More actions
m fix node type links |
Sivaira Chen (talk | contribs) Information category on the hardest difficulty hack, from specific Upwell structures and AEGIS hacking sites. |
||
| (17 intermediate revisions by 7 users not shown) | |||
| Line 18: | Line 18: | ||
Number: | Number: | ||
* 1 means an adjacent node is a System Core, Utility Subsystem or Data Cache | * 1 means an adjacent node is a System Core, Utility Subsystem or Data Cache | ||
* 2, 3 and 4 | * 2, 3 and 4 mean the nearest System Core, Utility Subsystem or Data Cache is respectively 2, 3 and 4 nodes away | ||
* 5 means you are 5 or more nodes away from the nearest System Core, Utility Subsystem or Data Cache | * 5 means you are 5 or more nodes away from the nearest System Core, Utility Subsystem or Data Cache | ||
The numbers 1-5 don't tell you how distant you are from the nearest Defensive Subsystem. | The numbers 1-5 don't tell you how distant you are from the nearest Defensive Subsystem. | ||
Instead of being empty a node may contain: | Instead of being empty, a node may contain: | ||
* a [[ | * a [[#System Core|System Core]] | ||
* a [[ | * a [[#Defensive Subsystems|Defensive Subsystem]] | ||
* a [[ | * a [[#Utility Subsystems|Utility Subsystem]] | ||
* a [[ | * a [[#Data Caches|Data Cache]] | ||
=== System Core === | === System Core === | ||
'''Finding and disabling the System Core is the goal of hacking.''' | '''Finding and disabling the System Core is the goal of hacking.''' | ||
| Line 35: | Line 34: | ||
{|class="wikitable" style="float: right; text-align: center;" | {|class="wikitable" style="float: right; text-align: center;" | ||
|+ Difficult System Cores are defended by advanced Defensive Subsystems | |+ Difficult System Cores are defended by advanced Defensive Subsystems | ||
! scope="col | ! scope="col" | Difficulty | ||
! scope="col | ! scope="col" | System Core | ||
! scope="col | ! scope="col" | Firewall | ||
! scope="col | ! scope="col" | Anti-Virus <ref>The Antivirus in Very Easy and Easy hacks can only appear from opening Data Caches.</ref> | ||
! scope="col | ! scope="col" | Resto. Node | ||
! scope="col | ! scope="col" | Suppressor | ||
|- | |- | ||
| Line 73: | Line 72: | ||
| [[File:Restorer node.png]] | | [[File:Restorer node.png]] | ||
| [[File:Supressor node.png]] | | [[File:Supressor node.png]] | ||
|- | |||
| style="text-align: left;" | Hardest <ref>Only present in specific [[Upwell structures]] or the [[AEGIS Capital Ship Security Facility]]</ref> | |||
| [[File:Core_hardest.png|59px]] | |||
| [[File:Firewall_hardest.png|59px]] | |||
| [[File:Antivirus_hardest.png|59px]] | |||
| [[File:Restorer_node_hardest.png|59px]] | |||
| [[File:Suppressor_hardest.png|59px]] | |||
|} | |} | ||
<small><references> | |||
</references></small> | |||
System Cores, Defensive Subsystems and your Virus have: | System Cores, Defensive Subsystems and your Virus have: | ||
| Line 80: | Line 89: | ||
When you click on the System Core or Defensive Subsystem your Virus will attack. Attacking is turn-based: | When you click on the System Core or Defensive Subsystem your Virus will attack. Attacking is turn-based: | ||
# your Virus attacks, lowering the System's Coherence by your Virus Strength and then | # your Virus attacks, lowering the System's Coherence by your Virus Strength; and then | ||
# the System Core or Defensive Subsystem retaliates if it survived the attack | # the System Core or Defensive Subsystem retaliates if it survived the attack. | ||
When you reduce the System's Coherence to 0, it is disabled and removed from the board. | When you reduce the System's Coherence to 0, it is disabled and removed from the board. | ||
| Line 87: | Line 96: | ||
You fail a hack when: | You fail a hack when: | ||
* your Virus Coherence reaches 0 | * your Virus Coherence reaches 0 | ||
* | * the hacking window is closed for any reason, such as moving too far away from the Container structure or initiating warp during an active hack. | ||
If you fail the hack: | If you fail the hack: | ||
* twice a Data or Relic Site Container structure will be destroyed | * twice, a Data or Relic Site Container structure will be destroyed (with a few exceptions, such as the Storage Depots in Sleeper Caches) | ||
* once a Covert Research Facility Container structure will be destroyed and deal a large amount of damage to all ships in range | * once, a Covert Research Facility Container structure will be destroyed and deal a large amount of explosive damage to all ships in range | ||
* once a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle | * once, a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle. Specific information can be found on the respective Sleeper Cache pages. | ||
* once, any hackable container in the [[Observatory Infiltration]] site will activate lockdown | |||
* once, the [[AEGIS Capital Ship Security Facility|AEGIS Encrypted Key Storage]] will spawn a hostile response fleet. | |||
=== Defensive Subsystems === | === Defensive Subsystems === | ||
'''Defensive Subsystems prevent you from exploring adjacent nodes until they are disabled.''' | '''Defensive Subsystems prevent you from exploring adjacent nodes until they are disabled.''' | ||
{|class="wikitable | {|class="wikitable" | ||
|- | |- | ||
|[[File:Firewall_node.png]] | |[[File:Firewall_node.png]] | ||
| Line 122: | Line 132: | ||
When you click the Utility Subsystem it will be added to a free utility slot. | When you click the Utility Subsystem it will be added to a free utility slot. | ||
Activate the Utility Subsystem by clicking on it in your utility belt. The number of utility belt slots depends on your Analyzer module. | Activate the Utility Subsystem by clicking on it in your utility belt. They can also be activated by pressing the number keys "1", "2" etc. The number of utility belt slots depends on your Analyzer module. | ||
{|class="wikitable | {|class="wikitable" | ||
|- | |- | ||
|[[File:Self_repair2.png]] | |[[File:Self_repair2.png]] | ||
| Line 158: | Line 168: | ||
* {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | * {{sk|Archaeology|price=yes|mult=yes}}: Required skill for the use of Relic Analyzer modules. Gives +10 Virus Coherence per level. | ||
** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ** Relic Analyzers require Archaeology, and are a fairly cheap mid-slot module used to interact with Container structures. A good amount of your income as an explorer will come from accessing these Container structures, so note this skill's importance! | ||
** Higher skill levels makes hacking Relic Site Container structures easier, with {{sk|Archaeology|V}} allowing you to use the powerful Relic Analyzer II module. Explorers should considering training Archaeology to V, especially if they intend to hack Relic Sites in NullSec or Wormholes. | ** Higher skill levels makes hacking Relic Site Container structures easier, with {{sk|Archaeology|V}} allowing you to use the powerful Relic Analyzer II module. Explorers should considering training Archaeology to V, especially if they intend to hack Relic Sites in [[System security|NullSec]] or [[Wormholes]]. | ||
* {{sk|Hacking|price=yes|mult=yes}}: Required skill for the use of Data Analyzer modules. Gives +10 Virus Coherence per level. | * {{sk|Hacking|price=yes|mult=yes}}: Required skill for the use of Data Analyzer modules. Gives +10 Virus Coherence per level. | ||
** ''A la'' Archaeology, Data Analyzers require Hacking, and open Container structures found in Data Sites, Chemical Labs and Ghost Sites. {{sk|Hacking|I}} has slightly higher requirements than Archaeology I, but make sure you get both skills, so that you can hack any sites you find. | ** ''A la'' Archaeology, Data Analyzers require Hacking, and open Container structures found in Data Sites, Chemical Labs and Ghost Sites. {{sk|Hacking|I}} has slightly higher requirements than Archaeology I, but make sure you get both skills, so that you can hack any sites you find. | ||
| Line 168: | Line 178: | ||
Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, exploration ships have a role bonus for both Virus and scan Strength. | ||
Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. | Each Empire's Tech 1 Exploration Frigate has a role bonus of +5 Virus Strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in scanning down Cosmic Signatures. The Navy Exploration frigate is a small upgrade with more defense and movement speed at the tradeoff of greater cost. | ||
* {{sh|Magnate}} | * {{sh|Magnate}} / {{sh|Magnate Navy Issue}} | ||
* {{sh|Heron}} | * {{sh|Heron}} / {{sh|Heron Navy Issue}} | ||
* {{sh|Imicus}} | * {{sh|Imicus}} / {{sh|Imicus Navy Issue}} | ||
* {{sh|Probe}} | * {{sh|Probe}} / {{sh|Probe Fleet Issue}} | ||
Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | Covert Operation ships are the direct upgrade from Tech 1 Exploration Frigates. They get a +10 bonus to Virus Strength, +10% (50% max) per level bonus to scanning, and can use Covert Ops Cloaking Device II. | ||
| Line 181: | Line 191: | ||
* {{sh|Helios}} | * {{sh|Helios}} | ||
* {{sh|Cheetah}} | * {{sh|Cheetah}} | ||
* {{sh|Pacifier}} | |||
The [[Sisters of EVE]] faction ships all have a +10 bonus to Virus Strength, a 37.5% role bonus to scanning, and both the Astero and the Stratios can use a Covert Ops Cloaking Device II. They also get bonus to armor resists, energy turrets and drones making them capable combat crafts. They have lower skill requirements than Covert Operation ships, but they are more expensive than Covert Operation ships. | The [[Sisters of EVE]] faction ships all have a +10 bonus to Virus Strength, a 37.5% role bonus to scanning, and both the Astero and the Stratios can use a Covert Ops Cloaking Device II. They also get bonus to armor resists, energy turrets and drones making them capable combat crafts. They have lower skill requirements than Covert Operation ships, but they are more expensive than Covert Operation ships. | ||
| Line 194: | Line 205: | ||
* {{sh|Proteus}} | * {{sh|Proteus}} | ||
* {{sh|Loki}} | * {{sh|Loki}} | ||
[[Society of Conscious Thought]] special edition frigate is given away yearly for capsuleer day events, making the price variable. | |||
* {{sh|Metamorphosis}} has a +10 bonus to virus strength, a 37.5% bonus to both Core Scanner Probe strength and deviation, and a +2 bonus to ship warp core strength and can use a Covert Ops Cloaking Device making it a very slippery exploration vessel. | |||
* {{sh|Sunesis}} / {{sh|Gnosis}} / {{sh|Praxis}} have a bonus to Core Scanner Probe strength but not virus strength. | |||
=== Ship equipment === | === Ship equipment === | ||
| Line 199: | Line 214: | ||
Full list of normally used scanning equipment: | Full list of normally used scanning equipment: | ||
{|class="wikitable" style="width: | {|class="wikitable" style="max-width: 70em;" | ||
|- | |- | ||
| [[File:Icon data analyzer i.png|link=|]] | | [[File:Icon data analyzer i.png|link=|]] | ||
| Line 231: | Line 246: | ||
The slot 9 implants that improve Virus Coherence and Strength. | The slot 9 implants that improve Virus Coherence and Strength. | ||
{| class="wikitable" | {| class="wikitable" | ||
|- style="background: | |- style="background-color: var(--background-color-warning-subtle);" | ||
! Implant | ! Implant | ||
! Effect | ! Effect | ||
| Line 250: | Line 265: | ||
The slot 10 EY-1005 implant improves Virus Coherence. | The slot 10 EY-1005 implant improves Virus Coherence. | ||
{| class="wikitable" | {| class="wikitable" | ||
|- style="background: | |- style="background-color: var(--background-color-warning-subtle);" | ||
! Implant | ! Implant | ||
! Effect | ! Effect | ||
| Line 267: | Line 282: | ||
* '''Use the 1-5 numbers to guide your movement''' around the board. For example, if you're approaching an edge or corner of the grid, and the number 5 shows up, then trying to explore anything towards that corner/edge is not useful, because you know that there cannot be anything good within 5 nodes. In general, you want to click in directions that make the numbers smaller. Because the numbers disappear as you move along, you need to remember where there were 5's, so you know which areas not to bother going back to later. | * '''Use the 1-5 numbers to guide your movement''' around the board. For example, if you're approaching an edge or corner of the grid, and the number 5 shows up, then trying to explore anything towards that corner/edge is not useful, because you know that there cannot be anything good within 5 nodes. In general, you want to click in directions that make the numbers smaller. Because the numbers disappear as you move along, you need to remember where there were 5's, so you know which areas not to bother going back to later. | ||
* '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | * '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | ||
* '''Rule of 8, or "Before 8 it's Bait"'''. The core is always placed at least 8 grid-spaces (including empty spaces) away from the starting point. If such placement is impossible, the core is placed randomly anywhere on the board. | |||
[[File:Image-ruleof8.png|thumb|442x442px|Rule of 8 in its simplest form]] | |||
[[Category:Exploration]] | [[Category:Exploration]] | ||