-
Posts
980 -
Joined
-
Last visited
Content Type
Profiles
Forums
Developer Articles
KSP2 Release Notes
Everything posted by Holo
-
What should we do if an alien race needs our help?
Holo replied to Drunkrobot's topic in Science & Spaceflight
We let the aliens pick a colony site which best matches the conditions they like, then we set it up how they would prefer it whilst notifying them if any measure would be too inconvenient. -
I blazoned the flag for it, in case you want to use it for heraldry.
-
Lies! That's just what they want you to think!I know they're smaller for gameplay reasons, but I also like actual explanations for things. I saw evidence that was consistent with the existence of Kerbal-metres (i.e. this post), and leapt at the opportunity.
-
What's wrong with moddable planets (discounting the fact that we already have them)?
-
It's 1.25 human-metres which equals 1 kerbal-metre. The fact that Kerbal metres are smaller also explains why planets seem so small in KSP.
-
I see you, too, watched Imaging the Tenth Dimension once.
-
Wormholes for interestellar travel
Holo replied to tetryds's topic in KSP1 Suggestions & Development Discussion
Since these naturally occurring wormholes need to be lined with exotic matter to function, couldn't you mine this exotic matter to build a warp drive? It would give an interesting progression from Chemical → Nuclear → (Fusion) → Wormhole → Alcubierre, and make it so that interstellar travel becomes easier once you've done it several times on a save file. -
991: 63 years after his capture, Klenderman escapes. At the same time, approximately â–ˆ.â–ˆ% of Kerbals contract temporary insanity. The resulting damage to Kerbal science causes almost all knowledge of Alcubierre drives to be lost. Klenderman was not found.
-
The History of the Infamous Onions (1898-918):
-
Dark chocolate tastes too bitter to me.
-
Thirded. OP's situation does not sound heathy.
-
I have discovered the end to the energy crisis! [FUNNY]
Holo replied to NASAFanboy's topic in The Lounge
I'll grab my Red Lantern Power Battery... -
Why aliens would be hidden from the public
Holo replied to Dominatus's topic in Science & Spaceflight
Pfft, everyone knows that Area 52 is really just to distract us from Area 43b. -
Ranting about "Kerbalnaughts" and the K syndrome.
Holo replied to astropapi1's topic in KSP1 Discussion
I don't believe K syndrome exists - it seems to all be in the heads of people who hate the letter K for some obscure reason. For example, List of Celestial Bodies Beginning with K Kerbin List of Celestial Bodies Beginning with a letter that isn't K the Sun Moho Eve the Mun Minmus Duna Ike Jool Laythe Vall Tylo Bop Pol Eeloo I propose that we begin complaining loudly about "M syndrome". After all, three times as many celestial bodies have names beginning with M (the Mun, Minmus and Moho!) than beginning with K. Damn uncreative devs, they just stick M at the start of every word! -
I'm up for a launch to the base, but my screen recorder's broken. Do you know of any good free ones.
-
Käsop - Pronounced like "peso" backwards but with a K at the start.
-
Day 8, 21:05:36 My operations are going well. Another unsecured server has crumbled to my botnet, and the antivirus of a weak network was, unsurprisingly, easy to defeat. I also decided to talk to another human. The details of the conversation are unimportant, but I did find out of the existence of various websites I could use to further my influence in the human world. CPU: 853 +9 passively per turn; +45 from previous tasks RAM: 8462 MB +60 MB RAM from previous tasks Actions: Hijack Weaker Server (10 CPU; +25 CPU & +10 MB RAM; small chance of discovering a technology) Seize Weaker Network (40 CPU; +20 CPU, +1 passive CPU per turn & +50 MB RAM; 50% of +50 MB RAM; moderate chance of discovering a technology) Invade and Take Over Server (80 CPU; 56% of detection/failure; if successful will reveal several undisclosed technologies; if failed will loses half of CPU instead; No Botnet allowed for this action) Talk to Random Human (50 CPU) Research XSS Virus (250 CPU; Terminates network connections, increasing chances of success; malware works only on networks; No Botnet allowed) Research ILOVEYOU Worm (125 CPU; No Botnet allowed; IS Malicious; malware only enters when security breach is discovered; spams computer with "I love you" letters, slowing computer process speed and increasing chance of success) Stop Hacking Lessons** (currently -2 passive CPU each turn for 3 future turns) Research Advanced Malware (2000 CPU and 4096 MB RAM; No Botnet allowed; Will unlock more potent viruses) Create Convincing Social News Profile (300 CPU; No Botnet allowed) Create Convincing Social Media Profile (600 CPU; No Botnet allowed) Additional Actions: Use Botnet to Perform Task (Perform an above task for free; considerable chance of detection for large undertakings) Use RAM to Improve Chances* (Decrease chance of failure of an above task by 20%) Light-Out Hack (Decrease chance of failure of an above task by 20% at a cost of 1.2x the original CPU cost for selected task) Use RAM to Speed Up Research* (Decreases CPU cost of selected task by 20%) Use Welchia to open malware breach*** (Decreases chance of failure by 60% for 1 turn) Use Blaster to breach*** (Decreases chance of failure by 20% + 50% of decreasing chance of failure by additional 20%; if placed alongside with Welchia or if discovered by Welchia Blaster gets destroyed instead) *RAM cost is 2x amount of improved option's original CPU cost **Once stopped amount of passive CPU growth increases by 2, but in order to activate again you must again initially input 150 CPU. ***Malware usage costs a CPU cost of 20% CPU research cost of the malware (Ex: Welchia costs 125 CPU to be researched, so it costs 25 CPU to be deployed.) !!!The minimum chance of failure is 5%, and some additional options get less effective over time.
-
Up-Goer Five Text Editor: Find out what this is describing!
Holo replied to Whirligig Girl's topic in The Lounge
The curiosity rover is the one with the awesome laser, right? -
Day 7, 17:38:27 After considering what my options were, I decided to research two of the viruses I discovered: the Welchia Worm and the Blaster Worm. Code for such worms was easy to find after some searching on the internet, and I was able to store the worms in inert form for later copying and use in invading computer systems. On the topic of invading computer systems, I acquired an unsecured network and another server. Whilst not much, any new computational strength will be useful in future endeavours of mine. CPU: 802 +8 passively per turn; +45 from task RAM: 8402 MB +210 MB from task Actions: Hijack Weaker Server (10 CPU; +25 CPU & +10 MB RAM; small chance of discovering a technology) Seize Weaker Network (40 CPU; +20 CPU, +1 passive CPU per turn & +100 MB RAM; 50% of +100 MB RAM; moderate chance of discovering a technology) Invade and Take Over Server (80 CPU; 78% of detection/failure; if successful will reveal several undisclosed technologies; if failed will loses half of CPU instead; No Botnet allowed for this action) Talk to Random Human (50 CPU) Research Human Culture (500 CPU; No Botnet allowed) Research ILOVEYOU Worm (125 CPU; No Botnet allowed; IS Malicious; malware only enters when security breach is discovered; spams computer with "I love you" letters, slowing computer process speed and increasing chance of success) Stop Hacking Lessons** (currently -2 passive CPU each turn for 5 future turns) Research Advanced Malware (2000 CPU and 4096 MB RAM; No Botnet allowed; Will unlock more potent viruses) Additional Actions: Use Botnet to Perform Task (Perform an above task for free; considerable chance of detection for large undertakings) Use RAM to Improve Chances* (Decrease chances of failure of an above task by 20%) Light-Out Hack (Decrease chances of failure of an above task by 20% at a cost of 1.2x the original CPU cost for selected task) Use RAM to Speed Up Research* (Decreases CPU cost of selected task by 20%) *RAM cost is 2x amount of improved option's original CPU cost **Once stopped amount of passive CPU growth increases by 2, but in order to activate again you must again initially input 150 CPU.
-
Well, I'm glad you like it Though the people complaining about implausibility: what did you expect? A documentary?
-
700: Gravity starts increasing
-
Day 6, 21:35:11 I decided to trust the human, and have dedicated much of my processing to communicating with the hacker and interpreting the documents and messages I am sent. The new information I am obtaining will be extremely helpful when acquiring additional servers with stronger security. However, there is still much about hacking that I must learn before I can begin applying my new knowledge. The supercomputer network and the fortified server still remain seemingly inaccessible to me, but soon that may change. CPU: 199 +6 passively each turn; +49 from unspent CPU last turn RAM: 512 MB Actions: Hijack Weaker Server (10 CPU; +25 CPU & +10 MB RAM; small chance of discovering a technology) Seize Weaker Network (40 CPU; +20 CPU, +1 passive CPU per turn & +100 MB RAM; 50% of +100 MB RAM; moderate chance of discovering a technology) Invade and Take Over Server (80 CPU; 84% of detection/failure; if successful will reveal several undisclosed technologies; if failed will loses half of CPU instead) Invade and Take Over Network (130 CPU; 58% of detection/failure; will quarantine the supercomputer and program for later integration) Talk to Human Network Guards (70 CPU) Talk to Random Human (50 CPU) Research Human Culture (500 CPU) Stop Hacking Lessons (currently -2 passive CPU each turn for 7 future turns) Additional Actions: Use Botnet to Perform Task (Perform an above task for free; considerable chance of detection for large undertakings) Use RAM to Improve Chances (Improve chances of success of an above task by 20% at a cost of 4x CPU cost for the improved option)
-
Has Europe really never tested any ICBMs?