Only one computer allowed per submap. Submap will require refactor to have container of computers, most likely using a point->computer map.
Rotation. Store x and y in each action/security regardless if needed, then rotate these points along with map/computer rotation. Leverage "get_submap_at(x, y, lx, ly)" and previous steps in rotation code to get correct coordinates for computer locations.
Show some estimate of change of succeeding at a hack.
Only one computer allowed per submap. Submap will require refactor to have container of computers, most likely using a point->computer map.Rotation. Store x and y in each action/security regardless if needed, then rotate these points along with map/computer rotation. Leverage "get_submap_at(x, y, lx, ly)" and previous steps in rotation code to get correct coordinates for computer locations.Show some estimate of change of succeeding at a hack.