Tron 2.0 Walkthrough

by Thomas "Schnitter" Leichtle

Version v1.1.0 -- 16th October, 2003


// A variant of the Hello World program

#include <iostream>
using namespace std;

int main()
  {
    cout << "Greetings, Programs!" << endl;

    return 0;
  }

*******************************************************************************
Table of Contents
*******************************************************************************

01. Introduction
02. Legalese
03. Basic Game Mechanics
    a) The Stats
    b) Memory and Utilities
    c) Additional Info
04. Primitives, Subroutines and Important Objects
    a) Primitives and Combat Subroutines
    b) Defense Subroutines
    c) Utility Subroutines
    d) Objects
05. Characters
06. Enemies
07. Notes for the Walkthrough
08. Walkthrough
    a) Unauthorized User
       a.a) Program Initalization
       a.b) Program Integration
    b) Vaporware
       b.a) Lightcyclearena and Gridbox
       b.b) Prisonercells
       b.c) Transportstation
       b.d) Primary Digitizer
    c) Legacy Code
       c.a) Alans Desktop PC
    d) System Restart
       d.a) Packet Transport
       d.b) Energy Regulator
       d.c) Power Occular
    e) Antiquated
       e.a) Testgrid
       e.b) Main Processor Core
       e.c) Old Gridarena
       e.d) Main Energy Pipeline
    f) Master User
       f.a) City Hub
       f.b) Progress Bar
       f.c) Outer Gird Getaway
       f.d) fCon Labs / Ma3a gets saved
       f.e) Remote Access node
    g) Alliance
       g.a) Security Server
       g.b) Thornes Outer Partition
       g.c) fCon Labs / Data Wraith Preparation
       g.d) Thornes Inner Partition
       g.e) Thornes Core Chamber
    h) Handshake
       h.a) Function Control Deck
    i) Database
       i.a) Security Socket
       i.b) Firewall
       i.c) fCon Labs / Alan Lost
       i.d) Primary Docking Port
       i.e) fCon Labs / Security Breach
       i.f) Storage Section
    j) Root of all Evil
       j.a) Construction Level
       j.b) Data Wraith Training Grid
       j.c) fCon Labs / The fCon team takes over
       j.d) Command Module
    k) Digitizer Beam
       k.a) Not compatible
09. Subroutines from Bins by Sublevel and COW locations
10. Lightcycle Game mode
    a) Power Ups
    b) Additional Information
    c) The Stats of the Lightcycles
    d) List of the Racetracks
    e) What is unlocked when
11. FAQ
12. Credits
13. Changelog
14. Version History

*******************************************************************************
01. Introduction
*******************************************************************************

Greetings Programs, the information contained within this document should help
you on getting through the game of Tron 2.0, which carries on the tradition 
started in the Tron movie of some 20 years ago.  For those that have not seen 
the movie, I recommend that you do this before playing the game. It is not a 
must, but it will help you get into the mood and design that is carried on in 
the game. Also it will help you deal with the background info you gain during
the game, since there are a few references to the original movie or it's char-
acters which might not be understood easily if you've not seen it. 

This is also my first ever Walkthrough, so I do hope that you forgive the mis-
takes I might make here and help me out with it. I will especially need help on 
some of the terms used in the original, English version of the game, since I 
live in Germany and did use the German version of the game which has all dialog
synchronized and all texts translated.

*******************************************************************************
02. Legalese
*******************************************************************************

This walkthrough is a work I have poured many hours into and I do hope that 
anyone that wants to copy or rework this guide will acknowledge this by giving
credits to all the people that helped me and to me, of course. Also it would 
not be very nice if you sold this walkthrough since it is intended as a free 
work to be shared with all people who need it. Sadly I will not be able to stop 
anyone from misusing it, but know this, you shall be cursed by all people who 
gave their contribution hereto. 

*******************************************************************************
03. Basic Game Mechanics
*******************************************************************************

Tron 2.0 is at it's core a standard FPS game, with a few nice twists concerning
weapons and character enhancement.  These twist make the game that much more 
interesting. But it also needs some explanation as to how the system of 
character evolvment works.

a) The Stats

  - Build Points

    These work in much the same way as experience points do in RPG. Each time 
    you gain 100 Build points you will be able to update your stats. At each 
    update you will be given 7 points which you can allocate to the stats. You 
    can allocate a maximum of 20 points to any of the five stats and during the
    game you will earn enough Build points for 63 update points (not enough to 
    bring all stats to full). 

  - Health

    This stat should be pretty self explanatory. Each update point will add 
    five health points to your maximum health. If you have allotted 20 update
    points to it you will gain an extra 100 health point bonus.

  - Energy

    This, too, should be self explanatory. The upgrade works just like with the
    health stat (+ 5 energy/point - 100 point bonus at 20 upgrade points).

  - Weapon Efficiency

    This stat will decrease energy useage of your weapons if you spend points 
    on it. This will be useful later in the game when you are able to upgrade 
    weapons with subroutines like 'Corrosion' or 'Megahurtz' as they will ad-
    ditionally increase the energy useage of weapons. 

  - Transferrate

    Increasing this stat will lower the time it takes to download subroutines, 
    e-mails and permissions from bins or core dumps.

  - Processor

    A longer bar here means that it will not take as much time to defragment 
    damaged memory sectors, port subroutines or disinfect them.


  - Upgrade recommendations for the stats

    I would suggest that the main part of the upgrade points should be spent 
    primarily on the first three stats. This is because I never found Processor
    or Transferrate as practical as the others. I do know that opinions may 
    differ here, but I usually had enough time to port, download or disinfect, 
    but sometimes I ran out of energy or health extremely fast. 

b) Utilities and Memory

  - The memory

    You can see how much memory you have by pressing 'F1' and looking at the 
    empty slots in the outer ring there. Depending on the system you are in the
    configuration and amount of this memory will vary. Memory is used for 
    mounting subroutines and you can change those subroutines at any time, even
    in the midst of a battle since pressing 'F1' will also pause the game. 

  - The porting Icon

    In the upper left you will find a small circle with the same symbol in it 
    as unported subroutines display. To port a subroutine just drag and drop it 
    here. 

  - The defragmentation Icon

    In the lower middle of the ring you will find the Icon for defragmentation. 
    Your memory can only become fragmented during battle and if you have a few
    empty memory blocks. Should your memory become fragmented just drag and 
    drop the innards of the affected memory block here. 

  - The virus killer icon

    If one of your subroutines got infected just drag and drop it over here and 
    wait for it to become cleansed of the impurities. 

c) Additional Info

   - Virus infection

    Should one of your subroutines become infected try to disinfect it as soon 
    as possible. Also see if you can seperate it from other subroutines 
    adjacent to it by creating at least one empty memory slot between the 
    infected and the uninfected subroutines. This usually means unmounting a 
    subroutine, but it will also keep the Virus from spreading. 

*******************************************************************************
04. Primitives, Subroutines and Important Objects
*******************************************************************************

Primitives are the basic shape weapons and you can activate that form at any 
time. If you want to use any of the two upgrades however you will have to in-
stall the according combat subroutine in your memory.

The memory blocks you need for a Subroutine are determined by it's version.
Alpha subroutines need 3 blocks, beta need 2 blocks and gold ones need only 
one block of memory.

The Objects section will describe the few objects you can pick up with your 
action key. 

a) Primitives and the Combat Subroutines

   - Disc Primitive 
     
     The Disc Primitive is the first weapon you will receive in the game. It 
     will also be the one most used, since it is in it's basic form the only
     weapon that does not use any energy. Also coupled with the right Utilities
     it will be a very formidable and powerful weapon.
     
   - Disc Sequencer (Subroutine)
     
     The Sequencer subroutine let's you throw 2 or more Discs in quick 
     sucession for an only miminal energy cost. The only drawback is that you 
     can only block after all the Discs have returned to your hand, which can 
     sometimes get you into grizzly situation, so choose wise when to use it. 

   - Disc Cluster (Subroutine)
     
     The Cluster Disc is good for groups of enemy since it will work almost 
     like a fragmentation grenade. Sadly there are not that many large groups 
     in the game so it's usefulness might not be exploited to it's fullest.

   - Ball Primitive

     The Ball Primitive (and one of it's subroutines) is the weapon used by the 
     Z-Lots throughout the game.  It's low accuracy coupled with that it uses 
     energy made it a weapon I did not use very often.

   - Ball Launcher (Subroutine)
  
     The Ball Lauchner can be a very deadly weapon, especially on the higher 
     version levels with it's higher rate of fire.  It is fairly accurate also.
     Since it also does some splash damage it is also effective against groups
     of enemies. 

   - Ball Drunken Dims (Subroutine)

     This is the most powerful incarnation of the Ball Primitive, it's accuracy
     will improve by increasing the version. Does splash damage and can be put
     to good use against groups. 

   - Rod Primitive (aka Prod)

     The Rod, in it's most basic incarnation is a weapon with which you have to
     get close to the enemy, since it can only be used in close combat. This 
     weapon should only be used in rare circumstances, where stealth is 
     possible and enemies are far and between. Energy usage is also very high 
     for this weapon.

   - Rod Suffusion (Subroutine)

     You want a shotgun, here you have a shotgun. Powerful at short ranges, 
     gets more accurate in higher versions and more powerful. If you don't know
     how shotguns are used, well, then this weapon is not for you. :)

   - Rod LOL (Subroutine)

     Did I hear anyone say sniper?  Well, here is your all purpose, kill in one
     headshot sniper rifle. High Energy useage, but also very powerful against
     single enemies.  Kills most opponents in one shot. Also good to take out 
     Finders at long ranges. Be careful if you pair a gold LOL up with a gold
     Corrosion and Megahurtz, because you will be down to only 3 or 4 shots 
     with this weapon, although they will be very powerful.

   - Blaster Primitive 

     Standard Machinegun, high energy useage, low accuracy, low power. Should 
     go to the trash bin. 'Nuff said.

   - Blaster Energy Claw (Subroutine)

     You know you always wanted to be a vampire. This subroutine transforms you 
     into one. Works on single enemies as well as groups (if they are hugging
     each other). It transforms the health it takes from the enemy to energy 
     for you.
     Therefore this weapon will only use energy once the enemy runs out of 
     health. It is a very useful weapon against the shield ICPs and also 
     against most other single enemies as the enemy will not be able to attack 
     as long as the Claw grips him. 

   - Blaster Prankster Bit (Subroutine)

     This is the single most powerful weapon in the whole game, which is why 
     you only get it in the last part of it. Fires a guided missile that will 
     create a black hole at it's impact point. For this weapon to work you will
     have to hold onto the mouse button. Steering is the same as with the Disc.
     If you release the mouse button before it impacts into something it will 
     explode prematurely. The lethality radius will increase in higher versions
     . Only drawback is the high energy useage, so if you want to use it often 
     better have a white energy patch routine nearby. :)

b) Defense Subroutines

   - Submask

     Your standard helmet. Depending on the version it will give you either 
     10%, 12% or 15% of protection. 

   - Encryption

     Standard Body Armor, offers protection of 15%, 25% or 30%.

   - Peripheral Seal

     Armor for the arms, offers protection of 8%, 9% or 12%.

   - Support Safeguard

     Armor for the legs, offers protection of 8%, 9% or 12%.

   - Base Damping

     Armor for the feer, offers protection of 5%, 6% or 8%.

   - Viral Shield

     Helps protect your subroutines from becoming infected with a virus.
     Protection offered will be either 30%, 50% or 75%.

c) Utility Subroutines

   - Fuzzy Signature

     This will help you sneak up on enemies. Installing it means your steps
     make 25%, 50% or even 75% less noise than usual.

   - Power Block

     This subroutine is only useful for the Disc Block, but do not write it
     off yet, since it will be very useful.  The Disc might (or even should be,
     IMHO) your primary weapon throughout the game.  This means you will also 
     have to master the art of blocking. And returning an enemy Disc to it's 
     owner and doing damage by this is no bad thing, I would say. In it's gold
     version it is powerful enough to take out most enemies with one Power 
     Block.

   - Megahurtz

     Increases the damage potential of weapons, but also increases their energy
     useage.  This is helpful with every weapon, but it will be best coupled 
     with the Disc Primitive. Since the Disc Primitive uses no energy you get a
     damage boost on it for free. :)

   - Corrosion

     This will 'poison' the enemy if you hit him with a weapon. The time the 
     enemy will stay posioned will increase with version. Again it will also 
     increase energy useage of a weapon, which makes this another good add-on 
     for the Disc Primitive.

   - Primitive Charge

     This Subroutine will increase the damage your Primitives (!) do slightly.
     Since no energy is needed to employ it, it will be a very useful addition
     indeed if you fancy on using the Primitives only or mostly (the Disc comes
     to mind).
     

   - Triangulation

     This will give you a sniper scope. Depending on version it will give you
     the option to zoom in further on a target. This will transform some of the
     weapons into sniperweapons. Again a must have I would think.

   - Y-Amp

     You really want to reach that archivebin with the much need subroutine but
     can not jump high enough? Well, install the Y-Amp it will make you jump, 
     jump higher that is. Higher version will increase the jump height.

   - Profiler

     This is a subroutine that displays information about enemies. The higher 
     the version the better the info you get. 

   - Virus Scan
     
     Will tell you if subroutines you want to download are infected. On beta it
     will tell you which subroutines specifically are infected and on gold it 
     will disinfect them on download. 

d) Objects

   - Build note

     When you find a Build note it will increase your version by 2 points. 
     There is a total of 100 notes hidden in the whole game. The number that 
     can be found in each level is given in the upper left corner of the HUD.

   - Code Optimization Ware

     You will love these little critters. Upon useing one (with the use key) 
     they will give you the option to increase the version level of one of your
     subroutines (e.g. alpha -> beta).

   - Core Dumps

     Upon defeating an enemy a core dump will appear. Picking it up with the 
     use key will replenish some of your health and/or energy. The core dump 
     will get weaker over time and vanish altogether. Also you may find certain
     permissions or subroutines in the enemies core dump. As they will also 
     fade into nothingness I suggest that you pick them up as soon as possible.


*******************************************************************************
05. Characters
*******************************************************************************

Here listed are the characters you will meet throughout the game.

- Jet Bradley

  He is the son of Alan Bradley, programmer of the original Tron program and
  co-programmer of Ma3a. Jet is a bit of the rebellious kind as you will learn
  from the e-mail you can download throughout the game.

- Alan Bradley

  The father of the main character. He apparently got kidnapped and one of your 
  objectives will be to locate him.

- Ma3a

  An AI programmed mainly by Lora Bradley - the late wife of Alan Bradley - and
  Alan Bradley. Ma3a is responsible for digitizing Jet and transporting him 
  into the world inside the computer.

- Thorne / The Master User

  Thorne is a former Encom employee, who worked in security. He sold the 
  dizitizing technology to Encoms rival fCon. During an experiment to prove 
  that the technology he sold works something goes awry and his form is corrupt-
  ed. Now he is trying to gain power in the computer world. He is also the 
  cause for the spreading corruption.

- Kernel 

  The commander of the ICP units in Ma3a's systems. He will not tolerate any 
  unauthorized programs in his system. He is also a powerful and formidable 
  warrior.

- Mercury

  A program programmed by the mysterious user Guest. Sent to help you gain ac-
  cess to Ma3a. Current version is v6.2.1

- The fCon Trio

  This Trio will trouble you later in the game. They are the ones responsible 
  for Alans disappearance. They also do everything to get the technology 
  working for fCon.

- Several Programs

  During your quest you will find many helpful civilian programs. Do not derez
  them as it will end your game.

*******************************************************************************
06. Enemies
*******************************************************************************

This section lists the enemies that you will meet during the game.

- ICPs

  ICPs come in three flavors. First there is the basic grunt with a weak 
  armor and only using a standard Disc Primitive. Then there is the upgraded 
  grunt, signified by the forcefield around him. He will use the Disc 
  Sequencer.
  The last kind of ICP will carry a shield around him. He might use a Disc
  Cluster subroutine. To defeat it use a weapon with splash damage or circle 
  your Disc behind him and then return it to you to hit it from behind.

- Finder

  Small, floating robots. Not very strong, but due to their size hard to hit.
  The laser they fire is deadly accurate. Can be fatal in large numbers. Take
  them out as fast as possible. Also, if the chance is there sneak up from be-
  hind to destroy them. Upon destruction I recommond that you are not too close
  to them as they will explode in a large radius and might take you with them. 
  I found these to be the single most annoying enemy in the whole game.

- Z-Lots

  Z-Lots are former civilian programs that have been transformed by the cor-
  ruption. They will use both the Ball Primitive and the Ball Launcher as 
  weapons. They are fairly easy to defeat, but can infect your subroutines with
  a virus.

- Rector Scripts

  These are powerful entities that are spreading the corruption. As weapon they
  will use the Ball Drunken Dims subroutine.  They also have a high protection 
  and can take a few hits. Upon defeat they will explode, so don't be to close 
  to them when they go down. As with the Z-Lots these enemies will be able to 
  infect your subroutines with a virus.

- Resource Hogs

  Their armor strenght resembles that of the ICPs, but they use the Rod Suf-
  fusion subroutine as weapons. This should make it clear that they should be
  take out at long range, where their weapons are not as effective. Much less
  deadly than ICPs. (Mircosoft gets their share of Hogs. :) )

- Seekers

  Welcome to the search engine from hell. These beast are a pain in the you 
  know what to take out. You will only meet two in the whole game. Use 
  Sequencer or any other powerful routine to take it down fast. Also take care 
  of the Resources Hogs helping the first one and the Data Wraiths helping the 
  second one. 

- Data Wraiths

  These are human users much like Jet, but trained to infiltrate other 
  computers. 
  They have a cloaking ability and they can run with a short burst of speed.
  Their armor though is weak, as is their weapon the Mesh Primitive. Luckily 
  they don't use the Energy Claw or Prankster Bit subroutine. They should not
  pose much of a problem, as they are more apperance than power. 

*******************************************************************************
07. Notes for the Walkthrough
*******************************************************************************

- Build notes
  
    The location of most Build notes in the game is random, therefore I can not
    give exact locations for them. The number of Build notes found in a level
    will also be given beside the sublevel name.  

- Downloadables (e-mails, subroutines, permissions)

    The location of the downloadables remains the same. The location of each 
    will be listed in the walkthrough.

- Permissions

    Permissions will be abreviated like this: P7 (= permission 7)

- Archive bins

    I will list the permissions needed for each archive bin like this:
    bin(npn) = bin needs no permission / bin(3;4) bin needs P3 and P4
 
    Also archive bins will be called just 'bins' througout the walkthrough.

- Floating Boxes, crates, cubes (whichever you like to call them)

    These will be called just boxes throughout the walkthrough. 

- Code Optimization Ware

    Code Optimization Ware will receive this acronym: COW (Mooooooo!) :)

- Subroutines status

    Subroutines will receive depending on their status the following suffixes:

    (a)  = Alpha level subroutine
    (b)  = Beta level subroutine
    (g)  = Gold level subroutine
    (i)  = Infected subroutine
    (np) = Subroutine has to be ported in the Stats screen
    (##) = A number telling the energy cost to download

    So 'Submask (b)(i)(np)(45)' means that you will download a Beta level Sub-
    mask subroutine, that is infected and has to be ported and with a download 
    cost of 45 Energy. 

- Memory configuration 

    The memory configuration for each sub-level of the game in will be written
    beside the sublevel name in this manner: (2;5;1;1)

    This means that you have a set of 2 connected blocks, a set of 5 connected 
    blocks and 2 sets of single memory blocks to mount subroutines in. 

- Sublevel subject line

    A sublevel subject line will look like in this example:

      a.a) Program Initialization (2;3;6) (3 Build notes)

      -> Name of sublevel; Memory blocks available; Build notes hidden

    Sublevels that are only Ligthcycle races or cutscenes will not contain any
    information about memory blocks or Build notes.

- Version info

    At the end of the walkthrough for a given sublevel I will put the highest
    achieveable version up to that point. Remember that sometimes you are given
    Build points on entering a sublevel exit.

- Sublevels and Mainlevels

    Each Mainlevel (e.g. Vaporware) is divided into several sublevels. This 
    only for clarification purposes. 
    

And now onto the main part, which is why you probably came here in the first
place. :)

*******************************************************************************
08. Walkthrough
*******************************************************************************

So here we are, you have pressed the start button for the single player game 
and are first treated to the intro. After watching (or skipping) it the game 
starts.

a) Unauthorized User
 
   a.a) Program Initialization (2;3;6) (3 Build notes) 
        
        After materializing you are first greeted by Byte (who is quite full of
	himself I might add).  He will offer you to do a tutorial, which I re-
	commend you do in any case as you will be rewarded with 105 Build 
	points for doing the Basic tutorial. This will also give you a head 
	start in stats. I will not give any hints on the tutorial other than to
	do what Byte says.
	
	If you like you can skip the combat tutorial, since it will hold 
	no rewards (permission 7 will be gifted onto you magically). But do re-
	member to heal up before entering the datastream back to the point 
	where you materialized. Now the fun will start.

	After exiting the datastrem and walking into the main hall you will be
	greeted by a few Z-Lots that you should derez quickly. After this 
	follow Byte to the lift and go down. Now you should first turn left. In
	this area you will find a few boxes and two bins (npn) with e-mails in 
	them. Now go back to the lift and down the right way to where Byte will
	play key again. Talk to the program then follow Byte down the corridor. 

	After noting that you can not jump high enough follow Byte to the next 
	force field. On deactivation go in, and right, but do not use the ramp
	but rather the ledge above it. You will end up on a platform with a bin
	(npn) containing an e-mail and a P8. 

	Now go back and use the ramp, either left or right (it does not matter
	but right is shorter) and go to the blocked bridge. Activate the panel
	beside it to turn it off for a few seconds and thereby removing the 
	blockage, which will free ROMie and give you the chance to raid the 
	bins on the other side, which is what we are going to do now. 

	The first bin(npn) right behind the bridge will give you the option to
	download the 'Y-Amp (a)(25)' and the 'Blaster Primitive (25)'. After
	raiding this bin you will first have to fight back a few Z-Lots that 
	spawned on the far side of the bridge. Then go to the other side of 
	the room and get to the other bin by jumping on some of the smaller
	boxes. The bin(2;3;8) contains P7 and an e-mail. If you want or 
	need you can heal up at the patch routines. The Y-Amp should be 
	installed by now. Go back to the room where you couldn't quite jump 
	high enough and defeat any remaining Z-Lots there. One of them will 
	hold a 'Profiler(a)(i)' subroutine ready for download in his core dump.

	Now jump onto the ledge and go down the corridor to the boxes and the
	next bin(2;3;7) with a 'Profiler (a)(25)' and an e-mail. Now go to the
	end of the corridor to finish this sublevel and to see a cutscene.

	Version: v1.3.3

   a.b) Program Integration (2;3;6) (4 Build notes)

        Another short cutscene and you are good to go for this part. Here you 
	will see your first Code Optimization Ware. Sadly you will be forced to
	use it here and now, or the game (specifically Byte) will not progress.
	Since the selection is not great and you will soon enough find a Gold
	Profiler, I recommend to optimize the Y-Amp. After using the COW Byte, 
	in his infinite wisdom, will note that you do not yet have the per-
	mission to open the door.

	Follow Byte, and while your are at it, you might relieve the two bins
	(npn) of their e-mails. Be careful in your advance though, since an ICP
	will wait at the lower end of the ramp. Now Byte will open a door in 
	the wall. Jump over and traverse the corridor and be prepared to fight 
	back a few Z-Lots after jumping down on the far end. Now you have to 
	jump through the corridor with the corroded floor and upon reaching its
	end you will have to destroy another Z-Lot. Now turn left and go to the 
	boxes. Duck down, to reach the bin(npn) hidden behind them with P1 and
	'Fuzzy Signature (a)(25)' in it. Now go to the forcefield and de-
	activate it with the panel on its right side (P1 needed) and enter the
	datastream behind it to join up with Byte again. 

	Go back to the door at the beginning of the sublevel and open it with
	the newly gained permission. Now follow the only corridor that you have
	access to now, sneak up on the ICPs and take them out. One of the ICPs 
	will have the P4 in it's core dump. Now talk to the program outside of 
	the ICPs room. 

	Go on a bit to see a corridor to your right with a Sec Rezzer at its 
	end and follow it down. Turn right again to see a few boxes and a bin
	(1;2) containing an e-mail. Then enter the small corridor right after
	the boxes and follow it until you reach a room with a broken bridge. 
	Here jump over to the right and onto the boxes to reach the bin(1) with
	P4 and 'Submask (a)(np)(15)' in it. Now go back to where you cloud jump
	over the bridge, but look down and jump onto the bin(1) floating there
	to get a P2. Now use the boxes to jump to the other side of the bridge.

	Here you will have to duck through the small hole to end up below a 
	room with a broken glass floor. Go to the broken part and jump up to 
	gain access to the bin(1;4) here. It contains P2, 'Profiler (b)(35)',
	'Virus Scan (a)(25)' and 'Y-Amp (a)(25)'. Now go back to the bridge and
	use the corridor with the small upwards slope and derez any ICPs in the
	area.
	
