso...\n",
/* 41*/ "Bene, ci sono...\n",
/* 42*/ "Arrivederci, Dr. Caroll.\n",
/* 43*/ "Comincia a pregare, verme!\n",
/* 44*/ "Scaricamento in corso\n",
/* 45*/ "Scaricamento completato\n",
/* 46*/ "ACCESSO NEGATO: inserire password\n",
/* 47*/ "Aperta la porta!\n",
/* 48*/ "TOH!\n",
/* 49*/ "Impossibile scaricare: serve Connettore Dati\n",
/* 50*/ "LUCI ACCESE\n",
/* 51*/ "LUCI SPENTE\n",
/* 52*/ "Cancellare conversazione con Dr. Caroll\n",
/* 53*/ "Non sparare! Non sparare!\n",
/* 54*/ "Distrutto strumento essenziale alla missione\n",
/* 55*/ "Vittime civili inaccettabili\n",
/* 56*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n",
/* 57*/ "Ucciso personale essenziale alla missione\n",
/* 58*/ "Procurati mina ECM.\n",
/* 59*/ "Dr. Caroll:\n",
/* 60*/ "Mina ECM\n",
/* 61*/ "Mina ECM\n",
/* 62*/ "Presa mina ECM\n",
/* 63*/ "Procurati Connettore Dati.\n",
/* 64*/ "\n",
/* 65*/ "C. Dati\n",
/* 66*/ "Un Connettore Dati\n",
/* 67*/ "Preso Connettore Dati.\n",
/* 68*/ "Sì, sì! Sono d'accordo. Possibili vittime\n sono giustificate.\n",
/* 69*/ "No, posso iniziare dal terminale del mio\n ufficio e cancellare i file necessari\n al tempo stesso.\n",
/* 70*/ "Inizierò subito. A dopo.\n",
/* 71*/ "Muoviti!\n",
/* 72*/ "Ho problemi con la password, e tu sei \nl'unico che può aiutarmi.\n",
/* 73*/ "Non sparare! Non sparare!\n",
/* 74*/ "Errore datalink: connessione terminata\n",
/* 75*/ "Errore datalink: scaricamento incompleto\n",
/* 76*/ "Sistema di sicurezza interno temp. fuori uso.\n",
/* 77*/ "Sistema di sicurezza esterno fuori uso.\n",
/* 78*/ "Ascensore laboratorio localizzato.\n",
/* 79*/ "Sicurezza... Aiuto!\n",
/* 80*/ "Serve mina ECM per disattivare sicurezza interno\n",
/* 81*/ "Serve mina ECM per disattivare sicurezza esterno\n",
/* 82*/ "Idiota\n",
/* 83*/ "Come osi disturbarmi!\n",
/* 84*/ "Te ne pentirai amaramente, sfacciata!\n",
/* 85*/ "Se fossi in te starei alla larga!\n",
/* 86*/ "Ti prego, risparmiami!\n",
/* 87*/ "Non sparare!\n",
/* 88*/ "Procurati TeleSpia.\n",
/* 89*/ "Dr. Caroll:\n",
/* 90*/ "TeleSpia\n",
/* 91*/ "TeleSpia\n",
/* 92*/ "Presa la TeleSpia.\n",
/* 93*/ "Siamo sulla pista giusta! Siamo \nvicini al sistema di sicurezza\n interno.\n",
/* 94*/ "Sei sul piano dell'ufficio di \nCassandra.\n",
/* 95*/ "L'altra centralina dev'essere \nnella Stanza di Sicurezza.\n",
/* 96*/ "L'ascensore dev'essere qui da \nqualche parte.\n",
/* 97*/ "Il sistema di sicurezza funziona ora.\n",
/* 98*/ "L'hai rotto, maledizione!\n",
/* 99*/ "AD 2023, ore 2214 Lucerne Tower - QG dataDyne\n",
/*100*/ "Cos'è tutta 'sta fretta?\n",
/*101*/ "Se non salviamo il Dr. Caroll stanotte, \ndataDyne gli farà il lavaggio del \ncervello e noi non sapremo mai \nquali sono i loro piani. \n\n",
/*102*/ "Posso fare piazza pulita?\n",
/*103*/ "Attenta, Joanna! Qui non si scherza! \nLa chiave funziona solo se chi la porta è \nancora vivo; altrimenti si disattiverà. \nCerto, con le guardie armate \nè tutta un'altra storia! \n",
/*104*/ "Dove si trova l'obiettivo?\n",
/*105*/ "Fatti strada fino al piano terra: il \nDr. Caroll si trova nel laboratorio \nal piano sotterraneo dell'edificio.\n",
/*106*/ "Come faccio a riconoscerlo?\n",
/*107*/ "Non abbiamo né sue foto, né file \nufficiali. Tutto ciò che abbiamo è il \nsuo nome. Buona fortuna, Perfect Dark.\n",
/*108*/ "Ok, ci sono...\n",
/*109*/ "Sto... sto entrando!\n",
/*110*/ NULL,
/*111*/ NULL,
};

View File

@ -1,116 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Acceder a los Ficheros del Ordenador del Ejecutivo\n\nEl futuro del Dr. Caroll está siendo decidido en una reunión en uno de los pisos de oficinas. El Ejecutivo a cargo del proyecto del Dr. Caroll está allí presente. Síguele a su oficina y accede a los ficheros de su proyecto, entonces mándanoslos usando el Conector de Datos.\n\n|Objetivo Cuatro: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cinco: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n",
/* 1*/ "EDIFICIO LUCERNE\n",
/* 2*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cuatro: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n",
/* 3*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n",
/* 4*/ " NULL3",
/* 5*/ " NULL4",
/* 6*/ " NULL5",
/* 7*/ " NULL6",
/* 8*/ " NULL7",
/* 9*/ "dataDyne\nCG División Central Chicago IL EE.UU.",
/* 10*/ "0230 Horas 15 AGO 2023\n",
/* 11*/ "Obtén el collar de De Vries.\n",
/* 12*/ "Cassandra De Vries:\n",
/* 13*/ "Collar\n",
/* 14*/ "Collar de De Vries\n",
/* 15*/ "Collar de De Vries obtenido.\n",
/* 16*/ "Desactivar puerto interno de seguridad\n",
/* 17*/ "Obtener el collar-código\n",
/* 18*/ "Descargar los ficheros del proyecto\n",
/* 19*/ "Desactivar puerto de com. externas\n",
/* 20*/ "Entrar en el laboratorio\n",
/* 21*/ "¿Quién eres tú y qué estás haciendo aquí?\n",
/* 22*/ "¡Cuidado! Tiene un arma.\n",
/* 23*/ "¡No me dispararás, tonta criatura!\n",
/* 24*/ "¿No sabes quién soy?\n",
/* 25*/ "Veamos cómo te las apañas con seguridad.\n",
/* 26*/ "¡¡¡¡POR FAVOR!!!! ¡No me mates!\n",
/* 27*/ "Si fuera tú, me marcharía... ¡AHORA!\n",
/* 28*/ "Mina ECM mal colocada.\n",
/* 29*/ "Mina ECM colocada correctamente.\n",
/* 30*/ "MISIÓN FALLADA: objetivos incompletos.\n",
/* 31*/ " MISIÓN CONSEGUIDA \n",
/* 32*/ "NO PUEDES completar todos los objetivos.\n",
/* 33*/ "Es hora de borrar esos ficheros.\n",
/* 34*/ "Ordenador del ejecutivo borrado.\n",
/* 35*/ "¡Haré lo que tú quieras!\n",
/* 36*/ "AYUDA. ¡Intruso!\n",
/* 37*/ "Hablas demasiado.\n",
/* 38*/ "¡AYUDA, AYUDA!\n",
/* 39*/ "¡Haré lo que tú quieras!\n",
/* 40*/ "Conectando ahora...\n",
/* 41*/ "Vale, estoy dentro...\n",
/* 42*/ "Adiós, Dr. Caroll.\n",
/* 43*/ "¡Has procesado tu último error, traidor!\n",
/* 44*/ "Descarga del fichero iniciada.\n",
/* 45*/ "Descarga del fichero completada.\n",
/* 46*/ "ACCESO DENEGADO. Necesitas la contraseña.\n",
/* 47*/ "Puerta desbloqueada.\n",
/* 48*/ "¡OH!\n",
/* 49*/ "Imposible descargar. Necesitas un Conector de Datos.\n",
/* 50*/ "LUCES ENCENDIDAS\n",
/* 51*/ "LUCES APAGADAS\n",
/* 52*/ "Borra la conversación del Dr. Caroll...\n",
/* 53*/ "¡No dispares, no dispares!\n",
/* 54*/ "Objeto crítico de la misión destruido.\n",
/* 55*/ "Bajas civiles inaceptables.\n",
/* 56*/ "MISIÓN FALLADA:\n los objetivos no pueden ser completados.\n",
/* 57*/ "Ha muerto una persona crítica para la misión.\n",
/* 58*/ "Obtén las Minas ECM.\n",
/* 59*/ "Dr. Caroll:\n",
/* 60*/ "Mina ECM\n",
/* 61*/ "Una Mina ECM\n",
/* 62*/ "Mina ECM obtenida.\n",
/* 63*/ "Obtén el Conector de Datos.\n",
/* 64*/ "\n",
/* 65*/ "C. Datos\n",
/* 66*/ "Un Conector de Datos\n",
/* 67*/ "Conector de Datos obtenido.\n",
/* 68*/ "Sí, sí, estoy de acuerdo. La personalidad es prescindible\n en este caso.\n",
/* 69*/ "No, puedo empezar el proceso desde el terminal\n de mi oficina y borrar los ficheros necesarios\n al mismo tiempo.\n",
/* 70*/ "Empezaré enseguida. Adiós.\n",
/* 71*/ "¡En marcha!\n",
/* 72*/ "Tengo un problema de contraseñas, y tú \neres el hombre que puede ayudarme con ello.\n",
/* 73*/ "¡No dispares, no dispares!\n",
/* 74*/ "Enlace de Datos perdido - conexión terminada.\n",
/* 75*/ "Error en el Enlace de Datos - descarga de fichero incompleta.\n",
/* 76*/ "Sistema de seguridad interno temporalmente desactivado.\n",
/* 77*/ "Puerto de comunicaciones externas desactivado.\n",
/* 78*/ "Ascensor del laboratorio localizado.\n",
/* 79*/ "Seguridad... ¡Ayúdenme!\n",
/* 80*/ "Mina ECM requerida para desactivar el puerto de seguridad.\n",
/* 81*/ "Mina ECM requerida para desactivar el puerto de comunicaciones.\n",
/* 82*/ "Tonto\n",
/* 83*/ "¡Cómo te atreves a molestarme!\n",
/* 84*/ "¡Te vas a arrepentir de esta intrusión, chica!\n",
/* 85*/ "Si yo fuera tú, me iría... ¡YA!\n",
/* 86*/ "¡Por favor, no me mates!\n",
/* 87*/ "¡No dispares!\n",
/* 88*/ "Obtén la Cámara Espía.\n",
/* 89*/ "Dr. Caroll:\n",
/* 90*/ "Cámara Espía\n",
/* 91*/ "Una Cámara Espía\n",
/* 92*/ "Cámara Espía obtenida.\n",
/* 93*/ "Estamos obteniendo una lectura positiva. \nEl puerto de comunicaciones interno está cerca.\n",
/* 94*/ "Estás en la misma planta que \nla oficina de Cassandra.\n",
/* 95*/ "El otro puerto debe estar en la \nSala de Seguridad.\n",
/* 96*/ "El ascensor del sótano debe de estar por \naquí en algún lugar.\n",
/* 97*/ "El sistema de seguridad está activo de nuevo.\n",
/* 98*/ "¡Vándalo! ¡Lo has roto!\n",
/* 99*/ "2023 d.C., 2214 Horas Edificio Lucerne - CG dataDyne\n",
/*100*/ "¿Por qué tanta prisa?\n",
/*101*/ "Si no sacamos al Dr. Caroll esta noche, \ndataDyne le lavará el cerebro, y \nperderemos nuestra mejor oportunidad \nde descubrir las intenciones de \ndataDyne.\n",
/*102*/ "¿Son todos prescindibles?\n",
/*103*/ "¡No bromees! Tienes que ser cuidadosa, Joanna. \nLas llaves código sólo funcionan cuando el \npropietario está vivo... Si les matas, la llave \nes inútil. Los guardas armados son otra cosa, \npor supuesto.\n",
/*104*/ "¿Dónde se encuentra el objetivo?\n",
/*105*/ "Debes bajar todo el edificio hasta la planta \nbaja. El Dr. Caroll estará en el laboratorio de \ninvestigación en algún lugar del subsuelo.\n",
/*106*/ "¿Cómo le reconoceré?\n",
/*107*/ "No tenemos ninguna imagen grabada, y no hemos \nencontrado ficheros oficiales. Todo lo que tenemos \nes su nombre. Buena suerte, Perfect Dark.\n",
/*108*/ "Bien, estoy dentro...\n",
/*109*/ "Estoy... estoy entrando ahora.\n",
/*110*/ NULL,
/*111*/ NULL,
};

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,80 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Access foyer elevator\n",
/* 10*/ "Reactivate office elevator\n",
/* 11*/ "Destroy dataDyne hovercopter\n",
/* 12*/ "Defeat Cassandra's bodyguards\n",
/* 13*/ "Rendezvous at helipad\n",
/* 14*/ "Accessing elevator controls...\n",
/* 15*/ "LIGHTS ARE NOW ON!\n",
/* 16*/ "Dr. Caroll has been killed!\n",
/* 17*/ "Dr. Caroll is under attack!\n",
/* 18*/ "Dr. Caroll has been damaged!\n",
/* 19*/ "Too late! She's here...\n",
/* 20*/ "You've become quite an annoyance...\n",
/* 21*/ "Good night, Ms. Dark.\n",
/* 22*/ "LIGHTS NOW ON\n",
/* 23*/ "LIGHTS NOW OFF\n",
/* 24*/ "MISSION FAILED\n",
/* 25*/ "MISSION SUCCESSFUL\n",
/* 26*/ "Helichopper warning goes here.\n",
/* 27*/ "Obtain Night Vision.\n",
/* 28*/ "Cassandra De Vries'\n",
/* 29*/ "Night Vision\n",
/* 30*/ "Night Vision\n",
/* 31*/ "Picked up Night Vision.\n",
/* 32*/ "We meet again, girl!\n",
/* 33*/ "Foyer elevator accessed.\n",
/* 34*/ "Office elevator door has been unlocked.\n",
/* 35*/ "DataDyne Hovercopter eliminated.\n",
/* 36*/ "Cassandra's bodyguards have been defeated.\n",
/* 37*/ "That's not how it goes.\n",
/* 38*/ "Yes, it is.\n",
/* 39*/ "Give it to me - you're doing it wrong.\n",
/* 40*/ "Stop annoying me.\n",
/* 41*/ "Will you just hurry up!\n",
/* 42*/ "Oh, no...too late.\n",
/* 43*/ "She's here...\n",
/* 44*/ "Get her!\n",
/* 45*/ "Critical mission object destroyed. \n",
/* 46*/ "Obtain CamSpy.\n",
/* 47*/ "Dr. Caroll's\n",
/* 48*/ "CamSpy\n",
/* 49*/ "A CamSpy\n",
/* 50*/ "Picked up a CamSpy.\n",
/* 51*/ "They've locked down the ground floor - \nget to the elevator!\n",
/* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n",
/* 53*/ "I can't leave any bodyguards standing.\n",
/* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n",
/* 55*/ "Obtain alpha key card.\n",
/* 56*/ "Guard's\n",
/* 57*/ "Office key card\n",
/* 58*/ "Office key card\n",
/* 59*/ "Picked up Cassandra's office key card.\n",
/* 60*/ "Sound the alarm - she's here!\n",
/* 61*/ "Lights out!\n",
/* 62*/ "What the...?\n",
/* 63*/ "Going somewhere?\n",
/* 64*/ "Something I can do for you, old woman?\n",
/* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n",
/* 66*/ "Yes I do. I'm leaving.\n",
/* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n",
/* 68*/ "Sorry! Gotta shoot.\n",
/* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n",
/* 70*/ "I know that!\n",
/* 71*/ "I also know who to talk to... \nMr. Carrington.\n",
/* 72*/ "Elevator door is inactive on this floor.\n",
/* 73*/ NULL,
/* 74*/ NULL,
/* 75*/ NULL,
};

View File

@ -1,80 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|€€竄п<EFBD82>\n\n€€<EFBFBD>о<EFBFBD>諱ホ≪€≠奄鰍汲撃香メ♂€゚≧€€€<EFBFBD>獅潤マ<EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫<EFBFBD>€≠怩掾ソ≒<EFBFBD><EFBFBD><EFBFBD>あぃい♭⊆≫€ツぅう<EFBFBD>ぇえ<EFBFBD>€≠ァ∀♀€€€<EFBFBD>€€<EFBFBD>€<EFBFBD><EFBFBD>о<EFBFBD>ィぁ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⇔⊇≫€\n\n|€€€<EFBE8B>€縲マ€\n\n€€€€艢≠ゥ⊂<EFBFBD>♭⌒∃⊇∵€≠ェ≡≪⌒<EFBFBD><EFBFBD>€橿ラ€€<EFBFBD>€€<EFBFBD>メき∈ぎ≫<EFBFBD>∀∵くぐけÅ€€€€マ♀€<EFBFBD>ヘ♂€゚≧€€<EFBFBD>∈⇒<EFBFBD><EFBFBD>⇔ぉ<EFBFBD><EFBFBD>ぁ∈こご<EFBFBD>≫Å∽⊂€ツさざ∈⊇<EFBFBD>€\n\n|しじ€操セ<E6938D>€操モ€<EFBE93>о<EFBE9F>ぢ≪っ⊥\n\n<EFBFBD><EFBFBD>そぞ<EFBFBD>すず∈せぜ<EFBFBD>€∞ヒ<EFBFBD><EFBFBD>∀だ<EFBFBD><EFBFBD>€操モ€<EFBFBD>о<EFBFBD>€橿ラ€€<EFBFBD>€€<EFBFBD>ヘち<EFBFBD>ぢ≪っ⊥€\n\n|しじ€逐セ<E98090>€逐モ€<EFBE93>о∈つづて\n\n€<EFBFBD><EFBFBD>€逐モ€<EFBFBD>о゚∈て∩∃<EFBFBD><EFBFBD><EFBFBD>€€蕫マ♀∵€÷ヤ€<EFBFBD>€€<EFBFBD>兤ミ<EFBFBD>€曹ニ<EFBFBD><EFBFBD><EFBFBD>⊆≫€€怐ソ≒ぁ<EFBFBD>√⇔⊇≫<EFBFBD>∈せど<EFBFBD>€<EFBFBD>€逐モ€<EFBFBD>о∈つづて<EFBFBD><EFBFBD>€<EFBFBD>€€怐クなに<EFBFBD>€÷ル€蕫マ♀∈ぬね<EFBFBD>€\n\n|しじ€凍セ€增汲оル£€∈べ¬ぺ∀<E381BA>\n\n€<EFBFBD>メひ≪∈♂€゚≧€€<EFBFBD>€增汲оル£€∵びぴ<EFBFBD>¬∈へ<EFBFBD>⇔⊇≫€<EFBFBD>√∈べ¬ぺ∀<EFBFBD><EFBFBD>€ツ∂≒∃<EFBFBD>√†€ン≒√≫Å<EFBFBD>€\n\n|しじ€楳セ¥♂€€<EFBE86>п梶クュ⇔ほ<E28794>\n\n¬∵€<EFBFBD><EFBFBD>о縺ヨぼ<EFBFBD>€÷ユ€€マ♀€<EFBFBD>謔ロま<EFBFBD>¥♂€€<EFBFBD>п梶クみ<EFBFBD><EFBFBD><EFBFBD>€ツぉ¬∵ぽま≒∈む<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∋♪あぃい∃<EFBFBD>€≠゚<EFBFBD>⊇もべ<EFBFBD>ゃや∈<EFBFBD><EFBFBD>€\n\n|しじ€斧セ<E696A7><EFBFBD>€<E28AA5><C280>о縺マゅ√\n\n€<EFBFBD><EFBFBD>о縺マぼ<EFBFBD>€≠艪<EFBFBD>メぇえ∵よ<EFBFBD><EFBFBD>⇔⊇≫<EFBFBD><EFBFBD>€ツ♀€€€<EFBFBD>€€<EFBFBD>クり√≫∃≡€\n\nEND\n",
/* 1*/ "€<EFBFBD>€€€福Ыn",
/* 2*/ "|€€竄п<EFBD82>\n\n€€<EFBFBD>о<EFBFBD>諱ホ≪€≠奄鰍汲撃香メ♂€゚≧€€€<EFBFBD>獅潤マ<EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫<EFBFBD>€≠怩掾ソ≒<EFBFBD><EFBFBD><EFBFBD>あぃい♭⊆≫€ツぅう<EFBFBD>ぇえ<EFBFBD>€≠ァ∀♀€€€<EFBFBD>€€<EFBFBD>€<EFBFBD><EFBFBD>о<EFBFBD>ィぁ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⇔⊇≫€\n\n|€€€<EFBE8B>€縲マ€\n\n€€€€艢≠ゥ⊂<EFBFBD>♭⌒∃⊇∵€≠ェ≡≪⌒<EFBFBD><EFBFBD>€橿ラ€€<EFBFBD>€€<EFBFBD>メき∈ぎ≫<EFBFBD>∀∵くぐけÅ€€€€マ♀€<EFBFBD>ヘ♂€゚≧€€<EFBFBD>∈⇒<EFBFBD><EFBFBD>⇔ぉ<EFBFBD><EFBFBD>ぁ∈こご<EFBFBD>≫Å∽⊂€ツさざ∈⊇<EFBFBD>€\n\n|しじ€操セ<E6938D>€操モ€<EFBE93>о<EFBE9F>ぢ≪っ⊥\n\n<EFBFBD><EFBFBD>そぞ<EFBFBD>すず∈せぜ<EFBFBD>€∞ヒ<EFBFBD><EFBFBD>∀だ<EFBFBD><EFBFBD>€操モ€<EFBFBD>о<EFBFBD>€橿ラ€€<EFBFBD>€€<EFBFBD>ヘち<EFBFBD>ぢ≪っ⊥€\n\n|しじ€逐セ€增汲оル£€∈べ¬ぺ∀<E381BA>\n\n€<EFBFBD>メひ≪∈♂€゚≧€€<EFBFBD>€增汲оル£€∵びぴ<EFBFBD>¬∈へ<EFBFBD>⇔⊇≫€<EFBFBD>√∈べ¬ぺ∀<EFBFBD><EFBFBD>€ツ∂≒∃<EFBFBD>√†€ン≒√≫Å<EFBFBD>€\n\n|しじ€凍セ¥♂€€<EFBE86>п梶クュ⇔ほ<E28794>\n\n¬∵€<EFBFBD><EFBFBD>о縺ヨぼ<EFBFBD>€÷ユ€€マ♀€<EFBFBD>謔ロま<EFBFBD>¥♂€€<EFBFBD>п梶クみ<EFBFBD><EFBFBD><EFBFBD>€ツぉ¬∵ぽま≒∈む<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∋♪あぃい∃<EFBFBD>€≠゚<EFBFBD>⊇もべ<EFBFBD>ゃや∈<EFBFBD><EFBFBD>€\n\n|しじ€楳セ<E6A5B3><EFBFBD>€<E28AA5><C280>о縺マゅ√\n\n€<EFBFBD><EFBFBD>о縺マぼ<EFBFBD>€≠艪<EFBFBD>メぇえ∵よ<EFBFBD><EFBFBD>⇔⊇≫<EFBFBD><EFBFBD>€ツ♀€€€<EFBFBD>€€<EFBFBD>クり√≫∃≡€\n\nEND\n",
/* 3*/ "|€€竄п<EFBD82>\n\n€€<EFBFBD>о<EFBFBD>諱ホ≪€≠奄鰍汲撃香メ♂€゚≧€€€<EFBFBD>獅潤マ<EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>√⇔⊇≫<EFBFBD>€≠怩掾ソ≒<EFBFBD><EFBFBD><EFBFBD>あぃい♭⊆≫€ツぅう<EFBFBD>ぇえ<EFBFBD>€≠ァ∀♀€€€<EFBFBD>€€<EFBFBD>€<EFBFBD><EFBFBD>о<EFBFBD>ィぁ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⇔⊇≫€\n\n|€€€<EFBE8B>€縲マ€\n\n€€€€艢≠ゥ⊂<EFBFBD>♭⌒∃⊇∵€≠ェ≡≪⌒<EFBFBD><EFBFBD>€橿ラ€€<EFBFBD>€€<EFBFBD>メき∈ぎ≫<EFBFBD>∀∵くぐけÅ€€€€マ♀€<EFBFBD>ヘ♂€゚≧€€<EFBFBD>∈⇒<EFBFBD><EFBFBD>⇔ぉ<EFBFBD><EFBFBD>ぁ∈こご<EFBFBD>≫Å∽⊂€ツさざ∈⊇<EFBFBD>€\n\n|しじ€操セ<E6938D>€操モ€<EFBE93>о<EFBE9F>ぢ≪っ⊥\n\n<EFBFBD><EFBFBD>そぞ<EFBFBD>すず∈せぜ<EFBFBD>€∞ヒ<EFBFBD><EFBFBD>∀だ<EFBFBD><EFBFBD>€操モ€<EFBFBD>о<EFBFBD>€橿ラ€€<EFBFBD>€€<EFBFBD>ヘち<EFBFBD>ぢ≪っ⊥€\n\n|しじ€逐セ¥♂€€<EFBE86>п梶クュ⇔ほ<E28794>\n\n¬∵€<EFBFBD><EFBFBD>о縺ヨぼ<EFBFBD>€÷ユ€€マ♀€<EFBFBD>謔ロま<EFBFBD>¥♂€€<EFBFBD>п梶クみ<EFBFBD><EFBFBD><EFBFBD>€ツぉ¬∵ぽま≒∈む<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∋♪あぃい∃<EFBFBD>€≠゚<EFBFBD>⊇もべ<EFBFBD>ゃや∈<EFBFBD><EFBFBD>€\n\n|しじ€凍セ<E5878D><EFBFBD>€<E28AA5><C280>о縺マゅ√\n\n€<EFBFBD><EFBFBD>о縺マぼ<EFBFBD>€≠艪<EFBFBD>メぇえ∵よ<EFBFBD><EFBFBD>⇔⊇≫<EFBFBD><EFBFBD>€ツ♀€€€<EFBFBD>€€<EFBFBD>クり√≫∃≡€\n\nEND\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "<EFBFBD>€操モ€<EFBFBD>о<EFBFBD>ぢ≪っ⊥\n",
/* 10*/ "<EFBFBD>€逐モ€<EFBFBD>о∈つづて\n",
/* 11*/ "€增汲оル£€∈べ¬ぺ∀<EFBFBD>\n",
/* 12*/ "¥♂€€<EFBFBD>п梶クュ⇔ほ<EFBFBD>\n",
/* 13*/ "<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>о縺マゅ√\n",
/* 14*/ "€€<EFBFBD>оるれ€€€<EFBFBD>€€€€€蚕n",
/* 15*/ "ろゎ€ィ€ァ\n",
/* 16*/ "€€€<EFBFBD>€€<EFBFBD>謔ル<EFBFBD>€\n",
/* 17*/ "€€€<EFBFBD>€€<EFBFBD>謔墲ラ<EFBFBD>√⇔⊇≫€\n",
/* 18*/ "€€€<EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD>пクゐ<EFBFBD>€\n",
/* 19*/ "<EFBFBD>€<EFBFBD><EFBFBD>死潤コ<EFBFBD>€ワ⊂∧<EFBFBD><EFBFBD>⊇≫<EFBFBD>€\n",
/* 20*/ "<EFBFBD>⊇¶∋ゑを∃<EFBFBD>∀†∩≪<EFBFBD><EFBFBD>√≫<EFBFBD><EFBFBD>∃⊇<EFBFBD>€蚕n",
/* 21*/ "<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>оラ¬<EFBFBD>€\n",
/* 22*/ "ろゎ€ィ€ァ\n",
/* 23*/ "ろゎ€€麾歃n",
/* 24*/ "しじん<EFBFBD>\n",
/* 25*/ "しじ<EFBFBD><EFBFBD>\n",
/* 26*/ "Helichopper warning goes here.\n",
/* 27*/ "Obtain Night Vision.\n",
/* 28*/ "Cassandra De Vries'\n",
/* 29*/ "€艢ム€縲ミ€ム\n",
/* 30*/ "€艢ム€縲ミ€ム\n",
/* 31*/ "€艢ム€縲ミ€ム∈み<EFBFBD><EFBFBD>\n",
/* 32*/ "<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>€烙ヒ€€\n",
/* 33*/ "<EFBFBD>€操モ€<EFBFBD>о<EFBFBD><EFBFBD>€€€€<EFBFBD><EFBFBD>\n",
/* 34*/ "<EFBFBD>€逐モ€<EFBFBD>о<EFBFBD>€兤ハ€ラ∵<EFBFBD><EFBFBD>\n",
/* 35*/ "€增汲оル£€<EFBFBD>ばぱ<EFBFBD><EFBFBD>\n",
/* 36*/ "€€€マ♀€<EFBFBD>メ¥♂€€<EFBFBD>п梶クュ⇔ほ<EFBFBD>\n",
/* 37*/ "∧⊂∂<EFBFBD><EFBFBD>⊂∋<EFBFBD><EFBFBD>∃⊇Å∽€\n",
/* 38*/ "⊇∂€テ√♭⊇⊇∋Å<EFBFBD>€\n",
/* 39*/ "<EFBFBD><EFBFBD>€≠福<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⇔≫≡€\n",
/* 40*/ "€€﨟ニ≫∃<EFBFBD>€\n",
/* 41*/ "が♭⌒⊇⊇∩≒レ<EFBFBD><EFBFBD>€\n",
/* 42*/ "€€祥祥ワ⊂みム√Å€蚕n",
/* 43*/ "<EFBFBD>€<EFBFBD><EFBFBD>⊇≫<EFBFBD>€\n",
/* 44*/ "⇒∩<EFBFBD>⊃∽€\n",
/* 45*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 46*/ "Obtain CamSpy.\n",
/* 47*/ "Dr. Caroll's\n",
/* 48*/ "€€<EFBFBD>€\n",
/* 49*/ "€€<EFBFBD>€\n",
/* 50*/ "€€<EFBFBD>€ム∈み<EFBFBD><EFBFBD>\n",
/* 51*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€兤ハ€<EFBFBD>√⇔⊇≫<EFBFBD>€\n<EFBFBD>€操モ€<EFBFBD>о<EFBFBD>∀ユ∩⊂<EFBFBD>€\n",
/* 52*/ "<EFBFBD>€<EFBFBD><EFBFBD>モばぱ<EFBFBD><EFBFBD>€\nぇえ∵∂≒√⇔<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 53*/ "<EFBFBD><EFBFBD>リ∵∃⊇≡⊂<EFBFBD>€蚕n",
/* 54*/ "<EFBFBD>√ル<EFBFBD>ぇえ∈ら<EFBFBD>≫∃€\n<EFBFBD>€<EFBFBD><EFBFBD>о縺ヨロ∬<EFBFBD>€\n",
/* 55*/ "Obtain alpha key card.\n",
/* 56*/ "Guard's\n",
/* 57*/ "€ユd♀€ヨd\n",
/* 58*/ "€ユd♀€ヨd\n",
/* 59*/ "€€€マ♀€<EFBFBD>€€<EFBFBD>€<EFBFBD>\n€€∈み<EFBFBD><EFBFBD>\n",
/* 60*/ "€€<EFBFBD>о<EFBFBD>€€<EFBFBD>瘁諠吹ノ<EFBFBD>€\n",
/* 61*/ "ヱヲ<EFBFBD><EFBFBD>€\n",
/* 62*/ "<EFBFBD><EFBFBD>€≠モ朽蚕n",
/* 63*/ "<EFBFBD><EFBFBD>ぁ∩<EFBFBD><EFBFBD>€\n",
/* 64*/ "<EFBFBD>が∩ヨ€÷ヤ°€€蕫タ\n",
/* 65*/ "<EFBFBD>€噫「∈ヵ<EFBFBD>∬ヶ<EFBFBD>€\nが∈<EFBFBD>⇔⊇≫∩€蛛ソ<EFBFBD>⇔≫<EFBFBD>∩⊇€\n",
/* 66*/ "が∈<EFBFBD>€\n<EFBFBD><EFBFBD>≫Å<EFBFBD>€\n",
/* 67*/ "⌒⊂€曹メか⊂∝€磨ナ∃<EFBFBD>€\n<EFBFBD>€煤メ<EFBFBD><EFBFBD><EFBFBD>∀⊇⊇∝€蚕n",
/* 68*/ "<EFBFBD>⊇∝<EFBFBD>€香サ♭≫<EFBFBD>€\n",
/* 69*/ "<EFBFBD>€噫「∈ョ<EFBFBD><EFBFBD>≪ヶ<EFBFBD><EFBFBD>€\n⊆√∵∃<EFBFBD><EFBFBD><EFBFBD>∵す<EFBFBD>∃⊇<EFBFBD>€\n",
/* 70*/ "∝∩<EFBFBD>⇔≫∝€\n",
/* 71*/ "<EFBFBD><EFBFBD>Α<EFBFBD>√†⊇⊇∩€蛛ソ<EFBFBD>⇔≫∝€\n€<EFBFBD>€€<EFBFBD>€€<EFBFBD>€縲マ≡€\n",
/* 72*/ "<EFBFBD><EFBFBD>€<EFBFBD>兤ミ<EFBFBD>€€<EFBFBD>о<EFBFBD>€<EFBFBD>€兤ハ€<EFBFBD>√⇔⊇<EFBFBD><EFBFBD>€\n",
/* 73*/ NULL,
/* 74*/ NULL,
/* 75*/ NULL,
};

