More actions
m Add hacking site completion time. |
m Add Polymorphic Shield to available hacking tools. |
||
| Line 273: | Line 273: | ||
{| class="wikitable" style="float: right; text-align: center;" | {| class="wikitable" style="float: right; text-align: center;" | ||
|- | |- | ||
! colspan="5" | Nodes !! colspan=" | ! colspan="5" | Nodes !! colspan="4" | Tools Available | ||
|- | |- | ||
| [[File:Hacking coreHigh.png|link=|32px|System Core]]<br>[[File:Hacking coherence.png|link=]]90 [[File:Hacking strength.png|link=]]10 | | [[File:Hacking coreHigh.png|link=|32px|System Core]]<br>[[File:Hacking coherence.png|link=]]90 [[File:Hacking strength.png|link=]]10 | ||
| Line 283: | Line 283: | ||
| [[File:Hacking utilKernalRot.png|link=|32px|Kernel Rot]] | | [[File:Hacking utilKernalRot.png|link=|32px|Kernel Rot]] | ||
| [[File:Hacking utilSecondVector.png|link=|32px|Secondary Vector]] | | [[File:Hacking utilSecondVector.png|link=|32px|Secondary Vector]] | ||
| [[File:Polymorphic shield.png|link=|32px|Polymorphic Shield]] | |||
|} | |} | ||