![]() ![]() Once you defeat the System Core, you win the game and can access the contents of the container. There is one special subsystem called the System Core. Only the game designers know why there are actually items that help you to break into the locking system hidden on grid, but whatever. When you enter a unknown node it can either be empty, contain a hostile program ( defence subsystem ), or contain one of several items that you can use to defeat the defence subsystems ( utility subsystems ). You can move your program to any node that is next to a node you already visited. Visited nodes are display orange, unknown nodes green. The nodes contents are are hidden at start of the game. The containers locking system is a grid of nodes that you can move your program through. The game is basically about moving your virus program through the defence system of the container to defeat the system core program and open the containers lock. ![]() To start your hack, you simply activate your Relic or Data Analyser on the container within 5 km, which immediately opens a new window containing the hacking mini-game. In order to open a container in a Relic or Data Site, you need to hack the locking system of the container first. If you complete the game successfully, you can loot the container like any other one through the selected item window. If the contents in the container have any value at all, you can activate your Relic or Data Analyser on it and start the hacking mini-game. There is a neat third-party site called Evepraisal, which can estimate the value of the items in your clipboard. To evaluate the price of the items, you need to select all items from the cargo scan window and press ctrl+c to copy the items to your clipboard. Just lock the container and activate the Cargo Scanner to get a list of the contents. By this you don’t waste your valuable time hacking containers that don’t contain any valuable loot. Guristas Data Siteīefore you start the hacking mini-game to open a container, you should use a Cargo Scanner to check what is inside. Data Sites contain loot that is used for invention of T2 blueprint copies, while Relic Sites contain salvage that is used to build rigging modules. īoth signatures contain a bunch of containers that you can loot as soon as you finished the so called hacking mini-game successfully. I explained how to scan these down in the previous part of this guide. This combination of subsystems makes for an extremely difficult to lose exploration ship.Data and relic sites are two types of Cosmic Signatures, that can be probed down with a Core Probe Launcher. However, the real selling point of a Tech III, in my opinion, is the Interdiction Nullifier, which ensures you won’t get trapped in cheeky bubble camps. Scanning and exploration are just one of the many fittings for a Loki, and it’s made possible by the Emergent Locus analyzer subsystem. Once again, with Tech III’s being extremely modular subsystem based platforms, you can do a lot with just the one package. Why the Stratios is a Great Late Game Exploration Ship: With similar bonuses to the Astero, this ship has all the exploration usefulness of an Astero while also being capable of holding it’s own in a fight. The Stratios is the Cruiser in the line of SOE ships released for scanning exploration. Stratios (Best Late Game Exploration Ship)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |