@L}5 _$% l0$)$$Hȱ$ UhL" `e$$%`$%`  R@W!( L(1   Y I`  d  Ld M * @  $ % CC$$)%1 Udߥ$9%: !0 S$% DD˙`  }J)Lr d M * @  $ % CC$$)%1 Udߥ$9%: !0 S$%} DD˙`  }J)Lr J  ((  p L ()   J}L= ( L 0q A    IB JC;? D W } LL  ` W )LA!  ߰")-݆ p" } $G@LL 08`Q")<2Q0 -G$Ș݆ UL# ; p8(()(0ʥ)NQ` }$GȘ݆LU )L ݆ L GȘ ݆LL )W>Z   HH)H }p h  hyhy D L> L JJ    ! LA*` BF }7'8  M HN H` 8 Z  \LdJJ!"! GFE@F (!L }EE !E^ ^ E E7EȩEdE/EȩE  D } .L }  ;F d  ;?F7F? ( .   Z D LL d } . D  L    p  E` , d)  D L) 0BM݊L݉} ML  N݆ L NLML [ TEqEHȱEqEh 0Gȹ G} HLL GɛL  LFREE SECTORS G) *Gȩ GȽG GȌ*jj >G} C8jJ3j2CD( C202C ԠBX` N 1? l LlD:RAMDISK}.COMLu L1 L ;LHL  T`  `8  ɐ     `TU  } L ? .  t`GBJ ~DEHI B V0dV!}QDEHI VF9 ,0 ,0 s0hhL  L` H hDHEh"}DEL8HI4 0 HI,0 0  9 .G VLO#},0 L4*IJ`llD1:AUTORUN.SYSNEED MEM.SAV TO LOAD THIS FILE.D8:MEM.SAV J y08 B|DEHI$} V0 0`B;DEL`?<0LV`@ʆ v s? F0Ξ05: [ BDEHI%} VY8 B V  @  /DE `E:D8:DUP.SYSERROR-SAVING USER MEMORY ON DISKTYPE Y TO &}STILL RUN DOS B;DE J  (` 9 V⪍ ઍ  -'}LLu ÝDEHILV 9 .l 9 .l  `` s$B BH(}I|DE V BLV nB,DE JLV B V BLVDEIʩ BꭝLu } 3E:}DISK OPERATING SYSTEM II VERSION COPYRIGHT 1984 ATARI CORP.A. DISK DIRECTORY I. FORMAT DISKB. RUN CARTRIDG*}E J. DUPLICATE DISKC. COPY FILE K. BINARY SAVED. DELETE FILE(S) L. BINARY LOADE. RENAME FILE M. RUN AT ADDRES+}SF. LOCK FILE N. CREATE MEM.SAVG. UNLOCK FILE O. DUPLICATE FILEH. WRITE DOS FILES P. FORMAT SINGLEL !N',}#"&))9(&*)/h)''-&؆莟R'S  vL/ˢ L }Insert DOS 2.0s, type Y Λx -}DEfHI 1莏#q! @ y0ɛ8A0,' ȅ 1 1ild! 1L!NO SUCH ITEMSELECT.} ITEM OR FOR MENU! 0 .z:*{}.|{ 1 0 0JB 18L%|DL/}%DIRECTORY--SEARCH SPEC,LIST FILE?[# 0 0 &|D3" 1L!NOT A DISK FILEN !B 1L!E# 1 !BD0}ED:}:1BJ|DE 1DEBHI 1 h0ߢ 0.1}  0?詛 1 y0YЛ 1 ;#L" ;#L! BL1TYPE "Y" TO DELETE...DELETE FILE SPEC2}COPY--FROM, TO?OPTION NOT ALLOWED697 FREE SECTORS COPYING---D8:COPY32.COMl# 0|D .L/%#3}##JB|DE 1BHID#E 1#0: B 1L!#͑### B 1#c$0SY4}S1}:## # # .#Ƚ# # 𩛙## 1,#PD#ELJ- <.BJD#E 5}1 1HH 0hh|DL%1}:̳# L% #D#EL% 1 0 . .0O% 1L!WILD CARDS NOT A6}LLOWED IN DESTINATION 0 <.|K}N 2 FORMAT. t* 5) 1L!`) 0NΞ 0 L1) 1 L!BAD LOAD FILELOAD FROM WHAT FILE?) 0 ?}0#B 1L!WHAT FILE TO LOCK?) 0 0$B 1L!WHAT FILE TO UNLOCK?DUP DISK-SOURCE,DEST DRIVES?TYPE "Y" IF OK TO US@}E PROGRAM AREACAUTION: A "Y" INVALIDATES MEM.SAV.FE! +L1   `*  70 2 2A} 0.* 1 y0 0)INSERT BOTH DISKS, TYPE RETURN^, 1 y038逍 N, 1L! ,B}C, t*  Lx+, 0 ^, 1 y0 , ,0,0 ,L+ ,I0 ,Vǭ0C}Ξ, 0 }, 1 y0C,ШC, 0K'!" H H 'h h Lx+!EF 5L1L!D,I,HhD}` NOT ENOUGH ROOMINSERT SOURCE DISK,TYPE RETURNINSERT DESTINATION DISK,TYPE RETURNE}`  `8 rL1`-* 1P* 1 y0Y`hhL!NAME OF FILE TO MOVE?- 0 0|DL% <.F},^ 1 70 0 .@L# .BJ 1  DEHIB V L1 ,} 1 70,L.  G}JB|,#P#DE 1 HI BDEHHII 1 B 1 ,^ 1 70,0La- B V,#PH},^ 1 70 0L#L!-* 1P* 1 y0Yj383}mm ݭI}}`8}``|* ? ɛ,`|:-)| / 1L!`DESTINATION CANT BE DOJ}S.SYS0 0H{ 24Δ 28/L!/) 2 Π 2 0 ξK}hAΞB,0 J 1 BDEHI,HÝDE 1HIHIDELSAVE-GIVE L}FILE,START,END(,INIT,RUN)O S0 1`BDEPHI V` S0H 1 L!M}0 0 1L~0`PLEASE TYPE 1 LETTER,0`hhL! 70 1L0L<1 ,;ɛ7,"ɛ:ݦ1ݥN}A"D|ݤD|ȩ:|ȩ|ɛ,,(/+.ީ1 1,ɛ`轤{NAMEO} TOO LONG B VL!` L1I H1EΝDL1|mDiE` V0`8d/8 i:222 1 LP}!ERROR- 164ɛ+,' 20*.. өr2 1``2TOO MANY DIGITSINVALID HEXAQ}DECIMAL PARAMETER800 0 8 00`,0'D800 H,ɛh`2L1NEED D1 THRU D8uR} ECIMAL PARAMETER800 0 8 00`,0'D800 H,ɛh`2L1NEED D1 THRU D8u05  15 2 2151^116115ύ011$r2ԭ5 3)5)5ԭx GT}@@L00)+& 2 L0=ɛ -L!1LV1L1 /3 3ȹ441L-4 v3 25 2H 2h͔5U}L3L3 2 k3U hh`DOC`QL3P1Lk0S1H /3h0B k3@ VL0LU!#$53 1181118V}1111Ε5 1Lk0552 1Ȍ1i111i11115Lk0pppB4f5&&&&&&&&^6f^6&&&&&W}&&A1@BJ D2ELVK@BHILV^Щ6 2BD2EJ VBD5EHI0 V0%5X}5 2iХiL[2 25 25`D:*.*` i@`8 ``@i `8@`0 BLV525<4Y}5`HH i ԍΗ552 ԍhh@ Lح1Э1Ѣ 24.4 24Z}4`D4E` 2BJ k3LVRH` 2BD4EhK)I JLV333 BASIC language TUR > TURBO BASIC OBJ| f}COM > MACHINE language DOC > DOCumentation PIC|MIC|FNT|MVM > Graphics AMS|MUS|MBD > Music LST > BASIC g} LISTing -Some MACHINE language programs can only be run by loading the MENU without BASIC! ------- -For s h}ome programs, XL/XE models may require a "TRANSLATOR" program (available from BELLCOM) to be loaded first! -Most i}programs are relatively self-explanatory; however, some may have separate DOCumentation files. Some BASIC programs m j}ay contain instructions in their program listings. LIST to read. -To view DOCumentation files one page at a time, k} press [START], [Return], or the Joystick Trigger to display the highlighted DOC file. Pressing the [Esc] key cau l}ses a return to MENU. -To print out a hard-copy of any DOCumentation file, [Q]uit the MENU, boot DOS, and then from m} DOS, use the (C)Copy command: D:Filename.DOC,P: -To use this great MENU program on your own disks, simply n} copy the file "AUTORUN.SYS". D:Filename.DOC,P: -To use this great MENU program on your own disks, simply !0TDTCCCCCCTEXTKEYWORDCODESQUAREALPHABETMESSAGERESULTVIGENERETOPCOLUMLINDELAKEMODCCODESLOLOOCp}ROWROCOLUMNROWCOLUMNLLCHATIMNROWNROWNCOLUMNNCOLUMNSEESDMCTSAVMS@@@@@q}@ ) C   w@@@@ @2@sr} !