View File

@ -1,80 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Access foyer elevator\n",
/* 10*/ "Reactivate office elevator\n",
/* 11*/ "Destroy dataDyne hovercopter\n",
/* 12*/ "Defeat Cassandra's bodyguards\n",
/* 13*/ "Rendezvous at helipad\n",
/* 14*/ "Accessing elevator controls...\n",
/* 15*/ "LIGHTS ARE NOW ON!\n",
/* 16*/ "Dr. Caroll has been killed!\n",
/* 17*/ "Dr. Caroll is under attack!\n",
/* 18*/ "Dr. Caroll has been damaged!\n",
/* 19*/ "Too late! She's here...\n",
/* 20*/ "You've become quite an annoyance...\n",
/* 21*/ "Good night, Ms. Dark.\n",
/* 22*/ "LIGHTS NOW ON\n",
/* 23*/ "LIGHTS NOW OFF\n",
/* 24*/ "MISSION FAILED\n",
/* 25*/ "MISSION SUCCESSFUL\n",
/* 26*/ "Helichopper warning goes here.\n",
/* 27*/ "Obtain Night Vision.\n",
/* 28*/ "Cassandra De Vries'\n",
/* 29*/ "Night Vision\n",
/* 30*/ "Night Vision\n",
/* 31*/ "Picked up Night Vision.\n",
/* 32*/ "We meet again, girl!\n",
/* 33*/ "Foyer elevator accessed.\n",
/* 34*/ "Office elevator door has been unlocked.\n",
/* 35*/ "DataDyne Hovercopter eliminated.\n",
/* 36*/ "Cassandra's bodyguards have been defeated.\n",
/* 37*/ "That's not how it goes.\n",
/* 38*/ "Yes, it is.\n",
/* 39*/ "Give it to me - you're doing it wrong.\n",
/* 40*/ "Stop annoying me.\n",
/* 41*/ "Will you just hurry up!\n",
/* 42*/ "Oh, no...too late.\n",
/* 43*/ "She's here...\n",
/* 44*/ "Get her!\n",
/* 45*/ "Critical mission object destroyed. \n",
/* 46*/ "Obtain CamSpy.\n",
/* 47*/ "Dr. Caroll's\n",
/* 48*/ "CamSpy\n",
/* 49*/ "A CamSpy\n",
/* 50*/ "Picked up a CamSpy.\n",
/* 51*/ "They've locked down the ground floor - \nget to the elevator!\n",
/* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n",
/* 53*/ "I can't leave any bodyguards standing.\n",
/* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n",
/* 55*/ "Obtain alpha key card.\n",
/* 56*/ "Guard's\n",
/* 57*/ "Office key card\n",
/* 58*/ "Office key card\n",
/* 59*/ "Picked up Cassandra's office key card.\n",
/* 60*/ "Sound the alarm - she's here!\n",
/* 61*/ "Lights out!\n",
/* 62*/ "What the...?\n",
/* 63*/ "Going somewhere?\n",
/* 64*/ "Something I can do for you, old woman?\n",
/* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n",
/* 66*/ "Yes I do. I'm leaving.\n",
/* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n",
/* 68*/ "Sorry! Gotta shoot.\n",
/* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n",
/* 70*/ "I know that!\n",
/* 71*/ "I also know who to talk to... \nMr. Carrington.\n",
/* 72*/ "Elevator door is inactive on this floor.\n",
/* 73*/ NULL,
/* 74*/ NULL,
/* 75*/ NULL,
};

View File

@ -1,80 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Réactiver l'ascenseur\n\nNous avons détecté la commande d'arrêt de fonctionnement de l'ascenseur donnée par un PC des bureaux inférieurs. Trouvez ce terminal et modifiez la commande pour réactiver l'ascenseur.\n\n|Objectif 3: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 4: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous interdire l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 5: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n",
/* 1*/ "TOUR LUCERNE\n",
/* 2*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 3: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 4: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n",
/* 3*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 3: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Accéder à l'ascenseur du hall\n",
/* 10*/ "Réactiver l'ascenseur du bureau\n",
/* 11*/ "Détruire l'hovercopter dataDyne\n",
/* 12*/ "Battre les gardes de Cassandra\n",
/* 13*/ "Retour à l'héliport avec Dr. Caroll\n",
/* 14*/ "Accès paramètres ascenseur...\n",
/* 15*/ "LUMIERES ON\n",
/* 16*/ "Dr. Caroll abattu!\n",
/* 17*/ "Dr. Caroll sous feu ennemi!\n",
/* 18*/ "Dr. Caroll endommagé!\n",
/* 19*/ "Trop tard! La voici...\n",
/* 20*/ "Vous êtes une sacrée peste, vous...\n",
/* 21*/ "Bonne nuit, Miss Dark.\n",
/* 22*/ "LUMIERES ON\n",
/* 23*/ "LUMIERES OFF\n",
/* 24*/ "MISSION ECHOUEE\n",
/* 25*/ "MISSION ACCOMPLIE\n",
/* 26*/ "Emplacement pour warning hélico.\n",
/* 27*/ "Obtenir Vue nocturne.\n",
/* 28*/ "Cassandra De Vries: \n",
/* 29*/ "Vue nocturne\n",
/* 30*/ "Vue nocturne\n",
/* 31*/ "Vue nocturne obtenue.\n",
/* 32*/ "Re-bonjour, jeune fille!\n",
/* 33*/ "Ascenseur hall atteint.\n",
/* 34*/ "Porte ascenseur bureau ouverte.\n",
/* 35*/ "Hovercopter dataDyne éliminé.\n",
/* 36*/ "Gardes de Cassandra vaincus.\n",
/* 37*/ "Mais...pas comme ça!\n",
/* 38*/ "Mais si.\n",
/* 39*/ "Vous faites n'importe quoi!\n",
/* 40*/ "Silence.\n",
/* 41*/ "Mais dépêchez-vous!\n",
/* 42*/ "Oh, non...trop tard.\n",
/* 43*/ "La voilà...\n",
/* 44*/ "Attrapez-la!\n",
/* 45*/ "Objet crucial détruit. \n",
/* 46*/ "Obtenir CamSpy.\n",
/* 47*/ "Dr. Caroll: \n",
/* 48*/ "CamSpy\n",
/* 49*/ "Une CamSpy\n",
/* 50*/ "CamSpy obtenue.\n",
/* 51*/ "Ils ont verrouillé le rez-de-chaussée - \nallez à l'ascenseur!\n",
/* 52*/ "Il faut détruire cet hélico ou le \ntransport sera descendu!\n",
/* 53*/ "Je ne peux laisser un garde du corps vivant.\n",
/* 54*/ "Ne faites attendre le transport - \nretournez à l'héliport.\n",
/* 55*/ "Obtenir la carte alpha.\n",
/* 56*/ "Garde: \n",
/* 57*/ "Carte de bureau\n",
/* 58*/ "Carte du bureau\n",
/* 59*/ "Carte de bureau de Cassandra obtenue.\n",
/* 60*/ "Alerte! Elle est ici!\n",
/* 61*/ "Bonne nuit!\n",
/* 62*/ "Qu'est-ce qu...?\n",
/* 63*/ "On se balade?\n",
/* 64*/ "Qu'est-ce qu'elle veut mère-grand?\n",
/* 65*/ "Remettez-moi le sapiens immédiatement! Vous ne \nsavez pas ce que vous faites...\n",
/* 66*/ "Oh que si. Je rentre chez moi.\n",
/* 67*/ "Pour la dernière fois: rendez ce qui \nm'appartient et je vous offre un poste.\n",
/* 68*/ "Désolée! Je me tire.\n",
/* 69*/ "Il nous faut le sapiens. Le reste de \nl'opération en dépend.\n",
/* 70*/ "J'en suis consciente!\n",
/* 71*/ "Je sais aussi à qui m'adresser...\nMr. Carrington.\n",
/* 72*/ "Porte d'ascenseur inutilisable à cet étage.\n",
/* 73*/ NULL,
/* 74*/ NULL,
/* 75*/ NULL,
};

View File

@ -1,80 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Reaktivieren Sie den Aufzug!\n\nWir konnten herausfinden, dass der einzige erreichbare Aufzug von einem PC aus blockiert wird. Dieser PC befindet sich im tiefstgelegenen Bürotrakt. Sie müssen diesen PC finden, um den Aufzug wieder in Gang zu setzen.\n\n|3. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|4. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|5. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|3. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|4. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n",
/* 3*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|3. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Erlangen Sie Zugang zum Foyer-Aufzug!\n",
/* 10*/ "Reaktivieren Sie den Büro-Aufzug!\n",
/* 11*/ "Zerstören Sie das dataDyne-Gunship!\n",
/* 12*/ "Neutralisieren Sie De Vries' Bodyguards!\n",
/* 13*/ "Erreichen Sie das Helipad!\n",
/* 14*/ "Zugriff auf die Aufzüge erfolgt...\n",
/* 15*/ "BELEUCHTUNG AKTIVIERT!\n",
/* 16*/ "Dr. Caroll wurde zerstört!\n",
/* 17*/ "Dr. Caroll wird angegriffen!\n",
/* 18*/ "Dr. Caroll wurde beschädigt!\n",
/* 19*/ "Zu spät! Sie ist hier...\n",
/* 20*/ "Du wirst langsam richtig lästig...\n",
/* 21*/ "Gute Nacht, Ms. Dark.\n",
/* 22*/ "BELEUCHTUNG AKTIVIERT\n",
/* 23*/ "BELEUCHTUNG DEAKTIVIERT\n",
/* 24*/ "MISSION FEHLGESCHLAGEN\n",
/* 25*/ "MISSION ERFOLGREICH\n",
/* 26*/ "Gunship-Warnung!!!\n",
/* 27*/ "Erlangen Sie das Nachtsichtgerät!\n",
/* 28*/ "Cassandra De Vries\n",
/* 29*/ "Nachtsichtgerät\n",
/* 30*/ "Nachtsichtgerät\n",
/* 31*/ "Nachtsichtgerät aufgenommen\n",
/* 32*/ "So trifft man sich wieder, Kleine!\n",
/* 33*/ "Foyer-Aufzug betreten\n",
/* 34*/ "Tür zum Büro-Aufzug entriegelt\n",
/* 35*/ "dataDyne-Gunship eliminiert\n",
/* 36*/ "Cassandras Bodyguards wurden neutralisiert.\n",
/* 37*/ "So funktioniert das nicht.\n",
/* 38*/ "Doch, tut es.\n",
/* 39*/ "Gib das her - du machst das falsch!\n",
/* 40*/ "Hör auf mich zu nerven.\n",
/* 41*/ "Würdest du dich bitte beeilen?\n",
/* 42*/ "Oh nein, ...zu spät!\n",
/* 43*/ "Sie ist hier...\n",
/* 44*/ "Schnappt sie!\n",
/* 45*/ "Wichtiges Objekt zerstört\n",
/* 46*/ "Erlangen Sie den CamSpy.\n",
/* 47*/ "Dr. Carolls\n",
/* 48*/ "CamSpy\n",
/* 49*/ "Ein CamSpy\n",
/* 50*/ "CamSpy aufgenommen\n",
/* 51*/ "Der Zugang zum Parterre wurde verriegelt. - \nRasch zum Aufzug!\n",
/* 52*/ "Dieses Gunship muss vernichtet werden, sonst \nwird das Fluchtfahrzeug angegriffen!\n",
/* 53*/ "Ich muss mich noch um die Bodyguards kümmern.\n",
/* 54*/ "Lassen Sie das Fluchtfahrzeug nicht warten! - \nZurück zum Helipad!\n",
/* 55*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n",
/* 56*/ "Wachen\n",
/* 57*/ "Büro-Schlüsselkarte\n",
/* 58*/ "Büro-Schlüsselkarte\n",
/* 59*/ "Cassandras Büro-Schlüsselkarte aufgenommen\n",
/* 60*/ "Gebt Alarm - sie ist hier!\n",
/* 61*/ "Licht AUS!\n",
/* 62*/ "Was zum...?\n",
/* 63*/ "Na, wohin willst du denn?\n",
/* 64*/ "Kann ich etwas für dich tun, alte Frau?\n",
/* 65*/ "Geben Sie uns den Sapienten sofort zurück! Sie wissen \nnicht, was Sie da tun!\n",
/* 66*/ "Doch, das tue ich. Ich verschwinde.\n",
/* 67*/ "Letzte Chance: Geben Sie ihn zurück, und Sie\nkönnten vielleicht in Zukunft für mich arbeiten.\n",
/* 68*/ "Tut mir leid, ich bin in Eile.\n",
/* 69*/ "Sie müssen uns das Ding zurückbringen. Wir können \nsonst nicht fortfahren.\n",
/* 70*/ "Das weiß ich!\n",
/* 71*/ "Ich weiß auch, mit wem ich sprechen muss... \nMr. Carrington.\n",
/* 72*/ "Die Aufzugstüren sind auf diesem Stockwerk inaktiv.\n",
/* 73*/ NULL,
/* 74*/ NULL,
/* 75*/ NULL,
};

View File

@ -1,80 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Riattiva l'ascensore\n\nIn un PC del piano inferiore degli uffici abbiamo rintracciato l'ordine di bloccare l'unico ascensore accessibile. Devi trovare quel PC e cambiare l'ordine per rimettere in funzione l'ascensore.\n\n|Obiettivo 3: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 4: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 5: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 3: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 4: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n",
/* 3*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 3: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Usa l'ascensore dell'atrio\n",
/* 10*/ "Riattiva l'ascensore degli uffici\n",
/* 11*/ "Distruggi la cannoniera dataDyne\n",
/* 12*/ "Elimina guardie del corpo di Cassandra\n",
/* 13*/ "Appuntamento all'eliporto\n",
/* 14*/ "I comandi dell'ascensore...\n",
/* 15*/ "LE LUCI SONO ACCESE!\n",
/* 16*/ "Il Dr. Caroll è stato ucciso!\n",
/* 17*/ "Attaccano il Dr. Caroll!\n",
/* 18*/ "Il Dr. Caroll è ferito!\n",
/* 19*/ "Troppo tardi! È già qui!\n",
/* 20*/ "Sei una vera scocciatura!\n",
/* 21*/ "Buona notte, Perfect Dark!\n",
/* 22*/ "LUCI ACCESE ORA\n",
/* 23*/ "LUCI SPENTE ORA\n",
/* 24*/ "MISSIONE FALLITA\n",
/* 25*/ "MISSIONE COMPIUTA\n",
/* 26*/ "Allarme cannoniera!\n",
/* 27*/ "Procurati Vista Notturna\n",
/* 28*/ "Cassandra De Vries:\n",
/* 29*/ "Vista Notturna\n",
/* 30*/ "Vista Notturna\n",
/* 31*/ "Presa Vista Notturna\n",
/* 32*/ "Chi non muore si rivede!\n",
/* 33*/ "Raggiunto l'ascensore nell'atrio.\n",
/* 34*/ "Aperta la porta ascensore uffici.\n",
/* 35*/ "Eliminata la cannoniera dataDyne.\n",
/* 36*/ "Sconfitte le guardie del corpo di Cassandra.\n",
/* 37*/ "Non si fa così, idiota!\n",
/* 38*/ "Sì, invece!\n",
/* 39*/ "Dammi qua! Faccio io!\n",
/* 40*/ "Non scocciarmi!\n",
/* 41*/ "Ti vuoi dare una mossa?!\n",
/* 42*/ "Oh, no! Troppo tardi.\n",
/* 43*/ "Ci ha raggiunti...\n",
/* 44*/ "Prendila!\n",
/* 45*/ "Distrutto strumento essenziale alla missione\n",
/* 46*/ "Procurati TeleSpia.\n",
/* 47*/ "Dr. Caroll:\n",
/* 48*/ "TeleSpia\n",
/* 49*/ "TeleSpia\n",
/* 50*/ "Presa la TeleSpia.\n",
/* 51*/ "Hanno chiuso il pianterreno! \nVa all'ascensore!\n",
/* 52*/ "Bisogna tirar giù quella cannoniera \no abbatterà la navetta!\n",
/* 53*/ "Non posso lasciar vive le guardie!\n",
/* 54*/ "Fai presto: vai alla navetta! \nTorna all'eliporto!\n",
/* 55*/ "Procurati la chiave alfa\n",
/* 56*/ "Guardia:\n",
/* 57*/ "Chiave dell'ufficio\n",
/* 58*/ "Chiave dell'ufficio\n",
/* 59*/ "Presa chiave ufficio di Cassandra\n",
/* 60*/ "Date l'allarme: è qui!\n",
/* 61*/ "Ma chiudi il becco!\n",
/* 62*/ "Ma cosa...?\n",
/* 63*/ "Dove credi di andare?\n",
/* 64*/ "Posso aiutarla, madama?\n",
/* 65*/ "Ridacci immediatamente il Sapiente! \nNon sai quel che fai!\n",
/* 66*/ "Certo che lo so: me ne vado!\n",
/* 67*/ "Te lo ripeto! Restituiscilo e \npotrai venire a lavorare per me.\n",
/* 68*/ "Spiacente! Ho da fare!\n",
/* 69*/ "Devi recuperare il Sapiente: senza \nnon è possibile andare avanti.\n",
/* 70*/ "Lo so benissimo!\n",
/* 71*/ "So anche con chi parlare... \ncon Carrington!\n",
/* 72*/ "La porta dell'ascensore è fuori servizio.\n",
/* 73*/ NULL,
/* 74*/ NULL,
/* 75*/ NULL,
};

View File

@ -1,80 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Reactivar Ascensor\n\nHemos interceptado una orden de cerrar el único ascensor accesible enviada a un PC situado en el piso de oficinas más bajo. Tienes que encontrar ese PC y cambiar la orden para hacer que el ascensor funcione de nuevo.\n\n|Objetivo Tres: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Cuatro: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cinco: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n",
/* 1*/ "EDIFICIO LUCERNE\n",
/* 2*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Tres: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cuatro: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n",
/* 3*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Tres: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Acceder al ascensor del vestíbulo\n",
/* 10*/ "Reactivar ascensor de las oficinas\n",
/* 11*/ "Destruir helicóptero de dataDyne\n",
/* 12*/ "Derrotar a las guard. de Cassandra\n",
/* 13*/ "Encuentro en el helipuerto\n",
/* 14*/ "Accediendo a los controles del ascensor...\n",
/* 15*/ "¡LUCES ENCENDIDAS!\n",
/* 16*/ "¡El Dr. Caroll ha muerto!\n",
/* 17*/ "¡Están atacando al Dr. Caroll!\n",
/* 18*/ "¡El Dr. Caroll ha sido dañado!\n",
/* 19*/ "¡Demasiado tarde! Ella está aquí...\n",
/* 20*/ "Estás empezando a ser un fastidio...\n",
/* 21*/ "Buenas noches, Srta. Dark.\n",
/* 22*/ "LUCES ENCENDIDAS\n",
/* 23*/ "LUCES APAGADAS\n",
/* 24*/ "MISIÓN FALLADA\n",
/* 25*/ "MISIÓN CUMPLIDA\n",
/* 26*/ "Aviso del Helicóptero va aquí.\n",
/* 27*/ "Obtén Visión Nocturna.\n",
/* 28*/ "Cassandra De Vries:\n",
/* 29*/ "V. Nocturna\n",
/* 30*/ "Visión Nocturna\n",
/* 31*/ "Visión Nocturna obtenida.\n",
/* 32*/ "¡Nos vemos de nuevo, chica!\n",
/* 33*/ "Accediste al ascensor del vestíbulo.\n",
/* 34*/ "La puerta del ascensor a las oficinas ha sido abierta.\n",
/* 35*/ "Helicóptero de dataDyne eliminado.\n",
/* 36*/ "Las guardaespaldas de Cassandra han sido derrotadas.\n",
/* 37*/ "Así no es como va.\n",
/* 38*/ "Sí, así es.\n",
/* 39*/ "Dámelo. Lo estás haciendo mal.\n",
/* 40*/ "Deja de molestarme.\n",
/* 41*/ "¡Debemos darnos prisa!\n",
/* 42*/ "Oh, no... demasiado tarde.\n",
/* 43*/ "Ella está aquí...\n",
/* 44*/ "¡Cogedla!\n",
/* 45*/ "Objeto crítico de la misión destruido. \n",
/* 46*/ "Obtén la Cámara Espía.\n",
/* 47*/ "Dr. Caroll:\n",
/* 48*/ "Cámara Espía\n",
/* 49*/ "Una Cámara Espía\n",
/* 50*/ "Cámara Espía obtenida.\n",
/* 51*/ "Han cerrado la planta baja. \n¡Ve al ascensor!\n",
/* 52*/ "¡Necesitamos acabar con ese helicóptero, \no derribará la nave de escape!\n",
/* 53*/ "No puedo dejar ninguna guardaespaldas en pie.\n",
/* 54*/ "No hagas esperar a la nave de escape: \nvuelve a la zona de aterrizaje.\n",
/* 55*/ "Obtén la llave magnética alfa.\n",
/* 56*/ "Guarda:\n",
/* 57*/ "Llave de la oficina\n",
/* 58*/ "Llave magnética de la oficina\n",
/* 59*/ "Llave magnética de la oficina de Cassandra obtenida.\n",
/* 60*/ "Activa la alarma: ¡ella está aquí!\n",
/* 61*/ "¡Luces fuera!\n",
/* 62*/ "¿Qué dem...?\n",
/* 63*/ "¿Vas a alguna parte?\n",
/* 64*/ "¿Puedo hacer algo por ti, anciana?\n",
/* 65*/ "¡Devuelve nuestra IA inmediatamente! No sabes \nlo que estás haciendo.\n",
/* 66*/ "Sí lo sé. Me largo.\n",
/* 67*/ "¡Otra oportunidad! Devuélvelo, y podrás \ntrabajar para mí.\n",
/* 68*/ "¡Lo siento! ¿Lo pillas?\n",
/* 69*/ "Debes traer de vuelta la IA. No podemos \navanzar sin ella.\n",
/* 70*/ "¡Ya lo sé!\n",
/* 71*/ "También sé con quién hablar... \ncon el Sr. Carrington.\n",
/* 72*/ "La puerta del ascensor no funciona en este piso.\n",
/* 73*/ NULL,
/* 74*/ NULL,
/* 75*/ NULL,
};

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,20 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n",
/* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n",
/* 4*/ "Defeat dataDyne guard\n",
/* 5*/ "Defeat Jonathan Dark\n",
/* 6*/ "Defeat Trent Easton\n",
/* 7*/ "THE DUEL\n",
/* 8*/ "Defeat your opponent.\n",
/* 9*/ "Well done! You were too quick for him!\n",
/* 10*/ "Well done! You were too quick for him!\n",
/* 11*/ "Well done! You were too quick for him!\n",
/* 12*/ "Opponent skill level: AGENT\n",
/* 13*/ "Opponent skill level: SPECIAL AGENT\n",
/* 14*/ "Opponent skill level: PERFECT AGENT\n",
/* 15*/ NULL,
};

View File

@ -1,20 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|€€竄п<EFBD82>\n\n<EFBFBD>√∵くΒ<EFBFBD>€窶ワ€縺ヘ∃≫€€塚兤<EFBFBD>€<EFBFBD><EFBFBD>。Δ<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺クほ<EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD>Εい∈Ζ<EFBFBD>⇔⊇≫<EFBFBD>€<EFBFBD>€€€艢ツ€<EFBFBD>о蛟マ€<EFBFBD>Ηュ⇔<EFBFBD>ΘΙΚ<EFBFBD>€÷窶ワ€縺マ<EFBFBD>≪Λ∋♭<EFBFBD>€ツさざ∈⊇<EFBFBD>€\n\n|しじ€操セ♂€゚≧€€<C280>ヮワ∈ほ<E28888>\n\n€゚≧€€<EFBFBD>ヮワ<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺クほ<EFBFBD><EFBFBD>€€€<EFBFBD>€<EFBFBD>€縺メ€<EFBFBD><EFBFBD>ΜΝΞÅ∵€ュΠ<EFBFBD>ΡΣÅ<EFBFBD>€\n\n|しじ€逐セ≠€€艢レ€マ∈ほ<E28888>\n\nヵΞ<EFBFBD>€≠」う♭€縲ハ£<EFBFBD>ΤΥ<EFBFBD>€€艢レ€<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺諠ウみÅ€€€€瘁モぐ√€€マ°€€繧「∈ぷ¬€ュΠ<EFBFBD>⇔⊇≫<EFBFBD>Χ∈⇒<EFBFBD><EFBFBD>ΗΧ€ツΨ∈⇒<EFBFBD>€\n\n|しじ€凍セ€<C280>€<C280>€€縲マ∈ほ<E28888>\n\nΩ<EFBFBD><EFBFBD>€€<EFBFBD>о縺クほ<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€€<EFBFBD>€<EFBFBD>€縺モ€<EFBFBD><EFBFBD><EFBFBD>⊇ΦみÅ<EFBFBD>€<EFBFBD><EFBFBD>€€<EFBFBD>ミ♭<EFBFBD>√†€ワ⊂が⌒<EFBFBD>√≫⌒<EFBFBD><EFBFBD><EFBFBD>⊇Å∽⊂€\n\nEND\n",
/* 1*/ "€<EFBFBD>€€<EFBFBD>€福Ыn",
/* 2*/ "|€€竄п<EFBD82>\n\n<EFBFBD>√∵くΒ<EFBFBD>€窶ワ€縺ヘ∃≫€€塚兤<EFBFBD>€<EFBFBD><EFBFBD>。Δ<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺クほ<EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD>Εい∈Ζ<EFBFBD>⇔⊇≫<EFBFBD>€<EFBFBD>€€€艢ツ€<EFBFBD>о蛟マ€<EFBFBD>Ηュ⇔<EFBFBD>ΘΙΚ<EFBFBD>€÷窶ワ€縺マ<EFBFBD>≪Λ∋♭<EFBFBD>€ツさざ∈⊇<EFBFBD>€\n\n|しじ€操セ♂€゚≧€€<C280>ヮワ∈ほ<E28888>\n\n€゚≧€€<EFBFBD>ヮワ<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺クほ<EFBFBD><EFBFBD>€€€<EFBFBD>€<EFBFBD>€縺メ€<EFBFBD><EFBFBD>ΜΝΞÅ∵€ュΠ<EFBFBD>ΡΣÅ<EFBFBD>€\n\n|しじ€逐セ≠€€艢レ€マ∈ほ<E28888>\n\nヵΞ<EFBFBD>€≠」う♭€縲ハ£<EFBFBD>ΤΥ<EFBFBD>€€艢レ€<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺諠ウみÅ€€€€瘁モぐ√€€マ°€€繧「∈ぷ¬€ュΠ<EFBFBD>⇔⊇≫<EFBFBD>Χ∈⇒<EFBFBD><EFBFBD>ΗΧ€ツΨ∈⇒<EFBFBD>€\n\nEND\n",
/* 3*/ "|€€竄п<EFBD82>\n\n<EFBFBD>√∵くΒ<EFBFBD>€窶ワ€縺ヘ∃≫€€塚兤<EFBFBD>€<EFBFBD><EFBFBD>。Δ<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺クほ<EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD>Εい∈Ζ<EFBFBD>⇔⊇≫<EFBFBD>€<EFBFBD>€€€艢ツ€<EFBFBD>о蛟マ€<EFBFBD>Ηュ⇔<EFBFBD>ΘΙΚ<EFBFBD>€÷窶ワ€縺マ<EFBFBD>≪Λ∋♭<EFBFBD>€ツさざ∈⊇<EFBFBD>€\n\n|しじ€操セ♂€゚≧€€<C280>ヮワ∈ほ<E28888>\n\n€゚≧€€<EFBFBD>ヮワ<EFBFBD>€€<EFBFBD>€<EFBFBD>€縺クほ<EFBFBD><EFBFBD>€€€<EFBFBD>€<EFBFBD>€縺メ€<EFBFBD><EFBFBD>ΜΝΞÅ∵€ュΠ<EFBFBD>ΡΣÅ<EFBFBD>€\n\nEND\n",
/* 4*/ "€゚≧€€<EFBFBD>ヮワ∈ほ<EFBFBD>\n",
/* 5*/ "€€艢レ€マ∈ほ<EFBFBD>\n",
/* 6*/ "€<EFBFBD>€<EFBFBD>€€縲マ∈ほ<EFBFBD>\n",
/* 7*/ "<EFBFBD>\n",
/* 8*/ "∈ほ<EFBFBD>\n",
/* 9*/ "€€€€盾ァ<EFBFBD><EFBFBD>¬Å€\n",
/* 10*/ "€€€€盾ァ<EFBFBD><EFBFBD>¬Å€\n",
/* 11*/ "€€€€盾ァ<EFBFBD><EFBFBD>¬Å€\n",
/* 12*/ "<EFBFBD>€<EFBFBD><EFBFBD>€€€€縲ムム€Ыn",
/* 13*/ "<EFBFBD>€<EFBFBD><EFBFBD>€ミ♀°€€€縲ム閧о<EFBFBD>Ыn",
/* 14*/ "<EFBFBD>€<EFBFBD><EFBFBD>€<EFBFBD>€€縲ム驍п橿Ыn",
/* 15*/ NULL,
};

