More actions
Hacking tips and tricks. |
|||
| Line 219: | Line 219: | ||
*** '''Secondary Vector''' utilities reduces a target's Coherence by a variable amount. Much like the Self Repair utility, the Secondary Vector has three charges: one used immediately, and two more that fire off after taking actions. | *** '''Secondary Vector''' utilities reduces a target's Coherence by a variable amount. Much like the Self Repair utility, the Secondary Vector has three charges: one used immediately, and two more that fire off after taking actions. | ||
*** '''Polymorphic Shield''' utilities prevent the next two instances of damage done to your virus. Good for taking down subsystems with high Strength. | *** '''Polymorphic Shield''' utilities prevent the next two instances of damage done to your virus. Good for taking down subsystems with high Strength. | ||
* '''Data Caches''' | |||
** Data Caches act a bit like a "treasure chest". They can contain either a "treasure" (a useful Utility Subsystem", or a "trap" (a particularly nasty Defensive Subsystem). Data Caches have to be manually opened after being exposed (single-click them), so you can safely leave the decision as to whether or not to chance their activation until later on in your hacking attempt. | |||
Thankfully, exploring until you find the System Core and then annihilating it isn't too difficult in the vast majority of sites you will find in high-sec. With a little practice, you'll be hacking with the best of them! | Thankfully, exploring until you find the System Core and then annihilating it isn't too difficult in the vast majority of sites you will find in high-sec. With a little practice, you'll be hacking with the best of them! | ||
=== Hacking Tips and Tricks === | === Hacking Tips and Tricks === | ||
* As a general rule, '''you'll want to explore as many nodes as you can before attacking any Defensive Subsystems.''' Restoration Nodes are an exception to this, but for the most part, it's better to explore the entire board before engaging with any subsystems: you may just stumble onto the System Core early! | |||
* '''Always pick up Utility Subsystems as soon as they are exposed.''' If you keep exploring without snagging these, a Defensive Subsystem might pop up and cut off your access to them! | |||
* '''Don't open Data Caches until you've fully explored all their adjacent nodes.''' You don't want your exploration to be cut off by an unexpected Defensive Subsystem! | |||
** Additionally, more difficult hacks contain Data Caches that might expose particularly nasty Defensive Subsystems (Restoration Nodes), so sometimes, '''you may just want to leave opening Data Caches as a last resort.''' | |||
* Because exposed Defensive Subsystems cut off access to adjacent nodes, '''you may want to explore nodes along the edges first before exploring inward'''. This is because if you happen to expose a Firewall or Anti-Virus along a "wall", you will be a bit less likely to cut off all of your movement options in that direction. | |||
== Container Collection == | == Container Collection == | ||