	If you want you can now deactivate any Sec Rezzers and access the bin 
	with the e-mail since you now should have the needed permission.  Then
	go ahead to the room with the patch routines in it and activate the 
	panel on it's far end to reroute the power stream blocking your way.
	Be on your guard as a few ICPs will be spawned to keep you from exiting
	this section. After their deresolution, go back to the room with the 
	power streams and go down to Byte to enter the datastream that opens 
	there.

	NOTE: This is a one-way datastream only and the Build notes are hidden
	      only in the first part of this sublevel, so make sure you have
	      found all four before entering the datastream!!!!!

	On exiting the datastream you will be in an area that has and outer 
	ring and an inner circle, both of which are interconnected at every 
	quater of the circle. In the inner circle you will find the port to 
	exit this sublevel, but as of yet it is still protected by a force-
	field. To deactivate it you will have to supply energy to the four bits
	that are in the rooms connected to the outer ring.

	Going right from the entry point will bring you to the first room (the 
	one with the number 1 outside, naturally). Go in and supply energy to 
	the bit. Upon completion of this task a few ICPs will rez in and 
	quarantine fields will be errected to hamper your movement in the outer
	ring.
	
	To get further right to room 2 you will have to use the inner circle.
	Going further right from room two and entering the inner circle at the 
	next opening will enable you to download an e-mail form a bin(1). To 
	the right of room 4 is another bin(2;4) with 'Submask (a)(15)' and 
	'Primitive Charge (a)(25)' ready for download.

	After taking care of all the bits and ICPs enter the port to end this
	sub- and mainlevel. On to Vaporware.

	Version: v1.7.1

b) Vaporware
   
   b.a) Lightcyclearena and Gridbox (9;7;1) (5 Build notes)

        After the cutscene you will end up in the staging area for Lightcycle
	warriors. To continue just walk over to the counter in front of you to
	get a Rod Primitve (which can not yet be used as a weapon, also your 
	Disc and Blaster have been confiscated), which will activate the Light-
	cycle in the arena. After getting the Rod climb the stairs and go 
	around either to the left or right side to the next program that wants
	to talk	to you. You will also note a bin(2;4;6) with an e-mail that you
	can download later and a bin(npn) with P2, P6 and an e-mail within.

	NOTE: Before entering the port to either the training area or any of 
	      the Lightcycle races, make sure that you scoured every corner of 
	      the area for Build notes. New ones will appear on finishing a 
	      race, but the old ones may also disappear, so make sure you catch 
	      every note!!!!

	After talking to the program you should enter the port to partake in 
	the tutorial for Lightcycleraces. The tutorial is again pretty self-
	explanatory.

	On finishing the tutorial (in Version 1.010 of the game you are also 
	able to skip Lightcycle races) search the area for Build Notes, then
	talk to the program on the lower floor to start the first real race.

	When you exit the datastream after your win you will first see two ICPs
	standing at one of the panels. Go to them and listen to their talk. 
	When they ask you which one wins, tell them the blue one will win 
	(Option 2).
	
	Then wait and listen a bit and you will gain 5 Build points. Now look 
	around for Build notes again and then go to where you made the tutorial 
	and talk to the ICP there to gain P4. With this you can download the 
	remaining e-mail. Also you should now look for the locker that can be 
	opened with the P4 to gain the Super-Lightcycle. Now enter your next 
	race.

	You win, you do some Build note searching, you do some talking and then 
	you will enter your last race. What is different about this race is 
	that you do not necessarily kill your enemies, but that your rather 
	have to	get to the other side of the raster and drive onto the fallen 
	tower on the right side of the arena (marked by an exit point). Do this
	to finish this sublevel.

	Version: v2.1.6

   b.b) Prisonercells (9;7;1) (4 Build notes) 

        Talk to Mercury, then walk down the corridor and turn left. Depending 
	on where the ICP stands either sneak up on him or charging at him. Now 
	wait for Mercury to catch up. Talk to her until you receive the P1, 
	then open the door and enter the area with the holding cells. You will
	have to be especially careful of the Finder in this area, since you do
	not yet have a weapon you can destroy it with. 

	On exiting the doorway go straight ahead and walk around the back of 
	the building that is in front of you. Enter the room you walked around 
	through the door and derez the ICP. In it's core dump you should find 
	the 'Suffusion (a)(np)' subroutine, which I suggest you port and equip
	before going further. With the Suffusion Rod take out the Finder and 
	any remaining ICPs in the area to be able to move more freely. Some of
	the ICPs moving around on the outside will carry the P5 with them.

	Before going on you might want to empty the two bins in the area. The 
	first bin(npn) in between the floating boxes will hold P2 and P6, the 
	'Virus Scan (b)(35)' and the 'Fuzzy Signature (a)(25)'. Use the boxes
	to reach the higher up ledge and through it the second bin(npn) with P3
	and the 'Peripheral Seal (b)(i)(20)'. With all the permissions you have 
	gained you are also able to open some of the cells now. In one of them
	is a COW, put it to good use. Also, take care that you pick up the two 
	Build notes in this area, as it is a no return area. 

	After getting all the goodies, enter the control room again and supply 
	some energy to the bit lying on one of the consoles. Then follow it to
	ROMie's cell and open it, so that he can open the datastream to the 
	next area of this sublevel. 

	In the next area first use the I/O node to have Mercury tell you what 
	to do next. Then seek out the ICP in the area and after his demise take
	out the two Encryption units. Then enter the lift to go up. 

	On emerging from the lift seek and destroy any ICPs in the accessible 
	area, then return to the lift. From the lift you can see floating boxes
	on one wall. Go there to find a bin(1;5) with P3 and 'Suffusion(a)(50)'
	in it. From there go right and go onto the ramp leading to the corridor
	(where nothing should be alive anymore if you took out all ICPs).  
	Follow the corridor until the first room, enter it and look for the 
	bin(npn) with the P4 in it. Then go to the next room with a bin(3) con-
	taining an e-mail and 'Y-Amp (b)(75)'.

	Back to the lift. You have now the permissions needed to enter the 
	building besides the lift. Enter it and the datastream within. Now go
	around one of the corners and take the two ICPs out. On picking up your
	Disc a few more ICPs will come in throught the datastream. Take care of
	them and then go ahead to empty the bin(npn) with the following: P8, 
	'Power Block(a)(25)', 'LOL(a)(np)(65)' and 'Peripheral Seal(a)(i)(15)'.
	You should also have all four Build notes by now. 

	Return to the hall by datastream and go to the white patch routine, 
	while fighting off the four ICPs that are waiting for you here. Right
	by it you will find a forcefield on the floor and a panel beside it. 
	Use the panel to lower the forcefield, go down the ramp and follow the
	corridor to end this sublevel. 

	Version: v2.7.4

   b.c) Transportstation (9;7;1) (5 Build notes) 

        Exit the room with the I/O node and suggest to the ICPs that they 
	should better leave. After their expiration go to the boxes and open 
	the bin(npn) to find P2 and 'Virus Scan(g)(50)'. Go on and walk through
	the corridor at the end of the room. Be careful on exiting it. There 
	will be a Finder floating about to the upper right. Also an ICP will 
	patrol the ledge in the about the same direction as you can see the 
	Finder. On a ledge to the left above you will be a few more ICPs (one 
	with Sequencer as weapon). Take out the Finder and the ICP to the right
	, then turn in that direction. You will find a ramp to the next higher
	level. Go there	and fight back the remaining ICPs, then go over the 
	energy bridge to the left and access the bin(npn). It will hold P2, P3,
	'Virus Scan (b)(35)' and the 'Viral Shield (a)(i)(20)'.

	After this go back to the ramp and to it's right, download the e-mail 
	and activate the bridge. Then return to the ramp and go to the lower 
	level again, we will do some extra hunting. Position yourself in front
	of the left of the two squares where the boxes are coming out. Jump 
	onto one when it comes close enough to allow it. Depending on the 
	direction it takes when reaching the highest level you will either end 
	up on a box or on a ledge near a patch routine. Whatever your loacation
	, make your way to the bin in the corner by using the boxes. The bin
	(npn) has P5 and 'Sequencer (a)(40)' in it. Now jump back to the patch
	routine and go to the end of the ledge. Once ther jump over the blocks
	to the other side and go around. Now wait for the gold box to appear 
	from the square and jump on it. Jump off it on the ledge with the COW.

	To get back down you will have to use a few boxes that come up towards 
	you to reach the ledge with the patch routine again, then go to its end
	repeat the jumping over to the other side and then jump onto one of the 
	red boxes instead of the golden one. Then jump onto the platform beside
	the bridge you activated earlier. Two Build notes should be in your
	possesion right now. 

	Go towards the I/O node, but rather than activating it right away you 
	should first take out the Finder to the right and the two ICPs in the
	area behind the wall to which the I/O node is fitted. Two more Build 
	notes are hidden in the area with boxes here also. Now get some updated
	info from Mercury and continue to the right. Go to the bin(npn) on top 
	of the boxes close to where the finder was patrolling to get an e-mail 
	and P5. Get down and advance further into the room, up a ramp and get 
	to the stack of boxes hiding another bin(5) with P1 and another e-mail.
	Then go around the stack, enter the next room and take care of the ICPs
	here.

	First go to the right of the room to reach a bin(2;3;5) with these 
	items: P4, P7, 'Primitive Charge (a)(i)(25)' and 'Profiler (b)(i)(35)'.
	Now go to the door on the left and out onto the platform where the 
	civilian program is. Press the button on the left side of the board to
	release the first Mooring App. Go back the way you came and watch out 
	for the ICPs that spawned. In the area behind the I/O node you will now
	also be able to download the e-mail form the bin(1;5) there. 
	Then go through one of the three tunnels into the large hall and remove
	the remaining two Mooring Apps there. Then, you can either make it
	quick and jump on the transport fast, or you can hang around and take 
	out the last few ICPs that want to stop you. Congratulations on another
	finished sublevel. 

	Version: v2.9.1

   b.d) Primary Digitizer (9;7;1) (5 Build notes) 
	
	After the cutscenes (with some Pong jokes) go ahead and download the 
	e-mail form the bin(npn) then exit through the door, take care of the
	two ICPs in front of it and download the P4 from the core dump. Turn 
	left and walk towards the boxes now. Use the boxes to climb to the top
	of the wall and jump over to the other side. Delete the 10 or so Z-Lots
	in the large open area and the two smaller halls to the left and right.
	After this enter first the hall on the left to find two bins there. The
	first bin(npn) holds P3, the other bin(npn) has 'Sequencer (a)(i)(50)',
	Suffusion (a)(50)' and 'Fuzzy Signature (a)(i)(50)'. Then go to the bin
	(3) to find 'Sequencer (b)(80)', 'Primitive Charge (a)(i)(25)', 
	'Profiler (a)(i)(25)' and 'Profiler (b)(np)(35)'.

	Before getting Byte you may want to go to the bin(npn) hanging beside 
	the door with the forcefield locking it. To rejoin with Byte just go
	to the far wall on the left (below the area with the corruption in it).
	Talk to Byte, then follow him and let him drop the forcefield. Enter
	the corridor to find a COW and tunnels branching off into three 
	seperate directions. Go into each and go close to the edge of the door-
	way there and look down to check for possible Build notes, after that 
	you may choose one of the to jump down. Then check the bins in the back
	of the room. The right bin(3) will hold a P5, 'LOL (a)(i)(50)', 'Guard
	Fortification (a)(15)' and 'Launcher (a)(i)(75)'. The left bin(3) nets 
	you an e-mail, 'LOL (a)(50)' and 'Fuzzy Signature (b)(np)(75)'.

	After your raid, go to the other end of the room (while opening all 
	available doors to check for Build notes) and open the door on your 
	left to enter Ma3a docking area. Remove the presence of the ICPs here.
	One of the ICPs holds a 'Profiler (a)', another a 'Fuzzy Signature (a)
	(np)', and the other hold P3's in their core dumps. Now you should re- 
	lease Ma3a. Do this by supplying energy to the two bits in the panels 
	in front of Ma3a's holding tank. Also check if you have found 4 Build 
	notes up to now, this is vitally important if you want to get all Build
	notes in this sublevel. 

	After the releas of Ma3a another few ICPs will spawn to attack you. 
	On their premature deactivation talk a few times to the civilian 
	program in the area to get P7, with which you can activate the switch 
	in the middle section of the room you originally jumped into. Remeber 
	to not stand below the lift when you call it. :)
	
	Board it to go up and enter an area you will find quite familiar. Turn
	right and use the boxes again to scale the wall another time. Again you
	will also have to fight off a few Z-Lots, one on the left side will 
	have a 'Corrosion (a)' subroutine in its core dump, which I suggest you
	get here. Then make your way to the large force field in the back of 
	the area and talk to Byte there. 

