------------------------
MonkeyHack readme.txt

0. Quit Start
1. Credits
2. Compiling
3. Background Story
4. Game Intructions
5. Cyberspace
6. Thanks
7. Donkey
8. Editing
9. Bye

------------------------

0. Quit Start

Forget it!
Sorry, but you'll have read this boring file or you will be lost in
the game. Don't believe me? Try the game and see.
(I planed to add in-game help but ran out of time.)

------------------------

1. Credits

Programmers:
Bram Vaessen
Nathan Smith

Sound Effects:
Thijs Vaessen

------------------------

2. Compiling

Nathan compiled game with mingw32 and the makefile is set up for that.
Bram compiled the game with djgpp.

Because the map loading code and I doubt it will work in anything but windows
or dos but you are welcome to try.. I may recode that part and release more
friendly version later...)

if you want to try you can compile all the .cc files (BUT NOT mapedit.cc)
then link them together with the allegro library.

For the map editor do the same but swap monkey.cc for mapedit.c
(I can't even get the map editor to work in windows though.)

We used allegro 3.9.34 (WIP)
(earlier versions of the library will not work.)

We used DIME (dialogs made easy in the mapeditor for the 2d part)

We didn't use any other librarys.

------------------------

3. Background Story

Once apon a time there lived monkey. His two favorite things to do was eat
bananas and program allegro games (smart monkey). One day an evil donkey
visited the monkey claiming to hire him for a job. (The job was to make a
boring appication invoving put numbers in little boxes and pushing buttons
to adding them together.) So the monkey sat down at his computer and started
working. After a bit he reached over for a big nice yummy beautiful bright
yellow banana... but wait! Its gone! That theiving donkey of a donkey! It
seems that the donkey took all the bananas and hid them in a big maze of
islands with buttons and keys and computer terminals.

"why?"
"What do you mean why?"
"Why does he do it?"
"hey shut up the player is listening!"
"but I mean really, that's just insane! Why would donkey steal bananas?"
"I SAID SHUT UP!"
(bang! ZAP! pow!)

anyway...
Only you can save the bananas!
You must help the monkey on his quest for food!

------------------------

4. Game Instructions

Guide the monkey through the each level.

Get the big banana to go the next level.
Pickup small bananas for bonus points.

You need a key to unlock a keyhole door. (Use [k] key to unlock a door)

Stepping a button will move bridges and/or open and close doors.

Some doors require you to input a password on a computer, but
don't worry our Monkey doesn't need a password! See the section on
cyberspace for more information on hacking.
(press [h] key to try and hack a terminal)

Use Bombs to blow walls away..
(press [b] key to drop a bomb)

Now go! Monkey is hungry!

------------------------

5. Cyberspace

Luckly our monkey is a master programmer. While normally he only uses
his powers for good and not evil, in order to save his bananas he must
use his skills to break the computer locks.

He has four tools:

1. Flood  - floods a device with information tring to break it down.
2. Infect - attacks the device with a killer virus that will spred across
            to other devices
          - Note once a device is infected it can not be flooded or hacked
            so be careful!!!!!
3. Hack   - only works on the file server
4. Nuke   - sends the secret code to the virus to kill itself and the device.
          - this only shutsdown the device you send the code to and
            will not spred across to other infected devices.

There are 5 devices one can see in cyberspace:

1. Node - basic connections between two parts of memory space
2. Firewall    - basic protection from hackers
               - (these devices are protected from flooding)
3. Filter      - a virus filter
               - (these are protected from infecting)
               - (the virus can still be spred to this device
                  though the data lines)
4. Encypter    - encypters the data lines
               - is protect from both flooding and infecting attacks
               - (the virus can still be spred to this device
                  though the data lines)
5. File server - The target
               - Hack this to open the door!

There is one more thing:

Devices and data lines are colored:

1. Red         - Infected with a virus
2. Blue        - The devices are hacked!
3. Green       - Normal unprotected
4. Dark grey   - Dead
5. Yellow      - This device or data line is protected from all attacks.
               - including being infected through a data line.
               - The only way to turn it green is to find the device
                 that is sending the yellow data line to the protected
                 device and kill it!

6. Thanks

Thanks to Arron Shutt for the speedhack.. its has been a blast!
Also thanks to all the people who made allegro the great library that it is.
And thanks to you for trying our game.

------------------------

7. Donkey

As you can see there are no pictures of the donkey in the game...

And while the donkey is the heart of this game for he robed the bananas
and hid them away... but saddly he ran away before we could take any
pictures of him.

------------------------

8. Editing

What to edit the game? Go for it!

The 3d levels are stored in textfiles
levelx.txt (where x is the level number)

The 2d levels can be edited with the mapeditor.
(You may need to download the dos mapeditor as
the windows one doesn't work.)

If you want to edit the source code go for it, but be warned
commenting is about a two lines per file on average... 

Read the header files + the monkey.cc + test3d.cc files if you want a basic
idea of how the game is put together.

------------------------

9. Bye

Well that's about it..

So until next time,
Happy Coding!

