More actions
m →Ships |
Sivaira Chen (talk | contribs) Categories of difficulty where each Utility Subsystem can appear |
||
| (8 intermediate revisions by 3 users not shown) | |||
| Line 18: | Line 18: | ||
Number: | Number: | ||
* 1 means an adjacent node is a System Core, Utility Subsystem or Data Cache | * 1 means an adjacent node is a System Core, Utility Subsystem or Data Cache | ||
* 2, 3 and 4 | * 2, 3 and 4 mean the nearest System Core, Utility Subsystem or Data Cache is respectively 2, 3 and 4 nodes away | ||
* 5 means you are 5 or more nodes away from the nearest System Core, Utility Subsystem or Data Cache | * 5 means you are 5 or more nodes away from the nearest System Core, Utility Subsystem or Data Cache | ||
The numbers 1-5 don't tell you how distant you are from the nearest Defensive Subsystem. | The numbers 1-5 don't tell you how distant you are from the nearest Defensive Subsystem. | ||
Instead of being empty a node may contain: | Instead of being empty, a node may contain: | ||
* a [[#System Core|System Core]] | * a [[#System Core|System Core]] | ||
* a [[#Defensive Subsystems|Defensive Subsystem]] | * a [[#Defensive Subsystems|Defensive Subsystem]] | ||
| Line 37: | Line 37: | ||
! scope="col" | System Core | ! scope="col" | System Core | ||
! scope="col" | Firewall | ! scope="col" | Firewall | ||
! scope="col" | Anti-Virus | ! scope="col" | Anti-Virus <ref>The Antivirus in Very Easy and Easy hacks can only appear from opening Data Caches.</ref> | ||
! scope="col" | Resto. Node | ! scope="col" | Resto. Node | ||
! scope="col" | Suppressor | ! scope="col" | Suppressor | ||
| Line 72: | Line 72: | ||
| [[File:Restorer node.png]] | | [[File:Restorer node.png]] | ||
| [[File:Supressor node.png]] | | [[File:Supressor node.png]] | ||
|- | |||
| style="text-align: left;" | Hardest <ref>Only present in specific [[Upwell structures]] or the [[AEGIS Capital Ship Security Facility]]</ref> | |||
| [[File:Core_hardest.png|59px]] | |||
| [[File:Firewall_hardest.png|59px]] | |||
| [[File:Antivirus_hardest.png|59px]] | |||
| [[File:Restorer_node_hardest.png|59px]] | |||
| [[File:Suppressor_hardest.png|59px]] | |||
|} | |} | ||
<small><references> | |||
</references></small> | |||
System Cores, Defensive Subsystems and your Virus have: | System Cores, Defensive Subsystems and your Virus have: | ||
| Line 79: | Line 89: | ||
When you click on the System Core or Defensive Subsystem your Virus will attack. Attacking is turn-based: | When you click on the System Core or Defensive Subsystem your Virus will attack. Attacking is turn-based: | ||
# your Virus attacks, lowering the System's Coherence by your Virus Strength and then | # your Virus attacks, lowering the System's Coherence by your Virus Strength; and then | ||
# the System Core or Defensive Subsystem retaliates if it survived the attack | # the System Core or Defensive Subsystem retaliates if it survived the attack. | ||
When you reduce the System's Coherence to 0, it is disabled and removed from the board. | When you reduce the System's Coherence to 0, it is disabled and removed from the board. | ||
| Line 86: | Line 96: | ||
You fail a hack when: | You fail a hack when: | ||
* your Virus Coherence reaches 0 | * your Virus Coherence reaches 0 | ||
* | * the hacking window is closed for any reason, such as moving too far away from the Container structure or initiating warp during an active hack. | ||
If you fail the hack: | If you fail the hack: | ||
* twice a Data or Relic Site Container structure will be destroyed | * twice, a Data or Relic Site Container structure will be destroyed (with a few exceptions, such as the Storage Depots in Sleeper Caches) | ||
* once a Covert Research Facility Container structure will be destroyed and deal a large amount of damage to all ships in range | * once, a Covert Research Facility Container structure will be destroyed and deal a large amount of explosive damage to all ships in range | ||
* once a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle | * once, a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle. Specific information can be found on the respective Sleeper Cache pages. | ||
