More actions
Removed the Ghost Site term |
m →Ships |
||
| (14 intermediate revisions by 8 users not shown) | |||
| Line 1: | Line 1: | ||
{{Exploration links}} | {{Exploration links}} | ||
'''Hacking''' is used to access Container structures in [[ | '''Hacking''' is used to access Container structures in [[relic and data sites]], [[Combat sites#Chemical labs|chemical labs]] as well as mission given by Agents. | ||
== Hacking== | == Hacking == | ||
[[File: | [[File:Hacking Indications.png|400px|thumb|The hacking mini-game with systems indications.]] | ||
The goal of hacking is to '''find and disable the Container’s System Core'''. You do this by maneuvering a Virus through the board of nodes that represents the Container’s electronics. | The goal of hacking is to '''find and disable the Container’s System Core'''. You do this by maneuvering a Virus through the board of nodes that represents the Container’s electronics. | ||
Nodes are: | Nodes are: | ||
* | * {{Co|orange|orange}} if explored | ||
* | * {{Co|green|green}} if adjacent to explored nodes | ||
* gray if neither explored or adjacent to explored nodes | * gray if neither explored or adjacent to explored nodes | ||
Clicking on a | Clicking on a {{Co|green|green}} node will reveal its contents: if the node is empty, it will turn {{Co|orange|orange}} and allow you to further explore adjacent nodes. | ||
If the new node is empty it will briefly display a number between 1 and 5. The number is the distance to the nearest node with a System Core, Utility Subsystem or Data Cache. | If the new node is empty it will briefly display a number between 1 and 5. The number is the distance to the nearest node with a System Core, Utility Subsystem or Data Cache. | ||
| Line 24: | Line 24: | ||
Instead of being empty a node may contain: | Instead of being empty a node may contain: | ||
* a [[ | * a [[#System Core|System Core]] | ||
* a [[ | * a [[#Defensive Subsystems|Defensive Subsystem]] | ||
* a [[ | * a [[#Utility Subsystems|Utility Subsystem]] | ||
* a [[ | * a [[#Data Caches|Data Cache]] | ||
===System Core=== | === System Core === | ||
'''Finding and disabling the System Core is the goal of hacking.''' | '''Finding and disabling the System Core is the goal of hacking.''' | ||
{|class="wikitable" | {|class="wikitable" style="float: right; text-align: center;" | ||
|+ Difficult System Cores are defended by advanced Defensive Subsystems | |+ Difficult System Cores are defended by advanced Defensive Subsystems | ||
! scope="col | ! scope="col" | Difficulty | ||
! scope="col | ! scope="col" | System Core | ||
! scope="col | ! scope="col" | Firewall | ||
! scope="col | ! scope="col" | Anti-Virus | ||
! scope="col | ! scope="col" | Resto. Node | ||
! scope="col | ! scope="col" | Suppressor | ||
|- | |- | ||
| style="text-align: left;" | Very Easy | |||
| style="text-align: | | [[File:Core node very easy green.png]] | ||
| [[File:Firewall node easy.png]] | |||
| [[File:Antivirus node easy.png]] | |||
| [[image:Icon_large_red_x.png]] | |||
| [[image:Icon_large_red_x.png]] | |||
|- | |- | ||
| style="text-align: left;" | Easy | |||
| style="text-align: | | [[File:Core node easy green.png]] | ||
| [[File:Firewall_node.png]] | |||
| [[File:Antivirus node easy.png]] | |||
| [[image:Icon_large_red_x.png]] | |||
| [[image:Icon_large_red_x.png]] | |||
|- | |- | ||
| style="text-align: left;" | Medium | |||
| style="text-align: | | [[File:Core node_medium orange.png]] | ||
| [[File:Firewall node medium.png]] | |||
| [[File:Antivirus_node.png]] | |||
| [[File:Restorer_node.png]] | |||
| [[image:Icon_large_red_x.png]] | |||
|- | |- | ||
| style="text-align: left;" | Hard | |||