	After he takes down the forcefield follow Byte to the exit area, while
	being harrased by Z-Lots and having to keep a look-out for the last 
	Build note of this level. After you reached the port area you will have
	to fend off the Z-Lots until the cutscene starts. 

	Congratulations on getting through the second main-level.

	Version: v3.2.3

c) Legacy Code

   c.a) Alans Desktop PC (3;3;2;2;1) (3 Build notes)

        On rematerialization follow Ma3a to the bin(npn) and talk to her, then
	download the video archive, after that do some more talking until Ma3a 
	gets a signal from Guest. Follow her to the I/O node, where she will 
	request of you to configure the com-ports. To do this you will have to
	go to the other side of the hall, where another I/O node is off to your 
	right and where four programs are waiting for their activation in a 
	slumped down position. To configure the port (ports 1-4 are numbered 
	from left to right) look at the ports from the second I/O node and look
	at the rings on the floors of the ports. These rings are open to one 
	side. If the opening is showing towards the entry of the port go to the
	corresponding program and talk to it (e.g. Prog 2 for port 2) and wait
	until it has entered it's port. Right beside the second I/O node you
	will also find a panel with which you can change the directions into 
	which the rings are pointing. To turn them you will have to press the 
	switch to the lower right in the panel. Configure all ports in this 
	way.

	Use the second I/O node now to gain additional information and also on 
	how to go on with your mission. You are now sent off to hunt e-mail 
	fragments. To start with this go into the corridor that is to the right
	of the one where the I/O node you just used is and follow it until you
	find a room with a forcefield and a lot of empty and a few filled 
	archive bins. One bin(npn) holds just an e-mail, another bin(npn) con-
	tains an e-mail and 'LOL (a)(65)' and the third bin(7) a P3. To 
	continue on press the button on the panel close to the forcefield to 
	extend a bridge. Go to the middle of the bridge, turn left and talk to
	the program there to gain the first e-mail fragment. Then return to the
	bridge and continue on to a one-way datastream. Be wary of the Finders 
	that spawn after you retrived the e-mail. 

	On exiting the datastream you will end up in a room that looks similar 
	to the first bridge room. In one bin(npn) you will find an e-mail and a
	P5, in the other bin(5) you will get 'Triangulation (b)(100)' and 
	'Suffusion (b)(np)(90)'. Now go on to the middle of the bridge and talk
	to the program. This time you will have to destroy the finders before 
	the program can retrieve the e-mail fragment. While doing this a few 
	more finders will come in through exits on the far left and right walls
	, be very wary of them or they will attack you from behind. The LOL 
	would be a very good weapon to use. The best way is to hide behind the 
	triangle shaped block and to lean and take the Finders down. No matter 
	what the battle will be not an easy one, because of the Finders high 
	rate of fire. Good Luck.

	If part three of the e-mail quest you will get the same treatment as in 
	part two, only with more Finders and the Finders from the walls will 
	now come in through entrance high up on the wall.  In the room you 
	start you will see a bin(npn) with an e-mail within. After gaining 
	access to the last e-mail fragment, go on on the bridge and use the I/O
	node located there. Then go on and use the lift to end up back in the 
	com-port area.

	As of now the security system of the desktop PC will have taken notice 
	of your presence. Therefore you will have to battle a few ICPs on your 
	return topside. Also you will have gained P7 by now, which will allow
	you to raid the bin with the P3 that you could not access earlier. With
	this permission you can access the bin(3) beside the lift, with P8, an
	e-mail, 'LOL (a)(50)', 'Virus Scan (b)(np)(35)' and 'Suffusion (b)(90)'
	within it. Go back to the port with which you entered the sublevel and 
	activate the bit on one of the pillars to end this rather short level.

	Version: v3.8.5

d) System Restart

   d.a) Packet Transport (6;5;3;1;1) (5 Build notes)

        You are now in a transport and have to find a hiding place before they 
	find and delete you. First talk to the Marcella program, then go to the
	back of this car (think of the transport as a train, with you being in 
	the front car of it) to find two bins in between a few boxes one 
	bin(npn) with an e-mail, the other bin(npn) with P1 and 'Cluster (a)
	(45)'. Now use the ramp to go down and take care of any ICPs in this
	car. There is also a ramp on the other side of the car, go up there 
	now. Two ICPs will have useful things in their core dumps, one carries 
	a P3 (enabling to open the doors on the upper level of car 1), the 
	other will hold a 'Profiler (g)'. One the upper level you are now you 
	will find P6 in a bin(npn). Check the doors on the upper levels of car
	1 first before exploring its lower level. 

	On the lower level you will find hidde in a niche, behind some boxes 
	a bin(1) with P3 and two subroutines, which are 'Guard Fortification
	(a)(25)' and 'Fuzzy Signature (b)(75)'. Also there is another program
	you can talk to on the lower level. Do this, then exit the car through
	one of the doors on the lower level and jump over to the next car. Use
	the left door to enter, but be wary of the enemies to your right.

	Now go straight, then right, then another right and then a left to 
	reach a room below the upper walk way with two bins in it. One bin(1;3)
	has a P2 in it, the other bin(npn) contains an e-mail. Now exit the 
	room, go right and then turn right and use the blocks to jump up onto 
	the walkway. 
	
	Go on and take down the ICP (with P4), then walk on and look down the 
	edge of the walkway until you see a Build note (this one is in a fixed 
	location) and jump down there. From there go right and right again to 
	find another well hidden bin(1;2;3) with P4, 'Base Damping (a)(15)' and
	'Triangulation (b)(100)'. Now make your way to the exit of this car,
	and jump over to the next. 

	In the third (and last) car you will find ICPs patrolling the lower 
	level, so you will have a battle ahead of you. Be especially wary of 
	the ICPs carrying shield, either use Ball weapons or the Power Block to 
	defeat them. After the battle search the right side in the back of the 
	car to find a bin(1;2;3;4) with a P5 in it. Also you should have gotten
	at least P6, P7 and P8 from ICP core dumps. Now use the ramp on the 
	left side to go up one level and to reach a bin(1;2;3;4;5) with P7, 
	'Profiler (g)(i)(50)' and 'Y-Amp (b)(i)(75)' in it. Now use the front 
	door of the car (the one pointing towards car 2) to find a COW(P6 
	needed to operate) which you will put to good use. Then go to the right
	side of the car. There you will find to the front a bin(npn) with an 
	e-mail and a bin(6) with a 'Suffusion (b)(np)(90)'. Now go to the lower
	level and exit the car to its back. There you should find a program 
	that will tell you how to avoid deletion (he might have gone inside 
	during your battle). Then check if you found all Build notes in this 
	sublevel before finishing it by using the left side back door on the 
	upper level of car 3.

	Version: v4.0.5

   d.b) Energy Regulator (6;5;3;1;1) (4 Build notes)

        Upon start of the level you are hidden between a few boxes in the 
	middle of a huge hall. Use the LOL or the Disc/Triangulation combo to
	take out first the ICP on the far platform to your left, then the one 
	on the right to be able to move about more freely. Then make your way 
	over to the left side platform first. Use the red and blue boxes to get
	to the bin(npn) with P5 and P6 inside first, then go on to the next bin
	(5;6) to download the video archive in there. After this go to the 
	forcefield on the right side and deactivate it with your newly gained
	permission and enter the datastream after this. 

	On exiting follow Byte a few meters and then take out the ICPs and the 
	Finder. Before you can activate the I/O node where Byte is waiting you
	must go to the bins at the far end of the room. One bin(5) holds the 
	needed P2 and a 'Base Damping (a)(15)' and a 'Submask (b)(i)(20)', the
	other bin(npn) holds three e-mails. Now communicate with Ma3a then go 
	on down the floor and enter the datastream.

	Now go straight ahead to the end of the walkway (oh, and while you are
	at it you could also take out the opposition) to the bin(5;6) with P1,
	P6 and 'Virus Scan (g)(np)(50)' in it, then go back to the crossroads 
	and use it. At its end first search the area on the right, then go down
	the left way. Then just follow the way until you reach the panel with 
	the patch routines beside it. Charge your energy (important) then turn
	right and go towards the edge. There you will see a moving floor. It 
	will always move three sections further. The first part of the way will
	be solid in the last part of the way a few floor panels will be missing
	. Here it is moving fairly slow, so it should be no problem getting to 
	the other side here with a bit of jumping. 

	Once you reached the other side, take down the ICPs then follow each of 
	the three branches to its end and energize it. After this you will have 
	to do some more panel jumping. The pattern is like the first one, only 
	this time the panels move faster. Upon your safe return to the other 
	side you will be assaulted by several ICPs. Also, a new branch to the 
	right will be opened by the civilian program in the area. After going 
	down the newly opened branch watch your back carefully, because two ICP
	with Sequencers will come up behind, additionally you will have more 
	ICPs opposing you in the direction you need to go. Take them out before 
	going to the area with the boxes and two bins floating among them. One
	bin(1;6) holds an e-mail, the other bin(1;6) the 'Cluster (a)(45)' and
	the 'Fuzzy Signature (b)(75)'.

	Walk on down the way until you reach Ma3a, then enter the datastream 
	behind her to end this sublevel.

	Version: v4.3.0

   d.c) Power Occular (6;5;3;1;1) (3 Build notes)

        Ma3a needs you to clean up the area, well, go on, do it. After cleaning 
	the area of all ICPs and the lone Finder go back to where the patch 
	routines are near your starting point. Go up the stairs opposite of 
	them and turn right to find a bin(npn) with an e-mail, P4 (can also be
	gained through one of the ICPs in the area), 'Triangulation (a)(75)' 
	and 'Triangulation (b)(np)(100)'. Then use the boxes to reach the bin
	(4) that is floating shortly after the starting point and access the 
	video archive in it. 

	Now go to the bin(4) with four subroutines contained within it, which 
	are 'Submask (b)(20)', 'Guard Fortification (b)(20)', 'Base Damping (a)
	(i)(15)' and 'Encryption (a)(i)(15)'. The bin(npn) floating above this 
	one holds an e-mail. Now talk to Ma3a, then take the lift that just 
	appeared and ride it to the lower level. To the left you will see a few
	bins, but we will come back to them later. Rather turn to the right now 
	and talk to the program there. After talking to the program for a bit 
	he will lower a bridge with a few boxes on it. Use it to cross to the 
	other side, then turn left and follow the corridor to its end. There 
	will be ICPs waiting for you. One of the ICPs will hold a P6. Now use 
	the other bridge to get to a datastream. To your right you will also 
	find a COW, but you might want to keep it around for the beta LOL you
	will find later, so you can upgrade it to gold level. Use the data-
	stream now. 

	To your left are a few boxes and a bin(npn) with 'Cluster (a)(i)(45)' 
	and two e-mails. For solving the mission however you will have to turn
	right. Jump over, then use the bit to the right, then use the moving
	platform to get to the other side. Move further right, pass the 
	junction to the next bit and jump onto the moving platform in front of 
	you. From there get to the last bit and activate it (No), then use the
	moving platform that is opposite to the bit. On the other side go right
	, jump over and activate the bit there (Yes), now go back to the last 
	bit and use it again (Yes). Now jump back to the bit that is second to
	front (where you came in through the datastream), and activate it (Yes)
	also. Get back to the first bit and use it as you used the others. Now 
	the lenses are configured. Return back topside through the datastream.

	First take out all ICPs on this level. Now it is time to raid the two 
	bins that could not be accessed earlier. The first bin(4;6) nets you a
	'Y-Amp (g)(i)(100)'. The second bin(4;6) holds a 'LOL (a)(65)', 'LOL
	(b)(110)' and an e-mail. Make sure you get the LOL beta and, if you 
	have not used it yet, I suggest that you use the COW in this area with
	it. After getting everything you want go to the control room opposite 
	of the bins and use the panel there to turn the Occular. Then go back 
	up topside to Ma3a. The Build notes should all be in your possesion by
	now.

	Talk to Ma3a, then use the datastream to get up into the control tower.
	From there snipe all ICPs (therefore also my suggestion to get a gold
	LOL) trying to reach Ma3a until the timer has reached zero. The ICPs 
	will attack in waves, use the time in between waves to recharge your 
	energy at the conveniently located patch routine. After your sucessful
	defence you will have finished this main level.

