Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Hacking: Difference between revisions

From EVE University Wiki
Ships and equipment: Updated this section to be more similar to the Ships and Equipment section of Scanning due to their similarity.
Line 84: Line 84:


===Ships===
===Ships===
Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, there are ships with innate bonuses to hacking.
Hacking can be done in any ship that has mid slots for Data and/or Relic Analyzers. However, there are ships with innate bonuses to hacking. These ships gain very helpful bonus to hacking module virus strength, the additional probe strength bonus helps with scanning. Nothing prevents you from doing hacking in other ships but unbonused hull places more weight on skills and knowledge.


Each race's T1 Exploration frigate has an innate role bonus of 5+ virus strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in finding hacking sites.  
Each race's T1 Exploration frigate has an innate role bonus of 5+ virus strength to both Data and Relic Analyzers. These ships also get an 7.5% (37.5% max) increase to scan strength per racial frigate level, which helps in finding hacking sites.  
Line 113: Line 113:


===Ship equipment===
===Ship equipment===
To do hacking you need either a Data Analyzer or Relic Analyzer, depending on the site. There are no relevant mid or low slot modules, but rigs are available to make hacking easier. These ships gain very helpful bonus to hacking module virus strength, the additional probe strength bonus helps with scanning. Nothing prevents you from doing hacking in other ships but unbonused hull places more weight on skills and knowledge.
To do hacking you need either a Data Analyzer or Relic Analyzer, depending on the site. There are no relevant mid or low slot modules, but rigs are available to make hacking easier.


Full list of normally used scanning equipment:
Full list of normally used scanning equipment: