Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Relic and data sites: Difference between revisions

From EVE University Wiki
m Add {{Merge}} suggestion
Line 9: Line 9:
It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.
It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.


==Pirate sites==
== Pirate sites ==
Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
 
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]]
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]]
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]]
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]]
Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
Data and relic sites use the following naming convention according to their location.
{| class="wikitable"
|-
! Data site names !! Relic site names !! Location
|-
| {{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || High-security systems
|-
| {{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Low-security systems
|-
| {{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Null-security and wormhole systems
|}
 
Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows.
{| class="wikitable"
|-
! Data site containers !! Relic site containers !! Difficulty
|-
| {{co|#9ef37c|(Faction)}} Info Shard || {{co|#9ef37c|(Faction)}} Debris || Very easy
|-
| {{co|#9ef37c|(Faction)}} Com Tower || {{co|#9ef37c|(Faction)}} Rubble || Easy
|-
| {{co|#9ef37c|(Faction)}} Mainframe || {{co|#9ef37c|(Faction)}} Remains || Medium
|-
| {{co|#9ef37c|(Faction)}} Databank || {{co|#9ef37c|(Faction)}} Ruins || Hard
|}


Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group.
The {{co|#9ef37c|(Faction)}} in the above site and container names will be the local pirate group for each region. For a list of  {{co|#9ef37c|(site)}} names, see [[List of data and relic sites]].


Data site containers have a physical appearance that resembles a gyroscope, and are usually named "{{co|#9ef37c|(Faction)}} Info Shard", "{{co|#9ef37c|(Faction)}} Com Tower", "{{co|#9ef37c|(Faction)}} Mainframe", "{{co|#9ef37c|(Faction)}} Data Processing Center", "{{co|#9ef37c|(Faction)}} Shattered Life-Support Unit", "{{co|#9ef37c|(Faction)}} Virus Test Site", "{{co|#9ef37c|(Faction)}} Minor Shipyard", "{{co|#9ef37c|(Faction)}} Production Installer" or "{{co|#9ef37c|(Faction)}} Backup Server". Relic Site containers resemble ancient shipwrecks and are named "{{co|#9ef37c|(Faction)}} Debris", "{{co|#9ef37c|(Faction)}} Rubble", "{{co|#9ef37c|(Faction)}} Crystal Quarry", "{{co|#9ef37c|(Faction)}} Antiquated Outpost" or "{{co|#9ef37c|(Faction)}} Stone Formation". You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.


==Drone data sites==
==Drone data sites==