More actions
m Specified which Missions require hacking: Agent Missions |
Added a System Core header and created a table that shows which Defensive Subsystem can appear in a hack |
||
| Line 5: | Line 5: | ||
[[File:Hacking_Indications.png|400px|thumb|right|The hacking minigame with systems indications.]] | [[File:Hacking_Indications.png|400px|thumb|right|The hacking minigame with systems indications.]] | ||
The goal of the hacking minigame is to '''find and disable the Container’s System Core'''. You do this by maneuvering a Virus through the board of nodes that | The goal of the hacking minigame is to '''find and disable the Container’s System Core'''. You do this by maneuvering a Virus through the board of nodes that represents the Container’s electronics. | ||
Nodes are: | Nodes are: | ||
| Line 12: | Line 12: | ||
* gray if neither explored or adjacent to explored nodes | * gray if neither explored or adjacent to explored nodes | ||
Clicking on a green unexplored node will reveal its contents: if the node is empty, it will turn orange and allow you to further explore adjacent nodes. | Clicking on a green, unexplored, node will reveal its contents: if the node is empty, it will turn orange and allow you to further explore adjacent nodes. | ||
Instead of being empty a node may contain: | Instead of being empty a node may contain: | ||
| Line 20: | Line 20: | ||
* a Data Cache | * a Data Cache | ||
If the newly explored node is empty it will briefly display a number between 1 and 5. The number says how far you are from the nearest node with a Utility Subsystem | If the newly explored node is empty it will briefly display a number between 1 and 5. The number says how far you are from the nearest node with a System Core, Utility Subsystem or Data Cache. | ||
Number: | Number: | ||
* 1 means an adjacent node is a Utility Subsystem | * 1 means an adjacent node is a System Core, Utility Subsystem or Data Cache | ||
* 2, 3 and 4 means the nearest Utility Subsystem | * 2, 3 and 4 means the nearest System Core, Utility Subsystem or Data Cache is respectively 2, 3 and 4 nodes away | ||
* 5 means you are 5 or more nodes away from the nearest Utility Subsystem | * 5 means you are 5 or more nodes away from the nearest System Core, Utility Subsystem or Data Cache | ||
The number doesn't tell you how distant you are from the nearest Defensive Subsystem. | The number doesn't tell you how distant you are from the nearest Defensive Subsystem. | ||
=== | ===System Core=== | ||
'''Defensive Subsystems | '''Finding and disabling the System Core is the goal of the hacking minigame.''' | ||
System Cores and Defensive Subsystems have: | |||
* '''Coherence''' which is its health displayed atop the icon | |||
* '''Strength''' which is its attack power displayed below the icon | |||
Your Virus’s Coherence and Strength are listed in the bottom left of the hacking window. | |||
Your Virus will attack the System Core or Defensive Subsystem when you click it. Attacking a is turn-based: your Virus attacks first, lowering their Coherence by your Virus Strength, and then the System Core or Defensive Subsystem retaliates if they survived the attack. When you reduce their Coherence to 0, it is disabled and removed from the board. | |||
You fail the hack when: | |||
* your Virus Coherence reaches 0 | |||
* close the hacking window for any other reason such as moving too far away from the Container structure | |||
If you fail the hack: | |||
* twice a Data or Relic Site Container structure will be destroyed | |||
* once a Covert Research Facility or Ghost Site Container structure will be destroyed and deal a large amount of damage to all ships in range | |||
* once a Sleeper Cache may release a toxic gas, raise an alarm or put up another obstacle | |||
The color of the System Core reflects the difficulty of the Container structure. Some Defensive Subsystems defend only the more difficult System Cores. | |||
{|class="wikitable" | |||
! scope="col" style="width: 80px;" | Difficulty | |||
! scope="col" style="width: 80px;" | System Core | |||
! scope="col" style="width: 80px;" | Firewall | |||
! scope="col" style="width: 80px;" | Anti-Virus | |||
! scope="col" style="width: 80px;" | Resto. Node | |||
! scope="col" style="width: 80px;" | Suppressor | |||
|- | |||
|Very Easy | |||
|Place Holder | |||
| style="text-align:center;" |[[File:Firewall_node.png]] | |||
| style="text-align:center;" |[[File:Antivirus_node.png]] | |||
| style="text-align:center;" |[[image:Icon_large_red_x.png]] | |||
| style="text-align:center;" |[[image:Icon_large_red_x.png]] | |||
[[File:Core node | |- | ||
|Easy | |||
| style="text-align:center;" |[[File:Core node easy green.png]] | |||
| style="text-align:center;" |[[File:Firewall_node.png]] | |||
| style="text-align:center;" |[[File:Antivirus_node.png]] | |||
| style="text-align:center;" |[[image:Icon_large_red_x.png]] | |||
| style="text-align:center;" |[[image:Icon_large_red_x.png]] | |||
[[File:Core node hard red.png| | |- | ||
|Medium | |||
| style="text-align:center;" |[[File:Core node medium orange black background.png]] | |||
| style="text-align:center;" |[[File:Firewall_node.png]] | |||
| style="text-align:center;" |[[File:Antivirus_node.png]] | |||
| style="text-align:center;" |[[File:Restorer_node.png]] | |||
| style="text-align:center;" |[[image:Icon_large_red_x.png]] | |||
|- | |||
|Hard | |||
| style="text-align:center;" |[[File:Core node hard red.png]] | |||
| style="text-align:center;" |[[File:Firewall_node.png]] | |||
| style="text-align:center;" |[[File:Antivirus_node.png]] | |||
| style="text-align:center;" |[[File:Restorer_node.png]] | |||
| style="text-align:center;" |[[File:Supressor_node.png]] | |||
|} | |||
===Defensive Subsystems=== | |||
'''Defensive Subsystems prevent you from exploring adjacent nodes until they are disabled.''' | |||
{|class=wikitable style="width: 900px;background:#111111" | {|class=wikitable style="width: 900px;background:#111111" | ||
| Line 60: | Line 111: | ||
|[[File:Supressor_node.png]] | |[[File:Supressor_node.png]] | ||
|'''Virus Suppressor''' subsystems lower your Virus Strength while active. | |'''Virus Suppressor''' subsystems lower your Virus Strength while active. | ||
|} | |} | ||
===Utility Subsystems=== | ===Utility Subsystems=== | ||
| Line 94: | Line 138: | ||
|} | |} | ||
===Data Caches=== | |||
Data Caches act a bit like a “treasure chest.” They can contain either a “treasure” (a useful Utility Subsystem), or a “trap” (a particularly nasty Defensive Subsystem). Data Caches have to be manually opened after being exposed (single-click them), so you can safely leave the decision as to whether or not to chance their activation until later on in your hacking attempt. | |||
== Skills == | == Skills == | ||