| style="text-align: | | [[File:Core node hard red.png]] | ||
| [[File:Firewall hard node.png]] | |||
| [[File:Antivirus hard node.png]] | |||
| [[File:Restorer node.png]] | |||
| [[File:Supressor node.png]] | |||
|} | |} | ||
| Line 93: | Line 93: | ||
* once a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle | * once a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle | ||
=== Defensive Subsystems === | |||
===Defensive Subsystems=== | |||
'''Defensive Subsystems prevent you from exploring adjacent nodes until they are disabled.''' | '''Defensive Subsystems prevent you from exploring adjacent nodes until they are disabled.''' | ||
{|class=wikitable | {|class="wikitable" | ||
|- | |- | ||
|[[File:Firewall_node.png]] | |[[File:Firewall_node.png]] | ||
|'''Firewalls''' have high Coherence and low Strength. | |'''Firewalls''' have high Coherence and low Strength. | ||
|- | |- | ||
|[[File:Antivirus_node.png]] | |[[File:Antivirus_node.png]] | ||
|'''Anti-Virus''' have low Coherence, but high Strength. | |'''Anti-Virus''' have low Coherence, but high Strength. | ||
|- | |- | ||
|[[File:Restorer_node.png]] | |[[File:Restorer_node.png]] | ||
|'''Restoration Nodes''' give 20 extra Coherence to a random Defensive Subsystem at the end of each turn. They are a high priority target. | |'''Restoration Nodes''' give 20 extra Coherence to a random Defensive Subsystem at the end of each turn. They are a high priority target. | ||
|- | |- | ||
|[[File:Supressor_node.png]] | |[[File:Supressor_node.png]] | ||
|'''Virus Suppressors''' lower your Virus Strength by 15. Your Virus Strength cannot go below 10. They are a high priority target. | |'''Virus Suppressors''' lower your Virus Strength by 15. Your Virus Strength cannot go below 10. They are a high priority target. | ||
|} | |} | ||
===Utility Subsystems=== | === Utility Subsystems === | ||
'''Utility Subsystems assist you in disabling the System Core and Defensive Subsystems. | '''Utility Subsystems''' assist you in disabling the System Core and Defensive Subsystems. | ||
When you click the Utility Subsystem it will be added to a free utility slot. | When you click the Utility Subsystem it will be added to a free utility slot. | ||
Activate the Utility Subsystem by clicking on it in your utility belt. The number of utility belt slots depends on your Analyzer module. | Activate the Utility Subsystem by clicking on it in your utility belt. They can also be activated by pressing the number keys "1", "2" etc. The number of utility belt slots depends on your Analyzer module. | ||
{|class=wikitable | {|class="wikitable" | ||
|- | |- | ||
|[[File:Self_repair2.png]] | |[[File:Self_repair2.png]] | ||
|'''Self Repairs''' increase your Virus Coherence by 5-10 each turn for the three turns. Use it immediately as your Virus doesn't have a maximum Coherence value. | |'''Self Repairs''' increase your Virus Coherence by 5-10 each turn for the three turns. Use it immediately as your Virus doesn't have a maximum Coherence value. | ||
|- | |- | ||
|[[File:Kernel_rot2.png]] | |[[File:Kernel_rot2.png]] | ||
|'''Kernel Rots''' reduce a System’s Coherence by 50%. Use it on high Coherence Systems. | |'''Kernel Rots''' reduce a System’s Coherence by 50%. Use it on high Coherence Systems. | ||
|- | |- | ||
|[[File:Polymorphic_shield.png]] | |[[File:Polymorphic_shield.png]] | ||
|'''Polymorphic Shields''' nullify the next two System attacks against your Virus. Use it before attacking high Strength Systems. | |'''Polymorphic Shields''' nullify the next two System attacks against your Virus. Use it before attacking high Strength Systems. | ||
|- | |- | ||
|[[File:Secondary_vector2.png]] | |[[File:Secondary_vector2.png]] | ||
