Difference between revisions of "User:Koddestia Kud Usoko"
(Created page with "==Pirate sites== 200px|thumb|right|A Data Site container 200px|thumb|right|A Relic Site container Pirate relic and dat...") |
|||
Line 4: | Line 4: | ||
Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction. | Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction. | ||
− | Data sites use the following naming convention according to their location. | + | Data and relic sites use the following naming convention according to their location. |
− | + | {| class="wikitable" | |
− | + | |- | |
− | + | ! Data site names !! Relic site names !! Location | |
− | + | |- | |
− | + | | {{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || High-security systems | |
− | + | |- | |
− | + | | {{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Low-security systems | |
− | + | |- | |
+ | | {{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Null-security and wormhole systems | ||
+ | |} | ||
Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows. | Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows. | ||
Line 27: | Line 29: | ||
| {{co|#9ef37c|(Faction)}} Databank || {{co|#9ef37c|(Faction)}} Ruins || Hard | | {{co|#9ef37c|(Faction)}} Databank || {{co|#9ef37c|(Faction)}} Ruins || Hard | ||
|} | |} | ||
− | |||
− | |||
− | |||
− | The {{co|#9ef37c|(Faction)}} in the above site and container names will be the local pirate group for each region. | + | The {{co|#9ef37c|(Faction)}} in the above site and container names will be the local pirate group for each region. For a list of {{co|#9ef37c|(site)}} names, see . |
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | ||
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 17:54, 10 March 2022
Pirate sites
Pirate relic and data sites can be found in all normal space regions, in C1, C2 and C3 class wormhole systems, as well as in shattered wormhole systems. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 salvage materials, skill books and blueprint copies. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
Data and relic sites use the following naming convention according to their location.
Data site names | Relic site names | Location |
---|---|---|
Local (Faction) (site) | Crumbling (Faction) (site) | High-security systems |
Regional (Faction) (site) | Decayed (Faction) (site) | Low-security systems |
Central (Faction) (site) | Ruined (Faction) (site) | Null-security and wormhole systems |
Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows.
Data site containers | Relic site containers | Difficult |
---|---|---|
(Faction) Info Shard | (Faction) Debris | Very easy |
(Faction) Com Tower | (Faction) Rubble | Easy |
(Faction) Mainframe | (Faction) Remains | Medium |
(Faction) Databank | (Faction) Ruins | Hard |
The (Faction) in the above site and container names will be the local pirate group for each region. For a list of (site) names, see .
You'll have to hack into the containers first by playing the hacking minigame. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.