View File

@ -1,20 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n",
/* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n",
/* 4*/ "Defeat dataDyne guard\n",
/* 5*/ "Defeat Jonathan Dark\n",
/* 6*/ "Defeat Trent Easton\n",
/* 7*/ "THE DUEL\n",
/* 8*/ "Defeat your opponent.\n",
/* 9*/ "Well done! You were too quick for him!\n",
/* 10*/ "Well done! You were too quick for him!\n",
/* 11*/ "Well done! You were too quick for him!\n",
/* 12*/ "Opponent skill level: AGENT\n",
/* 13*/ "Opponent skill level: SPECIAL AGENT\n",
/* 14*/ "Opponent skill level: PERFECT AGENT\n",
/* 15*/ NULL,
};

View File

@ -1,20 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\n|Objectif 3: - Vaincre Trent Easton\n\nEliminer le simulant d'un agent expérimenté du gouvernement. Ce simulant sera exceptionnellement fort. Si vous passez ce test, vous pourrez être fière de vos prouesses.\n\nFIN\n",
/* 1*/ "TOUR LUCERNE\n",
/* 2*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\nFIN\n",
/* 3*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\nFIN\n",
/* 4*/ "Vaincre le garde dataDyne\n",
/* 5*/ "Vaincre Jonathan Dark\n",
/* 6*/ "Vaincre Trent Easton\n",
/* 7*/ "LE DUEL\n",
/* 8*/ "Vaincre votre adversaire.\n",
/* 9*/ "Bien joué! Vous êtes trop rapide pour lui!\n",
/* 10*/ "Bien joué! Vous êtes trop rapide pour lui!\n",
/* 11*/ "Bien joué! Vous êtes trop rapide pour lui!\n",
/* 12*/ "Niveau adverse: AGENT\n",
/* 13*/ "Niveau adverse: AGENT SPECIAL\n",
/* 14*/ "Niveau adverse: AGENT PERFECT\n",
/* 15*/ NULL,
};

View File

@ -1,20 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\n|3. Ziel: - Besiegen Sie Trent Easton!\n\nBesiegen Sie die Simulation eines äußerst gefährlichen Regierungsagenten. Der Simulant ist ein überdurchschnittlich erfahrener Kämpfer. Wenn Sie diesen Test bestehen, dürfen Sie zu Recht stolz auf sich sein.\n\nENDE\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\nENDE\n",
/* 3*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\nENDE\n",
/* 4*/ "Besiegen Sie die dataDyne-Wache!\n",
/* 5*/ "Besiegen Sie Jonathan Dark!\n",
/* 6*/ "Besiegen Sie Trent Easton!\n",
/* 7*/ "DAS DUELL\n",
/* 8*/ "Besiegen Sie Ihren Gegner!\n",
/* 9*/ "Sie waren zu schnell für ihn!\n",
/* 10*/ "Sie waren zu schnell für ihn!\n",
/* 11*/ "Sie waren zu schnell für ihn!\n",
/* 12*/ "Schwierigkeitsgrad: AGENT\n",
/* 13*/ "Schwierigkeitsgrad: SPEZIALAGENT\n",
/* 14*/ "Schwierigkeitsgrad: PERFEKTER AGENT\n",
/* 15*/ NULL,
};

View File

@ -1,20 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\n|Obiettivo 3: - Sconfiggi Trent Easton\n\nSconfiggi la simulazione di questo esperto agente governativo. Il replicante è un avversario particolarmente duro. Se superi questa prova, puoi ritenerti soddisfatta dei risultati raggiunti!\n\nFINE\n",
/* 1*/ "LUCERNE TOWER\n",
/* 2*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\nFINE\n ",
/* 3*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\nFINE\n ",
/* 4*/ "Sconfiggi la guardia dataDyne \n",
/* 5*/ "Sconfiggi Jonathan Dark \n",
/* 6*/ "Sconfiggi Trent Easton \n",
/* 7*/ "IL DUELLO\n",
/* 8*/ "Sconfiggi l'avversario.\n",
/* 9*/ "Ben fatto! Sei troppo veloce per lui!\n",
/* 10*/ "Ben fatto! Sei troppo veloce per lui!\n",
/* 11*/ "Ben fatto! Sei troppo veloce per lui!\n",
/* 12*/ "Livello abilità avversario: AGENTE\n",
/* 13*/ "Livello abilità avversario: AGENTE SPECIALE\n",
/* 14*/ "Livello abilità avversario: AGENTE PERFECT\n",
/* 15*/ NULL,
};

View File

@ -1,20 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedor del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\n|Objetivo Tres: - Derrotar a Trent Easton\n\nDerrota a la simulación de un habilidoso agente del gobierno. El Simulante es un oponente especialmente capacitado; si pasas esta prueba, podrás estar orgullosa de tu logro.\n\nFIN\n",
/* 1*/ "EDIFICIO LUCERNE\n",
/* 2*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedor del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\nFIN\n",
/* 3*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\nFIN\n",
/* 4*/ "Derrotar al guardián de dataDyne\n",
/* 5*/ "Derrotar a Jonathan Dark\n",
/* 6*/ "Derrotar a Trent Easton\n",
/* 7*/ "EL DUELO\n",
/* 8*/ "Derrota a tu oponente.\n",
/* 9*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n",
/* 10*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n",
/* 11*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n",
/* 12*/ "Nivel del oponente: AGENTE\n",
/* 13*/ "Nivel del oponente: AGENTE ESPECIAL\n",
/* 14*/ "Nivel del oponente: AGENTE PERFECTO\n",
/* 15*/ NULL,
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/* 1*/ "CRASH SITE\n",
/* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/* 4*/ "\n",
/* 5*/ "Retrieve Presidential medical scanner\n",
/* 6*/ "Activate distress beacon\n",
/* 7*/ "Shut down enemy jamming device\n",
/* 8*/ "Retire Presidential clone\n",
/* 9*/ "Locate and rescue President\n",
/* 10*/ "There's the escape pod.\n",
/* 11*/ "Maybe there's a beacon in there.\n",
/* 12*/ "The jamming... It's coming from that ship.\n",
/* 13*/ "Elvis... He'll be able to protect the President.\n",
/* 14*/ "Distress beacon has been activated.\n",
/* 15*/ "Critical mission object has been destroyed.\n",
/* 16*/ "Obtain Presidential Scanner.\n",
/* 17*/ "\n",
/* 18*/ "\n",
/* 19*/ "A Presidential Scanner\n",
/* 20*/ "Picked up a Presidential Scanner.\n",
/* 21*/ "Jamming device has been shut down.\n",
/* 22*/ "President has been killed.\n",
/* 23*/ "Presidential clone has been eliminated.\n",
/* 24*/ "You'll never save him now!\n",
/* 25*/ "President has been rescued.\n",
/* 26*/ "Obtain Night Vision.\n",
/* 27*/ "Cassandra De Vries'\n",
/* 28*/ "Night Vision\n",
/* 29*/ "Night Vision\n",
/* 30*/ "Picked up Night Vision.\n",
/* 31*/ "Take this; you should find it useful!\n",
/* 32*/ "Ahhh... uuhhhh...\n",
/* 33*/ "Ahhh... uhh... owww...\n",
/* 34*/ "Agent Dark! Please report!\n",
/* 35*/ "Perfect Dark, come in!\n",
/* 36*/ "A-agent Dark reporting in...\n",
/* 37*/ "Agent Dark! Please reply!\n",
/* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n",
/* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n",
/* 40*/ "How are you feeling, Mr. President?\n",
/* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n",
/* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n",
/* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n",
/* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n",
/* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n",
/* 46*/ "Just try it, you Scandinavian freak!\n",
/* 47*/ "Noooooooo!!!\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|€€竄п<EFBD82>\n\n€€<EFBFBD>劇ワ<EFBFBD><EFBFBD><EFBFBD>α<EFBFBD>β€÷刀ヒ<EFBFBD>γぼδ∵€€<EFBFBD>€<EFBFBD>ε♭ζη<EFBFBD>€ツθικ<EFBFBD>ぼぶ<EFBFBD>∝∩<EFBFBD>⇔⊇∃⊇€<EFBFBD>€≠アごλμ∵<EFBFBD><EFBFBD><EFBFBD>≒√⇔⊇≫€≠艪<EFBFBD>メおν∵ξぺοリ∈なに♭<EFBFBD>∃⊇♭⊇≫<EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n€€€€ヘンπ♭ゆ<EFBFBD>ρΖσ<EFBFBD>€<EFBFBD>ぶτ∃€窶ヨ€€<EFBFBD>€€<EFBFBD>€€<EFBFBD><EFBFBD>ツÅ€ツぉ∵こごλμ<EFBFBD>Ζυ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∵♭<EFBFBD>√†€≠艪<EFBFBD>οリ∈せど<EFBFBD>€<EFBFBD>∈え≫<EFBFBD>∀∵♭<EFBFBD>€<EFBFBD><EFBFBD>€ικ∈なに<EFBFBD>€<EFBFBD>φュ∈せぜ<EFBFBD><EFBFBD>∀∵€浮メく⌒χャ∃しじÅ€\n\n|しじ€操セθικ€<CEBA>蛟゚∈ぴψ<E381B4>\n\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>θικ<EFBFBD>ω<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>€<EFBFBD>€テ√♭ぽ<EFBFBD>ω<EFBFBD><EFBFBD><EFBFBD>€烙ネ€€<EFBFBD><EFBFBD>∀∵♭<EFBFBD>€ツθικ<EFBFBD>φュ∈せど<EFBFBD><EFBFBD>ョャÅ€\n\n|しじ€逐セ€€€Ζ<EFBDAC>∈なΖ<E381AA>\n\n<EFBFBD>ν∵ぼて<EFBFBD><EFBFBD>⊇≡⊂<EFBFBD>€≠桙氈楳ハ♀∈<EFBFBD><EFBFBD><EFBFBD>€€€Ζ<EFBFBD>∈なΖ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツこごλμ∈<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵∃⊇∩⌒<EFBFBD>√∃⊇∵€\n\n|しじ€凍セこごλμ<CEBB>Ζυ∈ばぱ<E381B0>\n\n<EFBFBD><EFBFBD>い∃なΖ∩≒€<EFBFBD>€€<EFBFBD><EFBFBD>を≪<EFBFBD>√∃⊇<EFBFBD><EFBFBD>こごλμ∵<EFBFBD>√ぁ⇔⊇≫€<EFBFBD>ε<EFBFBD>⊇≫ゆ<EFBFBD>γ≡≪⌒€<EFBFBD><EFBFBD>⊇≫ぉ<EFBFBD>ぶ∵<EFBFBD><EFBFBD><EFBFBD>Ζυ∈⇒<EFBFBD>∀⊥≫<EFBFBD>∀∵♭<EFBFBD>≫♭⊆∽⊂€ツなに<EFBFBD><EFBFBD>€蛛ハ<EFBFBD><EFBFBD>Ζυ∈ばぱ<EFBFBD><EFBFBD>€<EFBFBD>√♭ゆ<EFBFBD>ν∵ぉ<EFBFBD><EFBFBD><EFBFBD>∈⇒<EFBFBD>∀⊥€<EFBFBD><EFBFBD>ユ∩⊃≫<EFBFBD><EFBFBD>€\n\n|しじ€楳セθικ<CEB9>€€оマ∈ほ<E28888>\n\nθικ€<EFBFBD>蛟゚<EFBFBD><EFBFBD>€秩ヒ<EFBFBD>Κ<EFBFBD><EFBFBD><EFBFBD>∵せど♭<EFBFBD>€ツ⇒<EFBFBD>€ικ<EFBFBD>€€оマ∵∧<EFBFBD><EFBFBD><EFBFBD>⊇≫∀⊇⊂<EFBFBD><EFBFBD>∃≫€€蛟ン€<EFBFBD>閨クにば<EFBFBD>⇔ほ<EFBFBD><EFBFBD>€\n\n|しじ€斧セθικ∈なに<E381AA>ν<E3818A>\n\n<EFBFBD><EFBFBD>く⌒<EFBFBD>⊇£€<EFBFBD>€€<EFBFBD>窶ニ<EFBFBD>しじÅ€ツθικ<EFBFBD>φュ<EFBFBD>€≠ェ≡≪⌒ぐけ<EFBFBD>√≫€ツぉ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>≫∩€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭θικ∈€<EFBFBD>п梶ナ∃<EFBFBD><EFBFBD>∃≒∃⊇€\n\nEND\n",
/* 1*/ "ξぺοリ\n",
/* 2*/ "|€€竄п<EFBD82>\n\n€€<EFBFBD>劇ワ<EFBFBD><EFBFBD><EFBFBD>α<EFBFBD>β€÷刀ヒ<EFBFBD>γぼδ∵€€<EFBFBD>€<EFBFBD>ε♭ζη<EFBFBD>€ツθικ<EFBFBD>ぼぶ<EFBFBD>∝∩<EFBFBD>⇔⊇∃⊇€<EFBFBD>€≠アごλμ∵<EFBFBD><EFBFBD><EFBFBD>≒√⇔⊇≫€≠艪<EFBFBD>メおν∵ξぺοリ∈なに♭<EFBFBD>∃⊇♭⊇≫<EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n€€€€ヘンπ♭ゆ<EFBFBD>ρΖσ<EFBFBD>€<EFBFBD>ぶτ∃€窶ヨ€€<EFBFBD>€€<EFBFBD>€€<EFBFBD><EFBFBD>ツÅ€ツぉ∵こごλμ<EFBFBD>Ζυ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∵♭<EFBFBD>√†€≠艪<EFBFBD>οリ∈せど<EFBFBD>€<EFBFBD>∈え≫<EFBFBD>∀∵♭<EFBFBD>€<EFBFBD><EFBFBD>€ικ∈なに<EFBFBD>€<EFBFBD>φュ∈せぜ<EFBFBD><EFBFBD>∀∵€浮メく⌒χャ∃しじÅ€\n\n|しじ€操セθικ€<CEBA>蛟゚∈ぴψ<E381B4>\n\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>θικ<EFBFBD>ω<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>€<EFBFBD>€テ√♭ぽ<EFBFBD>ω<EFBFBD><EFBFBD><EFBFBD>€烙ネ€€<EFBFBD><EFBFBD>∀∵♭<EFBFBD>€ツθικ<EFBFBD>φュ∈せど<EFBFBD><EFBFBD>ョャÅ€\n\n|しじ€逐セ€€€Ζ<EFBDAC>∈なΖ<E381AA>\n\n<EFBFBD>ν∵ぼて<EFBFBD><EFBFBD>⊇≡⊂<EFBFBD>€≠桙氈楳ハ♀∈<EFBFBD><EFBFBD><EFBFBD>€€€Ζ<EFBFBD>∈なΖ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツこごλμ∈<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵∃⊇∩⌒<EFBFBD>√∃⊇∵€\n\n|しじ€凍セθικ<CEB9>€€оマ∈ほ<E28888>\n\nθικ€<EFBFBD>蛟゚<EFBFBD><EFBFBD>€秩ヒ<EFBFBD>Κ<EFBFBD><EFBFBD><EFBFBD>∵せど♭<EFBFBD>€ツ⇒<EFBFBD>€ικ<EFBFBD>€€оマ∵∧<EFBFBD><EFBFBD><EFBFBD>⊇≫∀⊇⊂<EFBFBD><EFBFBD>∃≫€€蛟ン€<EFBFBD>閨クにば<EFBFBD>⇔ほ<EFBFBD><EFBFBD>€\n\n|しじ€楳セθικ∈なに<E381AA>ν<E3818A>\n\n<EFBFBD><EFBFBD>く⌒<EFBFBD>⊇£€<EFBFBD>€€<EFBFBD>窶ニ<EFBFBD>しじÅ€ツθικ<EFBFBD>φュ<EFBFBD>€≠ェ≡≪⌒ぐけ<EFBFBD>√≫€ツぉ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>≫∩€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭θικ∈€<EFBFBD>п梶ナ∃<EFBFBD><EFBFBD>∃≒∃⊇€\n\nEND\n",
/* 3*/ "|€€竄п<EFBD82>\n\n€€<EFBFBD>劇ワ<EFBFBD><EFBFBD><EFBFBD>α<EFBFBD>β€÷刀ヒ<EFBFBD>γぼδ∵€€<EFBFBD>€<EFBFBD>ε♭ζη<EFBFBD>€ツθικ<EFBFBD>ぼぶ<EFBFBD>∝∩<EFBFBD>⇔⊇∃⊇€<EFBFBD>€≠アごλμ∵<EFBFBD><EFBFBD><EFBFBD>≒√⇔⊇≫€≠艪<EFBFBD>メおν∵ξぺοリ∈なに♭<EFBFBD>∃⊇♭⊇≫<EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n€€€€ヘンπ♭ゆ<EFBFBD>ρΖσ<EFBFBD>€<EFBFBD>ぶτ∃€窶ヨ€€<EFBFBD>€€<EFBFBD>€€<EFBFBD><EFBFBD>ツÅ€ツぉ∵こごλμ<EFBFBD>Ζυ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∵♭<EFBFBD>√†€≠艪<EFBFBD>οリ∈せど<EFBFBD>€<EFBFBD>∈え≫<EFBFBD>∀∵♭<EFBFBD>€<EFBFBD><EFBFBD>€ικ∈なに<EFBFBD>€<EFBFBD>φュ∈せぜ<EFBFBD><EFBFBD>∀∵€浮メく⌒χャ∃しじÅ€\n\n|しじ€操セ€€€Ζ<EFBDAC>∈なΖ<E381AA>\n\n<EFBFBD>ν∵ぼて<EFBFBD><EFBFBD>⊇≡⊂<EFBFBD>€≠桙氈楳ハ♀∈<EFBFBD><EFBFBD><EFBFBD>€€€Ζ<EFBFBD>∈なΖ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツこごλμ∈<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵∃⊇∩⌒<EFBFBD>√∃⊇∵€\n\n|しじ€逐セθικ<CEB9>€€оマ∈ほ<E28888>\n\nθικ€<EFBFBD>蛟゚<EFBFBD><EFBFBD>€秩ヒ<EFBFBD>Κ<EFBFBD><EFBFBD><EFBFBD>∵せど♭<EFBFBD>€ツ⇒<EFBFBD>€ικ<EFBFBD>€€оマ∵∧<EFBFBD><EFBFBD><EFBFBD>⊇≫∀⊇⊂<EFBFBD><EFBFBD>∃≫€€蛟ン€<EFBFBD>閨クにば<EFBFBD>⇔ほ<EFBFBD><EFBFBD>€\n\n|しじ€凍セθικ∈なに<E381AA>ν<E3818A>\n\n<EFBFBD><EFBFBD>く⌒<EFBFBD>⊇£€<EFBFBD>€€<EFBFBD>窶ニ<EFBFBD>しじÅ€ツθικ<EFBFBD>φュ<EFBFBD>€≠ェ≡≪⌒ぐけ<EFBFBD>√≫€ツぉ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>≫∩€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭θικ∈€<EFBFBD>п梶ナ∃<EFBFBD><EFBFBD>∃≒∃⊇€\n\nEND\n",
/* 4*/ "\n",
/* 5*/ "θικ€<EFBFBD>蛟゚∈ぴψ<EFBFBD>\n",
/* 6*/ "€€€Ζ<EFBFBD>∈なΖ<EFBFBD>\n",
/* 7*/ "こごλμ<EFBFBD>Ζυ∈ばぱ<EFBFBD>\n",
/* 8*/ "θικ<EFBFBD>€€оマ∈ほ<EFBFBD>\n",
/* 9*/ "θικ∈なに<EFBFBD>ν<EFBFBD>\n",
/* 10*/ "⊆√<EFBFBD><EFBFBD>€ハ♀Å∝€\n",
/* 11*/ "€€€Ζ<EFBFBD><EFBFBD>Ζ<EFBFBD>⊆≫<EFBFBD><EFBFBD>Å∝€\n",
/* 12*/ "こごλμ<EFBFBD>€死潤コ<EFBFBD><EFBFBD>∩≒ぁ⇔⊇≫<EFBFBD><EFBFBD>€\n",
/* 13*/ "€€<EFBFBD>劇ワ€死盾ロ∵θικ<EFBFBD><EFBFBD>ほ∈に⇔<EFBFBD>√≫∝<EFBFBD>€\n",
/* 14*/ "€€€Ζ<EFBFBD><EFBFBD>Ζ<EFBFBD><EFBFBD>\n",
/* 15*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 16*/ "Obtain Presidential Scanner.\n",
/* 17*/ "\n",
/* 18*/ "\n",
/* 19*/ "θικ€<EFBFBD>蛟゚\n",
/* 20*/ "θικ€<EFBFBD>蛟゚∈み<EFBFBD><EFBFBD>\n",
/* 21*/ "こごλμ<EFBFBD>Ζυ∵ばぱ<EFBFBD>\n",
/* 22*/ "θικ∵ほ<EFBFBD>\n",
/* 23*/ "θικ<EFBFBD>€€оマ∵ほ√\n",
/* 24*/ "€ミ°€<EFBFBD>ικ€\n",
/* 25*/ "θικ∵おぁ<EFBFBD>\n",
/* 26*/ "Obtain Night Vision.\n",
/* 27*/ "Cassandra De Vries'\n",
/* 28*/ "€艢ム€縲ミ€ム\n",
/* 29*/ "€艢ム€縲ミ€ム\n",
/* 30*/ "€艢ム€縲ミ€ム∈み<EFBFBD><EFBFBD>\n",
/* 31*/ "<EFBFBD>√∈ぷ<EFBFBD>⇔⊇<EFBFBD>∀⊇⊇€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⇒≡€\n",
/* 32*/ "€€€€蚕n",
/* 33*/ "€€€€÷メ€€€蚕n",
/* 34*/ "€€€€<EFBFBD><EFBFBD>о€<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 35*/ "<EFBFBD><EFBFBD>⊃≫∩€÷モ€€€<EFBFBD><EFBFBD>о€\n",
/* 36*/ "<EFBFBD>¬≒€€€€<EFBFBD><EFBFBD>о€蚕n",
/* 37*/ "€€€€<EFBFBD><EFBFBD>о€<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 38*/ "ρΖ∵こご<EFBFBD>√⇔⊇≫<EFBFBD>€蚕nぞ<EFBFBD><EFBFBD>が∩⊆≫<EFBFBD><EFBFBD>€\n",
/* 39*/ "€€<EFBFBD>劇ワ<EFBFBD><EFBFBD>п∩<EFBFBD>€蚕n∧⊂∧⊂€ικ∈о<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 40*/ "рс<EFBFBD>♪⊂€€純ニικ€\n",
/* 41*/ "∩∃≪€蕫ロ<EFBFBD><EFBFBD>€\n<EFBFBD><EFBFBD>€<EFBFBD>€縺ロ€蚕np€<EFBFBD>瘁諢<EFBFBD><EFBFBD><EFBFBD>コ≫<EFBFBD><EFBFBD>\n<EFBFBD>∩≒Ψ♯⊇⇔⊇€<EFBFBD><EFBFBD>♭∀<EFBFBD>€蚕n",
/* 42*/ "€<EFBFBD>€縺ノ¬∵ョげ<EFBFBD><EFBFBD>⇔⊇≫\n€〟凍<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>が∃<EFBFBD>€\n",
/* 43*/ "Ω<EFBFBD><EFBFBD>чшощъÅ€\npくчш♭ыь<EFBFBD>э∵ぼ⊃≫\nюя<EFBFBD><EFBFBD><EFBFBD>€\np⊇<EFBFBD>€<EFBFBD>瘁焉モが∵<EFBFBD>τ∃∋Å€\n",
/* 44*/ "€<EFBFBD>€縺ク€、⊇⇒⊥∃<EFBFBD><EFBFBD>€\n♭⌒€<EFBFBD><EFBFBD>⊇≫<EFBFBD><EFBFBD>€蚕n",
/* 45*/ "€<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n<EFBFBD><EFBFBD>≡⊂∃€<EFBFBD>瘁マ€<EFBFBD>∂ヨ<EFBFBD><EFBFBD>€\n",
/* 46*/ "<EFBFBD><EFBFBD>∂∵√€<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>о\n",
/* 47*/ "€ァ€ィ€エ€エ€エ€エ\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/* 1*/ "CRASH SITE\n",
/* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/* 4*/ "\n",
/* 5*/ "Retrieve Presidential medical scanner\n",
/* 6*/ "Activate distress beacon\n",
/* 7*/ "Shut down enemy jamming device\n",
/* 8*/ "Retire Presidential clone\n",
/* 9*/ "Locate and rescue President\n",
/* 10*/ "There's the escape pod.\n",
/* 11*/ "Maybe there's a beacon in there.\n",
/* 12*/ "The jamming... It's coming from that ship.\n",
/* 13*/ "Elvis... He'll be able to protect the President.\n",
/* 14*/ "Distress beacon has been activated.\n",
/* 15*/ "Critical mission object has been destroyed.\n",
/* 16*/ "Obtain Presidential Scanner.\n",
/* 17*/ "\n",
/* 18*/ "\n",
/* 19*/ "A Presidential Scanner\n",
/* 20*/ "Picked up a Presidential Scanner.\n",
/* 21*/ "Jamming device has been shut down.\n",
/* 22*/ "President has been killed.\n",
/* 23*/ "Presidential clone has been eliminated.\n",
/* 24*/ "You'll never save him now!\n",
/* 25*/ "President has been rescued.\n",
/* 26*/ "Obtain Night Vision.\n",
/* 27*/ "Cassandra De Vries'\n",
/* 28*/ "Night Vision\n",
/* 29*/ "Night Vision\n",
/* 30*/ "Picked up Night Vision.\n",
/* 31*/ "Take this; you should find it useful!\n",
/* 32*/ "Ahhh... uuhhhh...\n",
/* 33*/ "Ahhh... uhh... owww...\n",
/* 34*/ "Agent Dark! Please report!\n",
/* 35*/ "Perfect Dark, come in!\n",
/* 36*/ "A-agent Dark reporting in...\n",
/* 37*/ "Agent Dark! Please reply!\n",
/* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n",
/* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n",
/* 40*/ "How are you feeling, Mr. President?\n",
/* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n",
/* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n",
/* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n",
/* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n",
/* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n",
/* 46*/ "Just try it, you Scandinavian freak!\n",
/* 47*/ "Noooooooo!!!\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez-le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Désactiver appareil brouillage\n\nUn système ennemi sophistiqué inonde le secteur d'un brouillage CME impénétrable. Vous pourrez déterminer sa position plus facilement au sol que nos appareils en altitude. Une fois trouvé, coupez le courant et nous vous fournirons de l'aide.\n\n|Objectif 4: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 5: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n",
/* 1*/ "SITE du CRASH\n",
/* 2*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez-le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 4: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n",
/* 3*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 2: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 3: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n",
/* 4*/ "\n",
/* 5*/ "Récupérer scanner médical présidentiel\n",
/* 6*/ "Activer le signal de détresse\n",
/* 7*/ "Désactiver appareil brouillage\n",
/* 8*/ "Eliminer le clone du Président\n",
/* 9*/ "Trouver et sauver le Président\n",
/* 10*/ "Voilà le point d'évacuation. \n",
/* 11*/ "Le signal peut venir de là. \n",
/* 12*/ "Le brouillage... Il vient de ce vaisseau. \n",
/* 13*/ "Elvis... Il pourra protéger le Président.\n",
/* 14*/ "Signal de détresse activé.\n",
/* 15*/ "Objet crucial détruit.\n",
/* 16*/ "Obtenir le scanner présidentiel.\n",
/* 17*/ "\n",
/* 18*/ "\n",
/* 19*/ "Un Scanner présidentiel\n",
/* 20*/ "Scanner présidentiel obtenu.\n",
/* 21*/ "Appareil de brouillage désactivé.\n",
/* 22*/ "Le Président a été abattu.\n",
/* 23*/ "Clone présidentiel éliminé.\n",
/* 24*/ "Vous ne pourrez pas le sauver!\n",
/* 25*/ "Président sauvé.\n",
/* 26*/ "Obtenir Vue nocturne.\n",
/* 27*/ "Cassandra De Vries: \n",
/* 28*/ "Vue nocturne\n",
/* 29*/ "Vue nocturne\n",
/* 30*/ "Vue nocturne obtenue.\n",
/* 31*/ "Prends ceci. Cela te sera utile!\n",
/* 32*/ "Ahhh... oohhhh...\n",
/* 33*/ "Ahhh... ohh... ouuuuhhh...\n",
/* 34*/ "Agent Dark! Quel est votre statut?\n",
/* 35*/ "Perfect Dark, répondez!\n",
/* 36*/ "A-agent Dark au rapport...\n",
/* 37*/ "Agent Dark! Parlez bon sang!\n",
/* 38*/ "Quelque chose brouille mes transmissions... Cela vient peut-être de l'autre appareil.\n",
/* 39*/ "Je ferais mieux de trouver la source du brouillage et m'assurer qu'Elvis est en bonne santé. Sans oublier le Président...\n",
/* 40*/ "Comment vous sentez-vous, M. le Président?\n",
/* 41*/ "Mieux. Merci mon petit. Je me souviendrai de cette journée. Comment Easton a-t-il pu faire une chose pareille? Je le savais ambitieux, mais tout ceci...\n",
/* 42*/ "Une question, monsieur. Qu'est-ce que le Pelagic II, cette chose que Trent cherchait?\n",
/* 43*/ "Un vaisseau de recherche sous-marin du gouvernement américain. Un modèle unique pouvant mener des expériences à de grandes profondeurs. Trent a formulé une demande de prêt au nom de la dataDyne Corporation. J'ai refusé.\n",
/* 44*/ "Trent devra répondre de ses actes. Encore faut-il le trouver.\n",
/* 45*/ "Vous avez échoué, Easton. Vous êtes un élément corrompu. Nous nous passerons de vous.\n",
/* 46*/ "C'est ça oui. Pétasse suédoise, va!\n",
/* 47*/ "Noooooooon!!!\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Deaktivieren Sie den ECM-Generator!\n\nEin High-Tech ECM-Generator sichert das Gebiet durch ein schier undurchdringliches ECM-Feld. Von Ihrem Standort aus sind Sie vermutlich eher in der Lage, die Quelle des Dämpfungs-Signals ausfindig zu machen, als unsere Luft-Aufklärer. Schalten Sie den Generator ab, sobald Sie ihn gefunden haben. Erst dann können wir Sie orten und Ihnen zu Hilfe kommen.\n\n|4. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|5. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n",
/* 1*/ "ABSTURZSTELLE\n",
/* 2*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|4. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n",
/* 3*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|2. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|3. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n",
/* 4*/ "\n",
/* 5*/ "Finden Sie den medizinischen Scanner!\n",
/* 6*/ "Aktivieren Sie das Notsignal!\n",
/* 7*/ "Deaktivieren Sie den Generator!\n",
/* 8*/ "Eliminieren Sie den Präsidenten-Klon!\n",
/* 9*/ "Orten und retten Sie den Präsidenten!\n",
/* 10*/ "Ich habe die Rettungskapsel gefunden.\n",
/* 11*/ "Vielleicht kann ich dort das Notsignal aktivieren.\n",
/* 12*/ "Das Dämpfungsfeld... Es wird von diesem Schiff aus generiert.\n",
/* 13*/ "Elvis... Er ist sicher in der Lage, den Präsidenten zu beschützen.\n",
/* 14*/ "Notsignal wurde aktiviert.\n",
/* 15*/ "Wichtiges Objekt zerstört\n",
/* 16*/ "Finden Sie den medizinischen Scanner!\n",
/* 17*/ "\n",
/* 18*/ "\n",
/* 19*/ "Ein medizinischer Scanner\n",
/* 20*/ "Medizinischer Scanner aufgenommen\n",
/* 21*/ "ECM-Generator deaktiviert\n",
/* 22*/ ".\n",
/* 23*/ "Präsidenten-Klon wurde eliminiert.\n",
/* 24*/ "Du kannst ihn nicht retten!\n",
/* 25*/ "Der Präsident wurde gerettet.\n",
/* 26*/ "Erlangen Sie das Nachtsichtgerät!\n",
/* 27*/ "Cassandra De Vries\n",
/* 28*/ "Nachtsichtgerät\n",
/* 29*/ "Nachtsichtgerät\n",
/* 30*/ "Nachtsichtgerät aufgenommen\n",
/* 31*/ "Nimm das; es wird sich als nützlich erweisen!\n",
/* 32*/ "Ahhh... uuhhhh...\n",
/* 33*/ "Ahhh... uhh... ouuu...\n",
/* 34*/ "Agent Dark! Bitte melden Sie sich!\n",
/* 35*/ "Perfect Dark, kommen!\n",
/* 36*/ "A-Agent Dark hier...\n",
/* 37*/ "Agent Dark! Bitte antworten Sie!\n",
/* 38*/ "Diese Frequenz wird gestört... Das Signal kommt von dort drüben.\n",
/* 39*/ "Ich muss diesen Generator finden und sicherstellen, dass es Elvis gut geht. ...und nebenbei soll ich noch den Präsidenten retten.\n",
/* 40*/ "Wie fühlen Sie sich, Mr. President?\n",
/* 41*/ "Gerade eben ein wenig besser. Aber ich werde wohl einige Zeit brauchen, um den heutigen Tag zu vergessen. Ich kann nicht glauben, dass Easton in der Lage ist, so etwas zu tun. Ich wusste, dass er ehrgeizig ist, aber dass er zu so etwas in der Lage ist...\n",
/* 42*/ "Eine Frage, Sir. Worum handelt es sich bei der Pelagic II? Trent schien dahinter her gewesen zu sein.\n",
/* 43*/ "Die Pelagic II ist ein Forschungs-U-Boot der US-Regierung. Dieses Schiff ist ein Prototyp, der in der Lage ist, in extreme Tiefen vorzudringen. Trent wollte, dass ich es als Leihgabe an datyDyne vergebe. Aber ich habe diesem Antrag nicht zugestimmt.\n",
/* 44*/ "Trent ist uns wohl mehr als nur eine Antwort schuldig, aber ich glaube nicht, dass wir ihn jetzt finden.\n",
/* 45*/ "Sie haben versagt, Easton. Sie stellen eine potentielle Fehlerquelle dar, daher sind Sie nicht länger von Nutzen.\n",
/* 46*/ "Versuch's nur, du skandinavischer Freak!\n",
/* 47*/ "Neiiiiiiiin!!!\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Disattiva dispositivo di disturbo nemico\n\nUn sofisticato dispositivo per la generazione di segnali di disturbo rende l'area impenetrabile per mezzo di una fitta rete di onde ECM. Sorvolando la zona ad alta quota non riusciamo ad identificare la fonte, ma dalla tua posizione a terra dovrebbe essere più facile localizzarla e disattivarla. Fatto ciò potremo accertare le tue coordinate e mandarti dei rinforzi. \n\n|Obiettivo 4 - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 5: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n",
/* 1*/ "LUOGO DEL DISASTRO\n",
/* 2*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 4: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n",
/* 3*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 2: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 3: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n",
/* 4*/ "\n",
/* 5*/ "Recupera scanner medico del Presidente\n",
/* 6*/ "Attiva il segnale di pericolo\n",
/* 7*/ "Disattiva il dispositivo di disturbo\n",
/* 8*/ "Trova ed elimina il clone del Presidente\n",
/* 9*/ "Trova e salva il Presidente\n",
/* 10*/ "Ecco la capsula di salvataggio!\n",
/* 11*/ "Forse si può mandare un segnale da lì!\n",
/* 12*/ "Queste onde... Vengono da quella navicella!\n",
/* 13*/ "Elvis... Può proteggere lui il Presidente.\n",
/* 14*/ "Inviato segnale di pericolo.\n",
/* 15*/ "Distrutto strumento essenziale alla missione.\n",
/* 16*/ "Procurati scanner del Presidente.\n",
/* 17*/ "\n",
/* 18*/ "\n",
/* 19*/ "Scanner del Presidente!\n",
/* 20*/ "Preso scanner del Presidente.\n",
/* 21*/ "Disattivato dispositivo per onde di disturbo.\n",
/* 22*/ "Il Presidente è stato ucciso.\n",
/* 23*/ "Il clone del Presidente è stato eliminato.\n",
/* 24*/ "Non riuscirai mai a salvarlo!\n",
/* 25*/ "Il Presidente è stato salvato.\n",
/* 26*/ "Procurati Vista Notturna!\n",
/* 27*/ "Cassandra De Vries:\n",
/* 28*/ "Vista Notturna\n",
/* 29*/ "Vista Notturna\n",
/* 30*/ "Presa Vista Notturna.\n",
/* 31*/ "Ecco, tieni: ti sarà utile!\n",
/* 32*/ "Aaah... uuuh...\n",
/* 33*/ "Aaah... uuuh... oooh...\n",
/* 34*/ "Agente Dark! A rapporto!\n",
/* 35*/ "Perfect Dark, rispondi!\n",
/* 36*/ "Agente Dark a rapporto, signore!\n",
/* 37*/ "Agente Dark! Rispondi!\n",
/* 38*/ "C'è qualcosa che disturba la comunicazione... Magari proviene da quella navicella!\n",
/* 39*/ "Meglio trovare subito il dispositivo di disturbo e controllare che Elvis stia bene. Non devo scordarmi del Presidente!!!\n",
/* 40*/ "Come sta, Sig. Presidente?\n",
/* 41*/ "Molto meglio, grazie. Penso che mi ci vorrà un po' per superare questo colpo. Non posso credere che Easton abbia potuto fare una cosa simile. Sapevo sì che era ambizioso, ma fino a questo punto...\n",
/* 42*/ "Solo una cosa, signore? Cos'è il Pelagic II che Trent voleva ad ogni costo?\n",
/* 43*/ "È un sottomarino di ricerca del governo statunitense, tipo... l'unico sommergibile che possa condurre una completa operazione di immersione nelle profondità oceaniche. Trent voleva che lo prestassi alla dataDyne Corporation, ma io ho rifiutato.\n",
/* 44*/ "Trent deve render conto di molte cose, ma non penso che lo troveremo tanto presto!\n",
/* 45*/ "Hai fallito, Easton! Ormai sei totalmente inutile! Non ci servi più!\n",
/* 46*/ "Provaci, pazzo scandinavo!\n",
/* 47*/ "Noooooooo!!!\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Desconectar Dispositivo de Bloqueo Enemigo\n\nUn sofisticado dispositivo de bloqueo está inundando el área con una cobertura de impenetrable ECM. Tienes que ser capaz de rastrear la fuente de tierra más efectivamente de lo que nuestros aviones espía están haciendo. Una vez localizada, apaga la fuente para que podamos fijar tu posición y enviemos ayuda.\n\n|Objetivo Cuatro: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cinco: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n",
/* 1*/ "LUGAR DEL IMPACTO\n",
/* 2*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cuatro: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n",
/* 3*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Dos: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Tres: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n",
/* 4*/ "\n",
/* 5*/ "Recuperar escáner médico del Presidente\n",
/* 6*/ "Activar la señal de socorro\n",
/* 7*/ "Apagar la señal de bloqueo enemiga\n",
/* 8*/ "Eliminar al clon del Presidente\n",
/* 9*/ "Localizar y rescatar al Presidente\n",
/* 10*/ "Ahí está la cápsula de escape.\n",
/* 11*/ "Quizá haya un emisor dentro.\n",
/* 12*/ "El bloqueo... Proviene de esa nave.\n",
/* 13*/ "Elvis... Él será capaz de proteger al Presidente.\n",
/* 14*/ "Señal de socorro activada.\n",
/* 15*/ "Objeto crítico de la misión destruido.\n",
/* 16*/ "Obtén el Escáner del Presidente.\n",
/* 17*/ "\n",
/* 18*/ "\n",
/* 19*/ "Un Escáner Presidencial\n",
/* 20*/ "Escáner Presidencial obtenido.\n",
/* 21*/ "Dispositivo de bloqueo apagado.\n",
/* 22*/ "El Presidente ha muerto.\n",
/* 23*/ "El clon del Presidente ha sido eliminado.\n",
/* 24*/ "¡Ahora ya no podrás salvarle!\n",
/* 25*/ "El Presidente ha sido rescatado.\n",
/* 26*/ "Obtén Visión Nocturna.\n",
/* 27*/ "Cassandra De Vries:\n",
/* 28*/ "V. Nocturna\n",
/* 29*/ "Visión Nocturna\n",
/* 30*/ "Visón Nocturna obtenida.\n",
/* 31*/ "Toma esto, ¡lo encontrarás muy útil!\n",
/* 32*/ "Ahhh... uuhhhh...\n",
/* 33*/ "Ahhh... uhh... owww...\n",
/* 34*/ "¡Agente Dark! ¡Informe, por favor!\n",
/* 35*/ "¡Perfect Dark, responda!\n",
/* 36*/ "A-agente Dark informando...\n",
/* 37*/ "¡Agente Dark! ¡Por favor, responda!\n",
/* 38*/ "Algo está bloqueando mis transmisiones... Proviene de esa otra nave.\n",
/* 39*/ "Mejor encontrar el dispositivo de bloqueo y comprobar si Elvis está bien. No olvidando al Presidente, por supuesto.\n",
/* 40*/ "¿Cómo se siente, Sr. Presidente?\n",
/* 41*/ "Ahora mejor, jovencita. Pero creo que me va a llevar un rato recuperarme. No puedo creer que Easton hiciera algo así. Sabía que era ambicioso, sí, pero esto...\n",
/* 42*/ "Sólo una cosa, señor. ¿Qué es el Pelagic II que tanto ansiaba Trent?\n",
/* 43*/ "Es un navío de investigación de profundidad del gobierno norteamericano, único en su clase... El único barco capaz de dirigir una operación a gran escala a profundidad extrema. Trent quería que se lo prestara a la Corporación dataDyne, pero rehusé.\n",
/* 44*/ "Trent tiene bastante que contestar, pero no creo que le encontremos ahora.\n",
/* 45*/ "Has fallado, Easton. Eres un dispositivo defectuoso, y ya no te necesitamos.\n",
/* 46*/ "¡Inténtalo, mamarracho escandinavo!\n",
/* 47*/ "¡¡¡Noooooooo!!!\n",
};

