BACK TO HOME

Introduction (or, Why This Site Exists)
     The year was 2001. (Coincidence, huh?) I had just gotten a new computer from my dad, and I wanted to show off its power (Pentium III processor, TNT2 video card--dated now, but remember, this was 2001!). I came across a copy of System Shock 2 in the local game store, and I was interested. I had read about this game before, and it was apparently pretty good. So I picked it up.
     Needless to say, I was impressed. But something was missing--I really wanted to play the original. I had read dozens of magazine and internet articles, "Top 50" game lists, and memorials of sorts regarding System Shock. Everywhere I looked, praise was showered upon this game like confetti. I browsed some internet sites, and chatted on forums about it, and my interest grew even more. I had to play this game! Hah. If only it were that simple...
     Aside from the trials and tribulations of actually hunting down a copy of the game (more on that later), I had to deal with the fact that System Shock was the computer game equivalent of the Rosetta Stone--ancient. In other words, Shock featured outdated graphics, outdated sound, and required outdated computer specs. The graphics and sound I could deal with--hey, it's the gameplay that counts, right? The specs were a different problem. Shock could only run in DOS, and while I'd used DOS plenty of times in the past, I knew jack about the nuts and bolts of it. So you can imagine my frustration when I installed the game, tried to play it, and was hit with a billion error messages. Oh, goody.
     The next few weeks were spent trying to find solutions on the aforementioned message boards and lots of telephone calls. Apparently, I needed to fiddle with so many configurations, DOS modes, and memory settings that just getting Shock to play seemed like a challenge of Greek proportions. With help, however, I managed to get Shock up and running happily.
     I was feeling peachy, but then it hit me--what about all of the other folks like me? The ones who don't know very much about old operating systems or configurations? (I learned way more about Windows than I ever expected because of this sideshow.) What about the people like me, who don't really give a hoot about specifications and nitpicking and who just want to play the damn game already? Especially people who want to catch up on old classics, hassle-free?
     With these questions in my mind, I decided to create this little site. Hello. Now, you don't have to search the globe for answers and solutions. You want to play System Shock? Read on, and all the mysteries surrounding this excellent game will be solved. Good luck!

--Darryl Da Silva

What is System Shock?
     System Shock is a fantastic adventure game created in 1994 by Looking Glass Studios and Origin. It came out in the same year as Doom, and consequently was virtually ignored by just about everyone. Even though Shock was far ahead of Doom in terms of technology, the general gaming community flocked to the latter. One of the main reasons for this was that Doom was a pure shoot-em-up, while Shock was more of an adventure game. Nevertheless, Shock received glowing reviews from the press (those that actually acknowledged its existence, mind you), and now has become a cult classic. Nearly every computer game critic considers it one of the best ever made, and with the somewhat higher profile System Shock 2 (and its heavily hyped mod, The Shock Project), Shock is more widely known today than when it was first released.

What's so good about it?
     Pretty much everything! Take your pick--an excellent storyline, state-of-the-art (for its time) graphics, memorable characters...the list goes on. But the main feature that makes System Shock stand out is its innovative and unique gameplay. Basically, you play a hacker who has been fitted with a high-tech cybernetic interface. This means that you can collect some really cool gadgets--data readers, cyberspace jacks, 360° cameras--and just plug 'em into your head! This makes for some interesting playtime. Also, most of the game is spent picking up recorded logs and emails--these enhance the back story of the game as well as provide subtle hints as to what your next objectives are. Rather than have a screen pop up that says "Go to the red door and use the elevator!", you have to think a bit. The engineer's log says that there is a red door that takes you to the elevator, but the guy died before he could get to it. Maybe you should equip yourself for battle before heading for the door...This makes the game much more immersive, as you have to think for yourself and solve your own puzzles.
     Another unique aspect of gameplay is that certain enemies will react differently to the weapons you are using. In Doom, you could pick up a plasma gun and pretty much blow away everything in the game with no hassle. In System Shock, however, it's not that simple. A robot may not be affected by a stun gun, for example, but toss an EMP (sonic boom) grenade, and he short-circuits. The reverse is also true--a mutant won't flinch when hit with an EMP, but the stun gun knocks him out cold. This creates much more depth--should you hit the enemy with this weapon, or another one? Which would be more effective? These questions come into play very often, so you're always on your toes.
     But what I really love about System Shock is the incredible satisfaction it gives you. You wake up in the midst of chaos, disoriented and confused, terrified of the dangers around you. As you go through the game, you slowly but surely cripple the rampant AI, SHODAN, in every possible way. You eliminate her control and halt every aspect of her dastardly plans. It's immensely gratifying to watch her realize that she completely underestimated you--you're supposed to be dead, for crying out loud, just like the rest of the crew. This creates an incredible feeling of power and control for the player, and makes the ending all the more rewarding.

What's the basic plot?
     In 2072, Earth has colonized other planets and has created a highly advanced society. An excellent demonstration of mankind's high-tech civilization is the Citadel Space Station, a huge craft used for interstellar mining operations and research techniques. (So yeah, their mission is basically to "boldly go where no one has gone before", but give them a break). Created by the huge Tri-Optimum conglomerate, Citadel is an incredible piece of engineering and science merged together, and it needs the perfect security system--namely, the Sentient Hyper-Optimized Data Access Network, or SHODAN. This marvelous Artificial Intelligence is the brains of the station--she keeps everything under control. Or so they thought...
     You play as a hacker in New Atlanta, one of the Saturn colonies. One night, you tried to break into TriOp's protected files concerning Citadel, and TriOp security took you away in a hurry. The charges against you were severe, but Edward Diego, one of TriOp's bigwigs, made you a deal--hack into SHODAN and remove her ethical constraints, and the charges would be dropped. Plus, Eddie would give you a bonus prize--an R-grade military cyber interface. For a hacker like you, this is a very good thing. You happily agreed with Diego, blissfully unaware of the chaos that would soon follow.
     The healing coma after the operation takes 6 months aboard the Medical level of Citadel Station. You awaken, dazed and a bit confused, but the operation went well. Suddenly, you sense that there is something wrong. No one's home. The only signs of life are the servant robots, and they're attacking you. What's going on here? The robots are supposed to be harmless. Then, you receive an email from Rebecca Lansing, a TriOp counter-terrorist consultant. She tells you about a massive mutiny onboard the station, organized by (yup, you guessed it) SHODAN. This is bad. Very bad. Basically, with her ethical constraints removed (nice going, bud), she is "free to explore new possibilities". In other words, she's killed half the station crew and turned the rest into cyborgs. Her plan? The complete and total takeover of Earth, to be shaped in her glorious image--a world of human destruction and machine conquest. So if you don't stop her, the good ol' U S of A (along with the rest of the planet) is gonna seriously fry.
     Have fun.

What's the deal with SHODAN?
     Probably the coolest game villain ever, SHODAN is one evil mutha! The Sentient Hyper-Optimized Data Access Network (AI, in layman's terms) on board Citadel, SHODAN controls just about everything on the station. So when she goes berserk, you're in trouble. Fortunately, you can have a little fun with her, since she's quite different from other game villains. In most games, you play through levels upon levels, fighting bazillions of baddies and solving mind-numbing puzzles, until you reach the Big Boss Dude at the end. Beat him, and the game's over. Yay. Needless to say, this can be rather anti-climactic. (The prime example that comes to my mind is Fallout 2, an otherwise excellent role-playing game that gives you some Secret Service guy, whom you have no relation to whatsoever, as the final Big Boss. How terribly exciting.)
     What makes SHODAN different is that she's with you throughout the entire game. She can see you. She knows where you are. She watches you, taunts you, threatens you. She is everywhere and nowhere at the same time. Consequently, she becomes much more important to you than other game baddies. You want to see her when she realizes that you are much more than just some "insect", as she puts it. You want her to know that humans are better than machines, Terminator be damned!
     Not to mention the fact that she's totally psychotic and evil. Remember that scene from the movie 2001: A Space Odyssey, when the HAL 9000 computer kills two crew members and "takes over the mission"? Well, SHODAN is kinda like that, times about 200. Where HAL's tag line is "Sorry, Dave, I can't do that", SHODAN's is probably "Why do you resist my power, human? Join me, or you will learn more about pain than you ever wanted to know." Anyhoo, HAL is a crotchety old geezer compared to SHODAN.

Other Info
     In case you were wondering, System Shock falls into the genre of "cyberpunk". Basically, cyberpunk movies, books and other media usually take place in the future, where hackers abound and AI's are a way of life. The Net is supreme, and can bring either quick fortune or disastrous failure. Themes like "man versus machine" show up often. The System Shock Terminal Access manual (included on the CD-ROM) describes cyberpunk as:
     A science-fiction genre set in dark, futuristic worlds where information is a powerful commodity, cybernetic augmentation is commonly practiced, and computers are linked globally. The majority of the population lives in urban areas, and corporations hold great power, influencing governments. Biotech areas, such as genetics, have been refined. Rebellion against centralized authority is integral to the genre.

     Examples of cyberpunk media are books like William Gibson's Neuromancer; movies like The Matrix and Ghost in the Shell; and TV shows like...well, anything on the SciFi channel. (A word of warning: While Neuromancer is no doubt an excellent book, it's confusing as hell. So if you're planning on reading it, prepare to invest some time!)

     System Shock was designed by Looking Glass Studios and Origin, both now-defunct companies. Looking Glass also created the relatively popular Thief series. Most Role-Playing gamers know that Origin is responsible for the legendary Ultima series (Ultima Underworld I and II, in particular). The evil genius behind System Shock, Warren Spector, has since gone on to make more great games, including Deus Ex and its upcoming sequel. (I'm gonna wait for the PS2 version, though--I'm not sure my computer can handle it!) If you're a game fan, I urge you to buy the aforementioned games--they're some of the best (and smartest) ever made.

     System Shock 2 was produced by Looking Glass and developed by Irrational Games. You can tell there's a different developer, because unlike the colorful, "la-dee-da world" of System Shock, System Shock 2 is as scary as hell. Maybe it's because of the advanced technology (time heals all wounds, remember), but probably because Irrational has some of the craziest minds in the industry today. And I say that as a compliment.  :)

     The Shock Project is an upcoming unofficial Shock 2 mod created by Pangean Software. Pangean is a new company of programmers and artists, and TSP looks pretty cool so far. Check the Links section for the website.

FYI: If you were wondering what "Salt the Fries" means (a common diagnosis for Shock error messages)...I have no idea. Ask the aforementioned crazy programmers.

How does the gameplay work?
     In System Shock, you play a hacker who, while on board Citadel station, has been fitted with a neural cybernetic interface. This lets you access data on the net ("surf", in other words) like no one else on earth. Basically, you're the kid and the candy store is the Net. Okay?
     The cyber interface also allows you to use hardware, software, and lots of other goodies aboard Citadel. In order to stop SHODAN's evil conquest, you must make good use of your interface. Without the interface, you're just another human. And every other human on the station is dead. You get the idea.
     The interface has a variety of uses. You can read crew logs that are scattered aboard the station (providing key plot points and objectives), receive emails, and collect cyberspace data (more on that later). The interface also supports a variety of useful (and fun!) hardware attachments. Bio monitors, maps, inventory controls...the list goes on as you proceed through the game. Collect them all!
     Game controls are, well...a bit confusing at first. There are a lot of buttons to press, and that interface has a LOT of functions, but try not to get frustrated. After reading the manual (included on the CD-ROM--I don't know about the disk version, but there's probably one there too. And if not, hey! The information superhighway is there for a reason!), you should have a good idea of how to play the game. The manual is very big, and covers all aspects of gameplay.
     The best way to get used to the interface is through experimentation. Press a bunch of buttons, check out all of the hardware functions, see how everything works. The more you play the game, the more comfortable you will get with the interface. Trust me!

     Gameplay is from a first-person perspective (like most shooters). You can look up, down, side to side, around corners...just about everywhere! You can also crouch, lean, jump and crawl. (What can you do in Doom? Look side to side. Oh, and jump. Maybe.)
     Also different from most games is that there are no preconceived "levels". Citadel is one great big space station. This means that you can theoretically travel anywhere on the station, not just on the level. (I say "theoretically" because while you can go anywhere, some areas and floors are restricted until you get access.) This type of environment is known as a "constant world", because you can go back and forth between areas freely. For example, you could drop a rock on the floor in Medical, and if you come back 10 hours later it will still be there. This is quite cool (and, like most aspects of System Shock, way ahead of its time).
     System Shock is an adventure game. That means that as you go through the game, you will collect items upon items upon items upon items. And then some! These items come in all shapes and sizes, and many are helpful to your progress.
     WEAPONS: Things that kill people.
     AMMUNITION: Things that go in things that kill people.
     HARDWARE: Things that you can use with your interface.
     SOFTWARE: Things that you can use in cyberspace.
     ACCESS KEYS: Things that you can use to gain access to certain areas.
     DERMAL PATCHES: Things that go on your skin. These have a variety of uses--health restoration, combat enhancement, stamina raising, detoxification...you name it! (Otherwise known as drugs. You naughty person.)
     MISCELLANEOUS: Things that don't fit in the above categories. General items that have different uses.

What's the skinny on Citadel Station?
     The Citadel space station is a highly advanced research vessel orbiting Saturn. Its 10 levels include:
     LEVEL 1: Medical
     LEVEL 2: Research
     LEVEL 3: Maintenance
     LEVEL 4: Storage
     LEVEL 5: Flight Deck
     LEVEL 6: Crew Facilities and Suites
     LEVEL 7: Systems Engineering
     LEVEL 8: Security
     LEVEL 9: Bridge
     LEVEL R: Energy Systems

     Each level holds many useful features and areas. Citadel also has housed "groves", which are replicated earth environments. If you're feeling homesick, just take a stroll in one of the pleasant groves...yeah right, and get infected with the mutagen virus that SHODAN has been testing in those places and soon plans to use on the Earth. Thanks, but no thanks.
     Citadel is a huge place, and it's pretty easy to get lost. Don't worry, though. Many levels are centered around simple areas, and even with the endless corridors and bays, you can just use your map to find your way around. 
     SHODAN's lair is on the Bridge (Level 9). SHODAN's lair. Level 9. You have been warned.

What is cyberspace?
     Practically another game in itself, the cyberspace component of System Shock is extremely cool, and yet another example of Shock's distinction among other adventures. In short, cyberspace is a visual representation of computer data, spread out over "the Net" or "the Web". In System Shock, cyberspace is something of a psychedelic whirlpool of colors, shapes and streams. (Yes, I know it sounds like an acid trip, but hear me out.) Being a hacker, you know cyberspace quite well. And with your neural interface, you can "jack" or "punch deck" (dig the hacker lingo!) into cyberspace! Yeehaw! And your folks said you should have been a lawyer...
     Cyberspace can be a dangerous place, though, especially on Citadel. "Cyber watchdogs" patrol the station's cyberspace unit, and SHODAN has no intention of giving you free reign. You must jack in, collect the data, and jack out quickly, or SHODAN will detect your presence and rudely cut you off. 
     Each cyberspace terminal on the station covers a different area of the network. So you must visit different terminals to collect all of the data. And the data comes in many shapes and sizes. Here's a quick breakdown (from the manual) of all the objects you will find in cyberspace:

