Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Player-owned starbases: Difference between revisions

From EVE University Wiki
Thabink (talk | contribs)
Line 139: Line 139:
2) POS Ewar:  Once the enemy cannot attack you back, you need to remove its ability to stop you from attacking.  Destroying the ECM, warp scrammers, webbers, and neuts removes this ability.
2) POS Ewar:  Once the enemy cannot attack you back, you need to remove its ability to stop you from attacking.  Destroying the ECM, warp scrammers, webbers, and neuts removes this ability.
NOTE:  Once a defense module goes into structure, it goes offline.  They cannot be destroyed or removed until the tower is offline.
NOTE:  Once a defense module goes into structure, it goes offline.  They cannot be destroyed or removed until the tower is offline.
3) POS Control Tower:  This is the only remaining module targetable.  Once the Tower hits 25% shields, it goes into Reinforcement Mode, where it will stay until either the Strontium Calthrates are consumed, or it is remote repped (from outside the shield) above 50% shields.  The tower CANNOT be destroyed until all Strontium is consumed.  Once the tower comes out of Reinforce, its remaining shield, armour, and hull can be burned off and the tower destroyed.  At this point, the anchored modules around and in it become free, and the attacker can take or destroy them at their whim.
3) POS Control Tower:  This is the only remaining module targetable.  Once the Tower hits 25% shields, it goes into Reinforcement Mode, where it will stay until the Strontium Clathrates are consumed.  The tower CANNOT be damaged or repaired until all Strontium is consumed.  Once the tower comes out of Reinforce, its remaining shield, armour, and hull can be burned off and the tower destroyed, or the POS shield can be repaired by remote shield transporters above 50%, at which point the tower returns to normal operationOnce the tower is destroyed the anchored modules around and in it become free, and the attacker can take or destroy them.


==Strategies for Setup==
==Strategies for Setup==