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,72 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n",
/* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/* 4*/ "\n",
/* 5*/ "Obtain disguise and enter base\n",
/* 6*/ "Check in equipment\n",
/* 7*/ "Subvert security monitoring system\n",
/* 8*/ "Obtain flight plans from safe\n",
/* 9*/ "Board Air Force One\n",
/* 10*/ "Obtain suitcase.\n",
/* 11*/ "\n",
/* 12*/ "Suitcase\n",
/* 13*/ "Suitcase\n",
/* 14*/ "Picked up a suitcase.\n",
/* 15*/ "Obtain air stewardess uniform.\n",
/* 16*/ "\n",
/* 17*/ "Disguise\n",
/* 18*/ "Disguise\n",
/* 19*/ "Picked up a stewardess uniform.\n",
/* 20*/ "Obtain flight plans from safe.\n",
/* 21*/ "\n",
/* 22*/ "Flight Plans\n",
/* 23*/ "Flight Plans\n",
/* 24*/ "Picked up the flight plans.\n",
/* 25*/ "Look out - it's an intruder...\n",
/* 26*/ "Innocent civilians have been killed.\n",
/* 27*/ "Is he OK?\n",
/* 28*/ "I'll go and get some help.\n",
/* 29*/ "Good afternoon.\n",
/* 30*/ "OK, you know the way from here.\n",
/* 31*/ "You'll have to check that weapon in here.\n",
/* 32*/ "Oh, my God!\n",
/* 33*/ "Weapons are not allowed in the base.\n",
/* 34*/ "Right, I'm calling security.\n",
/* 35*/ "System shutdown initiated...\n",
/* 36*/ "Security systems have been shut down.\n",
/* 37*/ "Weapons have been detected.\n",
/* 38*/ "Suitcase has been deposited.\n",
/* 39*/ "Suitcase has been scanned.\n",
/* 40*/ "Hey, you - this is a restricted area.\n",
/* 41*/ "Are you new around here?\n",
/* 42*/ "Hey - give me back my case.\n",
/* 43*/ "You get security - I'll deal with her...\n",
/* 44*/ "Upstairs...there's an intruder.\n",
/* 45*/ "Laser grid access denied.\n",
/* 46*/ "Laser grid system has been overloaded.\n",
/* 47*/ "Too many neutral casualties inflicted.\n",
/* 48*/ "Stop them from getting the safe...\n",
/* 49*/ "Disguise worn.\n",
/* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n",
/* 51*/ "Use that case to conceal your equipment.\n",
/* 52*/ "The case will get stopped unless you do something.\n",
/* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n",
/* 54*/ "Stop them - they're breaking into the safe...\n",
/* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n",
/* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n",
/* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n",
/* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n",
/* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n",
/* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n",
/* 61*/ "Lift inoperative - security system is active.\n",
/* 62*/ "Critical mission personnel disabled.\n",
/* 63*/ "Critical mission object destroyed.\n",
/* 64*/ "Entrance to base secured.\n",
/* 65*/ "We're taking over!!\n",
/* 66*/ "Hover trolley has been shut down.\n",
/* 67*/ "Equipment cannot be checked in.\n",
};

View File

@ -1,72 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|€€竄п<EFBD82>\n\n€€ユ÷<EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€揆桷氛<EFBFBD>┌┐<EFBFBD>€<EFBFBD>€<EFBFBD>€€縲マÅ€€<EFBFBD>瘁モθικ<EFBFBD>ш┘└<EFBFBD>├ヮ<EFBFBD><EFBFBD>€€<EFBFBD>€<EFBFBD>ε┬┤<EFBFBD>∀┴て<EFBFBD>⇔⊇≫€ツ⊆<EFBFBD><EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD>≡√†€÷<EFBFBD>瘁焉モ<EFBFBD><EFBFBD>∩≒θικ<EFBFBD><EFBFBD>あ┼∃て<EFBFBD>€€€縺ト<EFBFBD>≫⌒<EFBFBD>∀━∝√≫€ツ∧√∈┃┏<EFBFBD><EFBFBD>†∃≒∃⊇€\n\n|€€€<EFBE8B>€縲マ€\n\nヵぴ<EFBFBD><EFBFBD>Χ∵ョャÅ<EFBFBD>€<EFBFBD>€€€艢ツε┬┤<EFBFBD><EFBFBD>€÷縲<EFBFBD>€縺ノ¬<EFBFBD>у<EFBFBD><EFBFBD><EFBFBD><EFBFBD>┣⌒∃⊇┳⌒<EFBFBD><EFBFBD><EFBFBD>⊇⇔⊇≫€ツ⊆<EFBFBD><EFBFBD>♭⌒€<EFBFBD>€縺メ┫ぞ∀€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD>あΨ┻∃<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€浮メ<EFBFBD>╋τÅ€ツ♭<EFBFBD>≫Å<EFBFBD><EFBFBD>ぬは<EFBFBD>⇔⊇ぶ∵€ア┯<EFBFBD>ぃい<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≫Å∽⊂€\n\n|しじ€操セ€€烙フ€福п園ワ<E59C92>ぬは<E381AC>\n\n┨┷ぁな<EFBFBD>≫θικ┿ヨδ<EFBFBD>€€烙フ€福п園ワ∵€リ⌒∃<EFBFBD>€€<EFBFBD>♭∧¬≒<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツぽま<EFBFBD>°€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€<EFBFBD>諱コ≫<EFBFBD><EFBFBD>€ツぽま∀∧<EFBFBD>€<EFBFBD>п橿蕫マ<EFBFBD><EFBFBD><EFBFBD>⇔⌒≒⊇€÷<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>€ネ√♭ぬは<EFBFBD>⇔┤<EFBFBD><EFBFBD><EFBFBD>€ツぽま<EFBFBD>€<EFBFBD>€縺メу┗∀<EFBFBD><EFBFBD><EFBFBD>┣⌒∃⊇┳¬∃<EFBFBD>€チ√∬√⌒も♭べ<EFBFBD><EFBFBD>∃⊇≡⊂<EFBFBD>€\n\n|しじ€逐セはヮ┰∈┥<E28888>っ⊥\n\nの┸∃♪<EFBFBD><EFBFBD>⊇ぷ¬Σ♭ぉ<EFBFBD>ぬは∵にば≒√∃⊇≡⊂<EFBFBD>€≠ヘヮ┰∈∃≫<EFBFBD><EFBFBD><EFBFBD>き∩≒<EFBFBD>€≠ン<EFBFBD>Σ┥<EFBFBD><EFBFBD><EFBFBD>€€マ℃€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツ∀≪⊆⊃<EFBFBD>€≠ヘヮ┰∈ψ<EFBFBD><EFBFBD>€€ワ∈<EFBFBD><EFBFBD>ョャ∵⊆≫∃€\n\n|しじ€凍セみ<EFBDBE>Σ<EFBFBD>щ€€€<C280><EFBFBD>\n\nぬは<EFBFBD>≡≪┳<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∵♭<EFBFBD>≫Å∽⊂∵<EFBFBD>Σ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵ョャ∀∃≫€ツぉ<EFBFBD><EFBFBD><EFBFBD>はヮ┰∩≒の┸∃♪∵о<EFBFBD><EFBFBD>√√†€ニ∬<EFBFBD>€€<EFBFBD>о<EFBFBD>諱ホ≪€<EFBFBD>€兤ハ€<EFBFBD>√⇔<EFBFBD><EFBFBD>⊂♭⊆∽⊂€ツみ<EFBFBD>Σ<EFBFBD>щ€€€<EFBFBD>€€€€焉クなに<EFBFBD>€テ√∈€€麾氈マ<EFBFBD>€\n\n|しじ€楳セ€<EFBDBE><C280>€<C280><EFBFBD>マ∈<EFBE8F><EFBFBD>\n\nθικ┿ヨδ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵┤<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ぜる<EFBFBD>√⇔⊇≫€ツぉ∵<EFBFBD>√∈<EFBFBD><EFBFBD>√†€÷ム∀⊇⊂∀<EFBFBD><EFBFBD>€<EFBFBD>€゚∈⌒∀<EFBFBD>€€<EFBFBD>劇ワ∈∧¬≒<EFBFBD>ユ∩∝<EFBFBD><EFBFBD>∀∵♭<EFBFBD>€\n\n|しじ€斧セθικ┿ヨδ<E383A8><CEB4><EFBFBD>\n\nθικ┿ヨδ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€≠タ≪ム√∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€ツぬは<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭⊆√†€÷ロ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ぢ♭<EFBFBD><EFBFBD><EFBFBD>€ツ∧√∵≧€<EFBFBD>ホリ<EFBFBD><EFBFBD>€≠ェ∩<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⊃≫ョャ∵⊆≫Å∽⊂€\n\nEND\n",
/* 1*/ "θικ┿ヨδ€€<EFBFBD><EFBFBD>準ミ€<EFBFBD>€ユε┬┤€十n",
/* 2*/ "|€€竄п<EFBD82>\n\n€€ユ÷<EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€揆桷氛<EFBFBD>┌┐<EFBFBD>€<EFBFBD>€<EFBFBD>€€縲マÅ€€<EFBFBD>瘁モθικ<EFBFBD>ш┘└<EFBFBD>├ヮ<EFBFBD><EFBFBD>€€<EFBFBD>€<EFBFBD>ε┬┤<EFBFBD>∀┴て<EFBFBD>⇔⊇≫€ツ⊆<EFBFBD><EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD>≡√†€÷<EFBFBD>瘁焉モ<EFBFBD><EFBFBD>∩≒θικ<EFBFBD><EFBFBD>あ┼∃て<EFBFBD>€€€縺ト<EFBFBD>≫⌒<EFBFBD>∀━∝√≫€ツ∧√∈┃┏<EFBFBD><EFBFBD>†∃≒∃⊇€\n\n|€€€<EFBE8B>€縲マ€\n\nヵぴ<EFBFBD><EFBFBD>Χ∵ョャÅ<EFBFBD>€<EFBFBD>€€€艢ツε┬┤<EFBFBD><EFBFBD>€÷縲<EFBFBD>€縺ノ¬<EFBFBD>у<EFBFBD><EFBFBD><EFBFBD><EFBFBD>┣⌒∃⊇┳⌒<EFBFBD><EFBFBD><EFBFBD>⊇⇔⊇≫€ツ⊆<EFBFBD><EFBFBD>♭⌒€<EFBFBD>€縺メ┫ぞ∀€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD>あΨ┻∃<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€浮メ<EFBFBD>╋τÅ€ツ♭<EFBFBD>≫Å<EFBFBD><EFBFBD>ぬは<EFBFBD>⇔⊇ぶ∵€ア┯<EFBFBD>ぃい<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≫Å∽⊂€\n\n|しじ€操セ€€烙フ€福п園ワ<E59C92>ぬは<E381AC>\n\n┨┷ぁな<EFBFBD>≫θικ┿ヨδ<EFBFBD>€€烙フ€福п園ワ∵€リ⌒∃<EFBFBD>€€<EFBFBD>♭∧¬≒<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツぽま<EFBFBD>°€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€<EFBFBD>諱コ≫<EFBFBD><EFBFBD>€ツぽま∀∧<EFBFBD>€<EFBFBD>п橿蕫マ<EFBFBD><EFBFBD><EFBFBD>⇔⌒≒⊇€÷<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>€ネ√♭ぬは<EFBFBD>⇔┤<EFBFBD><EFBFBD><EFBFBD>€ツぽま<EFBFBD>€<EFBFBD>€縺メу┗∀<EFBFBD><EFBFBD><EFBFBD>┣⌒∃⊇┳¬∃<EFBFBD>€チ√∬√⌒も♭べ<EFBFBD><EFBFBD>∃⊇≡⊂<EFBFBD>€\n\n|しじ€逐セはヮ┰∈┥<E28888>っ⊥\n\nの┸∃♪<EFBFBD><EFBFBD>⊇ぷ¬Σ♭ぉ<EFBFBD>ぬは∵にば≒√∃⊇≡⊂<EFBFBD>€≠ヘヮ┰∈∃≫<EFBFBD><EFBFBD><EFBFBD>き∩≒<EFBFBD>€≠ン<EFBFBD>Σ┥<EFBFBD><EFBFBD><EFBFBD>€€マ℃€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツ∀≪⊆⊃<EFBFBD>€≠ヘヮ┰∈ψ<EFBFBD><EFBFBD>€€ワ∈<EFBFBD><EFBFBD>ョャ∵⊆≫∃€\n\n|しじ€凍セみ<EFBDBE>Σ<EFBFBD>щ€€€<C280><EFBFBD>\n\nぬは<EFBFBD>≡≪┳<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∵♭<EFBFBD>≫Å∽⊂∵<EFBFBD>Σ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵ョャ∀∃≫€ツぉ<EFBFBD><EFBFBD><EFBFBD>はヮ┰∩≒の┸∃♪∵о<EFBFBD><EFBFBD>√√†€ニ∬<EFBFBD>€€<EFBFBD>о<EFBFBD>諱ホ≪€<EFBFBD>€兤ハ€<EFBFBD>√⇔<EFBFBD><EFBFBD>⊂♭⊆∽⊂€ツみ<EFBFBD>Σ<EFBFBD>щ€€€<EFBFBD>€€€€焉クなに<EFBFBD>€テ√∈€€麾氈マ<EFBFBD>€\n\n|しじ€楳セθικ┿ヨδ<E383A8><CEB4><EFBFBD>\n\nθικ┿ヨδ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€≠タ≪ム√∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€ツぬは<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭⊆√†€÷ロ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ぢ♭<EFBFBD><EFBFBD><EFBFBD>€ツ∧√∵≧€<EFBFBD>ホリ<EFBFBD><EFBFBD>€≠ェ∩<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⊃≫ョャ∵⊆≫Å∽⊂€\n\nEND\n",
/* 3*/ "|€€竄п<EFBD82>\n\n€€ユ÷<EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€揆桷氛<EFBFBD>┌┐<EFBFBD>€<EFBFBD>€<EFBFBD>€€縲マÅ€€<EFBFBD>瘁モθικ<EFBFBD>ш┘└<EFBFBD>├ヮ<EFBFBD><EFBFBD>€€<EFBFBD>€<EFBFBD>ε┬┤<EFBFBD>∀┴て<EFBFBD>⇔⊇≫€ツ⊆<EFBFBD><EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD>≡√†€÷<EFBFBD>瘁焉モ<EFBFBD><EFBFBD>∩≒θικ<EFBFBD><EFBFBD>あ┼∃て<EFBFBD>€€€縺ト<EFBFBD>≫⌒<EFBFBD>∀━∝√≫€ツ∧√∈┃┏<EFBFBD><EFBFBD>†∃≒∃⊇€\n\n|€€€<EFBE8B>€縲マ€\n\nヵぴ<EFBFBD><EFBFBD>Χ∵ョャÅ<EFBFBD>€<EFBFBD>€€€艢ツε┬┤<EFBFBD><EFBFBD>€÷縲<EFBFBD>€縺ノ¬<EFBFBD>у<EFBFBD><EFBFBD><EFBFBD><EFBFBD>┣⌒∃⊇┳⌒<EFBFBD><EFBFBD><EFBFBD>⊇⇔⊇≫€ツ⊆<EFBFBD><EFBFBD>♭⌒€<EFBFBD>€縺メ┫ぞ∀€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD>あΨ┻∃<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€浮メ<EFBFBD>╋τÅ€ツ♭<EFBFBD>≫Å<EFBFBD><EFBFBD>ぬは<EFBFBD>⇔⊇ぶ∵€ア┯<EFBFBD>ぃい<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≫Å∽⊂€\n\n|しじ€操セ€€烙フ€福п園ワ<E59C92>ぬは<E381AC>\n\n┨┷ぁな<EFBFBD>≫θικ┿ヨδ<EFBFBD>€€烙フ€福п園ワ∵€リ⌒∃<EFBFBD>€€<EFBFBD>♭∧¬≒<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€ツぽま<EFBFBD>°€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€<EFBFBD>諱コ≫<EFBFBD><EFBFBD>€ツぽま∀∧<EFBFBD>€<EFBFBD>п橿蕫マ<EFBFBD><EFBFBD><EFBFBD>⇔⌒≒⊇€÷<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>€ネ√♭ぬは<EFBFBD>⇔┤<EFBFBD><EFBFBD><EFBFBD>€ツぽま<EFBFBD>€<EFBFBD>€縺メу┗∀<EFBFBD><EFBFBD><EFBFBD>┣⌒∃⊇┳¬∃<EFBFBD>€チ√∬√⌒も♭べ<EFBFBD><EFBFBD>∃⊇≡⊂<EFBFBD>€\n\n|しじ€逐セみ<EFBDBE>Σ<EFBFBD>щ€€€<C280><EFBFBD>\n\nぬは<EFBFBD>≡≪┳<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∀∵♭<EFBFBD>≫Å∽⊂∵み<EFBFBD>Σ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵ョャ∀∃≫€ツぉ<EFBFBD>ぷ⇒はヮ┰∩≒の┸∃♪∵о<EFBFBD><EFBFBD>√√†€ニ∬<EFBFBD>€€<EFBFBD>о<EFBFBD>諱ホ≪€<EFBFBD>€兤ハ€<EFBFBD>√⇔<EFBFBD><EFBFBD>⊂♭⊆∽⊂€ツみ<EFBFBD>Σ<EFBFBD>щ€€€<EFBFBD>€€€€焉クなに<EFBFBD>€テ√∈€€麾氈マ<EFBFBD>€\n\n|しじ€凍セθικ┿ヨδ<E383A8><CEB4><EFBFBD>\n\nθικ┿ヨδ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€≠タ≪ム√∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€ツぬは<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>♭⊆√†€÷ロ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ぢ♭<EFBFBD><EFBFBD><EFBFBD>€ツ∧√∵≧€<EFBFBD>ホリ<EFBFBD><EFBFBD>€≠ェ∩<EFBFBD><EFBFBD><EFBFBD><EFBFBD>⊃≫ョャ∵⊆≫Å∽⊂€\n\nEND\n",
/* 4*/ "\n",
/* 5*/ "€€烙フ€福п園ワ<EFBFBD>ぬは<EFBFBD>\n",
/* 6*/ "はヮ┰∈┥<EFBFBD>っ⊥\n",
/* 7*/ "<EFBFBD>Σ<EFBFBD>щ€€€<EFBFBD><EFBFBD>\n",
/* 8*/ "€<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>マ∈<EFBFBD><EFBFBD>\n",
/* 9*/ "θικ┿ヨδ<EFBFBD><EFBFBD><EFBFBD>\n",
/* 10*/ "Obtain suitcase.\n",
/* 11*/ "\n",
/* 12*/ "€ミ€゚€ハ€ロ€フ€リd€ワ\n",
/* 13*/ "€ミ€゚€ハ€ロ€フ€リd€ワ\n",
/* 14*/ "€€€€€€€ワ∈み<EFBFBD><EFBFBD>\n",
/* 15*/ "Obtain air stewardess uniform.\n",
/* 16*/ "\n",
/* 17*/ "€<EFBFBD><EFBFBD>€<EFBFBD>n",
/* 18*/ "€<EFBFBD><EFBFBD>€<EFBFBD>n",
/* 19*/ "€€烙フ€福п園ワ<EFBFBD>€<EFBFBD><EFBFBD>€<EFBFBD>クみ<EFBFBD><EFBFBD>\n",
/* 20*/ "Obtain flight plans from safe.\n",
/* 21*/ "\n",
/* 22*/ "€<EFBFBD><EFBFBD>€縺逐<EFBFBD>\n",
/* 23*/ "€<EFBFBD><EFBFBD>€縺逐<EFBFBD>\n",
/* 24*/ "€<EFBFBD><EFBFBD>€縺逐<EFBFBD>マ∈み<EFBFBD><EFBFBD>\n",
/* 25*/ "€€€€巡ム<EFBFBD><EFBFBD>€\n",
/* 26*/ "<EFBFBD><EFBFBD>┳∵ほ<EFBFBD>\n",
/* 27*/ "<EFBFBD>θ<EFBFBD><EFBFBD>€\n",
/* 28*/ "ν<EFBFBD><EFBFBD>∋♭<EFBFBD>\n",
/* 29*/ "<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 30*/ "γぼδ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
/* 31*/ "<EFBFBD>の┸<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
/* 32*/ "が⇔<EFBFBD>€€€\n",
/* 33*/ "の┸∃♪<EFBFBD>ぷ¬<EFBFBD><EFBFBD><EFBFBD>Ρ<EFBFBD>√⇔⊇<EFBFBD><EFBFBD>€\n",
/* 34*/ "€€€≠宴祉潤ク<EFBFBD>¶∝\n",
/* 35*/ "€€€<EFBFBD>€€€€<EFBFBD>€<EFBFBD><EFBFBD>\n",
/* 36*/ "<EFBFBD>Σ<EFBFBD>щ€€€<EFBFBD>諤ロ€€€<EFBFBD>€<EFBFBD>\n",
/* 37*/ "の┸∵о<EFBFBD><EFBFBD>\n",
/* 38*/ "€€€€€€€ワ∈<EFBFBD><EFBFBD>\n",
/* 39*/ "€€€€€€€<EFBFBD>はヮ┰∵о<EFBFBD><EFBFBD>\n",
/* 40*/ "€テ≒€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ρ┏Å<EFBFBD>€\n",
/* 41*/ "∃∋Å€€準ヤ€蕫モ<EFBFBD>┳∩€\n",
/* 42*/ "€ネ√<EFBFBD>€€<EFBFBD>€€€€€€€ワÅ<EFBFBD>€\n",
/* 43*/ "<EFBFBD><EFBFBD>ヮワ∈<EFBFBD>∋♭<EFBFBD>€÷ヤ€<EFBFBD>諱テ⊇⇒<EFBFBD>Φみ∈<EFBFBD>€蚕n",
/* 44*/ "<EFBFBD>¬≒€窒スÅ€<EFBFBD><EFBFBD><EFBFBD>∈なに<EFBFBD>€蚕n",
/* 45*/ "€<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀€€€<EFBFBD><EFBFBD>€€€€ワ∵<EFBFBD><EFBFBD><EFBFBD>\n",
/* 46*/ "€<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀€€€<EFBFBD>諤ヤ°€冾п梶ナ\n",
/* 47*/ "<EFBFBD><EFBFBD>¬∵<EFBFBD><EFBFBD>€<EFBFBD>€€<EFBFBD><EFBFBD>\n",
/* 48*/ "⊆⊇⇒≒∩≒<EFBFBD><EFBFBD>∈ぎ<EFBFBD><EFBFBD>€蚕n",
/* 49*/ "€<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>ハは<EFBFBD>\n",
/* 50*/ "€烙ヒ€€ワÅ€€準ワ€烙フ€福п園ワ<EFBFBD>°€€<EFBFBD>\n<EFBFBD><EFBFBD>€÷<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
/* 51*/ "<EFBFBD>€€ワ∈<EFBFBD><EFBFBD>⇔ぉ<EFBFBD>はヮ┰∈┥<EFBFBD>っ∠<EFBFBD>\n",
/* 52*/ "<EFBFBD><EFBFBD>€€€€€€€<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>┏⊥≒√⇔<EFBFBD><EFBFBD><EFBFBD>\n",
/* 53*/ "⊆√∵θικ┿ヨ<EFBFBD>€€€<EFBFBD>€€祥マ€\n<EFBFBD>≡≪<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
/* 54*/ "€€€瘁焉ク┏⊥⇔<EFBFBD>€€潤タ<EFBFBD><EFBFBD><EFBFBD>∈へ<EFBFBD>⇔≫∋Å€蚕n",
/* 55*/ "€€€€<EFBFBD><EFBFBD>о€÷ワ€€マ°€€€€\n<EFBFBD><EFBFBD><EFBFBD>€÷リ€<EFBFBD><EFBFBD><EFBFBD>π∈せど€\n",
/* 56*/ "⊇⊇<EFBFBD>€<EFBFBD>€€€艢ツ€€<EFBFBD><EFBFBD>\nヵ∧<EFBFBD><EFBFBD>ユ∩<EFBFBD>⇔⊇≫€\np€€烙フ€福п園ワ∵ぢ<EFBFBD><EFBFBD>\n<EFBFBD>€€ム∵せど<EFBFBD>€\npε┬┤<EFBFBD><EFBFBD><EFBFBD>€\n<EFBFBD>♪⊇≡⊂Å∵€蚕n",
/* 57*/ "<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>┣∃<EFBFBD>\n<EFBFBD><EFBFBD>€<EFBFBD>ホ∋♭<EFBFBD><EFBFBD>€\np∀<EFBFBD>∽♭€揆桷氈メ€<EFBFBD>瘁焉モ♪⊂∃<EFBFBD>€\n",
/* 58*/ "€<EFBFBD>€縺諱<EFBFBD>ΝΞ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n<EFBFBD><EFBFBD>⊃⇔⊇≫<EFBFBD><EFBFBD>あゎÅ€\npÅ∵€÷縲<EFBFBD>€縺メぞ<EFBFBD><EFBFBD>⊇≫<EFBFBD><EFBFBD>\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>⇔⊇≫<EFBFBD><EFBFBD>€\np┿ヨδ<EFBFBD>ぢ≪€∞氏メ<EFBFBD><EFBFBD>€ヤ∈\nθικ<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 59*/ "<EFBFBD>€ικ∈ぎ√<EFBFBD><EFBFBD><EFBFBD>€\n€<EFBFBD>€縺メを<EFBFBD><EFBFBD>が∩€蛛ソ<EFBFBD>€\np⊆∀€<EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD>\n€兤マ♀€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
/* 60*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD>σた∃<EFBFBD>€≠ゥ⊂<EFBFBD><EFBFBD>\n∂⊥⇔<EFBFBD>€€<EFBFBD>€ハ♀€<EFBFBD>€€\n",
/* 61*/ "€€<EFBFBD>о<EFBFBD>€盾宴死ロ€€<EFBFBD>ロて\n",
/* 62*/ "しじメぼ<EFBFBD>あぃモ∃┳Σ∵ほ<EFBFBD>\n",
/* 63*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 64*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n",
/* 65*/ "€騾ム≠€€€ラ∵⊇≫<EFBFBD>€\n",
/* 66*/ "<EFBFBD>Σ┥<EFBFBD><EFBFBD><EFBFBD>€€マ℃€ミ∵<EFBFBD><EFBFBD>\n",
/* 67*/ "はヮ┰<EFBFBD><EFBFBD><EFBFBD>∵♭<EFBFBD><EFBFBD><EFBFBD>\n",
};