@ "@#$s}%&'()76-@6-%6-%'6-%/6-%76-%(AA;,;@,;@%t},;@&,;A,;A,2%%;@&$@&,;@@$,< +@00F/6. THE ATARIu}6-@%6-/ AP46.CIPHER MACHINE6-*6-@4 AZ. 6.by6-@ $6-@. Av}d[6. ken murphy6-&6-@0 A?6.(C) 1984E6-Q6-@[ An6-A Ax<-w}@  A'` %6-+6-5 A<6.B-@ A'` %6-16-@; AB6.B -x} A'` %6-@ 16-@; AB6.B-@ A'` %6-16-@; AB6.y}Q-@ A'` %6-16-@; AG6-AQ AK +@0@)0@/-z}D( select cipherK6.\-@(pLAYFAIR+-@@( rANDOM CAESARL-@\(vIGENERE#{}-@#( iNSTRUCTIONS; A0;@:P,*@:R,*@:I,*@:V,A"@:I,A "@:R|},A@"@:V,A'D +@0@)0@/-D( select option* -"(}}*0K-@'(eNCODE A MESSAGE3-@K(dECODE A MESSAGEB-@#( iNSTRUCTION~}S/-@B( cIPHER MENUG A07@h*@i*@s*@g=(G A@" 6-"@:I,} A@,"@:C,Ap6O+(6.ABCDEFGHIJKLMNOPQRSTUVWXYZO67@:J,&@d<@:J,&@d,. @<-@}&(Ġ)(<@:E,AJR-(%You can now select your password wordR( or phrase. It should be selecte}dT0-(%according to the following guidelines0(^K((  It should be easy to rememberK(  It shouldn't be too obvious}h>'(  Alphabetic characters only ->( spaces are OK.r''(  From 3 to 15 characters long|>-@)(What }is the password->B:,!AV(AR8(!Your password cannot be accepted.V(Correct it and try again.}#6-A A# A-B:,5(7<,0 *+7<,2A)7<,3Z,+'5 AR -@ -(Y}ou selected ''.R(Do you want to change it (Y/N)? A0 "@:Y,A@:N,A@. 6--}B:,!7<,4J.67<,.ICC7<,4 )7@:7<,,&@d<@:7<,,&@d,4 A@67<,.7<,@67@:}7<,,&@d<@:7<,,&@d,.  6-% 6-@&7<,0 .67<,.7<,66-%  A}@ A F A50-@2(ҠŠF0@@&-@( 0A-@}( | | | | | |1-@@A( :G-@@%( | | | | | |7-@@ G( }DG-@@%( | | | | | |7-@@G( NG-@@%( | | | | | |7-@@}G( XG-@@%( | | | | | |7-@@G( b( 6--@%! A %} ($lE-@ ;(&Want to watch the coding process(Y/N)?E A0v"@:Y,6- A@:N,A } 6- A` A:+0H:,$@&-@7( Š:(l)(!Enter your secret message now} 200S(%characters maximum. Press RETURN wheni(you are finished.l( 6.(EAR-@"}E(Your message has B:, characters., B:,!6-A" A, A D$(Please re-enter the message.06}-A: AD A`F A50&0H:,$@@2-@C( ŠF(%(Your message reads} ...!(%(IAR-@"?(Do you want to change it (Y/N)I A0"@:Y,A`@:N,A }$ = A`-B:,07<,2 )7<,3Z3'= A  A X-@"8(#Message contains i}llegal charactersD6-AN AX A*2 A50&0H:,$@@2-@4,"@:E,#(}Ǡ&(,6->-"@:D,#(Ǡ&(-6-6H'6-A A' A@R 6-\.7<,4} 6.7%,$67,.. A`f"@:D,Ap:7<,47%<%,"6.7%,/67%,.X:67%,.z 6-%} B:,A`'6-B:,'P:,'67B:,%,.X(-B:,7<,4J(67<,.I  6-6-6.}(A `m-@@!( 3-@@:( L-@ @R( ^-@m( 0}-@@%-@,( 0 # A AP6-#6-# A AP6-#6-6-+&},$%6-+&,$% " A0 " A/67<,.7<,'67%<%,.7<,/6-%<"@:E,'"}@$P:'@,467<,. <6-%(A1-@@1(>:@:7&<&,,%A(,1-@@}1(>:@:7&<&,,%A(,Z-@@(=.-@%+$,6(H-@%+$,Z(>:AY,$-}@ @(7<,.A-@%+$,'(>:AW,9-@%+$,A(85-@!@(7<,+6}-A5 AB B:,A 0L 6-V6&7<,47%<%,*7%<%,4X667%,.7%,`  B:,&6-% } Aj  (}tG +@0!AR'-G(@your message reads~ 6-6- A?"(}Print this message (Y/N)?, A0?"@:N,A @:Y,A`, A(3Your message reads ...,3*}3The original was ... 3* A I(,( Printer doesn't respond - retry?6 A0I"@:Y,A@:N,}AK(%(Want to do another (Y/N)?/ A0K@:Y,*@:N,A "@:Y,Ap + )-}@%47<,') Ap ( ERROR - ABORT36-P:+&,'@,%06-&++&,$@,3$6.7<,}6-%$ <AR- -B:,<6-P:@$H:,,%@J(@7<,22@@@@< A}F2J AR$(F6-P:+&,'@,66-+&+$@,,$%@F6-$%@2 -(7<,}6-%$<0 A50!0@@$(0@F--(%The cipher technique used here is thePN(( PLAYFAIR cip}her named after LyonN(!Playfair. Playfair was actually aZU-(%good friend of Charles Wheatstone whoU(#discovered the ci}pher in the 1850s.dM+(#Playfair was responsible for makingM(the cipher well-known after anC,($demonstration at a sec}ret meeting in@(London in 1854.C(xN*("The Playfair cipher is a techniqueN(of enciphering letters in pairs))(!su}ch that the result depends uponS*("the interaction of both letters ofS($a pair. Today, this is recognized as=-(%the} first 'literal, digraphic' cipher=( in history. AR,($}The enciphered result depends uponR(!a keyword phr}ase or word suppliedQ-(%by you. This password should be knownQ(only to you and the other partyN(( allowed to read }the message. TheN(!password can have only letters orR-(%spaces. The Playfair cipher techniqueR( will use your passwor}d to 'seed'e*("the enciphering/deciphering squareT(%before actually performing the ciphere( translation.N&(A mes}sage enciphered with thisN(#technique will have spaces in fixedT*("positions to confound prying eyes.T(%Once decipher}ed, the real message canR)(!be easilly discerned. The messageR($you are enciphering can only containQ'(letters or }spaces just like theQ(%password-numbers must be spelled out.9*("Also, your message should be UPPER9( CASE only. }AP(( }The Playfair cipher works thisP(#way...first the codesquare is built"R'(by inserting the letters of th}eR(&password in order of first appearance.,d$(The remaining letters of theN(%alphabet follow in alphabetical orderd(}(J is dropped). 6f(The secret message isA(processed through the square inf( pairs of letters. First, all j's@N}'(are replaced with i's. Then theN("message is broken down into pairs.JN)(!If both letters in a pair are theN( same,} a dummy 'x' is inserted. ATW-(%dummy x is also used to round off theW(%message to an even number of letters.