     Data Fragment.
The cyberspace equivalent of a scribbled note, this icon represents a scrap of information that can be read multiple times. Each time you collide with a data fragment, it transmits a brief message that is not stored. You’ll recognize them in cyberspace as large yellow squares surrounded by four small orange diamonds.
     Data Object. A data object copies itself upon contact into your personal data storage device (commonly a Multimedia Data Reader) and may be read later. Once you collide with one, you can access its data without running into it again. You’ll recognize data objects in cyberspace as spinning purple cubes.
     Infonode. This buoy-like marker imparts various pieces of information and sometimes explains the function of another nearby object, such as a toggle. Passing through an Information Node will scan it and provide data pertaining to the specific function of a related Switching Node. Infonodes appear as geometric signposts in cyberspace.
     Integrity Restorative.
This is a program that restores lost software integrity, or cyberspace health. It refreshes a user’s Net link integrity by filtering out noise and corrupt code. In cyberspace, IR modules appear as red crosses.
     Security ID Module. Security ID modules contain electronic access codes that let you open doors in the physical world. When you collide with one, you essentially copy the code into your interface. In cyberspace, security ID modules are equivalent to a specific access card and are symbolized by an orange wafer marked with three squares.
      
Switching Node. This cyberspace switch activates something in the real world, such as a locked door. Colliding with a toggle causes it to “flip.” Sometimes a message appears to explain what was affected in the world; other times it will simply indicate that a data state was changed. In this case, look for a nearby infonode to learn what the toggle activated.
       Navigational Arrow. These icons indicate the directional flow of data streams and are coordinated by the Net’s traffic orientation module. You’ll recognize them as yellow arrows in cyberspace.
       Exit Portal. Making contact with this system construct returns your sensory input to normal after a few seconds of disorientation. This is commonly followed by disappointment as users finds themselves once again in the physical world. Most cyberspace areas have two exits. It’s important to note their locations in case you need to hack your way out in a hurry. Portals appear in cyberspace as a ring of geometric wedges.

     Cyberspace isn't just fun and games, though. Here is a list of the defensive constructs you may encounter while surfing:

     Cortex Reaver.
Unlike most cyberspace watchdogs, the Cortex Reaver is not a security program. Instead, it’s a Net-active cyborg whose awareness is constantly split between the real world and cyberspace. Reaver intelligence is driven by the brain of an involuntary human puppet. Cortex reavers are capable of quickly frying a user’s link integrity, and of withstanding numerous attacks before crashing. They appear in cyberspace as red, fragmented faces.
     Cyberdog. This persistent program is one of the more common, less powerful cyberspace defenders. As it loses integrity, it begins to break up into fragments that are missing self-preservation instructions. A cyberdog fragment continues to attack until it has completely faded. In cyberspace, cyberdogs are constructed as symbolic representations of pit bull faces.
     Cyberguards.
A generic variety of autonomous security programs, cyberguards protect sensitive data storage areas. They vary in strength, but all are dangerously capable of destroying your Net link by firing bursts of projectile currents that quickly reduce your software integrity. You’ll recognize cyberguards without any problem — they appear as red and blue masks or ram-horned heads.
     Hunter-Killer. The Hunter-Killer routine is to the Net as the white blood cell is to the living body. Not assigned to any particular area within cyberspace, this security construct is designed specifically to seek out and attack unauthorized users.
     I.C.E. Barrier.
Intrusion Countermeasures Electronics are cyberspace security systems that serve as an electronic barrier to intruders trying to scam restricted data. These defensive barriers act to prevent unauthorized users from accessing the information or software protected within the I.C.E. Some I.C.E. walls are better than others. Older I.C.E. utilities can sometimes be bypassed by various forms of the Fake ID infiltration program. More recent I.C.E. constructs, once they have registered a Drill attack, can actually counter-attack the user.
     Security Mines.
Security mines have been placed throughout cyberspace by SHODAN to help defend against intruders. Protecting areas containing restricted information, Security Defense Mines cause you to lose Net link integrity when you collide with them. Keep alert for two parallel yellow squares linked at a center point.