View File

@ -1,72 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n",
/* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/* 4*/ "\n",
/* 5*/ "Obtain disguise and enter base\n",
/* 6*/ "Check in equipment\n",
/* 7*/ "Subvert security monitoring system\n",
/* 8*/ "Obtain flight plans from safe\n",
/* 9*/ "Board Air Force One\n",
/* 10*/ "Obtain suitcase.\n",
/* 11*/ "\n",
/* 12*/ "Suitcase\n",
/* 13*/ "Suitcase\n",
/* 14*/ "Picked up a suitcase.\n",
/* 15*/ "Obtain air stewardess uniform.\n",
/* 16*/ "\n",
/* 17*/ "Disguise\n",
/* 18*/ "Disguise\n",
/* 19*/ "Picked up a stewardess uniform.\n",
/* 20*/ "Obtain flight plans from safe.\n",
/* 21*/ "\n",
/* 22*/ "Flight Plans\n",
/* 23*/ "Flight Plans\n",
/* 24*/ "Picked up the flight plans.\n",
/* 25*/ "Look out - it's an intruder...\n",
/* 26*/ "Innocent civilians have been killed.\n",
/* 27*/ "Is he OK?\n",
/* 28*/ "I'll go and get some help.\n",
/* 29*/ "Good afternoon.\n",
/* 30*/ "OK, you know the way from here.\n",
/* 31*/ "You'll have to check that weapon in here.\n",
/* 32*/ "Oh, my God!\n",
/* 33*/ "Weapons are not allowed in the base.\n",
/* 34*/ "Right, I'm calling security.\n",
/* 35*/ "System shutdown initiated...\n",
/* 36*/ "Security systems have been shut down.\n",
/* 37*/ "Weapons have been detected.\n",
/* 38*/ "Suitcase has been deposited.\n",
/* 39*/ "Suitcase has been scanned.\n",
/* 40*/ "Hey, you - this is a restricted area.\n",
/* 41*/ "Are you new around here?\n",
/* 42*/ "Hey - give me back my case.\n",
/* 43*/ "You get security - I'll deal with her...\n",
/* 44*/ "Upstairs...there's an intruder.\n",
/* 45*/ "Laser grid access denied.\n",
/* 46*/ "Laser grid system has been overloaded.\n",
/* 47*/ "Too many neutral casualties inflicted.\n",
/* 48*/ "Stop them from getting the safe...\n",
/* 49*/ "Disguise worn.\n",
/* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n",
/* 51*/ "Use that case to conceal your equipment.\n",
/* 52*/ "The case will get stopped unless you do something.\n",
/* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n",
/* 54*/ "Stop them - they're breaking into the safe...\n",
/* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n",
/* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n",
/* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n",
/* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n",
/* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n",
/* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n",
/* 61*/ "Lift inoperative - security system is active.\n",
/* 62*/ "Critical mission personnel disabled.\n",
/* 63*/ "Critical mission object destroyed.\n",
/* 64*/ "Entrance to base secured.\n",
/* 65*/ "We're taking over!!\n",
/* 66*/ "Hover trolley has been shut down.\n",
/* 67*/ "Equipment cannot be checked in.\n",
};

View File

@ -1,72 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Obtenir le plan de vol\n\nLe plan de vol de l'Air Force One est gardé dans un coffre de la base. Dérobez-le et nous pourrons orienter Elvis vers l'Air Force One pendant le vol. Vous aurez ainsi du renfort si la situation devient critique.\n\n|Objectif 5: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n",
/* 1*/ "TERMINAL PRESIDENTIEL\nBASE AERIENNE US, ALASKA\n",
/* 2*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n",
/* 3*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme sera donnée et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 3: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n",
/* 4*/ "\n",
/* 5*/ "Voler uniforme et entrer dans la base\n",
/* 6*/ "Ranger l'équipement\n",
/* 7*/ "Leurrer le système de détection\n",
/* 8*/ "Obtenir le plan de vol\n",
/* 9*/ "Monter à bord de l'Air Force One\n",
/* 10*/ "Obtenir valise.\n",
/* 11*/ "\n",
/* 12*/ "Valise\n",
/* 13*/ "Valise\n",
/* 14*/ "Valise obtenue.\n",
/* 15*/ "Obtenir uniforme d'hôtesse.\n",
/* 16*/ "\n",
/* 17*/ "Uniforme\n",
/* 18*/ "Uniforme\n",
/* 19*/ "Uniforme d'hôtesse obtenu.\n",
/* 20*/ "Obtenir plans de vol.\n",
/* 21*/ "\n",
/* 22*/ "Plans de vol\n",
/* 23*/ "Plans de vol\n",
/* 24*/ "Plans de vol obtenus.\n",
/* 25*/ "Attention - un intrus...\n",
/* 26*/ "Civils innocents abattus.\n",
/* 27*/ "Va-t-il bien?\n",
/* 28*/ "Je vais chercher de l'aide.\n",
/* 29*/ "Bonjour. \n",
/* 30*/ "Vous connaissez le chemin.\n",
/* 31*/ "Rangez votre arme, je vous prie. \n",
/* 32*/ "...??? Oh, mon Dieu! \n",
/* 33*/ "Les armes sont interdites dans la base. \n",
/* 34*/ "J'appelle la sécurité.\n",
/* 35*/ "Coupure système initialisée... \n",
/* 36*/ "Systèmes sécurité coupés. \n",
/* 37*/ "Armement détecté.\n",
/* 38*/ "Valise déposée.\n",
/* 39*/ "Valise scannée.\n",
/* 40*/ "Vous, là! Cette zone est interdite. \n",
/* 41*/ "Vous êtes nouvelle ou quoi?\n",
/* 42*/ "Hé! Ma valise! \n",
/* 43*/ "Appelle la sécurité... Je m'occupe d'elle.\n",
/* 44*/ "En haut...il y a un intrus.\n",
/* 45*/ "Accès grilles laser refusé.\n",
/* 46*/ "Système grilles laser: surcharge.\n",
/* 47*/ "Trop de cibles neutres abattues.\n",
/* 48*/ "Empêchez-les d'avoir le coffre...\n",
/* 49*/ "Costume revêtu.\n",
/* 50*/ "Vite! Attrapez le sac de l'hôtesse \net prenez son uniforme.\n",
/* 51*/ "Utilisez cette caisse pour cacher votre équipement. \n",
/* 52*/ "Cette caisse se fera arrêter si vous n'intervenez pas. \n",
/* 53*/ "C'est ça Air Force One, hein? ... C'est assez \npetit en fait.\n",
/* 54*/ "Arrêtez-les - ils ouvrent le coffre...\n",
/* 55*/ "Agent Dark en position. Je vois l'entrée principale de la base. J'aperçois aussi le point d'arrivée du téléphérique.\n",
/* 56*/ "Excellent, Joanna. Ce téléphérique est votre billet d'entrée. Notre contact a repéré une hôtesse montant à bord il y a une minute. Elle est escortée par des troupes de la base. Je n'ai pas besoin de vous rappeler qu...\n",
/* 57*/ "...qu'ils ne font pas partie de l'opération de Trent et que je ne dois pas les abattre même sous leur feu. Et les agents de la NSA?\n",
/* 58*/ "Je ne connais pas les implications de la NSA dans cette affaire. Je suis néanmoins persuadé que les hommes de Trent lui sont tous loyaux. A vous de trouver les preuves de la trahison de Trent une fois à bord et présentez-les au Président.\n",
/* 59*/ "Et le protéger de ses ravisseurs. Avez-vous une théorie sur les plans de Trent et sur ce type blond?\n",
/* 60*/ "Que de vagues soupçons. Concentrez-vous plutôt sur la mission. Bonne chance. Carrington, terminé.\n",
/* 61*/ "Ascenseur inactif - système sécurité actif.\n",
/* 62*/ "Personnel crucial inutilisable.\n",
/* 63*/ "Objet crucial détruit.\n",
/* 64*/ "Entrée de la base sécurisée.\n",
/* 65*/ "On s'en charge!!\n",
/* 66*/ "Chariot coupé.\n",
/* 67*/ "Equipement ne peut être enregistré.\n",
};

View File

@ -1,72 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Entwenden Sie die Flugpläne aus dem Safe!\n\nDie Route, welche für die Air Force One geplant ist, wird in einem Safe auf der Basis aufbewahrt. Bringen Sie die Pläne in Ihren Besitz! Durch diese Daten werden wir in der Lage sein, auch Elvis auf Ihre Route zu bringen. Im Falle einer Kalamität dient er als Ihre Verstärkung.\n\n|5. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n",
/* 1*/ "PRÄSIDENTEN TERMINAL \nUS AIRBASIS, ALASKA\n",
/* 2*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen. \n\nENDE\n",
/* 3*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|3. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n",
/* 4*/ "\n",
/* 5*/ "Erlangen Sie die Tarnung!\n",
/* 6*/ "Checken Sie Ihre Ausrüstung ein!\n",
/* 7*/ "Unterminieren Sie die Überwachung!\n",
/* 8*/ "Entwenden Sie die Flugpläne!\n",
/* 9*/ "Gehen Sie an Bord der Air Force One!\n",
/* 10*/ "Erlangen Sie den Koffer!\n",
/* 11*/ "\n",
/* 12*/ "Koffer\n",
/* 13*/ "Koffer\n",
/* 14*/ "Koffer aufgenommen\n",
/* 15*/ "Erlangen Sie die Uniform!\n",
/* 16*/ "\n",
/* 17*/ "Verkleidung\n",
/* 18*/ "Verkleidung\n",
/* 19*/ "Uniform aufgenommen\n",
/* 20*/ "Entwenden Sie die Flugpläne aus dem Safe!\n",
/* 21*/ "\n",
/* 22*/ "Flugpläne\n",
/* 23*/ "Flugpläne\n",
/* 24*/ "Flugpläne aufgenommen\n",
/* 25*/ "Vorsicht - Ein Eindringling...\n",
/* 26*/ "Es sind unschuldige Zivilisten zu Schaden gekommen.\n",
/* 27*/ "Ist er OK?\n",
/* 28*/ "Ich gehe und hole Hilfe.\n",
/* 29*/ "Schönen guten Tag.\n",
/* 30*/ "OK, von hier aus kennen Sie ja den Weg.\n",
/* 31*/ "Sie müssen Ihre Waffe hier einchecken, Miss.\n",
/* 32*/ "Oh nein!\n",
/* 33*/ "Das Tragen von Waffen ist in diesem Areal nicht erlaubt.\n",
/* 34*/ "Ich alarmiere die Security.\n",
/* 35*/ "System wird heruntergefahren...\n",
/* 36*/ "Überwachungssystem wurde deaktiviert.\n",
/* 37*/ "WAFFEN WURDEN ENTDECKT!!!\n",
/* 38*/ "Der Koffer wurde deponiert.\n",
/* 39*/ "Der Koffer wurde gescannt.\n",
/* 40*/ "Hey, Sie - Sie befinden sich in einer Sperrzone.\n",
/* 41*/ "Sind Sie neu hier?\n",
/* 42*/ "Hey - geben Sie mir meinen Koffer zurück!\n",
/* 43*/ "Du holst die Security - Ich kümmere mich um sie...\n",
/* 44*/ "Wache... Es befindet sich ein Eindringling in der Basis!\n",
/* 45*/ "Zugriff auf die Lasermatrix verweigert\n",
/* 46*/ "Lasermatrix-System wurde überladen!!!\n",
/* 47*/ "Es sind zu viele unschuldige Opfer zu beklagen.\n",
/* 48*/ "Haltet sie vom Safe fern...\n",
/* 49*/ "Verkleidung wurde angelegt.\n",
/* 50*/ "Das ist Ihre Chance! Schnappen Sie sich \ndie Tasche der Stewardess! \n",
/* 51*/ "Verbergen Sie Ihre Ausrüstung in der Tasche. \n",
/* 52*/ "Wenn Sie nichts unternehmen, wird der Koffer abgefangen. \n",
/* 53*/ "Das ist also die Air Force One? ... Hm, kleiner als ich \ndachte.\n",
/* 54*/ "Haltet sie auf - sie brechen den Safe auf...\n",
/* 55*/ "Agent Dark ist in Position. Ich kann bereits den Haupteingang der Basis sehen. Auch die Haltestelle ist in Sichtweite.\n",
/* 56*/ "Ausgezeichnet, Joanna. In der Bahn befindet sich etwas, dass Sie brauchen. Unser Beobachter hat uns mitgeteilt, dass ein Crew-Mitglied vor einer Minute die Bahn betreten hat. Sie wird von Soldaten eskortiert. Ich muss Sie wohl nicht daran erinnern, dass...\n",
/* 57*/ "...dass diese Leute nichts mit Trents kleiner Inszenierung zu tun haben, und ich darf mich nicht mal wehren, selbst wenn sie mich angreifen. Was ist mit den NSA-Agenten?\n",
/* 58*/ "Ich weiß nicht, wie weit diese Verschwörung innerhalb der NSA fortgeschritten ist, aber ich wette, dass Trents Leute ihm und seinem Plan gegenüber absolut loyal sind. Sie müssen einen Beweis gegen Trent erbringen und diesen dem Präsidenten vorlegen.\n",
/* 59*/ "Und ich soll ihn auch noch beschützen. Haben Sie schon eine Vorstellung, wie sich Trents Vorhaben gestalten könnte? Und was hat es mit diesen blonden Kerlen auf sich?\n",
/* 60*/ "Nur vage Vermutungen, mit denen ich Sie nicht belasten will. Viel Glück! Over und out.\n",
/* 61*/ "Aufzug inoperativ - Sicherheitssystem ist aktiv.\n",
/* 62*/ "Wichtige Person eliminiert\n",
/* 63*/ "Wichtiges Objekt zerstört\n",
/* 64*/ "Eingang wurde gesichert.\n",
/* 65*/ "Wir übernehmen jetzt!!\n",
/* 66*/ "Hover-Trolley wurde abgeschaltet.\n",
/* 67*/ "Ausrüstung kann nicht überprüft werden.\n",
};

View File

@ -1,72 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Prendi i piani di volo dalla cassaforte\n\nLe rotte di volo dell'Air Force One sono conservate in una cassaforte della base. Se riesci ad impossessartene, potremmo usarne i dati per guidare Elvis all'inseguimento dell'Air Force One in modo che ti possa essere di supporto nel caso sopraggiungano circostanze impreviste.\n\n|Obiettivo 5: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n",
/* 1*/ "TERMINAL PRESIDENZIALE \nBASE AEREA USA, ALASKA\n",
/* 2*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n",
/* 3*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 3: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n",
/* 4*/ "\n",
/* 5*/ "Travestiti ed entra nella base\n",
/* 6*/ "Deposita i tuoi strumenti\n",
/* 7*/ "Neutralizza il sistema di sicurezza\n",
/* 8*/ "Prendi i piani di volo dalla cassaforte\n",
/* 9*/ "Sali a bordo dell'Air Force One\n",
/* 10*/ "Procurati valigia.\n",
/* 11*/ "\n",
/* 12*/ "Valigia\n",
/* 13*/ "Valigia\n",
/* 14*/ "Presa valigia.\n",
/* 15*/ "Procurati la divisa dell'hostess.\n",
/* 16*/ "\n",
/* 17*/ "Travestimento\n",
/* 18*/ "Travestimento\n",
/* 19*/ "Presa divisa dell'hostess.\n",
/* 20*/ "Procurati piani di volo.\n",
/* 21*/ "\n",
/* 22*/ "Piani di volo\n",
/* 23*/ "Piani di volo\n",
/* 24*/ "Presi piani di volo.\n",
/* 25*/ "Attenzione! C'è un intruso!\n",
/* 26*/ "Sono stati uccisi troppi civili.\n",
/* 27*/ "Sta bene?\n",
/* 28*/ "Vado a cercare aiuto!\n",
/* 29*/ "Buonasera.\n",
/* 30*/ "Bene, la strada la conosce.\n",
/* 31*/ "Si tolga il cinturone, per favore!\n",
/* 32*/ "Oh, per la miseria!\n",
/* 33*/ "Non sono ammesse armi alla base!\n",
/* 34*/ "Bene, chiamerò la sicurezza!\n",
/* 35*/ "Chiusura del sistema in corso...\n",
/* 36*/ "Il sistema di sicurezza è stato disattivato.\n",
/* 37*/ "Sono state rilevate delle armi.\n",
/* 38*/ "La valigia è stata depositata.\n",
/* 39*/ "La valigia è stata esaminata.\n",
/* 40*/ "Ehi! L'accesso a quest'area è vietato.\n",
/* 41*/ "È la prima volta che viene qui?\n",
/* 42*/ "Ehi! Mi restituisca la valigia.\n",
/* 43*/ "Chiami pure la sicurezza: me la vedrò io con loro!\n",
/* 44*/ "Di sopra... c'è un intruso.\n",
/* 45*/ "Negato l'accesso alla griglia laser.\n",
/* 46*/ "Sistema a griglie laser in sovraccarico.\n",
/* 47*/ "Vittime ingiustificate.\n",
/* 48*/ "Non devono prendere la cassaforte!\n",
/* 49*/ "Indossato travestimento.\n",
/* 50*/ "Ecco la tua occasione! Prendi la valigia dell'hostess \n e indossa la sua divisa.\n",
/* 51*/ "Usa quella valigia per nascondere la tua attrezzatura.\n",
/* 52*/ "Se non fai qualcosa la valigia verrà fermata.\n",
/* 53*/ "Così quello è l'Air Force One? Mhm... \n più piccolo di quanto pensassi.\n",
/* 54*/ "Fermateli! Stanno scassinando la cassaforte...\n",
/* 55*/ "Agente Dark in posizione! Vedo l'ingresso principale della base e suppongo di aver trovato il punto d'arrivo della navetta!\n",
/* 56*/ "Eccellente, Joanna. Quella navetta è il tuo biglietto d'entrata. Il nostro uomo al terminal inferiore ha riconosciuto un membro dell'equipaggio, una donna salita un minuto fa. È scortata da una squadra della base aerea. È superfluo ricordarti che...\n",
/* 57*/ "Lo so, lo so! Sono poveri esserini innocenti, probabilmente del tutto estranei allo stupido piano di Trent e non posso sparargli neanche se sparano loro per primi. E che mi dice degli agenti NSA?\n",
/* 58*/ "Non sono a conoscenza della misura in cui si sia diffusa la cospirazione all'interno dell'NSA, ma sono pronto a scommettere che gli uomini di Trent sono fedeli a lui e al suo piano. Devi trovare le prove del suo tradimento sull'Air Force One e mostrarle al Presidente.\n",
/* 59*/ "Sììì e proteggerlo dai suoi rapitori! Ha qualche idea in merito al piano di Trent e cosa mi sa dire di quegli strani biondi?\n",
/* 60*/ "Solo vaghi sospetti che non vale la pena menzionare. Buona fortuna! Passo e chiudo!\n",
/* 61*/ "Ascensore inattivo - Sistema di sicurezza attivo\n",
/* 62*/ "Ucciso personale essenziale alla missione.\n",
/* 63*/ "Distrutto strumento essenziale alla missione.\n",
/* 64*/ "L'entrata alla base è stata chiusa.\n",
/* 65*/ "Stiamo decollando!!!\n",
/* 66*/ "Chiuso carrello del velivolo.\n",
/* 67*/ "L'attrezzatura non può essere depositata.\n",
};

View File

@ -1,72 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Obtener Planes de Vuelo de la Caja Fuerte\n\nLa ruta de vuelo planeada para el Air Force One está guardada en la caja fuerte de la base. Si puedes hacerte con ella, entonces podremos usar los datos para dirigir a Elvis hasta el Air Force One durante el vuelo como apoyo para ti en caso de que algo vaya mal.\n\n|Objetivo Cinco: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n",
/* 1*/ "TERMINAL PRESIDENCIAL \nBASE AÉREA EE.UU., ALASKA\n",
/* 2*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n",
/* 3*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Tres: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n",
/* 4*/ "\n",
/* 5*/ "Obtener el disfraz y entrar a la base\n",
/* 6*/ "Facturar el equipo\n",
/* 7*/ "Burlar al sistema monitor de seguridad\n",
/* 8*/ "Obtener planes v. de la caja fuerte\n",
/* 9*/ "Abordar el Air Force One\n",
/* 10*/ "Obtén la maleta.\n",
/* 11*/ "\n",
/* 12*/ "Maleta\n",
/* 13*/ "Maleta\n",
/* 14*/ "Maleta obtenida.\n",
/* 15*/ "Obtén el uniforme de azafata de vuelo.\n",
/* 16*/ "\n",
/* 17*/ "Disfraz\n",
/* 18*/ "Disfraz\n",
/* 19*/ "Uniforme de azafata obtenido.\n",
/* 20*/ "Obtén los planes de vuelo de la caja fuerte.\n",
/* 21*/ "\n",
/* 22*/ "Planes de Vuelo\n",
/* 23*/ "Planes de Vuelo\n",
/* 24*/ "Planes de vuelo obtenidos.\n",
/* 25*/ "Cuidado. Es un intruso...\n",
/* 26*/ "Han muerto civiles inocentes.\n",
/* 27*/ "¿Está bien?\n",
/* 28*/ "Iré para obtener alguna ayuda.\n",
/* 29*/ "Buenas tardes.\n",
/* 30*/ "Muy bien, ya conoce el camino desde aquí.\n",
/* 31*/ "Deberás dejar ese arma aquí.\n",
/* 32*/ "¡Oh, Dios mío!\n",
/* 33*/ "No se permiten armas en la base.\n",
/* 34*/ "De acuerdo, avisaré a seguridad.\n",
/* 35*/ "Cierre del sistema iniciado...\n",
/* 36*/ "Los sistemas de seguridad han sido apagados.\n",
/* 37*/ "Se han detectado armas.\n",
/* 38*/ "La maleta ha sido facturada.\n",
/* 39*/ "La maleta ha sido escaneada.\n",
/* 40*/ "Hey, tú: ésta es un área restringida.\n",
/* 41*/ "¿Eres nueva por aquí?\n",
/* 42*/ "Hey. Devuélveme mi maleta.\n",
/* 43*/ "Trae a seguridad, yo me encargo de ella...\n",
/* 44*/ "Arriba... hay un intruso.\n",
/* 45*/ "Acceso a la rejilla de láser denegado.\n",
/* 46*/ "Sistema de rejilla de láser sobrecargado.\n",
/* 47*/ "Demasiados civiles heridos.\n",
/* 48*/ "Detenles antes de que abran la caja fuerte...\n",
/* 49*/ "Disfraz puesto.\n",
/* 50*/ "¡Ésta es tu oportunidad! Agarra la bolsa \nde la azafata y coge su uniforme.\n",
/* 51*/ "Usa la maleta para ocultar tu equipo.\n",
/* 52*/ "La maleta será detenida a menos que hagas algo.\n",
/* 53*/ "¿Así que ese es el Air Force One? ... Huh, es más \npequeño de lo que pensaba.\n",
/* 54*/ "Detenlos: están accediendo a la caja fuerte...\n",
/* 55*/ "Agente Dark en posición. Puedo ver la entrada principal de la base, y distingo el punto de llegada del teleférico.\n",
/* 56*/ "Excelente, Joanna. Ese teleférico es tu modo de entrar... nuestro observador de la terminal inferior ha visto a un miembro de la tripulación entrar hace un minuto. Está siendo escoltada por tropas de la base aérea. No debo recordarte que probablemente...\n",
/* 57*/ "Que probablemente sean inocentes de estar involucrados en la pequeña trama de Trent. Y que no puedo dispararles aunque ellos me disparen a mí. ¿Qué pasa con los agentes de la ANS?\n",
/* 58*/ "No sé cuán lejos ha llegado la conspiración a través de la ANS, pero podría apostar a que los hombres que Trent ha situado por aquí son leales a su plan y a él mismo. Debes encontrar evidencias de la traición de Trent en el Air Force One y enseñárselas al Presidente.\n",
/* 59*/ "Sí, y protegerle de sus secuestradores. ¿Tienes alguna idea sobre de qué puede tratar el plan de Trent, y qué pasa con esos chicos rubios?\n",
/* 60*/ "Sólo sospechas vagas, y no quiero distraerte ahora con eso. Buena suerte. Carrington fuera.\n",
/* 61*/ "Ascensor no operativo: sistema de seguridad activo.\n",
/* 62*/ "Personal crítico de la misión eliminado.\n",
/* 63*/ "Objeto crítico de la misión destruido.\n",
/* 64*/ "Entrada a la base asegurada.\n",
/* 65*/ "¡¡Nos ocupamos nosotros!!\n",
/* 66*/ "El teleférico ha sido derribado.\n",
/* 67*/ "El equipo no puede ser registrado.\n",
};

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/* 1*/ "Cetan Ship\n",
/* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/* 4*/ "\n",
/* 5*/ "Deactivate GPS and autopilot\n",
/* 6*/ "Disable primary power source\n",
/* 7*/ "Secure laboratories and research data\n",
/* 8*/ "Activate Moon Pool lift\n",
/* 9*/ "Rendezvous and escape with Elvis\n",
/* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n",
/* 11*/ "This must be where the sub's controlled from.\n",
/* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n",
/* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n",
/* 14*/ "Autopilot system has been deactivated.\n",
/* 15*/ "GPS system has been deactivated.\n",
/* 16*/ "Critical mission object has been destroyed.\n",
/* 17*/ "Reactor shutdown control hatch opened.\n",
/* 18*/ "Reactor has been shut down.\n",
/* 19*/ "Diving control center has been located.\n",
/* 20*/ "Critical mission personnel killed.\n",
/* 21*/ "Research data has been secured.\n",
/* 22*/ "\n",
/* 23*/ "\n",
/* 24*/ "Research data disk\n",
/* 25*/ "A research data disk\n",
/* 26*/ "Picked up a research data disk.\n",
/* 27*/ "Critical mission personnel have been killed.\n",
/* 28*/ "Lift door has been unlocked.\n",
/* 29*/ "Lift has been activated.\n",
/* 30*/ "Operation denied - hangar doors still closed.\n",
/* 31*/ "Unlocking sequence has been reset.\n",
/* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n",
/* 33*/ "Elvis has been killed.\n",
/* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n",
/* 35*/ "Civilians have been killed.\n",
/* 36*/ "Critical mission object has been destroyed.\n",
/* 37*/ "Alarm has been activated.\n",
/* 38*/ "Alarm has been deactivated.\n",
/* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n",
/* 40*/ "I hope the government don't want to use this ship anytime soon.\n",
/* 41*/ "Do you think we were a little heavy-handed?\n",
/* 42*/ "Naaahhhh.\n",
/* 43*/ "Pull the plug on that now.\n",
/* 44*/ "Switch this thing off.\n",
/* 45*/ "I'll shut it down.\n",
/* 46*/ "Please don't hurt me.\n",
/* 47*/ "Die, you traitors.\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|€€竄п<EFBD82>\n\n⌒∩∃≪⊆<EFBFBD><EFBFBD>⇔⊇≫≡⊂♭€ヒ⊇<EFBFBD>€€€€ラ∀⊇⊂<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>€€秩ヘ∧<EFBFBD><EFBFBD><EFBFBD>∈ぢ<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ыь<EFBFBD>э∈ぼ<EFBFBD>⇔⊇≫€ツ♂€゚≧€€マ∀∧<EFBFBD>┻♪⌒<EFBFBD>€延梶<EFBFBD>ェ∩χャ∃ち<EFBFBD>€<EFBFBD>€€縺クぼ<EFBFBD>⇔⊇≫≡⊂Å€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD><EFBFBD><EFBFBD>ぼ∃て<EFBFBD>∩≒€÷<EFBFBD>瘁焉マ∀<EFBFBD>⇔ш<EFBFBD><EFBFBD>э∵∀⇔⌒χャ♭⊆≫∀⊇⊃≫Å∽⊂€€<EFBFBD>瘁焉メ<EFBFBD>э∈♭<EFBFBD><EFBFBD>≪こご<EFBFBD>€<EFBFBD>€<EFBFBD><EFBFBD>ご∈く<EFBFBD><EFBFBD><EFBFBD>∀⊇⊂€≠」う<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>о<EFBFBD>クり√∃⊇≡⊂<EFBFBD>€\n\n|しじ€操セ<E6938D><EFBDBE><EFBFBD>€<EFBFBD>€マλυ<CF85>\n\n€<EFBFBD>€マλυ<EFBFBD>√†€<EFBFBD><EFBFBD>諠ヘぼ<EFBFBD>€€€マ∩≒<EFBFBD><EFBFBD>√≫Å∽⊂€ツ∧√<EFBFBD>≡≪<EFBFBD><EFBFBD>ろゎ⌒ヱ⊃⇔<EFBFBD><EFBFBD><EFBFBD>Å∵€死ツ€€€€€マ∈<EFBFBD><EFBFBD>€υ<EFBFBD>€€€€焉クо<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>⇔⊇≫€€€€焉クュ⇔<EFBFBD>√†ぞ<EFBFBD><EFBFBD>⊆≫€<EFBFBD>€€€€€焉メ€騾ハ€焉諢ラ<EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€逐セ<E98090><EFBDBE>€゚∈せぜ<E3819B>\n\n€゚≧€€マ∵<EFBFBD><EFBFBD>€<EFBFBD>€€縺マ⊇⇔<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>≫ョャ∵⊆≫€<EFBFBD><EFBFBD><EFBFBD>о<EFBFBD>€<EFBFBD><EFBFBD>⊇≫€€€€<EFBFBD>ノ¬∈€㏍オ<EFBFBD>€<EFBFBD><EFBFBD>€≠ロ≒<EFBFBD><EFBFBD><EFBFBD>€゚∈せぜ<EFBFBD><EFBFBD>€ツゆ<EFBFBD>Β<EFBFBD>♪ぽ≒∈<EFBFBD>р<EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€凍セ€<EFBDBE>€€ャ∀<EFBDAC>てざぼは<EFBD95>\n\n€<EFBFBD>€€€艨劇ロ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>てざぼは<EFBFBD>√†€<EFBFBD><EFBFBD>€<EFBFBD>о縺ソ≒√⇔€コ⇔⌒∃<EFBFBD><EFBFBD><EFBFBD>Å∽⊂€<EFBFBD>ぶÅ<EFBFBD><EFBFBD><EFBFBD>⇔⌒<EFBFBD>ыь<EFBFBD>э∈こご<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃⊇€<EFBFBD><EFBFBD>┳∈に∩<EFBFBD><EFBFBD>€チ√∬√⌒<EFBFBD>ご∈<EFBFBD>⊃∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€楳セ€<EFBDBE>оマ£€<EFBD84><C280><EFBFBD><EFBFBD>縺クづて\n\n<EFBFBD>√♭€延割€щъ€〟凍<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵ぃい<EFBFBD>∃≫€ツぉ<EFBFBD>ぼて<EFBFBD><EFBFBD>€テ√∈づて<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€€€縲冾о<EFBFBD>逗轢<EFBFBD><EFBFBD>€着私チ<EFBFBD><EFBFBD>⊆≫€\n\n|しじ€斧セ€€<EFBE93>劇ワ∀ち<E28880>ыь<D18B>\n\n€€<EFBFBD>劇ワ∈なに<EFBFBD>€≠ソ<EFBFBD>€<EFBFBD>оマ£€<EFBFBD>マゅ<EFBFBD>€<EFBFBD><EFBFBD>€€<EFBFBD>メыь∈<EFBFBD>⊥⇔<EFBFBD>€\n\nEND\n",
/* 1*/ "€ン€゚€マ€ロ€ハ£\n",
/* 2*/ "|€€竄п<EFBD82>\n\n⌒∩∃≪⊆<EFBFBD><EFBFBD>⇔⊇≫≡⊂♭€ヒ⊇<EFBFBD>€€€€ラ∀⊇⊂<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>€€秩ヘ∧<EFBFBD><EFBFBD><EFBFBD>∈ぢ<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ыь<EFBFBD>э∈ぼ<EFBFBD>⇔⊇≫€ツ♂€゚≧€€マ∀∧<EFBFBD>┻♪⌒<EFBFBD>€延梶<EFBFBD>ェ∩χャ∃ち<EFBFBD>€<EFBFBD>€€縺クぼ<EFBFBD>⇔⊇≫≡⊂Å€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD><EFBFBD><EFBFBD>ぼ∃て<EFBFBD>∩≒€÷<EFBFBD>瘁焉マ∀<EFBFBD>⇔ш<EFBFBD><EFBFBD>э∵∀⇔⌒χャ♭⊆≫∀⊇⊃≫Å∽⊂€€<EFBFBD>瘁焉メ<EFBFBD>э∈♭<EFBFBD><EFBFBD>≪こご<EFBFBD>€<EFBFBD>€<EFBFBD><EFBFBD>ご∈く<EFBFBD><EFBFBD><EFBFBD>∀⊇⊂€≠」う<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>о<EFBFBD>クり√∃⊇≡⊂<EFBFBD>€\n\n|しじ€操セ<E6938D><EFBDBE><EFBFBD>€<EFBFBD>€マλυ<CF85>\n\n€<EFBFBD>€マλυ<EFBFBD>√†€<EFBFBD><EFBFBD>諠ヘぼ<EFBFBD>€€€マ∩≒<EFBFBD><EFBFBD>√≫Å∽⊂€ツ∧√<EFBFBD>≡≪<EFBFBD><EFBFBD>ろゎ⌒ヱ⊃⇔<EFBFBD><EFBFBD><EFBFBD>Å∵€死ツ€€€€€マ∈<EFBFBD><EFBFBD>€υ<EFBFBD>€€€€焉クо<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>⇔⊇≫€€€€焉クュ⇔<EFBFBD>√†ぞ<EFBFBD><EFBFBD>⊆≫€<EFBFBD>€€€€€焉メ€騾ハ€焉諢ラ<EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€逐セ€<EFBDBE>€€ャ∀<EFBDAC>てざぼは<EFBD95>\n\n€<EFBFBD>€€€艨劇ロ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>てざぼは<EFBFBD>√†€<EFBFBD><EFBFBD>€<EFBFBD>о縺ソ≒√⇔€コ⇔⌒∃<EFBFBD><EFBFBD><EFBFBD>Å∽⊂€<EFBFBD>ぶÅ<EFBFBD><EFBFBD><EFBFBD>⇔⌒<EFBFBD>ыь<EFBFBD>э∈こご<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃⊇€<EFBFBD><EFBFBD>┳∈に∩<EFBFBD><EFBFBD>€チ√∬√⌒<EFBFBD>ご∈<EFBFBD>⊃∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€凍セ€<EFBDBE>оマ£€<EFBD84><C280><EFBFBD><EFBFBD>縺クづて\n\n<EFBFBD>√♭€延割€щъ€〟凍<EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∵ぃい<EFBFBD>∃≫€ツぉ<EFBFBD>ぼて<EFBFBD><EFBFBD>€テ√∈づて<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>€€€縲冾о<EFBFBD>逗轢<EFBFBD><EFBFBD>€着私チ<EFBFBD><EFBFBD>⊆≫€\n\n|しじ€楳セ€€<EFBE93>劇ワ∀ち<E28880>ыь<D18B>\n\n€€<EFBFBD>劇ワ∈なに<EFBFBD>€≠ソ<EFBFBD>€<EFBFBD>оマ£€<EFBFBD>マゅ<EFBFBD>€<EFBFBD><EFBFBD>€€<EFBFBD>メыь∈<EFBFBD>⊥⇔<EFBFBD>€\n\nEND\n",
/* 3*/ "|€€竄п<EFBD82>\n\n⌒∩∃≪⊆<EFBFBD><EFBFBD>⇔⊇≫≡⊂♭€ヒ⊇<EFBFBD>€€€€ラ∀⊇⊂<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD><EFBFBD>€€秩ヘ∧<EFBFBD><EFBFBD><EFBFBD>∈ぢ<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ыь<EFBFBD>э∈ぼ<EFBFBD>⇔⊇≫€ツ♂€゚≧€€マ∀∧<EFBFBD>┻♪⌒<EFBFBD>€延梶<EFBFBD>ェ∩χャ∃ち<EFBFBD>€<EFBFBD>€€縺クぼ<EFBFBD>⇔⊇≫≡⊂Å€\n\n|€€€<EFBE8B>€縲マ€\n\n<EFBFBD><EFBFBD><EFBFBD>ぼ∃て<EFBFBD>∩≒€÷<EFBFBD>瘁焉マ∀<EFBFBD>⇔ш<EFBFBD><EFBFBD>э∵∀⇔⌒χャ♭⊆≫∀⊇⊃≫Å∽⊂€€<EFBFBD>瘁焉メ<EFBFBD>э∈♭<EFBFBD><EFBFBD>≪こご<EFBFBD>€<EFBFBD>€<EFBFBD><EFBFBD>ご∈く<EFBFBD><EFBFBD><EFBFBD>∀⊇⊂€≠」う<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>о<EFBFBD>クり√∃⊇≡⊂<EFBFBD>€\n\n|しじ€操セ<E6938D><EFBDBE><EFBFBD>€<EFBFBD>€マλυ<CF85>\n\n€<EFBFBD>€マλυ<EFBFBD>√†€<EFBFBD><EFBFBD>諠ヘぼ<EFBFBD>€€€マ∩≒<EFBFBD><EFBFBD>√≫Å∽⊂€ツ∧√<EFBFBD>≡≪<EFBFBD><EFBFBD>ろゎ⌒ヱ⊃⇔<EFBFBD><EFBFBD><EFBFBD>Å∵€死ツ€€€€€マ∈<EFBFBD><EFBFBD>€υ<EFBFBD>€€€€焉クо<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>⇔⊇≫€€€€焉クュ⇔<EFBFBD>√†ぞ<EFBFBD><EFBFBD>⊆≫€<EFBFBD>€€€€€焉メ€騾ハ€焉諢ラ<EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€逐セ€<EFBDBE>€€ャ∀<EFBDAC>てざぼは<EFBD95>\n\n€<EFBFBD>€€€艨劇ロ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>てざぼは<EFBFBD>√†€<EFBFBD><EFBFBD>€<EFBFBD>о縺ソ≒√⇔€コ⇔⌒∃<EFBFBD><EFBFBD><EFBFBD>Å∽⊂€<EFBFBD>ぶÅ<EFBFBD><EFBFBD><EFBFBD>⇔⌒<EFBFBD>ыь<EFBFBD>э∈こご<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃⊇€<EFBFBD><EFBFBD>┳∈に∩<EFBFBD><EFBFBD>€チ√∬√⌒<EFBFBD>ご∈<EFBFBD>⊃∃⊇≡⊂<EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€凍セ€€<EFBE93>劇ワ∀ち<E28880>ыь<D18B>\n\n€€<EFBFBD>劇ワ∈なに<EFBFBD>€≠ソ<EFBFBD>€<EFBFBD>оマ£€<EFBFBD>マゅ<EFBFBD>€<EFBFBD><EFBFBD>€€<EFBFBD>メыь∈<EFBFBD>⊥⇔<EFBFBD>€\n\nEND\n",
/* 4*/ "\n",
/* 5*/ "€<EFBFBD>€€ャ∀<EFBFBD>てざぼは<EFBFBD>\n",
/* 6*/ "<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>€マλυ<EFBFBD>\n",
/* 7*/ "<EFBFBD><EFBFBD>€゚∈せぜ<EFBFBD>\n",
/* 8*/ "€<EFBFBD>оマ£€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>縺クづて\n",
/* 9*/ "€€<EFBFBD>劇ワ∀ち<EFBFBD>ыь<EFBFBD>\n",
/* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n",
/* 11*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∈ぼ⊂リ<EFBFBD><EFBFBD>€\n",
/* 12*/ "<EFBFBD>てざぼ∀€<EFBFBD>€€ャ∵∃<EFBFBD><EFBFBD>\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Å≡⊂Å<EFBFBD><EFBFBD>€÷騾ハ€騾エ\n",
/* 13*/ "€<EFBFBD>€マλυ<EFBFBD>√†⊇⊇<EFBFBD><EFBFBD>€蚕n",
/* 14*/ "<EFBFBD>てざぼは€€麾氈ト√\n",
/* 15*/ "€<EFBFBD>€€€€€<EFBFBD>諤ィ€麾氈ト√\n",
/* 16*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 17*/ "λυ<EFBFBD>€<EFBFBD>€€€€€焉メ€騾ハ€焉諢ラ⊇\n",
/* 18*/ "€<EFBFBD>€€€€€焉諤ィ€麾氈ト√\n",
/* 19*/ "ыь<EFBFBD>э€€€縲冾о<EFBFBD>€€∈なに<EFBFBD>\n",
/* 20*/ "しじメぼ<EFBFBD>あぃモ∃┳Σ∵ほ<EFBFBD>\n",
/* 21*/ "ュ⇔<EFBFBD><EFBFBD><EFBFBD>€゚∈せぜ<EFBFBD>\n",
/* 22*/ "\n",
/* 23*/ "\n",
/* 24*/ "<EFBFBD><EFBFBD>€\n",
/* 25*/ "<EFBFBD><EFBFBD>€\n",
/* 26*/ "<EFBFBD><EFBFBD>€゚∈み<EFBFBD><EFBFBD>\n",
/* 27*/ "しじメぼ<EFBFBD>あぃモ∃┳Σ∵ほ<EFBFBD>\n",
/* 28*/ "€<EFBFBD><EFBFBD>縺メ♀€€兤ハ€ラ∵<EFBFBD>∩√\n",
/* 29*/ "€<EFBFBD><EFBFBD>縺謔テて<EFBFBD>\n",
/* 30*/ "€€<EFBFBD>о€€<EFBFBD><EFBFBD>€遵私チ<EFBFBD><EFBFBD>€ミ∵<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n",
/* 31*/ "€<EFBFBD>€€€€€焉メ€兤ハ€<EFBFBD>€<EFBFBD>€€縺ト√\n",
/* 32*/ "€€€€艢≠ッ<EFBFBD><EFBFBD><EFBFBD>€€<EFBFBD>пモ\nшず<EFBFBD>о<EFBFBD><EFBFBD>€Β<EFBFBD><EFBFBD><EFBFBD>≡⊂€\n",
/* 33*/ "€€<EFBFBD>劇ワ∵ほ<EFBFBD>\n",
/* 34*/ "€€€€€⊇≡€€準ユ€<EFBFBD>項マ€\n<EFBFBD><EFBFBD>∋∃¥€<EFBFBD>ソ≒<EFBFBD><EFBFBD>≡⊂€\n",
/* 35*/ "<EFBFBD><EFBFBD>┳∵ほ<EFBFBD>\n",
/* 36*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 37*/ "€€<EFBFBD>о<EFBFBD>謔テて<EFBFBD>\n",
/* 38*/ "€€<EFBFBD>о<EFBFBD><EFBFBD><EFBFBD>\n",
/* 39*/ "<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>瘁焉メ<EFBFBD>э∈\n€€<EFBFBD>€ツヵΞ<EFBFBD>ш<EFBFBD>€\n",
/* 40*/ "Ω<EFBFBD>∵ふ<EFBFBD>€<EFBFBD><EFBFBD>\n<EFBFBD>∝∃⊇<EFBFBD>∀∈⊇<EFBFBD>≫∝€\n",
/* 41*/ "€<EFBFBD>пノ¬<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∩∃€\n",
/* 42*/ "€€€蚕n",
/* 43*/ "<EFBFBD><EFBFBD><EFBFBD>∀∧<EFBFBD>€€€€焉ク<EFBFBD><EFBFBD>€\n",
/* 44*/ "<EFBFBD><EFBFBD><EFBFBD>€€€€焉ワ<EFBFBD><EFBFBD>€\n",
/* 45*/ "∝∩<EFBFBD>€ン≫≡€蚕n",
/* 46*/ "∃⊇♭<EFBFBD>€蚕n",
/* 47*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/* 1*/ "Cetan Ship\n",
/* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/* 4*/ "\n",
/* 5*/ "Deactivate GPS and autopilot\n",
/* 6*/ "Disable primary power source\n",
/* 7*/ "Secure laboratories and research data\n",
/* 8*/ "Activate Moon Pool lift\n",
/* 9*/ "Rendezvous and escape with Elvis\n",
/* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n",
/* 11*/ "This must be where the sub's controlled from.\n",
/* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n",
/* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n",
/* 14*/ "Autopilot system has been deactivated.\n",
/* 15*/ "GPS system has been deactivated.\n",
/* 16*/ "Critical mission object has been destroyed.\n",
/* 17*/ "Reactor shutdown control hatch opened.\n",
/* 18*/ "Reactor has been shut down.\n",
/* 19*/ "Diving control center has been located.\n",
/* 20*/ "Critical mission personnel killed.\n",
/* 21*/ "Research data has been secured.\n",
/* 22*/ "\n",
/* 23*/ "\n",
/* 24*/ "Research data disk\n",
/* 25*/ "A research data disk\n",
/* 26*/ "Picked up a research data disk.\n",
/* 27*/ "Critical mission personnel have been killed.\n",
/* 28*/ "Lift door has been unlocked.\n",
/* 29*/ "Lift has been activated.\n",
/* 30*/ "Operation denied - hangar doors still closed.\n",
/* 31*/ "Unlocking sequence has been reset.\n",
/* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n",
/* 33*/ "Elvis has been killed.\n",
/* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n",
/* 35*/ "Civilians have been killed.\n",
/* 36*/ "Critical mission object has been destroyed.\n",
/* 37*/ "Alarm has been activated.\n",
/* 38*/ "Alarm has been deactivated.\n",
/* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n",
/* 40*/ "I hope the government don't want to use this ship anytime soon.\n",
/* 41*/ "Do you think we were a little heavy-handed?\n",
/* 42*/ "Naaahhhh.\n",
/* 43*/ "Pull the plug on that now.\n",
/* 44*/ "Switch this thing off.\n",
/* 45*/ "I'll shut it down.\n",
/* 46*/ "Please don't hurt me.\n",
/* 47*/ "Die, you traitors.\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Sécuriser labos et données de recherche\n\nNous voulons les informations recueillies par la dataDyne sur ce projet. Sécurisez les labos du pont scientifique et souvenez-vous d'assommer les scientifiques et les techniciens du site. Nous les interrogerons plus tard.\n\n|Objectif 3: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours.\n\n|Objectif 4: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 5: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n",
/* 1*/ "Vaisseau Cetan\n",
/* 2*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 4: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n",
/* 3*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n",
/* 4*/ "\n",
/* 5*/ "Désactiver GPS et Auto-pilote\n",
/* 6*/ "Désactiver source d'énergie principale\n",
/* 7*/ "Sécuriser labos et données de recherche\n",
/* 8*/ "Activer l'ascenseur du sas\n",
/* 9*/ "Retrouver Elvis et s'enfuir avec lui\n",
/* 10*/ "On sabote les moteurs et le vaisseau \ndérivera... Parfait!\n",
/* 11*/ "Le sous-marin doit être contrôlé d'ici. \n",
/* 12*/ "Sans auto-pilote ni GPS, l'appareil \ns'éloignera de la station. \n",
/* 13*/ "Ils ne pourront plus continuer l'opération \nsans énergie.\n",
/* 14*/ "Système auto-pilote désactivé.\n",
/* 15*/ "Système GPS désactivé.\n",
/* 16*/ "Objet crucial détruit.\n",
/* 17*/ "Porte de commande d'arrêt du réacteur ouverte.\n",
/* 18*/ "Réacteur désactivé.\n",
/* 19*/ "Centre de contrôle de plongée localisé.\n",
/* 20*/ "Personnel crucial abattu.\n",
/* 21*/ "Données de recherche sécurisées.\n",
/* 22*/ "\n",
/* 23*/ "\n",
/* 24*/ "Disque de recherche\n",
/* 25*/ "Un disque de recherche\n",
/* 26*/ "Disque de recherche obtenu.\n",
/* 27*/ "Personnel crucial abattu.\n",
/* 28*/ "Porte ascenseur déverrouillée.\n",
/* 29*/ "Ascenseur activé.\n",
/* 30*/ "Opération refusée - portes du hangar fermées.\n",
/* 31*/ "Séquence de déverrouillage réinitialisée.\n",
/* 32*/ "Vas-y. Je sécurise le périmètre. \nOn se retrouve plus tard.\n",
/* 33*/ "Elvis a été abattu.\n",
/* 34*/ "Qu'est-ce que tu faisais? Suis-moi... \nOn décampe.\n",
/* 35*/ "Des civils ont été abattus.\n",
/* 36*/ "Objet crucial détruit.\n",
/* 37*/ "Alarme activée.\n",
/* 38*/ "Alarme désactivée.\n",
/* 39*/ "Bien. L'opération de plongée a été annulée à la surface. \nIl est temps de piquer une tête.\n",
/* 40*/ "J'espère que le gouvernement ne compte pas utiliser ce vaisseau tout de suite.\n",
/* 41*/ "On y est allé un peu fort, non?\n",
/* 42*/ "Mais non.\n",
/* 43*/ "Débranche ce truc.\n",
/* 44*/ "Eteins-moi ça.\n",
/* 45*/ "Je vais l'éteindre.\n",
/* 46*/ "Ne me faites pas de mal!\n",
/* 47*/ "Crevez, charognes!\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Sichern Sie die Daten der Forschungen!\n\nWir wollen sämtliche Informationen, die dataDyne bis dato über dieses Projekt gesammelt hat. Sichern Sie die Laboratorien am Forschungs-Deck, und setzen Sie die anwesenden Wissenschaftler und Techniker außer Gefecht. Vergessen Sie nicht, dass wir sie später noch verhören wollen!\n\n|3. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|4. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|5. Ziel: - Treffen Sie sich mit Elvis, und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n",
/* 1*/ "Cetanisches Schiff\n",
/* 2*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|4. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n",
/* 3*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n",
/* 4*/ "\n",
/* 5*/ "Deaktivieren Sie den Autopiloten!\n",
/* 6*/ "Setzen Sie den Generator außer Kraft!\n",
/* 7*/ "Sichern Sie die Daten!\n",
/* 8*/ "Aktivieren Sie den Moon Pool-Aufzug!\n",
/* 9*/ "Flüchten Sie gemeinsam mit Elvis!\n",
/* 10*/ "Leg die Maschinen lahm, dann \ndriftet das Schiff ab... Perfekt!\n",
/* 11*/ "Von hier aus wird das Schiff gesteuert.\n",
/* 12*/ "Ohne Autopilot und GPS kann das Schiff \nseine Position nicht halten.\n",
/* 13*/ "Das Schiff wird ohne Stromzufuhr völlig \nnavigationsunfähig sein.\n",
/* 14*/ "Autopilot wurde deaktiviert\n",
/* 15*/ "GPS-System wurde deaktiviert\n",
/* 16*/ "Wichtiges Objekt wurde zerstört\n",
/* 17*/ "Reaktor-Kontrollkonsole geöffnet\n",
/* 18*/ "Reaktor wurde abgeschaltet.\n",
/* 19*/ "Tauch-Kontrollzentrum wurde geortet.\n",
/* 20*/ "Wichtige Person neutralisiert\n",
/* 21*/ "Forschungsdaten wurden gesichert.\n",
/* 22*/ "\n",
/* 23*/ "\n",
/* 24*/ "Sicherungsdiskette\n",
/* 25*/ "Eine Sicherungsdiskette\n",
/* 26*/ "Sicherungsdiskette aufgenommen\n",
/* 27*/ "Wichtige Personen wurden neutralisiert.\n",
/* 28*/ "Aufzugstür wurde entriegelt.\n",
/* 29*/ "Aufzug wurde aktiviert.\n",
/* 30*/ "Unzulässige Operation - Die Hangartüren sind noch geschlossen.\n",
/* 31*/ "Entriegelungssequenz wurde abgebrochen.\n",
/* 32*/ "Du gehst voraus, Jo. Ich sichere das Gelände. \nWir treffen uns später.\n",
/* 33*/ "Elvis wurde neutralisiert.\n",
/* 34*/ "Joanna... Was hat dich aufgehalten? Folge mir! \nLass uns von dieser Rostschüssel verschwinden.\n",
/* 35*/ "Zivile Verluste!!!\n",
/* 36*/ "Wichtiges Objekt wurde zerstört.\n",
/* 37*/ "Alarm wurde aktiviert.\n",
/* 38*/ "Alarm wurde deaktiviert.\n",
/* 39*/ "Korrekt. Die Operation wurde an der Oberfläche unterbrochen.\nZeit für ein wenig Badevergnügen.\n",
/* 40*/ "Ich hoffe, die Regierung will dieses Schiff so rasch nicht benutzen.\n",
/* 41*/ "Glaubst du, wir waren ein wenig zu grob?\n",
/* 42*/ "Ach, stell Dich nicht so mädchenhaft an!\n",
/* 43*/ "Zieh den Stecker raus!\n",
/* 44*/ "Schalte das Ding ab!\n",
/* 45*/ "Ich schalte es ab.\n",
/* 46*/ "Bitte tu mir nichts.\n",
/* 47*/ "Jetzt seid ihr dran, Verräter.\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Chiudi a chiave i laboratori\n\nVogliamo ogni informazione che la dataDyne abbia raccolto su questo progetto. Chiudi a chiave i laboratori sul piano per la ricerca scientifica e stordisci gli scienziati e i tecnici che lavorano lì: li interrogheremo più tardi.\n\n|Obiettivo 3: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 4: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 5: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n",
/* 1*/ "Astronave Cetan\n",
/* 2*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 4: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n",
/* 3*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n",
/* 4*/ "\n",
/* 5*/ "Disattiva il GPS e il pilota automatico\n",
/* 6*/ "Disattiva la fonte d'energia primaria\n",
/* 7*/ "Chiudi a chiave i laboratori\n",
/* 8*/ "Attiva il sollevatore del Moon Pool\n",
/* 9*/ "Incontro e fuga con Elvis\n",
/* 10*/ "Disattivando il motore il sottomarino\n andrà alla deriva... Perfetto!\n",
/* 11*/ "Ah, ecco da dove si controlla il sommergibile!\n",
/* 12*/ "Senza il pilota automatico e il GPS, il sottomarino \nsi allontanerà dalla sua posizione.\n",
/* 13*/ "Senza energia non riusciranno a \ncondurre nessuna operazione.\n",
/* 14*/ "Disattivato pilota automatico.\n",
/* 15*/ "Disattivato sistema GPS.\n",
/* 16*/ "Distrutto strumento essenziale alla missione.\n",
/* 17*/ "Aperto sportello comandi del reattore.\n",
/* 18*/ "Disattivato il reattore.\n",
/* 19*/ "Localizzato centro di comando immersione.\n",
/* 20*/ "Ucciso personale essenziale alla missione.\n",
/* 21*/ "I dati di ricerca sono al sicuro.\n",
/* 22*/ "\n",
/* 23*/ "\n",
/* 24*/ "Disco dati di ricerca\n",
/* 25*/ "Disco dati di ricerca\n",
/* 26*/ "Preso disco dati di ricerca.\n",
/* 27*/ "Ucciso personale essenziale alla missione.\n",
/* 28*/ "Aperta porta sollevatore.\n",
/* 29*/ "Attivato sollevatore.\n",
/* 30*/ "Operazione impossibile - Porte hangar ancora chiuse.\n",
/* 31*/ "La sequenza di sblocco è stata resettata.\n",
/* 32*/ "Va avanti tu, Jo. Io ti copro le spalle! \nCi vediamo dopo!\n",
/* 33*/ "Elvis è stato ucciso.\n",
/* 34*/ "Joanna, qualche problema? Dai, seguimi, \nusciamo da 'sta bagnarola!\n",
/* 35*/ "Uccisi dei civili.\n",
/* 36*/ "Distrutto strumento essenziale alla missione.\n",
/* 37*/ "Attivato allarme.\n",
/* 38*/ "Disattivato allarme.\n",
/* 39*/ "Bene. Sembra proprio che le operazioni \ndi immersione siano finite per ora! \nFacciamoci una nuotata...\n",
/* 40*/ "Spero bene che il governo non intenda usare questo sottomarino tanto presto!\n",
/* 41*/ "Dici che abbiamo avuto un po'\ntroppo la mano pesante?\n",
/* 42*/ "Ma va là!!!\n",
/* 43*/ "E ora stacca la spina!\n",
/* 44*/ "Spegni 'sto coso!\n",
/* 45*/ "Ora lo chiudo!\n",
/* 46*/ "Non farmi del male!\n",
/* 47*/ "Crepa, traditore!\n",
};