^v A}4("}Here is an example of a PLAYFAIR^(%square using the keyword 'LEXINGTON'.p@@s(v(h3( }#( |L|E|X|I|N|3( rc( |G|T|O|A|B|#( 3( |C|D|F|H|K|C( S( |M|P|Q|R|S|c( }|2( |U|V|W|Y|Z|#( /@2(i,($The plain-text letter pair 'ER' thenT(#would be enciphered} 'IP' using thisi(PLAYFAIR square. A A@=-@"0(: A0=$}@ @3%6-F:@,$AV%F:@ ,3 A$% 6-6-6-%!%6-&  }6-% 6-%!@6-&  6-%"6-+&,$%6-+&,$%"$% 6-6-6-%!%6-}&  6-% 6-%!6-&  6-% Ap&1K:))AR1(>:,}+B2@`@@+6-@5 A?2B$0D +@0@)0@/-D( selec}t option:( - ((0DK-@'(eNCODE A MESSAGE3-@K(dECODE A MESSAGEN}B-@#( iNSTRUCTIONS/-@B( cIPHER MENUXG A07@g*@h*@i*@s=(}G A@b"@:I,A$`l"@:C,Apv 6-2+-@ /(͠ĠΠ2(V+(#Ente}r the seed value for the randomV(&number generator to start your cipher.**("The value must be from 1 to 99999.O-}@( SEED VALUE) AP-7 BO )!B AP= A`-B:,07<,2 )7<,3Z3'= }A  AX-@"8(#Message contains illegal charactersD6-AN AX A`.6-'B}6." A50.-@'((Ǡ' A (Ǡ<-B:,)6-$A &P}:$A ,<"@:D,A `86-@:7<,,%P:$@Y,*!@86-&@Y67<,.>:,  A@ A}@ 86-@:7<,,&P:$@Y,* @286-%@Y A @ h A50@?(!Despite a great dive}rsity in theh($external appearance and the internal*S*("constitution of ciphers, there areS($only two basic classes of} systems...4M)(!transposition and substitution. AM(transposition cipher involves a>O&(rearrangement or change in th}eO($sequence of the letters of the plainHT*("text message without any change inT(%their identity; a substitution ciphe}rRR+(#involves a replacement of the plainR("text letters by others without any\c)(!change in their sequence. The two}Q(#systems may be combined in a singlec( cryptosystem.fg A A50A(%This program will encode/decode yourg(}!messages using one of 3 differentpT-(%cipher techniques, i.e. the PLAYFAIR;T("a randomized form of CAESAR or thez(}the VIGENERE ciphers.P*("The PLAYFAIR is a digraphic cipherP(!of the substitution variety whichS,($ciphers pairs }of letters rather thanS("each individual letter. The CAESARK,($cipher is also a substitution cipherK(and is very sim}ilar to theO(( cryptographic cipher used by theO("military. The VIGENERE cipher is aR+(#polyalphabetic substitution} cipher.R("All of these different ciphers areL*("difficult to break to the point ofL(being pointless to try in any}S,($reasonable amount of time. After youS("select a cipher technique, you canD#(read the details about thatA(part}icular cipher method.D( AP'(}Each cipher requires a secretP($password or code supplied by you andR-(%}known only to you and the other partyR( with whom you are communicating.N)(!The PLAYFAIR requires a word or aN( phras}e while the CAESAR requiresR+(#a number. The VIGENERE is differentR("in that, in this form, it does not S)(!require }any keyword. This type ofS(%cipher is termed an 'AUTOKEY' cipher. L&(The results of all ciphers areL(!reversable give}n the correct key. Q+(#The message given to the cipher canQ(!be no longer than 200 characters.$ R)(!The PLAYFAIR and V}IGENERE ciphersR($allow only alphabetic characters and. P-(%spaces, but the random CAESAR permitsP(all characters in i}ts message.8 ^ A6($}For those of you who enjoy puzzles^(#generally and want to try your handB B+(#at Cryptolog}y, I've included a niceB(challenge contest.V P)(!I assure you that the message wasP("enciphered with this program...bu}t` U+(#which cipher(!)? Good hunting! P.S.U(%No professional cryptologists please!j *-@@*(Ԡ}Št c+(#RPNLOV RPDIPR GOROXL VOVSIY TQPOYFR("RAXLXR BQCQAT DBNCMO ADAGAP MEIYTS`( ESERAS BIc(~ P*("If you're reall}y stumped and stillP(!interested, I can be reached thru 9)(!COMPUSERVE PPN 74025,731...expect9( only hints!  A} Ap  A50@ Q'(The Caesar cipher is so calledQ(%because Julius Caesar is said to have N'(}used it during the Gallic wars.N("In its original form a constant is R,($added to the character code for eachR(!lette}r so that the resultant code R-(%is again a valid letter. For example,R( suppose your constant is 3. Then T+(#each le}tter would be represented byT($the letter 3 positions away. By this S*("cipher technique A would become D;S($B would b}ecome E and so on (assuming U+(#a constant code of 3. Then only theU(%constant must be known by the reader. Q()(Th}e weakness in this cipher isQ(#that the number of possibilities is S-(%limited to 25 (the number of letters)S(!and any} high school student could L,($soon figure out a message coded withL(the standard Caesar cipher. A N*("}}A vast improvement in the codingN(scheme would be possible if the K'(offset were different for everyK(character enc}oded. Also, if the( Q*("offset pattern from value to valueQ("was unique, then the code would be2 W.(&virtually unbreaka}ble. This is exactlyW($what the RANDOM (or CRYPTO) code is.