Difference between revisions of "User:Koddestia Kud Usoko"

From EVE University Wiki
Jump to: navigation, search
(Created page with "==Pirate sites== 200px|thumb|right|A Data Site container 200px|thumb|right|A Relic Site container Pirate relic and dat...")
 
Line 4: Line 4:
 
Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
 
Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
  
Data sites use the following naming convention according to their location.
+
Data and relic sites use the following naming convention according to their location.
* {{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} in high-security systems
+
{| class="wikitable"
* {{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} in low-security systems
+
|-
* {{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} in null-security and wormhole systems.
+
! Data site names !! Relic site names !! Location
 
+
|-
Relic sites follow a similar convention:
+
| {{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || High-security systems
* {{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} in high-security systems
+
|-
* {{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} in low-security systems
+
| {{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Low-security systems
* {{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} in null-security and wormhole systems.
+
|-
 +
| {{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Null-security and wormhole systems
 +
|}
  
 
Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks.  The containers are named as follows.
 
Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks.  The containers are named as follows.
Line 27: Line 29:
 
| {{co|#9ef37c|(Faction)}} Databank || {{co|#9ef37c|(Faction)}} Ruins || Hard
 
| {{co|#9ef37c|(Faction)}} Databank || {{co|#9ef37c|(Faction)}} Ruins || Hard
 
|}
 
|}
 
 
 
  
The {{co|#9ef37c|(Faction)}} in the above site and container names will be the local pirate group for each region.
+
The {{co|#9ef37c|(Faction)}} in the above site and container names will be the local pirate group for each region.  For a list of  {{co|#9ef37c|(site)}} names, see .
  
 
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
 
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
 
Data sites
 
  "{{co|#9ef37c|(Faction)}} Crystal Quarry", "{{co|#9ef37c|(Faction)}} Antiquated Outpost" or "{{co|#9ef37c|(Faction)}} Stone Formation".
 
 
"{{co|#9ef37c|(Faction)}} Data Processing Center", "{{co|#9ef37c|(Faction)}} Shattered Life-Support Unit", "{{co|#9ef37c|(Faction)}} Virus Test Site", "{{co|#9ef37c|(Faction)}} Minor Shipyard", "{{co|#9ef37c|(Faction)}} Production Installer" or "{{co|#9ef37c|(Faction)}} Backup Server".
 

Revision as of 17:54, 10 March 2022

Pirate sites

A Data Site container
A Relic Site container

Pirate relic and data sites can be found in all normal space regions, in C1, C2 and C3 class wormhole systems, as well as in shattered wormhole systems. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 salvage materials, skill books and blueprint copies. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.

Data and relic sites use the following naming convention according to their location.

Data site names Relic site names Location
Local (Faction) (site) Crumbling (Faction) (site) High-security systems
Regional (Faction) (site) Decayed (Faction) (site) Low-security systems
Central (Faction) (site) Ruined (Faction) (site) Null-security and wormhole systems

Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows.

Data site containers Relic site containers Difficult
(Faction) Info Shard (Faction) Debris Very easy
(Faction) Com Tower (Faction) Rubble Easy
(Faction) Mainframe (Faction) Remains Medium
(Faction) Databank (Faction) Ruins Hard

The (Faction) in the above site and container names will be the local pirate group for each region. For a list of (site) names, see .

You'll have to hack into the containers first by playing the hacking minigame. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.