More actions
m →Ships |
m Adding internal links Tags: Mobile edit Mobile web edit |
||
| (4 intermediate revisions by 2 users not shown) | |||
| Line 18: | Line 18: | ||
Number: | Number: | ||
* 1 means an adjacent node is a System Core, Utility Subsystem or Data Cache | * 1 means an adjacent node is a System Core, Utility Subsystem or Data Cache | ||
* 2, 3 and 4 | * 2, 3 and 4 mean the nearest System Core, Utility Subsystem or Data Cache is respectively 2, 3 and 4 nodes away | ||
* 5 means you are 5 or more nodes away from the nearest System Core, Utility Subsystem or Data Cache | * 5 means you are 5 or more nodes away from the nearest System Core, Utility Subsystem or Data Cache | ||
The numbers 1-5 don't tell you how distant you are from the nearest Defensive Subsystem. | The numbers 1-5 don't tell you how distant you are from the nearest Defensive Subsystem. | ||
Instead of being empty a node may contain: | Instead of being empty, a node may contain: | ||
* a [[#System Core|System Core]] | * a [[#System Core|System Core]] | ||
* a [[#Defensive Subsystems|Defensive Subsystem]] | * a [[#Defensive Subsystems|Defensive Subsystem]] | ||
| Line 79: | Line 79: | ||
When you click on the System Core or Defensive Subsystem your Virus will attack. Attacking is turn-based: | When you click on the System Core or Defensive Subsystem your Virus will attack. Attacking is turn-based: | ||
# your Virus attacks, lowering the System's Coherence by your Virus Strength and then | # your Virus attacks, lowering the System's Coherence by your Virus Strength; and then | ||
# the System Core or Defensive Subsystem retaliates if it survived the attack | # the System Core or Defensive Subsystem retaliates if it survived the attack. | ||
When you reduce the System's Coherence to 0, it is disabled and removed from the board. | When you reduce the System's Coherence to 0, it is disabled and removed from the board. | ||
You fail a hack when: | You fail a hack when: | ||
* your Virus Coherence reaches 0 | * your Virus Coherence reaches 0; or | ||
* | * the hacking window is closed for any reason such as moving too far away from the Container structure. | ||
If you fail the hack: | If you fail the hack: | ||
| Line 156: | Line 156: | ||
* {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | * {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | ||
** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ||
** Higher skill levels makes hacking Relic Site Container structures easier, with {{sk|Archaeology|V}} allowing you to use the powerful Relic Analyzer II module. Explorers should considering training Archaeology to V, especially if they intend to hack Relic Sites in NullSec or Wormholes. | ** Higher skill levels makes hacking Relic Site Container structures easier, with {{sk|Archaeology|V}} allowing you to use the powerful Relic Analyzer II module. Explorers should considering training Archaeology to V, especially if they intend to hack Relic Sites in [[System security|NullSec]] or [[Wormholes]]. | ||
* {{sk|Hacking|price=yes|mult=yes}}: Required skill for the use of Data Analyzer modules. Gives +10 Virus Coherence per level. | * {{sk|Hacking|price=yes|mult=yes}}: Required skill for the use of Data Analyzer modules. Gives +10 Virus Coherence per level. | ||
** ''A la'' Archaeology, Data Analyzers require Hacking, and open Container structures found in Data Sites, Chemical Labs and Ghost Sites. {{sk|Hacking|I}} has slightly higher requirements than Archaeology I, but make sure you get both skills, so that you can hack any sites you find. | ** ''A la'' Archaeology, Data Analyzers require Hacking, and open Container structures found in Data Sites, Chemical Labs and Ghost Sites. {{sk|Hacking|I}} has slightly higher requirements than Archaeology I, but make sure you get both skills, so that you can hack any sites you find. | ||
| Line 166: | Line 166: | ||
Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | ||
Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. The Navy Exploration frigate is a small upgrade with more defense and movement speed at the tradeoff of | Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. The Navy Exploration frigate is a small upgrade with more defense and movement speed at the tradeoff of greater cost. | ||
* {{sh|Magnate}} | * {{sh|Magnate}} / {{sh|Magnate Navy Issue}} | ||
* {{sh|Heron}} | * {{sh|Heron}} / {{sh|Heron Navy Issue}} | ||
* {{sh|Imicus}} | * {{sh|Imicus}} / {{sh|Imicus Navy Issue}} | ||
* {{sh|Probe}} | * {{sh|Probe}} / {{sh|Probe Fleet Issue}} | ||
Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | ||