Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Odyssey: Difference between revisions

From EVE University Wiki
replace reference to "see next section" with usable link
correct multiple typos in hacking section, better wording around virus coherence/strength, correct naming from "mini-containers" to "materials containers", better structuring to hacking section
Line 90: Line 90:
The way you run data and relic sites is much different from what you might be used to. I will go through this feature in the order of how you will actually interact with it once it's on Tranquility. Note, that the art for the profession containers also got an overhaul, which you can read more about in section 8.4.
The way you run data and relic sites is much different from what you might be used to. I will go through this feature in the order of how you will actually interact with it once it's on Tranquility. Note, that the art for the profession containers also got an overhaul, which you can read more about in section 8.4.


'''Step I: Arriving at the Site and Infiltrating Target System'''
====Arrival====


Once you have pinpointed the data or relic signature of your choice, you can warp to it. When you arrive, you will notice a varying number of profession containers on your overview. They use a white cross as their icon. Fly in range (<2,500m) and target one of the profession containers to be able to interact with it. Once you're in range you can use the appropriate analyzing module to start the actual minigame.
Once you have pinpointed the data or relic signature of your choice, you can warp to it. When you arrive, you will notice a varying number of profession containers on your overview. They use a white cross as their icon. Fly in range (within 2,500 m) and target one of the profession containers to be able to interact with it. Once you're in range you can use the appropriate analyzing module to start the actual minigame.


[[File:Hacking_overview.jpg|200px|thumb|right|Hacking overview]]   
[[File:Hacking_overview.jpg|200px|thumb|right|Hacking overview]]   


'''Step II: Understanding the Hacking Window'''
====Hacking Window====


The main part contains the system's nodes, which you will work through in order to complete the Hacking process (explained in Step III). In the bottom left you will find information on your viruses coherence (marked with a star icon) and strength (marked with a signal icon). Coherence is what commonly would be referred to as HP, strength is damage. When your visuses coherence reaches 0 your hacking attempt will fail. You can influence your viruses coherence and strength in the following ways:
The main section of the window contains the system's nodes in a hexagonal lattice arranged into nodes, which you'll interact with during [[#Hacking Attempt|the hack attempt]].
 
You control a virus that attempts to conquer individual nodes. Your virus has both a ''coherence rating'' and a ''strength rating''. Indicators describing your current coherence and strength ratings are in the lower-left of the hacking window; coherence is a star icon and strength is a signal icon.
 
Your strength rating determines the damage you inflict on other modules or subsystems that you may attack during the game. Your coherence rating determines your ability to withstand damage; when it reaches zero, you have failed this hacking attempt.
 
Other modules that you attack during the course of a hacking attempt also have coherence and strength ratings that function similarly. The higher their coherence, the tougher they are to destroy; the higher their strength, the more rapidly they can reduce your own coherence rating if you fail to destroy them.
 
You can influence your virus coherence and strength in the following ways:


* the tech level of the analyzing module you are using
* the tech level of the analyzing module you are using
Line 106: Line 114:
** T1 Memetic Algorithm Bank and Small Emission Scope Sharpener rigs give a +10 bonus to virus coherence
** T1 Memetic Algorithm Bank and Small Emission Scope Sharpener rigs give a +10 bonus to virus coherence
** T2 Memetic Algorithm Bank and Small Emission Scope Sharpener rigs give a +20 bonus to virus coherence
** T2 Memetic Algorithm Bank and Small Emission Scope Sharpener rigs give a +20 bonus to virus coherence
* T1 scanfrigs have a bonus to virus strength of +5
* T1 scanning frigates have a bonus to virus strength of +5
* T2 cov ops frigs have a bonus to virus strength of +10
* T2 covert ops frigs have a bonus to virus strength of +10
* the skills Archaeology and Hacking give a +10 bonus to virus coherence per level to their relative analyzing module
* Archaeology skill gives a +10 bonus to virus coherence per level to Relic Analyzers
* Hacking skill gives a +10 bonus to virus coherence per level to Data Analyzers
* utility subsystems found within the minigame
* utility subsystems found within the minigame


In the bottom center you will find a number of utility slots. You can fit these slots with utility subsystems found within the minigame. These utilities will benefit you in various ways to help complete the hacking process. Currently, all analyzing modules in all tech variants have 3 of these utility slots. I don't know if there are ways to add more of them as of yet.
In the bottom center you will find a number of utility slots. You can fit these slots with utility subsystems found within the minigame. These utilities will benefit you in various ways to help complete the hacking process.
 
