You may continue to talk, while I prepare the EOD post
blinddate she was never awake even with her eyes wide open never where she longed to be and if you’d meet her just know you were on a blind date with a dreamer
Abu has been lynched and also modkilled
He was Scum C++
Welcome to the game, Geyde. You are SCUM C++.
C++
- C++ is a general-purpose programming language. It has imperative, object-oriented and generic programming features, while also providing facilities for low-level memory manipulation.
> 2: Binary's Revenge // When you die, you will delete the last line of code from the rolecards of the majority faction.
> 3: Knowledge // Each night you may ask for a piece of information relating to the game's mechanics. The answer to your question will be revealed publicly at the start of the day.
> 4: Processing
> 5: Innocence // You appear innocent to all investigative roles.
Delete all players that are not of your faction or ensure that it cannot be prevented.
Your scum partners are Kiana_Kaslana and Kiiruma. Scumchat is .
osieorb18Apr 21, 2019 7:35 AM
blinddate she was never awake even with her eyes wide open never where she longed to be and if you’d meet her just know you were on a blind date with a dreamer
Welcome to the game, ForgotToFlush. You are NEUTRAL del *.*
del *.*
del filename
erase filename
> 2: Right Half A Man // On even Nights, as a factional Night Action, you may kill a player alongside your other actions. You are partners with Marluxion (Cryptolocker), with whom you share a single-use bulletproof and chat here.
> 3: Mr. Clean // Each Night, as a Night Action, you may target a player and wipe the last line of code from their rolecard.
> 4: Y Superuser // You may access the SACS server here.
> 5: Awareness // Each Night, as a compulsive Night action in addition to your other actions, you will see the names of all of your visitors.
blinddate she was never awake even with her eyes wide open never where she longed to be and if you’d meet her just know you were on a blind date with a dreamer
blinddate she was never awake even with her eyes wide open never where she longed to be and if you’d meet her just know you were on a blind date with a dreamer
Welcome to the game, DenjaX. You are TOWN LIBRARY.
LIBRARY
- A collection of files.
Alternatively, the Library of Babel.
> 2: Grant Superuser
> 3: Alignments // Each night, as a Night action, you may target a player. You will be informed of your target's alignment.
> 4: Compiling
> 5: Lines Of Binary // You will also receive the last line of code on their rolecard.
- Standing for "Uniform Resource Locator.", A URL is the address of a specific webpage or file on the Internet. It includes the following elements:
http:// – the URL prefix, which specifies the protocol used to access the location
blankmediagames.com – the server name or IP address of the server
/phpbb/ – the path to the directory or file
> 2: Coroner // You will receive the code on the rolecards of all dead players.
> 3: Spooky // Once per game, as a Twilight action, you may open a server with a dead player. The server will close at the end of the Night.
> 4: Compiling
> 5: Defragmenting // Players' roles will not be revealed when they flip.
Welcome to the game, LucianRoy. You are TOWN ADMIN
ADMIN
- The term “administrator” refers to the system administrator or system user account (also a superuser) that has the highest operating system rights, which is virtually absolute.
> 2: Grant Superuser
> 3: Even Tracker // On even Nights, as a Night action, you may track a player to see who they visit.
> 4: Compiling
> 5: Aware Oddity // On odd Nights, as a compulsive Night action, you will see names of all of your visitors.
- The Neural Network Exchange Format (NNEF) standard encapsulates neural network structure, data formats, commonly used operations (such as convolution, pooling, normalization, etc.) and formal network semantics. This enables the essentials of a trained network to be reliably exported and imported across tools and engines. NNEF is purely a data interchange format and deliberately does not prescribe how an exported network has been trained, or how an imported network is to be executed. This ensures that the data format does not hinder innovation and competition in this rapidly evolving domain.
> 2: Indecisive // You may not vote until hammer.
> 3: Doublevoter // You possess two votes.
> 4: Willful Ignorance // Ignore code line (2).
> 5: Splitting // You may vote two separate players.
- Computer data is information processed or stored by a computer. This information may be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be processed by the computer's CPU and is stored in files and folders on the computer's hard disk.
At its most rudimentary level, computer data is a bunch of ones and zeros, known as binary data. Because all computer data is in binary format, it can be created, processed, saved, and stored digitally. This allows data to be transferred from one computer to another using a network connection or various media devices. It also does not deteriorate over time or lose quality after being used multiple times.
> 2: Line Block // Each Night, as a Night action, you may target a player. Pick a number between 2 and 5. If that line of your target's role PM has an action on it, you roleblock that action.
> 3: Rand // Number is picked at random.
> 4: Willful Ignorance // Ignore code line (3)
> 5: Passives // The line picked just says "Compiling" for the duration of the Night phase.
Welcome to the game, LanMisa. You are TOWN TERMINAL.
TERMINAL
- Terminal provides a command line interface to control the UNIX based operating system that lurks below OS X.
> 2: Y Superuser // You may access the SACS server here.
> 3: Reroute Signal // Each Night, as a Night action, you may add or remove one player to/from the SACS server.
> 4: Shout // Members of any server may post during the day.
> 5: Parsing
Welcome to the game, Dude_Mike. You are TOWN GUEST.
GUEST
- A user can log on to any client computer in the Standard network by using an account that is based on a Standard User role. However, to allow a user to become a local administrator on a specific client computer, complete the procedures found on the Home page. An unauthorized guest account cannot become an administrator.
> 2: Body Double // Each night, as a Night action, you may target a player. If your target(s) were to die that night or the following day, you will die in their place.
> 3: Parsing
> 4: Bleeder // If you were to die, your death will be delayed by a phase.
> 5: Two A Night // You may choose two players to target every night.
> 2: Clock Savior // Each Night, as a Night action, you may target a player. If they are attacked, you will have a 50% chance to prevent them from dying.
> 3: Enable Overclocking // Your target also has a 50% chance to use any non-factional action(s) they take twice this night. You will be seen doing the second action(s).
> 4: Parsing
> 5: Stability // At least 1 of line (2) or line (3) will succeed.
- macOS. It's why there's nothing else like a Mac.
> 2: Ignite // Once per game, as a Night Action, you may ignite all doused targets.
> 3: Arsonist // Each Night, as a Night Action, you may douse one target player.
> 4: Grant Superuser
> 5: Bomb // If you are attacked and would die, your attacker dies as well.
> 2: Savior // Each Night, as a Night Action, you may target a player. If they are attacked, you prevent them from dying.
> 3: Alternating // You may not take actions two nights in a row.
> 4: Block // Your target is also roleblocked.
> 5: Ignore // Your actions do not show up on investigative results.
-The .img filename extension is used by disk image files, which contain raw dumps of a magnetic disk or of an optical disc. Since a raw image consists of a sector-by-sector binary copy of the source medium, the actual format of the file contents will depend on the file system of the disk from which the image was created (such as a version of FAT). Raw disk images of optical media (such as CDs and DVDs) contain a raw image of all the tracks in a disc (which can include audio, data and video tracks). In the case of CD-ROMs and DVDs, these images usually include not only the data from each sector, but the control headers and error correction fields for each sector as well.
Since IMG files hold no additional data beyond the disk contents, these files can only be automatically handled by programs that can detect their file systems. For instance, a typical raw disk image of a floppy disk begins with a FAT boot sector, which can be used to identify its file system. Disc images of optical media are usually accompanied by a descriptor file which describes the layout of the disc, and includes information such as track limits which are not stored in the raw image file.
> 2: Y Superuser // You may access the SACS server here.
> 3: Clown // Each Night, as a Night Action, you may give a player a pie. Pies are 1-shot items with no effect that players may throw at another player as an extra public Day Action. E.g. "Pie: Osie"
> 4: Compiling
> 5: Purge // Once per game, as a public Day Action, you may shoot a player. E.g. "Shoot: Osie"
Welcome to the game, ForgotToFlush. You are NEUTRAL del *.*
del *.*
del filename
erase filename
> 2: Right Half A Man // On even Nights, as a factional Night Action, you may kill a player alongside your other actions. You are partners with Marluxion (Cryptolocker), with whom you share a single-use bulletproof and chat here.
> 3: Mr. Clean // Each Night, as a Night Action, you may target a player and wipe the last line of code from their rolecard.
> 4: Y Superuser // You may access the SACS server here.
> 5: Awareness // Each Night, as a compulsive Night action in addition to your other actions, you will see the names of all of your visitors.
Welcome to the game, Marluxion. You are NEUTRAL Cryptolocker
Cryptolocker
Discovered: September 11, 2013 Also Known As: Trojan.Gpcoder.H [Symantec], CryptLocker.B [Norman], Trojan:Win32/Crilock.A [Microsoft], TROJ_CRILOCK.NS [Trend], Trojan.Ransomcrypt.F [Symantec], Trojan.Cryptolocker [Symantec] Type: Trojan Infection Length: 346,112 bytes Systems Affected: Windows
Ransom.Cryptolocker is a Trojan horse that encrypts files on the compromised computer and then prompts the user to purchase a password in order to decrypt them.
> 2: Left Half A Man // On odd nights, you may kill a player alongside your other actions. You are partners with ForgotToFlush (del *.*), with whom you share a single-use bulletproof and chat here.
> 3: Jailer's Little Friend // Every night, you may select a player. This player will be roleblocked, but cannot die to any attacks.
> 4: Processing
> 5: Basically Jesus's Voice // For the night, you will obtain an anonymous server with your target, and they will be unable to post in any other servers.
- C++ is a general-purpose programming language. It has imperative, object-oriented and generic programming features, while also providing facilities for low-level memory manipulation.
> 2: Binary's Revenge // When you die, you will delete the last line of code from the rolecards of the majority faction.
> 3: Knowledge // Each night you may ask for a piece of information relating to the game's mechanics. The answer to your question will be revealed publicly at the start of the day.
> 4: Processing
> 5: Innocence // You appear innocent to all investigative roles.
Delete all players that are not of your faction or ensure that it cannot be prevented.
Your scum partners are Kiana_Kaslana and Kiiruma. Scumchat is here.
Safe Flavor Fakeclaim:
BlackICE - Using revolutionary antihacker technology, BlackICE Defender combines firewall and intrusion detection technologies to deliver protection for home users, stopping hackers from accessing your PC any time you're on the Internet. With easy-to-configure levels of protection, you can install and configure this technology in a matter of seconds and customize to the level of protection you need. Customize your firewall security settings in seconds in four easy-to-understand levels: Paranoid, Nervous, Cautious, and Trusting. BlackICE's intrusion detection system inspects all inbound and outbound traffic, automatically filtering out any malicious packets.
Welcome to the game, Kiana_Kaslana. You are SCUM PYTHON.
PYTHON
- Python is a high-level programming language designed to be easy to read and simple to implement. It is open source, which means it is free to use, even for commercial applications. Python can run on Mac, Windows, and Unix systems and has also been ported to Java and .NET virtual machines.
Python is considered a scripting language, like Ruby or Perl and is often used for creating Web applications and dynamic Web content. It is also supported by a number of 2D and 3D imaging programs, enabling users to create custom plug-ins and extensions with Python. Examples of applications that support a Python API include GIMP, Inkscape, Blender, and Autodesk Maya.
> 2: Binary's Revenge // When you die, you will delete the last line of code from the rolecards of the majority faction.
> 3: Register Access // Once per game, as a Night action, you may target a player to repeat all night actions performed on them last night.
> 4: Cleaning // Twice per game, as a Night action, you may target a player to delete the last line of their rolecard.
> 5: Forced Shutdown // Twice per game, as a Night action, you may roleblock a player.
Delete all players that are not of your faction or ensure that it cannot be prevented.
Your scum partners are Geyde and Kiiruma. Scumchat is here.
Safe Flavor Fakeclaim:
SYSTEM - An operating system, or "OS," is software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function. Every desktop computer, tablet, and smartphone includes an operating system that provides basic functionality for the device.
- A programmer's best friend. A dynamic, open source programming language with a focus on simplicity and productivity.
> 2: Binary's Revenge // When you die, you will delete the last line of code from the rolecards of the majority faction.
> 3: Y Superuser // You may access the SACS server.
> 4: Hold Process // Dead scum can speak in scumchat.
> 5: Inform // Each night, as a Night action, you may target a player and receive their alignment and night target.
Delete all players that are not of your faction or ensure that it cannot be prevented.
Your scum partners are Geyde and Kiiruma. Scumchat is here.
Safe Flavor Fakeclaim:
REGISTRY.DAT - This file contains the logical [Java] Class name and an associated [numerical] identifier that will be used to refer to objects of the class in order to reduce the amount of information that needs to be repeatedly transmitted to the client.
blinddate she was never awake even with her eyes wide open never where she longed to be and if you’d meet her just know you were on a blind date with a dreamer
you all should be able to join Osie's Discord, from the scum chat link here
blinddate she was never awake even with her eyes wide open never where she longed to be and if you’d meet her just know you were on a blind date with a dreamer
Sorry for the sub-out. I was a moron and impulsively agreed to sub in when getting asked, but then realized two days later I was going to an out-of-state convention for a few days where my access to the game would be too limited. Wish I realized sooner.
I tried my best and did alright for a while.
Only reason I attacked into FTF was I must've missed their claimed BP vest but still I didn't see them attacking me there.
The plan was to use Yurkin's Doublevote to end day early and mislynch FTF but I don't know why it didn't work.. I still don't know tbh. From that everything went out the window.
I planned using Yurkin's roleclaim and knowing FTF was a powerful neut and as such when it went wrong, game went wrong too.
GG everyone.
Kiiruma said: I tried my best and did alright for a while.
Only reason I attacked into FTF was I must've missed their claimed BP vest but still I didn't see them attacking me there.
The plan was to use Yurkin's Doublevote to end day early and mislynch FTF but I don't know why it didn't work.. I still don't know tbh. From that everything went out the window.
I planned using Yurkin's roleclaim and knowing FTF was a powerful neut and as such when it went wrong, game went wrong too.
GG everyone.
My vote is public, not hiden second vote stacked to my normal vote. Purposedly left that unsaid.
Yeah, that's what stopped me.
Good job Yurkin :)
My hope was that it was automatic like if your vote would cause hammer.
So I had planned and if your role had worked like that, I think I could've just carried off the cred. But since it didn't the game didn't end as planned *Shrugs*
I just feel happy I did alright as scum in the fact that for once I wasn't super scumread.
Kiiruma said: Yeah, that's what stopped me.
Good job Yurkin :)
My hope was that it was automatic like if your vote would cause hammer.
So I had planned and if your role had worked like that, I think I could've just carried off the cred. But since it didn't the game didn't end as planned *Shrugs*
I just feel happy I did alright as scum in the fact that for once I wasn't super scumread.
we got used to u being lurky xD mal sorta relies on meta.. so if u can keep up a habit, u will likely get a pass eventually. big change when u tried to call lynches, so might be best to avoid that next time other than that great job imo