More actions
m →HACKING |
|||
| Line 2,729: | Line 2,729: | ||
{| class="wikitable" style="margin-left: auto; margin-right: auto; border: none;" | {| class="wikitable" style="margin-left: auto; margin-right: auto; border: none;" | ||
|[[File:3P38_Supplement_23.png|thumb|none|alt=A|That's a lot of signatures for a highsec system]||[[File:3P38_Supplement_55.png|thumb|none|alt=A|Shattered Whs are exploration havens]]||[[File:3P38_Supplement_53.png|thumb|none|alt=A|Scanning: Sort by ID, then start from top & work down...]]||[[File:3P38_Supplement_52.png|thumb|none|alt=A|...and bookmark the ones you want to run with]]||[[File:3P38_Supplement_54.png|thumb|none|alt=A|Two Dot Pattern (see below)]]|| | |[[File:3P38_Supplement_23.png|thumb|none|alt=A|That's a lot of signatures for a highsec system]]||[[File:3P38_Supplement_55.png|thumb|none|alt=A|Shattered Whs are exploration havens]]||[[File:3P38_Supplement_53.png|thumb|none|alt=A|Scanning: Sort by ID, then start from top & work down...]]||[[File:3P38_Supplement_52.png|thumb|none|alt=A|...and bookmark the ones you want to run with]]||[[File:3P38_Supplement_54.png|thumb|none|alt=A|Two Dot Pattern (see below)]]|| | ||
|} | |} | ||