More actions
Sivaira Chen (talk | contribs) Information category on the hardest difficulty hack, from specific Upwell structures and AEGIS hacking sites. |
minor typo |
||
| (2 intermediate revisions by 2 users not shown) | |||
| Line 119: | Line 119: | ||
|- | |- | ||
|[[File:Restorer_node.png]] | |[[File:Restorer_node.png]] | ||
|'''Restoration Nodes''' give 20 extra Coherence to a random Defensive Subsystem at the end of each turn. They are a high priority target. | |'''Restoration Nodes''' give 20 extra Coherence to a random Defensive Subsystem at the end of each turn (though never to the System Core). They are a high priority target. | ||
|- | |- | ||
| Line 137: | Line 137: | ||
|- | |- | ||
|[[File:Self_repair2.png]] | |[[File:Self_repair2.png]] | ||
|'''Self Repairs''' increase your Virus Coherence by 5-10 each turn for the three turns. Use it immediately as your Virus doesn't have a maximum Coherence value. | |'''Self Repairs''' increase your Virus Coherence by 5-10 each turn for the three turns. Use it immediately as your Virus doesn't have a maximum Coherence value. Appears in all categories of hacking difficulty. | ||
|- | |- | ||
| Line 152: | Line 152: | ||
|} | |} | ||
'''Self Repairs''' appears in all categories of hacking difficulty. | |||
'''Kernel Rot''' only appears in <span style="color:green">Very Easy</span> and <span style="color:green">Easy</span> hacks by chance from opening Data Caches, and naturally appears in <span style="color:yellow">Medium</span> hacking difficulty and up. | |||
'''Polymorphic Shield''' appears in <span style="color:yellow">Medium</span> hacking difficulty and up. | |||
'''Secondary Vector''' appears in <span style="color:red">Hard</span> hacking difficulty and up. | |||
=== Data Caches === | === Data Caches === | ||
| Line 277: | Line 285: | ||
* '''Explore the board as much as possible before attacking a Defensive Subsystem.''' You may just stumble onto the System Core early! Restoration Nodes and Virus Suppressors are the exception to this though, as they should be removed from the board as soon as possible. | * '''Explore the board as much as possible before attacking a Defensive Subsystem.''' You may just stumble onto the System Core early! Restoration Nodes and Virus Suppressors are the exception to this though, as they should be removed from the board as soon as possible. | ||
* '''Always pick up Utility Subsystems as soon as they are exposed.''' If you keep exploring without snagging these, a Defensive Subsystem might pop up and cut off your access to them! | * '''Always pick up Utility Subsystems as soon as they are exposed.''' If you keep exploring without snagging these, a Defensive Subsystem might pop up and cut off your access to them! | ||
* '''Be careful of where you are clicking.''' It is quite common for one to blitz through a site and unintentionally discover the System Core or a Utility Subsystem, only to then click on another node to reveal a Defensive Subsystem, blocking off access to it. Rush only when you are certain that what you need is unlikely to spawn on that area of the grid. | |||
* The utility subsystem 'Secondary Vector' can be used to clear Virus Suppressors and Antiviruses from the board without sustaining damage, as such it is advised to hold on to them unless there is no other option. | |||
* '''Always use a Self Repair as soon as you find it.''' It increases your Virus Coherence, so there is no gain in waiting. | * '''Always use a Self Repair as soon as you find it.''' It increases your Virus Coherence, so there is no gain in waiting. | ||
* '''Don’t open Data Caches until you’ve fully explored all their adjacent nodes.''' You don’t want your exploration to be cut off by an unexpected Defensive Subsystem! | * '''Don’t open Data Caches until you’ve fully explored all their adjacent nodes.''' You don’t want your exploration to be cut off by an unexpected Defensive Subsystem! | ||
** Difficult hack's Data Caches might expose Restoration Nodes and Suppressors. '''Leave opening Data Caches as a last resort.''' | ** Difficult hack's Data Caches might expose Restoration Nodes and Suppressors. '''Leave opening Data Caches as a last resort.''' | ||
* On this note, if you are low on coherence and have already discovered the System Core, opening Data Caches is completely safe assuming: | |||
** 1. The Data Cache is '''NOT''' adjacent to the System Core, as revealing a Defensive Subsystem here will block off the System Core and almost certainly render the hack forfeit. | |||
** 2. The hack being attempted is '''NOT''' a red core (Hard) hack. In yellow (Medium) hacks and below, none of the Defensive Subsystems will directly affect your ability to destroy the System Core, as Restoration Nodes cannot heal the System Core. On a Hard hack, it can risk spawning Virus Suppressors, which will reduce your virus strength and possibly fail the hack. However, if one feels that the risk is worth it, by all means, go ahead. | |||
* '''Use the 1-5 numbers to guide your movement''' around the board. For example, if you're approaching an edge or corner of the grid, and the number 5 shows up, then trying to explore anything towards that corner/edge is not useful, because you know that there cannot be anything good within 5 nodes. In general, you want to click in directions that make the numbers smaller. Because the numbers disappear as you move along, you need to remember where there were 5's, so you know which areas not to bother going back to later. | * '''Use the 1-5 numbers to guide your movement''' around the board. For example, if you're approaching an edge or corner of the grid, and the number 5 shows up, then trying to explore anything towards that corner/edge is not useful, because you know that there cannot be anything good within 5 nodes. In general, you want to click in directions that make the numbers smaller. Because the numbers disappear as you move along, you need to remember where there were 5's, so you know which areas not to bother going back to later. | ||
* '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | * '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | ||