More actions
Chris Halsky (talk | contribs) No edit summary |
m Change background color to design-token. Remove fixed widths. |
||
| Line 29: | Line 29: | ||
* a [[#Data Caches|Data Cache]] | * a [[#Data Caches|Data Cache]] | ||
=== System Core === | === System Core === | ||
'''Finding and disabling the System Core is the goal of hacking.''' | '''Finding and disabling the System Core is the goal of hacking.''' | ||
| Line 35: | Line 34: | ||
{|class="wikitable" style="float: right; text-align: center;" | {|class="wikitable" style="float: right; text-align: center;" | ||
|+ Difficult System Cores are defended by advanced Defensive Subsystems | |+ Difficult System Cores are defended by advanced Defensive Subsystems | ||
! scope="col | ! scope="col" | Difficulty | ||
! scope="col | ! scope="col" | System Core | ||
! scope="col | ! scope="col" | Firewall | ||
! scope="col | ! scope="col" | Anti-Virus | ||
! scope="col | ! scope="col" | Resto. Node | ||
! scope="col | ! scope="col" | Suppressor | ||
|- | |- | ||
| Line 94: | Line 93: | ||
* once a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle | * once a Sleeper Cache will release a deadly toxic gas, activate turrets or put up other obstacle | ||
=== Defensive Subsystems === | === Defensive Subsystems === | ||
'''Defensive Subsystems prevent you from exploring adjacent nodes until they are disabled.''' | '''Defensive Subsystems prevent you from exploring adjacent nodes until they are disabled.''' | ||
{|class="wikitable | {|class="wikitable" | ||
|- | |- | ||
|[[File:Firewall_node.png]] | |[[File:Firewall_node.png]] | ||
| Line 124: | Line 122: | ||
Activate the Utility Subsystem by clicking on it in your utility belt. They can also be activated by pressing the number keys "1", "2" etc. The number of utility belt slots depends on your Analyzer module. | Activate the Utility Subsystem by clicking on it in your utility belt. They can also be activated by pressing the number keys "1", "2" etc. The number of utility belt slots depends on your Analyzer module. | ||
{|class="wikitable | {|class="wikitable" | ||
|- | |- | ||
|[[File:Self_repair2.png]] | |[[File:Self_repair2.png]] | ||
| Line 200: | Line 198: | ||
Full list of normally used scanning equipment: | Full list of normally used scanning equipment: | ||
{|class="wikitable" style="width: | {|class="wikitable" style="max-width: 70em;" | ||
|- | |- | ||
| [[File:Icon data analyzer i.png|link=|]] | | [[File:Icon data analyzer i.png|link=|]] | ||
| Line 232: | Line 230: | ||
The slot 9 implants that improve Virus Coherence and Strength. | The slot 9 implants that improve Virus Coherence and Strength. | ||
{| class="wikitable" | {| class="wikitable" | ||
|- style="background: | |- style="background-color: var(--background-color-warning-subtle);" | ||
! Implant | ! Implant | ||
! Effect | ! Effect | ||
| Line 251: | Line 249: | ||
The slot 10 EY-1005 implant improves Virus Coherence. | The slot 10 EY-1005 implant improves Virus Coherence. | ||
{| class="wikitable" | {| class="wikitable" | ||
|- style="background: | |- style="background-color: var(--background-color-warning-subtle);" | ||
! Implant | ! Implant | ||
! Effect | ! Effect | ||
| Line 269: | Line 267: | ||
* '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | * '''Use the Rule of Six'''. This rule is slightly complicated, but can make your life when hacking much easier. The rule is that if you have a node that has six edges leading away from it ( a "complete" node with no missing nodes in the hexagon around it), then that node is guaranteed to 1) Have no Defensive Subsystems in it OR 2) be adjacent to the System Core. What that means in practice is that you can use these squares to move safely through the board, and any Defensive Subsystems you find tell you where the System Core is. It is usually worthwhile to try to reach and use areas of the map with many of these "complete" nodes when hacking. You can find a video tutorial [https://www.youtube.com/watch?v=h5uQC74VvVQ here]. | ||
* '''Rule of 8, or "Before 8 it's Bait"'''. The core is always placed at least 8 grid-spaces (including empty spaces) away from the starting point. If such placement is impossible, the core is placed randomly anywhere on the board. | * '''Rule of 8, or "Before 8 it's Bait"'''. The core is always placed at least 8 grid-spaces (including empty spaces) away from the starting point. If such placement is impossible, the core is placed randomly anywhere on the board. | ||
[[Category:Exploration]] | [[Category:Exploration]] | ||