What do you need help on? Cancel X

BOOKMARK
Jump to:
Would you recommend this Guide? Yes No Hide
Send Skip Hide

FAQ/Walkthrough by TheaN

Version: 2.20 | Updated: 05/19/16

===============================================================================
                            U   U      l         k
                            U   U      l ii      k k
                            U   U ppp  l    nnn  kk
                            U   U p  p l ii n  n k k
                            UUU  ppp  l ii n  n k  k
                                 p
             01010101 01110000 01101100 01101001 01101110 01101011
-------------------------------------------------------------------------------
===============================================================================
         ##              #        #     #           ### #           ### 
        #   ### ###  ## ### ### ###     ### # #      #  ### ###  ## # # 
        #   #   ##  # #  #  ##  # #     # # ###      #  # # ##  # # # # 
        #   #   ### ###  ## ### ###     ###   #      #  # # ### ### # # 
         ##                                 ###      #              # # 
===============================================================================
-------------------------------------------------------------------------------

-------------------------------------------------------------------------------
0   Version
-------------------------------------------------------------------------------

Version 2.20 (2016-05-19):
- Added a small portion at the post-tutorial guide how to create your first
saved connection before you start hacking Internal Service Systems.
- 'Make donations' missions can target you. This effectively turns them into 
illegitimate bank hacks; added a notion at the mission.
- Replayed both storylines: 
  - the ARC 'Trace a hacker' mission for the RevelationCore is offered randomly
  and may not appear at all, but the method works for the storyline regardless.
  - added dates when missions appear or are posted. Essentially Arunmor is 
  ahead of ARC by four days except initially and at the end.
  - during an ARC playthrough you can send Revelation to Arunmor for an 
  additional $25000, elaborated at ARC's first mission.
  - several missions were extended upon, especially those with specific LANs.
  - I've severely redone and extended upon my 'GrandTour' strategy after, once 
  again, realizing the near impossibility of ARC's final mission.

Version 2.10 (2016-05-17):
- Adjusted the frame missions to reflect both frame missions bugging out, it 
does happen with data destruction more often than banks, but I've had it 
happen for both.
- Dashes at the ranks section were somehow replaced with code; I've replaced 
them with colons as it's more natural anyway.

Version 2.00 (2016-05-16): 
- The first of my contributions to receive a complete overhaul since the birth
of my GameFAQs contributions. I'm adding a v2 overhaul section to the guide to
reflect changes. 
_______________________________________________________________________________
_______________________________________________________________________________

1.0
-------------------------------------------------------------------------------
1.1   FAQ Info
-------------------------------------------------------------------------------
Version:                2.20
Last update:            2016-05-19.
Game version:		    1.6 (last release).

-------------------------------------------------------------------------------
1.2   Introduction
-------------------------------------------------------------------------------
This is a FAQ of Qoko, known as TheaN on Gamefaqs messageboards.
My real name is Arno Middelkoop and I'm from the Netherlands. View the
credits section on how to contact me for additional info, questions or
corrections, but refrain from flaming or insulting, because it will not do
anything good. That was my introduction, on to the subject of this FAQ:

-------------------------------------------------------------------------------
1.3   Subject introduction
-------------------------------------------------------------------------------
This is, in my opinion, one of the most unique sandbox games ever released.
It offers a simulator of a hacker's practice and everything that comes with it.
I love this game, that's why I decided to make a FAQ about it quite some years
ago. I originally wrote the bank hacking guide, but decided to make a full
version. Good luck with hacking and enjoy my biggest and most elaborative work
until now.

-------------------------------------------------------------------------------
1.4   Version 2 overhaul
-------------------------------------------------------------------------------
Over the years I've gotten quite some good reviews and responses to this guide
as it is, besides a large HTML-based FAQ on Modlink, the only fullblown guide 
to a sandbox type game that's pretty complex raw. However, reading this now in
2016, 12 years (!) after its original release I'm surprised how horrendous some
parts were written. My English greatly improved going from my mid-teens to 
end-twenties as non-native speaker, and I've decided that my pet project would
be the first of my contribution list to get a major overhaul.

This was changed in version 2:

Content
=======
1) Startup guide: a guide explaining the tutorial and what to do right after,
   for new players, including some general Q&A with regards to missions.
2) Chronological upgrades list: recommendations on when to buy what throughout
   a playthrough. A guideline, not set in stone.
3) Bank hacking guide removal: it's a seperate project. I've briefly mentioned
   it in the easter eggs section as reference.
4) No more TheaN10K320: I've completely lost my own Gateway over the years, and
   lets be honest, it was completely overpowered and undervalued to begin with.

Display
=======
1) Headings: noticed that the centered headings aren't as appealing in text.
2) Listings: changed the way lists are presented, for a better overview.
3) Spelling and grammar: do excuse me if there are still minor flaws, but the 
   most obvious mistakes should have been corrected.
 
-------------------------------------------------------------------------------
1.5   Copyright
-------------------------------------------------------------------------------
This FAQ is created by me: Arno Middelkoop, aka TheaN, nowadays Qoko. 

PERSONAL USE
============
Feel free to modify for PERSONAL USE ONLY. This includes, and is pretty much
limited to, saving only sections you need onto your computer, copying/pasting
sections to print out for personal use. Once you are distributing it to sites,
magazines or selling it for profit, even without claiming it's your work, you
are breaking my copyright.

SITES ONLINE
============
You cannot copy this FAQ/Guide to your site without my permission:
- do without permission, and you're plagiarizing.
- do with permission, but change a digit, and you're plagiarizing.
Email me to grant permission on your site. Although I'll keep an eye out for
plagiarizing or changing the format. In most cases, I'll reject the offer,
unless I have proof of a good format.

Linking to any of the allowed three however, is allowed. GameFAQs and Neoseeker
both have connections to other sites, and it would be unfair to not grant them
that connection. I am not aware of any connections to supercheats, but if it's
a connection, once again, don't mail me.

Until now, these sites have permission to post:
www.gamefaqs.com        (main host)
www.neoseeker.com       (second host)
www.supercheats.com     (third host)

ILLEGAL POSTING
===============
These sites got their permission revoked:
www.dlh.net             (and connections)       
www.cheatbook.de        (and connections)

Email me if this FAQ is on one of the revoked sites or another one, but don't
false-positive any direct links.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
2.0   Table of Contents
-------------------------------------------------------------------------------
===============================================================================
Introduction                                            1.0
-------------------------------------------------------------------------------
FAQ Info                                                1.1
Introduction                                            1.2
Subject introduction                                    1.3
Version 2 overhaul                                      1.4
Copyright                                               1.5
===============================================================================
Table of Contents                                       2.0
===============================================================================
Startup guide                                           3.0
-------------------------------------------------------------------------------
Tutorial                                                3.1
Post-tutorial                                           3.2
    Creating a saved bounced connection                     3.2.1
    General mission notes                                   3.2.2
===============================================================================
Uplink basics                                           4.0
-------------------------------------------------------------------------------
HUD                                                     4.1
Long connections                                        4.2
Tracing: active and passive                             4.3
Deleting your logs                                      4.4
Gateway security                                        4.5
Save backup                                             4.6
Agent rank                                              4.7
Neuromancer rating                                      4.8
===============================================================================
Uplink Internal Service System                          5.0
-------------------------------------------------------------------------------
News                                                    5.1
Missions                                                5.2
Software list                                           5.3
Hardware list                                           5.4
Gateways                                                5.5
Faith progress                                          5.6
Rankings                                                5.7
Help                                                    5.8
===============================================================================
Security                                                6.0
-------------------------------------------------------------------------------
ID Verification                                         6.1
Voice Print Identification                              6.2
Elliptic-Curve Encryption Cypher                        6.3
Proxy                                                   6.4
Firewall                                                6.5
Monitor                                                 6.6
===============================================================================
Systems                                                 7.0
-------------------------------------------------------------------------------
Internal Service System                                 7.1
Government                                              7.2
    InterNIC                                                7.2.1
    International Stock Market                              7.2.2
    International Academic Database                         7.2.3
    International Social Security Database                  7.2.4
    Global Criminal Database                                7.2.5
Central Mainframe                                       7.3
International Bank                                      7.4
Local Area Network (LAN)                                7.5
Relevant unhackable systems                             7.6
===============================================================================
Random missions                                         8.0
-------------------------------------------------------------------------------
Steal or destroy one file                               8.1
Change academic records                                 8.2
Change social records                                   8.3
Change criminal records                                 8.4
Check account info                                      8.5
Trace a balance transfer                                8.6
Delete multiple files                                   8.7
Steal multiple files                                    8.8 
Destroy a system                                        8.9
Trace a hacker                                          8.10
Make donations                                          8.11
Removal job & frame for computer crimes                 8.12
Frame for bank fraud                                    8.13
Frame for data destruction                              8.14
===============================================================================
Awards                                                  9.0
-------------------------------------------------------------------------------
Regular storyline start                                 9.1
Complicated storyline start                             9.2
Receive email from ARC                                  9.3
    Notes on Revelation                                     9.3.1
Arunmor                                                 9.4
    'Backfire'                                              9.4.1
    'Tracer'                                                9.4.2
    'TakeMeToYourLeader'                                    9.4.3
    'ARCInfiltration'                                       9.4.4
    'CounterAttack'                                         9.4.5
Andromeda Research Corporation (ARC)                    9.5
    'Maiden Flight'                                         9.5.1
    'Darwin'                                                9.5.2
    'SaveItForTheJury'                                      9.5.3
    'SkinnyHammer'                                          9.5.4
    'GrandTour'                                             9.5.5
Mole????                                                9.6
Wargames????                                            9.7
===============================================================================
Chronological upgrades list                             10.0
===============================================================================
Easter eggs                                             11.0     
-------------------------------------------------------------------------------
Introversion software                                   11.1
Steve Jackson's game server                             11.2
Meet the makers                                         11.3
Own government records & self arrest                    11.4
Bank hacking / illegitimate money transfer to yourself  11.5
===============================================================================
Credits                                                 12.0    
===============================================================================
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
3.0   Startup guide
-------------------------------------------------------------------------------
When you start the game you'll be prompted straight away to provide login
credentials for the Uplink database. This can be anything, though beware that 
the username will be used ingame as well as display that as your user, so you
want to choose it carefully. If you are disavowed you can no longer access that
specific user and you either have to restore a backup or make a new one. After
your registration you are connected to your Gateway and you'll get your first
mission and the tutorial to open.

-------------------------------------------------------------------------------
3.1   Tutorial
-------------------------------------------------------------------------------
Part of your initial memory banks is the tutorial file. When you access your 
user for the first time, you will be prompted to run the tutorial. I'd suggest 
any new player or returning player to go through it completely; it will take 
ten minutes at best and should give you a decent overview of what Uplink has
to offer.

PART ONE
========
Part one of the tutorial contains a summarized explanation of the HUD (I go
more indepth in the next section) and everything relevant to you on screen. It
will briefly explain how to make connections also by letting you open the world
map. Going through this is basically just reading whatever is presented and 
press next when you need to.

PART TWO
========
In part two you'll attempt and then complete your first hack. The tutorial will
point you to the Uplink Test Machine. You are first required to hack it in a 
direct connection, which will obviously fail. Then the tutorial advises you to
buy a Trace Tracker v2 and use a longer connection to hack the Uplink Test
Machine. Copy the Uplink Test Data and finish the mission to end part two.

PART THREE
==========
Part three goes slightly more indepth about what to do after the tutorial. In
essence part three is what the next sections are in my guide: what the Uplink 
Internal Service System provides, how the Help section could help you get going
on more advanced security and what the influence of ranks and neuromancer 
ratings is. It ends by telling you you are eventually able to upgrade your
Gateway and get the best software and specs available.

-------------------------------------------------------------------------------
3.2   Post-tutorial
-------------------------------------------------------------------------------
The most obvious thing to do right after finishing the game's tutorial is to 
start doing some missions. Initially you'll only be offered missions to steal
or delete one file. The biggest advantage of these missions is that they can be
done in bulk, especially useful if multiple missions target one Internal 
Service System. However, there are always a few things I do before I start 
hacking properly. 

3.2.1: Creating a saved bounced connection
==========================================
Before you start hacking you should create a sufficient bounce to increase the
active trace time. Active traces are influenced greatly by active user- or 
admin account credentials. Admin credentials are revoked when an active trace
passes the system, but user accounts cannot be revoked. This can be used to 
your advantage:

1) After the Uplink Test Mission, unlink the Uplink Test Machine/Access Server.
2) Go to InterNIC and add the government systems and all banks.
3) Go to all non-Uplink banks and make a new account on each.
4) Make all of the systems highlighted systems by clicking once on the %.
5) Go to the World Map.
6) Make a bounce: InterNIC > Uplink Service System > all banks > government.
7) Save the connection.

You can use the connection indefinitely, and you can still easily connect to 
banks or government systems by simply clicking on the system you need twice: 
it will initially unbounce the system and then connect to it via the remaining 
bounces. You can increase this saved connection with File Servers once you 
start getting them, but this will be sufficient for most systems.

3.2.2: General mission notes
============================
1) Always contact the employer.
2) Ask for more money and half the money in advance. Generally the 10% bonus 
   is only given if your rank grealy surpasses the mission difficulty, but the 
   advance payment is accepted more often than not. The advantage of getting 
   the money in advance is that you can buy more software or hardware before 
   actually attempting the mission.
3) Even if missions are still out of your league but acceptable, just accept 
   them with an advance payment; you'll get to completing them eventually.
4) Whatever is generated on the mission screen is completely random. I've had
   mission lists with five file missions, but also more than ten. Some tiers of
   missions might be completely missing initially in your game, and they'll 
   only start appearing after you fastforward significantly.

As you complete about five file missions your rank will once again increase.
This will render the academic missions available. As you start to move on, it 
would be smart to check the upcoming missions and potential software you 
require to complete incoming missions. As more missions are being done, the 
higher your rank, the higher the rewards and the more difficult the missions.
Everything else you need to know is further in the guide: there isn't really
an incentive to create a complete walkthrough of this game, as it's played more
as a sandbox than anything else.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
4.0   Uplink basics
-------------------------------------------------------------------------------
This section will explain some basics of the game that are not fully explained
in detail during the tutorial but are useful to know.

-------------------------------------------------------------------------------
4.1   Headsup display
-------------------------------------------------------------------------------
A slightly more descriptive explanation about the HUD the game provides.

======
Left
======
Shows any of your links added. A % symbol means it's currently on the 
full-screen World Map, clicking it once turns it into a + which is a 
highlighted link. Clicking again makes it disappear from the map. Clicking the
X removes the link from the list. You can filter your links in the bottem line 
here. You can directly connect to any system by clicking on it, but this is ill
advised if you want to hack something.
=========
Topleft
=========
Shows the time, date, the quit symbol and your IP adress. The IP is important
as it reveals any logs related to you; anything with 127.0.0.1 is potentially
dangerous.
=====
Top
=====
Shows the game speed and CPU usage. Speed can be paused (no time expires), 
normal (second/per second), fast (ten minutes/per second) and very fast (3 
hours/per second). The usage for speeding time is to fastforward for news 
confirmation or when you need to reach a certain date. CPU usage should always
be 100% unless you're not using anything, it can however slightly bug out if 
you close a multitude of programs succesfully. You can change which program 
gets priority over others by clicking the corresponding < or > buttons which is
very important for the Password_Breaker and Decypher. 
==========
Topright
==========
Shows the world map. Click on it to get it full screen and showing your 
currently activated links. Used to make a connection. Links can have different
colors and borders:
1) Green: links that are required for missions.
2) Orange: highlighted links.
3) Dotted: links with active user credentials.
4) Bolded: links with active admin credentials.
=======
Right
=======
Shows emails, missions, hardware, memorybanks, hacker status, bank accounts or 
hardware applications, if selected.
=============
Bottomright
=============
Shows emails and missions. Clicking on one makes it appear in the right 
section. You can close, reply and delete emails and close, reply or abandon
missions there.
============
Bottomleft
============
The taskbar with software applications, hardware and more. Basically your base
of operation. From left to the right:
1) Software applications
    a) File utillities: shows any files dedicated software. 
        - Defrag
        - File_Copier
        - File_Deleter
    b) Hardware drivers: your security hardware.
        - Motion_Sensor
        - Gateway_Nuke
    c) Security: security during hacking.
        - Log_Undeleter
        - Log_Deleter
        - Log_Modifier
        - Trace_Tracker
    d) Crackers: any security cracking devices.
        - Password_Breaker
        - Dictionary_Hacker
        - Proxy & Firewall_Disabler
        - Decypher
        - Decrypter
    e) Bypassers: bypass devices, work together with the HUD analysis upgrade.
        - Proxy & Firewall & Monitor_Bypass.
    f) Other: all others, these are the common ones you can buy:
        - IP_Lookup
        - IP_Probe
        - Voice_Analyser
2) Hardware
Shows your hardware, including security devices and HUD upgrades. The gateway
can be viewed here to give you an idea of what you can still upgrade in your
current gateway.
3) Memory banks
Shows any files stored in your memory except for HUD upgrades which don't take
any space.
4) Status
Shows your Uplink rating and neuromancer rating. It also shows your criminal
record and earned awards.
5) Money
Shows all your accounts, eight max, and what the account and total balance is.
6) New email
Send an email. This is an email from scratch, you are usually better off just
replying to mission descriptions to complete a mission.
7) HUD upgrades
These are explained at the software list as they are not initially available.

-------------------------------------------------------------------------------
4.2   Long connection
-------------------------------------------------------------------------------
When you finally start to hack for your missions, go to the world map. You can
hack the system directly, but you'll be traced instantly which is not a good 
idea. First bounce to InterNIC on the world map, then to about another 10 
systems, then to the target system. More systems inbetween means a longer 
trace. Systems with accounts influence the trace time more.

You can save the connections to spare time. Let say you save a connection 
through InterNIC and eight banks, you can use it anytime. Kept even when 
logging out or when removing systems from the list. You can actually connect
to a system that's part of your chain by clicking the specific system: it will
just remove that system from the chain, and now you can click it to make it 
your final bounce.

For an idea of what connection to make, I've made a suggestion in the 
post-tutorial section.

-------------------------------------------------------------------------------
4.3   Tracing: active and passive
-------------------------------------------------------------------------------
As I mentioned above, you'll be traced. Once you hack something access related,
you'll be actively traced. If you have a trace tracker running you'll be
informed by a beep. Once this expires you'll be disconnected. Most of the time
you'll get an instant mail to let you pay a fine. If the system is compromising
enough nothing might happen straight away, but you'll be passively traced, see
below. 

Mind that the active trace is grealy influenced by systems you have an account 
on. The dotted account is an user account, a bolded line is an admin account. 
Admin accounts increase traces more than user accounts, but they are also 
revoked more quickly. As active traces get closer to your system they'll revoke
any accounts they can, though user specific accounts are unaffected. I've 
explained this in more detail at 'Creating a saved bounced connection' in the 
post-tutorial guide.

After a connection, starting from the Global Criminal Database on, you'll be 
passively traced. The feds go from system to system until they find yours and 
seize your hardware. In the last case Uplink disavows you and it is GAME OVER 
for the current user. When you are thrown off a dangerous system by the active 
trace, the passive trace will be much quicker. The key is to delete your logs 
from the moment on you start to hack the GCD or banks.

Long story short: avoid active trace completions and delete logs to avoid 
passive traces.

-------------------------------------------------------------------------------
4.4   Deleting your logs
-------------------------------------------------------------------------------
Most passive traces will find you in three days gametime. In that time you
have this intended way to avoid being traced: go to one of your systems you 
used in the connection, which is preferred InterNIC, crack the admin section 
and delete the relative logs. Relative logs apply both to the hack you are 
covering up and the acceptance of the admin section on the system you're 
accessing. For the first system in your connection it's these two logs:
1) '127.0.0.1 admin access password accepted' log. 
2) 127.0.0.1 routed to *next system* log. 
Try to get a Log Deleter v4 as soon as possible for permanent log removal.

-------------------------------------------------------------------------------
4.5   Gateway security
-------------------------------------------------------------------------------
The second way to avoid a game over is to allow the passive trace to complete 
and then to blow up your Gateway before it can be seized. This is more of a 
failsafe system rather than something to rely on. Once you have bought a Motion
Sensor and Gateway Nuke, keep the Sensor running. If at any point it goes red
you screwed something up. When this happens you have about ten seconds to blow
up your Gateway. If done so, the passive trace will void, yet you will have to
start over with a startup Gateway. Anything besides your Gateway is unaffected,
Uplink will send you an email that you nearly escaped arrest. Instead of the 
Gateway Nuke you can use Revelation instead.

-------------------------------------------------------------------------------
4.6   Save backup
-------------------------------------------------------------------------------
The third way to avoid losing your user does not involve the game. Go to the
'users' map in the Uplink directory, copy *you*.usr and *you*.tmp to another
location. Now  you can copy them back anytime you want to continue where you
just left off. Mind that when your Gateway disconnects, the .usr file in the
Uplink directory is instantly overwritten, so you'll have to backup after it
updates.

-------------------------------------------------------------------------------
4.7   User rank
-------------------------------------------------------------------------------
By completing missions, you'll raise in rank. If you abandon missions you can 
drop in rank. The higher the rank, the better mission you can do. From Elite on
all missions are acceptable, yet not all are auto-acceptable. These are all the
ranks from the first rank to the last:

Grade 16: Registered
Grade 15: Beginner
Grade 14: Novice
Grade 13: Confident
Grade 12: Intermediate
Grade 11: Skilled
Grade 10: Experienced
Grade 9: Knowledgeable
Grade 8: Uber-Skilled
Grade 7: Professional
Grade 6: Elite
Grade 5: Mage
Grade 4: Expert
Grade 3: Veteran
Grade 2: Techno-mage
Grade 1: TERMINAL

-------------------------------------------------------------------------------
4.8   Neuromancer rating
-------------------------------------------------------------------------------
Your neuromancer rating is also shown at the status screen. A rating given
by other hackers simply showing your moral values. Anything involving
individuals makes it go down, whilst anything involving companies makes it go
up. It has very little implication on gameplay but it's challenging to have a
positive rating. I'll mention at every mission if it will either raise or lower
your neuromancer rating. For what it's worth, it does go down a bit faster than
it goes up.

RANK 5: Revolutionary
RANK 4: Anarchist
RANK 3: Activist
RANK 2: Single Minded
RANK 1: Aggressive
RANK 0: Neutral
RANK -1: Untrustworthy
RANK -2: Notorious
RANK -3: Indiscriminate
RANK -4: Sociopathic
RANK -5: Morally bankrupt
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
5.0   Uplink Internal Service System
-------------------------------------------------------------------------------
The hacker's corporation main system. You'll get everything you need here: 
news reports, missions, software, hardware, Gateways and rankings. In a normal
game you would actually connect about a 1000 times to the UISS.

-------------------------------------------------------------------------------
5.1   News
-------------------------------------------------------------------------------
Shows anything that happened recently. The news is often required for missions 
to complete. Furthermore the news displays all major events in the storyline.

-------------------------------------------------------------------------------
5.2   Missions
-------------------------------------------------------------------------------
Although this has been explained to some extend in the post-tutorial section,
it's probably useful to repeat the basics. On this screen you can accept any
mission available to you. Whatever is generated is random. You can directly 
accept a mission or contact the employer. In the contact screen you can ask 
about whom or what to hack, ask for more money and a payment in advance, either
half or all. It generally works to ask for both more money and half the payment
in advance. Though the money increase is only supplied if you outrank the 
mission, the advance payment is accepted more often than not, which is really
useful to get crucial soft- and hardware upgrades for the missions at hand.