Currently, all analyzing modules in all tech variants have 3 utility slots.
 
There may be ways to add more slots, but this is currently unconfirmed.


[[File:Hacking_window_start.jpg|200px|thumb|right|Hacking Window: Start]]
[[File:Hacking_window_start.jpg|200px|thumb|right|Hacking Window: Start]]
Line 117: Line 130:
[[File:Hacking_window_progress.jpg|200px|thumb|right|Hacking Window: Progress]]
[[File:Hacking_window_progress.jpg|200px|thumb|right|Hacking Window: Progress]]


'''Step III: How Hacking works'''
====Hacking Attempt====
 
You progress through the hacking grid by clicking on unconquered nodes one at a time.


The goal of the game is to reach and breach a specific node, the system core, that is hidden somewhere in the system. To work your way to the system core, you have to travel through and explore at least a certain number of other nodes. You can explore (left click) nodes adjacent to the ones you have previously conquered.
You succeed in the hacking attempt when you uncover and conquer the hidden ''System Core'' node that is present somewhere in the hacking grid. Along the way you may encounter defenses; you fail if your coherence rating drops to zero or less.


Most of the nodes will turn out to be empty, and conquering them doesn't have anything special to them. However, there are a lot of special nodes. Here is a list of all that we know of so far:
Most nodes will be empty and will do nothing. Other kinds of nodes help or hinder your progress, as noted below.


* Empty Node
Some nodes have strength and coherence ratings that oppose your own. When you uncover these kinds of nodes, you can conquer or deactivate them by left-clicking them. If you attack these kinds of nodes, your strength rating is compared to the node's coherence rating. If it is equal or higher, you conquer the node. If it is lower, you reduce the coherence rating of the node by an amount equal to your strength, but your coherence rating is lowered by an amount equal to the node's strength.
** no specific purpose; simply allows you to move on to adjacent nodes
* System Core
** breaking this will result in completing the Hacking process
** has a coherence and strength value of its own
** left click to attack
** if your viruses strength matches or is higher than the system core's coherence, it will be destroyed
** if your viruses strength is lower than the dsystem core's coherence (per attack)
*** the system core's coherence is reduced by the amount of your viruses strength
*** your viruses coherence is reduced by the amount of the system core's strength
* Data Cache
** can contain a defensive or utility subsystem
** left click to reveal content
* Defensive Subsystem
** you can not explore nodes adjacent to a defensive subsystem until you breach it
** has a coherence and strength value of its own
** left click to attack
** if your viruses strength matches or is higher than the defensive subsystem's coherence, it will be destroyed and you conquer the node
** if your viruses strength is lower than the defensive subsystem's coherence (per attack)
*** the densive subsystem's coherence is reduced by the amount of your viruses strength
*** your viruses coherence is reduced by the amount of the defensive subsystem's strength
** there are a number of different defensive subsystems
*** Firewall: high coherence, low strength
*** Anti-Virus: low coherence, high strength
*** Virus Suppressor: while active, lowers your viruses strength
* Utility Subsystem
** left click to fit to utility slot (requires an empty one)
** can be used by left clicking them, once fitted (which will consume them)
** there are a number of different utility subsystems
*** Kernel Rot: halves the coherence of target defensive subsystem or system core
*** Secondary Vector: decreases coherence of target defensive subsystem or system core by a varying amount per charge; comes with 3 charges; first charge consumed on use; second and third charge consumed one each after any interaction with the system
*** Self Repair: increases virus coherence by a varying amount per charge; comes with 3 charges; first charge consumed on use; second and third charge consumed one each after any interaction with the system


'''Step IV: Collecting the Loot'''
====Hacking Node Types====


Once you have completed the hacking process by breaking the system core, the window will close and the profession container will release a number of mini-containers, that will float away in different directions. These mini-containers will disappear after a short amount of time, and your goal is to collect as many of them as possible before they do so. To collect them, just left click the brackets in space and your ship will suck them in, which will take a couple of seconds. You can only collect one of them at a time. When your ship is free to start sucking a mini-container in, the brackets will be colored green. If you are already in the process of doing so, the target mini-container's bracket will be colored white, while all other will we yelllow to indicate your ship is busy at the moment. In any case, if you're too far (>3,500m - no typo, this one is higher than the normal interacting range) you can't loot them and their brackets will turn grey.
* '''Empty Node'''
A small icon at the left side of your HUD will be displayed for every item you acquire this way.
** You can proceed to move on to adjacent nodes.
* '''System Core'''
** The goal of each hacking attempt.
** Conquer this node to complete the hack.
** Has coherence/strength rating.
** Left-click to attack.
* '''Data Cache'''
** Contains a Defensive Subsystem or Utility Subsystem.
** Left-click to reveal contents.
* '''Defensive Subsystem'''
** Blocks you from exploring adjacent nodes until conquered.
** Has coherence/strength rating.
** Left-click to attack.
** Flavors:
*** ''Firewall:'' high coherence, low strength
*** ''Anti-Virus:'' low coherence, high strength
*** ''Virus Suppressor:'' while active, lowers your viruses strength
* '''Utility Subsystem'''
** Left-click to add to an empty utility slot.
** Later, use the utility subsystem by left-clicking the appropriate utility slot, which consumes the subsystem.
** Flavors:
*** ''Kernel Rot:'' Reduces target's coherence by 50%.
*** ''Secondary Vector:'' Reduces target's coherence by variable amount. Three charges. The first charge is consumed immediately after use, and subsequent charges are consumed after each interaction with the system.
*** ''Self Repair:'' Increases your virus coherence by variable amount. Three charges. The first charge is consumed immediately after use, and subsequent charges are consumed after each interaction with the system.


Also, for every failed hacking attempt, the number of mini-containers a specific profession container will release will increase. The overall loot however will stay the same, thus making it harder for you to collect the same amount of items.
====Loot Collection====


[[File:Hacking_minicont.jpg|200px|thumb|right|Mini-Containers: Initial Release]]  
[[File:Hacking_minicont.jpg|200px|thumb|right|Materials Containers: Ejection]]  


[[File:Hacking_minicont_busy.jpg|200px|thumb|right|Mini-Containers: Busy]]  
[[File:Hacking_minicont_busy.jpg|200px|thumb|right|Materials Containers: Busy]]  
[[File:Hacking_minicont_retrieved.jpg|200px|thumb|right|Mini-Containers: Loot Notice]]
[[File:Hacking_minicont_retrieved.jpg|200px|thumb|right|As you pick up materials containers, you'll see an indicator on your HUD letting you know how many you've collected so far.]]
 
Once you have completed the hacking process by breaking the system core, the window will close and the profession container will eject a number of ''materials containers'' that will float away in different directions.
 
Material containers disappear after a short time. Your goal is to collect as many of them as possible before they do so. To collect one, just left click the brackets in space of the container you'd like to scoop, and your ship will scoop it. This takes a few seconds.
 
You can only collect one container at a time. When your ship is free to start scooping a container again, the brackets will be green. If you're already scooping, the target material container's bracket will be colored white, while all others will be yellow to indicate your ship is busy at the moment.
 
If you're too far from a materials container (> 3,500 m) you can't loot it at all and their brackets will turn grey.
 
A small icon at the left side of your HUD will be displayed for every item you acquire this way.
 
Also, for every failed hacking attempt, the number of mini-containers a specific profession container will release will increase. However, the overall loot will stay the same, thus making it harder for you to collect the same amount of items.


[http://youtu.be/gNbGU07GgOo?t=6m22s YouTube video of hacking example]
[http://youtu.be/gNbGU07GgOo?t=6m22s YouTube video of hacking example]