< Uplink
Jump to navigation
Jump to search
Software can be purchased from Uplink Internal Services, and be run on your computer.
Title | Cost, Size | Description |
---|---|---|
Decrypter |
|
Removes the encryption on files, up to the level equal to the version. In rare cases, you may encounter a level 8 encryption; these cannot be decoded. |
Decypher |
|
Cracks the elliptic-curve encryption protecting systems. Higher versions are more efficient. |
Dictionary Hacker |
|
Can quickly break passwords, but only if they are in a dictionary. Not useful after a few weeks. |
File Copier |
|
Pre-installed software that can copy files around. |
File Deleter |
|
Pre-installed software that erases files. |
Defrag |
|
Moves software to the beginning of memory. The same result can be accomplished by manually copying and deleting files. One must choose between saving time and effort or saving credits and memory space. |
Firewall Bypass |
|
Instantly bypasses a firewall protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more advanced firewalls. |
Firewall Disable |
|
Disables a firewall on a remote system. Running this will cause detection, unless the monitor has been bypassed. Higher versions will disable more advanced firewalls. |
HUD: Connection Analysis |
|
Adds an icon on the HUD that allows you to view connection information to a server. Required to run Firewall Bypass, Monitor Bypass, and Proxy Bypass. |
HUD: IRC Client |
|
Adds an icon on the HUD allowing to access IRC servers. By default, it connects to irc://irc.uplinkcorp.net:6667/uplink/ |
HUD: MapShowTrace |
|
Shows trace progress in the map in the top-right corner. |
HUD: Lan View |
|
Adds an icon on the HUD allowing to view local area networks. Required to interact with LANs. |
IP Lookup |
|
Given an IP address, adds the associated server to your links. Useful for tracking cross-server activity. |
IP Probe |
|
|
LAN Probe |
|
Determines links running from a given node on a LAN. Higher versions can operate on more advanced LANs. |
LAN Scan |
|
Scans a LAN for all reachable nodes. Higher versions can operate on more advanced LANs. |
LAN Spoof |
|
Some devices on a LAN only respond to computers within a given subnet. Using LAN Spoof tricks the device into responding to your queries. Higher versions can operate on more advanced LANs. |
LAN Force |
|
Disables a lock on a LAN, without you having to log into the associated security terminal. Causes detection. |
Log Deleter |
|
Deletes a log entry to varying results:
|
Log Modifier |
|
Allows changing the text in log files. The newer version also allows creating new logs in blank spaces. |
Log Undeleter |
|
Recovers previously deleted logs, including modified ones. |
Monitor Bypass |
|
Disables the monitor on a given system, allowing you to run password crackers or other detectable programs without alerting the admin. However, the admin is still alerted by logging into their account. |
Password Breaker |
|
Cracks a password on the system. |
Proxy Bypass |
|
Instantly bypasses proxy protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more advanced proxies. |
Proxy Disable |
|
Disables a proxy on a remote system. Running this will cause detection, unless the monitor has been bypassed. Higher versions will disable more advanced proxies. |
Trace Tracker |
|
Performs an audible alert, and visual indication to trace progress:
|
Voice Analyser |
|
Listens and records voice input, and synthesizes output for playback. The newer version can also save voice recordings and load them from memory. |