View File

@ -1,52 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objetivo Dos: - Asegurar los Laboratorios y Datos de Investigación\n\nQueremos cualquier información que dataDyne haya reunido sobre este proyecto. Asegura los laboratorios de la cubierta de ciencias y recuerda aturdir a los científicos y técnicos que allí trabajan; queremos interrogarles más tarde.\n\n|Objectivo Tres: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Cuatro: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cinco: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n",
/* 1*/ "Nave Cetan\n",
/* 2*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cuatro: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n",
/* 3*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n",
/* 4*/ "\n",
/* 5*/ "Desactivar GPS y piloto automático\n",
/* 6*/ "Desactivar fuente primaria de energía\n",
/* 7*/ "Asegurar laboratorios y datos\n",
/* 8*/ "Activar el ascensor de la piscina\n",
/* 9*/ "Encontrar y escapar con Elvis\n",
/* 10*/ "Estropea los motores y la nave irá \na la deriva... ¡Perfecto!\n",
/* 11*/ "Desde aquí se debe controlar el submarino.\n",
/* 12*/ "Sin el piloto automático y el GPS, la nave \ndeambulará fuera de la estación.\n",
/* 13*/ "No podrán realizar ninguna operación \nsin energía.\n",
/* 14*/ "El sistema de piloto automático ha sido desactivado.\n",
/* 15*/ "El sistema GPS ha sido desactivado.\n",
/* 16*/ "Objeto crítico de la misión destruido.\n",
/* 17*/ "Escotilla del control de apagado del reactor abierta.\n",
/* 18*/ "El reactor ha sido apagado.\n",
/* 19*/ "El centro de control de buceo ha sido localizado.\n",
/* 20*/ "Ha muerto personal crítico de la misión.\n",
/* 21*/ "Datos de investigación asegurados.\n",
/* 22*/ "\n",
/* 23*/ "\n",
/* 24*/ "Disco de datos\n",
/* 25*/ "Un disco de datos de investigación\n",
/* 26*/ "Disco de datos de investigación obtenido.\n",
/* 27*/ "Ha muerto personal crítico de la misión.\n",
/* 28*/ "La puerta del ascensor ha sido abierta.\n",
/* 29*/ "El ascensor ha sido activado.\n",
/* 30*/ "Operación denegada: puertas del hangar todavía cerradas.\n",
/* 31*/ "La secuencia de desbloqueo ha sido reinicializada.\n",
/* 32*/ "Ve delante, Joanna. Aseguraré el perímetro. \nNos vemos más tarde.\n",
/* 33*/ "Elvis ha muerto.\n",
/* 34*/ "Joanna... ¿Por qué has tardado tanto? Sígueme. \nSalgamos de esta vieja bañera.\n",
/* 35*/ "Han muerto civiles.\n",
/* 36*/ "Objeto crítico de la misión destruido.\n",
/* 37*/ "La alarma ha sido activada.\n",
/* 38*/ "La alarma ha sido desactivada.\n",
/* 39*/ "Correcto. La operación de buceo ha sido desbaratada en la superficie. \nEs la hora del baño.\n",
/* 40*/ "Espero que el gobierno no quiera usar esta nave en breve.\n",
/* 41*/ "¿Piensas que fuimos un poquito torpes?\n",
/* 42*/ "Nooohhhh.\n",
/* 43*/ "Tira del enchufe ahora.\n",
/* 44*/ "Apaga esa cosa.\n",
/* 45*/ "Lo apagaré.\n",
/* 46*/ "Por favor, no me hagas daño.\n",
/* 47*/ "Morid, traidores...\n",
};

View File

@ -1,88 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/* 1*/ "G5 BUILDING\n",
/* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Disable damping field generator\n",
/* 10*/ "Deactivate laser grid systems\n",
/* 11*/ "Holograph meeting conspirators\n",
/* 12*/ "Retrieve Dr. Caroll backup from safe\n",
/* 13*/ "Exit building\n",
/* 14*/ "Obtain alpha key card.\n",
/* 15*/ "Guard's\n",
/* 16*/ "Level 1 key card\n",
/* 17*/ "Guard's key card\n",
/* 18*/ "Picked up guard's key card.\n",
/* 19*/ "Obtain alpha key card.\n",
/* 20*/ "Guard's\n",
/* 21*/ "Level 2 key card\n",
/* 22*/ "Guard's key card\n",
/* 23*/ "Picked up guard's key card.\n",
/* 24*/ "Mission critical object destroyed.\n",
/* 25*/ "Damping field generator shut down.\n",
/* 26*/ "Generator cannot be restarted.\n",
/* 27*/ "Laser grid unit shut down.\n",
/* 28*/ "Laser grid unit activated.\n",
/* 29*/ "All laser grid systems shut down.\n",
/* 30*/ "Obtain DAT tape.\n",
/* 31*/ "Dr. Caroll's\n",
/* 32*/ "Backup disk\n",
/* 33*/ "Backup disk\n",
/* 34*/ "Picked up backup disk.\n",
/* 35*/ "Door Decoder attached to access pad.\n",
/* 36*/ "Initiating cracking routines.\n",
/* 37*/ "Door Decoder finished - door unlocked.\n",
/* 38*/ "INTRUDER ALERT - all security to the vault.\n",
/* 39*/ "Door Decoder placed correctly.\n",
/* 40*/ "Door Decoder incorrectly positioned.\n",
/* 41*/ "Conspirators have been alerted.\n",
/* 42*/ "Alarm activated.\n",
/* 43*/ "Alarm deactivated.\n",
/* 44*/ "Safe door is locked.\n",
/* 45*/ "Door Decoder attached.\n",
/* 46*/ "Obtain Door Exploder.\n",
/* 47*/ "Dr. Caroll's\n",
/* 48*/ "Door Exploder\n",
/* 49*/ "Door Exploder\n",
/* 50*/ "Picked up Door Exploder.\n",
/* 51*/ "Objectives incomplete - MISSION FAILED.\n",
/* 52*/ "MISSION SUCCESSFUL\n",
/* 53*/ "Communications bug placed correctly.\n",
/* 54*/ "Communications bug placed incorrectly.\n",
/* 55*/ "Obtain CamSpy.\n",
/* 56*/ "Dr. Caroll's\n",
/* 57*/ "CamSpy\n",
/* 58*/ "A CamSpy\n",
/* 59*/ "Picked up a CamSpy.\n",
/* 60*/ "There's no way through while those \nlasers are active.\n",
/* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n",
/* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n",
/* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n",
/* 64*/ "Mission critical object destroyed.\n",
/* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n",
/* 66*/ "\n",
/* 67*/ "\n",
/* 68*/ "Detonator\n",
/* 69*/ "Detonator\n",
/* 70*/ "Picked up Detonator.\n",
/* 71*/ "CamSpy has been destroyed - abort mission.\n",
/* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n",
/* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n",
/* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n",
/* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n",
/* 76*/ "Could it be you overestimated your \ninfluence over him?\n",
/* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n",
/* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n",
/* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n",
/* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n",
/* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n",
/* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n",
/* 83*/ "Area 51? But what about the President?\n",
};

View File

@ -1,88 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|€€竄п<EFBD82>\n\n€<EFBFBD>€符キ<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>∀ユ∩⊃€ツ♪<EFBFBD>∩♭€<EFBFBD>о窶ニ€€<EFBFBD>∵ぼ∝√⇔⊇≫<EFBFBD><EFBFBD>€€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD>с∈ΓΔ∀<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>タ≫Å<EFBFBD><EFBFBD>€<EFBFBD>ソ≒<EFBFBD><EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n€<EFBFBD>€普劇<EFBFBD>€<EFBFBD><EFBFBD>求ク€ユ°<EFBFBD>€€<EFBFBD>о<EFBFBD><EFBFBD>€€<EFBFBD>クはヮ<EFBFBD>⇔⊇≫€ツぉ∈なに<EFBFBD>ヮワ<EFBFBD>€÷ミ€<EFBFBD>о<EFBFBD><EFBFBD><EFBFBD>≡⊂∀<EFBFBD><EFBFBD>♭┛Χ<EFBFBD><EFBFBD>€€€<EFBFBD>о<EFBFBD>諱ホ√†€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≫Å∽⊂€ツ∧<EFBFBD>€<EFBFBD>∀す∠<EFBFBD>€<EFBFBD>€€€艢ツ\n\n|しじ€操セρΖこご€€€<C280>€€麾氈マ\n\n<EFBFBD><EFBFBD>€<EFBFBD><EFBFBD>п€€<EFBFBD><EFBFBD>⊆≫は€÷ユ€<EFBFBD>€ム∵<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>λえ∈こ<EFBFBD>⇔⊇≫€ツ∧√∈€€麾氈マ<EFBFBD>√†€÷ユ€<EFBFBD>€<EFBFBD>ΓΔ∈€€€<EFBFBD>€縲マぅう<EFBFBD>え≫<EFBFBD>∀∵ぃい∀∃≫<EFBFBD>€\n\n|しじ€逐セ€<EFBDBE>п≠о<E289A0>€<EFBFBD>ハ♀∈€€麾氈マ\n\n€<EFBFBD>€普劇<EFBFBD>メλυ€<EFBFBD>€<EFBFBD>ハ♀∈рщ<EFBFBD><EFBFBD>€÷<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀<EFBFBD>€轢ハ€縲福оラ∵<EFBFBD>≪⊥∬≒<EFBFBD>√⇔⊇≫<EFBFBD>∀∵なゃ<EFBFBD>€€<EFBFBD>п≠пモ€÷<EFBFBD>о窶ニ€€<EFBFBD>€<EFBFBD>о<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∬≡⊂<EFBFBD><EFBFBD>√⇔⊇≫∵€<EFBFBD><EFBFBD>€€€€焉ク€€麾氈マ<EFBFBD><EFBFBD><EFBFBD>⊃†€≦凵モ<EFBFBD><EFBFBD>€\n\n|しじ€凍セ€<EFBDBE>о窶ニ€€<EFBE8F><EFBFBD><E28888><EFBFBD>\n\n€€<EFBFBD>€ム∈<EFBFBD>⊃†€÷ユ€€マ♀€<EFBFBD>ノ¬<EFBFBD>Ψ♯∩√∃⊇≡⊂<EFBFBD>€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€楳セ┳<EFBDBE><E294B3>°€€€€ハ£∈<EFBFA1>\n\n€€€<EFBFBD>€€<EFBFBD>ソ≒<EFBFBD>п<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>≡≫∀€÷<EFBFBD>€普劇<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€朽ハ€€€ハ£<EFBFBD>€≠ロ<EFBFBD>€℡ア<EFBFBD>€<EFBFBD>謔コる<EFBFBD>√⇔⊇≫∀<EFBFBD><EFBFBD>∀Å€ツゆ<EFBFBD>√∈ぴψ♭<EFBFBD>√†€普モん∝√∀━∝√≫€ソ⇒⇔<EFBFBD>€€€<EFBFBD>€€<EFBFBD>メ┳<EFBFBD>∈ぴт<EFBFBD><EFBFBD>∀∵♭<EFBFBD><EFBFBD>€\n\n|しじ€斧セ€<E280B2>ソ≒<EFBDBF><EFBFBD>\n\n€€€縺ナ⇔€<EFBFBD><EFBFBD>о繞」<EFBFBD>∈づ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∈ばぱ<EFBFBD><EFBFBD>€ツ♪<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€€€縺ナ∩≡<EFBFBD>━⊇ぁ<EFBFBD><EFBFBD>€\n\nEND\n",
/* 1*/ "€<EFBFBD>€普劇<EFBFBD>n",
/* 2*/ "|€€竄п<EFBD82>\n\n€<EFBFBD>€符キ<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>∀ユ∩⊃€ツ♪<EFBFBD>∩♭€<EFBFBD>о窶ニ€€<EFBFBD>∵ぼ∝√⇔⊇≫<EFBFBD><EFBFBD>€€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD>с∈ΓΔ∀<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>タ≫Å<EFBFBD><EFBFBD>€<EFBFBD>ソ≒<EFBFBD><EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n€<EFBFBD>€普劇<EFBFBD>€<EFBFBD><EFBFBD>求ク€ユ°<EFBFBD>€€<EFBFBD>о<EFBFBD><EFBFBD>€€<EFBFBD>クはヮ<EFBFBD>⇔⊇≫€ツぉ∈なに<EFBFBD>ヮワ<EFBFBD>€÷ミ€<EFBFBD>о<EFBFBD><EFBFBD><EFBFBD>≡⊂∀<EFBFBD><EFBFBD>♭┛Χ<EFBFBD><EFBFBD>€€€<EFBFBD>о<EFBFBD>諱ホ√†€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≫Å∽⊂€ツ∧<EFBFBD>€<EFBFBD>∀す∠<EFBFBD>€<EFBFBD>€€€艢ツ\n\n|しじ€操セ€<EFBDBE>п≠о<E289A0>€<EFBFBD>ハ♀∈€€麾氈マ\n\n€<EFBFBD>€普劇<EFBFBD>メλυ€<EFBFBD>€<EFBFBD>ハ♀∈рщ<EFBFBD><EFBFBD>€÷<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀<EFBFBD>€轢ハ€縲福оラ∵<EFBFBD>≪⊥∬≒<EFBFBD>√⇔⊇≫<EFBFBD>∀∵なゃ<EFBFBD>€€<EFBFBD>п≠пモ€÷<EFBFBD>о窶ニ€€<EFBFBD>€<EFBFBD>о<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∬≡⊂<EFBFBD><EFBFBD>√⇔⊇≫∵€<EFBFBD><EFBFBD>€€€€焉ク€€麾氈マ<EFBFBD><EFBFBD><EFBFBD>⊃†€≦凵モ<EFBFBD><EFBFBD>€\n\n|しじ€逐セ€<EFBDBE>о窶ニ€€<EFBE8F><EFBFBD><E28888><EFBFBD>\n\n€€<EFBFBD>€ム∈<EFBFBD>⊃†€÷ユ€€マ♀€<EFBFBD>ノ¬<EFBFBD>Ψ♯∩√∃⊇≡⊂<EFBFBD>€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€凍セ┳<EFBDBE><E294B3>°€€€€ハ£∈<EFBFA1>\n\n€€€<EFBFBD>€€<EFBFBD>ソ≒<EFBFBD>п<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>≡≫∀€÷<EFBFBD>€普劇<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€朽ハ€€€ハ£<EFBFBD>€≠ロ<EFBFBD>€℡ア<EFBFBD>€<EFBFBD>謔コる<EFBFBD>√⇔⊇≫∀<EFBFBD><EFBFBD>∀Å€ツゆ<EFBFBD>√∈ぴψ♭<EFBFBD>√†€普モん∝√∀━∝√≫€ソ⇒⇔<EFBFBD>€€€<EFBFBD>€€<EFBFBD>メ┳<EFBFBD>∈ぴт<EFBFBD><EFBFBD>∀∵♭<EFBFBD><EFBFBD>€\n\n|しじ€楳セ€<E280B2>ソ≒<EFBDBF><EFBFBD>\n\n€€€縺ナ⇔€<EFBFBD><EFBFBD>о繞」<EFBFBD>∈づ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∈ばぱ<EFBFBD><EFBFBD>€ツ♪<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€€€縺ナ∩≡<EFBFBD>━⊇ぁ<EFBFBD><EFBFBD>€\n\nEND\n",
/* 3*/ "|€€竄п<EFBD82>\n\n€<EFBFBD>€符キ<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>∀ユ∩⊃€ツ♪<EFBFBD>∩♭€<EFBFBD>о窶ニ€€<EFBFBD>∵ぼ∝√⇔⊇≫<EFBFBD><EFBFBD>€€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD>с∈ΓΔ∀<EFBFBD><EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>タ≫Å<EFBFBD><EFBFBD>€<EFBFBD>ソ≒<EFBFBD><EFBFBD>€\n\n|€€€<EFBE8B>€縲マ€\n\n€<EFBFBD>€普劇<EFBFBD>€<EFBFBD><EFBFBD>求ク€ユ°<EFBFBD>€€<EFBFBD>о<EFBFBD><EFBFBD>€€<EFBFBD>クはヮ<EFBFBD>⇔⊇≫€ツぉ∈なに<EFBFBD>ヮワ<EFBFBD>€÷ミ€<EFBFBD>о<EFBFBD><EFBFBD><EFBFBD>≡⊂∀<EFBFBD><EFBFBD>♭┛Χ<EFBFBD><EFBFBD>€€€<EFBFBD>о<EFBFBD>諱ホ√†€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃≫Å∽⊂€ツ∧<EFBFBD>€<EFBFBD>∀す∠<EFBFBD>€<EFBFBD>€€€艢ツ\n\n|しじ€操セ€<EFBDBE>о窶ニ€€<EFBE8F><EFBFBD><E28888><EFBFBD>\n\n€€<EFBFBD>€ム∈<EFBFBD>⊃†€÷ユ€€マ♀€<EFBFBD>ノ¬<EFBFBD>Ψ♯∩√∃⊇≡⊂<EFBFBD>€÷<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n\n|しじ€逐セ┳<EFBDBE><E294B3>°€€€€ハ£∈<EFBFA1>\n\n€€€<EFBFBD>€€<EFBFBD>ソ≒<EFBFBD>п<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>≡≫∀€÷<EFBFBD>€普劇<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€朽ハ€€€ハ£<EFBFBD>€≠ロ<EFBFBD>€℡ア<EFBFBD>€<EFBFBD>謔コる<EFBFBD>√⇔⊇≫∀<EFBFBD><EFBFBD>∀Å€ツゆ<EFBFBD>√∈ぴψ♭<EFBFBD>√†€普モん∝√∀━∝√≫€ソ⇒⇔<EFBFBD>€€€<EFBFBD>€€<EFBFBD>メ┳<EFBFBD>∈ぴт<EFBFBD><EFBFBD>∀∵♭<EFBFBD><EFBFBD>€\n\n|しじ€凍セ€<E280B2>ソ≒<EFBDBF><EFBFBD>\n\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∈に⇒<EFBFBD>€<EFBFBD>∩≒<EFBFBD><EFBFBD><EFBFBD>€\n\nEND\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "ρΖこご€€€<EFBFBD>€€麾氈マ\n",
/* 10*/ "€<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀∈€€麾氈マ\n",
/* 11*/ "€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n",
/* 12*/ "<EFBFBD><EFBFBD>°€€€€ハ£∈<EFBFBD>\n",
/* 13*/ "€<EFBFBD>ソ≒<EFBFBD><EFBFBD>\n",
/* 14*/ "Obtain alpha key card.\n",
/* 15*/ "Guard's\n",
/* 16*/ "€・↑€操ユd♀€ヨd\n",
/* 17*/ "€・↑€操ユd♀€ヨd\n",
/* 18*/ "€<EFBFBD><EFBFBD>操ユ€∈み<EFBFBD><EFBFBD>\n",
/* 19*/ "Obtain alpha key card.\n",
/* 20*/ "Guard's\n",
/* 21*/ "€・↑€逐ユd♀€ヨd\n",
/* 22*/ "€・↑€逐ユd♀€ヨd\n",
/* 23*/ "€<EFBFBD><EFBFBD>逐ユ€∈み<EFBFBD><EFBFBD>\n",
/* 24*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 25*/ "ρΖこご€€€<EFBFBD>諤ィ€麾氈ト√\n",
/* 26*/ "ρΖこご€€€<EFBFBD>モつづて♭<EFBFBD><EFBFBD><EFBFBD>\n",
/* 27*/ "€<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀∵€€麾氈ト√\n\n",
/* 28*/ "€<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀∵€€<EFBFBD>\n\n",
/* 29*/ "ュ⇔<EFBFBD>€<EFBFBD>п≠о<EFBFBD>€<EFBFBD>ハ♀∵€€麾氈マ<EFBFBD>\n\n",
/* 30*/ "Obtain DAT tape.\n",
/* 31*/ "Dr. Caroll's\n",
/* 32*/ "°€ハ€ラ€ミ€ハ£♂d€゚\n",
/* 33*/ "°€ハ€ラ€ミ€ハ£♂d€゚\n",
/* 34*/ "°€€€€ハ£♂€゚∈み<EFBFBD><EFBFBD>\n",
/* 35*/ "♀€ミ€ルd≧∵€ン€ハ€縺ト√∨\n",
/* 36*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€蚕n",
/* 37*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€巡刋ハ<EFBFBD>€兤ハ€ラ∵<EFBFBD>\n",
/* 38*/ "<EFBFBD><EFBFBD><EFBFBD>なに€巡刋ハ<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 39*/ "€€≧∵<EFBFBD><EFBFBD><EFBFBD>€€€縺ト√\n",
/* 40*/ "€€≧∵<EFBFBD><EFBFBD><EFBFBD>€€€縺ト√⇔⊇<EFBFBD><EFBFBD>\n",
/* 41*/ "€<EFBFBD>о窶ニ€€<EFBFBD><EFBFBD>\n",
/* 42*/ "€€<EFBFBD>о<EFBFBD>€\n",
/* 43*/ "€€<EFBFBD>о<EFBFBD>€麾歃n",
/* 44*/ "<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>€兤ハ€<EFBFBD>√⇔⊇<EFBFBD><EFBFBD>\n",
/* 45*/ "♀€ミ€ルd≧∵€ン€ハ€縺ト√∨\n",
/* 46*/ "Obtain Door Exploder.\n",
/* 47*/ "Dr. Caroll's\n",
/* 48*/ "Door Exploder\n",
/* 49*/ "Door Exploder\n",
/* 50*/ "Picked up Door Exploder.\n",
/* 51*/ "€<EFBFBD>€€€マん<EFBFBD>€盾オじん<EFBFBD>\n",
/* 52*/ "€<EFBFBD>€€€Τ\n",
/* 53*/ "Communications bug placed correctly.\n",
/* 54*/ "Communications bug placed incorrectly.\n",
/* 55*/ "Obtain CamSpy.\n",
/* 56*/ "Dr. Caroll's\n",
/* 57*/ "€€<EFBFBD>€\n",
/* 58*/ "€€<EFBFBD>€\n",
/* 59*/ "€€<EFBFBD>€ム∈ぴψ<EFBFBD>\n",
/* 60*/ "<EFBFBD>∋∃€<EFBFBD>п≠п諱コ≫<EFBFBD><EFBFBD>€≠ッ<EFBFBD>す⊥∃⊇∝€\n",
/* 61*/ "<EFBFBD><EFBFBD><EFBFBD>€<EFBFBD>о窶ニ€€<EFBFBD>€<EFBFBD>о<EFBFBD><EFBFBD>蛟ツ\n€€<EFBFBD>€<EFBFBD>ぁと<EFBFBD>€\n",
/* 62*/ "<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∩∃≪<EFBFBD><EFBFBD>€\n€€≧♭⌒∩∃≪ン<EFBFBD>∵∩∩≫<EFBFBD>€\n",
/* 63*/ "Β<EFBFBD><EFBFBD>≫Å<EFBFBD><EFBFBD>€\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ロ∵∃<EFBFBD><EFBFBD>€\n",
/* 64*/ "しじメぼ<EFBFBD>あぃモ∃ャヤ∵ばぱ<EFBFBD>\n",
/* 65*/ "<EFBFBD><EFBFBD>€<EFBFBD>€€€艢エ\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\n",
/* 66*/ "\n",
/* 67*/ "\n",
/* 68*/ "<EFBFBD>\n",
/* 69*/ "<EFBFBD>\n",
/* 70*/ "<EFBFBD>∈み<EFBFBD><EFBFBD>\n",
/* 71*/ "€€<EFBFBD>€ム∵ばぱ<EFBFBD>€盾オじん<EFBFBD>\n",
/* 72*/ "<EFBFBD>€噫「∈<EFBFBD>⊇ヶ<EFBFBD>\n€<EFBFBD>€<EFBFBD><EFBFBD>クぬね<EFBFBD>€\np€噫「<EFBFBD><EFBFBD>⌒⊂€℡ア<EFBFBD>€<EFBFBD>諱ホ⊇<EFBFBD>\n⊆∋∃<EFBFBD><EFBFBD><EFBFBD>≒∃⊇<EFBFBD><EFBFBD>€\n",
/* 73*/ "<EFBFBD><EFBFBD><EFBFBD>√♭<EFBFBD><EFBFBD>∵ぺ¬€\n€噫「∈㍽<EFBFBD><EFBFBD><EFBFBD>♭ざ†<EFBFBD>†∃≒∃⊇€\np€噫「∵€<EFBFBD><EFBFBD><EFBFBD>クぷ⇒<EFBFBD>∀∈\n<EFBFBD><EFBFBD><EFBFBD>∃∩<EFBFBD><EFBFBD>€\n",
/* 74*/ "∧∋∃<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃⊇∝≡€\n<EFBFBD>∽♭€≠ロ<EFBFBD><EFBFBD>♪⊂∃<EFBFBD>€\n",
/* 75*/ "€<EFBFBD><EFBFBD>€€秩メ<EFBFBD><EFBFBD><EFBFBD>\nθικ∩≒<EFBFBD>€\n",
/* 76*/ "<EFBFBD><EFBFBD>€ικ∈€<EFBFBD>フ⊇<EFBFBD><EFBFBD>∃⊇∩€\n",
/* 77*/ "⊇∂€€潤ナ∩<EFBFBD>⊆∋∃<EFBFBD>€<EFBFBD>€ル∀<EFBFBD>€死ツ\nθ<EFBFBD><EFBFBD><EFBFBD>€≦ョ<EFBFBD>み∵<EFBFBD>⊃⇔⊆≫€\nικ∵┤<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>€\npΒ<EFBFBD>θικ<EFBFBD>€㊤ッ<EFBFBD>€<EFBFBD>ト⊃\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD>√†€蚕n",
/* 78*/ "€<EFBFBD>€≠アご∵<EFBFBD><EFBFBD>√†<EFBFBD>Α<EFBFBD>€\n<EFBFBD>€€€<EFBFBD>€縲マ∵<EFBFBD>√∈<EFBFBD>\np<EFBFBD><EFBFBD>€<EFBFBD>€<EFBFBD><EFBFBD>∋♭<EFBFBD>≫≡€\n",
/* 79*/ "€€€<EFBFBD>€縲マ<EFBFBD><EFBFBD><EFBFBD>\n<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>∃⊇≡€\np<EFBFBD><EFBFBD>€€艨メ<EFBFBD>ワ┸∵€轣求<EFBFBD><EFBFBD>辜ツ€\nが∵γ∋♭ヰ⇔⌒θ<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 80*/ "<EFBFBD>€コ√<EFBFBD><EFBFBD><EFBFBD>て⊇⇔⊇≫∋Å∃€\npゆ<EFBFBD>€∞ヒみ<EFBFBD>⊇∩∃⊇⌒<EFBFBD><EFBFBD><EFBFBD>€\np<EFBFBD>€㊤ョ<EFBFBD>€<EFBFBD><EFBFBD><EFBFBD>≫ン<EFBFBD>\n<EFBFBD><EFBFBD><EFBFBD>∀∈≡<EFBFBD>ゃ⊃⇔<EFBFBD>∋Å∃€\n",
/* 81*/ "<EFBFBD>¬≒€€€€<EFBFBD><EFBFBD>о€\nΓΔ∈え≪<EFBFBD><EFBFBD>€ツ├ヮ∈<EFBFBD><EFBFBD><EFBFBD>€\nικ∈€<EFBFBD>п梶ニ≫ョャ∵⊆≪<EFBFBD><EFBFBD>€\nロ⊇♭€о<EFBFBD>クみ<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 82*/ "€€€€<EFBFBD><EFBFBD>оラ≡€<EFBFBD><EFBFBD><EFBFBD>∃⊇€\n<EFBFBD><EFBFBD>∵で<EFBFBD>⊃⇔⊇≫<EFBFBD><EFBFBD>€<EFBFBD>謔ハ∝<EFBFBD>€\npヴ∵<EFBFBD>∋Å€<EFBFBD><EFBFBD>マ♀€<EFBFBD>ノ¬∵\n€轣求<EFBFBD>ヒε♭べ¬ぺ∀<EFBFBD>€\np€〝モ€<EFBFBD>€斧操<EFBFBD>ソ≒な<EFBFBD><EFBFBD>\n€<EFBFBD>€€<EFBFBD>メ≡⊂Å€ツぽ≒∵ф€\npゅ≪<EFBFBD><EFBFBD>€<EFBFBD>ユ∩<EFBFBD><EFBFBD>€\n<EFBFBD>€゚∽<EFBFBD><EFBFBD><EFBFBD>€\n",
/* 83*/ "€€<EFBFBD>€斧操タ€純ニικ<EFBFBD>♪⊂∃≫<EFBFBD>€\n",
};

