Uplink: Difference between revisions

19 bytes added ,  7 June 2023
no edit summary
No edit summary
No edit summary
 
Line 23: Line 23:
* Don't do incremental upgrades, at least at the start. Either buy the best version of a program or don't buy it at all.  
* Don't do incremental upgrades, at least at the start. Either buy the best version of a program or don't buy it at all.  


* Also you can gain a ridiculous amount of money if you got the speed and the guts to do it. Sometimes you'll get a mission where they want you to hack someone's bank account to find the balance and it'll be a ridiculous amount, over $200M. What you'll need is set up an account in the bank you are going to hack, hack the bank with all the cipher crackers, transfer the money to your account in that same bank. Wipe the records of the transaction on both accounts and then do what Stelas outlined. Basically there are two types of traces: Passive and Active. Active is the countdown that you get when you are hacking. Passive doesn't give any indication that its undergoing. Even if you clear the logs and disconnect before the active trace hits you, IT personnel will follow the switch and router logs and find you. Usually within 24 hours. The bank hack I mentioned before gets a REALLY fast passive trace...measured in seconds. You get about 20 seconds to transfer the money, delete the transaction records and wipe the records at interNIC. Once you do this, you don't need to take a job again, you can dedicate yourself to the plot.  
* Also you can gain a ridiculous amount of money if you got the speed and the guts to do it. Sometimes you'll get a mission where they want you to hack someone's bank account to find the balance and it'll be a ridiculous amount, over $200M. What you'll need is set up an account in the bank you are going to hack, hack the bank with all the cipher crackers, transfer the money to your account in that same bank. Wipe the records of the transaction on both accounts and then use the safe hacking method outlined above. Basically there are two types of traces: Passive and Active. Active is the countdown that you get when you are hacking. Passive doesn't give any indication that its undergoing. Even if you clear the logs and disconnect before the active trace hits you, IT personnel will follow the switch and router logs and find you. Usually within 24 hours. The bank hack I mentioned before gets a REALLY fast passive trace...measured in seconds. You get about 20 seconds to transfer the money, delete the transaction records and wipe the records at interNIC. Once you do this, you don't need to take a job again, you can dedicate yourself to the plot.  


[[Category:Games]]
[[Category:Games]]