-------------------------------------------------------------------------------
5.3   Software list
-------------------------------------------------------------------------------
Here you buy your software to access target systems. All bought software is 
added instantly, unless you have insuffient money or memory. I'll give a full
list with name, versions, price, memory size, type and a description. In the
second-to-last section of the guide I present a chronological guideline when to
buy what.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Name                    Version         Cost            Size    Type
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Decrypter               1.0             $  800          2Gq     Cracker
                        2.0             $ 1200          2Gq
                        3.0             $ 1600          2Gq
                        4.0             $ 2200          2Gq
                        5.0             $ 3000          3Gq
                        6.0             $ 7000          4Gq
                        7.0             $15000          5Gq
Descripts files based on version. For example, v4.0 decrypts files with an
encryption of level 4 and below. Decrypter version and encryption level 7 is
the maximum.
-------------------------------------------------------------------------------
Decypher                1.0             $ 3000          2Gq     Cracker
                        2.0             $ 5000          2Gq
                        3.0             $ 8000          2Gq
Cracks an Elliptic-Curve Encryption Cypher. Version decides the software's 
speed. v1 and v2 are obsolete considering the minor cost difference.
-------------------------------------------------------------------------------
Dictionary_Hacker       1.0             $ 1000          4Gq     Cracker
Cracks ID passwords by using all English words. Faster than a Password_Breaker,
but can fail in finding the password because most passwords are totally random
or words from other languages. When used on an ID Verification Screen, it will
automatically crack the admin account. This can be remotely useful for earlier
missions or LAN passwords, but the Password_Breaker cracks anything regardless.
-------------------------------------------------------------------------------
File_Copier             1.0             $  100          1Gq     File Utillities
Basic tool given in the beginning. Copies one file. Can be put in your memory
banks or on any file server. Remains open after using.
-------------------------------------------------------------------------------
File_Deleter            1.0             $  100          1Gq     File Utillities
Basic tool given in the beginning. Deletes one file. Either from your memory or
from a random file server. Remains open after using.
-------------------------------------------------------------------------------
Defrag                  1.0             $ 5000          1Gq     File Utillities
Puts all memory data in the top of your memory banks. Never essential, but can
be a convenience.
-------------------------------------------------------------------------------
Firewall_Bypass         1.0             $ 3000          1Gq     Bypasser
                        2.0             $ 4000          1Gq
                        3.0             $ 6000          1Gq
                        4.0             $ 8000          1Gq
                        5.0             $10000          1Gq
Bypasses a firewall. The firewall prevents you from interacting with files. 
Version is based on security level. For example, a Bypass level 3 bypasses a 
Firewall level 3 or lower. Bypass version and security level 5 is the maximum.
REQUIRED: HUD_ConnectionAnalysis
-------------------------------------------------------------------------------
Firewall_Disable        1.0             $ 2000          1Gq     Security
                        2.0             $ 3000          1Gq
                        3.0             $ 4000          1Gq
                        4.0             $ 6000          2Gq
                        5.0             $ 8000          3Gq
Disables a firewall. Version is based on security level, see Firewall_Bypass. 
Difference with a bypass is that this requires time and it will be detected 
when using.
-------------------------------------------------------------------------------
HUD_ConnectionAnalysis  1.0             $20000          0Gq     HUD
HUD Upgrade. When used you'll see the connection between you and the target
plus all security systems. When open, bypassers can be used on the security.
It will appear directly right of the email button; it may require a reload to 
reposition the HUD buttons.
-------------------------------------------------------------------------------
HUD_IRC-Client          1.0             $ 4000          0Gq     HUD
HUD Upgrade. Let you use IRC from within Uplink. In this time and age IRC is
somewhat obsolete. You can purchase this if you want to use the Uplink IRC or
want to max out your purchases.  It will appear directly right of the 
ConnectionAnalysis; it may require a reload to reposition the HUD buttons.
-------------------------------------------------------------------------------
HUD_MapShowTrace        1.0             $ 5000          0Gq     HUD
HUD Upgrade. Shows an active trace on the mini-world map. Connection lines 
displayed in red are traced, white is remaining. Has the same kind of usage as
the Trace_Tracker, but won't use the CPU. It appears on the world map when an 
active trace starts.
-------------------------------------------------------------------------------
HUD_LANView             1.0             $50000          0Gq     HUD
Once connected to a LAN router you can't do anything, unless you're having this
HUD. When clicking on it will show the current connected LAN and you'll be able
to crack through it with LAN software. It will appear directly right of the
LANView; it may require a reload to reposition the HUD buttons.
-------------------------------------------------------------------------------
IP_Lookup               1.0             $  500          1Gq     Other
Scans given IP and gives name of the system. The system is added to the links
list if it's a new link. Useful for 'Trace balance transfer' missions, required
for 'Trace a hacker' missions.
-------------------------------------------------------------------------------
IP_Probe                1.0             $ 2000          3Gq     Other
                        2.0             $ 4000          3Gq
                        3.0             $ 5000          3Gq
Scans given IP for connection security. The info is sent in an email.
V1.0 = provides security.
V2.0 = provides security and levels.
V3.0 = provides security, levels and their status (enabled/disabled).
Remotely useful if you do not yet have the HUD_ConnectionAnalysis and lv5 
bypassers, but by the time connection security becomes a problem you should
probably have that instead.
-------------------------------------------------------------------------------
LAN_Probe               1.0             $15000          3Gq     LAN Tools
                        2.0             $20000          3Gq
                        3.0             $30000          4Gq
Scans a standalone LAN system, gives connections to other systems, but does not
provide the identity of the connected systems. Closed locks can't be probed.
Version is based on the LAN Level, 1-3. This can't be checked anywhere, better
to buy the v3.0 LAN software over the 1.0 and 2.0. When the LAN level is higher
than your software level, the software can't be used at all. Level and version
3.0 is the maximum.
-------------------------------------------------------------------------------
LAN_Scan                1.0             $10000          2Gq     LAN Tools
                        2.0             $15000          2Gq
                        3.0             $25000          2Gq
Scans the whole LAN for all systems, those behind a closed locks won't be 
detected. Version is based on the LAN level, see LAN_Probe.
-------------------------------------------------------------------------------
LAN_Spoof               1.0             $20000          2Gq     LAN Tools
                        2.0             $30000          3Gq
                        3.0             $45000          5Gq
Spoofs any cracked subnet. Once a subnet terminal is spoofed, you can connect
to the corresponding system. Version is based on the LAN level, see LAN_Probe.
-------------------------------------------------------------------------------
LAN_Force               1.0             $15000          2Gq     LAN Tools
                        2.0             $20000          3Gq
                        3.0             $25000          4Gq
Cracks any locks. The system admin will log on and start chasing you and an 
active trace will start. If you're planning to do things silent, you don't 
need this. However, there are situations where you can get stuck in front of an
isolation bridge, and then Force is the only thing that can still break the 
lock. Version is based on the LAN level, see LAN_Probe.
-------------------------------------------------------------------------------
Log_Deleter             1.0             $  500          1Gq     Security
                        2.0             $ 1000          1Gq
                        3.0             $ 2000          1Gq
                        4.0             $ 4000          1Gq
Deletes logs.
Version 1.0 =   Leaves empty log behind.
Version 2.0 =   Leaves blank space behind.
Version 3.0 =   Cover up with other logs.       
Version 4.0 =   Shifts logs after deletion.
Essentially, only the v4 log deleter will prevent any detection at all. Though
the v3 is very safe it will still allow you to be passively traced after
hacking the most sophisticated systems, so the Log_Deleter v4 should just be 
bought when one starts to hack the Global Criminal Database.
-------------------------------------------------------------------------------
Log_Modifier            1.0             $ 4000          2Gq     Security
                        2.0             $ 6000          2Gq
Changes logs or creates them.
Version 1.0 =   Change existing logs.
Version 2.0 =   Create new logs in empty spaces and change existing logs.
As you never actually have to create new logs v1 will suffice. Used in frame 
missions.
-------------------------------------------------------------------------------
Log_Undeleter           1.0             $ 5000          1Gq     Security
Recover deleted or changed logs. Use it on a log or empty space to make it 
change, if changable of course. Used in trace missions.
-------------------------------------------------------------------------------
Monitor_Bypass          1.0             $10000          1Gq     Bypasser
                        2.0             $12000          1Gq
                        3.0             $16000          1Gq
                        4.0             $20000          1Gq
                        5.0             $25000          1Gq
Bypasses the monitor. Version is based on security level, see Firewall_Bypass.
Used to prevent detection for almost all access cracking software, except ID
Verification admin accounts.
REQUIRED: HUD_ConnectionAnalysis
-------------------------------------------------------------------------------
Password_Breaker        1.0             $ 1500          1Gq     Cracker
First tool you buy. Cracks ID Passwords, by using all digits. Slower than
the Dictionary_Hacker but can find all passwords, because it cracks digit by
digit. When used on an ID Verification Screen, it will automatically crack the
admin account.
-------------------------------------------------------------------------------
Proxy_Bypass            1.0             $ 6000          1Gq     Bypasser
                        2.0             $ 8000          1Gq
                        3.0             $12000          1Gq
                        4.0             $16000          1Gq
                        5.0             $20000          1Gq
Bypasses the proxy. The proxy prevents you from interacting with most in the 
admin section: security, logs and the console among others. Version is based on
security level, see Firewall_Bypass.
REQUIRED: HUD_ConnectionAnalysis
-------------------------------------------------------------------------------
Proxy_Disable           1.0             $ 3000          1Gq     Security
                        2.0             $ 4000          1Gq
                        3.0             $ 6000          1Gq
                        4.0             $ 8000          2Gq
                        5.0             $10000          3Gq
Disables the proxy. Version is based on security level, see Firewall_Bypass.
Difference with a bypass is that this requires time and it will be detected 
when using.
-------------------------------------------------------------------------------
Trace_Tracker           1.0             $  300          1Gq     Security
                        2.0             $  600          1Gq
                        3.0             $ 1400          2Gq
                        4.0             $ 2500          3Gq
Second tool you should buy. Shows any progress on active traces.
V1.0: shows that a trace is active.
V2.0: shows that a trace is active and percentage done.
V3.0: shows that a trace is active and the exact time remaining.
V4.0: v3 with a realtime remaining time estimation added.
For any version above 2.0: the more CPU the Trace_Tracker is using, the more
accurate the percentage or exact time remaining: for v4 this counts ONLY for
the exact time remaining, making v4 considerably more useful than v3.
-------------------------------------------------------------------------------
Voice_Analyser          1.0             $ 5000          4Gq     Other
                        2.0             $10000          5Gq
Voice capture device. v1 scans any given voice and changes it into the admin 
verification line. You need this to hack the admin of Central Mainframes, 
International Banks and LANs. v2 gives you the possibility to store the voice
data: click the analyser, and click an empty memory space to store the data for
1Gq. To download that data to the analyser: open the analyser and click the 
data while having the analyser selected. The v2 feature is great for
corporations you will be hacking multiple times.

-------------------------------------------------------------------------------
5.4   Hardware list
-------------------------------------------------------------------------------
Make your Gateway and CPU better by upgrading your hardware. Hardware will be
installed by Uplink, it starts after ~12-18h and will be completed in about
30-60 minutes. This list is divided by processors, memory, modems and security.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Name                    Speed/Amount    Cost        Price per Ghz/Gq
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Processors               20Ghz          $  250      $ 12.50
                         60Ghz          $ 1000      $ 16.66
                         80Ghz          $ 1300      $ 16.25
                        100Ghz          $ 3000      $ 30 
                        120Ghz          $ 5000      $ 41.66
                        150Ghz          $ 8000      $ 53.33
                        200Ghz          $12000      $ 60
What the Gateway is running on. The faster is it the faster it cracks 
security, copies and deletes files, and deletes and shifts logs. In the endgame
you want to fill up your Gateway with the maximum of 200Ghz processors: mind 
that the price per Ghz greatly increases as processor power does, but the 
limitation is the amount of CPU slots in your Gateway.
-------------------------------------------------------------------------------
Memory                   8Gq            $ 3000      $ 375
                        16Gq            $ 5500      $ 343.75
                        24Gq            $ 8000      $ 333.33
                        32Gq            $11000      $ 343.75
Fills your Gateway with 8Gq memory slots. Buying 24Gq slots plus the rest is 
always the cheapest, which I reckon was an oversight by the developers. To 
elaborate, 24Gqs it's the lowest price per Gq, whilst 24Gq + 8Gq is as 
expensive as one 32Gq module and 24Gq + 16Gq is cheaper than 32Gq + 8Gq. On or 
above 48Gq price differences repeat themselves.
-------------------------------------------------------------------------------
Modems                   1Gq/sec        $ 1000      $ 1000
                         2Gq/sec        $ 2000      $ 1000
                         4Gq/sec        $ 4000      $ 1000
                         6Gq/sec        $ 6000      $ 1000
                         8Gq/sec        $ 8000      $ 1000
                        10Gq/sec        $10000      $ 1000
Your bandwidth connection to other servers. Essentially, the modem does not
influence your hacking speed greatly, but it interacts with the processor: the
more you upgrade your CPU speed, the more influencial a modem upgrade becomes.
Given the small cost, upgrading to the quickest modem possible will usually be
a good idea.
-------------------------------------------------------------------------------
Gateway Security        Motion Sensor   $10000
                        Self-destruct   $20000
Protects you from the authorities. If the sensor is black, nothing is
happening. If it's yellow, Uplink is performing hardware upgrades. Red is bad
news, the authorities are close to your proximity location. When it goes red,
and ONLY then, you can use the self destruction device to start over with an
original Gateway instead of being disavowed. For what it's worth, normally one
system is useless with the other: a passive trace continues if you blow up your
Gateway unprovoked. However, there is a way to make a single Motion Sensor 
useful, and that is to use Revelation as a Gateway reset instead of the Nuke.
-------------------------------------------------------------------------------

