The following table offers a summary of the four kinds of containers found in data and relic sites. See Hacking for additional information about accessing containers.
Container table
Data Container Name
Relic Container Name
System Core
Hacking Difficulty
Where to find
Info Shard
Debris
Very Easy
HS / LS
Com Tower
Rubble
Easy
HS / LS / NS / WH
Mainframe
Remains
Medium
LS / NS / WH
Databank
Ruins
Hard
NS / WH
Site names
In addition to listing the site names, the following tables offer information regarding the difficulty in scanning down the site (levels I - IV) and the numbers of each kind of container that can be found at the site.
High security data sites
Data site name
Difficulty
Info Shard
Comm Tower
Mainframe
Databank
Local <Faction> Mainframe
I
2
-
n/a
n/a
Local <Faction> Virus Test Site
I
2
-
n/a
n/a
Local <Faction> Data Processing Center
II
3
-
n/a
n/a
Local <Faction> Shattered Life-Support Unit
II
3
-
n/a
n/a
Local <Faction> Data Terminal
III
3
1
n/a
n/a
Local <Faction> Production Installation
III
3
1
n/a
n/a
Local <Faction> Backup Server
IV
3
2
n/a
n/a
Local <Faction> Minor Shipyard
IV
3
2
n/a
n/a
Flavor text
Warp initiated (all sites)
Half-broken remnants of technology drift aimlessly throughout the vacuum; the end result of infighting, CONCORD raids or one of a thousand other common fates suffered by pirate outfits across the cluster. A Data Analyzer module will be invaluable in uncovering the secrets that are likely hidden here, locked away inside data vaults and semi-functional computerized networks.
Alternate message
A myriad of technological marvels inhabit this area of space, the physical guts of a powerful and well protected computerized network. A Data Analyzer module will be invaluable in uncovering the secrets that are likely hidden here, locked away inside data vaults and heavily encrypted digital networks.