More actions
m →HACKING |
m →HACKING |
||
| Line 2,978: | Line 2,978: | ||
{| class="wikitable" style="margin-left: auto; margin-right: auto; border: none;" | {| class="wikitable" style="margin-left: auto; margin-right: auto; border: none;" | ||
|[[File:3P38_Supplement_33.png|thumb|none|alt=A|Some hacks aren't even that]||[[File:3P38_Supplement_41.png|thumb|none|alt=A|Others aren't really meant to succeed]]||[[File:3P38_Supplement_40.png|thumb|none|alt=A|This is why highsec hacking is just for practice]]||[[File:3P38_Supplement_46.png|thumb|none||alt=A|Nullsec Rampage: 6 Data, 2 Relic sites]]||[[File:3P38_Supplement_42.png|thumb|none|alt=A|Saving and using tools properly is vital to success]]|| | |[[File:3P38_Supplement_33.png|thumb|none|alt=A|Some hacks aren't even that]]||[[File:3P38_Supplement_41.png|thumb|none|alt=A|Others aren't really meant to succeed]]||[[File:3P38_Supplement_40.png|thumb|none|alt=A|This is why highsec hacking is just for practice]]||[[File:3P38_Supplement_46.png|thumb|none|upright=0.8|alt=A|Nullsec Rampage: 6 Data, 2 Relic sites]]||[[File:3P38_Supplement_42.png|thumb|none|alt=A|Saving and using tools properly is vital to success]]|| | ||
|} | |} | ||