     Yikes! That cyberspace is starting to sound pretty deadly. Never fear, however, for hackers such as yourself have valiantly created software programs to deal with pesky security. In cyberspace, softs (software programs) are the tools of the trade. An alert jockey can explore Citadel’s network and come by many of these during a cyberspace excursion. With these programs, you can elude cyberguards, penetrate defenses, and even combat SHODAN itself.
       Some softs and data fragments are protected by Intrusion Countermeasures Electronics (I.C.E.), a kind of cyberspace barrier. Seemingly harmless at first, it appears as a geometric growth around a cyberspace object, but any attempt to break through I.C.E. will result in a counterattack. You can blast through I.C.E. with a special software program called Drill (listed later in this section).
       All software programs in cyberspace appear as revolving cubes.

     Pulser Combat. This weapon transmits a focused burst of line trash that disrupts the integrity of any Net entity who gets in your way. The software prototype for the Pulser was developed by Yatsumora Cyberchannels Corp. in 2070.
     I.C.E. Drill.
Drills are specialized tools designed to cut through the defensive I.C.E. walls that sometimes surround limited access software. For years, hackers considered the I.C.E. protocol (adopted by the Corporate Computer Protection Conference) impregnable. But that was before the computer piracy gang RazorFinger developed a program that could dissolve the I.C.E. shield like a blowtorch cutting through ... ice.
    
Turbo Navigation Booster.
Drifting and skidding through the Net is fast enough in itself, but Turbo can double your speed. Exploiting a little-known bug in the operating system, Citadel’s system jockeys hacked up this useful package to maneuver against powerful data streams in the station’s cyberspace landscape. Basically, Turbo software gives you added velocity.
     Recall Escape. This one-shot program instantly rewrites a user’s address location to the point of Net entry. This is useful if you’ve lost most of your personal integrity and want to jack out before security finishes you off.
     Fake ID. Another one-use soft tool, this allows you to trick I.C.E. defense barriers into thinking you’re an authorized user with full access. BloodCat, one of the most notorious cyberspace thieves to ever ride the Net, used an early version of this routine to pass into the accounting node for the National Business Machines Corp. in ’70.
     Cybershield. These are programs which shield against attacks, preventing the loss of software integrity. This software gives the user limited protection against integrity loss by constantly scanning link integrity software and cycling through error correction routines. Its primary effect is to restore the code to an uncorrupted state.
     Decoy Evasion.
This one-use software tool generates a ghost image of you when you’re jacked in, which usually distracts security programs long enough for you to get away. No one knows for sure where it was made, but hackers think it came out of the infamous hacker underground of Bulgaria.

     Moving around in cyberspace is sorta like swimming, or playing Descent. Basically, it's a world of full 360° movement--no up, no down, just ride. (Yeah, dig it, baby.)
     It takes some getting used to, but maneuvering around cyberspace is quite strange and fun. Experiment with it, and you'll be an expert surfer in no time. Just remember that the entire planet Earth is counting on you (stupid Earth, always putting the pressure on...), so quit zoning out and get your job done!

Where can I find System Shock?
     A simple question deserves a simple answer, right? Well, this question doesn't have a simple answer. "At your local videogame store" would be great, but it would be a lie. As I've said before, System Shock is an old game. And most videogame stores don't stock old games. Sad but true. So, your only alternative is to hunt. Get out your binoculars, load up your buckshot, grab some bug spray and get ready to tackle the jungle of buying and selling!
     A great place to start is the almighty Internet. In fact, this is probably the best place to start. Check out auction sites like eBay and Yahoo! They regularly have people selling their copies of Shock. Do a search for auction sites and you'll find plenty of info, I promise.
     Game trading websites can also be potential gold mines. I found my copy of Shock at the (go figure) Game Trading Zone (www.gtz.com). Last time I checked, there were about 7 or 8 people selling Shock. If you do a thorough search, you're bound to find someone selling their copy. Just keep hunting! It didn't take me long, so it should be just as easy for you.
     When you find a seller (or sellers), pay attention to the item description. The original disk version of Shock was released in 1994; the enhanced CD-ROM edition was released in 1995. If you have a choice between the two, go with the CD version. It has better graphics and sound, and also includes the original disk version and the electronic manual. 
     There's also a secret file folder in TTLG that contains the CD and disk versions of Shock. Just go to the site (www.ttlg.com), go to the Shock message boards, and ask about it--they'll tell you. Keep in mind that the dowload is HUGE, so unless you're using cable or DSL, you're in for a loooooooong wait.