-------------------------------------------------------------------------------
5.5   Gateways
-------------------------------------------------------------------------------
This will list all the Gateways given by Introversion, plus how to create your
own. Every Gateway has its own cost: a new Gateway is the normal value minus
75% of the value of your current Gateway. By default I proceed VIRTUANET >
ZION > AM-CORE and then TRINITY well before the last storyline mission.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Name                    CPU's           Security        Bandwidth       Memory 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
GatewayALPHA            1               0               1Gq/Sec         32Gq
Cost:                   $15000
The basic Gateway, given to all agents. Carries the minimum amounts possible.
-------------------------------------------------------------------------------
GatewayALPHA 1CPU       2               0               1Gq/Sec         32Gq
Cost:                   $20000
Just one extra CPU. Not really worth the money for the upgrade per se. The
extra CPU can help quite decently but for just the extra 7000 you should save 
for the VIRTUANET, which enables you to get especially the memory
-------------------------------------------------------------------------------
GatewayALPHA 1MEMORY    1               0               2Gq/Sec         64Gq
Cost:                   $20000
Better modem and more memory, yet still inferior to the 1CPU Gateway: at the
early game more memory is not necessary. Either buy the 1CPU or the VIRTUANET.
-------------------------------------------------------------------------------
VIRTUANET R-Acces       2               0 (*)           2Gq/Sec         48Gq
Cost:                   $27000
Useful allround Gateway upgrade early on. Definitely worth a buy. 
*supposingly the transmitter gives you anonimity and prevents disavows. I never
tested this myself and I don't find the need to: just clear the logs anyway.
-------------------------------------------------------------------------------
KRONOS Corp 80-860      2               1               4Gq/Sec         64Gq
Cost:                   $38000
Upgraded modem and memory from the VIRTUANET but that's minor in comparison. 
The single security system is pointless unless you have Revelation, which you
should not have at this point in the upgrade tree. You should wait for ZION or 
the AM-CORE.
-------------------------------------------------------------------------------
ZION-780 Workstation    3               2               6Gq/Sec         96Gq
Cost:                   $50000
Midupgrade allround Gateway and a step up to the final Gateways. Two security 
slots, faster modem and good memory capacity. This is relatively the best 
price-quality Gateway.
-------------------------------------------------------------------------------
UNITY High-Security     4               4               6Gq/Sec         64Gq
Cost:                   $80000
This is one of the worst designs Introversion came up with. Its only pro is the
additional CPU which is not critical. It has less memory and the third and
fourth security slots are completely obsolete. It looks nice, but has no
function whatsoever. Wait for the AM-CORE.
-------------------------------------------------------------------------------
AM-CORE File Server     3               2               10Gq/Sec        256Gq
Cost:                   $100000
The second best or best Gateway, based on personal preference. Highest memory 
capacity, fastest modem and two security systems. The only lack is the triple 
CPUs. A monitor bypass can prevent early detection endgame and the only real 
reason you'd want more CPU power is to simply break through stuff more 
quickly, it's not vital. In the endgame the TRINITY should be prefered, but
whilst you're doing multiple file missions, go with AM-CORE.
-------------------------------------------------------------------------------
OMEGA Supercomputer     16              1               4Gq/Sec         48Gq
Cost:                   $100000
A very fast Gateway but lacking on all other accounts. The worst of the final
Gateways, given that the difference between 8 and 16 CPUs is as good as 
neglecible. If you want high speed, go with the TRINITY. Mind that even if 
you'd prefer the CPU speed over anything else, 48Gq is not even enough to have 
all software.
-------------------------------------------------------------------------------
TRINITY-1686A           8               2               8Gq/Sec         128Gq
Cost:                   $125000
The best allround Gateway. It is very balanced, however, the second best modem 
and half the memory of the AM-CORE makes the AM-CORE competitive. Decide 
whether you want more memory for file missions or higher speed to crack through
stuff more quickly in general and base your decision on that. My preference 
goes to the TRINITY for the fact that multiple file missions are somewhat 
uncommon endgame: you can always do them in two hacks instead of one, 
especially if all other missions are faster due to the five additional CPUs.
-------------------------------------------------------------------------------

CREATE A GATEWAY
================
You can actually create a gateway yourself. This needs:
- A *Gateway Name*.tif file, the Gateway itself, not bigger than 400x300.
- A *Gateway Name*_t.tif file, the thumbnail, not bigger than 200x140.
- A *Gateway Name*.txt file, with locations of its hardware and a description.
To get this, you must change all .DAT files (except for data and world) in your
game directory to .ZIP. Extract them in the same folder. Now you can throw away
the ZIP files if you want. Now the .TIF files need to be copied into 
uplink/graphics/gateway and the .TXT in uplink/data/gateways. For how to make a
TXT or TIF files, please go to www.modlink.net for tutorials, it's beyond the
point of this guide.

-------------------------------------------------------------------------------
5.6   Faith progress
-------------------------------------------------------------------------------
This will state the difference in version between Faith and Revelation, which
differ between v1.0 and v4.0. Not that important, although it's interesting to 
see the version drop or raise by actions, either by you or other agents. See 
the Awards section for more info.

-------------------------------------------------------------------------------
5.7   Rankings
-------------------------------------------------------------------------------
All agents in the top 10 are displayed here. If you aren't in the top 10,
you'll be mentioned  in a line below the 10, stating your position. Of these
agents will also be mentioned if they're either 'Active', 'Deceased' or
'In Jail', the latter because of your actions.

-------------------------------------------------------------------------------
5.8   Help
-------------------------------------------------------------------------------
The game's somewhat elaborative help section. Give it a read if you want, but
you should be able to find any info you need in this guide a bit more to the 
point.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
6.0   Security
-------------------------------------------------------------------------------
This sections contains all access and connection security systems you will come
across.
-------------------------------------------------------------------------------
Security type:          access or connection.
Compromising software:  possible software to crack the security.
Best software:          best software to crack the security.
Time to hack:           an approximation of hack duration.
Systems:                systems the security is on.
-------------------------------------------------------------------------------
A full description.

-------------------------------------------------------------------------------
6.1   ID Verification
-------------------------------------------------------------------------------
Security type:          access.
Compromising software:  - Dictionary_Hacker
                        - Password_Breaker
Best software:          Password_Breaker
Time to hack:           average.
Systems:                all hackable systems.
-------------------------------------------------------------------------------
The first access security. You need to give an username and password to
proceed. To hack the admin, just run the Password_Breaker and click on either
the user or password section. Make sure to max out the CPU speed on the
breaker. There are a few systems which you either have the login info for or it
can't be hacked. The Dictionary_Hacker works, but only for the first few
systems. Mind that the ID Verification is the only security that ignores a
monitor bypass once you proceed; you gained unauthorized access to an admin
account and will be traced.

readwrite
=========
Government systems have an option of a readwrite- and readonly account, besides
admin. The readwrite will suffice for the missions: in contrary to the admin
account you won't be actively traced if you have a monitor bypass running.
Government missions made easy.

-------------------------------------------------------------------------------
6.2   Voice Print Identification
-------------------------------------------------------------------------------
Security type:          access.
Compromising software:  Voice_Analyser
Best software:          Voice_Analyser 2.0
Time to hack:           approximately five seconds (fixed).
Systems:                Central Mainframes, Banks and Main Servers.
-------------------------------------------------------------------------------
Quite easy to compromise and without risk.
- Buy the Voice_Analyser.
- Go to InterNIC and connect to the the company's Public Access Server.
- Activate the admin's link.
- Call him and keep the Voice_Analyser running.
- Once in the Voice Print Identification, play the Voice_Analyser.
If you're not using a monitor bypass, you won't be detected while the Analyser
repeats the sentence, it will begin after you proceed. Mind that you do not
need a long connection for the access server nor the admin's telephone line,
despite that it generates clear leads to your Gateway if you hack one of their
systems afterwards.

-------------------------------------------------------------------------------
6.3   Elliptic-Curve Encryption Cypher
-------------------------------------------------------------------------------
Security type:          access.
Compromising software:  Decypher 1.0 - 3.0
Best software:          Decypher 3.0
Time to hack:           above average.
Systems:                GCD, Banks and Authentication Servers. 
                        CM and ISS of ARC & Arunmor.
-------------------------------------------------------------------------------
A randomly generated cypher. The code will slowly be decyphered and make you
ready for progress. This is by far the toughest access security to crack, yet
with a monitor bypass you avoid detection at all. To start, click the decypher
tool, and click on the encoding. Make sure to maximize the CPU speed on the
decypher.

-------------------------------------------------------------------------------
6.4   Proxy
-------------------------------------------------------------------------------
Security type:          connection.
Compromising software:  - Proxy_Disable 1.0 - 5.0
                        - Proxy_Bypass 1.0 - 5.0
Best software:          Proxy_Bypass 5.0
Time to hack:           above average (disabler).
Systems:                all high security systems.
-------------------------------------------------------------------------------
The proxy prevents you from uing the console, deleting logs and statements, 
changing government records and disabling the connection security in the admin
section. All of these are very annoying. Proxy is the security you'd want to 
compromise for pretty much all endgame systems, except when stealing multiple 
files. Mind that if you use the console for anything file related, the firewall
needs to be compromised as well. An offline proxy allows you to disable 
the other connection security in the admin section of a system, essentially 
voiding the need for firewall software: I'd recommend it anyway. If you're 
using a proxy disable, start it before hacking anything else and start hacking 
access security once the active trace starts.

-------------------------------------------------------------------------------
6.5   Firewall
-------------------------------------------------------------------------------
Security type:          connection.
Compromising Software:  - Firewall_Disable 1.0 - 5.0
                        - Firewall_Bypass 1.0 - 5.0
                        - (Proxy sofware)
Best software:          Firewall_Bypass 5.0
Time to hack:           above average (disabler).
Systems:                all systems with files, except for some ISSs.
-------------------------------------------------------------------------------
The firewall prevents you from doing anything file related: copying, deleting,
adding or running. The firewall is a system you want to compromise when you are
dealing with file missions. Mind that breaking the proxy enables you to break
the firewall in the security section of as system, yet I'd recommend firewall 
software for convenience. If you're using a firewall disabler, start it before 
hacking anything and start cracking access security once the active trace 
starts.

-------------------------------------------------------------------------------
6.6   Monitor
-------------------------------------------------------------------------------
Security type:          connection.
Compromising software:  Monitor_Bypass 1.0 - 5.0
Best software:          Monitor_Bypass 5.0
Time to hack:           N/A
Systems:                almost all.
-------------------------------------------------------------------------------
If you bypass the monitor, the only action that will still start an active
trace is proceeding after hacking an admin ID Verification. Any other security
system will not trigger a trace with a bypassed monitor. Essentially this means
that with a bypass you can hack anything but the ID (first) without being
detected. Near mandatory for LANs, very useful for others. Interesting to note
that with an offline proxy you can also turn off the monitor security in the 
admin section of a system, but this is useless as the trace already began.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
7.0   Systems
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
7.1   Internal Service System
-------------------------------------------------------------------------------
ADMIN SECURITY:
- ID Verification
- (RARE) Elliptic-Curve Encryption Cypher (Uplink only)
CONNECTION SECURITY:
- Proxy:    few     (1/2/3)
- Firewall: few     (1/2/3)
- Monitor:  most    (1)
        
Length of connection:   5-10.
Active trace:           average, fee if completed.
Passive trace:          none.
-------------------------------------------------------------------------------
The systems you are required to hack right after hacking the Uplink Test
Machine. In the first missions these will have no proxy and firewall, while 
they have later on. You'll be using the file server or console on these 
systems. Watch the active trace, otherwise these aren't as dangerous.

-------------------------------------------------------------------------------
7.1   Government systems
-------------------------------------------------------------------------------
7.2.1:  INTERNIC
-------------------------------------------------------------------------------
ACCESS SECURITY:
- ID Verification (fixed credential)

Active trace:           none.
Passive trace:          none.
-------------------------------------------------------------------------------
The link directory from the government. Every link can be added here to your 
links, by pressing the + near a link. InterNIC itself has a filter function, 
so that you can find your needed links easily. InterNIC doesn't have:
- Central Mainframes.
- LANs, except for the Sample LAN.
- Phone systems.
- Personal computers.
- Secret systems.
InterNIC is ideal for log deletion: the credentials are fixed for one user 
there is no trace nor any other security. It is a matter of connecting directly
to InterNIC, access the admin section with a known password and delete the 
relevant logs.

7.2.2: INTERNATIONAL STOCK MARKET
-------------------------------------------------------------------------------
ACCESS SECURITY:
- ID Verification
CONNECTION SECURITY:
- Proxy:    always  (1)
- Monitor:  always  (1)

Active trace:           relatively slow.
Passive trace:          none.
-------------------------------------------------------------------------------
The global stock market. Create a user and you're ready to roll. I've never
used this though, stocks only update each month, way too unreliable to work
well. The idea is that if you've helped a certain company multiple times their
stock value will increase the next month. In the end, the money gained from
this is somewhat insignificant compared to just mission grinding. 

7.2.3: INTERNATIONAL ACADEMIC DATABASE
-------------------------------------------------------------------------------
ACCESS SECURITY:
- ID Verification
CONNECTION SECURITY:
- Monitor:  always  (1)

Active trace:           very slow, warning if completed.
Passive trace:          none.
-------------------------------------------------------------------------------
When you raise to rank Novice, things are starting to get serious. Well, not
just yet. Very slow active trace, and if they find you you'll be warned.
Multiple academic missions can be done at once.

7.2.4: INTERNATIONAL SOCIAL SECURITY DATABASE
-------------------------------------------------------------------------------
ACCESS SECURITY:
- ID Verification
CONNECTION SECURITY:
- Proxy:    always  (1)
- Monitor:  always  (1)

Active trace:           relatively fast, $1000 fine if completed.
Passive trace:          none.
-------------------------------------------------------------------------------
This system isn't that dangerous, but you'll come across your first proxy,
and an above average trace. As you can see, for the proxy you only need a
level 1 disabler and that's what I recommend when the the related missions
first appear.

7.2.5: GLOBAL CRIMINAL DATABASE
-------------------------------------------------------------------------------
ACCESS SECURITY:
- ID Verification
- Elliptic-Curve Encryption Cypher
CONNECTION SECURITY:
- Proxy:    always  (1)
- Monitor:  always  (1)

Active trace:           fast.
Passive trace:          3 hours, active trace completion, 1 day normally.
-------------------------------------------------------------------------------
Your first passive trace system. It comes with an Elliptic-Curve Encryption
Cypher, so have your decypher ready. Because the Criminal Database also comes
with proxy, you'd want a monitor bypass (for readwrite), a long trace or a
somewhat fast CPU. You can actually clear your own record if you have one, 
preventing any contract issues with random missions.

