home *** CD-ROM | disk | FTP | other *** search
-
- THEIR FINEST HOUR
-
- THE BATTLE OF BRITAIN
-
- INTRODUCTION:
-
- Their Finest Hour:The Battle of Britain is a World War II air
-
- combat simulation that recreates the duel between the German
-
- Luftwaffe and British Royal Air Force waged in the skies above
-
- Britian from July to September 1940. When you play Their Finest
-
- Hour,you can fly for either the offensive-minded Germans or the
-
- defensive-minded British,and you can choose from a variety of
-
- Luftwaffe fighters,dive bombers,and medium bombers,or Royal Air
-
- Force (RAF) fighters.If you're a British pilot,you're defending
-
- your home country from an onslaught of Luftwaffe bomber and
-
- fighter attacks.If you're a German pilot or crew member,you're
-
- trying to knock the RAF out of the air,as well as bomb land and
-
- sea targets ,so that Operation Sea Lion-the invasion of England-
-
- can commence. Whichever side you choose-and I encourge you to
-
- play both-you'll experience a highly detailed,historically
-
- accurate recreation of those events from the summer of 1940,when
-
- the fate of the world was literally up in the air.
-
- In Their Finest Hour,you move through a series of menus to
-
- choose your missions and aircraft.You learn and practise the
-
- fundamentals of flying single-seat fighters,double-seat fighters
-
- and dive bombers,and medium bombers. Then you can continue on to
-
- Combat Flights,where you take part in missions based on ones
-
- actually flown during the Battle of Britain. To put yourself in
-
- the role-playing mood,you create a pilot or an entire crew,and
-
- keep track of their progress in a Combat Record. If you're good
-
- enough,you'll win medals and promotions;if you're not,you'll
-
- discover the true price of glory. For an additional
-
- challenge,you can fly in Campaign Missions,where you can
-
- actually change the historical outcome of the Battle of Britain.
-
- We've added a long list of extra features to make Their
-
- Finest Hour the richest,most varied game of its kind. For
-
- example,in those aircraft with more than one crew member,you can
-
- man all the positions,including bombardier,rear seat gunner,and
-
- any one of up to five medium bomber gun posts. With a special
-
- Replay Camera feature,you can "film" your combat action,then
-
- move to a special viewing room and watch your "movie" from a
-
- variety of different camera positons. Also,anytime during your
-
- mission,you can call up an In-Flight Map/Radio,which gives you
-
- detailed information about where you'll be flying and the
-
- targets you'll be attacking. And, for the ultimate challenge,you
-
- can actually create your own missions,and see if you can survive
-
- them.
-
- We could tell you more,but you're probably eager to climb
-
- into the cockpit right away. So keep a steady hand,and good
-
- hunting!
-
-
-
- GAME CONTROLLERS (MOUSE/JOYSTICK/KEYBOARD):
-
-
-
-
-
- In this manual,the word "controller" will be used to refer to
-
- your mouse,joystick,or keyboard cursor keys (arrow
-
- keys)."Controller buttons" will refer to the buttons on the
-
- mouse or joystick. If you're playing with a keyboard,there will
-
- be corresponding keyboard keys that will serve as controller
-
- buttons.
-
- To find out which controllers the program supports on your
-
- computer,please see section "Reference Card".
-
-
-
- ADJUSTING YOUR JOYSTICK:
-
- If you are using a joystick when you first start up the
-
- game,the program will ask you if you want to use it. Press the Y
-
- key if you're using a joystick,and the N key if you're using a
-
- different controller. If you press Y the program will walk you
-
- through a three-step joystick adjustment process:
-
- 1.First, center the joystick and click any joystick button.
-
- 2.Next,while holding the joystick in the top left corner,click
-
- any joystick button.
-
- 3.Finally,while holding the joystick in the lower right
-
- corner,click any button.
-
- You can adjust your joystick anytime during the game by
-
- pressing Alt-C.
-
-
-
- USING THE CONTROLLER TO SELECT FROM THE MENUS AND SCREENS:
-
- After you've loaded Their Finest Hour,you'll need to move
-
- through several menus that allow you to select missions,choose
-
- aircraft,keep track of Combat Records,and more. You'll also need
-
- to select icons on different screens throughout the program.
-
- Whenever you're at a menu or screen,you'll see a list of
-
- choices,or icons,along with a floating arrow. To make your
-
- selection, use your controller to move the arrow over the
-
- desired choice or icon,then click your controller button.
-
-
-
- MAIN MENU:
-
- When you get to the Main Menu,you'll see a box with a list of
-
- choices,surrounded by scenes from the Battle of Britian. On the
-
- left,Spitfires soar high above the English Channel,barrage
-
- balloons,radar installations,and the white cliffs of Dover. On
-
- the right,Stukas dive-bomb ships in the Channel while medium
-
- tech street
- gangs" ("Hacker, 18," 1989). These images have prompted calls
- for community and law enforcement vigilance (Conly and McEwen,
- 1990: 2) and for application of the Racketeer Influenced and Cor-
- rupt Organizations (RICO) Act to prosecute and control the "crim-
- inals" (Cooley, 1984). These images fail to distinguish under-
- ground "hobbyists," who may infringe on legal norms but have no
- intention of pillaging, from felonious predators, who use tech-
- nology to loot[2]. Such terminology provides a common stock of
- knowledge that formats interpretations of CU activity in ways
- pre-patterned as requiring social control to protect the common-
- weal (e.g., Altheide, 1985).
-
- As Hollinger and Lanza-Kaduce (1988: 119), Kane (1989), and
- Pfuhl (1987) observed, the stigmatization of hackers has emerged
- primarily through value-laden media depictions. When in 1990 a
- Cornell University graduate student inadvertently infected an in-
- ternational computer network by planting a self-reproducing "vi-
- rus," or "rogue program," the news media followed the story with
- considerable detail about the dangers of computer abuse (e.g.,
- Allman, 1990; Winter, 1988). Five years earlier, in May of 1983,
- a group of hackers known as "The 414's" received equal media at-
- tention when they broke into the computer system of the Sloan
- Kettering Cancer research center. Between these dramatic and a-
- typical events, the media have dramatized the dangers of computer
- renegades, and media anecdotes presented during Congressional
- legislative debates to curtail "computer abuse" dramatized the
- "computer hacking problem" (Hollinger and Lanza-Kaduce, 1988:
- 107). Although the accuracy and objectivity of the evidence has
-