More actions
m →Pirate sites: Added site variation |
m →Pirate sites: Added site variation |
||
| Line 14: | Line 14: | ||
Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group. | Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group. | ||
Data site containers have a physical appearance that resembles a gyroscope, and are usually named "{{co|#9ef37c|(Faction)}} Info Shard", "{{co|#9ef37c|(Faction)}} Com Tower", "{{co|#9ef37c|(Faction)}} Mainframe", "{{co|#9ef37c|(Faction)}} Data Processing Center", "{{co|#9ef37c|(Faction)}} Shattered Life-Support Unit", "{{co|#9ef37c|(Faction)}} Virus Test Site", "{{co|#9ef37c|(Faction)}} Minor Shipyard" or "{{co|#9ef37c|(Faction)}} Backup Server". Relic Site containers resemble ancient shipwrecks and are named "{{co|#9ef37c|(Faction)}} Debris", "{{co|#9ef37c|(Faction)}} Rubble", "{{co|#9ef37c|(Faction)}} Crystal Quarry", "{{co|#9ef37c|(Faction)}} Antiquated Outpost" or "{{co|#9ef37c|(Faction)}} Stone Formation". You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | Data site containers have a physical appearance that resembles a gyroscope, and are usually named "{{co|#9ef37c|(Faction)}} Info Shard", "{{co|#9ef37c|(Faction)}} Com Tower", "{{co|#9ef37c|(Faction)}} Mainframe", "{{co|#9ef37c|(Faction)}} Data Processing Center", "{{co|#9ef37c|(Faction)}} Shattered Life-Support Unit", "{{co|#9ef37c|(Faction)}} Virus Test Site", "{{co|#9ef37c|(Faction)}} Minor Shipyard", "{{co|#9ef37c|(Faction)}} Production Installer" or "{{co|#9ef37c|(Faction)}} Backup Server". Relic Site containers resemble ancient shipwrecks and are named "{{co|#9ef37c|(Faction)}} Debris", "{{co|#9ef37c|(Faction)}} Rubble", "{{co|#9ef37c|(Faction)}} Crystal Quarry", "{{co|#9ef37c|(Faction)}} Antiquated Outpost" or "{{co|#9ef37c|(Faction)}} Stone Formation". You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | ||
==Drone data sites== | ==Drone data sites== | ||