-------------------------------------------------------------------------------
7.3   Central Mainframe
-------------------------------------------------------------------------------
ACCESS SECURITY:
- ID Verification
- Voice Print Identification
- Elliptic-Curve Encryption Cypher (ARC & Arunmor only)
CONNECTION SECURITY:
- Proxy:    always  (1, 5)
- Firewall: always  (1, 5)
- Monitor:  always  (1, 5)

Active trace:           fast.
Passive trace:          3 hours, active trace completion, 1 day normally.
-------------------------------------------------------------------------------
A step up in the hacking world. The main system of a company. Fast trace and a
high risk. You'll be mostly here to destroy the system. Make sure when hacking
these that when you bypass monitor, you first hack the voice print before doing
the ID. If you're here to destroy the system, you need to disable or bypass
both the firewall and proxy. Companies with high security will have level 5
connection security, otherwise level 1.

-------------------------------------------------------------------------------
7.4   International Bank
-------------------------------------------------------------------------------
ACCESS SECURITY (account):
- ID Verification (requires account number)
ACCESS SECURITY (admin):
- ID Verification
- Voice Print Identification
- Elliptic-Curve Encryption Cypher
CONNECTION SECURITY:
- Proxy:    always  (1, 5)
- Monitor:  always  (1, 5)

Active trace:           very fast.
Passive trace:          3 hours, active trace completion, 1 day normally.
    Personal transfer:  20 seconds (!!).
-------------------------------------------------------------------------------
Accounts are almost as internal service systems and are relatively easy, though
mind the fast active trace. The admin section is more complicated which is 
required for tracing an unauthorized money transfer. If you are attempting a 
personal transfer be ready to delete both the sending statement and receiving 
statement within twenty seconds at best: any later and you'll be near instantly
disavowed. I've given more info in my seperate document or at the sandbox guide
for a personal transfer.

-------------------------------------------------------------------------------
7.5   Local Area Network (LAN)
-------------------------------------------------------------------------------
ACCESS SECURITY:
- ID Verifications
- Voice Print Identification (Main Server)
- Elliptic-Curve Encryption Cyphers (Authentication Servers)
CONNECTION SECURITY:
- Proxy:    always  (1, 5)
- Monitor*: always  (1, 5)

Active trace:           relatively slow + admin log on chase.
Passive trace:          3 hours, active trace/chase completion, 1 day normally.

*the monitor bypass for LANs works differently. Connecting to the main server
will in fact prompt the admin to log on and the trace to start. It keeps you
under the radar for anything else though and is highly recommended.
-------------------------------------------------------------------------------
A LAN is a standalone network of multiple computers that each have their own
function within the network. Your goal is to find and hack the Main Server and
do whatever is necessary there.
 
LAN startup tutorial: once you connect to a LAN, open the HUD_LANViewer. What
you probably will see is the router. Bypass the monitor first. Now open the
LAN_Scan tool and use it. The LAN will expand and seperate systems will become
visible. Open the LAN_Probe tool and click on the router, and it will discover 
the systems connected to the router. Continue probing until you encounter 
locks, you cannot continue or you reach the Main Server. Locks can be unlocked 
in several ways explained below. If there are no locks, but you are stuck 
anyway, connect to terminals for phone numbers. Your goal, as stated, is to 
find the Main Server and get access to it.

Small recap before I explain all systems:
- LAN_Scan shows all parts except those behind active locks.
- LAN_Probe will be your basic software to discover systems.
- If you're stuck, search in terminals for phone numbers.
- A monitor bypass is crucial for a LAN: see the system summary for more info.

ROUTER:
The starting system. Probe this and you'll be in the LAN. It's wise if you
start with the LAN to scan it. You'll see the whole LAN except for systems
behind active locks.

HUB:
As it says, basically. No hacking here, probe on.

TERMINAL:
The basic system in a LAN. Terminals have several purposes to proceed in the
LAN, but are not required by default. If you don't know if they do don't waste
your time hacking them unnecessarily. You only need to hack a password if you 
need to hack a terminal. They can provide:
- Wireless Transmitter's frequency: see the transmitter specifically.
- Modem's phone number: IP_Lookup to connect to another portion of the LAN.
- Subnet: opens the connection to an Authentication Server. See 'Subnet'.

LOCKS:
These block your path. There are three ways to open them:
- Authentication Server: just disable the lock after hacking it.
- Isolation Bridge: one lock opens, one closes, visible on the HUD which.
- LAN_Force: breaks a lock, but prompts an admin log on and active trace as if
  you accessed the Main Server. Last resort software. Force is ideal to use 
  when you know you're close to the Main Server: you would have gotten the 
  trace upon connecting to the Main Server anyway.

AUTHENTICATION SERVER:
Opens locks. Protected by a password and Elliptic-Curve Encryption Cypher, so
you've got some hacking to do. Again though, you're not detected if you use a
monitor bypass. You can see which lock it unlocks, by yellow dots with the
text: locks/unlocks. These can be protected by Subnets.

SUBNET:
Always a terminal, a Subnet opens the connection to an Authentication Server.
You can see which terminals are subnets by clicking on the Authentication
Server. To spoof a Subnet, hack the corresponding terminal, disconnect from it
and spoof the terminal. Now you can access the Authentication Server. In rare
occasions subnets can protect another terminal to prevent probing said system.

ISOLATION BRIDGE:
One lock opens, one closes. If you enable the bridge, you'll be resetted to
the connected router or modem. Both locks that are (un)locked will usually be
close together. The bridge has no login security, so it's just matter of using
the right setting.

WIRELESS TRANSMITTER/RECEIVER:
Internal connection within the LAN. By using the right transmitter frequency,
you'll reach the receiver. Frequencies are usually stored on a standalone
terminal. This connection won't reset the admin's log on; he will have to use
the transmitter himself to get to you.

MODEMS:
External connection to the LAN. If there's no obvious way to continue on your
current LAN connection, search for a phone number on a terminal. If you
have one, disconnect, IP_Lookup, and reconnect to the part of the LAN that was
just looked up. The system admin's log on will start from the Modem. In some
occasions modems will be connected to the main part of the LAN, yet you are 
required to log on to them to bypass a complicated setup with an Isolation
Bridge: in this case, the Modem itself provides the phone number as well.

MAIN SERVER:
Basically identical to Central Mainframes. One difference on LANs is that
immediately upon connecting to the Main Server the admin will log on, starting
a chase and active trace. He will log on to the router or modem that is
connected to the main server. The admin trace will be like a map trace and
there's no real indication of how fast he is; just check the LAN periodically
when you are busy in the Main Server and log off if he's about to reach it.

Modem to Main Server bug
========================
It is possible that the Main Server is the very first system to be connected to
a modem. This makes the admin chase a matter of seconds and extremely 
difficult to do anything on the Main Server. In order to give yourself some 
extra time, connect once, hack the voice print and disconnect. The voice print
will still be enabled, so reconnect to the modem again and break the ID 
verification on the Server ASAP. Now you have about five to ten seconds to 
delete or copy a few files before you have to disconnect. You can repeat this 
process until you are done with the mission.

Protected Main Server & required LAN_Force
==========================================
For the higher protected LANs Main Servers may in fact be connected closely to
the Router, yet not accessible without breaking three guardian locks. This is
similar to how subnets work for Authentication Servers. In most occasions the
locks will be the final parts of the LAN's sections, and no way of opening them
conventionally. In this case LAN_Force is actually required. The idea is to
hack your way up to probing all three locks, then force them all 
subsequentially. In this case you can reconnect after forcing said locks, as 
the Main Server will still be accessible.

-------------------------------------------------------------------------------
7.6   Relevant unhackable systems
-------------------------------------------------------------------------------
Five common systems that are not hackable. They do have purposes though.

PUBLIC ACCESS SERVER:
As it says, a Public Access Server. These supply the phone numbers of the
company's admin and director, so that you can use the voice analyser on them.
The link of the phone number can be added by clicking on the +. Public Access
Servers are ideal to use to connect to a Central Mainframe, considering you
need the phone number of the company's admin for the voice print anyway.

VOICE PHONE SYSTEM:
Connect to these to record the voice of the user. There's nothing else to do
but listen to the answering voice and wait for the voice to register. You can
get phone numbers at the company's Public Access Server.

FILE SERVER:
The IP and credentials for these are given by companies you need to supply
multiple files for. You can copy them there and, if not done yet, decrypt them.
As you're not able to hack an admin account, you'll never be traced. An added
bonus of file servers is that your credentials never expire: you can use them
as a file dump, but more importantly, to greatly increase active trace time.

PERSONAL COMPUTER:
These systems are the same as your Gateway and can't be entered. You'll use
their IPs for 'Trace a hacker' missions. To access the only PC that you're
possible to, see 'Complicated story start'.

ACCESS TERMINAL:
These are the terminals from the company's LAN. An external connection will
prompt "No public log-ons permitted". Clear enough, these have no purpose
besides the LAN.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
8.0   Random missions
-------------------------------------------------------------------------------
Now for the real work, all the missions you can attempt. I'll give this summary
before giving a mission description:
-------------------------------------------------------------------------------
Mission description:    any description that might give this mission.
Uplink difficulty:      rated Uplink difficulty.
Lowest uplink rank:     the first rank that makes you able to do this mission.
Compromising system(s): any system(s) you might be hacking for this mission.
Additional software:    whether you need any additional software compared to
                        the latter mission type.
Neuromancer:            if it goes up or down.
-------------------------------------------------------------------------------

-------------------------------------------------------------------------------
8.1   Delete or steal a file
-------------------------------------------------------------------------------
Mission descriptions:   
DELETE:
- Break into a rival computer system and sabotage files.
- Hack into a computer and delete key files.
- Find and destroy crucial data on a mainframe.
STEAL:
- Access a remote system and copy important data files.
- Steal important data from a rival companies file server.
- Gain Access to a rival system and steal research files.

Uplink difficulty:      2
Lowest Uplink rank:     Beginner
Compromising system(s): Internal Service Systems
Needed software:        - Password_Breaker
                        - RARE: Decrypter v1.0-4.0
Neuromancer:            Up
-------------------------------------------------------------------------------
The startup missions. Once in the system, go to the file server and delete or
copy what you need, then disconnect. Reply, with the data if you're doing a
steal mission, and you're done. Multiple of these missions can be done at once
if other missions have the same target. Sometimes you need to decrypt a file,
usually the mission reward is more than the decrypter cost. Mind that the same
files can be used in both copy and delete missions, beware: always check before
deleting files if other missions need them.

-------------------------------------------------------------------------------
8.2   Change academic records
-------------------------------------------------------------------------------
Mission descriptions:   
- Improve our associates' academic standing.
- Help us prove a fellow employee is over-rated.
- Generate a University Degree for a friend.
- Qualifications required for wealthy professional.

Uplink difficulty:      3
Lowest Uplink rank:     Novice
Compromising system(s): International Academic Database
Additional software:    none.
Neuromancer:            Down
-------------------------------------------------------------------------------
Hack the system. You'll have much time, usually about ten times more than you
had on the Internal Service Systems. You have to either:
- Add a graduate qualification with class (Mechanical Engineering, Class 1).
- Change graduate class (Class 1 <> Class 3).
- Add 'Other qualification'.
Commit the update, disconnect. Multiple of these mission can be done at once, 
because of the very slow trace on the Academic Database.

-------------------------------------------------------------------------------
8.3   Change social records
-------------------------------------------------------------------------------
Mission descriptions:   
- Create part of a new identity.
- Falsify a Social Security Document.

Uplink difficulty:      4/5
Lowest Uplink rank:     Confident
Compromising system(s): International Social Security Database
Additional software:    Proxy_Disable (Bypass) v1.0
Neuromancer:            Down
-------------------------------------------------------------------------------
Once connected, disable the proxy (bypass if you have it, of course). Once the
trace starts when disabling, start hacking the ID. When ready, search for the
person. Now you either have to change the personal status to 'Deceased' or
'Employed'. Commit once the proxy is disabled and disconnect. Early on it might
be tricky doing multiple of these, but as long as you have 30sec+ on the trace
you can attempt additional changes. Once you're ready to buy a 
HUD_ConnectionAnalysis and the bypassers these will be much easier.

-------------------------------------------------------------------------------
8.4   Change criminal records
-------------------------------------------------------------------------------
Mission descriptions:   
- Help to stop a hacker from ever working again.
- Help to discredit one of our rivals.
- Clear a criminal record.

Uplink difficulty:      5
Lowest Uplink rank:     Intermediate
Compromising system(s): Global Criminal Database
Additional software:    Decypher v3.0, Log Deleter v4.0
Neuromancer:            Down
-------------------------------------------------------------------------------
Once connected, disable the proxy (bypass if you have it, of course). Once the
trace starts when disabling, start hacking the ID and the cypher. When ready,
search for the person. Now you either have to clear a record or add a specific
crime ('Robbery' of 'High tech fraud'). Commit and disconnect. Log deletion 
becomes a priority. Buy the Log_Deleter V4 now, before you run out of funds. 
Early on doing multiple GCD missions is very tricky due to the complexity of 
the access security without a monitor bypass. In the endgame, these and removal
missions can be done in bulk if you use the readwrite account.

-------------------------------------------------------------------------------
8.5   Check account info
-------------------------------------------------------------------------------
Mission descriptions:   
- Client interested in financial data on an enemy.
- Find Financial Details of one of our associates.

Uplink difficulty:      5
Lowest Uplink rank:     Intermediate
Compromising system(s): International Banks
Additional software:    none
Neuromancer:            Down
-------------------------------------------------------------------------------
These are relatively easy compared to the last. Connect to the bank, go 
'Manage Existing Account'. Enter the account number, hack the password and 
check the info you need. Reply the email with the data and disconnect. There is
a minor exploit here: replying 0 in the email, especially with loans, there is 
a decent chance it's actually correct; the game does not actually recognize 
that you've hacked the system.

-------------------------------------------------------------------------------
8.6   Trace balance transfer
-------------------------------------------------------------------------------
Mission descriptions:   
- Trace a recent balance transfer.

Uplink difficulty:      5
Lowest Uplink rank:     Intermediate
Compromising system(s): International Banks
Additional software:    IP_Lookup
Neuromancer:            Down
-------------------------------------------------------------------------------
Similar to the 'Check account info' missions, only that these have two accounts
involved. Hack the account given, write down the IP and account number of the 
last statement (200000C or above). Go to the target bank (either just check 
which bank has the IP or look it up), hack the account and check the name. 
Reply the mail with the name and delete logs.

-------------------------------------------------------------------------------
8.7   Delete multiple files
-------------------------------------------------------------------------------
Mission descriptions:   
- Destroy corporate data of a rival company.
- Destroy customer records on a sales system.
- Destroy rival software in development.

Uplink difficulty:      5/6/7
Lowest Uplink rank:     Intermediate
Compromising system(s): Internal Service Systems, Central Mainframes or LANs.
Additional software:    - Voice_Analyser
                        - Proxy (& Firewall)_Bypass v5.0
Neuromancer:            Up
-------------------------------------------------------------------------------
These are the first type of missions you'll have to mess with the firewall 
besides the proxy: if you cannot yet afford firewall software and you can get 
the proxy offline, you can go to security in the admin section and 
just disable the firewall there. This would work indefinitely, but using a 
bypasser eventually makes it much easier. Once the proxy and firewall are gone,
go to the console and enter the commands 'cd usr' and 'delete'. Once done, 
disconnect and delete logs, fastforward the news to be able to complete the 
mission.

-------------------------------------------------------------------------------
8.8   Steal multiple files
-------------------------------------------------------------------------------
Mission descriptions:   
- Copy large and secure corporate database.
- Copy proprietary source code database.
- Steal valuable scientific research documents.
- Break into high security system and steal customer records.

Uplink difficulty:      5/6/7
Lowest Uplink rank:     Intermediate
Compromising system(s): Internal Service Systems, Central Mainframes or LANs.
Additional software:    Decrypter v7.0                        
Neuromancer:            Up
-------------------------------------------------------------------------------
After bypassing the firewall and accessing the system, go to the File Server. 
Copy all .dat files, likely going up in numbers (TheaN0.dat, TheaN1.dat, etc).
Disconnect and delete logs. Go to the enlister's File Server, copy the files,
decrypt them, disconnect and reply. You can delete any files currently present
on the File Server if you lack space. If you somehow forget files, the mission
will complete but with a lesser reward.

-------------------------------------------------------------------------------
8.9   Destroy a system
-------------------------------------------------------------------------------
Mission descriptions:   
- Elite agent required for destruction of a computer system.

Uplink difficulty:      6/7
Lowest Uplink rank:     Skilled
Compromising system(s): Central Mainframes
Additional software:    none
Neuromancer:            Up
-------------------------------------------------------------------------------
The regular way is to delete every file and all systes files on the system, 
then shut it down. Once you've bypassed the security and accessed the system,
go to the console. Use the following commands:
- cd usr
- delete
- cd sys
- delete
- shutdown
You don't have to wait for the other commands to be ready, you can type all
five commands right after each other. You might want to wait with 'shutdown' 
until the system files start to delete, in order to avoid unnecessary 
disconnects if you mistype something. Once the system is rebooting you can 
disconnect. Delete the logs, go to the news, fastforward three hours and reply.
It is generally advised to delete logs via the console also (cd log, delete), 
but this is not crucial for the destruction. As you delete logs externally, 
there's no need to.

The less complicated way, yet it requires the start of the storyline, is to
run Revelation. Once you're inside, copy Revelation in the File Server, access
the console and enter 'cd usr', 'run Revelation'. You'll instantly disconnect,
the system will appear on the world map affected by Revelation. Delete logs 
and finish the mission, there's no need for a fastforward. The use of 
Revelation does not come with repurcussions even though you are literally the 
only hacker that can have a copy of Revelation. Note that this works for 
'delete files' missions also but that is almost as quick using the commands.
 
-------------------------------------------------------------------------------
8.10   Trace a hacker
-------------------------------------------------------------------------------
Mission descriptions:   
- Trace a hacker who recently broke into our systems.
- Trace an unauthorised money transfer.

Uplink difficulty:      Hacker:         7
                        Transfer:       9
Lowest Uplink rank:     Hacker:         Experienced
                        Transfer:       Professional
Compromising system(s): all
Additional software:    - Log_Undeleter
                        - IP_Lookup
Neuromancer:            Down
-------------------------------------------------------------------------------
Go to the system that was compromised, hack to the logs. Undelete the log that 
matches the time and date, especially if it's not a routed log. IP_Lookup the 
first IP in the routed log.. Now do the same at the system given by the 
IP_Lookup. Continue until you get to a PC, reply the mission with the name of 
the owner of the PC. For a transfer, don't look at the statements but at the 
bank's logs. You can be the hacker they're talking about. In this case you're 
not able to accept the mission or contact the employer. In the rare occasion 
there isn't a log matching time and date, you are most likely doing ARC's 
'Trace a hacker' mission which involves the storyline. See 'Complicated 
storyline start'.

-------------------------------------------------------------------------------
8.11   Make donations
-------------------------------------------------------------------------------
Mission descriptions:   
- Our esteemed colleague wishes to make a donation.

Uplink difficulty:      7
Lowest Uplink rank:     Experienced
Compromising system(s): International Banks
Additional software:    none.
Neuromancer:            Down
-------------------------------------------------------------------------------
Go to the target bank. Bypass security and hack the accountnumber given. Go to
transfer, and input all data as in the description. Transfer the credits, 
verify it completes and disconnect. Connect to InterNIC while replying the 
mission, once a completion has returned, delete your logs. Deleting your logs 
before replying the mission sometimes voids the transfer. You do not need to 
delete statements as you are not the sender or receiver* of the credits.

*This CAN in fact be the case if you made accounts on other banks. These 
missions will never target the Uplink bank, but they can let you donate to 
yourself on other banks; why they'd want this I don't know. If it is the case,
you have no choice but to abandon the mission or to approach this as an actual
illegitimate bank hack, see my other guide or the small summary in the easter 
eggs section. You will get the rank increase and the credits; usually the 
amount is so minor it's just a nice extra.

-------------------------------------------------------------------------------
8.12   Removal job or frame for computer crimes
-------------------------------------------------------------------------------
Mission descriptions:   
- Highly skilled agent required for removal job.
- Frame a user for computer crimes.

Uplink difficulty:      Removal:        7
                        Frame:          9
Lowest Uplink rank:     Removal:        Knowledgeable
                        Frame:          Uber-Skilled
Compromising system(s): Global Criminal Database
Additional Software:    none.
Neuromancer:            Down
-------------------------------------------------------------------------------
These are very easy at this point in the run because you only need to hack the 
GCD and this can be done without an active trace. Bypass security and hack the
'readwrite' account. Once in, note that this prompts no active trace. Search 
for the name, add 'Parole' and press 'Add' two times to fake two additional 
crimes. Authorise arrest, make sure it is accepted. Disconnect and delete logs,
fastforward the news and reply any missions you have. You can do loads of these
at once and the credits awarded by these should get you to the point where 
you'll be able to buy any remaining upgrades you need. Computer crimes also an
be done by framing someone as required for the last two types of missions but 
authorizing arrest is by far the easiest method.

-------------------------------------------------------------------------------
8.13   Frame for bank fraud
-------------------------------------------------------------------------------
Mission descriptions:   
- Frame a man for bank fraud.

Uplink difficulty:      9/10
Lowest Uplink rank:     Uber-Skilled
Compromising system(s): International Banks
Additional software:    Log_Modifier.                        
Neuromancer:            Down
-------------------------------------------------------------------------------
I want to warn you up front: frame missions can bug out pretty often, even if
done right and they take a long time ingame to finish: it usually takes more 
than a day for the news to appear but it can sometimes just not appear at all.
Honestly, at this point in the game fastforwarding slightly and waiting for
removal or computer crimes missions is probably the safe option. If you are
inclined to finish all missions, backup your save everytime you want to accept
a frame mission and restore it if the mission doesn't properly complete.

The mission itself is actually straightforward: hack the target bank with a low
amount of bounces, use five non-account systems at most. No need to bypass 
anything as you're supposed to be discovered. Hack the ID Verification and 
disconnect with about two seconds left on the active trace. Go to InterNIC and
modify the routed log with the IP of the target individual, delete the admin 
acceptance log. Fastforward the news and if the news item appears that the 
person has been arrested for the hack, it worked.

-------------------------------------------------------------------------------
8.14   Frame for data destruction
-------------------------------------------------------------------------------
Mission descriptions:   
- Frame a user for destruction of data.

Uplink difficulty:      9/10
Lowest Uplink rank:     Uber-Skilled
Compromising system(s): Internal Service Systems
Additional software:    none.                        
Neuromancer:            Down
-------------------------------------------------------------------------------
These are essentially a combination of the 'Delete multiple files'
and 'Frame for bank fraud' missions and therefore require no seperate 
description, just beware that you make a short connection that is sufficient to
delete all files. As with bank fraud, it takes a long ingame time to finish and
they bug out, so do them at your own risk.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
9.0   Awards
-------------------------------------------------------------------------------
This section will explain the basics of the storyline: how to begin, what the
missions are and how to do the finale, regardless of what side you're on. In
addition it will describe the two missions that give awards but otherwise do
not influence the story.

The missions will be divided by this summary:
-------------------------------------------------------------------------------
Mission type:           either like a random mission or something else.
Mission date:           the date the mission will be given.
Credits:                the reward.
Compromising system:    which system to hack.
-------------------------------------------------------------------------------
Description.

-------------------------------------------------------------------------------
9.1   Regular storyline start
-------------------------------------------------------------------------------
If you manage to follow the news in the first weeks of the game, you'll notice
that the top rank agent is working for ARC, and that the second rank agent does
not trust them. On 9 April you'll see a news bulletin that the top rank agent 
died in an apparant suicide. A week later, 16 April, you'll receive an email 
from him, stated that ARC cannot be trusted. Hack the ARC Central Mainframe at 
least once in the next days to receive an email from ARC a few days later. If 
you don't attempt to hack the ARC CM your current user will skip the storyline.

-------------------------------------------------------------------------------
9.2   Complicated storyline start
-------------------------------------------------------------------------------
There is another, perhaps more intended way to receive an ARC email. Once the 
hacker is dead, so before his email, write down the date and time he died. ARC
might post a 'Trace a hacker' mission around this time on the Uplink mission 
board. The hack originated from the ARC Central Mainframe.

Hack the ARC Central Mainframe and go to the logs, you'll see a "Copied
RevelationCore 0.7" log. The time of this log might NOT be identical to the one
in the mission if, you have it, as the time of the above logs is very precise.
Regardless there shouldn't be a log matching the mission, you are supposed to 
follow the RevelationCore. The IP of the copy log is unknown, but at the same 
time someone has logged on. Undelete the logs and follow IPs as intended, until
you get to the personal computer: you can complete the mission from ARC if you 
have it, but that's not the purpose of this trace.

This is in fact the only PC in the game you can enter. Break or enter the 
password, which is MySocratesNote, the password the top rank agent gives you 
in his email you are supposed to recieve later. In his PC there is a section 
"Filez" and "Emailz". "Emailz" will contain the email he sents you after a week
and one about a subscription to Hacker Magazine. "Filez" will contain the 
RevelationCore0.7. Copy the core and decrypt it. ARC will sent you an email 
about your incredible hack at approximately the same time you would get their 
regular mail. Beyond this point, the PC is no longer accessible.

-------------------------------------------------------------------------------
9.3   Receive email from ARC
-------------------------------------------------------------------------------
Which of the two mails you get, it doesn't matter for the followup. Reply to
the email and you'll get your first ARC mission and Revelation v1.0.