	Version: v4.7.6

e) Antiquated

   e.a) Testgrid (6;3;3) (0 Build notes)

        Now you will have to fight your first Seeker. There is one very 
	important rule that you will have to follow when fighting a Seeker, 
	never and I mean never stand too close to it. I can kill you in one 
	blow if you are too close. If you want to defeat it easily use the Disc
	or Sequencer from a few meters off and throw it repeatedly at its head 
	until the energy discharge starts. At that time it will bury itself and
	three Resource Hogs will spawn. Take them down and if possible use 
	their core dumps to heal and recharge your energy (or get to the patch
	routine if that is possible). After the Hogs are defeated watch the 
	ground closely, so that you can tell where the Seeker will appear. 
	Position yourself right and repeat what you did before and you should
	have no trouble defeating it, although this method will take a little
	time. After defeating it you will have mastered another sublevel. What 
	is more at the end of this sublevel you will also regain the Blaster 
	Primitive, that got taken away from you during the 'Program 
	Integration' sublevel.

	Version: v4.8.6

   e.b) Main Processor Core (6;3;3) (4 Build notes)

        Upon entering this sublevel you will first meet I-No, talk to him for a
	little while to gain a bit information about this old system. Then use 
	the I/O node and then go on to the forcefield to your right. I-NO will
	lower it for you and then the fun starts. Both on the left and right 
	tanks will move into firing position. They will start to fire at you as
	soon as you show yourself. Luckily you are a bit faster and can evade 
	the shells of the tanks. What makes the next part hard is that you have
	to cross over to the other side of the hall first. You will have to
	do this by interconnected platforms that can be destroyed by the tanks
	and although the platforms will reform after a while it is still
	frustrating standing on a platform in the exact same moment that a 
	cannon shell hits it. The only thing I can say is Good Luck.

	If you made it to the other side go to the bin(npn) in between the 
	boxes to get a P3 and an e-mail. Also on the back wall a COW will be 
	moving around. He will travel in a circle, just wait until it gets 
	down. After using it and getting the Build note (this one seems fixed)
	on top of the boxes return to the huge pillar in the middle of the room
	and activate one of the panels that are located to its left and right 
	sides to go up.

	On reaching the topside you will have to deafeat 4 Resource Hogs with 
	one holding a 'Peripheral Seal (a)' in ist core dump. After their 
	defeat activate each of the four panels located on the edge of the 
	middle platform. Use the I/O node on the upper ring and talk to I-NO,
	after this a one-way datastream will open on the middle platform, use 
	it to go on.

	You will end up in a room connected to a circular walkway. The walkway 
	has a room after each quater of the circle. Also there is only one way
	to go around and after appearing in a new room you will have to fight 
	off several Resource Hogs, so be prepared. On the opposite side of the 
	first room you will find two bins, one bin(npn) with an e-mail and an-
	other bin(7) with P8 in it. Since you can not do very much here now, I 
	suggest that you go on to the next room. On trying to exit the first
	room a few Hogs want to keep you from doing exactly this, one will gain
	you a P5 and another a 'Peripheral Seal (b)', though.

	As it is you can not do very much in the second room either, just now, 
	since you are still missing a few permissions, so go on to the third.
	Don't stay in the third either, where you want to go is the fourth 
	room. On the raised platfrom in the back left of the room are a few 
	boxes, and a bin(npn) with P6 and 'Sequencer (a)(25)'. With the P6 you 
	will now be able to access the bin(6) in the third room with a P7, and 
	with this you can get the contents of the bin(7) in the first room. One
	of the Hogs might carry the P8 around also in its core dump. Now we 
	will empty the bins in room 2. Go there to the raised platform on the
	left side and you will find 3 bins among the boxes there. Two bins(7) 
	will hold one and two e-mail respectively, the other bin(8) holds a P5,
	P7, 'Cluster (b)(i)(90)' and a 'Fuzzy Signature (b)(15)'. After we have
	raided all the bins we can set out to do what we came here for. First 
	go to room 2 and activate the panel on the raised platform there, then
	do the same to another panel in room 4. Now return to the I/O node in 
	room 1 and talk to I-NO there. After this you have finished this sub-
	level and will be automatically transported to the next.

	Version: v5.1.7

   e.c) Old Gridarena 

   	Now you will be treated to three consecutive Lightcyclematches. After 
	defeating the opposition in each room try to get a Shield power-up
	before exiting the current area. You will have to find an exit in each
	arena which will be on a wall. It is a section that was protected by a 
	forcefield during the race. While going to the next section you will 
	have to evade a few Tank programs. On winning the third you will get an
	exit point, just drive over it. Good Luck programs. 

	Version: v5.2.7

   e.d) Main Energy Pipline (6;3;3) (4 Build notes)

   	After you get your mission update, walk around the boxes and take care 
	of the Resource Hogs, then go to the empty bit socket and turn right
	there. Down by the boxes there you will find the bit for the socket.
	Supply it with energy and activate it to go on. After crossing the 
	energy bridge look for a bin(npn) behind the boxes to find a P2, 
	'Peripheral Seal (a)(np)(15)', 'Triangulation (b)(100)', 'Submask (a)
	(15)' and 'Base Damping (b)(20)'. Then go on up the ramp to the left.
	On reaching the top of the ramp you will be in a room with two huge
	pillars in its middle. First derez the Resource Hogs hanging around. 
	Then turn left to find a bin(2) on top of a few boxes with an e-mail in
	it. Then go around and exit the hall on the other side. 

	Now you will end up in a room with a lot of moving platforms and a 
	countdown running. On the left, right and front wall are platforms with
	a button to push. You will activate all three switches to solve this 
	part. The left one should be the easiest to reach, then go on to the 
	middle one and activate the right one last. You will get a bonus on 
	your countdown after activating one of the switches. After the last 
	switch has been activated the platform you are standing on will auto-
	matically rise to the top, so stay on it. Also be wary of the two 
	Finders floating around above you. On reaching the top first take care
	of the Hogs coming in through the door then turn your attention to the
	bins in the middle section. The lower bin(npn) of the two holds P5, an
	e-mail, 'Corrosion(a)(i)(100)' and 'Corrosion(b)(225)'.  The other 
	bin(5) contains just an e-mail. 

	Enter the large hall through the door that was defended by the Resource
	Hogs. Now jump over the obstacles to the right of the door to reach a 
	COW. To the left of the door you may find a Build note so check there,
	too. Then go to the floating boxes and bins on the left side of the 
	room. In the lower bin(npn) is a P3, in the upper bin(3) is an e-mail. 
	After the retrieval talk to the program on the far side of the room.
	Jet has proven his persuasive skills and a datastream will now be open 
	for you to enter, do so. You will end up in the sphere you just saw 
	from the outside. Talk to I-NO and wait for him to extend the ramp to 
	the Legacy Code. Walk up the ramp and retrieve the code disc to end 
	this mainlevel.

	Version: v5.6.5

f) Master User

   f.a) City Hub (6;2;2;2;1) (5 Build notes)

   	Welcome to the City program. First turn around and go around the right
	corner to find a program that will give you a 'Viral Shield (b)', an 
	offer you can not turn down (unless you used COWs on the Viral Shield).
	Now you should check the immediate area for Build notes, as you will 
	not be able to return here. After your check activate the panel to call
	a transport to the other side. Leave the transport and walk to the 
	right where you will find a bin(npn) with P5, 'Viral Shield (a)(20)',
	'Launcher (b)(i)(115)' and 'Virusscan (b)(np)(35)'. Then look for any 
	Build notes in the area, this is also a no return area ynd you should 
	have three before talking to the program in this area. Look for the low
	level compiler and talk to it. You will find it when you enter the door 
	further down on the right side wall. In there you will also find a
	bin(5) with an e-mail. 

	After the talk an new challenge will spawn. You will have to defend the 
	three towers in the middle from the corruption forces for 2:00 minutes
	when a few ICPs appear to help (yes, help) you. It would be best to 
	install the Viral Shield in your memory, so that your subroutines do 
	not get infected so easily. Be especially on the lookout for Z-Lots 
	that are on the walkways that connect the towers, as they are the ones
	that will be responsible for taking them down. They should be your 
	first priority to destroy, then attack the other Z-Lots. You may also 
	have to battle against your first Rector Scripts here, be careful 
	around them as they can pack a punch and also do not go down easily. 

	When the cutscene with the ICPs and Mercury is finished check the area 
	around the Progress Bar for Build notes first, also a COW will be in 
	front of the bar. Go to the patch routines and walk through the arcway
	to the left. Right after passing under it you will find a few boxes and
	a bin(npn) with 'Viral Shield (a)(20)' and 'Launcher (a)(75)' in it.
	Go up the ramp to the back alley. Here you will find a few Z-Lots and a
	Rector Script harrasing a civilian program. Help it by eliminating the 
	corruptive forces. Several of the Z-Lots will carry 'Corrosion (a)' and 
	one will carry a 'Launcher (a)'. After the demise of the enemy talk to 
	the program you just saved to get a P3. Go to the I/O node at the 
	entrance to the alley and talk to Guest there. Check if you have gotten
	all Build notes and then go to the entrance of the Progress Bar and 
	meet back up with Ma3a and end this sublevel.

   f.b) Progress Bar (6;2;2;2;1) (4 Build notes)

   	The first part of this level is fairly easy. First you should set out 
	to find all four Build notes and while you are at it, disinfect any 
	subroutines from the preceding battles if you have not yet done so. 
	Also look for the COW on the back wall of the lower level. If you enter
	the datastream to the upper level you will find to your right one bin
	(npn) with an e-mail and P8 and another bin with P6, 'Profiler(g)(50)',
	'Virus Scan(g)(50)' and 'Y-Amp(g)(75)'. After your gathering operation
	talk to all programs in the area, until you have to talk to the DJ, who
	wants to know what the other programs would like to listen to. Ask the 
	programs then tell the DJ the answer (usually Track 6). There are 3 
	programs on the lower and two on the upper floor to ask. 

	Now you are able to talk to the High Level Compiler, who will agree to 
	compile the TRON Legacy Code. Then talk to Guest through the I/O node
	on the upper level. Interesting turn of events, wouldn't you say? And 
	this is not the end of it, because now, Thorne, the Master User will 
	make it's presence known. You will have to defend Ma3a for 3:00 minutes
	during the compilation of the code. When Thorne charges up a sickly 
	green energy ball fire your weapon at it until it disappears, then take
	care of the hordes of Z-Lots pestering you until Thorne charges up his 
	next ball. The best way to finish this fight is to go to the upper 
	level, as there is only one Z-Lot up there (with a 'Drunken Dims (a)' 
	subroutine), and you can hide in the back where the I/O node is to 
	protect you from the attacks of the Z-Lots on the lower level. You will
	also be able to access the white energy patch routine, which will en-
	able you to use energy based weapons on a more free basis. Stop all of 
	Thornes energy balls until the timer runs out and you will have 
	finished this sublevel. 

	Version: v6.0.7

   f.c) Outer Raster Getaway 

   	Another Lightcycle level, this one works just like the one in the 
	EN12-82 system minus the tanks. Oh, and did I mention, Run, User
	Run. :) :P

	Version: v6.2.7

   f.d) fCon Labs / Ma3a gets saved

   	Not really a level, rather a cutscene with its own description

   f.e) Remote Access Node (6;2;2;2;1) (5 Build notes)

   	In this sublevel you will find only Resource Hogs as your enemies, so 
	be prepared to fight a few long range battles. After the talkage heal 
	up if you need to do so and start to disinfect any subroutines that got 
	infected during your battle with Thorne. Turn around and take the right 
	turn at the junction. Go on and take another right and at the next 
	junction go down to the left to find a bin(npn) on the left wall with 
	P1 in it (which can be also gleaned from one of the Hogs on this upper 
	level). Right opposite of the junction you just walked down, close to 
	the edge is a formation of three cube like objects where the last one 
	is a bit higher than the first two. On there you will find a bit that 
	needs some energy, supply it. Then follow the bit to a datastream. 
	
	Go up to the area with the many boxes and the five bins. The first bin
	you should (and can) access is the bin(npn) with a P4 and an e-mail in 
	it. Then there are two more bins(4) with an e-mail each in it. The bins
	with the subroutines can not be accessed just yet, so you will have to
	wait a bit. Check if you have gained the two Build notes from the upper
	level before entering the data stream you opened with the bit. 

	Enter the data stream and take care of the Hogs on the next level. Then
	walk left form the datastream and enter the space between the large two 
	blocks towards the edge of the open space of this level. Look down to 
	see a few blocks and a bin further down. Jump down to the bin(npn) for 
	P5, then jump back up again. Go further left to find another bin(5) and
	get P1 and P8 from it. On the oppsite side of the block this bin is 
	hanging in front of you will find another bin(npn) with an e-mail in 
	it. Now go further left to find a dead end with another bit needing 
	energy. Supply it and then go to the right of the datastream to find 
	another datastream that will take you down to the floor level. Also, 
	see if you have gained another two Build notes on the middle level 
	before entering the stream. 

