|This article may contain original research. Please improve it by verifying the claims made and adding references. Statements consisting only of original research may be removed. More details may be available on the talk page. (September 2007)|
Mission: Thunderbolt is a roguelike computer game with a futuristic storyline. It was originally developed and released on DEC mainframes as Doomsday 2000, a four-part game, and later ported to both Mac OS and Windows. Mission: Thunderbolt is part 1 of the Jaunt Trooper series and was released on both Mac OS and Windows. Part 2, Mission: Firestorm, was only released for Mac OS. The game was one of the first commercially released roguelikes. It put a graphical front end and a full set of sounds in place of the ASCII text traditional to roguelikes. It was also unique in the sheer number of actions/interactions possible. Being closed source, many mysteries of the game were never fully resolved.
The creation of this game began in late 1986 as a means for the author to learn the C programming language while working for DEC. It was developed under the VMS operating system on a DEC VAX mainframe computer; a VAX workstation was used in later years. The first version was released after nearly a year of development and testing to DEC employees world wide over the Internet in 1987; the author kept a large world map on the wall of his office and had a pushpin placed where ever a DEC office was known to have employees playing the game (there were lots of pins). Although titled Doomsday 2000, within DEC the game was known simply as Doom.
Doomsday 2000 was modeled along the lines of other popular mainframe computer games at the time, such as Rogue, Hack, and Larn, but was specifically designed to have much greater depth of game play and greater freedom with regard to interacting with the game world presented; these are aspects that set the game apart from all other mainframe games of that era. For example, you could bash down walls to gain access to otherwise seemingly inaccessible regions. One trick that was often used by players was to blow a hole in the floor above a particularly troublesome foe lurking on a lower level, then lob grenades through that hole to destroy the critter from relative safety, though some foes were clever enough to clamber up after the player character.
Another notable feature that was provided, and which may very well have been a first such instance for mainframe games, was the inclusion of special loadable bitmap fonts for various models of DEC's VT series video computer terminals. These fonts enabled the game to present actual little pictures of the monsters, loot items, and terrain features found in the game, instead of the simplistic number/letter representations (ASCII characters) used by other games at that time. So a "bat" was shown with the image of a stylized bat, instead of the letter B.
Doomsday 2000 was initially conceived of as a four part-game with interlinked stories, each part being a special "mission" for the heroic character (Captain Hazard) whose role people assumed within the game. Mission: Thunderbolt was the first of the missions, and it was the only mission in the 1987 release. This initial game was later expanded over time to also include Mission: Firestorm and Mission: Quicksilver. The fourth mission (Tsunami) never left the concept stage.
The second mission was subsequently released by the author himself for Mac OS as JauntTrooper, Mission: Firestorm by way of a hobby, rather than a commercial venture, as was a Windows version of the first mission, JauntTrooper, Mission: Thunderbolt.
[This section contributed by Dave S., Author of Mission: Thunderbolt, September 2007]
The world has been invaded by the alien race of the Zytts, and humans have created an underground resistance to overthrow them. In order to strike a vital blow against the invaders, the protagonist is sent to recover an anti-matter bomb that was stored in a military installation under the Appalachian Mountains.
The aliens however get there first and bring a lot of nasty creatures along with them to try and stop the human resistance from getting the anti-matter bomb.
There are sixteen regions in the game, plus twelve side levels called "Warrens" and two detention levels. Each time a new game was created, most of the levels are randomly generated, allowing for replayability.
During the game the player finds many different items that have various functions, such as wield, wear, throw, eat, open, close, activate, deactivate, etc. Some items have a use and some are completely useless, such as the "pile of entrails" and the "pile of rubble". Other items have a use but you must be creative in order to find their uses.
A unique feature in Mission: Thunderbolt is that at the start of each new game, the chances of acquiring different items is randomized, resulting in an item being exceedingly rare in one game and very common in another. The various creatures in the game were similarly randomized.
Throughout the adventure, the player character will find many devices that are originally called, "Strange Devices." These devices are identified later on as one discovers their uses. These items can be identified at a library or by discovering their nature through trial and error. This can be done by trying different things with the devices, such as wearing, activating, firing the item, etc.
The Light Globe is the first "Strange Device" found, usually on Level 2. This item will need to be charged with a power cell and then activated. The light globe will then give off extra light and illuminate the maze for several squares, allowing the player character to see things long before directly encountered.
Throughout the game one finds several other weapons and items to use in defense or to assist in progress through the levels of the game toward the goal at level 16.
Characters that complete the original mission can be imported into Mission: Firestorm, only available for Mac OS, despite Thunderbolt's release for the Windows platform as well.
- ↑ Lesser, Hartley, Patricia, and Kirk (January 1993). "The Role of Computers". Dragon (189): 57–62.