From StrategyWiki, the video game walkthrough and strategy guide wiki
Jump to navigation Jump to search

Software can be purchased from Uplink Internal Services, and be run on your computer.

Title Cost, Size Description
Decrypter
  1. 800c, 2Gq
  2. 1,200, 2Gq
  3. 1,600, 2Gq
  4. 2,200, 2Gq
  5. 3,000, 3Gq
  6. 7,000, 4Gq
  7. 15,000, 5Gq
Removes the encryption on files, up to the level equal to the version. In rare cases, you may encounter a level 8 encryption; these cannot be decoded.
Decypher
  1. 3,000c, 2Gq
  2. 5,000c, 2Gq
  3. 8,000c, 2Gq
Cracks the elliptic-curve encryption protecting systems. Higher versions are more efficient.
Dictionary Hacker
  1. 1,000c, 4Gq
Can quickly break passwords, but only if they are in a dictionary. Not useful after a few weeks.
File Copier
  1. 100c, 1Gq
Pre-installed software that can copy files around.
File Deleter
  1. 100c, 1Gq
Pre-installed software that erases files.
Defrag
  1. 5,000c, 2Gq
Moves software to the beginning of memory. The same result can be accomplished by manually copying and deleting files. One must choose between saving time and effort or saving credits and memory space.
Firewall Bypass
  1. 3,000c, 1Gq
  2. 4,000c, 1Gq
  3. 6,000c, 1Gq
  4. 8,000c, 1Gq
  5. 10,000c, 1Gq
Instantly bypasses a firewall protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more advanced firewalls.
Firewall Disable
  1. 2,000c, 1Gq
  2. 3,000c, 1Gq
  3. 4,000c, 1Gq
  4. 6,000c, 2Gq
  5. 8,000c, 3Gq
Disables a firewall on a remote system. Running this will cause detection, unless the monitor has been bypassed. Higher versions will disable more advanced firewalls.
HUD: Connection Analysis
  1. 20,000c, 0Gq
Adds an icon on the HUD that allows you to view connection information to a server. Required to run Firewall Bypass, Monitor Bypass, and Proxy Bypass.
HUD: IRC Client
  1. 4,000c, 0Gq
Adds an icon on the HUD allowing to access IRC servers. By default, it connects to irc://irc.uplinkcorp.net:6667/uplink/
HUD: MapShowTrace
  1. 5,000c, 0Gq
Shows trace progress in the map in the top-right corner.
HUD: Lan View
  1. 50,000c, 0Gq
Adds an icon on the HUD allowing to view local area networks. Required to interact with LANs.
IP Lookup
  1. 500c, 1Gq
Given an IP address, adds the associated server to your links. Useful for tracking cross-server activity.
IP Probe
  1. 2,000c, 3Gq
  2. 4,000c, 3Gq
  3. 5,000c, 3Gq
  1. Reports security systems on a given IP address.
  2. Reports the versions of security systems on a given IP.
  3. Reports version and status of security systems on a given IP.
LAN Probe
  1. 15,000c, 3Gq
  2. 20,000c, 3Gq
  3. 30,000c, 4Gq
Determines links running from a given node on a LAN. Higher versions can operate on more advanced LANs.
LAN Scan
  1. 10,000c, 2Gq
  2. 15,000c, 2Gq
  3. 25,000c, 2Gq
Scans a LAN for all reachable nodes. Higher versions can operate on more advanced LANs.
LAN Spoof
  1. 20,000c, 2Gq
  2. 30,000c, 3Gq
  3. 45,000c, 5Gq
Some devices on a LAN only respond to computers within a given subnet. Using LAN Spoof tricks the device into responding to your queries. Higher versions can operate on more advanced LANs.
LAN Force
  1. 15,000c, 2Gq
  2. 20,000c, 3Gq
  3. 25,000c, 4Gq
Disables a lock on a LAN, without you having to log into the associated security terminal. Causes detection.
Log Deleter
  1. 500c, 1Gq
  2. 1,000c, 1Gq
  3. 2,000c, 1Gq
  4. 4,000c, 1Gq
Deletes a log entry to varying results:
  1. Leaves an empty log entry behind
  2. Leaves a blank space behind
  3. Copies another user's log entry over your own.
  4. Moves other log entries onto the deleted entry. Cannot be undeleted.
Log Modifier
  1. 4,000c, 2Gq
  2. 6,000c, 2Gq
Allows changing the text in log files. The newer version also allows creating new logs in blank spaces.
Log Undeleter
  1. 5,000c, 1Gq
Recovers previously deleted logs, including modified ones.
Monitor Bypass
  1. 10,000c, 1Gq
  2. 12,000c, 1Gq
  3. 16,000c, 1Gq
  4. 20,000c, 1Gq
  5. 25,000c, 1Gq
Disables the monitor on a given system, allowing you to run password crackers or other detectable programs without alerting the admin. However, the admin is still alerted by logging into their account.
Password Breaker
  1. 1500c, 2Gq
Cracks a password on the system.
Proxy Bypass
  1. 6,000c, 1Gq
  2. 8,000c, 1Gq
  3. 12,000c, 1Gq
  4. 16,000c, 1Gq
  5. 20,000c, 1Gq
Instantly bypasses proxy protection on a remote system. Requires connection analysis, and is not detectable. Higher versions can bypass more advanced proxies.
Proxy Disable
  1. 3,000c, 1Gq
  2. 4,000c, 1Gq
  3. 6,000c, 1Gq
  4. 8,000c, 2Gq
  5. 10,000c, 3Gq
Disables a proxy on a remote system. Running this will cause detection, unless the monitor has been bypassed. Higher versions will disable more advanced proxies.
Trace Tracker
  1. 300c, 1Gq
  2. 600c, 1Gq
  3. 1,400c, 2Gq
  4. 2,500c, 3Gq
Performs an audible alert, and visual indication to trace progress:
  1. Shows trace status only
  2. Shows percentage of trace
  3. Shows estimated time remaining
  4. Shows exact time remaining
Voice Analyser
  1. 5,000c, 4Gq
  2. 10,000c, 5Gq
Listens and records voice input, and synthesizes output for playback. The newer version can also save voice recordings and load them from memory.