From StrategyWiki, the video game walkthrough and strategy guide wiki
Jump to navigation Jump to search
Security level Name Experience
1 Script Kiddie 25
2 Gray Hat 50
3 Black Hat 75
4 L33t Sk1llz 100
5 Master Hacker 125

Hacking is a pervasive minigame used to access a variety of computer security systems. Each security system has a security level from one at the easiest, to five at the hardest. Harder security levels have better security, which means you'll have less attempts to hack it and the security program is faster. If you are caught by the security system, you will be booted from the system, and if it is on a network, an alarm will be triggered, which summons guards. Standalone systems like storage lockers and safes won't set off an alarm, but you will be locked out from another attempt for 30 seconds.

When you start a hack, you will see the system analysis report, which tells you the security rating and how many attempts you have left. If you to choose to continue the hack, you will see the network, which consists of nodes and bridges. Bridges can be bi or unidirectional, with arrows indicating the direction on the latter. Your goal is to capture the registry or registries on the network, which allows you to bypass the security and either open up the system or unlock whatever it is attached to. You accomplish this by traversing the network, capturing nodes along the bridges on the way to the registries. You can also complete a hack by capturing the diagnostic subroutine(s). Once you begin to hack a node, you navigate around and begin hacking other nodes at the same time. If you are detected while hacking, a timer will appear at the top of the screen counting down the seconds until you are captured.

All the nodes in the network have a security rating number next to them (different from the overall security level of the system). These range from 1 to 5, with 1 being the easiest. High rated nodes have a greater chance of you being detected after capturing it. When you hover over a node, an option wheel will appear with four icons. The top choice is "Capture", which starts the capture of the node and displays a percentage, indicating the probability that you will be caught capturing the node. The left option is for using a Nuke virus, which captures a node immediately, with no chance of discovery. The right option is for the Stop! virus, but can't be selected from the wheel. Once you have been detected by the system, if you have Stop! virii in your inventory, you the option to use one will appear in the top right corner of the screen. The Stop! virus halts the security program for five seconds, allowing you to continue hacking. The last option in the wheel is "Fortify", which, if used on a node you've already captured—including the IO Port where you start—will beef up the security of that node, making it harder for the security program to recapture it.

Here is a list of the nodes on the network:

  • IO Port: This blue globe is your starting point. If it is captured by the security system, you will be booted from the system and an alarm will be triggered if there is one.
  • Registry: The green (yellow orb in director's cut) orb is your goal. There can be one or more of these, and you will need to capture them all to successfully hack the system.
  • Diagnostic Subroutine: The red towers contain the security program that backtrace your source and boot you from the system, if you are caught capturing a node. The security system traverses the same network and has to take time capturing nodes along the way, which will be harder if they are fortified.
  • Datastore: These gray cubes contain credits, XP or virii which can be downloaded and taken with you if you successfully complete hacking the system. Your goal when hacking should be to capture all datastores on your way to the registries. You can accumulate a lot of credits and experience this way, as well as the virii to help you in future hacks.
  • API: These gray cogs are smaller subroutines you can access to perform different functions.
    • Soften: Lowers the security ratings of adjacent nodes by 1.
    • Transfer: Transfers 2 security rating points between two random nodes.
    • Clearance: Lowers all datastore security ratings by 2.
    • Spam: Decreases the security system's rating by 1, making it slower in moving across bridges and capturing nodes.
  • Directory: These gray folders don't contain anything noteworthy, but are the most plentiful.