	On the floor level, first take out the Hogs, then access the bin(npn) 
	to the left of the datastream for a P2 and a P8. After this walk to the 
	boxes to the right of the datastream and scale them to reach a COW. 
	Then search the area for the last Build note. After you have done this 
	activate the bit on the panel right opposite to the datastream. Now get 
	back to the toplevel, we will now take care of the two bins we could 
	not access earlier. Oh, and we will also take care of the blue ICPs 
	that want to stop you. The first bin(1;2) with three subroutines holds 
	'Power Block (b)(np)(75)', 'Cluster (b)(90)' and 'Sequencer (b)(80)', 
	the second bin(1;2;8) has a 'Triangulation (g)(125)' and a 'Profiler(b)
	(35)'. Now return to the junction where you found the bin with the lone
	P1 in it. Talk to Mercury, who is waiting for you there, a few times 
	and you will end this main level. 

	Version: v6.6.6 (The version of the beast)

g) Alliance

   g.a) Security Server

   	Another cutscene with its own designation

   g.b) Thornes Outer Partition (10;4;1;1) (5 Build notes)

   	What you never thought possible has happened, you are now allied with 
	the forces of the Kernel that was out to eradicate you during the first
	part of the game. The first thing you have to do is make your way down
	to the lower level, do this by turning around and going to the left 
	hand side, there you will find a possibility to go down. Now go up to 
	the ICPs that you could already see from the ledge. Then go on to the 
	bin(npn) on the left side with a P6, an e-mail and 'Corrosion (a)(i)
	(15)' in it. Now use the twisted bridge to assault the Z-Lots on the 
	other side, this time you will have help from the ICPs of the Kernel. 
	Before doing anything else fight your way through to the end and 
	eradicate and corruption forces you find in the area. The end of the 
	'assault area' is where there are a lot of defeated ICPs lying around.
	Also there is a white patch routine to the right. Now go back towards 
	the bridge first to start retriving data from the bins you could not 
	access because of the raging battle. 

	Opposite of where the health ball was (about the middle of the 
	battlefield) are two bins(npn) of which one holds 'Launcher (a)(25)' 
	and the other the P8 get it. Now go back to the area where the 
	deafeated ICPs are lying around. To the left of the street you will see
	a few pieces of floating debris, use it to jump over to the pillar like 
	remains on the other side. There you will find a bin(npn) with the 
	'Drunken Dims (a)(50)' Subroutine. Jump back and get to the bin(npn) 
	near the white patch routine with an e-mail and 'Encryption (b)(20)' in
	it. 

	Now go on until you reach and I/O node and use it. After the talking go
	over to the other side of the room and use the datastream there. Go 
	ahead, use the ramp on the right side, take out the Z-Lots, then go
	to the area with the moving rings. Once there you will have to destroy
	the Rector Scripts that are spawned in the middle of the rings while 
	simultaneously having to defend yourself from Z-Lots. After this battle
	the sublevel will be finished.

	Version: v7.0.0

   g.c) fCon Labs / Data Wraith Preparation

   	Another Cutscene.

   g.d) Thornes Inner Partition (10;4;1;1) (5 Build notes)

   	After talking with the defeated program get out of the room and walk 
	down the slope. Be careful in this level, as there will be quite a few
	Rector Scripts lurking around. At the base of the slope first turn left
	to find a bin(npn) with a P1 and e-mail in it and another two bins(1) 
	also containing an e-mail each. Then go to the right where you will 
	find a few patch routines. Then go on and defeat the Z-Lots and the 
	Rector Script that are blocking you way, until you find another 
	defeated ICP lying by the wayside. From there take a right turn. You 
	should find a energy patch routine to the right and a bin to the left 
	above you on a ledge. Go up the slope a bit and jump over to the bin(1)
	containing P4, P6 and an e-mail. Now jump down and go back to the 
	junction and follow the lower path around until you find a bin(npn) 
	(close to a health routine) with P8, an e-mail and 'Viral Shield (g)
	(30)' in it. Then go back to the junction again and walk to its end to 
	find a bin(4;6;8) with 'Corrosion (b)(i)(150)', 'Corrosion (b)(150)' 
	and 'Drunken Dims (b)(i) (120)' in it. Also in this area you will find
	a COW to use. 

	Retrace your steps to the junction again and go down the way and this 
	time follow it to its end. You will see a bin(npn) with an e-mail in 
	it. From there go right, down the path that is guarded by Z-Lots. At 
	its end a bit hidden you will find a downwards slope that is the exit 
	to this sublevel. 

	Version: v7.2.2

   g.e) Thornes Core Chamber (10;4;1;1) (0 Build notes)

   	Here you will meet Thorne, Alan and the Kernel. After some talking the 
	battle against the Kernel starts. The first thing you should take note 
	of is, the pillars and some floor panels are destructible, so take care
	around them. The second thing you should be careful of, is that you do 
	not hit Alan. During the first part of the battle the Kernel will stand
	up on the ledge with the beaten Thorne. From there he will attack you 
	with the Sequencer Disc. Either run from them (bad idea) or deflect 
	them with Power Block (good idea). If need be try to heal up at the 
	health routine. After you have done some damage to the Kernel he will 
	deactivate his shield and come down to fight you one on one in a Disc 
	battle. If you are like me, then you will honor his request and fight
	Disc Primitive against Disc Primitive, if you do not want to honor his 
	request use any weapon available to you. Either way Good Luck to you! 
	:)

	After the battle you will have finished this main level.

	Version: v7.3.9

h) Handshake

   h.a) Function Control Deck (3;1;1) (4 Build notes)

   	Now you ended up in Thornes PDA. Configure yourself for a battle 
	against Finders, which will be the only enemies here. Then set out to 
	find all permissions and Build notes first before persuading the PDA OS
	to help you. You should first exit the room through one of the doors 
	and get to the panel that activates the bridge. Then return to the 
	starting room and go on the lift there. Activate it by using the switch
	beside it. Once down exit the room through the only exit. To the right
	of the exit you will find a bin(npn) with an e-mail and P2 and P6 in 
	it. 
	
	Then continue your way. In the large hall use the two big, moving 
	platforms to get to the other side, then go through the door on the 
	right. Call down the lift in the room you will reach and go up. On the 
	upper level you will find a bin(npn) with P2, P3 and an e-mail within. 
	Then use the left or right door to exit and make your way to the panel 
	that activates the bridge. Go back to the first room now and access the
	bin(2;3;6) there. A 'Base Damping (g)(25)' and an e-mail will wait 
	here.
	
	Then use the lift to go down again and move to the room with the moving 
	platforms. Wait until one platform advances towards you. While it is 
	coming closer press the switch on the panel on the large contraption in 
	this room. Now use the two platforms to go to the other side and push 
	the button there, too.

	Now go trough the corridor on the right and use the lift to the upper 
	level. Once there go to the back of the room and activate the switch 
	located there. Then use one of the exits of the room and the bridges 
	you activated earlier and go back to the first room. Flip the switch 
	there also to finish this, rather small, mainlevel. 

	Version: v7.6.2

i) Database

   i.a) Security Socket (5;2;2;1;1;1;1;1) (5 Build notes)

   	Finally you have reached fCon's server. Your first objective here will 
	be to find an access to the firewall. First turn right and talk to the
	programs there, then continue your way to the right and follow the half
	circle around to its end. There you should take out the Finder and the 
	ICPs. One of them carries a P5. Now you download the e-mail from the 
	bin(npn) you see. Now go to where there is a deactivated datastream in 
	a niche shortly before the end of half-circle and go down the ramp 
	opposite of it. Once you've reached the bottom there is only one way to 
	follow. Remove all opposition and go on until you reach a dead end, do 
	not energize the bit you saw just yet. In the dead end you will find a 
	COW and a bin(npn) with a P2, 'Energy Claw (a)(100)', 'Cluster (a)(45)'
	and 'Fuzzy Signature (b)(10)' in it. Now go back and energize the bit 
	and follow it to its socket. 

	Be prepared now, as you will meet your first Data Wraiths in just a 
	moment. Activate the bit. Enter the room and find a black-blue pillar 
	in its middle. Use it to deactivate the forcefields to your left and 
	right. In the right room is a bin(npn) with P5 and P7. Go back up to 
	where the deactivated datastream pad was and enter the now active 
	stream. Go to the next datastream to reach the lower level and make it 
	your first priority to take out the Hogs. Now go ahead and destroy the 
	four yellow power tabs on the wall. Now go back topside and go back to 
	the starting section of the level. Once there you will see how a few 
	ICPs over to your left will activate an energy bridge and start to 
	attack you. Kill their processes. 

	Go on until you reach a Sec Rezzer from there go down to your left, 
	pass the boxes with the bin and the closed off port to the firewall an 
	go into the next section. First go to the back of the area where the 
	boxes are to find a bin(2;5;7) with 'Power Block (b)(75)', 'Fuzzy 
	Signature(b)(15)' and 'Peripheral Seal(a)(15)' in it, then go down the 
	stairs opposite of the Sec Rezzer. Go right from the stairs and follow
	the way until you find a ramp. At the top of the ramp you will see the 
	datastream that will transport you to the second modulator socket. This 
	socket is configured just like the first one, so repeat what you did 
	there. Also hidden in one of the niches here is a bin(2;5) with P8,
	'Primitive Charge (b)(15)' and 'Y-Amp (g)(100)'. Now return to the exit
	and fight back a few more ICPs. 

	Then go towards the firewall port, but do not enter it yet, because you
	might first want to access the bin beside it, as you now have 
	sufficient permission to do so. This bin(2;5;7;8) holds the 'Base 
	Damping(b)(20)' and the very nice 'Megahurtz (a)(85)'. Now enter the 
	port and finish this sublevel. 

	Version: v8.0.1

   i.b) Firewall  (5;2;2;1;1;1;1;1) (5 Build notes)

	Watch the cutscene, then take care of the ICPs in the room. The bin 
	that is in this room can not be accessed yet, so will come back to it 
	later. This level is pretty straight forward. Look for the one niche 
	where a datastream is active and enter it. You will end up in a plat-
	form with two tubes and a walkway in its middle that is perpendicular 
	to it. To get through the tubes safely wait for the moving force field
	to disapper then run through the tube. At the far end of the platform 
	you will find a bit which you activate, then turn around and return to
	the starting room by means of the datastream.  Once there go on to the
	next niche with an active datastream. 

	In the middle of the second platform you enter now you will find a lone
	ICP and off to your right two bins(npn) one with P2 and P3, the other 
	with an e-mail within. You will also have to be a bit more careful with
	the forcefields now, as they move towards you, then back to where they
	started. This time you will have to follow them on their 'retreat'.
	Activate the bit, return to the main room and enter the next data-
	stream.

	In the tubes of the third platform you will have two moving forcefields
	per tube. In the middle of the tube you will find a marked section. 
	Follow the first field until it dissipates close to the middle, then 
	wait on the marking for the second field to move away form you and 
	follow it. In the middle section to the left you will find a few boxes
	and a bin(npn) with P5, an e-mail, 'Guard Fortification (b)(20)', 
	'Encryption (b)(20)', 'Submask (b)(np)(20)' and 'Profiler (g)(50)'.
	Activate the bit, then return to the main room. You will be greeted by
	ICPs, but they will quickly leave if you find the right persuasive 
	means. :)

	In one of the niches of the main room a COW will have appeared. We can 
	now also take care of the bin(2;3;5) here, that holds a 'Energy Claw(a)
	(50)' and a 'Megahurtz (a)(np)(100)'. Go on to the last active data-
	stream to enter the configuration platform. Ring 1 is the inner ring, 
	Ring 2 the middle one and number 3 is the outer ring. The panel on the
	left will activate Ring 1 and 3, the panel in the middle will move 
	Rings 2 and 3 and the right one moves 1 and 2. The rings activated will
	all move one sixth of a circle further. Use the panels to align the 
	breaks in the rings with the energy couplings on the left and right 
	wall to solve this mission. Enter the datastream and you will end this
	sublevel.

	Version: v8.3.1

   i.c) fCon Labs / Alan Lost

        Another cutscene.

   i.d) Primary Docking Port (5;2;2;1;1;1;1;1) (5 Build notes)

   	Your first objective will be the removal of any enemy presence in the 
	area. Do this now. Some of the ICPs will carry a P5. After the demise 
	of the enemies return to the bin close to where you started. This bin
	(npn) holds P2 and P3. Then go ahead to the junction and turn left. 
	Here you will find several bins. The one closest to the junction, is a
	bin(5) that holds 'LOL (b)(i)(110)'. To get to the next bin(2;3;5) you
	will have to jump on a few boxes. It holds 'Power Block (g)(np)(100)'. 
	Further down you will find a COW, after this return to the junction and
	go down the right path now. There you will find a bin(2;3) with P5 and
	two e-mails. Then follow the path until you find Alan and a program 
	looking at the server. Follow the program to the room with the plans.

