Flea++: Difference between revisions
From Halopedia, the Halo wiki
No edit summary |
m (Text replacement - "{{Ref/Sources}} [[" to "{{Ref/Sources}} [[") |
||
(6 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
{{ | {{Status|Apocrypha}} | ||
{{quote|I know a lot of people will never know or care about whether we use even a semi-rigorous kind of syntax: but for those people who do, I think we have a chance to tell a story, to talk to them in a way nobody has ever talked to them before.|Jim Stewartson<ref>'''[[i love bees]]''', DVD</ref>}} | {{quote|I know a lot of people will never know or care about whether we use even a semi-rigorous kind of syntax: but for those people who do, I think we have a chance to tell a story, to talk to them in a way nobody has ever talked to them before.|Jim Stewartson<ref>'''[[i love bees]]''', DVD</ref>}} | ||
'''Flea++''', as it has been named by ''Halo'' fans in reference to [[Wikipedia:C++|C++]], is a programming and command line syntax seen in the ''[[I love bees|I Love Bees]]'' alternate reality game. It is used by the [[System Peril Distributed Reflex|SPDR]] and the [[Seeker]] (aka "Pious Flea"). The former's use of the language may imply that the language is used in other [[United Nations Space Command|UNSC]] constructs. | '''Flea++''', as it has been named by ''Halo'' fans in reference to [[Wikipedia:C++|C++]], is a programming and command line syntax seen in the ''[[I love bees|I Love Bees]]'' alternate reality game. It is used by the [[System Peril Distributed Reflex|SPDR]] and the [[Seeker]] (aka "Pious Flea"). The former's use of the language may imply that the language is used in other [[United Nations Space Command|UNSC]] constructs. | ||
Line 6: | Line 6: | ||
The language includes several operators. An exclamation mark prefixed to a word indicates that the word is a command. An angle bracket (">") in the middle of a statement tends to denote a question or some uncertainty; two such brackets (">>") serve as a highly-context-sensitive operator denoting some association.<ref>[[Archive:Apocalypso Chat|Apocalypso Chat]]. <tt><Jim> the >> was more or less a catch-all for something highly associated with another thing</tt></ref> | The language includes several operators. An exclamation mark prefixed to a word indicates that the word is a command. An angle bracket (">") in the middle of a statement tends to denote a question or some uncertainty; two such brackets (">>") serve as a highly-context-sensitive operator denoting some association.<ref>[[Archive:Apocalypso Chat|Apocalypso Chat]]. <tt><Jim> the >> was more or less a catch-all for something highly associated with another thing</tt></ref> | ||
Note that some commands were used exclusively by the Seeker. Such commands may not be used by the | Note that some commands were used exclusively by the Seeker. Such commands may not be used by the UNSC. | ||
=== Keywords === | === Keywords === | ||
Line 12: | Line 12: | ||
;act<ref name="fulltext">http://www.thebruce.net/ilovebees/Fulltext_text.asp</ref> | ;act<ref name="fulltext">http://www.thebruce.net/ilovebees/Fulltext_text.asp</ref> | ||
: | :Action. | ||
;clean | ;clean | ||
:A contextual keyword that is typically used with <code>confidence</code> to indicate the success of a cleaning- or destruction-related operation. | :A contextual keyword that is typically used with <code>confidence</code> to indicate the success of a cleaning- or destruction-related operation. | ||
Line 23: | Line 23: | ||
;crypt strong<ref name="phase1">http://ilb.extrasonic.com/index.php/Phase_1_Computer_Code</ref> | ;crypt strong<ref name="phase1">http://ilb.extrasonic.com/index.php/Phase_1_Computer_Code</ref> | ||
:A keyword appended to the end of certain commands. It may indicate the usage of strong encryption. | :A keyword appended to the end of certain commands. It may indicate the usage of strong encryption. | ||
;crypt weak | ;crypt weak{{Ref/Reuse|phase1}} | ||
:A keyword appended to the end of certain commands. It may indicate the usage of weak encryption. | :A keyword appended to the end of certain commands. It may indicate the usage of weak encryption. | ||
;dmg | ;dmg | ||
Line 48: | Line 48: | ||
:The verb for [[Wikipedia:Recursion (computer science)|recursion]]. | :The verb for [[Wikipedia:Recursion (computer science)|recursion]]. | ||
;rogue proc | ;rogue proc | ||
:An unrecognized and suspicious process. This term has also been seen in the [[Terminal | :An unrecognized and suspicious process. This term has also been seen in the [[Terminal (Halo 3)|Terminal]]s, when [[Mendicant Bias]] attempts to redirect the player. | ||
;seq | ;seq | ||
:Sequence. | :Sequence. | ||
;si | ;si | ||
: | :Silicon.{{Ref/Reuse|phase1}} | ||
;success | ;success | ||
:Indicates that an operation or instruction has completed. It has also been used similarly to <code>true</code>, a keyword present in other programming languages. | :Indicates that an operation or instruction has completed. It has also been used similarly to <code>true</code>, a keyword present in other programming languages. | ||
Line 61: | Line 61: | ||
=== Commands and descriptors === | === Commands and descriptors === | ||
;!analyze | ;!analyze{{Ref/Reuse|phase1}} | ||
:A context-sensitive analysis command. | :A context-sensitive analysis command. | ||
;!attach ''<target>'' | ;!attach ''<target>'' | ||
Line 69: | Line 69: | ||
;!compare | ;!compare | ||
:compare, analyze | :compare, analyze | ||
;!config ''<target>'' | ;!config ''<target>'':''<command>''{{Ref/Reuse|phase1}} | ||
:Configures a target. | :Configures a target. | ||
;!diag | ;!diag | ||
Line 81: | Line 81: | ||
;!invoke | ;!invoke | ||
:appeal to, usually used in regards to the master command sector (see below) | :appeal to, usually used in regards to the master command sector (see below) | ||
;!kindle | ;!kindle{{Ref/Reuse|phase1}} | ||
: | :Start/restart/activate. | ||
;!label | ;!label | ||
:Assigns a name or identifier to a running process. | :Assigns a name or identifier to a running process. | ||
Line 88: | Line 88: | ||
:Seeker command. Teaches the Seeker's ideology of seeking, beholding, and revealing the truth. | :Seeker command. Teaches the Seeker's ideology of seeking, beholding, and revealing the truth. | ||
;!mat ''<unknown_1>'' ''<unknown_2>'' | ;!mat ''<unknown_1>'' ''<unknown_2>'' | ||
: | :Material. Identifies the type of material comprising ''<unknown_1>'' (which may be specified or implied). ''<unknown_2>'' is the result, often the <code>si</code> keyword. | ||
;!probe ''<target>'' | ;!probe ''<target>'' | ||
:Investigates an object specified with the ''<target>'' parameter. | :Investigates an object specified with the ''<target>'' parameter. | ||
Line 112: | Line 112: | ||
;msg: | ;msg: | ||
:Denotes a message. | :Denotes a message. | ||
;net: | |||
:Denotes a network command. | |||
;reveal: | ;reveal: | ||
:Seeker command. Refers to the communication of some data to another intelligence. | :Seeker command. Refers to the communication of some data to another intelligence. | ||
Line 151: | Line 153: | ||
== Sources == | == Sources == | ||
{{Ref/Sources}} | |||
[[Category:Languages]] | [[Category:Languages]] |
Latest revision as of 12:22, March 23, 2022
- "I know a lot of people will never know or care about whether we use even a semi-rigorous kind of syntax: but for those people who do, I think we have a chance to tell a story, to talk to them in a way nobody has ever talked to them before."
- — Jim Stewartson[1]
Flea++, as it has been named by Halo fans in reference to C++, is a programming and command line syntax seen in the I Love Bees alternate reality game. It is used by the SPDR and the Seeker (aka "Pious Flea"). The former's use of the language may imply that the language is used in other UNSC constructs.
Overview[edit]
The language includes several operators. An exclamation mark prefixed to a word indicates that the word is a command. An angle bracket (">") in the middle of a statement tends to denote a question or some uncertainty; two such brackets (">>") serve as a highly-context-sensitive operator denoting some association.[2]
Note that some commands were used exclusively by the Seeker. Such commands may not be used by the UNSC.
Keywords[edit]
The language has a large set of keywords, and makes use of various programming terms, which shall be explained here.
- act[3]
- Action.
- clean
- A contextual keyword that is typically used with
confidence
to indicate the success of a cleaning- or destruction-related operation. - clear
- A contextual keyword that may indicate safety or the completion of a command (particularly a destructive one).
- clone
- Copy.
- confidence <value>
- A keyword appended to the end of a result. It is typically used to indicate the success or estimated success of an operation. <value> is an integer. Known values are 100 (success), 22 (false-positive), 49 (failure to halt process), and 34 (not found).
- crypt strong[4]
- A keyword appended to the end of certain commands. It may indicate the usage of strong encryption.
- crypt weak[4]
- A keyword appended to the end of certain commands. It may indicate the usage of weak encryption.
- dmg
- An abbreviation for "damage".
- extern proc
- External process.
- fail
- Indicates that an operation or instruction has failed. It has also been used similarly to
false
, a keyword present in other programming languages. - frgm
- Fragment.
- Host sector ______ or ______ sector
- A keyword referring to the ______ sector of the host AI's core, where _____ is "tertiary", "secondary", or "primary".
- Invntry 117649
- Seeker-class AI.
- Master command sector
- A keyword referring to the host AI.
- mem
- Memory.
- null
null
refers to the absence of data. In some cases (such as the null character), it refers to zero.- process ("proc")
- A process is an instance of a running program. If, for example, two copies of the same program are running, then there is only one running program, but there are two running processes.
- recurse
- The verb for recursion.
- rogue proc
- An unrecognized and suspicious process. This term has also been seen in the Terminals, when Mendicant Bias attempts to redirect the player.
