Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Relic and data sites: Difference between revisions

From EVE University Wiki
Djavin novienta (talk | contribs)
Drone data sites: Added names of drone regions.
Pirate sites: a bit of copyediting
Line 10: Line 10:
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]]
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]]
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]]
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]]
Pirate relic and data sites can be found in all [[k-space|normal space regions]], as well as in C1, C2 and C3 class [[Wormhole Space|wormhole systems]].  
Pirate relic and data sites can be found in all [[k-space|normal space regions]], as well as in C1, C2 and C3 class [[Wormhole Space|wormhole systems]]. They are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skillbooks and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, datacores, skillbooks, blueprint copies and manufacturing materials. The contents may vary by faction.


They follow a simple naming convention:
Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group.


Data sites in high security space they are called "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Relic sites in high security space they are called "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Each region spawns sites for the local pirate group.
Data site containers have a physical appearance that resembles a gyroscope, and are usually named "{{co|#9ef37c|(Faction)}} Info Shard", "{{co|#9ef37c|(Faction)}} Com Tower" or "{{co|#9ef37c|(Faction)}} Mainframe". Relic Site containers resemble ancient shipwrecks and are named "{{co|#9ef37c|(Faction)}} Debris" or "{{co|#9ef37c|(Faction)}} Rubble". You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
 
Pirate relic and data sites are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders.
 
Data site containers look a bit like an gyroscope, and typically have names like "{{co|#9ef37c|(Faction)}} Info Shard" or "{{co|#9ef37c|(Faction)}} Com Tower". Relic Site containers look like ancient shipwrecks and have names like "{{co|#9ef37c|(Faction)}} Debris" or "{{co|#9ef37c|(Faction)}} Rubble". These containers hold all of the site's valuables. You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container, fly within your hacking module range of it, and then use the correct module on it (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both). This will pop open a new window containing the hacking minigame. Failing the hack on same container twice will destroy the container. The explosion will not deal any damage.
 
Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skillbooks and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, datacores, skillbooks, blueprint copies and manufacturing materials. The contents vary by faction, for example, Sansha relic sites contain Intact Armor Plates for salvage.


==Drone data sites==
==Drone data sites==