|'''Secondary Vectors''' reduce a System’s Coherence by 20 each turn for three turns. Use it against a Suppressor Defensive Subsystem. | |'''Secondary Vectors''' reduce a System’s Coherence by 20 each turn for three turns. Use it against a Suppressor Defensive Subsystem. | ||
|} | |} | ||
===Data Caches=== | === Data Caches === | ||
{|class=wikitable | {|class="wikitable" | ||
|- | |- | ||
|[[File:Data cache2.png]] | |[[File:Data cache2.png]] | ||
|'''Data Caches''' can contain either a Defensive or Utility Subsystem. | |'''Data Caches''' can contain either a Defensive or Utility Subsystem. | ||
|} | |} | ||
| Line 157: | Line 154: | ||
== Skills == | == Skills == | ||
* {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | * {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | ||
** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ||
| Line 165: | Line 161: | ||
** Also like Archaeology, higher skill levels make hacking easier, and {{sk|Hacking|V}} will give you access to the Data Analyzer II module, which gives better bonuses, and is needed for Data Sites in NullSec or Wormholes. | ** Also like Archaeology, higher skill levels make hacking easier, and {{sk|Hacking|V}} will give you access to the Data Analyzer II module, which gives better bonuses, and is needed for Data Sites in NullSec or Wormholes. | ||
==Ships and equipment== | == Ships and equipment == | ||
===Ships=== | === Ships === | ||
Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | ||
Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. | Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. The Navy Exploration frigate is a small upgrade with more defense and movement speed at the tradeoff of greater cost. | ||
* {{sh|Magnate}} | * {{sh|Magnate}} / {{sh|Magnate Navy Issue}} | ||
* {{sh|Heron}} | * {{sh|Heron}} / {{sh|Heron Navy Issue}} | ||
* {{sh|Imicus}} | * {{sh|Imicus}} / {{sh|Imicus Navy Issue}} | ||
* {{sh|Probe}} | * {{sh|Probe}} / {{sh|Probe Fleet Issue}} | ||
Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | ||
| Line 183: | Line 179: | ||
* {{sh|Helios}} | * {{sh|Helios}} | ||
* {{sh|Cheetah}} | * {{sh|Cheetah}} | ||
* {{sh|Pacifier}} | |||
The [[Sisters of EVE]] faction ships all have a +10 bonus to Virus Strength, a 37.5% role bonus to scanning, and both the Astero and the Stratios can use a Covert Ops Cloaking Device II. They also get bonus to armor resists, energy turrets and drones making them capable combat crafts. They have lower skill requirements than Covert Operation ships, but they are more expensive than Covert Operation ships. | |||
* {{sh|Astero}} Frigate. (CPU is low, making it hard to fit an Expanded Probe Launcher.) | * {{sh|Astero}} Frigate. (CPU is low, making it hard to fit an Expanded Probe Launcher.) | ||
* {{sh|Stratios}} Cruiser. | * {{sh|Stratios}} Cruiser. | ||
* {{sh|Nestor}} Battleship. Role Bonus: 50% bonus to Core and Combat Scanner Probe strength. Cannot fit a Covert Ops Cloaking Device II. | * {{sh|Nestor}} Battleship. Role Bonus: 50% bonus to Core and Combat Scanner Probe strength. Cannot fit a Covert Ops Cloaking Device II. | ||
[[ | [[Strategic Cruisers|Strategic cruisers]] can be fitted with the '''Covert Reconfiguration''' subsystem that gives them 10% per level scan bonus, +10 Virus Strength, and the ability to use Covert Ops Cloaking Device II. Strategic cruisers are very expensive ships. | ||
* {{sh|Legion}} | * {{sh|Legion}} | ||
| Line 195: | Line 193: | ||
* {{sh|Proteus}} | * {{sh|Proteus}} | ||
* {{sh|Loki}} | * {{sh|Loki}} | ||
[[Society of Conscious Thought]] special edition frigate is given away yearly for capsuleer day events, making the price variable. | |||
