Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Relic and data sites: Difference between revisions

From EVE University Wiki
Hirmuolio Pine (talk | contribs)
See lso from cosmic anomalies
Hirmuolio Pine (talk | contribs)
m Pirate sites: some colors for site names
Line 9: Line 9:
Pirate relic and data can be found in all normal space regions and in C1, C2 and C3 wormholes. They are considered to be normal data and relic sites.
Pirate relic and data can be found in all normal space regions and in C1, C2 and C3 wormholes. They are considered to be normal data and relic sites.


They follow simple naming conventions. Data sites in high security space they are called "Local {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "Regional {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "Central {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Relic sites in high security space they are called "Crumbling {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "Decayed {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "Ruined {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Each region spawns sites for the local pirate group.
They follow simple naming conventions. Data sites in high security space they are called "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Relic sites in high security space they are called "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Each region spawns sites for the local pirate group.


Pirate relic and Data Sites are set up very simply. They are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or defenders.
Pirate relic and Data Sites are set up very simply. They are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or defenders.