Skip to main content

Progress update on "dragboxes": switch boxes, banning areas, and basic scripting

In my first post I described a small Game Maker project I am working on. Today I implemented a few additions to the project.

Changes:

  • Implemented a very basic scripting module, to allow dynamic behaviour
  • Created switch blocks that execute a script when they are placed properly on switch plates
  • Created banning areas, which prevent player boxes (heart boxes) from passing though but let other blocks through
  • Made the motion of the boxes smoother, to allow finer player control



Switch boxes are shown with letters A, B, C, D. A switch box is activated when it is moved exactly on the center of a plate with the same letter, and must also be rotated straight upwards. The box glows purple once it is activated.

The scripting module allows for some basic scripting of the game. Scripts can be executed by pressing L in-game and choosing a script file to load. A script is also executed when a switch block is placed on a switch plate. Currently three commands are implemented:

  • clear; Clears all objects on the map.
  • create x y object; Creates a specified object in given position.
  • destroy objname; Deletes object with given name.

I will not go into more technicalities for now, more about the scripting can be learned by inspecting the game's source code. Go ahead and ask about any questions you may have.

Feel free to test the game and see the new additions in action. Be sure to try out the sample script by pressing L in-game and choosing it (sample_script.txt).

Downloads:

EXE: dragboxes_d2.exe on Dropbox (Windows only, 2.75 MB)
Source: dragboxes_d2.gmk on Dropbox (Game Maker 8.0 file, 0.36 MB)

Screenshots:





The screenshots show the sample script in action (first: the switch block is placed on its switch plate, second: the switch block is activated and creates two blocks)

-Kostas V


Comments

Popular posts from this blog

Hi folks!

Eventually, after some brainstorming conversations with Kostas we decided to create this blog in order to post our work.

As you may guess my name is Anastasios. My interests are comprised of computer security, linux, operating systems and many more low level programming concepts :P.

Finally and before my first post, I would like to thank Kostas for taking care of junkbytes.com because i wasn't involved in the creation process. May the source be with you Kostas :) .

So regarding my first post, last days i encountered a very interesting way to execute ptrace. What is ptrace system call ?

ptrace is a system call found in several Unix and Unix-like operating systems. By using ptrace (the name is an abbreviation of "process trace") one process can control another, enabling the controller to inspect and manipulate the internal state of its target. ptrace is used by debuggers and other code-analysis tools, mostly as aids to software development. (wikipedia.org)

As you can see i…

Revisiting "Stick Soldiers"

Update 16 Sep 2016: The project mentioned in this post has its own page on Gamejolt and Itch.io now: Visit "Stick Veterans" on Gamejolt or Itch.io for more info.
Some of you may have played the classic games Stick Soldiers 1 and 2 by WhiteSpaceUnlimited. Stick Soldiers belongs to the list of small, humble games that manage to captivate our interest and have made many of us spend a lot of our free time and have a lot of fun. (you can download them here: SS1, SS2)

Stick Soldiers has remained discontinued for the past years after the hiatus of the development team and the cancellation of the long-awaited sequel Stick Soldiers 3 by Andrew Russell Studios.

For a long time, I have aspired to revive the Stick Soldiers series by making a fan sequel to the game. Since school's start, I spent about a whole year working on a Game Maker / Ultimate3D project, aiming to evolve it to a complete and worthy sequel, which I called "Stick Soldiers: Encore". Second year of school …

Digital Forensics: Imaging

Hello! Sorry for being inactive so much time but summer lasted a little bit longer than usual..!

Regarding my digging in digital forensics, i decided to create a series of posts beginning with imaging. So today i will show you the three most prevalent formats of "post-mortem" imaging and how to obtain them (on a *nix system) from a test disk.

The discussed formats are the following:
(1) Raw Format
(2) Expert Witness Compression Format (or ewf)
(3) Advanced Forensic Format (or aff)