< S(-("The constantly changing offset andS(!pattern is gen}erated using randomF V,($numbers. The only input required forV(%the cipher to operate is a seed valueP S*("for the rand}om number scheme. ThenS($the decoder of the message must haveZ T+(#the random number seed the sameT($random number }generator algorithm sod S,($that the random numbers would be theS("same starting from the seed value.n Ax O (}}*(Your message can contain anyO( alphabetic characters, spaces or S+(#numbers and special characters. AllS(#are p}ermitted with this cipher. You N+(#must, however, use UPPER CASE only.N(The seed number for the random N*("generator} must be from 1 to 99999.N(Anyone to whom you send a coded Q,($message using this program must haveQ( the same random} number generator L)(!algorithm to decode your message.L(This program, will, of course, 6)(!function both as an enco}der and a6(decoder.  A A@ 67<,.>:P:H:,$A#,, .7<,2 .67<,.>:@:7<,,%@2, }$ 8 +@00#-8( select option . - (.0@ K-@'(}eNCODE A MESSAGE3-@K(dECODE A MESSAGE B-@#( iNSTRUCTIONS/-@B( cIPHER MENU G} A07@h*@i*@s*@g=(G A'  6-"@:I, A2`" "@:C,Ap, W }A500@)0@5-@T(ǠŠW(6  #A5@6.@ X-@%K-@}%P:'@,$@%+&P:'@,$@,X(ROW %J "67B:,%,. T K 6--@ A(&Want to wa}tch the coding process(Y/N)?K A0^ "@:Y,6- A)0h @:N,A)r  A`-B:,| 5(7<},0 *+7<,2A)7<,3Z,+'5 A)`   A)p dAR-@"D(#Message contains illegal characte}rsP6-AZ Ad A)0 2 A50 0H:,$@,-@26- &"@:E,#(Ǡ&(} &"@:D,#(Ǡ&( 7<,4 67,.7%,  6-% B:,A0 (A0p L6-F:AY},AY(#A86-@4:"HA6%L  QA6%@44A6%@ F:@,QA6%}@F:@, ?A@P:C:,'AV,?A9C:,&AV$F:A@, SA`Aa% A8G6-F:}@,%AV$F:@,SAY "@:D,A2 6-@:7<,,&@e6- ''67@E,.+%9,%}44%2 J-B:,067@e,.>:@:7<,,&@2,J67@I,.>:%@3,&  (}-(7<@&,0 <-@:7<},,&@e#-%,( 0 <@: 2 -(-&*-F:@,2( D R6( 7+%,$@&%<}+%,$@&%@&,: F!@I(L(O(R(N 6-@P AX 9#6-@:7<,,&@d%$@&167,.7<,}96-%b #"P:',$67,. #6-%l 6-@:7<,,&@ev   A@ #-@#6-$@&%% }7<,47<,' A20  ( ERROR-ABORT J6-$@&%)6-@:7<,,&@e4-B:,J6-@:7<,,&@d} C6-$@&%/6-%&+@:7<,,&@d,5 C6-%@& 767<,.7<,)6-@:7<,,&@e- 7 A@} ] +6($The VIGENERE is a substitution type]("of cipher which is polyalphabetic; R+(#i.e., the technique emplo}ys severalR("copies of the alphabet arranged in Q)(!a table or square. Each letter ofQ(#the message is replaced by a l}etter O)(!from the square whose position isO(!determined by the column in which O)(!the original letter was found and}O(!the nth alphabet which is the one Q+(#starting with a key letter. The keyQ(!letter is automatically generated M*(}"from the plain text as it is beingM(processed through the VIGENERE U,($square. Each copy of the alphabet isU($enter}ed in its natural sequence. The \,($first key letter chosen is the firstR(!letter of the plain-text message.\ A} V (}.( Here is an example of a VIGENEREV(#square. The actual square used will I*("contain 26 copies of the alphabet}.6@B-@I(* 7AR#A5@'-@+"3( 7 4 '-@(F$@' }(> Z-@4( The cipher equivalent of a givenZ(!plain-text letter enciphered by aH S-(%given key letter is that l }etter whichS(!stands at the intersection of theR S+(#column headed by the former and theS(#row begun by the latter. The }refore,\ I,($'B' is ciphered into 'G' using a key?(letter of 'F'.I Af T.(&}VIGENERE squares can be used in man }yT(!different ways other than the wayp U,($I have chosen here. They can be usedU($with or without a key. They can also }z N*("contain alphabets in different (orN(random) sequences. This version S)(!uses no key and is therefore moreS(%se}cure. An 'AUTOKEY' cipher generates Q)(!its own key from either the plainQ(#text or the enciphered result. I am R*("u}sing the plain text letter as theR(#key to encipher the next plain text T,($letter so that the 'key' is actuallyT(#imp}licit in the plain text message. V-(%Your message must contain only spacesV($or alphabetic characters. The spaces @'(}are actually removed during the@(enciphering process.  A A' +AR$ ABCDEFGHIJKLMNOPQ}RSTUVWXYZ BCDEFGHIJKLMNOPQRSTUVWXYZA CDEFGHIJKLMNOPQRSTUVWXYZAB DEFGHIJKLMNOPQRSTUVWXYZABC EFGHIJKLMNOPQR}STUVWXYZABCD FGHIJKLMNOPQRSTUVWXYZABCDE GHIJKLMNOPQRSTUVWXYZABCDEF HIJKLMNOPQRSTUVWXYZABCDEFG$ IJKLMNOPQRS}TUVWXYZABCDEFGH. JKLMNOPQRSTUVWXYZABCDEFGHI8 KLMNOPQRSTUVWXYZABCDEFGHIJB LMNOPQRSTUVWXYZABCDEFGHIJKL MNOPQRST}UVWXYZABCDEFGHIJKLV NOPQRSTUVWXYZABCDEFGHIJKLM` OPQRSTUVWXYZABCDEFGHIJKLMNj PQRSTUVWXYZABCDEFGHIJKLMNOt QRSTU}VWXYZABCDEFGHIJKLMNOP~ RSTUVWXYZABCDEFGHIJKLMNOPQ STUVWXYZABCDEFGHIJKLMNOPQR TUVWXYZABCDEFGHIJKLMNOPQRS UV}WXYZABCDEFGHIJKLMNOPQRST VWXYZABCDEFGHIJKLMNOPQRSTU WXYZABCDEFGHIJKLMNOPQRSTUV XYZABCDEFGHIJKLMNOPQRSTUVW }YZABCDEFGHIJKLMNOPQRSTUVWX ZABCDEFGHIJKLMNOPQRSTUVWXYSS112,112,66,0,0,2,2,11,66,0,0,2,2,2,2,2,2,2,2,2,2,2,2,2,2,2,2},2,2,2,2,2,65,0,0* 6.67@@$,.'67,.*$ D:CIPHER.BAS2,2,11,66,0,0,2,2,2,2,2,2,2,2,2,2,2,2,2,2,2,2P$_TPPD@ADTUEEUTDA@DPPTUEEUTPP@@@DTUEUTD@@@PPTUEUYjjjZZVVUUVVZZjjjYUUUVZjjZVUUUU}UUUUUUUUUTTTTTTTTUUQ@DD@DUU@T@E@UUU@TQT@UUUEDD@TUUUAE@T@UUUAE@D@UUU@TPQQUUU@D@D@UUU@D@TPUUUDDDDDUUUEEEUUUTUUQPUUUUUUPQ}QQPUUUEUUQQPQQUUUUUTTTTTUUUDDDTTUTUTTTUUTDTTTUTTUTTUUTTTTTUTTTTUUUTTDDDTTUTTTUUUUTTDTTUTTTUUUUTDDTTU}UUTTTUUTTTTUTTTTTUUTDDTTUTTTTTUUTTDTTU@DDD@UUTDDDDDTTUPQQQPUUTTTTTTE@QQQPUUTTTUQQTQQUUTTTUUYjffjfUUjVje}jUUUjVYVjUUUeffjVUUUiejVjUUUiejfjUUUjVZYYUUUjfjfjUUUjfjVZUUUfffffUUUeeeUUUVUUYZUUUUUUZYYYZUUUeUUYYZYYUUUUUVVV}VVUUUdddTTUVUVVVUUTdTTTUVVUVVUUTTTTTUVVVVUUUTTdddTTUVVVUUUUTTdTTUVVVUUUUTddTTUUUVVVUUTTTTUVVVVVUUTddTT }UVVVVVUUTTdTTUjfffjUUTdddddTTUZYYYZUUTTTTTTejYYYZUUTTTUYYVYYUUTTTVZififiUfffPTddfififififfffddd!}dfififYVfffUdddTPUU@@PPTTUUUUTTPP@@UU"}x#}_$}t(H<*)(<%} (c)1983 Action Computer Services &} B JKIHiDiELV`L) ) BLV`L9*5*l L6* '} &` Fj`8冨凪` o*EӅӥ o*`ʆǪƩ Ɛee` *Ʀ(}ʆǢ &Ɛeǐ * *Lk* *'&&&8儨児祂*Lk*&&*ń8&&Lk* *)}`hihiHHȱȱLC*c !#3`L6*JJJJ`H C*h`Hȩ*}h *L+ *L+ )L+ )L+ )H8`HhHh +L+ BH+}I V䅠L+ L6, )L+Ԇ ؠPIPP` k,P )L+ ,LS, k,L, ,La,,}H- \,8塪墨hL, ,LS, ,La, k,ȹP`텠8堨塪 k,芨Oȩ-`PP -}.,P棩 Ѥģ0-ģ6000:,80H & &ehe&eģ0ʥ 8堅塅`.}$ U,&*i0:0i U,Ʀ`¢ 护°ڱ%ȱ%E U,L.担CS/} +L.I ,L.H -L. ,L. &B V +NLMȑ` MLN%B VL+S:.E:.H + 0}.. + +h)0I..L+[\ZUVT` ...` .Le, .L4, .LX,) 1}` .Le, *` 0d 6*ҥ `2)2ҩ`p`0)9/`@0)2}JJJJ)`Ѕ`ȱ`` /ȥ`HhƣĢ`ƥ3}Ĥ`Ѣ `0`ȱѢĦ`膡``ťƤe8夰Lv04} Ƥ8`ŦeѠe桊Lz0L00Ȍ000L100L0`L1})))Ѝ15}1)L:1Ȍ})1)LM1)1)L`1)`Lk1)L2d1c1c1d1L1c1d1L{1b1a1a1b6}1L)2b1a1 \*8宍g1d1c1c1g1 T/f1e1^e1f1L2e1f1L18c1c1d1d1c1 d1L1a17}b1L1 q/d1c1@c1d1LN2c1d1L42b1a1a1b1L2d1c18c1c1 T/f1e1^e1f1L2e18}f1L28c1c1d1d1c1I d1ILo2a1Јb1LV2 q/f1e1e1>f1L2e1f1L2`L3)( /4)9}3)( 0)5 /0i31i333)))) /5)(%0i2:}1i223222i32i33233L#423QL32323BQL423D;}2Т3L32i22i222`LT4 Q+E4E4m)E4F4m)F4E4iH4F4iI4F4K4E4J4H44I4<}44J44K4L@7J4ME4 K4MF4L5G4)0N4N4JJiN4G4)O4O4P4N4L4O4i;O4L5O4iO4F4M4E4L4 P4=}LU58P4 O4eO4L4M4O4L4M4L4M4O4iL|5L4M4O4L4M4L4M4L4M4L4M4>}N4L4M4L4M4N4iL4M4L4M4L,7J4MH4 K4MI4L6G4)0N4N4JJiN4N4IL6 N4G4)O4?}N4L36O4 *iKO4LP6O4 *i O4K4M4J4L4L4M4L4M4L4M4N4L4@}M4L4M4N4iL4M4L4M4O4L4M4L4M4O4iL,7K4M4J4L4J4i6K4i76L47M4L7L4A}M4L4M4L6L4M4J4i(J4K4iK4L4`LH74()) h1A74A7L7A7L}7A7A7(L7A7B}L78A7 eA7(L7A7(L78A7 eA7(L78A7'0eA7(A7L]7A7dA7L.84 A/iB74 A/iC7C}B7MC7L7B7(D7C7(B7(D7C7(A7L7 h1`L98ܮ(( /2828L8828 *(eD}(e2828LM82828L9283838L9838 *m28i(e(e((4E}( 0:(38L828L8(584828x28L9(m28(im2838(m38(ii(m38(i3F}8385848 Q448i4858i5828i28L&9 (3838 Q4 (i (u)y)`L9(( /pԩƍ(ЩxqG})q)ЩKЌ Э/99 99/oЌ))Ȍ99Le:)m9)i(e(e9(9L,:99H}G99L:(m9(m9~99Lo:`L::::m)::m):::::::g::::I}h::::h::::h::::i:i$::i:::j::::kJ}::::k::::k::::l:i$::i:::j::::k:K}:::k::::k::::l:i$::i:::j::::k:::L}:k::::k::::l:i$::i:::m::::n::::M}n::::n::::o`L====I =ILJ=(LG=== :L=8=򅮭=N} *==(m=(m=ѮL=== :`L=(L=`y)L=8u)u)u) u)L=u)y)L=u)iu)uO})(L=(u)y)u)(== Q4`L>>>8>򅮭> * > >(m >(m >m >P} >m >> >i> >i> >>>>>>>>L>(m>(m>ѮL>L>>>L> >>>>L>L> ERRQ}OR>Щ +`>)>) >Ȍ >5)>>>> >$?>%?$?>%?>L?(m>(m> >5)5) > >(R}m >(m >8(m>(m>>Г>L?>m) >>m) > >> >> >iX? >i??>?>L(@>>S}> >>i?>i?? >?>L@ >> >>L?>i(>>i>L?(m >(m >ѮLY@(m >T}(m >>> =`Lq@d@c@c@I d@ILPAd@)c@)c@m)c@d@m)d@5)u)( 6)d@i@c@h@c@iU}@d@i@@h@@i@LFAi@m@h@l@h@iAi@iAAl@Am@L2Al@m@l@m@LAh@i(h@i@ii@L@V} =L/D8c@򅮭d@ *f@g@(mf@(mg@f@qh@g@ii@d@)c@)5)(mh@(mi@ 6)W}(mf@(mg@88h@h@i@i@(mf@(mg@LBc@m)c@d@m)d@d@i@c@h@c@iEBd@iFBEBh@FBi@X}LBi@m@h@l@h@iuBi@ivBuBl@vBm@LBl@m@l@m@LdBh@i(h@i@ii@L4BL/D(mh@(mi@Y}LBd@c@ =L/De@f@ij@g@ik@h@Ci@CCj@Ck@L,C(mj@(mk@ѮL!Ce@j@k@LB8e@j@k@Z}(k@j@ *j@k@j@mc@j@k@md@k@(mh@(mi@e@j@m)h@k@m)i@j@i܅k@im)Cm)CCh@[}Ci@L#Di@m@h@l@h@iCi@iCCl@Cm@LDl@m@l@m@LCh@i(h@i@ii@LCe@k@j@ Q4`\}L7DM͚))LEq)HL[D1D0DLDq)\LrD1D0DLDq)pLD1D(0DLDq)ɄLD1D<0DLDq)ɘLD1DP]}0DLDq)ɬLD1Dd0DLDq)LD1Dx0DLD`(m0D(m1DLE`)G)LENq)LE`LF)G)LXE^}0q)LQE( (LGE` n@LUE =`LFM͚))LF)V)LFq)HLE >LFq)\LE >LFq)pLE_} >LFq)ɄLE >LFq)ɘLE >LFq)ɬLE >LFq)LF >LF`LFU͚))LFq)HL)F n@L`}Fq)\L=F n@LFq)pLQF n@LFq)ɄLeF n@LFq)ɘLyF n@LFq)ɬLF n@LFq)LF n@LF`LFa}`)1D)0D)iF)iFF0DF1DLG(m0D(m1D80D)1D)ii(0DЬ1DLF`b}L/GGG8G򅮭G *&G'GGM) GM)LH G(m&G(m'Gm&Gm'Gi(Gic})G(m&G(m'Gi(m&G(m'Gm&G*Gm'G+G(m*G(m+G6))G(G'G%G&G$G*G!H+G"H!H$G"H%Gd}LRH(m$G(m%GѮLGH(G)G$G%GLH8(G)G( *mG(GmG)G6)!G!G)G(G Q4e}LK(m&G(m'GL!I6))I LI(m&G(m'G5)&Gi'Gi(e(e6)6)!G!GGG Q4 Gf}LI GLK(m&G(m'Gm&G(Gm'G)G(m(G(m)G!G!G)0"G6))0#G G"G LI#G"GLK#G LKg}!G)"G6))#G8"G"G"GM#GLK(m&G(m'Gi(m&G(m'Gm&G*Gm'G+G(m*G(m+G6))G(Gq}B%DOS SYSB*)DUP SYSB SAUTORUN SYSB_HELP DOCBoCIPHER BASB{SOLITAREOBJBHHEXAPAWNBASBlENUMERATBASB%RAGAIN BASBWwHANGMAN BAS'G%G&G$G*G8J+G9J8J$G9J%GLiJ(m$G(m%GѮL^J(G)G$G%GL'J8(G)G( *r}mG(GmG)G6)!G!G)G(G Q4)I )ILK8)򅮭) *(G)G(m(G(m)Gm(G$Gm)G%s}G+G*G)G'G(G&G$G:K%G;K:K&G;K'GLkK(m&G(m'GѮL`K*G+G&G'GL)K*G+GLK GLK Gt}LK G G`LKKK5)ILKKK ,GKLO8K򅮭K *KKKM) KM)LLu}K(mK(mKmKKmKKKȌK5)FLFL͛KKLLKmKKmK(e(eK5)(mK(mKv}iK5)K8KK( *KeKKeKKKK Q4KKL6LLO(mK(mKLM6)w})I LM(mK(mK5)KȌK5)>M>M͛KKLMKmKKmK(e(eK5)8KKx}( *mKKmKKK5)KKKK Q4KKL.MKLMKLO(mK(mKmKKmKK(mKy}(mKKK)0K6))0KKK L,N͚K͙KLOK LOK)K6))K8KKKMKLO(mK(mKz}m5)KKKKKKKNKNN͛KNKLN(mK(mKѮLNKKKKLN(KK *{}mKKmKKKȌK5)&O&O͛KKLOKmKKmK(e(eK5)K5)KKKK Q4Ki(K|}KiKKКKLOKK`LOO)G)LRNq)LR5)LO`6)OO)0JJJJ}} *i OO)0JJJJOOOO *iOiOO)ILP(mO(mOOiO~}i(e(eOOO Q4)L8Q(mO(mOmOOmOO(mO(mOiOOMOLP`OO}(mO(mOO(mO(mOiOO Q4))I4L3Q)L8Q))I )ILQQOLQ8)򅮭)} *OO(mO(mOmOOmOOOOOOOQQ͎OLQ(mO(iѮLQOOOL}Q͙OOLQOLQOLR)G)L8R)I )IL"R`u)(OO Q4LRq)HLQR KOLRq)\LjR} KOLRq)pLR KOLRq)ɄLR KOLRq)ɘLR KOLRq)ɬLR KOLRq)LR} KOLR`OILR`OOOILS`͐OLT)I )IL)T8(u)Omu)(imu)(iii}O 0(OO(8(((LS((LS8u)u)u)LSu) =L&Tm)Om)OOOOiSS͍O}L&TOOOOiSS͝OOLTOOOOLSOi(OLSLT8)򅮭) *OO}(mO(mOѮLT(mO(mOmOOmOO(mO(mO (mO(mOOO)) Q4}(( /( /O͎OL8U3)mO4)iO()mO)i(e(eO(OLT5)`LHU }/?U /@U@ULU).)LUq)LU)5)LU OLU 4D /@U@ULUDUȌCUCUDULUCUDUL}U?ULU?ULUq)q)LUȍq)q)РM?UL0V?U L0V8q)q)q)0L&V0q)q)РM?UI?UI ?UI }LCW8))))M))LV(( /))BUȌAUAUBULV)mAU)mBU(e(eAU(}AUBULVLCW)BU)AU)iW)iWWAUWBULCW(mAU(mBUAUiBUi(e(eAUгB}ULV?UI ?UI ?UILTXM͚))LW(( /)⍚)BUȌAUAUBULW)mAU)mBU(e(e}AU(AUBULWLLX)iAU)iBUDUCUCUDULLX(mAU(mBU8AUBU(e(e8AUAU}BUBUCUЦDULW))BUȌAU)zX){XzXAU{XBULXAUBULiX`(LX) /LX}X} +LX X +LX X +LX X +LX X +LY  X +L9Y } Y +LdY  YC +LY  Yn +LY  } Y +LY  Y +LZ  Y +L;Z  } Z +LfZ ZE +LZ Zp + .LZ Ente}r in cursor speedZ +  .LZ 0=fast 9=Slow ? Z + 5-X .L[ Z +  .L>[} [& +X Lv[Xd *de)e)Ly[LZ .L[ Do you want to hear[ + } .L[ the shuffling? Y/N [ +X , .L[ [ +  .L\ \} +͈XL>\XIYL>\)`LL\0iG\1iH\G\H\F\E\E\iF\iЦ / .L\ } / / s//q / / //\ +L\ / / / / / / //\ +L] p///r / / / / //\ +L.] /} / / / / //] +LU] / p//r p/r/ //]8 +L|] //]_ +L] } //] +L] / / / s//q /q / //] +L] / / / / / //q / pr] +L^ / / / / / /p/q/ } ] +L?^ / / / / / / p// sq^" +Lf^ p///r p//r / p/ pr^I + |`Lu^ . +L^K:^} + X 3q^q^L^3)mq^4)iq^()mq^)i(e(eq^(q^L^)) /)5 /}& .L_tt_ +& .L3_tt_0 + 9 E7 68 EU)LT_ I\Lz_ILa_ = 1)I )ILC_))L^``r}^& .L_tt_ +& .L3_tt_0 + 9 E7 68 EU)LT_ I\Lz_ILa_ = 1)I )ILC_))L^``rMN##MNPYKAATARIHUMANATAHBLCLPONCDECCCDCPBM@@} }@@ !"#}$%&;AB,9@@,9@ <@,;@,;@,;@ ,;@ ,;}@ ,;@ ,9@ ,9@,67AB,.#M +%6.By Martin Gardner;6.ȠŠؠРנMAR}@n-@8@;-@@"@A-H(L P ];@,n6. ||n}-@8@8;-@@"@A-H(L P ];@,n6.  v-@ @}0(PROGRAM CREATED BY B-@@X(Carl A. Bevingtone;@,v6.  y-@@%( SA}LEM, OHIO7-@@;(M-@@Q(c-@@ y(TRANSLATED BY AJZI-@A %+}7AR@I@'-@'( 123'-@@'( | | | |'-}@@'( | | | |'-@@'( 456'-@@'( | | | |'-@}@'( | | | |'-@@'( 789'-@@'( | | | |'-@@}'( | | | |'-@@ '( Q-@@"@+-@0(<-@A(E }Q6-A%i6-@ i(PThe game of HEXAPAWN is played on a 3X3 grid with three markers for each player.9(1}The markers are move in the same manner as chess:<(e($ A marker may be moved forward one@@K}p!( cell to an empty cell.F( A marker may be moved forwardp(% diagonally to the left or right to\,($ cap}ture an opponent's marker. TheY(( captured marker is taken out of play.\#@6-@#-@@7'"M67$}@ <$@ %@,.=:,Q"Z68,-^ r-@@ v"68<,-Jc"68<@,- D(" } ӠŠҠϠŠVAdAUc)@rk6-@ @((The game is won in three possible ways:} k(& By moving a marker to the opponentswT( side of the grid.T(3 By capturing all of the opponent's marke}rs.|zz(r By planning moves so that a point is reached in the game when the opponent is unable to move any marker's.};(.(" ӠŠҠϠŠ;)@c6-@ c(KAlthough the computer is programmed to ma}ke its different moves at random,ic([the computer will 'remember' how it losta game and will not try the same random move} again.f(i(5AR1(Enter your first name 5/AR@!6-@% / A$m-}@'( ΧӠ9-@'@K( ɧӠU A$]6.0e6.0m6.0-@@@}/-%@U68,-@&P:+%@,'@,Y ] i6-u6-6-6-?6-@} (!3-@@;(?!!!@ )!@ A&8,@A08,@}A:&@Ab A!@l!68,-@!68,-@4-@@ 06.=:@$A:,%}8,,4 -@@,&47$@ <$@ %@,,6- < 68@,-P:8,'B,<6-8,&}B$8@,68@,-P:'A,%%68@,-&A$8@,%%6-P:H:@,$@,%@}8,"@A` 06-P:8,'@,*6-8,&@$06-4+-@(@+(? ?>-@}A H!68,-@!68,-@R A!z?6-@ (!3-@@;(?}!!!@ )!@ A8,@A&&&"@*8,"@A &&&"@*8,"@}A &&&"@*8,"@A  A+68,-@!68,-@+ A!@ @A" }668@,$8@,$8@,"@'A#84-@@ 06.=:@$A:,%8,,4 B# 6-6-#}-@@#L,&47$@ <$@ %@,,6-V ~< 68@,-P:8,'B,<6-8,&B$8@},68@,-P:'A,%%68@,-&A$8@,%%6-P:H:@,$@,%@8,"@}A06-P:8,'@,*6-8,&@$06-+-@(@+(? ?-@A }'68,-@!68,-@'6- A!!@A#`($$"@*8,"@6A2$$"@}*8,"@A<$$"@*8,"@&AF$$"@*8,"@$AP$$"@"*8,"@5A}Z$$"@#*8,"@Ad!!"@)"@An APx`6-%@#-@2@((}:-@ @"V(ɠӠ٠` A$  A`?6-@ (!3-@@;(}?!!!@ )!@ AP8,@AP&&&"@*8,"@AP&&&"@*}8,"@AP&&&"@*8,"@AP AP!68,-@!68,-@+8@,$8@},"@,*+8@,$8@,$8@,$8@,$8@,$8@,$8@ ,"A(,A#@ A!@J} @A" r4-@@ 06.=:@$A:,%8,,4 |# 6-6-#-@$@7,&47$@ }<$@ %@,,6- < 68@,-P:8,'B,<6-8,&B$8@,68@,-P:'A,}%%68@,-&A$8@,%%6-P:H:@,$@,%@8,"@AP06-P:8,'@,*6}-8,&@$06-+-@(@+(? ?-@A &'68,-@!68,-@}'6-0 A!X!@A#`b$$"@4*8,"@A#pl$$"@5*8,"@5A#pv$$"@0}*8,"@$A#p$$"@1*8,"@&A#p$$"@2*8,"@5A#p$$"@3*8,"@}A#p?6-@ (!3-@@;(?!!!@ )!@ A8,@A}8,@A&@A* A!@4 A" \H-8<,8<@,$(@-8<},8<@,E(H$H-8<,8<@,$(@-8<,8<@,E(H$a6-%@#-@}@((:-@@"a(!ΠӠ٠ǠҠ68,-@<"@<68,-B%A}$8@,%8@,<"@<68,-B$8@,%A%8@,D"@D68,-B$8@},%A$8@,%@668@,%8@,%8@,"AA& A$  A!@. `6-%@}#-@@((:-@ @"V(ΠӠ٠` A"`8 k6-%@#-@2@((:-@}@"a(!ɠӠ٠ǠҠk A$ B n6-%@#-@2@((:-@@"d($}ɠӠ٠ǠΧӠn A$ j <-@@3-8<,8<@,8(< l <-@@}3-8<,8<@,8(< n <-@@ 3-8<,8<@,8(< p n-@@$(}GAME #6-@F('S MOVESX-@'@k( ATARI'S MOVESn$t Z6-%@%-@A)} 56-@9 K-@"@P(Z A` kk333122211,242536,333212121,143536,333221112,262514,233231122,265758,}332132221,245958,323312221,154736 kk323213122,351469,323321212,474899,323123212,696899,233132221,243658,332231122,261458,2}33212221,353699 kk332212122,141599,332121221,242526,233121122,242526,233311122,263599,332113221,152499,323122221,369999 }kk323221122,149999,233212122,353699,332212221,141599,323112212,153536,323211212,141535,322331222,475899 kk223133222,69589}9,232113222,246999,232311222,264799,223331222,475899,322133222,695899,232132222,245899 kk232231222,265899,223312222,473536},322213222,691514,322312222,471599,223213222,693599,223111222,359999 CC322111222,159999,14,1,18,1,22,1,14,4,18,4,22,4,14,7},18,7,22,7 F @2-@#',3/@97 C-F$( < 68@,-P:8,'B,<6-8,&B}$8@,2 68@,-P:'A,< %%68@,-&A$8@,F 68,-@P <"@<68,-B}%A$8@,%8@,Z <"@<68,-B$8@,%A%8@,d D"@D68,-B$}8@,%A$8@,%@n A$  D:HEXAPAWN,%A%8@,d D"@D68,-B$E4h}g9<ө ;9 `i-,0L8I@L8 ԭ } ,ʎ  LM)}@ ɰ )p u ) }𥰍  ) L8  ) L8  HHԭ l1))  )  } ԎЍЎL8 `((((@*A*B*i*)((?