View File

@ -1,88 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/* 1*/ "G5 BUILDING\n",
/* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Disable damping field generator\n",
/* 10*/ "Deactivate laser grid systems\n",
/* 11*/ "Holograph meeting conspirators\n",
/* 12*/ "Retrieve Dr. Caroll backup from safe\n",
/* 13*/ "Exit building\n",
/* 14*/ "Obtain alpha key card.\n",
/* 15*/ "Guard's\n",
/* 16*/ "Level 1 key card\n",
/* 17*/ "Guard's key card\n",
/* 18*/ "Picked up guard's key card.\n",
/* 19*/ "Obtain alpha key card.\n",
/* 20*/ "Guard's\n",
/* 21*/ "Level 2 key card\n",
/* 22*/ "Guard's key card\n",
/* 23*/ "Picked up guard's key card.\n",
/* 24*/ "Mission critical object destroyed.\n",
/* 25*/ "Damping field generator shut down.\n",
/* 26*/ "Generator cannot be restarted.\n",
/* 27*/ "Laser grid unit shut down.\n",
/* 28*/ "Laser grid unit activated.\n",
/* 29*/ "All laser grid systems shut down.\n",
/* 30*/ "Obtain DAT tape.\n",
/* 31*/ "Dr. Caroll's\n",
/* 32*/ "Backup disk\n",
/* 33*/ "Backup disk\n",
/* 34*/ "Picked up backup disk.\n",
/* 35*/ "Door Decoder attached to access pad.\n",
/* 36*/ "Initiating cracking routines.\n",
/* 37*/ "Door Decoder finished - door unlocked.\n",
/* 38*/ "INTRUDER ALERT - all security to the vault.\n",
/* 39*/ "Door Decoder placed correctly.\n",
/* 40*/ "Door Decoder incorrectly positioned.\n",
/* 41*/ "Conspirators have been alerted.\n",
/* 42*/ "Alarm activated.\n",
/* 43*/ "Alarm deactivated.\n",
/* 44*/ "Safe door is locked.\n",
/* 45*/ "Door Decoder attached.\n",
/* 46*/ "Obtain Door Exploder.\n",
/* 47*/ "Dr. Caroll's\n",
/* 48*/ "Door Exploder\n",
/* 49*/ "Door Exploder\n",
/* 50*/ "Picked up Door Exploder.\n",
/* 51*/ "Objectives incomplete - MISSION FAILED.\n",
/* 52*/ "MISSION SUCCESSFUL\n",
/* 53*/ "Communications bug placed correctly.\n",
/* 54*/ "Communications bug placed incorrectly.\n",
/* 55*/ "Obtain CamSpy.\n",
/* 56*/ "Dr. Caroll's\n",
/* 57*/ "CamSpy\n",
/* 58*/ "A CamSpy\n",
/* 59*/ "Picked up a CamSpy.\n",
/* 60*/ "There's no way through while those \nlasers are active.\n",
/* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n",
/* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n",
/* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n",
/* 64*/ "Mission critical object destroyed.\n",
/* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n",
/* 66*/ "\n",
/* 67*/ "\n",
/* 68*/ "Detonator\n",
/* 69*/ "Detonator\n",
/* 70*/ "Picked up Detonator.\n",
/* 71*/ "CamSpy has been destroyed - abort mission.\n",
/* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n",
/* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n",
/* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n",
/* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n",
/* 76*/ "Could it be you overestimated your \ninfluence over him?\n",
/* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n",
/* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n",
/* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n",
/* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n",
/* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n",
/* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n",
/* 83*/ "Area 51? But what about the President?\n",
};

View File

@ -1,88 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver le champ d'isolement\n\nUn appareil dans la zone du garage de l'immeuble empêche tout système d'enregistrement de fonctionner. Une fois coupée, la Camspy pourra transmettre les données au QG.\n\n|Objectif 2: - Désactiver les systèmes de grilles laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 3: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 4: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 5: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n",
/* 1*/ "IMMEUBLE G5\n",
/* 2*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver les systèmes de grille laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 2: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 3: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 4: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n",
/* 3*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 2: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 3: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Désactiver le champ d'isolement\n",
/* 10*/ "Désactiver les systèmes de grilles laser\n",
/* 11*/ "Holographier les conspirateurs\n",
/* 12*/ "Récupérer la sauvegarde dans le coffre\n",
/* 13*/ "Sortir de l'immeuble\n",
/* 14*/ "Obtenir carte alpha.\n",
/* 15*/ "Garde: \n",
/* 16*/ "Carte Niveau 1\n",
/* 17*/ "Carte du garde\n",
/* 18*/ "Carte du garde obtenue.\n",
/* 19*/ "Obtenir carte alpha.\n",
/* 20*/ "Garde: \n",
/* 21*/ "Carte Niveau 2\n",
/* 22*/ "Carte du garde\n",
/* 23*/ "Carte du garde obtenue.\n",
/* 24*/ "Objet crucial détruit.\n",
/* 25*/ "Générateur champ d'isolement coupé.\n",
/* 26*/ "Générateur ne peut être rallumé.\n",
/* 27*/ "Unité grilles laser coupée.\n",
/* 28*/ "Unité grilles laser activée.\n",
/* 29*/ "Tous systèmes grilles laser coupés.\n",
/* 30*/ "Obtenir cassette DAT.\n",
/* 31*/ "Dr. Caroll: \n",
/* 32*/ "Disque sauvegarde\n",
/* 33*/ "Disque sauvegarde\n",
/* 34*/ "Disque sauvegarde obtenu.\n",
/* 35*/ "Décodeur porte fixé sur panneau d'accès.\n",
/* 36*/ "Commandes piratages lancées.\n",
/* 37*/ "Décodage porte achevé - porte déverrouillée.\n",
/* 38*/ "ALERTE INTRUSION - sécurité dans l'abri.\n",
/* 39*/ "Décodeur porte placé correctement.\n",
/* 40*/ "Décodeur porte mal placé.\n",
/* 41*/ "Conspirateurs alertés.\n",
/* 42*/ "Alarme activée.\n",
/* 43*/ "Alarme désactivée.\n",
/* 44*/ "Porte du coffre fermée.\n",
/* 45*/ "Décodeur porte fixé.\n",
/* 46*/ "Obtenir explosif porte.\n",
/* 47*/ "Dr. Caroll: \n",
/* 48*/ "Explosif porte\n",
/* 49*/ "Explosif porte\n",
/* 50*/ "Explosif porte obtenu.\n",
/* 51*/ "Objectifs incomplets - MISSION ECHOUEE.\n",
/* 52*/ "MISSION ACCOMPLIE\n",
/* 53*/ "Mouchard placé correctement.\n",
/* 54*/ "Mouchard mal placé.\n",
/* 55*/ "Obtenir CamSpy.\n",
/* 56*/ "Dr. Caroll: \n",
/* 57*/ "CamSpy\n",
/* 58*/ "Une CamSpy\n",
/* 59*/ "CamSpy obtenue.\n",
/* 60*/ "C'est impossible de passer avec tous \nces lasers activés.\n",
/* 61*/ "La salle de réunion doit être droit devant. \nIl est temps d'utiliser la CamSpy.\n",
/* 62*/ "La combinaison du coffre est très complexe. \nLe décodeur va mettre plus de temps.\n",
/* 63*/ "Il faut partir maintenant! Je retourne vite à \nla porte de tout à l'heure.\n",
/* 64*/ "Objet crucial détruit.\n",
/* 65*/ "Reculez, Joanna. Nous allons vous ouvrir \nun passage.\n",
/* 66*/ "\n",
/* 67*/ "\n",
/* 68*/ "Détonateur\n",
/* 69*/ "Détonateur\n",
/* 70*/ "Détonateur obtenue.\n",
/* 71*/ "CamSpy détruite - abandonner la mission.\n",
/* 72*/ "Nous avons récupéré le Sapiens chez Carrington \net changé son programme. Il n'a plus de \npersonnalité. Cela évitera de futurs \nincidents.\n",
/* 73*/ "Cela réduira son efficacité. Mon équipe le \nmènera au centre. Ils prendront donc \ndes risques inutiles. Vous auriez dû \nprévoir ce développement de conscience chez \nle Sapiens.\n",
/* 74*/ "Comment prévoir une chose pareille?! \nEt pourquoi suis-je la seule à porter \nle chapeau? Et lui alors?\n",
/* 75*/ "Le Président a-t-il refusé votre demande \nde prêt du Pelagic II?\n",
/* 76*/ "Pensiez-vous avoir tant d'influence \nsur lui?\n",
/* 77*/ "Non! J'ai peut-être sous-estimé son côté \nintègre. Mais nous avons un plan de \nsecours. Nous agirons dès que l'équipe \nprésidentielle arrivera à la base aérienne. \nJe n'ai besoin que d'un échantillon de la \npeau du Président.\n",
/* 78*/ "Pff! En admettant que vous ne fassiez pas \ntout foirer. Si Carrington en apprend \nsuffisamment, il appellera des renforts.\n",
/* 79*/ "Mr. Carrington ne bénéficiera d'aucune aide \nextérieure. L'équipement que vous nous \navez offert est installé au Nevada et est \nopérationnel. Nous pourrons ainsi intercepter \nleurs appareils.\n",
/* 80*/ "Notre dispositif fonctionne donc \ncorrectement? Bien. Notre philosophie \nest de détruire tout ce qui ne veut pas \nfonctionner. Souvenez-vous-en pendant \nl'exécution de votre 'plan de secours.'\n",
/* 81*/ "Agent Dark au rapport! Préparez-vous à \nrecevoir les données de la réunion. \nDemande prioritaire d'une équipe de \nl'Institut pour protéger le Président \navant son départ pour l'Alaska.\n",
/* 82*/ "Nous n'avons pas le temps, Agent Dark. \nIl y a du nouveau depuis le silence \nradio. L'appareil transportant les \n'amis' dont je parlais plus tôt a été \nabattu au-dessus du Nevada. Le tir \nprovenait du Secteur 51, là où les \nrescapés et les débris ont dû être amenés. \nRevenez au poste et préparez-vous \npour un départ imminent. \nCarrington, terminé.\n",
/* 83*/ "Secteur 51? Et le Président alors?\n",
};

View File

@ -1,88 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nAuf dem Garagen-Deck des Gebäudes befindet sich eine Vorrichtung, die den Einsatz jeglicher Rekorder verhindert. Finden Sie das Gerät und schalten Sie es ab! Anschließend sollte der CamSpy die Daten ohne Probleme übermitteln können.\n\n|2. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|3. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|4. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|5. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n",
/* 1*/ "G5-BUILDING\n",
/* 2*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|2. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|3. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|4. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n",
/* 3*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|2. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|3. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Setzen Sie den Generator außer Kraft!\n",
/* 10*/ "Deaktivieren Sie das Laser-Netz!\n",
/* 11*/ "Holografieren Sie die Verschwörer!\n",
/* 12*/ "Stehlen Sie die Sicherheitskopie!\n",
/* 13*/ "Verlassen Sie das Gebäude!\n",
/* 14*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n",
/* 15*/ "Level 1 Schlüsselkarte\n",
/* 16*/ "der Wache\n",
/* 17*/ "Schlüsselkarte der Wache\n",
/* 18*/ "Schlüsselkarte der Wache aufgenommen\n",
/* 19*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n",
/* 20*/ "Level 2 Schlüsselkarte\n",
/* 21*/ "der Wache\n",
/* 22*/ "Schlüsselkarte der Wache\n",
/* 23*/ "Schlüsselkarte der Wache aufgenommen\n",
/* 24*/ "Wichtiges Objekt wurde zerstört.\n",
/* 25*/ "Generator wurde abgeschaltet.\n",
/* 26*/ "Der Generator kann nicht wieder gestartet werden.\n",
/* 27*/ "Laser-Netz wurde deaktiviert.\n",
/* 28*/ "Laser-Netz wurde aktiviert.\n",
/* 29*/ "Das gesamte Laser-Netz wurde deaktiviert.\n",
/* 30*/ "Erlangen Sie das DAT-Tape.\n",
/* 31*/ "Dr. Carolls\n",
/* 32*/ "Sicherheitskopie\n",
/* 33*/ "Sicherheitskopie\n",
/* 34*/ "Sicherheitskopie aufgenommen\n",
/* 35*/ "Tür-Decoder wurde an der Konsole angebracht.\n",
/* 36*/ "Crack-Routine wurde initiiert.\n",
/* 37*/ "Crack-Vorgang abgeschlossen - Tür wurde entriegelt.\n",
/* 38*/ "ZUTRITTSVERLETZUNG - Alle Sicherheitskräfte sofort ins Kellergeschoß!\n",
/* 39*/ "Tür-Decoder wurde korrekt platziert.\n",
/* 40*/ "Tür-Decoder wurde nicht korrekt platziert.\n",
/* 41*/ "Die Verschwörer wurden alarmiert.\n",
/* 42*/ "Alarm wurde aktiviert.\n",
/* 43*/ "Alarm wurde deaktiviert.\n",
/* 44*/ "Die Safetür ist versperrt.\n",
/* 45*/ "Tür-Decoder wurde angebracht.\n",
/* 46*/ "Erlangen Sie den Sprengsatz.\n",
/* 47*/ "Dr. Carolls\n",
/* 48*/ "Sprengsatz\n",
/* 49*/ "Sprengsatz\n",
/* 50*/ "Sprengsatz aufgenommen\n",
/* 51*/ "Zielerreichung unvollständig - MISSION FEHLGESCHLAGEN!\n",
/* 52*/ "MISSION ERFOLGREICH\n",
/* 53*/ "Sender wurde korrekt platziert.\n",
/* 54*/ "Sender wurde nicht korrekt platziert.\n",
/* 55*/ "Erlangen Sie den CamSpy.\n",
/* 56*/ "Dr. Carolls\n",
/* 57*/ "CamSpy\n",
/* 58*/ "Ein CamSpy\n",
/* 59*/ "CamSpy aufgenommen\n",
/* 60*/ "Es gibt hier kein Weiterkommen, solange die \nLaser aktiv sind.\n",
/* 61*/ "Weiter vorne muss der Meeting-Raum sein.\nZeit für den CamSpy.\n",
/* 62*/ "Der Safe-Code ist sehr ausgeklügelt.\nDer Decoder wird etwas mehr Zeit benötigen.\n",
/* 63*/ "Zeit zu gehen! Ich muss zu der Tür, die ich \nvorhin 'präpariert' habe.\n",
/* 64*/ "Wichtiges Objekt wurde zerstört.\n",
/* 65*/ "Halten Sie Abstand, Joanna. Wir schaffen Ihnen einen\nFluchtweg.\n",
/* 66*/ "\n",
/* 67*/ "\n",
/* 68*/ "Detonator\n",
/* 69*/ "Detonator\n",
/* 70*/ "Detonator aufgenommen\n",
/* 71*/ "Der CamSpy wurde zerstört - Brechen Sie die Mission ab!\n",
/* 72*/ "Wir haben uns den Sapienten von Carrington zurückgeholt \nund sein Programm verändert. Es hat nun keine \nPersönlichkeit mehr. Daher sind auch keine \nweiteren Zwischenfälle mehr zu befürchten.\n",
/* 73*/ "Aber dadurch wird seine Effizienz reduziert. Mein Team muss \nnun selbst ins Zentrum vordringen. Sie \ngeraten dadurch in Gefahr! Sie hätten \nvoraussehen müssen, dass der Sapient \nin der Lage ist, Moral zu entwickeln.\n",
/* 74*/ "Niemand hätte das voraussehen können! Und ich \nlehne es ab, dafür verantwortlich gemacht zu \nwerden! Was ist mit ihm?\n",
/* 75*/ "Der Präsident hat die Anfrage nach der Pelagic II \nstrikt abgelehnt?\n",
/* 76*/ "Kann es sein, dass Sie Ihren Einfluss auf ihn \nein wenig überschätzt haben?\n",
/* 77*/ "Nein! Ich habe nur seine Entschlossenheit unterschätzt. \nWir haben einen Notfallplan parat, der in Kraft tritt, \nsobald die Air Force One am Stützpunkt landet. \nAlles, was ich brauche, ist eine Gewebeprobe des \nPräsidenten.\n",
/* 78*/ "Ha! Vorausgesetzt, es gibt keine Störmaßnahmen. \nWenn Carrington eins und eins zusammengezählt hat, \ndann ist Verstärkung schon unterwegs.\n",
/* 79*/ "Carrington wird keine Hilfe von außen erhalten. \nDie Technologie, die Sie uns zur Verfügung gestellt \nhaben, wurde in Nevada installiert und ist einsatzbereit. \nDamit können wir jedes Flugzeug vom Himmel holen.\n",
/* 80*/ "Die Vorrichtung arbeitet also einwandfrei? Gut. Wir \nsind der Meinung, dass alles, was nicht korrekt arbeitet, \nzerstört werden muss. Ziehen Sie das in Betracht, \nwenn Sie daran gehen, Ihren 'Plan B' in die Tat \numzusetzen.\n",
/* 81*/ "Hier ist Agent Dark! Bereiten Sie sich auf die \nÜbertragung der Aufzeichnung vor. Ich beantrage ein \nUnterstützungsteam des Instituts zum Schutz des \nPräsidenten, noch bevor er nach Alaska abreist. \nDiese Anfrage hat die Priorität Eins.\n",
/* 82*/ "Dafür ist nun keine Zeit, Agent Dark. Während \nder Funkstille haben wir neue Informationen erhalten. \nDas Flugzeug mit unseren 'Freunden', von denen ich \ngesprochen habe, wurde über Nevada abgeschossen. \nDie dafür verantwortliche Waffe wurde von der \nArea 51 abgefeuert; dorthin wurden vermutlich auch \nÜberlebende und die Wrackteile gebracht. Bereiten \nSie sich für die sofortige Abreise vor, wenn Sie \nwieder hier sind. Carrington over und out.\n",
/* 83*/ "Area 51? Aber was geschieht mit dem Präsidenten?\n",
};

View File

@ -1,88 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva generatore segnali di disturbo\n\nNel garage dell'edificio è collocato un dispositivo che impedisce la trasmissione di qualsiasi informazione registrata dalla TeleSpia. Una volta disattivato, la TeleSpia potrà trasmettere i dati al Quartier Generale!\n\n|Obiettivo 2: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 3: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 4: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 5: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n",
/* 1*/ "EDIFICIO G5\n",
/* 2*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 2: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 3: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 4: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n",
/* 3*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 2: - Prendi copia dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 3: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Disattiva generatore segnali\n",
/* 10*/ "Disattiva il sistema delle griglie laser\n",
/* 11*/ "Olografa i cospiratori in riunione\n",
/* 12*/ "Prendi copia backup dalla cassaforte\n",
/* 13*/ "Esci dall'edificio\n",
/* 14*/ "Procurati chiave alfa\n",
/* 15*/ "Guardia:\n",
/* 16*/ "Chiave 1° piano\n",
/* 17*/ "Chiave della guardia\n",
/* 18*/ "Presa chiave della guardia\n",
/* 19*/ "Procurati chiave alfa\n",
/* 20*/ "Guardia:\n",
/* 21*/ "Chiave 2° piano\n",
/* 22*/ "Chiave della guardia\n",
/* 23*/ "Presa chiave della guardia\n",
/* 24*/ "Distrutto strumento essenziale alla missione\n",
/* 25*/ "Disattivato generatore segnali di disturbo\n",
/* 26*/ "Impossibile riaccendere il generatore\n",
/* 27*/ "Disattivata unità griglie laser\n",
/* 28*/ "Attivata unità griglie laser\n",
/* 29*/ "Disattivati tutti i sistemi griglie laser\n",
/* 30*/ "Procurati nastro DAT\n",
/* 31*/ "Dr. Caroll:\n",
/* 32*/ "Disco di backup \n",
/* 33*/ "Disco di backup\n",
/* 34*/ "Preso disco di backup.\n",
/* 35*/ "Decodificatore porta in azione\n",
/* 36*/ "Decodifica in corso...\n",
/* 37*/ "Decodificatore ha finito: porta aperta.\n",
/* 38*/ "ALLARME INTRUSIONE - Sicurezza all'erta\n",
/* 39*/ "Decodificatore piazzato correttamente\n",
/* 40*/ "Decodificatore in posizione errata\n",
/* 41*/ "Allertati i cospiratori\n",
/* 42*/ "Attivato l'allarme\n",
/* 43*/ "Disattivato l'allarme\n",
/* 44*/ "Bloccata porta di sicurezza \n",
/* 45*/ "Decodificatore in azione\n",
/* 46*/ "Procurati Esplodiporta\n",
/* 47*/ "Dr. Caroll:\n",
/* 48*/ "Esplodiporta\n",
/* 49*/ "Esplodiporta\n",
/* 50*/ "Preso Esplodiporta\n",
/* 51*/ "MISSIONE FALLITA - Obiettivi incompleti\n",
/* 52*/ "MISSIONE COMPIUTA\n",
/* 53*/ "Cimice piazzata correttamente\n",
/* 54*/ "Cimice in posizione errata\n",
/* 55*/ "Procurati TeleSpia\n",
/* 56*/ "Dr. Caroll:\n",
/* 57*/ "TeleSpia\n",
/* 58*/ "TeleSpia\n",
/* 59*/ "Presa TeleSpia\n",
/* 60*/ "È impossibile passare finché sono \nattivi quei laser.\n",
/* 61*/ "Quella dev'essere la sala riunioni. \nÈ ora di usare la TeleSpia.\n",
/* 62*/ "La cassaforte è criptata. \nIl decodificatore ci metterà un po'.\n",
/* 63*/ "È ora di andare! Passiamo per la porta che ho \npredisposto!\n",
/* 64*/ "Distrutto strumento essenziale alla missione.\n",
/* 65*/ "Sta indietro, Joanna! Apriremo un varco \ndi fuga!\n",
/* 66*/ "\n",
/* 67*/ "\n",
/* 68*/ "Detonatore\n",
/* 69*/ "Detonatore\n",
/* 70*/ "Preso detonatore.\n",
/* 71*/ "Distrutta la TeleSpia - Missione fallita\n",
/* 72*/ "Abbiamo recuperato il Sapiente da Carrington \ne ne abbiamo alterato la programmazione. Ora \nha perso la sua personalità, così non \navremo più spiacevoli sorprese.\n",
/* 73*/ "Questo ridurrà la sua efficienza. La mia \nsquadra dovrà portarlo subito al centro, \nma ciò li metterà in pericolo. Avrebbe \ndovuto comunicarci che il Sapiente avrebbe \nsviluppato un codice morale problematico!\n",
/* 74*/ "Nessuno poteva prevedere una cosa simile! \nE non ammetto che mi vengano mossi dei \nrimproveri. E lui allora?\n",
/* 75*/ "Il Presidente ha rifiutato la sua richiesta \ndi finanziamento per il Pelagic II?\n",
/* 76*/ "Forse ha sopravvalutato la sua \ninfluenza su di lui!\n",
/* 77*/ "No! Avrò sottovalutato la sua determinazione, \npiuttosto! Abbiamo un piano contingente pronto \na partire non appena l'entourage del Presidente \narriva alla base aerea. Tutto ciò che mi serve \ndal Presidente è un campione di tessuto.\n",
/* 78*/ "Sì... salvo imprevisti! Se Carrington \nha raccolto elementi sufficienti, a \nquest'ora avrà già chiamato i rinforzi!\n",
/* 79*/ "Non ci saranno aiuti esterni per Carrington. \nLa tecnologia che ci ha dato è stata \ninstallata in Nevada ed è già operativa: \nsiamo in grado di intercettare qualsiasi \nmezzo utilizzino.\n",
/* 80*/ "Ciò significa che il dispositivo che vi \nabbiamo fornito funziona? Bene! Perfetto! \nRiteniamo infatti che tutto ciò che non \nfunziona correttamente debba essere eliminato. \nLo tenga bene a mente durante l'attuazione \ndel suo 'piano di emergenza'!\n",
/* 81*/ "Agente Dark a rapporto! Preparatevi a \nricevere e scaricare i dati della riunione. \nRichiesta prioritaria di una squadra di \nsupporto dell'istituto che protegga il \nPresidente prima del suo viaggio in Alaska.\n",
/* 82*/ "Ora non c'è tempo per questo, Agent Dark! \nCi sono stati degli sviluppi durante il \nsilenzio radio. Il mezzo con a bordo quegli \n'amici' di cui ti parlavo è stato abbattuto \nin Nevada. Il colpo è stato sparato dall'\nArea 51, dove saranno stati portati anche i \nsopravvissuti e i resti del velivolo. Dovrai \nprepararti a partire immediatamente appena \nrientri. Passo e chiudo! \n",
/* 83*/ "L'Area 51? E che ne sarà del Presidente?\n",
};

View File

@ -1,88 +0,0 @@
#include <ultra64.h>
char *lang[] = {
/* 0*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar el Generador de Campo Húmedo\n\nSe trata de un dispositivo en el garaje del edificio evita la transmisión de cualquier información grabada por la Cámara Espía. Una vez apagado, la Cámara Espía puede enviar cualquier grabación al Cuartel General.\n\n|Objetivo Dos: - Desactivar los Sistemas de la Rejilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Tres: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Cuatro: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cinco: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n",
/* 1*/ "EDIFICIO G5\n",
/* 2*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar los Sistemas de la Parrilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Dos- Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Tres: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cuatro: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n",
/* 3*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Dos: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Tres: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n",
/* 4*/ NULL,
/* 5*/ NULL,
/* 6*/ NULL,
/* 7*/ NULL,
/* 8*/ NULL,
/* 9*/ "Desactivar generador de campo húmedo\n",
/* 10*/ "Desactivar sistemas de rejilla láser\n",
/* 11*/ "Holografiar reunión de conspiradores\n",
/* 12*/ "Recuperar copia del Dr. Caroll\n",
/* 13*/ "Salir del edificio\n",
/* 14*/ "Obtén la llave magnética alfa.\n",
/* 15*/ "Guarda:\n",
/* 16*/ "Llave de Nivel 1\n",
/* 17*/ "Llave Magnética del Guarda\n",
/* 18*/ "Llave Magnética del Guarda obtenida\n",
/* 19*/ "Obtén la llave magnética alfa.\n",
/* 20*/ "Guarda:\n",
/* 21*/ "Llave de Nivel 2\n",
/* 22*/ "Llave Magnética del Guarda\n",
/* 23*/ "Llave Magnética del Guarda obtenida\n",
/* 24*/ "Objeto crítico de la misión destruido.\n",
/* 25*/ "Generador de campo húmedo apagado.\n",
/* 26*/ "El generador no puede reiniciarse.\n",
/* 27*/ "Unidad de rejilla láser apagada.\n",
/* 28*/ "Unidad de rejilla láser activada.\n",
/* 29*/ "Todos los sistemas de rejilla láser apagados.\n",
/* 30*/ "Obtén la cinta de Datos.\n",
/* 31*/ "Dr. Caroll:\n",
/* 32*/ "Disco de seguridad\n",
/* 33*/ "Disco de seguridad\n",
/* 34*/ "Disco de seguridad obtenido.\n",
/* 35*/ "Decodificador de puertas colocado en el acceso.\n",
/* 36*/ "Iniciando rutinas de apertura.\n",
/* 37*/ "El decodificador de puertas terminó: puerta abierta.\n",
/* 38*/ "ALERTA DE INTRUSOS: toda la seguridad a la caja.\n",
/* 39*/ "Decodificador de puertas colocado correctamente.\n",
/* 40*/ "Decodificador de puertas colocado incorrectamente.\n",
/* 41*/ "Los conspiradores han sido alertados.\n",
/* 42*/ "Alarma activada.\n",
/* 43*/ "Alarma desactivada.\n",
/* 44*/ "La puerta de la caja fuerte está cerrada.\n",
/* 45*/ "Decodificador de puertas colocado.\n",
/* 46*/ "Obtén el Revienta-puertas.\n",
/* 47*/ "Dr. Caroll:\n",
/* 48*/ "Revienta-puertas\n",
/* 49*/ "Revienta-puertas\n",
/* 50*/ "Revienta-puertas obtenido.\n",
/* 51*/ "Objetivos incompletos: MISIÓN FALLADA.\n",
/* 52*/ "MISIÓN CONSEGUIDA\n",
/* 53*/ "'Bicho' de comunicaciones colocado correctamente.\n",
/* 54*/ "'Bicho' de comunicaciones colocado incorrectamente.\n",
/* 55*/ "Obtén la Cámara Espía.\n",
/* 56*/ "Dr. Caroll:\n",
/* 57*/ "Cámara Espía\n",
/* 58*/ "Una Camára Espía\n",
/* 59*/ "Cámara Espía obtenida.\n",
/* 60*/ "No hay ningún camino posible mientras \nesos láseres estén activos.\n",
/* 61*/ "Eso de ahí delante debe ser la sala de reuniones. \nHora de usar la Cámara Espía.\n",
/* 62*/ "La caja fuerte está fuertemente encriptada. \nEl decodificador va a tomarse su tiempo.\n",
/* 63*/ "¡Hora de irse! Vamos a la puerta que creé \nantes.\n",
/* 64*/ "Objeto crítico de la misión destruido.\n",
/* 65*/ "Aparta, Joanna. Crearemos tu ruta \nde escape.\n",
/* 66*/ "\n",
/* 67*/ "\n",
/* 68*/ "Detonador\n",
/* 69*/ "Detonador\n",
/* 70*/ "Detonador obtenido.\n",
/* 71*/ "La Cámara Espía ha sido destruida: abortar misión.\n",
/* 72*/ "Hemos recuperado la IA de manos de Carrington \ny alterado su programación. Nunca más tendrá \npersonalidad, así no podrá haber posibles \nfuturos incidentes.\n",
/* 73*/ "Esto reducirá su eficiencia. Mi equipo tendrá \nque llevarlo al núcleo por sí mismo. Esto les \npondrá en peligro. Debías haber anticipado \nque la IA podría desarrollar un problemático \ncódigo moral.\n",
/* 74*/ "¡Nadie podría haber predecido eso! ¡Y me \nmolesta que me echen la culpa de ello! \n¿Qué pasa con él?\n",
/* 75*/ "¿El Presidente no ha admitido tu petición \nde préstamo del Pelagic II?\n",
/* 76*/ "¿No podría ser que hayas sobreestimado \ntu influencia sobre él?\n",
/* 77*/ "¡No! Quizá haya menospreciado su resolución. \nTenemos un plan de contigencia preparado, \ny comenzará tan pronto como el séquito presidencial\nllegue a la base aérea. Todo lo que necesito del \nPresidente es una muestra de tejido cutáneo.\n",
/* 78*/ "¡Ja! Eso asumiendo que no sufras interferencias. \nSi Carrington ha recabado suficientes piezas de \nesto, seguro que avisará a los refuerzos.\n",
/* 79*/ "No habrá ayuda exterior para el Sr. Carrington. \nLa tecnología que nos diste está instalada en \nNevada y es totalmente operativa. \nPodemos interceptar cualquier nave que usen.\n",
/* 80*/ "¿Entonces los dispositivos que os dimos funcionan \ncorrectamente? Bien. Porque nosotros creemos que \ncualquier cosa que no funcione correctamente debe \nser destruida. Tenlo en cuenta para tus 'planes \nalternativos'.\n",
/* 81*/ "¡Agente Dark informando! Preparaos para \nrecibir los datos de la reunión. \nPetición prioritaria de un Equipo de Soporte \ndel Instituto para proteger al Presidente \nantes de que vaya a Alaska.\n",
/* 82*/ "No hay tiempo para eso ahora, Agente Dark. Se \nha progresado durante el silencio de radio. \nLa nave que llevaba a esos 'amigos' de los \nque te hablaba, fue derribada sobre Nevada. \nEl arma responsable fue disparada desde el\nÁrea 51... Allí es donde los supervivientes \ny los restos del siniestro han sido llevados. \nDebes prepararte para ser enviada de inmediato \nen cuanto regreses aquí. Carrington fuera.\n",
/* 83*/ "¿Al Área 51? ¿Pero qué pasa con el Presidente?\n",
};

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

View File

@ -1,3 +0,0 @@
#include <ultra64.h>
char *lang[] = { NULL };

Some files were not shown because too many files have changed in this diff Show More