- seq
- Sequence.
- si
- Silicon.[4]
- success
- Indicates that an operation or instruction has completed. It has also been used similarly to
true
, a keyword present in other programming languages. - Vnum
- An abbreviation for "version number".
- unk
- A keyword. It is the abbreviation of "unknown".
Commands and descriptors[edit]
- !analyze[4]
- A context-sensitive analysis command.
- !attach <target>
- Apparently attaches the user to a target specified by the <target> parameter.
- !bite <process>
- Halts a running process.
- !compare
- compare, analyze
- !config <target>
- <command>[4]
- Configures a target.
- !diag
- diagnose
- !handshk
- Attempts to establish contact with something.
- !init <name> proc
- Seeker command. Initializes a process. <name> is a parameter; it may specify the new process's name.
- !invntry
- Catalogs, lists, or classifies a set of objects.
- !invoke
- appeal to, usually used in regards to the master command sector (see below)
- !kindle[4]
- Start/restart/activate.
- !label
- Assigns a name or identifier to a running process.
- !law
- Seeker command. Teaches the Seeker's ideology of seeking, beholding, and revealing the truth.
- !mat <unknown_1> <unknown_2>
- Material. Identifies the type of material comprising <unknown_1> (which may be specified or implied). <unknown_2> is the result, often the
si
keyword. - !probe <target>
- Investigates an object specified with the <target> parameter.
- !reconst
- Runs a low-level repair process. The command is an abbreviation of the word "reconstruct".
- !seek
- Seeker command. Looks for something, or to attempts to perform a task.
- !splotch
- destroyed
- !transmit <what>
- Seeker command. Transmits the data specified in the <what> parameter. This command appears to require initialization (via
!init
) before use. - !triage
- emergency repair process
- !verify
- ensure accuracy or truth
In addition to regular commands, there are also command descriptors. Command descriptors occupy their own line, and take the form of a single word with a colon appended to it. Command descriptors describe the commands that follow them.
- behold
- Seeker command. Refers to a discovery, realization, or sudden comprehension.
- grope
- Refers to the act of searching blindly or uncertainly.[5]
- msg
- Denotes a message.
- net
- Denotes a network command.
- reveal
- Seeker command. Refers to the communication of some data to another intelligence.
- surg
- Denotes repair or destroy commands. It is an apparent abbreviation of "surgery" or "surgical".
Code Examples[edit]
Here is a sample of Flea++ code, along with its fan-translated meaning. The code itself appears in an SPDR message announcing the Seeker's destruction. The sans-serif lines are commands used by the Seeker; the serif lines are the SPDR's commands.
grope:
seeker > !attach Princess
fail "msg: SPDR-5.14.3
evade evade evade
!probe extern proc 1
rogue proc
!bite rogue proc 1 recurse
clean !splotch confidence 100
And now, the line-by-line translation.
grope:
indicates that the next line is uncertain.- The
>
indicates that the statement is a question. So the statement means that the Seeker is asking if it can attach to the Sleeping Princess. fail
indicates that its request has been denied (here,fail
acts as the Booleanfalse
found in most human programming languages). The quotation mark indicates that a reason has been supplied; "msg:
" indicates that the reason takes the form of a message. The text of that message is simply "SPDR-5.14.3".evade evade evade
appears to be a Seeker command or keyword, and does not appear to have any effect.- In this line, the SPDR is investigating (
!probe
) "external process 1". "External process 1" is the Seeker -- the Seeker was unable to attach to the Sleeping Princess, and is thus running from outside the Princess's systems. - This next line is the result of the
!probe
command. "rogue proc
" means that External Process 1, a.k.a. the Seeker, is a rogue, or malicious, process. - In this line, the SPDR tries to terminate (
!bite
) the Seeker. The command's name ("bite") alludes to the SPDR's abbreviation, which resembles the word "spider". The keywordrecurse
likely indicates that the process used to "bite" the Seeker should run itself over and over until the Seeker is dead. - This line is the result of the
!bite
command. It indicates that the process has managed toclean
the system by killing (!splotch
) the Seeker. It further states that the SPDR is 100% confident that the Seeker is gone.
Another message from the Seeker, found on the hacked ilovebees website, contains this code:
!init transmit proc !transmit truth Princess friends>>seeker friends
In this code block, the Seeker starts a process for a transmission program, and then attempts to transmit the truth. (It can be assumed that truth
is a keyword or variable.) Furthermore, the Seeker makes an association, stating that the Sleeping Princess's friends are the Seeker's friends.
Sources[edit]
- ^ i love bees, DVD
- ^ Apocalypso Chat. <Jim> the >> was more or less a catch-all for something highly associated with another thing
- ^ http://www.thebruce.net/ilovebees/Fulltext_text.asp
- ^ a b c d e f http://ilb.extrasonic.com/index.php/Phase_1_Computer_Code
- ^ Dictionary.com: grope "to search blindly or uncertainly"