*h*)((C*j*'))}ii)i$iӥ)0()(*)*) )))*)*` 0 0 }0 F ?8jƥJǥJȩ űȱȱ˥ĩæŵ%̥̦ŕɤ8ffFFFFLv} ũ?кɑȥʑȥˑi(iƅDžȅȄL '0`褸 8… ņĥ}e… džƥ *$<  dž  U 8åɤ 8 ąȦ ŅȦ 8Åɥ} ƅȦ DžȦ  < 8 4.<*E  dž U 8丰L `=} i̤,8äiPL eèɈ. i 8PeɅ8ɨ `J) ȹ )}? & &)! ie `^+Q+&O&0f+ĭs+&d&S#  L ` ȱΩȱ}ϩiiiJΩL `lȊi e K K `˽ T˙ȩȄ | T}ҩ |ʩRn+8# | Tҩ | K `˄ K͢o 8 8ˍ  ̩ϩ 8eυ}ˍ  |i K Kͥeυˍ  ̢8̩ 8@ 8o ˠ ir Lm } P0 `y  ` 8@,) `˥ex8x MLd 8` ,` 8)ߍ``[UQLHD@<952}    8峩@ir! G _$0)L) ʈ䥳 G _$0 )PJJJJJL;)p ʈ`}Jj) e`BG!G燄&GCƆǠ8 8) 8 8`L#it 8䰐}Lʆqme8etLit eee }tttƹʦ  e8tt L]e& "tetƶة Lq8r}$0eL8庝rpiLL6膲L8Lpq sL6r}8峅qsУL8sp0 sL8sLQp0饳sLO`` )L)L)}ս`m,i-,Ƚtt 8< 8- 8@ >-@ 8 8,Ȣ 8 k,-i},- 800@Ԡ@ > 8@ > 1 *-},t 8,t@ 1,L m,L L,tL2 8 1 *-} 8,te@ 1,3/t$,ȩ 8 k-8-,tL  k 8 8 8j} 8@ >2 8 *< 8mL2 8 88 8 k}`@`,t- >`  ^` 8Ɗ ^Ʀ ^`  ư 8` 2 L9 `!C 8J }Ȍ 2")`ҩHHȈh h8`ޅ8!mtM@ 3 } . yՅ8!mt'  VL:  801i! 3 ! 8 }tʈL:} 80 B 8ȅ" $  " 8 " "M)d VL9} y @­"s @"e"ʎ"@"@"8"" V)? 3`  V`}`*+^8"@F𡤹m )?aɐ) a 0@FBa8 a8}4@+ɀƺ8@ȹ$Y Ȅ渤L 8 8 3ԭ`)?Oc8Lr},29.!"#$%&3%,%#4,%&42)'(4-/6% $/9/57!.4/&0,!93)$% 4/34!24/2c$5'%1$#{(! 204+0@   { }0/).430%2#)2#,%@ {.5-d%23@      ,%6%,d@,{2lqX4(%G{LlŠ,{2XqӠ9{.@Π9/52RԠ-9RԠG3 }RԠL3R@ΠG3R@ΠL3R#)2#,%)3%-049à%.$/&'!-%Ű%..5-%2%)'(4İȀ9/57)."90/).43G7).3"90/).43 }L7).3"90/).43 7%,,$/.%$6OYmx ?:*8(+#235!"#$%&,29.p҅ }oЩ]  - \L -%$ >@ 8 :  3C:0 G1u1  }Q V0Q V0 R V0 @ <{1 0D9 ҍ2;L}91 0V&.6V$.iV!.jV.V.V. V.C$V.(V..}V.U6V.?V .JV .lWV . iT.TS.GR.9Q.+P. }N. @M. =L. J. I.I.4GG.byG.,E .`D} .T D .$C.(B.,B.1 A.7 @.n? @.$H?.S?.b}>!.w>$.>&.]> (.0> +.c = .$>.0y(>.3H,>.561>.7}i7>.:??.!.CTw>$.ED>&.H3>(.J $0>,.R }>.V >.0O;.3QH>.5S6?.7Ti>.:V?.}L 2L 2ĺeeeåe…L+1ȥȥ c2 e      ?0`RԠ-9R?}ԠG3Ri`uH jТ<"/./g0 8ȩԠ 8@ԭ./ƍa80L L L L9L}LLyLF L LL L LL LP0L LkL L=L^L` 24<0088 M}88.ʚ@ԩ 3҅oЩ \>@ 8 : 8 88 N}8  V y)¢4@† 8 8¢ s 8@ <驓 0O}   ,') , y9 LdLP}L+L >.V >.0O;.3QH>.5x,x4xx x x;M x 9 L9Q}xL+L >.V >.0O;.3QH>.5x,x4xx x x;M x 9 L9RSBEGIROBOTIMWRONMUSICBLUESTUNTURTRNBOVETBAB@#@A A"A%"S}@@A3A 2 @" @ @ @@@@u@@@@"T}@v@Avoo 堲 庠ή"U}° ##***************************** ##٠Ԡέ̠ ##٠ŮŠҠ #"V}#ӠҠ͠ŠϠ##ŠĠӠԠΠŠ##ήӠŠ٠##ĠȠ"W}ŠҮ##ȠŠէŠԬś##ҠӠŠҠϠ##ŠԠƠӮŠנ##"X}ǠԠՠΠĠ##*****************************##BILL MCLACHLAN -TEL# 327-4649FOR THE ATARI USE"Y}RS GRP.##*****************************2 +@3--6-F:A`,%F:Aa,$AV%@5%@@"Z}6)-@@%%@) 7+%@@+%@@8)-@@"%%@"[}) 9E%@#@e.%@$F:A`,E%@%F:Aa,F3@@3(@ play it again"\}d6-n6-A o6-A"p6-A%s##@@K:x7@@!6-@"]}-6-@7 A9@P,9@,*-@@P&68,-* -@@" "^}68,- 182,144,91,60,47%%6-P:@$H:@,%@,Q6-$@&@%6-@16-@M0@"_}$@P@Q ,b"28,@@.6-@u2 @6-%@b2"`}6O@@'-@@ =(@ O@@@68,-8,T6-@6-@ "a}l-@#@@5-@@Z(@ versuch &@ l@@ A0Q"b}8,"8,6-@'6-@-6-C6-$@&@G Q A@ T"28,@@.6-@P"c}2 T2#6-@6-@ #  ^@@'-@@L(@"d} versuch &@ ^@@!6-A %&-@(S@@'-@@ "e}A(@  S@@+-@@,g8,"8,+0@$@P@76-@"f}C6-@Y6-$@&@] g A`- 0T"28,@@.6-@u2 T2"g}X6-@6-@ l %"@6-% A A""ҠŠ"h}Y ,/%@&@5/%@%@C,%@Y/%@%@"@$,%"i}@'/%@&@=/%@&@K/%@ a/%@ %@w/%@%@/%@"j}%@/%@ %@"@$,%@&@//%@&@E/%@%@[/%@"k}%@q/%@%@/%@%@/%@%@ /%@%@ "@$"l},%@$%@//%@ %@E/%@ %@[/%@"&@q/%@#&@/%@#"m}%@"@$,%@0&@//%@'&@E/%@'%@[/%@)%@q/%@0"n}%@/%@0%@/%@)%@E/%@(%@//%@'%@E/%@'%@"o}$C-%@%,&@3/%@7 C6-@ A%$@$-@"p}   $ k-AACAC;2@@@W2@@c6-@ug k  G%2@"q}G2 %6-%@%"@A%P 0@@@"r} x@@'-@@H(@ T6-AX j-@@x(@"s} /0@@@/@@ 6-@ ' AI :@@'-@@:(@"t}pech  f-@@6(@DRUECKE EINE TASTE H-@@f(@FUER NEUES SPIEL )@"u}@% A% DAdAU")@D+ @I,%+!@S,A0 &6-&@H#Ad"v}AU&$D:AGAIN2x.@GAAU")@D+ @I,%+!@S,A0 &6-&@H#Ad ,&O 9=7OcDJ&&K&L&ʩ * d5I&&&© 1 -L*I&˜ ' 4&0& 1&& *L&x}*& & 1 -& & 1 - - *`RUNTIME ERROR AT LINE &&Lr*+ +L&` '&y}& &L&PROGRAM STOPPED&&Ńł ȱ`iL'HH 1*L/ r* . 1 + '. . . &z}1 . ' 1 + . 'hhL.ʥ`HHhh`8L'u&{}`Huh` Lr*L' Lr*L' ) . ( . ' r* .Lo* )&|} . ' , ( . ' + ' r* ' + 1 , . o*Lr* ) ' ' , ( . ' + ' r* ' + &}}1 , . (( . o*Lo* ' 1* '.L/` ) r* .L. ) . . + ' . ' ,L' ) ' ,&~} ' . + 'L'J&K&L& ) 1 1,L&eJ&iK&`L&8LM& . '.&}L&`ʔȱȱȱ 1*Șe惠 惨6,*6-* L*HHhh``&}`Lo*ʱ` ** &JL&J *HHl JLw TO BOOT FOR DOS&} TO RERUNp B V8+` +ȱLr*&&8558凅刐SJj)ee`ф&}фiiL#+8L#+ LM&uuuLr*8` +Lr*iLr*豂Hȱ&}h`p +Lr*+H+ BHI+ 4 -h`8` ,L, ,#` ,0 ,0L, ,0&}` ,0L,L,`޵` `Ȕ`ʔ惥u`&}+ BHI DEH 4 -HyhLo* + -`+JJJJ`d-+e- +- c-0 c-Lr* J-Lr*&}` f-H J-h 0 c-`L+8 0ƅ`66&Ln-HH` B VhH)Kh)0 IJD-EB 4hLr*S:+Lr*&}TUVLo* -`++L+ -8ɰɅ +`ʱȱȱ`ȵȵLr*Lr* '. . .ʥ&} . . '. .L3 '. . . . 1*uȱuȱu W* 1* .0 @,L3 ȱLr* T,L.ʵ&}`eeLM&HHhh`ؐHH 1*L/ r*HH . .6 +i i&} .i i .hh . . 'hh .`HH 1*% r*HH 1L'/ 1* '. LM& .6 + &}. +` 1* '.ޠ . 1 +L/  o*Lr*H+ B Vh` ҵ  o*Lo*H+BHI 4+h+L1 g&}0+KJBD0EH 4h o*Lr* r* '.0Ɔ򩛙0` -H`B 4h`00&}L1Lr*Lr* +`H o*hL11HH eHHƆeiH '.lꦆ 1Օ`0  &}L,`8`|1rd-1e- (- 10|1L1|10|1`1 r* '.1 1`+6-1L180&}1LM& + 1 . 