	On the far side of the table you will find a bit that needs energizing.
	When you have done this just follow the bit to its socket, go through 
	the door and activate the shuttle and don't mind the Data Wraiths that 
	are trying futily to stop you. Both of the Wraiths will hold an 'Energy
	Claw (a)'. Once you've docked with the shuttle go up to the I/O node to 
	communicate with Alan, then go on to the panel in front of the first 
	security bit socket. Press it to open the socket, then hit the middle
	of it with your Disc. You will know you succeeded when the clamps open.
	Before going on to the next bit socket you will have to fend of the 
	Data Wraiths that will spawn on the ledge high above you. Just LOL at 
	them. :)  Then repeat this with the next bit. 

	Now you will have to enter the shuttle again and use it to reach the 
	other side where you will do the same to the bits there. Also there is
	a bin(npn) with an e-mail here. After you have taken care of the bits 
	board the shuttle again. On your next dock you should first take care 
	of all the ICPs here, then go on towards the I/O node. First you might 
	want to access the bin(npn) that is floating above the boxes, it holds
	a P2 and P7. Then use the I/O node. Go to the bridge, activate it, 
	cross it and finish this sublevel.

	Version: v8.6.5

   i.e) fCon Labs / Security Breach

   	Another cutscene

   i.f) Storage Section (5;2;2;1;1;1;1;1) (0 Build notes)

   	Welcome to your second Seeker to battle in this game. This one is much
	harder to defeat than the one in the old Encom system. For one thing he
	will not have to reatreat for a while when a discharge hits him, as 
	there are no discharges here. Then he will be aided by Data Wraiths 
	which try to attack you from all angles while you try to destroy the
	seeker. A good combination of subroutines might be the LOL (gold), 
	paired with Megahurtz and Corrosion (also gold), as well as the Energy
	Claw (beta or gold). Attack the Seeker itself with the LOL and any Data
	Wraiths that you can not reach on the far left ledge. Destroy all 
	remaining Data Wraiths with the Claw, which will also aid you in re-
	charging your energy for the LOL. Other than that, Good Luck. :)

	After this ordeal board the shuttle that has appeared on the right side
	of the battlefield. This will end this mainlevel.

	Version: v8.8.0

j) Root of all Evil

   j.a) Construction Level (5;3;2;1;1;1;1;1) (5 Build notes)

        We are getting closer and closer to finishing this game, are we not? 
	Well, to continue, first remove the ICPs, then go, from your starting
	point, straight ahead and turn left first. There you can see a bin(npn)
	with P2; 'Primitive Charge (b)(15)', 'Megahurtz (a)(150)', 'Peripheral
	Seal (g)(np)(25)' and 'Y-Amp (g)(10)'. Then turn around and jump up to
	the other bin(2) with an e-mail and 'Prankster Bit (a)(100)' in it. 
	Now pass by the Sec Rezzers and move onto the lift (a few boxes are on
	it) and activate it through the panel. 

	After reaching the top take out any ICPs in the next hall, then look 
	for Build notes, after this go to the back of the hall. There you will
	find on the floor level a doorway that is protected (lol!) by a rather 
	erratic forcefield. This will enable you to slip through. Follow the
	corridor until you reach the one door that you are able to open with 
	your permission and do so. You will end up in a room vital to the 
	security of the system. In there you will have to activate 6 panels 3 
	to each side, 2 on the upper and one on the lower level each. After 
	activating a panel you will also have to fight Data Wraith that tele-
	port in. After your activation of all 6 panels look for the lift in 
	this room (right, upper walkway) and use it. 

	Go down the corridor and open the door, then turn left as it is the 
	only thing you can do here and follow the path to the open door. You 
	will end up in the large hall again. Go to the walkways on the other 
	side and enter the doorway that has now opened there. Follow the path 
	until you enter a room where a COW is. Go through this room to its 
	other end and exit the room here. Again follow the path until you reach
	another door. Inside you will find a few ICPs and Alan. Defeat the ICPs
	then talk to Alan, which will end this sublevel.

	Version: v9.0.8

   j.b) Data Wraith Training Grid

   	This is another Lightcyclerace sublevel. Do or skip, there is no try,  
	or something like that. 

	Version: v9.2.8

   j.c) fCon Labs / The fCon team takes over

   	Another cutscene.

   j.d) Command Module (5;3;2;1;1;1;1;1) (3 Build notes)

   	Now you ended up in the command module. Right opposite to your starting
	position you will find a bin(npn) with two e-mails, 'Megahurtz (b)
	(130)' and 'Viral Shield (g)(30)' in it. Then retrieve the Build note 
	from the escape pod, after this go through the door and enter the 
	command	section. There you will have to take out the ICPs first. After
	this look for a second Build note in the area. Now you will have to 
	release the stabilization bits. Go to the 3-D Wireframe model of the 
	Data Wraith carrier and use each bit (four total) in it once. Then go 
	the front left side to the huge disc that is hanging there and use it. 
	Then get back to the Escape Pod and move through the red force field. 

	You will now end up in a section close to Alans last location. Be care-
	ful here as some of the level will deconstruct rather violently, and we
	don't want to get burried under the rubble now, would we? In this part
	you will also find the very last Build note for the game. The path you
	should follow is very obvious. If you made it through the room with the
	dropping ceiling go to the door that is 'guarded' by the patch routines 
	and move through it to finish this sublevel. 

	Version: v9.5.6

k) Digitizer Beam

   k.a) Not compatibel (4;4;4) (0 Build Notes)

   	This is it, the final battle of the game. And not only are you limited
	in the choice of your weapons, no, this battle will also consist of 
	three seperate stages. 

	The first thing you should take care of, try not to fall down. It is 
	sometimes very hard to move around the platforms without being able to
	discern if there is a hole in the floor or not. The next thing is, try
	to have an obstacle between you and the fCon team at all times when it
	is possible. Third, heal up if the possibilty is there. 	

	The weapons used by the first form will be Blaster, Prankster Bit and 
	some kind of infection attack. The second form will miss the Prankster
	Bit and the third incarnation will have the Blaster and the Prankster
	Bit missing.

	I found that the boss is best defeated with the Disc Primitive (or
	it's subroutine Sequencer if energy allows). Keep your distance from it
	and hit it from afar and the boss should not pose much of a problem. If
	you have gold level defensive subroutines he will deal you a lot less 
	damage. If possible couple the Disc with Primitive Charge, Corrosion 
	and Megahurtz for additional damage to the boss. 

	Other than that I can only wish you Good Luck and I hope you had fun 
	with the game. :)

	Final Version: v9.7.6

*******************************************************************************
09. Subroutines and COWs per level
*******************************************************************************

Here I will list for a fast reference what subroutines and COWs you can gain in
which sublevel. I will only list the Version and Energy need of the subroutines
here. The COWs will be put at a place at which they can still be used with any
of the subroutines found up to that point. That means, if I put the COW as a 
break in between the subroutines of a sublevel, you can only use it on the sub-
routines above that COW, those that follow below can not be improved by that 
COW as it will not be accessible for them anymore. I will also list subroutines 
gained from core dumps if they are not accessible through bins for a while. 
These will be the ones that do not have an energy rating behind them. 

a) Unauthorized User
       a.a) Program Initalization
             
            Y-Amp                       alpha            25 Energy
            Blaster Primitive           n/a              25 Energy
            Profiler                    alpha            25 Energy

       a.b) Program Integration

       	    COW (has to be used here as part of the plot)

	    Fuzzy Signature             alpha            25 Energy
	    Submask                     alpha            15 Energy
	    Profiler                    beta             35 Energy
	    Virus Scan                  alpha            25 Energy
	    Y-Amp                       alpha            25 Energy
	    Submask                     alpha            15 Energy
	    Primitive Charge            alpha            20 Energy
	    
    b) Vaporware
       b.a) Lightcyclearena and Gridbox

	    none found / Lightcyclerace	

       b.b) Prisonercells

            Virus Scan                  beta             35 Energy
	    Fuzzy Signature             alpha            25 Energy
	    Peripheral Seal             beta             20 Energy
	    Suffusion                   alpha               n/a

	    COW

	    Suffusion                   alpha            50 Energy
	    Y-Amp                       beta             75 Energy
	    Power Block                 alpha            25 Energy
	    LOL                         alpha            65 Energy
	    Peripheral Seal             alpha            15 Energy
	    
       b.c) Transportstation

            Virus Scan                  gold             50 Energy
	    Virus Scan                  beta             35 Energy
	    Viral Shield                alpha            20 Energy
	    Sequencer                   alpha            40 Energy
	    Primitive Charge            alpha            25 Energy
	    Profiler                    beta             35 Energy

	    COW
	    
       b.d) Primary Digitizer

            Sequencer                   alpha            50 Energy
	    Suffusion                   alpha            50 Energy
	    Fuzzy Signature             alpha            50 Energy
	    Sequencer                   beta             80 Energy
	    Primitive Charge            alpha            25 Energy
	    Profiler                    alpha            25 Energy
	    Profiler                    beta             35 Energy

	    COW

	    LOL                         alpha            50 Energy
	    Guard Fortification         alpha            15 Energy
	    Launcher                    alpha            75 Energy
	    LOL                         alpha            50 Energy
	    Fuzzy Signature             beta             75 Energy
	    Corrosion                   alpha               n/a
	    
    c) Legacy Code
       c.a) Alans Desktop PC

            LOL                         alpha            65 Energy
	    Triangulation               beta            100 Energy
	    Suffusion                   beta             90 Energy
	    LOL                         alpha            50 Energy
	    Virus Scan                  beta             35 Energy
	    Suffusion                   beta             90 Energy
	    
    d) System Restart
       d.a) Packet Transport

            Cluster                     alpha            45 Energy
	    Profiler                    gold                n/a
	    Guard Fortification         alpha            25 Energy
	    Fuzzy Signature             beta             75 Energy
	    Base Damping                alpha            15 Energy
	    Triangulation               beta            100 Energy
	    Profiler                    gold             50 Energy
	    Y-Amp                       beta             75 Energy
	    Suffusion                   beta             90 Energy

	    COW (Permission 6 is needed to operate this one)

       d.b) Energy Regulator

       	    Base Damping                alpha            15 Energy
	    Submask                     beta             20 Energy
	    Virus Scan                  gold             50 Energy
	    Cluster                     alpha            45 Energy
	    Fuzzy Signature             beta             75 Energy

       d.c) Power Occular

            Triangulation               alpha            75 Energy
	    Triangulation               beta            100 Energy
	    Submask                     beta             20 Energy
	    Guard Fortification         beta             20 Energy
	    Base Damping                alpha            15 Energy
	    Encryption                  alpha            15 Energy
	    Cluster                     alpha            45 Energy
	    Y-Amp                       gold            100 Energy
	    LOL                         alpha            65 Energy
	    LOL                         beta            110 Energy

	    COW
	    
    e) Antiquated
       e.a) Testgrid

            none / Boss Battle
	    
       e.b) Main Processor Core

            COW

	    Peripheral Seal             beta                n/a
	    Sequencer                   alpha            25 Energy
	    Cluster                     beta             45 Energy
	    Fuzzy Signature             beta             15 Energy
	    
       e.c) Old Gridarena

            none / Lightcyclerace
	    
       e.d) Main Energy Pipeline

            Peripheral Seal             alpha            15 Energy
	    Triangulation               beta            100 Energy
	    Submask                     alpha            15 Energy
	    Base Damping                beta             20 Energy
	    Corrosion                   alpha           100 Energy
	    Corrosion                   beta            225 Energy
	    
	    COW
	    
    f) Master User
       f.a) City Hub

            Viral Shield                beta            n/a (talk to a program)
	    Viral Shield                alpha            20 Energy
	    Launcher                    beta            115 Energy
	    Virus Scan                  beta             35 Energy
	    Virus Scan                  alpha            20 Energy
	    Launcher                    beta             75 Energy

	    COW
	    
       f.b) Progress Bar

            Profiler                    gold             50 Energy
	    Virus Scan                  gold             50 Energy
	    Y-Amp                       gold             75 Energy

	    COW

	    Drunken Dims                alpha               n/a
	    
       f.c) Outer Gird Getaway

            none / Lightcyclerace
	    
       f.d) fCon Labs / Ma3a gets saved

            none / Cutscene
	    
       f.e) Remote Access node

            Cluster                     beta             75 Energy
	    Sequencer                   beta             80 Energy
	    Triangulation               gold            125 Energy
	    Profiler                    beta             35 Energy

