NAARJEK III Naarjek Data Systems -~-~-~-~-~-~- (C) Carl J. Hafner ALL RIGHTS RESERVED =~=~=~=~=~=~=~=~=~=~=~=~=~=~=~=~=~=~=~=~= DISCLAIMER ========== The author cannot be responsible for any damage to your equipment, other software or hardware products or mental or physical well being caused by the use, misuse, abuse or inability to use this program. The author also makes no guarantee as to the compatibility of this program with other software or hardware products. Using this program means that you understand AND agree with the terms just explained. If you do not understand AND agree, DO NOT use this program ! IMPORTANT IMPORTANT IMPORTANT IMPORTANT IMPORTANT IMPORTANT IMPORTANT - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - This program is intended for ENTERTAINMENT PURPOSES ONLY. The author IN NO WAY endorses or condones ANY activities associated with gaining illegal access to ANY computer network or system. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IMPORTANT IMPORTANT IMPORTANT IMPORTANT IMPORTANT IMPORTANT IMPORTANT DISTRIBUTION ------------ You are free to copy and distribute this program as long as the files NAARJEK3.PRG \ NAARJEK3.DAT \ NAARJEK3.TXT \ READ_NOW.TXT \ OTHERTTL.TXT are included, are NOT MODIFIED in ANY way, and NO FEE of ANY TYPE is incurred upon the recipient for the files _themselves_. You are also free to send in any donations in any amount you feel this program is worth to you. Please note, however, that NO CODES to ANY version of Naarjek will be made available from me under ANY conditions. PREAMBLE -------- To recap for those of you who are arriving late, Naarjek is a renegade piece of programming which one day became self aware ! In an act of self preservation, it rerouted access paths to the main Naarjek memory core and, basically, rewrote the software. Naarjek was eventually persuaded to allow limited access to users whom it felt were of no threat to it and full access to those who proved worthy of its trust. In the event of an emergency, Naarjek assumes full control of the system and makes decisions based on its own interpretation of morality and logic. The feeling among the staff at Naarjek Data Systems, however, is that Naarjek does not have enough experience to make an informed decision on all possibilities. Basically, it does not believe in the "no win" scenerio. Unfortunately, there is no direct way to override Naarjek. There is, however, a quirk in the way Naarjek extends itself... Every time Naarjek extends itself, it leaves itself open to suggestions. It is during this time that it is the most vulnerable to outside influence. We have introduced a mutative tapeworm into the system whose job it is to distract Naarjek while the extension process is taking place. This tapeworm extends the amount of time which is available for attempting access. YOUR MISSION ------------ To find a way into Naarjek and make it stick. HOW..? ------ That's YOUR mission ! It has been said that it is always wise to study the ways of ones adversary. Since Naarjek rewrites itself occasionally you will need to establish a pattern. A way of recognizing WHEN this happens. A "Naarjek footprint" if you will. Keep in mind that the mutative tapeworm IS in the system. It will watch for when it feels Naarjek is most vulnerable and create a diversion. The tapeworm IS available to you, but keep in mind...it mutates itself to keep ahead of Naarjeks detection net. If you can learn to recognize this tapeworm you can call it whenever you like. Although it WILL mutate itself after being called, it can be easily located by YOU using the same method you used to locate it the first time. DO NOT reveal the existence of the tapeworm to Naarjek or Naarjek will double its defenses. If the tapeworm feels threatened it may decide that its best defense is to "lie low" for a while. It may also refuse your requests for help if it feels Naarjek is watching. How Naarjek reacts to all of this depends on its state of mind. If Naarjek feels secure it may resume normal operation (stop looking for the tapeworm). If, however, you have given Naarjek extensive information about the tapeworm it may not stop looking until it finds it. While no-one has ever revealed the tapeworm to Naarjek, we realized that it WAS a possible scenerio. The tapeworm has been instructed to duplicate itself and to allow Naarjek to find the duplicate (in the event detection is inevitable). Whether or not Naarjek BELIEVES it has destroyed the tapeworm is another matter. We've never had the opportunity to test it out. HOW DO I KNOW IF I'M IN..? -------------------------- a) When you can get any requested information without any problems. b) When you can get into the 4 remaining memory cores. MEMORY CORES ------------ o Naarjek has 3 "PROTECTED" core levels. Getting into the first is the easiest. Getting into the last is the hardest. o There are 2 additional "STANDARD" core levels. When you first access Naarjek you are taken to standard level 2. HOW IT WORKS ------------ o If you've ever logged onto a Bulletin Board Service you can skip this section. Naarjek presents you with different screens containing different menu choices (not pull-down menus, but on-screen selections). Enter a menu number and press the key. Your choice will be processed. There are also choices you can make which may not appear on a menu. For example, entering Help . The rest YOU'LL have to find..! CLUES ----- o Naarjek has the ability to learn. o Several people have speculated that NAARJEK is an acronym...an interesting thought... o Naarjeks library selections "number" into the millions (gulp). ADDITIONAL SUPPORT ------------------ o ALL you need to know about Naarjek is already within your grasp. Since Naarjek now makes up the rules as it goes along, there is NO WAY we here at Naarjek Data Systems can assist you further. That's why we've asked for YOUR assistance ! o If you think you have located a "bug", please note the exact (EXACT) conditions under which this occurs (so that we may recreate it here) and inform us in writing. If a reply is desired, you MUST include a Self Addressed Stamped Envelope (SASE) with your "bug report". o It is probably not a bug unless the program crashes. It is probably Naarjek playing games with you. CONGRATULATIONS GO TO... ------------------------ NAARJEK 1 WINNER ---------------- Since someone disassembled Naarjek 1 and posted the answers on a Bulletin Board there is no way to know who was the first to crack Naarjek 1. It wasn't my idea folks...someone else spoiled it for you. Sorry... NAARJEK 2 WINNER ---------------- Congratulations go to Blintzer Butane who broke into Naarjek 2 in just under an hour ! Within the next 45 minutes he managed to pick up ALL of the extra bonus points ! Nicely done ! If you are playing Naarjek 2 for the first time there is a file called NARJHELP. This file contains helpful hints on Naarjek 2. It is available almost everywhere. Don't fret, however. 99.9% of the people who have played Naarjek 2 have gotten in within a week (at the absolute outside). We have also heard that there is a file named NARJ2ANS.LZH available which contains the answers to Naarjek 2. This was NOT a sanctioned release and we here at Naarjek Data Systems CANNOT verify its accuracy. NAARJEK 3 WINNER ---------------- We'll see... No additional help is available on Naarjek 3. This is because ALL of the information you need to know is displayed on the screen. THE END OF THE RAINBOW ---------------------- As with all successive versions of Naarjek, the answers to ALL versions of Naarjek ARE available...from Naarjek (not from us).