Welcome To The Game
Delve through the Deep Web as you search for the illusive Red Room. A place where the viewers decide what happens to the unfortunate soul.
--------------------------------------------------------------------------------------------------------------------------
I - The Game
It's very scary. The immersive environment and atmosphere coupled with the unique form of gameplay and story sums up a very interesting horror game.
Game Rating - 9.5 / 10
--------------------------------------------------------------------------------------------------------------------------
II - Controls
A - Look left (Don't know why, only thing you'd find is a large wall)
S - Look right (View the living room)
D - Look behind you (Allows you to turn off the lights, which I will explain later)
--------------------------------------------------------------------------------------------------------------------------
III - Hacking
As you search for the Red Room, hackers will attempt to hack into your system either by launching a Denial of Service attack, or by attempting to corrupt your kernel. Luckily, our friend Adam (For new players, don't skip the tutorial) has installed two programs to protect you from the two. But of course, not everything is automated.
DOS Attack
Hackers will attempt to flood your computer with thousands of packets in order to corrupt and halt the use of your computer. With the Dos_Blocker program, you can redirect these packets to the exit route, stopping the flooding. When this begins, you will be presented with a large square filled with arrows pointing in different directions, along with empty squares. Trace the directions the arrows flow to up to your first empty square, then keep on clicking the square until the arrow that shows up flows into the most logical area. Do this with all squares until the last arrow leads to a USB icon.
Example diagram:
E - Exit
v>>v
>^ ?
v<<<
E
This would become:
v>>v
>^ v <--- Click on the box until the correct arrow appears.
v<<<
E
Kernel Attack
Hackers can also attempt to corrupt your kernel (what kind computer brands do you use?!). In this case, the K3RN3LC0MP1L3R program can defend you from this. When this begins, you will see a large box with 1-5 lines of extremely wierd text. Write it all down correctly, end to end, every single symbol, number, and letter you see.
Example diagram:
1 - <e2js010 >>21eosj
2 - @!46tdfjw3<>qwi wafo3210fw>
3 - ^2rpaw<?1ksp wqeo120ca.2:21G!
Type all of this down (no need to click on anything, just type) and you'll stop the hack.
--------------------------------------------------------------------------------------------------------------------------
IV - The Lights
By pressing S, you can look behind you, giving you access to the light switch. Use this to ward off any kidnappers around your house.
--------------------------------------------------------------------------------------------------------------------------V - The Kidnapper and Your House
While browsing the Deep Web, kidnappers will attempt to track you down, breaking into your house and kidnapping you if you don't pay attention. The general rule is, after getting your first part of the url code, you will begin to hear strange noises. This is the kidnapper on the hunt for you. If you hear these noises:
Footsteps (Akin to that made by stepping on a wooden floor)
Scraping of the chair across the floor (If you look to the right, the chair has moved, obviously)
Breathing (Your character doesn't breathe)
Two thumps or a "Hmmm" (It is speculated that the kidnapper has hopped over your fence, or is trying to get through the front door)
Any other alarming sounds
Then quickly shut the lights off and wait until these noises stop. If the window is open, the kidnapper is lurking in your house, and shutting the lights off would make him believe you left the house.
One of the most crucial signals is the Locations Services Icon next to the WiFi icon. If you see it, lights off immediately, in mere seconds, the kidnapper will walk around your yard, pay close attention to the window and the audio clues. He speaks Russian (translated here):
"Good evening" (Game Over, your screen will forcibly lock on to him and he will then grab you)
"Where is the signal coming from? Is it from here?" (He will walk around, passing by your window, pay close attention)
After 10-20 seconds,
"Nothing here" (His search has stopped, and after a few seconds, you can resume your search)
While he walks around your yard, do not utter a single word. The game taps into your microphone and talking will make the kidnapper jump through your window and kidnap you.
If the kidnapper is standing next to you, you have about 2-3 minutes to type in all 8 bits of the URL before game over. No hacking sequences and time will stop completely. You can still beat the game during this.
--------------------------------------------------------------------------------------------------------------------------
VI- The Code
In this game, you are to find 8 bits of code, which, when arranged in order, form a URL (add .ann to the end). These codes can be found by fiddling around with websites (looking around, clicking links, etc). I'm pretty sure 4 of them can be found on the first Deep Wiki (Notice the roman numeral I/1, which is why I said first) and the other 4 can be found on the Deep Wiki II, who's link can be found by solving the puzzle on the 'Chosen Awake' website. And yes, the codes and URL are randomized every single game. No writing them down!
--------------------------------------------------------------------------------------------------------------------------
VII - Chosen Awake Puzzle
On the site, there's two icons which when clicked, unlock more of the page by going down. There, find more icons on the strange looking shapes until a sound is heard. Scroll to the very bottom, and the link to the second Deep Wiki can be found. Careful, almost every shape can be clicked, and one wrong move restarts the whole puzzle.
--------------------------------------------------------------------------------------------------------------------------
VII - The Gatekeeper
On the site, there's a bunch of questions. Here are the answers.
Mobile R.A.T Date: 04-21-16
Shadow Web Portal: $200 to enter.
TangoDown: Minimum age is 18.
The 1911 costs $1,200.
Hot Burners sells the AK cheapest, for $800.
The Butchers Author is Bob.
The doll Tanya is 22 years old.
The drug "Roger Doger" on CottonRoad, is the one that burns your throat.
Legion's text begins with: MIIF
The password to Tonys FacePage is: gearsUPdownUP
The person on "Forgive me" who wants to be kidnapped and r..ed is 22 years old.
The 'TakeDownMans' page has 162 lines of text.
Cotton Road sells Crystal Meth for $250.
---------------------------------------------------------------------------------------------------------------------
VIII - Working Websites
Please note that the working websites are randomized every game.
Black Hat (Click ‘Submit’)
Family Drugs (Found on site)
Weed Post (Found on site)
zeroDay (Click ‘Leaks’, creates text file on desktop “SEEK”)
Forgive Me (It's in a confession - "You will regret this. ********")
Hot Burners (Click Block 9)
Warehouse (Click No.1 Warehouse)
Cotton (Click DMT)
Blackout (Click Submit)
Tango Down (Click Results)
The Bunker (Page 8 - creates text file on desktop “DOOMSDAY”)
Legion (Bottom of site)
Butcher (Click ‘Submit’)
Doll (Click ‘Submit’, after 2nd paragraph.)
Code 8 is found on Gateway.
TakeDownMan (Found in links as clickable, creates .txt file on desktop)
Illuminati (On page)
Good luck, player!