8.3.1: Notes on Revelation
==========================
For those that did not yet get this: Revelation is an extremely agressive 
virus. It has some uses besides the storyline:
1) It serves as a replacement to destroy a system, upload it and run it via
   the console. This counts for just files as well.
2) If ran locally Revelation will in fact completely corrupt your Gateway, this
   mimics a Gateway_Nuke and makes a standalone Motion_Sensor useful.
3) If run by mistake a similar or higher version of Faith will neutralize the 
   virus if used in time.
In short, be careful. Revelation infections are clearly visible on the world 
map by relative large red blocks.

Roughly two minutes after ARC's proposal, Arunmor will plea you to defect from
ARC, saving their own Internal Service System in the process. Reluctant to run
an unknown virus from a company you do not know, lets trust their rivals at 
first.

-------------------------------------------------------------------------------
9.4   Arunmor
-------------------------------------------------------------------------------
9.4.1:  AWARD MISSION ARUNMOR 1:        'Backfire'
-------------------------------------------------------------------------------
Mission type:           send a file.
Mission date:           17 April 2010
Credits:                $15000
-------------------------------------------------------------------------------
Reply the Arunmor mail with Revelation v1.0. Done, as easy as that. Mind that
it takes ARC a while to find out you defected, but the threats send to you are
clear enough.

9.4.2:  AWARD MISSION ARUNMOR 2:        'Tracer'
-------------------------------------------------------------------------------
Mission type:           upload and run a file.
Mission date:           26 April 2010
Credits:                $10000
Compromising system:    ARC Internal Service System
-------------------------------------------------------------------------------
Go to the Arunmor File Server and copy the Tracer. Hack the ARC Internal 
Service System like you normally would, go to the File Server. Copy the Tracer
to the system. Go to the console and use the following commands: 'cd usr',
'run RevelationTracer'. You'll get a bunch of messages in the console that the
tracer is running and that it hid itself. You can check the File Server to be 
sure. Delete logs and finish the mission.

9.4.3: AWARD MISSION ARUNMOR 3:         'TakeMeToYourLeader'
-------------------------------------------------------------------------------
Mission type:           upload and run a file.
Mission date:           4 May 2010
Credits:                $30000
Compromising system:    Arunmor Internal Service System
-------------------------------------------------------------------------------
This mission is exactly the same as ARC proposed to you initially: now however,
you do it to get the ARC CEO arrested. Hack the system, upload Revelation and
run it. Somewhat amusing is that during an ARC playthrough both companies will
ask you to do this, ARC initially and Arunmor when they post this mission on
the Uplink board; Arunmor needs to review their security measures I reckon.

9.4.4: AWARD MISSION ARUNMOR 4:         'ARCInfiltration'
-------------------------------------------------------------------------------
Mission type:           steal multiple files.
Mission date:           12 May 2010
Credits:                $30000
Compromising system:    ARC Local Area Network
-------------------------------------------------------------------------------
Like a 'Steal multiple files' mission on a LAN. The ARC LAN will be quite
complicated but usually not as sophisticated as the Darwin or Arunmor 
counterparts (see ARC missions). Take the ARC admin voice print, hack the Main 
Server and copy the 9 .dat files of 10Gqs (Revelation 0-8.dat). Put them on the
Arunmor File Server, delete anything in your way, decrypt them and reply.
 
9.4.5: AWARD MISSION ARUNMOR 5:         'CounterAttack'
-------------------------------------------------------------------------------
Mission type:           contain Revelation, run Faith multiple times.
Mission date:           27 May 2010
Credits:                $50000
Compromising systems:   multiple varying systems.
-------------------------------------------------------------------------------
This mission is tricky but it's not at all the difficulty of 'GrandTour'. The
point is that Arunmor has always been slightly ahead of ARC in their quest to
keep the internet up and running, and the NPC way of the outbreak clearly 
shows this difference. ARC only starts with three infected systems and infect
three more at most before their systems are seized. If done right, you can
finish off Revelation shortly after ARC has been seized.

Before the mission starts, which would be early 27th of May, backup your user.
Make sure all Internal Service Systems are on the map. Now get ready for the 
outbreak. Once it starts, go to the Arunmor File Server and copy Faith and the 
RevelationTracker. 

To control the containment:
- Go to the World Map and try to connect to the red blocks.
- If you can connect, this should be an Internal Service System.
- Bypass the firewall and proxy.
- Hack it, go to the File Server of the system and upload Faith.
- Go to the console and enter 'cd usr' and 'run Faith'.
- Once Revelation clears, disconnect and repeat the cycle.
- If you can't connect to the system run the RevelationTracker.
- IP_Lookup the IPs in the Tracker.
- If affected systems are Central Mainframes, attempt to clear them.
- I would just ignore LANs and let them spread due to time constraint.

After a while Arunmor will send you an email that the ARC Central Mainframe has
been raided. This marks the point where there will not be any new infections,
just the one-to-two spreads from the currently infected systems. Once you clear
the final Revelation after you've gotten this email, the mission completes 
itself. At no single point is CounterAttack truly dangerous but you do have to
keep active in order for Revelation not to overhelm you.

You've defeated ARC. Continue following the story up to mid-June, where it 
becomes clear the leader of the Andromeda group lost faith in the internet as
it is in Uplink, making everyone's information open to everybody. To some 
extend, he has a point: if hackers can change everything that corresponds to an
individual nobody is really safe, framing someone is common practice. To 
destroy the internet to prevent that,  however... lets call Andromeda 
chaotically neutral; decide for yourself if they're right. Regardless of what 
you think, lets follow their storyline next.

-------------------------------------------------------------------------------
9.5   Andromeda Research Corporation (ARC)
-------------------------------------------------------------------------------
Some notes on ARC:
- Proceeding with ARC makes your agent unavailable after GrandTour. Because of
  this reason I usually make a user with ARC in it so it's clear to myself that
  this is an ARC user that will become unavailable on the 26th of May.
- Random missions just for rank or neuromancer matter less for ARC due to the
  inevitable end of the game. If you're inclined to end it with max rank, I'd
  suggest performing a few illigitimate personal money transfers.
- While proceeding with ARC, the second, third and fourth Arunmor mission will 
  appear at the mission screen with an Uplink difficulty of 10. Completing them
  will award the corresponding awards. If you don't do it, another agent will
  regardless, so you might as well.
- GrandTour is by a large margin the hardest mission ingame. This mission is 
  comparable to CounterAttack in setting but a lot harder to properly execute. 
  I've added four different phases to the mission in order to make your life as
  easy as possible in the mission.

9.5.1:  AWARD MISSION ARC 1:            'MaidenFlight'
-------------------------------------------------------------------------------
Mission type:           upload and run a file.
Mission date:           17 April 2010
Credits:                $10000
Compromising system:    Arunmor Internal Service System.
-------------------------------------------------------------------------------
Search up the system at InterNIC. Hack the system, upload Revelation and run 
it. The 'difference' with this compared to the third Arunmor mission is that 
this actually initiates an ARC playthrough, therefore marking Arunmor missions
to appear on the mission board when their time arrives.

Shortly after the attack on the Arunmor system Arunmor will post a news 
bulletin that they give $25000 to anyone with info on  Revelation by mailing to
internal@Arunmor.net. This is the ONLY point in the game where a standalone 
mail does something: if you mail Revelation to Arunmor at this point you will 
get a reward thanking you for supplying them with Revelation and ask no further
questions. You'll be rewarded $25000 and the ARC storyline continues.

9.5.2:  AWARD MISSION ARC 2:            'Darwin'
-------------------------------------------------------------------------------
Mission type:           steal multiple files.
Mission date:           30 April 2010
Credits:                $15000
Compromising system:    Darwin Local Area Network
-------------------------------------------------------------------------------
The Darwin LAN has a setup that differs from what you know; the Darwin LAN has
a security setup that requires you to unlock the Main Server by breaking three
locks that require LAN_Force as I've explained in the last section at the LAN
system. Other than the complexity, this is a 'Steal multiple files' missions 
on a LAN similar as the fourth Arunmor mission.

9.5.3:  AWARD MISSION ARC 3:            'SaveItForTheJury'
-------------------------------------------------------------------------------
Mission type:           frame for bank fraud.
Mission date:           8 May 2010
Credits:                $20000
Compromising system:    International Bank.
-------------------------------------------------------------------------------
This is even simpler as a regular frame mission as you don't have to wait for 
the news. Go to the target bank with a few bounces, hack the admin and 
disconnect when the trace is about to complete. Go to InterNIC and modify the 
log with the Arunmor Technical Director's IP. Simply reply the mission.

9.5.4:  AWARD MISSION ARC 4:            'SkinnyHammer'
-------------------------------------------------------------------------------
Mission type:           destroy a LAN.
Mission date:           16 May 2010
Credits:                $30000
Compromising system:    Arunmor Local Area Network
-------------------------------------------------------------------------------
The Arunmor LAN is large but does not require LAN_Force as the Darwin LAN. The 
Main Server is protected by three locks, with a wireless transmitter nearby. 
In one of the connected terminals there are three frequencies for the 
transmitter. Each frequency get you to the part of the LAN that unlocks one of 
the Main Server locks. An alternative is to just force all three locks from the
get-go, but there's no fun in that. You have to destroy the Main Server and in
this case, and why not as ARC, I'd definitely recommend Revelation. Both the 
admin chase and the relatively fast active trace make the conventional method 
pretty slow, if doable at all, and now you have the virus, so why not use it
to our advantage.

9.5.5:  AWARD MISSION ARC 5:            'GrandTour'
-------------------------------------------------------------------------------
Mission type:           spread Revelation, run Revelation multiple times.
Mission date:           26 May 2010
Credits:                $50000 (*)
Compromising systems:   multiple Internal Service Systems.
(*): is only added to your score. The inevitable game over renders it useless.
-------------------------------------------------------------------------------
In essence this mission relates to Arunmor's final mission that you'll be 
hacking a lot of low-security systems, but the intensity of GrandTour greatly 
surpasses CounterAttack: ARC is clearly in a lesser state than Arunmor by the 
time the outbreak occurs and therefore this mission is a lot harder than its
counterpart. The total time for the mission is only fifteen minutes, after 
which you're disavowed by Uplink for their own safety: this is a hard endpoint
and cannot be influenced or negated.

For GrandTour I highly suggest you use a prephase. Both the prephase and the 
mission can, on their own, be divided into two parts.

Prephase part 1: links (24-12hr)
================================
This can be done basically up to the final day but can be done at any time 
between the fourth and last mission. Connect to InterNIC and add 20 Internal 
Service Systems to your map. System difficulty does not seem to influence 
Revelation strength or Arunmor hacking speed so you might as well make it  
easier on yourself.

Prephase part 2: file space (12-0hr)
====================================
Connect to the 20 systems you searched up previously, bypass the firewall, 
and clear the top file(s) so that you have 3Gq available. This greatly reduces 
the need for File_Deleters and scrolling down in File Servers during the actual
mission.

Mission part 1: credentials & upload (~7min)
============================================
After the mission hits reconnect to previously connected systems. If the 
credentials are still active you have it easier; if they're not I hope it's 
clear to you which file servers you cleared out. Once connected, bypass the 
firewall, go to the File Server and upload Revelation v3. Now disconnect! This
definitely gives you available credentials and Revelation is dormant on these
systems. The reason for delaying launching Revelation is that we don't want to
give Arunmor early targets.

Mission part 2: execution (<15min)
==================================
If you're quick enough you should be about seven minutes in on the mission
when you're done with arming systems with Revelation. Now start reconnecting
to those systems. Get a Proxy_Bypass out whilst connecting to the systems, 
bypass it, go to the console and enter 'cd usr' 'run Revelation'. Each system 
should take between 10-20 seconds at most. When you're done about a quarter of
your earlier infections should have been cleared, and you should only have 
about two minutes left. This time is not really enough to hack more systems, 
and that will not help much. I suggest to just watch the world map how the 
spreading goes: you will be succesful with roughly 15+ simultaneous infections.

The end (15min)
===============
The mission can end in failure and success: if the screen goes straight black 
you've reached the time limit and failed. You've succeeded when your Gateway 
gets an external Revelation infection and disconnects about ten seconds later.

When you fail, you get a clear notification from Uplink that they have been 
monitoring you for a while and have disavowed you based on relations with ARC
and that Revelation has failed. In the game over screen, the disavow reason is
'Working for Andromeda Research Corporation during the Revelation crisis' and 
you do not have the GrandTour award.

When you succeed, watch the show. You don't have access to Faith so there's 
nothing you can do, but lets face it: you don't want to either. The screen will
go black and you get a message from Uplink. They "somehow lost connection to 
the core servers which may be the result of a virus", and as the message goes 
on it becomes scrambled and corrupted until only bytes appear. You've 
succesfully destroyed every single system connected to the internet, including 
Uplink's mainframe. In the game over screen it says 'An outbreak of the 
Revelation virus forced Uplink Corporation to cease operations' and GrandTour 
should have been awarded. For a synopsis as to why ARC wanted to do this, read
the final paragraph at 'CounterAttack'.

If done things right, you can have ten of twelve Awards if playing with ARC, 
missing 'Backfire' and obviously 'CounterAttack'. There used to be a way to 
get 'Backfire' awarded without negating the ARC storyline but that no longer
works: sending Revelation midway the ARC storyline only supplies you with 
$25000, not the award. The consequence of finishing with ARC is that your user 
is no longer available, every system has been destroyed. When you access the 
user you see the game over screen and your ten hard earned rewards.

-------------------------------------------------------------------------------
9.6   Mole????
-------------------------------------------------------------------------------
Mission type:           steal multiple files.
Credits:                $50000 (*)
Compromising system:    Uplink Internal Service Systems
(*): You won't get all, see below.
-------------------------------------------------------------------------------
Be a mole in your own community. Bypass all security and hack the Uplink
Internal Service System as a normal Internal Service System. Go to the admin
section and use the decypher. Now copy the Uplink Agents List to your memory
and all UplinkAgents X.dat files (notice that 4 isn't there). Decrypt the
files and delete logs. Fastforward at least a week (!) and receive an email 
from a random company, and the link to their File Server. Copy the agent list 
program and all data files to the File Server. Reply the mission. Receive only
$46200 because the 4.dat wasn't there which contains your own info. The news
item for this mission is somewhat disturbing.

Mind that the Uplink Agents List does work locally, and you see all the names 
of the hackers working at Uplink. The only practical use for this info is 
however, that you can theoretically reply 'Trace a hacker' missions with all 
names in the list. This can be considered an exploit however, as you never 
actually traced the actual hack.

-------------------------------------------------------------------------------
9.7   Wargames????
-------------------------------------------------------------------------------
Mission type:           blow up cities?... almost.
Credits:                $0 
Compromising system:    Protovision Game Server
-------------------------------------------------------------------------------
Just connect directly to the server. The password is a name from the movie 
that has the same name as the mission. If you didn't see the movie: 'joshua'. 
Go to 'Games', and go to the only link possible there. Click on a single city 
and the award will be yours. The news entry about this mission is more amusing 
than it is serious, how a 'remote connection nearly caused WW3'. Good times.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
10.0  Chronological upgrade list
-------------------------------------------------------------------------------
Perhaps this section is a bit out of line, but it's something I wanted to add 
in v2 as well: a list of chronological upgrades as you go through the game. 
Essentially this list will give you an overview of what to use your initial
credits on and what software and hardware to get as you move forward in the 
game. The idea of this section is to sort of present the only 'walkthrough' I
can provide for a game like this. The 'when' will refer to either a system or
mission type, whatever applies.

Mind that, if anything, this is a guideline.  Most software is forced for the 
type of system they're presented at, but Gateway and hardware upgrades are done
at leisure just to make certain type of missions more doable. Note that you 
cannot wait too long with hardware upgrades or systems will simply be 
unhackable as you're too slow. I leave the initial 60Ghz processor in until the
TRINITY Gateway, it's more efficient to upgrade the Gateway and add an 
additional 200Ghz processor rather than just replacing it.  

The only real choice is whether or not to buy the AM-CORE. Despite that you 
will probably end up buying the TRINITY, AM-CORE enables you to do 'steal 
multiple file' missions in one hack instead of two. TRINITY is not crucial for 
any mission except 'CounterAttack' or 'GrandTour', where the increased hacking
speed can be a lifesaver. So up till that point, AM-CORE is actually 
competitive with TRINITY and I've decided to include it as early as 'steal 
multiple file' missions, as that's where it really shines. If you somehow end
up finishing all of those missions without the AM-CORE and with money for the 
TRINITY, you can safely skip to TRINITY.

Notes
=====
1) Increase Uplink's bank loan to $4000 to buy the Trace_Tracker v4 initially.
2) Initial Decrypter version depends on what you need; used v4 as reference.
3) Monitor_Bypass is essentially optional, but highly recommended from LANs on.
4) For memory modules I've always chosen the cheapest combination.
5) LAN_Scan is not essential, but is included for convenience.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Upgrade             Type        When                     Cost       Total cost
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Tutorial            Software    Registered               $     0    $      0
File_Copier         Software                             $     0    $      0
File_Deleter        Software                             $     0    $      0
Password_Breaker    Software    Uplink Test Machine      $  1500    $   1500
Trace_Tracker v4    Software                             $  2500    $   4000
Decrypter v4        Software    Steal files (encrypted)  $  2200    $   6200
Proxy_Disable v1    Software    Social Security Database $  3000    $   9200
Decypher v3         Software    Global Criminal Database $  8000    $  17200
Log_Deleter v4      Software                             $  4000    $  21200
VIRTUANET           Gateway                              $ 15750    $  36950
Processor 200Ghz    Hardware                             $ 12000    $  48950
Modem 2Ghz          Hardware                             $  2000    $  50950
Memory 24Gq         Hardware                             $  8000    $  58950
IP_Lookup           Software    Trace a balance transfer $   500    $  59450
Voice_Analyser v2   Software    Central Mainframes       $ 10000    $  69450
ConnectionAnalysis  HUD                                  $ 20000    $  89450
Proxy_Bypass v5     Software                             $ 20000    $ 109450
Firewall_Bypass v5  Software                             $ 10000    $ 119450
Decrypter v7        Software    Steal multiple files     $ 15000    $ 134450
ZION                Gateway                              $ 29750    $ 164200
Modem 6Ghz          Hardware                             $  6000    $ 170200
Memory 24Gq         Hardware                             $  8000    $ 178200
Memory 24Gq         Hardware                             $  8000    $ 186200
Processor 200Ghz    Hardware                             $ 12000    $ 198200
AM-CORE             Gateway                              $ 62500    $ 260700
Memory 24Gq         Hardware                             $  8000    $ 268700
Memory 24Gq         Hardware                             $  8000    $ 276700
Memory 24Gq         Hardware                             $  8000    $ 284700
Memory 24Gq         Hardware                             $  8000    $ 292700
Memory 24Gq         Hardware                             $  8000    $ 300700
Memory 24Gq         Hardware                             $  8000    $ 308700
Memory 16Gq         Hardware                             $  5500    $ 314200
Modem 10Ghz         Hardware                             $ 10000    $ 324200
Log_Undeleter       Software    Trace a hacker           $  5000    $ 329200
Monitor_Bypass v5   Software    Local Area Networks      $ 25000    $ 354200
LANView             HUD                                  $ 50000    $ 404200
LAN_Probe v3        Software                             $ 30000    $ 434200
LAN_Spoof v3        Software                             $ 45000    $ 479200
LAN_Scan v3         Software                             $ 25000    $ 504200
LAN_Force v3        Software                             $ 25000    $ 529200
Log_Modifier v2     Software    Framing missions         $  6000    $ 535200
TRINITY             Gateway     Endgame & storyline      $ 50000    $ 585200
Processor 200Ghz    Hardware                             $ 12000    $ 597200
Processor 200Ghz    Hardware                             $ 12000    $ 609200
Processor 200Ghz    Hardware                             $ 12000    $ 621200
Processor 200Ghz    Hardware                             $ 12000    $ 633200
Processor 200Ghz    Hardware                             $ 12000    $ 645200
Processor 200Ghz    Hardware                             $ 12000    $ 657200
RevelationCore v0.7 Data        Storyline entry          $     0    $ 657200
Revelation v1       Software    Storyline start          $     0    $ 657200
RevelationTracker   Software    Finale                   $     0    $ 657200
Faith v3            Software    'CounterAttack'          $     0    $ 657200
Revelation v3       Software    'GrandTour'              $     0    $ 657200
-------------------------------------------------------------------------------
OPTIONAL
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Upgrade             Type        When                     Cost       Total cost
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Dictionary_Hacker   Software    Early file missions/LANs $  1000    $   1000
Proxy_Disable v5    Software    Central Mainframes       $ 10000    $  11000
Firewall_Disable v5 Software    Central Mainframes       $  8000    $  19000
IP_Probe            Software    Steal multiple files     $  5000    $  24000
Motion_Sensor       Security    Anything that disavows   $ 10000    $  34000
Gateway_Nuke        Security    Anything that disavows   $ 20000    $  54000
MapShowTrace        HUD         N/A                      $  5000    $  59000
Defrag              Software    N/A                      $  5000    $  64000
IRC-Client          HUD         N/A                      $  4000    $  68000
Uplink_Agent_List   Software    'Mole????'               $     0    $  68000
Uplink Agents info  Data        'Mole????'               $     0    $  68000
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Total spend                                                         $ 725200
-------------------------------------------------------------------------------
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
11.0  Easter eggs
-------------------------------------------------------------------------------
This section provides and explains easter eggs present in Uplink.

-------------------------------------------------------------------------------
11.1  Introversion software
-------------------------------------------------------------------------------
The creators of the game. They state the future for Uplink here. This one isn't
available at InterNIC. It corresponds to the IP that is standard for Uplink, 
which makes sense to some extend. IP_Lookup 128.128.128.128.

-------------------------------------------------------------------------------
11.2  Steve Jackson's game server
-------------------------------------------------------------------------------
This site was seized in real life, because they were making a hacking guide.
This wasn't true, it was for such a game as Uplink. If you connect to this
server you'll be told that your IP has been logged, but nothing will happen.

-------------------------------------------------------------------------------
11.3  Meet the makers
-------------------------------------------------------------------------------
Read some weird confessions here. I'll give two hints:
- Game over isn't so bad.
- Saw "The Net"? Search for that little icon.
To get there exactly: get disavowed or complete the ARC storyline, and press 
the small icon in the bottom left on the user's login screen.

-------------------------------------------------------------------------------
11.4  Own government records & self arrest
-------------------------------------------------------------------------------
Though you are officially nameless ingame (would actually have been great if 
you could have supplied a real name), you are part of Uplink's society. To that
extend you also have academic, social and criminal records. You can find these
by  simply searching for your username at the appropriate systems.

ACADEMIC
Your academic record is all about working with computers. You have an A-grade
in Math, Physics, Electronics and Computing, a Computer Science Class 1
graduation and it specifies you are a registered Uplink agent. I've never 
actually tampered with the academic record, as I sincerely doubt it affects 
anything.

SOCIAL
You are born in 1989, single and 'Self-employed'. Changing your status here
does not actually do anything, including changing your status to 'Deceased',
compared to getting yourself arrested, see below.

CRIMINAL
Of course, this lists everything you have been convicted for during the run.
The practical use of your criminal record is that you can clear it, so you no
longer get denied in accepting missions.

Self arrest
===========
You can get yourself arrested without consequence which is actually amusing:
add 'Parole' to your criminal record and two other crimes like a regular 
removal mission and authorize arrest. What follows is a very amusing news item
that the "hacker ring-leader has been arrested", you are known as "PLAYER" and
you are "accounted for multiple destructive hacks and are a major spill in the
Uplink network". Well, that is kind of true. Last but not least, your status
on the rank list will change from 'Active' to 'In Jail', which is hilarious. 
As said, doing this has absolutely no consequences for your playthrough except
for the criminal record, which you can clear afterwards.

-------------------------------------------------------------------------------
11.5  Bank hacking / illegitimate money transfer to yourself
-------------------------------------------------------------------------------
You can actually transfer money to your own bank accounts from others. This 
action is the most monitored action ingame and the passive trace from the 
transfer statements is approximately ten to twenty seconds only (!).

The jist of the whole idea is to transfer whatever amount you want from an 
account's balance to one of your own bank accounts. To make it esay on yourself
you'd want to make an account on all eight banks so that statement deletion is
easier. You hack the account as you're supposed to for 'Make a donation'  
missions, yet instead of transferring it to someone else's account you do it 
to youself. Immediately after transferring, delete the statement in the 
sender's account, then go to yours and delete the only statement that's there.
The log should of course also be deleted, but this is not significantly quicker
as with any other passive trace.

If done correctly, you'll most likely raise a few ranks as it's the highest
ranked action in the Uplink community and you are able to spend the money. If
unsuccesful with deleting the statements in time you'll be disavowed within the
minute.

This is not really an easter egg, but I didn't want to leave it out of my main
guide completely. I have a seperate guide published about this game mechanic 
more specifically. As a word of warning, in my opinion you should not use this
too quickly to get the required funds to get all software, the best Gateway and
all hardware, it voids the purpose of the game and makes it boring pretty fast.

One addtional note to make is that when you have bank accounts on other banks,
either for this or to increase active trace time, donate missions can in fact
target your account. This is extremely lethal, if caught by surprise you'll
simply be disavowed without warning a minute later.
_______________________________________________________________________________
_______________________________________________________________________________

-------------------------------------------------------------------------------
12.0   Credits
-------------------------------------------------------------------------------
- I thank Introversion for creating the game and publishing it in Europe.
- I thank GameFAQs for posting.

v1-v2 credits
=============
- I thank Christoffer C. for notifying me of the LAN_Force typo.
- I thank GameFAQs User Alex for notifying me on two useful additions:
  - 'readwrite' accounts stay undetected with a monitor bypass.
  - Decyphers stay undetected with a monitor bypass.
  
v2 credits
==========
- N/A.

If there are any questions, improvements, additional info or info I forgot, 
get in this list my mailing me at:

arnomiddelkoop_1@hotmail.com

Yours truly,
Arno "TheaN" Middelkoop

Copyright 2004-2016 Arno Middelkoop

View in: