Top 10k strings from Afghan Attack (1984)(Southern Software).tzx in <root> / bin / z80 / software / Sinclair Spectrum Collection TOSEC.exe / Sinclair ZX Spectrum - Games / [TZX] /
Back to the directory listing
2 d;e?eReqexe}e
2 d'd.d5d>dJdVd]dddkdrd~d
1 |:h0|:hE|;
1 z-.'z-.8z-.Nz-.]z-.nz0'vz7
1 you will meet many friendly
1 words will be accepted. This is
1 words used in everyday English,
1 without complications.
1 with a character in any way, you
1 with Afghanistan.
1 will cause unwanted confusion."
1 whatsoever. Resemblance to any
1 very lucky that we could divide
1 ve)"ve-'ve.,ve.:ve/?vg
1 valued goods! If you think you
1 us in confidence, you will not
1 trouble torn Afghanistan, where
1 to attack."
1 to cover production, but don't
1 this is very easily overcome."
1 the invading Soviet army is in
1 the complexity of the problems
1 the camp in part one."
1 the Eastern road out of Kabul."
1 the program exactly in half
1 that you will find a little
1 story by Mark Phillips with the
1 special forces Commander.
1 sheet, a list of objects, and a
1 royalties? If yes to both these
1 rights, this material should not
1 reproduced, or resold without
1 questions, then send it to us
1 problem overcome. I have chosen
1 political or educational bearing
1 person, living or deceased,
1 p"# p"#*p"F4p$I;p&%Lp'(Yp(5mp)*|p+,
1 our prior permission."
1 or words used in the text."
1 only the first two recognised
1 on total fiction and holds no
1 on their North Western border
1 objects conveyable."
1 numbers of Soviet troops massing
1 must first state the name of the
1 may have acquired this program
1 known as ""verb, noun"" input, but
1 is purely coincidental."
1 in part two, you will lose
1 highly trained men to destroy
1 have played before."
1 go unrewarded. ""piRATes"" will be
1 give up too soon."
1 for evaluation."
1 five Officers, to be led by a
1 fifty British Paratroopers and
1 entertainment. The plot is based
1 encounter enemy troops who are
1 each word will be examined, and
1 due to the unlimited amount of
1 drastically over armed and ready
1 different from adventures you
1 designed as one program. We were
1 decide to send a crack force of
1 control of who is deployed, but
1 complex, modern day adventure
1 complex weapons. You will also
1 complete list of the vocabulary.
1 characters and must use various
1 character, and then the action."
1 can sometimes be the hardest
1 by the Pakistani leaders seeking"
1 by less than legal means contact
1 beware of over simplifying, this
1 been put to western Governments,
1 be given at the end of part one."
1 be dropped. This is not a burden
1 be copied, printed, hired,
1 and disrupt Soviet movement on
1 and Longfellow."
1 allies where you wish. Due to
1 aid of Gilsofts Quill Adventure
1 after intense negotiations they
1 a desperate battle with stubborn
1 _{:hi{:h~{:h
1 You will start part two North of
1 You will be this Commander!!
1 Would you like to earn 25%
1 This command will deploy your
1 The parts are loaded by typing-
1 TIME (T OR K) (PART 2).
1 Spectrum by Mark Phillips and
1 Southern Software welcome you to
1 Southern Software reserve all
1 Send us a stamp and a 20p piece
1 Sean Irksome-Brown, Elaine,
1 SEVERELY dealt with."
1 SERGEANT GRANT OPEN FIRE.
1 Richard Digby."
1 Paris to discuss the crisis and
1 PRESS ANY KEY TO LOAD PART 1.
1 PLAYING INSTRUCTIONS
1 PIC
1 PART 2
1 PART 1
1 OPEN FIRE.
1 Nick, Helen, Steve, Cheryl,
1 Mark's Mum and Mike,
1 LOAD ""2"" (for part two)
1 LOAD ""1"" (for part one)
1 LIEUTENANT TRAVIS ATTACK (....)
1 Ian, Linda, Shona,
1 INVENTORY (I).
1 INST
1 GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGAGGGGGGGGGGGGAAAAAAAGGGGGGGGGG
1 Follow Sinclair manual procedure
1 DISTRIBUTE."
1 DEPLOY GRANT.
1 Created with Ramsoft MakeTZX
1 CORPORAL MARSH FIRE BLOWPIPE.
1 Bilbo, Samuel, Tabatha, Timmy,
1 Andy's Mum and Dad,
1 Andrew Graham from the short
1 An entry code for part two, will
1 Afghan Attack
1 Afghan rebels. A request has
1 Afghan
1 AFGHAN ATTACK, a long, detailed,
1 =q0'@q0'Pq0'hq0'wq0'
1 2 i
1 1984 SOUTHERN SOFTWARE."
1 1984 SOUTHERN SOFTWARE.
1 1 i
1 0se 6se2Asg8Hsh
1 "intervention due to increasing
1 "You will not appreciate under
1 "When you wish to communicate
1 "This crack force will consist of
1 "This adventure is purely for
1 "The vocabulary of an adventure
1 "The adventure is set deep in
1 "The Western leaders meet in
1 "THANKS TO - Mum, Mike, Mac and
1 "Some items, once taken, cannot
1 "Some commands you will need onthis adventure are as follows.
1 "PRESS ANY KEY TO LOAD PART 1. "
1 "PERPETUAL DUSK IN THE NEW WORLD"
1 "Only the first four letters of
1 "On your adventure in Afghanistan
1 "On request we will supply a clue
1 "Have you written any Software?
1 "Afghan Attack, when written, was
1 "Afghan Attack was coded for the
1 " PRESS ANY KEY TO CONTINUE. "
1 " DEDICATED TO
1 " DEPLOY
1 "
1 SOUTHERN SOFTWARE
1 ____________"
1 _________ "