1 1 ++ 1 +Ɔʭ1 +`ʕ`66`HHH66666u&}uuhhhLr* +愵 ' + 'I 1 280/66&&&`&}uuu` 2 2Ј 2 o* +`@32@2 .22222 LM&ȥ2i&}223`L*32 3`LM&2@82ƅ3 ȱ222` w3L?33L?3H3 2h`&}1+ %  88L3 o* o*` o* o*`  o* o*` 3$' 3"0 &}30 !4L, 4L, 4L,L1L14 1 '. .4444`H+? ++HI4D44E4B 4H&}4h` VLM&4` D44 14α44 1L4 D44LM&44, α44ﭯ4 148e44α4 &}11L1  'Lr*hh iLr* (5L2 (5L*42&&ȱ0 5Lw5 555&&}& L5&&`i`J&&K&L&` +ȱ&&%8e慱HȱhױL&&}iJ&iK&Lr*+ BH Vh 1LW*+&BH 4hN 1 W*L 1MLW*+%BNLMH 4hLo*)}*1*N&}*W*v*11+,J2+,a,s,@,/,T,9,H,),**++++,,-------6.c./x///2:3}10000)///0090.444(4!4440&D'@(&}f(()))V)4440T5\5A1+1d5355&(6@6j6S1d 9e(9fy9g9C:::$;"x;,|;-;6;J;On>>>>>?0?j??? @!F@"}@#@$@&)A'tA(A)B*hB0&}B1B8B9C:SCDCICNCODP"DX&D]_D`D`DDEUEE'FFFFdGG:HHHjII >J J &}JKsKK =L%L* M/sM4M9*N:N;N<SOOOOOOO&} R9Jֳ By Brian Oliva (C)1983 by Oliva Computer ServicesMCom&}piled using copyrighted software of Monarch Data Systems-Cochituate MA@Distributed by North Shore A.M.I.S. Lynn.&} MA 617-595-0211(*PUBLIC DOMAIN PROGRAM - NOT FOR SALE*\PROGRAM UTILIZES 345 WORD VOCABULARY (115 WORDS AT&} EACH OF 3 LEVELS) LEVEL 1 = EASY 2 = INTERMEDIATE 3 = EXPERTYOU LOSE ON THE 8th MISTA&}KE!8@8@8@8@8@8-A?8ENTER LEVEL OF PLAY (1-3)8HI88 8 x;,&}8 8s;,88s8  8A8A8A8A;88;$81A;%Q&} 3!LM;$8#8>;%388D/8;$88D/8DB;%}8D888ENTER&} YOUR GUESS8GAI8D8D=<D8D/<8D IS NOT THE WORD!889*8;$8D888&}F=<8888DC8;%8D8D=$=D}8D8T=88 8T=8b=88D/&}8DB USED LETTERS: 8D8=h8LLLLLLLL..!82K> ;$88#z8&}>88;%!\j;$8?#8K>;%:*!hQS;$8>#8>;%;$T8#p8>;%T#\>&}T#]>T#^>:*h!a=#e=#d=>d5>b5>b=>a4#e4>`3#f3>:*h!2+ ;$_8#g8>;%`*&}#f*>:*h^,#[/>]1>!^2#:*h!h,#k/>i1>!h2#:*h!c)#c(>a(>_&>_ >`>f>g >g&}&>e(>d(>a#e>c##^##]$#^%#h##i$#h%#!c$#a"#e"#a%#b&#d&>e%#:*h!]i;$8#&}8?>;%.0;$[8#\8#j8#k8#;%!h#h(>!c0#c/>a/>_->_(>`'>f'>g(>g->e/>d/>a&}&#e&>a)#b)#d)#e)#c+#b-#d->^*#]+#^,#h*#i+#h,#!a1#e1>`f;$82#89>;%_3#^4>^&}9>g3#h4>h9>!h:#^:#!`:#f:>a;#e;>c<#b<#bD>aE>d<#dD>eE>٠Ϡՠ̠Ϡ&}Š THE WORD WAS 8DA8wA$8y829*wA%8[89*89*828*88&}*8*828*8[829*8H9*8<89*8H8d9*8[9*8y89*89*9*8[82&}9*89*9*829*88L9*8Q9*9*8[9*9*8`829*8 88 [ 8289&}*8B0Xy 29*[ 29*H 2889*88 +8 29*2 988&}9*8 9+;$<  289*2;%d  28<9*2+  A InE!" &} 8D;$88 288 89*82D2PN;%PLAY AGAIN (Y/N)&}8GAIO.K.8DY=_DD>BUMP,DUMMY,FEED,FENCE,GENTLE,SHIRT,DRESS,SHOE,SLIPPER,SNOWBALLDEdAPPLE,BUS,FROG,GIRL,B&}OYS,CANDY,SUN,SON,CRAYON,QUICK,FISH,UNCLE,MOTHER,AUNT,ANT,YELLOW,BLUE,GREEN,REDEUEAPICTURE,SPRING,SUMMER,WINTER,LUNCH,TOAST&},MARKER,MAGIC,LIFT,SISTERXEEiTEN,ONE,TWO,THREE,FOUR,FIVE,SIX,EIGHT,EGGS,LONG,LITTLE,SHORT,BABY,DOLL,FIRE,TRUCK,CAR,SEVEN,NI&}NE,LADY,MANE'F]CHASE,FROSTY,FUNNY,CLOWN,DINNER,BREAKFAST,GIANT,GOOSE,DUCK,GRADE,SCHOOL,SING,SONG,TREE,FRIEND*FFfSEE,SEA,S&}HELL,TRAIN,BUG,MOUSE,PENCIL,GRAPE,FARM,TIGER,BANK,BAT,CAT,DOG,PUPPY,BAD,GOOD,MUST,HOUSE,SMELLFF_MEAT,CALL,THINK,LINE,WORD,&}FOX,BOX,SOX,DIG,PIG,COW,BULL,HORSE,BIRD,SEED,BIG,LITTLE,YES,SOME,NONEFdGfTELEPHONE,TELEVISION,AUTOMOTIVE,QUIET,QUICKLY,SHAP&}E,GLASSES,POLICE,HOTEL,WITCH,RAPID,ZEBRA,BRAIN,RADIOgGGhALARM,CANISTER,CASHIER,FERMENT,GENERATION,VOTE,VOICE,VAULT,UGLY,XYL&}OPHONE,METAPHOR,PSALM,PUBERTY,PYRAMIDG:HbLIPSTICK,ELEPHANT,VIOLET,PRAYER,LOOKING,FARMER,PERSON,MEMORIAL,FILTHY,JACKASS,SIMP&}LE,WATER,PANCAKE=HHPFIREWORKS,FIREARMS,GHOUL,INFANT,KNUCKLE,LUSCIOUS,MARGINAL,ORPHAN,ORNAMENT,PYTHONHHgTHIRTY,SILK,GOODN&}ESS,GARDEN,FLOWER,VACUUM,DICTIONARY,EDITION,GRANITE,EMPIRE,CONSTITUTION,COTTON,CRACKERIjIgAMUSEMENT,APPOINTMENT,BASEBALL,BO&}GGLE,COLONY,FRAGRANCE,FRIENDSHIP,FURNITURE,GRADUATE,GRADUATION,JEWELRYmIIiMOUNTAIN,CENTENNIAL,SYSTEM,TREASURE,SILVER,RALLY,&}VALLEY,CANYON,ENGLISH,FANTASTIC,FAINTEST,ANSWER,WITHDRAWI>J_SOCIETY,LIQUID,WORSHIP,SEVERE,AFTERNOON,RETURN,EMPTY,GINGER,HUM&}AN,HEART,VOLUNTEER,DEPART,CHARGEAJJhRECORDER,SERVICE,PROGRAM,TOUCH,FEELINGS,SOFTNESS,HARDNESS,WHOLE,PRINT,PRICE,STEAM,SOUND&},LOUDNESS,TRICKLEJKaCHINCHILLA,CONSEQUENCE,DEMENTED,DEROGATE,THEARCHY,ZODIAC,UNPRECEDENTED,ALGOPHOBIA,XENOGAMY,YOGURTKsK&}ZEMBRYO,EMULSION,FERACIOUS,GREGARIOUS,ZITHER,ZEALOUS,VASECTOMY,UKULELE,TELEKINESIS,POIGNANTvKKaNUMERABLE,OBNOXIOUS,OBEDIENT&},GEOLOGY,GENTLEMEN,DIVIDEND,AGRICULTURAL,ATTEMPT,LABORATORY,LIMOUSINEK=L]GALAXY,GHASTLY,GROMMET,GROGGERY,KNURL,LUBRICATOR,M&}AIZE,MANTILLA,MASTERPIECE,NONREPRESENTATIVE@LLaLIMERICK,NECESSITY,REPREHEND,SCRABBLE,TRIANGLE,TRESPASS,VOLANT,WRAITH,POVERT&}Y,INSTABILITY,YARDAGEL M`AMPHITHEATER,ANALOGUE,APPENDICITIS,DEPRAVITY,ELECTROCUTE,FRATERNITY,FRAUDULENT,GALACTIC,GRACIOUS M&}sMcQUASAR,ALACRITY,AGHAST,AMPLITUDE,ANNIVERSARY,ANTITOXIN,BRAILLE,CELIBACY,CELLOPHANE,CIRCUMNAVIGATIONvMMDGYROCOMPASS,JELL&}YFISH,METALLURGY,PSYCHOPATH,PTERODACTYL,PYROTECHNICSM*NgQUESTIONNAIRE,RECEPTIVENESS,TETRAHEDRON,TRESHOLD,YEOMAN,CHURCHLINES&}S,INVALIDATE,SERRATION,SUBSTITUTABLE-NNgINTOXICATION,INTERMINGLING,BROTHERHOOD,GESTICULATION,COMPREHEND,MURMURED,ILLUSTRATE&},MERIDIAN,SINGULARLYNNLTRANSCENDENTALIST,AMBASSADOR,CONTEMPORARY,UNFALTERING,CONDESCEND,ATTENTIVELYNSOdREDUNDANCY,THEORY&},TEMPEST,FORENSIC,GYROSCOPE,ILLAUDABLE,IMMURE,INCOGNITO,INDIGNANT,LABORIOUS,XANTHICVOO'VIRIDESCENT,TRINOMIAL,SOFTWARE,HARDW&}AREO98 O$99OO%+&&}EO98 O$99OO%+&$