Uplink/Missions

A variety of generic missions can be accepted from the listing on the Uplink Internal Services System. This guide will give you an idea of what software and techniques will be needed to complete each mission. The missions are listed by category, as many of them are nearly identical.

Delete a file

 * Mission Descriptions:
 * Break into a rival computer system and sabotage files
 * Hack into a computer and delete Key files
 * Find and destroy crucial data on a mainframe

Uplink Ranking: Beginner Difficulty Rating: 2 Required Software: Password Breaker, File Deleter

This mission type is the easiest by far. It's a good idea to bounce the connection a few times, as always, but not much time will be needed to complete the mission. Crack the password and access the file server. Locate the file mentioned in the mission e-mail, then delete it. Cover your tracks and send a reply to receive payment.

Copy a file

 * Mission Descriptions:
 * Access a remote system and copy important data files
 * Steal important data from a rival companies file server
 * Gain Access to a rival system and steal research files

Uplink Ranking: Beginner - Novice Difficulty Rating: 2 - 3 Required Software: Password Breaker, File Copier, Decrypter (for difficulty 3 only)

This mission type is very similar to previous one, however instead of deleting the file, copy it to the Gateway's memory. Cover your tracks as usual. If this was a difficulty 3 mission, the file may be encrypted. If so, use a decrypter program to remove the encryption. Then reply to the employer, including the file as an attachment.

Change Academic Records

 * Mission Descriptions:
 * Improve our associates' academic standing
 * Help us prove a fellow employee is over-rated
 * Generate a University Degree for a friend
 * Qualifications required for wealthy professional

Uplink Ranking: Novice Difficulty Rating: 3 Required Software: Password Breaker

This mission type requires hacking into the International Academic Database. This server has very low security. If you have a monitor bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. It is important to note which type of qualifications the employer wants changed. If they want a grade changed (giving the target an 'A' in a class, for example), this goes in the first field. If they want a degree changed (perhaps giving the target a Class 1 degree), this goes in the second field. If they want a qualification added, this goes into the third field. Click on the "Commit" button to save any changes. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Change Social Security Records

 * Mission Descriptions:
 * Create part of a new identity
 * Falsify a Social Security Document

Uplink Ranking: Confident Difficulty Rating: 4 - 5 Required Software: Password Breaker, Proxy Disable/Bypass v1.0

This mission type requires hacking into the International Social Security Database. This server has somewhat better security than the academic database. If using a proxy disable program, start that first, then start the password breaker as soon as the active trace begins. If you have both monitor and proxy bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. Once in, search for the target. The last field, "Personal Status", is the one that needs to be modified. As before, click on the "Commit" button to save changes. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Change Criminal Records

 * Mission Descriptions:
 * Help to stop a hacker from ever working again
 * Help to discredit one of our rivals
 * Clear a criminal record

Uplink Ranking: Intermediate Difficulty Rating: 5 Required Software: Password Breaker, Proxy Disable/Bypass v1.0, Decypher v1-v3

This mission type requires hacking into the Global Criminal Database. It has even better security than the previous government servers. If you have both monitor and proxy bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. If using a proxy disable program, start this first, then start the password breaker as soon as the active trace begins. Use the decypher program to crack the elliptic curve encryption cypher. Once in, search for the target. To add to a criminal record, type the desired conviction into the field at the bottom and click on the "Add Conviction" button. To clear a record, click on the "Clear Record" button. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Find Financial Details

 * Mission Descriptions:
 * Client interested in financial data on an enemy
 * Find Financial Details of one of our associates

Uplink Ranking: Intermediate Difficulty Rating: 5 Required Software: Password Breaker

This mission type requires hacking into one of the bank servers. Banks are notorious for their very quick passive traces, so be sure to cover your tracks quickly once you disconnect. The employer will include a the bank IP address and account number to be hacked. Connect to the bank, select modify existing account, then type in the account number before running the password breaker. Once in, access the account summary. The employer wants either the balance or loan amount, so be sure to get the right value. Reply with the requested value to receive payment.

Tip: If asked for the loan amount, try replying with "0" before beginning the hack. Many accounts don't have a loan, so this may save some time.

Destroy Database

 * Mission Descriptions:
 * Destroy corporate data of a rival company
 * Destroy customer records on a sales system
 * Destroy rival software in development

Uplink Ranking: Intermediate Difficulty Rating: 5 - 6 Required Software: Password Breaker, Firewall Bypass/Disable v5 and File Deleter OR Proxy Bypass/Disable v5

This mission type requires hacking into a corporate server with varying levels of security. If the target system is a LAN, that software will also be required. This mission can be completed in a number of different ways, depending upon software and preferences.


 * 1) If using only the proxy defeating software: Once the proxy is down, access the admin security settings and disable the firewall from there. Then either:
 * 2) access the file server and delete the all files on the server using a file deleter,
 * 3) or access the admin console and type "cd usr" to enter the user files directory, followed by "delete" to destroy all user files.
 * 4) If using firewall software and file deleter: Once the firewall is disabled, access the file server and delete all files using the file deleter.

Cover your tracks and fast-forward until a story appears on the news server of the Uplink Internal Services System. Then reply for payment.

Copy Database

 * Mission Descriptions:
 * Copy large and secure corporate database
 * Copy proprietary source code database
 * Steal valuable scientific research documents
 * Break into high security system and steal customer records

Uplink Ranking: Intermediate Difficulty Rating: 5 - 6 Required Software: Password Breaker, File Copier, Decrypter v7, Proxy Bypass/Disable v5 OR Firewall Bypass/Disable v5 Other Requirements: 60-120Gq of Memory Space

This mission type plays out very similarly to the previous one, except the files must be copied rather than deleted. As a result, it requires a large amount of open memory space.

As before, there are two basic approaches:
 * 1) use a proxy bypass/disable, then disable the firewall from the admin security settings
 * 2) or simply use a firewall bypass/disable.

Once the firewall is down, copy the target files to your memory. The required files can be identified by their name and file size. They will be fairly large files (8 - 10Gq) and their names will include either "corp" for corporate data, "cust" for customer records, "r???" for research documents, or "soft" for software.

Then disconnect and cover your tracks. Finally, connect the the designated file server, login with the provided credentials, and copy the files over to there. It is not necessary to bounce this connection, as you are accessing the server legally. Decrypt the files on the server, the reply for payment.