Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

lets design some games

Name: that can run well over tor. 2013-08-03 19:47

and then we can have /prog/ gaming tornies[i]![i]

Name: Anonymous 2013-08-03 19:53

Can it be a roguelike MUD with 2hus?

Name: Anonymous 2013-08-03 19:54

Let's just fork LambdaMOO

Name: Anonymous 2013-08-03 19:54

>>2 yes.

Name: Anonymous 2013-08-03 20:02

>>2
Definitely.

Name: Anonymous 2013-08-04 0:44

>>2
>>5
LLLLLLLLLLEEEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLL
>EJPIN LITTLE GIRLS
>LE KAWAI 2HU XDDDDDD

Name: japan EXPERT 2013-08-04 0:46

>>6
it's KAWAII not KAWAI

Name: Anonymous 2013-08-04 1:11

>>6
Little girls are awesome LEL-cunt. I hope you're not being sarcastic.

Name: Anonymous 2013-08-04 1:58

how about a game where you do nothing and just sit in front of your computer and contemplate your existence and wonder why you were even born

Name: Anonymous 2013-08-04 2:21

Name: Anonymous 2013-08-04 2:35

How about a mmo hacking game? It would be like a combination of core war and metal gear solid. And you play as a 2hu

Name: Anonymous 2013-08-04 2:50

>>7
中だしされる喜び

Name: Anonymous 2013-08-04 2:54

How does one implement pointers in Lisp? There is no implicit memory, so one have to explicitly specify the chunk of memory to work on. Which potentially could be optimized by loading array pointers into segment registers (getting bounds checks and protected memory at no cost). Also, there is no malloc. For now I devised following simple macro:
(defmacro with-ptr ((name base &optional (offset 0)) &body xs)
  (let ((o (gensym "p"))
        (b (gensym "a")))
    `(let ((,o ,offset)
           (,b ,base))
       (macrolet ((,name (op &rest as)
                    (let ((o ',o)
                          (b ',b)
                          (v (gensym "v")))
                      (case op
                        (++ `(let ((,v (aref ,b ,o)))
                               (incf ,o ,@as)
                               ,v))
                        (-- `(let ((,v (aref ,b ,o)))
                               (decf ,o ,@as)
                               ,v))
                        (base b)
                        (offset o)
                        (start? `(= ,o 0))
                        (end? `(= ,o (length ,b)))
                        (avail? `(< ,o (length ,b)))
                        (move-to-head `(setf ,o 0))
                        (move-to-last `(setf ,o (- (length ,b) 1)))
                        (otherwise `(aref ,b (+ ,o ,@as)))))))
         (symbol-macrolet ((,name (aref ,b ,o)))
           ,@xs)))))

(with-ptr (p "abcdefg")
  (while (p avail?)
    (format t "[~a] = ~a~%" (p offset) (p ++))))

Name: >>10 2013-08-04 2:57

Not%20bad.pgm
A super real time MMORPG, with classes, 2hu fighter, hacker, stealth, combat, etc..

Should we the came something like Metal Core 二[o]RISC?
                      You know, after the board game, a pun for the architecture, and obvious call to the genre.   Or just RISC, with fonts resembling each of the games main logos for the same.

Name: Anonymous 2013-08-04 3:16

>>14
I like it. I would appreciate a game that is fun for seasoned programmers, educational for beginners, and has enough other interesting content to not get boring.

Name: >>15 2013-08-04 3:17

And by interesting content, I mean content not related to programming.

Name: Anonymous 2013-08-04 6:55

>>13
What are the base and offset functions?

So what would a typical level be? Gensoko has been taken over by a militant group and must infiltrate their base. After freezing a guard she gets to a computer and uses the map reduce function to disable the security cameras. In order to unlock the door to the level 5 security area, she must write an algorithm to solve a 100x100 sudoku puzzle.

I could see it being singe player, but how do you make it multiplayer? With teamwork? Some hack while others sneak? Or could it be competitive? Maybe one team needs to secure a system or a facility while the other needs to break in...all software that can be used has exploits everywhere, so the only way to get more security is with lots of redundancy...

Name: Anonymous 2013-08-04 7:00

Capture the flag for a digital key. The key is supplied in request responses to trusted clients, so you can't just lock it in a basement somewhere...social engineering? It could get too macro, and you can't see the action anymore.

Name: Anonymous 2013-08-04 7:26

the problem with hacking games is that hacking is actually boring. It;s only exciting because the mundane details end up adding to the capability to exploit another's system. But in a game the system is fictional, so the reward is less. So the effort required in the hacking must also be less. But then that is also less rewarding...

Name: Anonymous 2013-08-04 7:37

>>17
What are the base and offset functions?
Because we want good old C/C++ (setf (p ++) (q ++)) idiom to work in Lisp.

Name: Anonymous 2013-08-04 8:25

>>20
Terrible!

Name: Anonymous 2013-08-04 9:01

>>12
Is that the object of the game?

Name: Anonymous 2013-08-04 11:13

>>6
Thank you for your words of encouragement, LEL-kunt. I do think little girls with massive breasts like Jewkari are e/jp/in.

Name: Anonymous 2013-08-04 14:04

>>13
Look at how C works on a Lisp machine. Pointers are arrays combined with offsets. Lisp machines have built-in bounds-checking.
http://en.wikipedia.org/wiki/Burroughs_large_systems
http://en.wikipedia.org/wiki/Lisp_machine
http://www.textfiles.com/bitsavers/pdf/symbolics/genera/

Name: Anonymous 2013-08-04 14:12

>>24
Intel x86 too has built-in bounds checking, called segmented memory. Although they require running in unprotected mode.

Name: Anonymous 2013-08-04 20:04

I JUST DID YOU FUCKER I'M NOT DOING IT AGAIN

Don't change these.
Name: Email:
Entire Thread Thread List