===Ship equipment=== | * {{sh|Metamorphosis}} has a +10 bonus to virus strength, a 37.5% bonus to both Core Scanner Probe strength and deviation, and a +2 bonus to ship warp core strength and can use a Covert Ops Cloaking Device making it a very slippery exploration vessel. | ||
* {{sh|Sunesis}} / {{sh|Gnosis}} / {{sh|Praxis}} have a bonus to Core Scanner Probe strength but not virus strength. | |||
=== Ship equipment === | |||
Data Analyzer or Relic Analyzer allow you to hack Data and Relic Sites. There is no additional high, mid or low slot equipment to make hacking easier. | Data Analyzer or Relic Analyzer allow you to hack Data and Relic Sites. There is no additional high, mid or low slot equipment to make hacking easier. | ||
Full list of normally used scanning equipment: | Full list of normally used scanning equipment: | ||
{|class=wikitable style="width: | {|class="wikitable" style="max-width: 70em;" | ||
|- | |- | ||
|[[File:Icon data analyzer i.png|link=|]] | | [[File:Icon data analyzer i.png|link=|]] | ||
|'''Data Analyzers''' are used to hack [[ | | '''Data Analyzers''' are used to hack [[Relic and data sites|Data]] and [[Combat sites#Chemical Labs|Chemical Lab]] sites found while exploring. | ||
The T1 module has a base 40 Virus Coherence and 20 Strength, with the T2 Version has an additional +20 Virus Coherence (60 total) and +10 Virus Strength (30 total) | The T1 module has a base 40 Virus Coherence and 20 Strength, with the T2 Version has an additional +20 Virus Coherence (60 total) and +10 Virus Strength (30 total) | ||
|- | |- | ||
|[[File:Icon relic analyzer.png|link=|]] | | [[File:Icon relic analyzer.png|link=|]] | ||
|'''Relic Analyzers''' are only used to hack [[ | | '''Relic Analyzers''' are only used to hack [[Relic and data sites|Relic]] Sites | ||
The T1 module has a base 40 Virus Coherence and 20 Strength, with the T2 Version has an additional +20 Virus Coherence (60 total) and +10 Virus Strength (30 total) | The T1 module has a base 40 Virus Coherence and 20 Strength, with the T2 Version has an additional +20 Virus Coherence (60 total) and +10 Virus Strength (30 total) | ||
|- | |- | ||
|[[File:IntegratedAnalyzer.png|link=|]] | | [[File:IntegratedAnalyzer.png|link=|]] | ||
|'''Integrated Analyzers''' are modules that can hack both [[ | | '''Integrated Analyzers''' are modules that can hack both [[Relic and data sites|Data and Relic]] sites. They are more expensive then their specialized counterparts, have lower Virus Coherence and Strength, and smaller utility belt slots. | ||
Integrated Analyzers get bonus Coherence from both Archaeology and Hacking skills as well as rigs and implants. | Integrated Analyzers get bonus Coherence from both Archaeology and Hacking skills as well as rigs and implants. | ||
|- | |- | ||
|[[File:Icon rig CPU.png|link=|]] | | [[File:Icon rig CPU.png|link=|]] | ||
|'''Memetic Algorithm Bank''' rig increases the Virus Coherence of both Data and Integrated Analyzers. The T1 rig increases the Coherence by +10, and the T2 version increases it by +20. Due to Calibration size and ISK cost, it is more cost-effective to have two T1 rigs than one T2 rig. | | '''Memetic Algorithm Bank''' rig increases the Virus Coherence of both Data and Integrated Analyzers. The T1 rig increases the Coherence by +10, and the T2 version increases it by +20. Due to Calibration size and ISK cost, it is more cost-effective to have two T1 rigs than one T2 rig. | ||
|- | |- | ||
|[[File:Icon rig CPU.png|link=|]] | | [[File:Icon rig CPU.png|link=|]] | ||
|'''Emission Scope Sharpener''' rig increases the Virus Coherence of both Relic and Integrated Analyzers. The T1 rig increases the Coherence by +10, and the T2 version increases it by +20. Due to Calibration size and ISK cost, it is more cost-effective to have two T1 rigs than one T2 rig. | | '''Emission Scope Sharpener''' rig increases the Virus Coherence of both Relic and Integrated Analyzers. The T1 rig increases the Coherence by +10, and the T2 version increases it by +20. Due to Calibration size and ISK cost, it is more cost-effective to have two T1 rigs than one T2 rig. | ||
|} | |} | ||
| Line 232: | Line 234: | ||
The slot 9 implants that improve Virus Coherence and Strength. | The slot 9 implants that improve Virus Coherence and Strength. | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- style="background-color: var(--background-color-warning-subtle);" | ||
! Implant | |||
! | ! Effect | ||
|- | |- | ||
|Poteque 'Prospector' Archaeology AC-905 | | Poteque 'Prospector' Archaeology AC-905 | ||
| +5 Virus Coherence for Relic and Integrated Analyzers | | +5 Virus Coherence for Relic and Integrated Analyzers | ||
|- | |- | ||
|Poteque 'Prospector' Hacking HC-905 | | Poteque 'Prospector' Hacking HC-905 | ||
| +5 Virus Coherence for Data and Integrated Analyzers | | +5 Virus Coherence for Data and Integrated Analyzers | ||
|- | |- | ||
|Neural Lace 'Blackglass' Net Intrusion 920-40 | | Neural Lace 'Blackglass' Net Intrusion 920-40 | ||
| -40 Virus Coherence and +20 Virus Strength for Data and Integrated Analyzers | | -40 Virus Coherence and +20 Virus Strength for Data and Integrated Analyzers | ||
|} | |} | ||
| Line 251: | Line 253: | ||
The slot 10 EY-1005 implant improves Virus Coherence. | The slot 10 EY-1005 implant improves Virus Coherence. | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- style="background-color: var(--background-color-warning-subtle);" | ||
! Implant | |||
! | ! Effect | ||
|- | |- | ||
|Poteque 'Prospector' Environmental Analysis EY-1005 | | Poteque 'Prospector' Environmental Analysis EY-1005 | ||
| +5 coherence for Data, Relic and Integrated analyzers | | +5 coherence for Data, Relic and Integrated analyzers | ||
|} | |} | ||
| Line 268: | Line 270: | ||
* '''Use the 1-5 numbers to guide your movement''' around the board. For example, if you're approaching an edge or corner of the grid, and the number 5 shows up, then trying to explore anything towards that corner/edge is not useful, because you know that there cannot be anything good within 5 nodes. In general, you want to click in directions that make the numbers smaller. Because the numbers disappear as you move along, you need to remember where there were 5's, so you know which areas not to bother going back to later. | * '''Use the 1-5 numbers to guide your movement''' around the board. For example, if you're approaching an edge or corner of the grid, and the number 5 shows up, then trying to explore anything towards that corner/edge is not useful, because you know that there cannot be anything good within 5 nodes. In general, you want to click in directions that make the numbers smaller. Because the numbers disappear as you move along, you need to remember where there were 5's, so you know which areas not to bother going back to later. | ||
* '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | * '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | ||
* '''Rule of 8, or "Before 8 it's Bait"'''. The core is always placed at least 8 grid-spaces (including empty spaces) away from the starting point. If such placement is impossible, the core is placed randomly anywhere on the board. | |||
[[File:Image-ruleof8.png|thumb|442x442px|Rule of 8 in its simplest form]] | |||
[[Category:Exploration]] | [[Category:Exploration]] | ||