< Uplink
Jump to navigation
Jump to search
(Create list) |
(c/p error) |
||
Line 171: | Line 171: | ||
# 16000c, 1Gq | # 16000c, 1Gq | ||
# 20000c, 1Gq | # 20000c, 1Gq | ||
| Instantly bypasses proxy protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more | | Instantly bypasses proxy protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more proxies. | ||
|- | |- | ||
! Proxy Disable | ! Proxy Disable | ||
Line 180: | Line 180: | ||
# 8000c, 2Gq | # 8000c, 2Gq | ||
# 10000c, 3Gq | # 10000c, 3Gq | ||
| Disables a proxy on a remote system. Running this will cause detection. Higher versions will disable more | | Disables a proxy on a remote system. Running this will cause detection. Higher versions will disable more proxies. | ||
|- | |- | ||
! Trace Tracker | ! Trace Tracker |
Revision as of 16:05, 17 February 2015
Software can be purchased from Uplink Internal Services, and be run on your computer.
Title | Cost | Description |
---|---|---|
Decrypter |
|
Removes the encryption on files, up to the level equal to the version. In rare cases, you may encounter a level 8 encryption; these may not be decoded. |
Decypher |
|
Cracks the elliptic-curve encryption protecting systems. Higher versions are more efficient. |
Dictionary Hacker |
|
Can quickly break passwords, but only if they are in a dictionary. Not useful after a few weeks. |
File Copier |
|
Pre-installed software that can copy files around. |
File Deleter |
|
Pre-installed software that erases files. |
Defrag |
|
Copies software to the beginning of memory. |
Firewall Bypass |
|
Instantly bypasses a firewall protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more firewalls. |
Firewall Disable |
|
Disables a firewall on a remote system. Running this will cause detection. Higher versions will disable more firewalls. |
HUD: Connection Analysis |
|
Adds an icon on the HUD that allows you to view connection information to a server. Allows running Firewall Bypass, Monitor Bypass, and Proxy Bypass. |
HUD: IRC Client |
|
Adds an icron on the HUD allowing to access IRC servers. By default, it connects to irc://irc.uplinkcorp.net:6667/uplink/ |
HUD: MapShowTrace |
|
Shows trace progress in the map in the top-right corner. |
HUD: Lan View |
|
Adds an icon on the HUD allowing to view local area networks. Required to interact with LANs. |
IP Lookup |
|
Given an IP address, adds the associated server to your links. Useful for tracking cross-server activity. |
IP Probe |
|
|
LAN Probe |
|
Determines links running from a given node on a LAN. Higher versions can operate on more advanced LANs. |
LAN Scan |
|
Scans a LAN for all reachable nodes. Higher versions can operate on more advanced LANs. |
LAN Spoof |
|
Some devices on a LAN only respond to computers within a given subnet. Using LAN Spoof tricks the device into responding to your queries. Higher versions can operate on more advanced LANs. |
LAN Force |
|
Disables a lock on a LAN, without you having to log into the associated security terminal. Causes detection. |
Log Deleter |
|
Deletes a log entry to varying results:
|
Log Modifier |
|
Allows changing the text in log files. The newer version also allows creating new logs in blank spaces. |
Log Undeleter |
|
Recovers previously deleted logs, including modified ones. |
Monitor Bypass |
|
Disables the monitor on a given system, allowing you to run password crackers or other detectable programs without alerting the admin. However, the admin is still alerted if you log into their account. |
Password Breaker |
|
Cracks a password on the system. |
Proxy Bypass |
|
Instantly bypasses proxy protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more proxies. |
Proxy Disable |
|
Disables a proxy on a remote system. Running this will cause detection. Higher versions will disable more proxies. |
Trace Tracker |
|
Performs an audible alert, and visual indication to trace progress:
|
Voice Analyser |
|
Listens and records voice input, and synthesizes output for playback. The newer version can also save voice recordings and load them from memory. |