How do I install it?
NOTE: These instructions assume that you're using Windows 95, 98 or 2000. If you're not...well, there's always Scrabble.
  
If you have the CD-ROM version, just open up the drive that the CD is in (usually D:) and double-click on the "Install" icon. (The CD-ROM doesn't have an Auto-Run feature like most newer CDs, so you have to do it manually. Very user-friendly, this System Shock.)
     The disk version works the same way (at least to my knowledge). Just open up the drive, click the install icon, and you're ready to rock 'n roll!

     Once you've entered DOS mode, just select you're install options and go. After installing, you can play. Here comes the fun part...

Troubleshooting
     If you're using Windows to run System Shock, you're probably using a fairly recent system. This is bad. Well, at least when it comes to Shock. Remember when I mentioned the outdated system requirements for Shock? These come into play here. So if you start up the game after installing it and get hit by an error message, you're not alone. And there is a solution. So don't panic!
     NOTE: If you start up Shock and have no trouble at all, pat yourself on the back--you're one in a million!
     NOTE #2: These solutions worked on my computer, and mine is a fairly common system. However, all computers are different, and I strongly emphasize that these solutions may not work for your computer. They tend to work on most systems, but just to be safe, use these solutions at your own risk!

PROBLEM: When I start a new game, I get an message that says "Memory error code 3007" (or something similar).
SOLUTION: You aren't using enough memory for DOS. This is common in most new computers, and requires some simple tweaking in Windows.
     1. Run Windows. Find the MS-DOS prompt icon (usually on the Start menu, or on the desktop), and right-click on the icon. Click the "Properties" option, then click on the "Memory" tab.
     2. Go to the bottom option, labeled "MS-DOS protected-mode (DPMI) memory". Select the maximum value from the drop-down list.
     3. Run System Shock as usual.

PROBLEM: After playing, I close the MS-DOS window (or full screen) and my computer locks up.
SOLUTION: This is a really weird (but common) problem that I encountered. Once you are finished playing Shock, exit to the DOS prompt, then run the game again. Exit again, then you can close the DOS window (or full screen) without a lockup.

PROBLEM: My sound card won't play Soundblaster (or any other brand) music.
SOLUTION: Actually, I haven't heard anyone else complain about this problem. It just happened to me. Keep in mind that many sound cards have different specs, and there's not much you can do about it. I would talk to the manufacturer of your sound card (but then, they all tell you to do that, so I won't regurgitate).

PROBLEM: Rebecca Lansing's accent is driving me nuts!
SOLUTION: You're not alone.

Afterword
     Well, I sincerely hope that this site has helped you. If you're itching to play System Shock, do whatever you can to get your hands on it! You won't be disappointed.
    My thanks go out to all of the people on the TTLG message boards (check the Links section) for their help. They saved my sanity! I also want to thank Looking Glass for making such a fantastic game in the first place. Keep up the good work, no matter what companies you work for now!

    Thanks to everyone who's actually reading this! I hope this site helped. Good luck, and happy hacking!

 

--Darryl Da Silva

 

 

 

Links
     Here are some cool sites to visit for more System Shock info:

 

Through the Looking Glass
A fan site dedicated to Looking Glass Studios. Contains pictures, links, webrings, forums and more!
http://www.ttlg.com

System Shock 2: Official Website
Pretty self-explanatory. Contains fan works, news, pics, media, and lots of info. Part of TTLG.
http://www.sshock2.com

The Shock Project
Info site for the upcoming Shock 2 mod. Contains info on the mod, the programmers, artists, and more. Many of these guys are TTLG regulars!
http://pangeansoftware.com/tsp

     Hmmm...I can't think of any more! Seriously, these are just about the only sites you need. TTLG is huge, so you'll find plenty of info there. If you need more, just use your favorite search engine--there are quite a few Shock sites on the web nowadays.

 

BACK TO TOP