And here you can find all the inventory items and functions within LINC Space in Beneath a Steel Sky. There are
quite some of them.
You can find all normal inventory items in Beneath a Steel Sky under the link
Inventory Items,
while you should use the menu on the right of here to navigate directly through the walkthrough.
hey, www.abandonsocios.org/wiki/Beneath_a_Steel_Sky wiki guys.
I don't like you or your users just taking the images I spent hours on, editing them
for my website and not asking if you can use them or giving credit where credit is due (just add a link to where on the internet you found the images on the
image upload wiki page, damned, is it that hard!), and then just uploading it as an inferior single image to the wiki that claims everything on its pages
is public domain!!! I still update and work on my website and it is in no way abandoned!
QUESTION MARK
Use it and drag it over any item or symbol in the LINC Space navigation bar and you will be told what it is! Or use this very page and read all the interesting stuff.
DISCONNECT
FILE: LOG OUT
TYPE: SYSTEM COMMAND
DESIGN: PROF. PIERMONT, UNION LABS
To disconnect the eidos from the matrix
OPEN
FILE: OPEN
TYPE: SYSTEM COMMAND
DESIGN: PROF. PIERMONT, UNION LABS
To access folders
CHARON
FILE: CHARON
SIZE: 10k
DESIGN: GRENDEL
To override system log-on Security.
Please distribute freely.
Hi to Roo, Baz & Ian
DECOMPRESS
FILE: BIRTHDAY SURPRISE
SIZE: 32k
DESIGN: THE WILDE BOYZ
The ULTIMATE decompression routine for all SERIOUS system surfers. SPREAD'EM
AND ENJOY.
COMPRESSED DATA
FILE: <<UNKNOWN FORMAT>>
SIZE: 13k
DESIGN: <<UNKNOWN>>
File unreadable/ data format unrecognized
It's the ball you collect in the first room of the Cyberspace. In your Cyber inventory it looks like a two colored ball.
Turns into two PASSWORDs after the decopression with the BIRTHDAY SURPRISE Decompressor.
PASSWORD
FILE: CODE BREAKER
SIZE: 22k
DESIGN: L. THWAITES, UNION SECURITY
Access to password protected nodes - Security use only.
PASSWORD
FILE: CODE BREAKER
SIZE: 22k
DESIGN: L. THWAITES, UNION SECURITY
Access to password protected nodes - Security use only.
DECRYPT
FILE: KWIK-D-KRYPT
SIZE: 33k
DESIGN: ORRIS AND WERNER, UNION LABS
A decryption routine for all standard UCSI coded files
DOCUMENT (encrypted)
(1)
FILE: BRIEFING.DOC
SIZE: 242 bytes
DESIGN: UNION SECURITY
Text file
(2)
FILE: REPORT.DOC
SIZE: 201 byte
DESIGN: UNION SECURITY S03
Text File
DOCUMENT (decrypted)
(3)
FILE: PHOENIX.DOC
SIZE: 183 bytes
DESIGN: C. GRAY, UNION SECURITY
Text file
PHOENIX
FILE: PHOENIX PROGRAMM
SIZE: 64k
DESIGN: C. GRAY, UNION SECURITY
Restricted use only, in accordance with LINC mandate 899.
PLAYBACK
FILE: PLAYBACK
SIZE: 28k
DESIGN: Y. OKUDA, UNION LABS
To view holographic diary image files. Compatible with HOL standard formats.
BLIND
FILE: BLINDFOLD
SIZE: 23k
DESIGN: P. INALCIK, PYGNOSIS
Counter intrusion counter measure. The author does not accept liability for brain damage.
DIVINE WRATH
FILE: DIVINE WRATH
SIZE: 53k
DESIGN: INFORMATION CLASSIFIED
Classified specification - Union Security use only.
OSZILLATOR
FILE: OSCILLATOR
SIZE: 55k
DESIGN: PROF. PIERMONT, UNION LABS
Range of modulation increased due to class IV variants in LINC defense.
VIRUS
FILE: HELIX
SIZE: 69k
DESIGN: HOBART - INSTITUTE OF CYBERNETICS
To combat the Caudel syndrome, checking the growth of rouge tissue in smart systems.