	    COW
	    
    g) Alliance
       g.a) Security Server

            none / Cutscene
	    
       g.b) Thornes Outer Partition

            Corrosion                   alpha            15 Energy
	    Launcher                    alpha            25 Energy
	    Drunken Dims                alpha            50 Energy
	    Encryption                  beta             20 Energy
	    
       g.c) fCon Labs / Data Wraith Preparation

            none / Cutscene
	    
       g.d) Thornes Inner Partition

            Virus Scan                  gold             30 Energy
	    Corrosion                   beta            150 Energy
	    Corrosion                   beta            150 Energy
	    Drunken Dims                beta            120 Energy

	    COW
	    
       g.e) Thornes Core Chamber

            none / Boss Battle
	    
    h) Handshake
       h.a) Function Control Deck

            Base Damping                gold             25 Energy

    i) Database
       i.a) Security Socket

            Energy Claw                 alpha           100 Energy
	    Cluster                     alpha            45 Energy
	    Fuzzy Signature             beta             10 Energy
	    Power Block                 beta             75 Energy
	    Fuzzy Signature             beta             15 Energy
	    Peripheral Seal             alpha            15 Energy
	    Primitive Charge            beta             15 Energy
	    Y-Amp                       gold            100 Energy
	    Base Damping                beta             20 Energy
	    Megahurtz                   alpha            85 Energy

	    COW

       i.b) Firewall

            Guard Fortification         beta             20 Energy
	    Encryption                  beta             20 Energy
	    Submask                     beta             20 Energy
	    Profiler                    gold             50 Energy
	    Energy Claw                 alpha            50 Energy
	    Megahurtz                   alpha           100 Energy

	    COW
	    
       i.c) fCon Labs / Alan Lost

            none / Cutscene
	    
       i.d) Primary Docking Port

            LOL                         beta            110 Energy
	    Power Block                 gold            100 Energy

	    COW
	    
       i.e) fCon Labs / Security Breach

            none / Cutscene
	    
       i.f) Storage Section

            none / Boss Battle
	    
    j) Root of all Evil
       j.a) Construction Level

            Primitive Charge            beta             15 Energy
	    Megahurtz                   alpha           150 Energy
	    Peripheral Seal             gold             25 Energy
	    Y-Amp                       gold             10 Energy
	    Prankster Bit               alpha           100 Energy

	    COW
	    
       j.b) Data Wraith Training Grid

            none / Lightcyclerace
	    
       j.c) fCon Labs / The fCon team takes over

            none / Cutscene
	    
       j.d) Command Module

            Megahurtz                   beta            130 Energy
	    Viral Shield                gold             30 Energy
	    
    k) Digitizer Beam
       k.a) Not compatible

            none / Final Boss Battle

*******************************************************************************
10. Lightcycle Game 
*******************************************************************************

In this section I will list all power-ups, other things to know, the stats of 
the Lightcycles, the list of the levels, what is unlocked after winning a race
and what those cryptic abbreviations mean listed under the 'Own Game' tab.

Abbreviations I will use in this section:

LC = Standard Lightcycle (of movie fame)
SLC = Super Lightcycle
Turbo = Turbospeed of LC/SLC
Max Spd. = Maximum Speed
Min Spd. = Minimum Speed
Acc. = Acceleration
Loss = Speedloss in Curves

Well, now let's get down to business, shall we?

a) Power Ups

   On almost every racemap you can pickup and use extras. Here I am going to 
   introduce them:

   - Shield
    
     Your standard, basic energy shield. Can withstand one hit. With it you can
     break safely through any single wall, just be careful that there is not a
     second one behind. Sometimes you can also drive through enemy with it 
     activated

   - Nitro

     Gives you a burst of speed for a short time, helpful to stay ahead of an
     oppenent and then use a quick 'jab' to run him into your wall. 

   - Turbo Charger

     Similar to the Nitro, only that you will go even faster and that every LC 
     on the grid will benefit from the activation of this. Can also be used for
     surprise attacks. 

   - Wall Extender

     Works just like the food in the snakes game, extends the length of your 
     wall permanently. 

   - Power-Up Steal

     An enemy has a power up that you would like, well, just borrow it from him
     with this item.

   - Wall Spike

     Let the enemy get close and alongside you then activate this item to send 
     out short walls to the left and right, which will make short work of him. 

   - Rocket

     Powerful ordinance for your little LC. If it does not hit an enemy LC (and
     thereby destroying it) it will coutinue on until it hits a map wall. Will
     go through all layers of energy walls along its path. Good for use in 
     thight spots. 

   - Automatic Power-Up

     On activation of this device all power-ups that your opponents currently 
     hold will be activated. Use this if you want to stop them from using a 
     Wall-Spike or Rocket on you. Might also backfire if you hit a Turbo 
     Charger and are not prepared for it. 

   - Wall Reset

     This will destroy all walls that were created until the point you 
     activated this item. If you mean to use it to get through an enemy wall
     though, be careful, as it takes some time until the walls disapper.

b) Additional Information

   - Speedup fields 

     On some maps you will find green fields that will accelerate your LC and 
     every other LC on the map (no matter what kind) to a predetermined and 
     high speed. 

   - Slowdown fields

     These glow red and are the exact opposite of the above, meaning they will
     slow down every LC on grid to a predetermined speed.

   - Energy Blocks

     These are blocks that appear and vanish. If they are to appear the ground 
     will shortly glow in a red square marking the location of the block. You
     should not run into them, and you should steer clear if you are on a 
     location where a block will appear. 

   - Turbospeed

     This statistic affects the speed at which a LC/SLC can move when it 
     activates a Nitro or Turbocharger power-up.

   - Maximum Speed

     This is the highest attainable speed when moving over normal gird. This 
     speed will be reached when you hold the forward key pressed. It varys 
     from LC to LC, and also sometimes from map to map, depending on which 
     speed the game is set. 

   - Minimum Speed

     This is the slowest your LC will go. Braking will be activated when you 
     hold the backwards key.

   - Acceleration

     The meaning of this should be clear, I hope. 

   - Speedloss in curves

     Each time you turn you will loose a certain amount of speed. So turning 
     often will slow you down considerably and make you an easy target for 
     opposing Lightcyclists. 

   - Colors

     The colors determine the level of the AI as well as the quality of the LC.
     Blue are the weakest bikes, then followed by yellow, red, green and 
     finally purple. The numbers behind the color of the bike in the selection
     screen only denote different shades of that color to choose from and do 
     not have any impact on LC performance. 

c) The Stats of the Lightcycles

   Note: These values are only for comparision of the different capabilities of
         the LCs. They were gained by measuring the length of the bars with a 
	 ruler off the monitor. I would say that this is just a rather crude
	 approximization, but this was to give at least some kind of numerical 
	 comparision for the LCs, I hope it helps. (Okay, I know I should have
	 gotten all the top and low speeds, but I was too lazy. There, are you
	 now satisfied. :) ).

	 All but the number for Speedloss go by the maxime 'The higher, the 
	 better'. For Speedloss a lower value is better.

Type/Color of LC        Turbo     Max Spd.    Min Spd.     Acc.      Loss

LC Blue                  1.5        1.5         1.5        1.5        1.5
LC Yellow                2.5        2.5         2.5        2.0        1.5
LC Red                   3.5        3.0         3.5        2.5        1.5
LC Green                 4.5        4.0         4.5        3.0        1.5
LC Purple                6.5        5.5         6.0        3.5        1.5
SLC Blue                 5.0        5.5         5.0        6.0       10.0
SLC Yellow               6.0        6.5         6.0        7.0       10.0
SLC Red                  7.0        7.5         7.0        8.0       10.0
SLC Green                8.0        8.5         8.0        9.0       10.0
SLC Purple              10.0       10.0        10.0       10.0       10.0

d) List of Racetracks

   Note: LC/SLC colums here will list which kind of colors are allowed. The
         Code column list the Levelcode display in the 'Own Game' tab. The 
	 Turtorial track can not be selected for an own game. The other four
	 tracks that are listed with 'n/a' have no level code, because they 
	 feature a track each of their specific set (e.g. track 13, features
	 tracks from 2, 7 and 17 in the following table).
   
     Name                        LC      SLC     Lives  Waves  Code

1)  Tutorial                     All     All      10      1     n/a
2)  Newbie Authentification      Blue    None      8      3   LC02S01
3)  Binary Zone                  All     None      6      3     n/a
4)  Format:/C                    Blue    Blue      4      2   LC03S01
5)  Conscripts Revenge           All     None      6      3   LC01S01
6)  fCon Zone                    All     All       6      3     n/a
7)  Batchfile Graveyard          All     None      8      3   LC02S02
8)  Curse of the Bitrate         All     None      10     5   LC01S02
9)  Avatar Alley                 All     All       2      3   LC03S02
10) Dead Man's Cache             None    Yellow    4      2   LC03S03
11) Green Hornets                Green   Green     6      3   LC04S01
12) Super Cycle Open             None    All       8      4   LC01S03
13) Old Zone                     All     All       6      3     n/a
14) Purple Warez                 Purple  None      4      2   LC04S03
15) Urban Area                   All     All       6      3     n/a
16) Sourcecode Revelation        None    All       8      4   LC04S02
17) 01100101                     None    All       8      4   LC02S03




e) What is unlocked when

   Note: The numbers here corresspond to those found in the list above.

1)  SLC Blue
2)  Yellow LC
3)  Shield / LC01 tracks
4)  Nitro
5)  Red LC / Turbocharger
6)  LC 04 tracks
7)  Yellow SLC / Wall Extender
8)  Power-up Steal
9)  Green LC / Wall Spike
10) Rocket
11) Red SLC / Automatic Power-up
12) None
13) Purple LC / LC02 tracks
14) None
15) Green SLC / LC03 tracks
16) None
17) Purple SLC / Wall Reset


*******************************************************************************
11.FAQ
*******************************************************************************

Q:	The game does not run on my system! The game does not run well on my 
        System! Why?
A:	Sorry, but I am not a technician, either ask your way around on message
        boards or ask Monoliths Tech Support to aid you.

Q:      The Lightcycleraces are so hard, isn't there any way to skip them?
A:      You can skip them if you have the right version of the game. For the US
        version you will have to get the first patch from the official Tron 2.0
	website. If you have the german version this patch is already 
	implemented in the final release.

Q:	I can not supply energy to the bits in the EN12-82 system mainlevel. 
        Why?
A:	This is a bug in the game. To avoid it you have to make sure that you 
        did not skip the lightcyclerace in this mainlevel. Monolith may release
	a patch that will solve this problem.

Q:      The game is so hard, isn't there any way to make it easier?
A:	Well, first you should look in the options what difficulty level you 
        use. Tron 2.0 allows you to change the difficulty level at any time 
	during the game. If you are already playing on easy, well, then look 
	for cheats in the net, although you should try to get through the game 
	at least once without using cheats. Makes the feeling of having 
	something accomplished that much nicer.

*******************************************************************************
12. Credits
*******************************************************************************

Steve Lisberger - for creating the Tron universe
Syd Mead - for designing the look and feel of Tron
The Monolith team - for creating an outstanding game
The GVim team - for creating a superb text editor (http://www.vim.org)
The 'Alt + Tab' shortcut - for making writing this thing much easier
and last but (hopefully) not least me - for writing up this Walkthrough

*******************************************************************************
13. Changelog
*******************************************************************************

- Version v0.3.0 -- October 6th, 2003

    Well, this version apparently was not meant to be. Due to a stupid mistake 
    I made I saved an empty textfile over some of the text I've had already 
    written. Life can sometimes be frustrating, can it not? Still, I had a good
    laugh on it afterwards. Also it kept me from formatting what I had written 
    up to that point (it was chaotic to say the least) and I could with a new 
    one where I also concentrated on the formatting right away. All in all it 
    was not that bad. :)

- Version v1.0.0 -- October 14th, 2003

  Release Candidate Version

    This is the first version I released. No changes have been made to the 
    Walkthrough as of yet.

- Version v1.1.0 -- October 16th, 2003

  First Patch (everyone loves a patch, at least if it fixes problems) :)

  - New section (10) for the single player Lightcycleraces was added
  - Reworked Section 3 'Basic Game Mechanics'
  - Reworked Section 7 'Notes for the Walkthrough'
  - Reworked document width to 79 characters per line
  - Corrected minor mistakes found during reworking
  - Minor formatting adjustments in Section 9

*******************************************************************************
14. Contact Information
*******************************************************************************

If you want to contact me, you can do this by one of the following methods:

E-Mail:  DeathbrngNOSPAMHERE@NOSPAMHEREaol.com (remove the NOSPAMHERE)
         and please refer to the Tron 2.0 Walkthrough in the subject line
AIM:     SN Deathbrng
ICQ:	 150971635 (mostly invisible / Authorization required)


End of Line