* once, any hackable container in the [[Observatory Infiltration]] site will activate lockdown | |||
* once, the [[AEGIS Capital Ship Security Facility|AEGIS Encrypted Key Storage]] will spawn a hostile response fleet. | |||
=== Defensive Subsystems === | === Defensive Subsystems === | ||
| Line 107: | Line 119: | ||
|- | |- | ||
|[[File:Restorer_node.png]] | |[[File:Restorer_node.png]] | ||
|'''Restoration Nodes''' give 20 extra Coherence to a random Defensive Subsystem at the end of each turn. They are a high priority target. | |'''Restoration Nodes''' give 20 extra Coherence to a random Defensive Subsystem at the end of each turn (though never to the System Core). They are a high priority target. | ||
|- | |- | ||
| Line 125: | Line 137: | ||
|- | |- | ||
|[[File:Self_repair2.png]] | |[[File:Self_repair2.png]] | ||
|'''Self Repairs''' increase your Virus Coherence by 5-10 each turn for the three turns. Use it immediately as your Virus doesn't have a maximum Coherence value. | |'''Self Repairs''' increase your Virus Coherence by 5-10 each turn for the three turns. Use it immediately as your Virus doesn't have a maximum Coherence value. Appears in all categories of hacking difficulty. | ||
|- | |- | ||
| Line 140: | Line 152: | ||
|} | |} | ||
'''Self Repairs''' appears in all categories of hacking difficulty. | |||
'''Kernel Rot''' only appears in <span style="color:green">Very Easy</span> and <span style="color:green">Easy</span> hacks by chance from opening Data Caches, and naturally appears in <span style="color:yellow">Medium</span> hacking difficulty and up. | |||
'''Polymorphic Shield''' appears in <span style="color:yellow">Medium</span> hacking difficulty and up. | |||
'''Secondary Vector''' appears in <span style="color:red">Hard</span> hacking difficulty and up. | |||
=== Data Caches === | === Data Caches === | ||
| Line 156: | Line 176: | ||
* {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | * {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | ||
** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ||
** Higher skill levels makes hacking Relic Site Container structures easier, with {{sk|Archaeology|V}} allowing you to use the powerful Relic Analyzer II module. Explorers should considering training Archaeology to V, especially if they intend to hack Relic Sites in NullSec or Wormholes. | ** Higher skill levels makes hacking Relic Site Container structures easier, with {{sk|Archaeology|V}} allowing you to use the powerful Relic Analyzer II module. Explorers should considering training Archaeology to V, especially if they intend to hack Relic Sites in [[System security|NullSec]] or [[Wormholes]]. | ||
* {{sk|Hacking|price=yes|mult=yes}}: Required skill for the use of Data Analyzer modules. Gives +10 Virus Coherence per level. | * {{sk|Hacking|price=yes|mult=yes}}: Required skill for the use of Data Analyzer modules. Gives +10 Virus Coherence per level. | ||
** ''A la'' Archaeology, Data Analyzers require Hacking, and open Container structures found in Data Sites, Chemical Labs and Ghost Sites. {{sk|Hacking|I}} has slightly higher requirements than Archaeology I, but make sure you get both skills, so that you can hack any sites you find. | ** ''A la'' Archaeology, Data Analyzers require Hacking, and open Container structures found in Data Sites, Chemical Labs and Ghost Sites. {{sk|Hacking|I}} has slightly higher requirements than Archaeology I, but make sure you get both skills, so that you can hack any sites you find. | ||
| Line 166: | Line 186: | ||
Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | ||
Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. The Navy Exploration frigate is a small upgrade with more defense and movement speed at the tradeoff of | Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. The Navy Exploration frigate is a small upgrade with more defense and movement speed at the tradeoff of greater cost. | ||
* {{sh|Magnate}} | * {{sh|Magnate}} / {{sh|Magnate Navy Issue}} | ||
* {{sh|Heron}} | * {{sh|Heron}} / {{sh|Heron Navy Issue}} | ||
* {{sh|Imicus}} | * {{sh|Imicus}} / {{sh|Imicus Navy Issue}} | ||
* {{sh|Probe}} | * {{sh|Probe}} / {{sh|Probe Fleet Issue}} | ||
Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | ||