Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Relic and data sites: Difference between revisions

From EVE University Wiki
Zaliek (talk | contribs)
Pirate sites: Added more name variations
Zaliek (talk | contribs)
m Pirate sites: Added site variation
Line 14: Line 14:
Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group.
Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group.


Data site containers have a physical appearance that resembles a gyroscope, and are usually named "{{co|#9ef37c|(Faction)}} Info Shard", "{{co|#9ef37c|(Faction)}} Com Tower", "{{co|#9ef37c|(Faction)}} Mainframe", "{{co|#9ef37c|(Faction)}} Data Processing Center" or "{{co|#9ef37c|(Faction)}} Backup Server". Relic Site containers resemble ancient shipwrecks and are named "{{co|#9ef37c|(Faction)}} Debris", "{{co|#9ef37c|(Faction)}} Rubble", "{{co|#9ef37c|(Faction)}} Crystal Quarry", "{{co|#9ef37c|(Faction)}} Antiquated Outpost" or "{{co|#9ef37c|(Faction)}} Stone Formation". You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
Data site containers have a physical appearance that resembles a gyroscope, and are usually named "{{co|#9ef37c|(Faction)}} Info Shard", "{{co|#9ef37c|(Faction)}} Com Tower", "{{co|#9ef37c|(Faction)}} Mainframe", "{{co|#9ef37c|(Faction)}} Data Processing Center", "{{co|#9ef37c|(Faction)}} Shattered Life-Support Unit" or "{{co|#9ef37c|(Faction)}} Backup Server". Relic Site containers resemble ancient shipwrecks and are named "{{co|#9ef37c|(Faction)}} Debris", "{{co|#9ef37c|(Faction)}} Rubble", "{{co|#9ef37c|(Faction)}} Crystal Quarry", "{{co|#9ef37c|(Faction)}} Antiquated Outpost" or "{{co|#9ef37c|(Faction)}} Stone Formation". You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.


==Drone data sites==
==Drone data sites==