Uplink FAQ for version 1.0 of Uplink
created by: Reverent
date: 5/06/04
e-mail: annie@reverent.net
version: 0.61
Note: This is an faq in progress, many sections may
not yet be present.  All sections completed are noted
with a *, those in progress with a +.

----

Table of contents

[254] Version History +
[975] Introduction *
[357] Getting Started *
[193] GamePlay Tips +
[452] Missions +
        [001] Uplink Test Machine *
        [002] Distroy or Copy Files *
        [003] Changing Academic Records *
        [004] Changing Social Security Records *
        [005] Changing Criminal Records *
        [006] Bank Account Information *
        [007] Delete Computer Database *
        [008] Trace a Bank Transfer *
        [009] Copy and Secure a Large Database *
        [010] Trace a hacker +
        [011] Transfer Money *
        [012] Ruin a life *
        [013] Frame a person for Computer Crimes *
[623] Storyline Missions +
	[301] Revelation *
        [302] ARC Mission 1 - MaidenFlight +
        [303] ARC Mission 2 - Darwin
	[304] ARC Mission 3 - SaveItForTheJury
	[305] ARC Mission 4 - ShinyHammer
	[306] ARC Mission 5 - GrandTour
	[307] Arunmor Mission 1 - BackFire +
	[308] Arunmor Mission 2 - Tracer
	[309] Arunmor Mission 3 - TakeMeToYourLeader
	[310] Arunmor Mission 4 - ARCInfiltration
	[311] Arunmor Mission 5 - Counter Attack
	[312] Special Mission 1 - Wargames *
	[313] Special Mission 2 - Mole *
[735] Uplink Internal Services
        [101] News
        [102] Mission Lists
        [103] Software Upgrades *
        [104] Hardware Upgrades
        [105] Gateway Upgrades
        [106] Rankings
        [107] Help
        [108] Administration
[236] Miscellaneous +
        [401] Name Generations
        [402] Cheats *
        [403] Secrets
	[404] Game Play Hints
        [405] Software Explainations
        [406] Uplink Patch 1.31
        [407] LANs
        [408] Game Bible
        [409] Bugs

-----

[254] Version History

0.33 - 4/27/04 - Started work on Uplink FAQ.  Aren't I special!?
0.51 - 5/06/04 - Added about five more missions
                 Fixed up a lot of the alignment
                 Added in a GamePlay Tips Section
                 Filled in the Cheats Section
                 Added Game Play Hints and Filled it in
                 Fixed up the Storyline Missions listing
                 I NEED TO FIX MY STATEMENTS OF WHAT TO BUY
                 PLEASE LOOK FOR THEM IN MY NEXT UPDATE!
0.55 - 5/07/04 - Added about three more missions
                 Did not fix statements about what to
                 buy, coming soon.
0.56 - 5/08/04 - Fixed the "Frame a man for Computer Crimes"
                 Mission.  Figured out that you don't need
                 to hack a central mainframe for sucess.
0.60 - 5/12/04 - Started work on the Storyline missions
                 Revelation Overview complete
                 Backfire Complete
                 Wargames Complete
                 More information was put into the Cheats section.
                 GameBible Information added
0.61 - 5/24/04 - Working on suggested posted on the www.gamefaqs.com
                 Message boards, thanks are at the bottom of the FAQ.

0.65 - 6/2/04  - Made more corrections from the suggestions on the
                 gamefaqs.com message boards
                 Completed Uplink version 1.0 software upgrades
                 Started on In-depth Software explainations
-----

[975] Introduction

Uplink is a stratagy "hacking" game created by the folks over at Introversion.
It was first released in the UK and Europe 10/01/01 and in the US in 10/09/01.
Though this was very much an underground release, it gained quite a bit of 
popularity and was given high reviews.

Since then, Uplink has been updated by Introversion and has been adapted for
Linux and Mac users to play.

Introversion - http://www.introversion.co.uk (Creators; Windows and Linux
versions)
Ambrosia - http://www.ambrosiasw.com/news/ (Mac version of Game)

-----

[357] Getting Started

Go ahead and launch Uplink, which I hope you have already installed.
The first things you will see is a screen with two buttons.  One tells you
about Uplink Corporation.  Uplink corp is the worlds largest freelance hacker
industry in the world.  Guess what?  They want you to join their elite ranks.
Pressing the second button will give you the same speach.  Read through if you
want.  The next screen will be asking you to put in any screen handle and
password you want.  Don't worry about writing down your password, as Uplink
has been designed to store it for you.  Remember: ALWAYS KEEP YOUR CURSOR OVER
THE TEXT BOX YOU ARE TYPING IN!  For some reason, Uplink doesn't like it if you
don't.  You will be then asked for a location of your gateway.  It's really not
important, so choose anywhere you'd like.
	
After you have chosen a location you will be then asked to put in a
code from the card you recieved with the game.  Don't e-mail me asking for
what numbers or such that you should be putting in if you didn't buy the
actual game.  I will just delete your e-mail and laugh.  Uplink will ask
you every time you create a new user for this information, so keep your key
card.

Uplink will show a "download" of information on your screen and,
BAM, you are now an offical Uplink Agent.

As an agent, you are connecting to a computer that is stored at the
Uplink corporation building.  Through their internal services server, which
you have free access to, you can request a change in memory, modems, security
devices, processors, gateways (computer), and software.  They also give you
access to a Buliten Board System that places jobs for hackers like you.

All of this, for the cost of 300 c a month.

When you log on, there is an in game tutorial of how to use Uplink.  If
you are a first time player, I highly suggest you read through it, as from here
on out I will be assuming that you understand the basics.

------
[193] GamePlay Tips

* Buy Password Breaker and Trace Tracker v 4.0 in the beginning of the
game.

* Do NOT buy anything but the best version of something.  It saves
money and time in the long run to just wait it out with the little
programs you have than to buy every version of an application.

* Do not waste your money with any of these programs: Firewall Disable,
Dictonary Hacker, and Proxy Disable.

* With the exception of the "Frame a hacker" missions, make as many
bounce points as possible.

* Always try to bounce through a system you already have admin access to.

* ALWAYS use InterNic OR Uplink Test System as your FIRST bounce.

* Always go back and delete logs of your entry; remember, you can be
passive traced.

* If you've been slapped on the wrist and made to pay a fine, go back
and delete your criminal record later.

* Keeping a small pad of paper in front of you for a basic description
of your target and what needs to be done can be helpful.

* Remember, this is a game of speed.  If you get down to anywhere
less than 10 seconds on Trace Tracker v 3.0+ or are hearing a beep more
than once a second, disconnect immediately.

* If you are doing the story line missions, becareful on who you do missions
for!  If you do any missions for ARC, you will be hurting youself later
unless you are doing the ARC storyline.

* Try not to abandon a mission.  It doesn't look good for you.

* Try to milk as much money out of your employers as you can.  If they
do not give you more money, say "No, thanks" and ask them again. Thanks
MetroidFox

* Your loan amount will increase every new rank as an Uplink agent. If
you are straped for cash, having a loan can get you out of a tight spot.
Thanks Alex.

* Untested tip by Alex: If you use "readwrite" as the account you are
hacking instead of "admin", you will not be traced and the password
will stay on government acounts ONLY.  You must have Montior Bypass
of the appropriate level on as well to make this trick work.

------
[452] Missions

===
[001] Uplink Test Machine

Objective: Copy "Uplink Test Data" and send it back to Uplink Corp.
Required Software: File Copier V 1.0 - 100 c - 1gq (preloaded)
                   Password Breaker v 1.0 - 1500 c - 1gq (SUGGESTED)
                   OR
                   Dictonary Hacker v 1.0 - 1000 c - 4gq (NOT SUGGESTED)
Suggested Tools: Trace Tracker v. 4.0 - 2500 c - 3 gq
Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
Hardware Upgrade: None
Security Level: Low
Threat: Non-existant
Money Recieved: 0 c

Your first mission when you sign on is to hack into and copy a file
on the Uplink Test Machine.  Though the in game tutorial explains how, I
will cover this mission anyway.

First things first, you have 3000 c to play with in your account, but to
get the best that you can at this point, go to the Uplink International
Bank and pull out a loan of 4000 c.  This isn't a lot of money and it
will help you out a LOT in the beginning.

To get into any machine in Uplink, you will have to have at least a
password or something of a similar sort. So, let's get a cracker!  You have
your choice between two flavors of password crackers.  The first that you will
see is Dictonary Hacker.  It's cheaper than Password Breaker, and is faster
all around.  The drawback that is after your third or fourth mission, the
software will be obsolete for the REST OF THE GAME.  I wouldn't even waste my
time or money on buying it.  Sooo... There is also Password Breaker.
It's slower, but it WILL get the password eventually.

The next purchase I suggest you to do is Trace Tracker v 4.0.  You 
don't have to buy versions 1.0 and 2.0 first, so save your money.  Stick with
Trace Tracker until you can save up for the HUDMapShowTrace.  I personally like
having an exact time, so you may keep it regardless.  Anyway, for the test
machine, it isn't required, but you may as well since you will have to use it
in the next set of missions and for the rest of the game.

After you're all suited up, go into your map screen.  In the tutorial,
you were told that you can bounce calls off of different machines.
This is a required trick, since this will be what buys you the most
ammount of time for anything. Click on every dot on screen, leaving Uplink 
Test Machine to be your last click.  When you have it all loaded up, hit
connect.

Read the paragraph about the machine if you'd like, and then click on 
the "Start Test" button.  You will now be looking at a screen that looks 
like this:

	
        Uplink 
        Test Machine

        -----------------------------------
       | User Authorisation Required       |
       |                                   |
       | Name ______________________       |
       | Code ______________________       |
       |                                   |
        -----------------------------------
                                 |Proceed|
                                  -------


Time for your first hack.  Fire up password breaker and trace tracker.
You should notice that the CPU usage bar has both listed and there is a light
blue bar 1/2 way filled behind them.  Click on the right arrow button on the
"Password Breaker" bar. Fill it up until that bar is a deep blue and the
"Trace Tracker" bar is a neon green.  Click on the Password Breaker program
running below the Autorisation box, then click the Autorisation box.

Password Breaker is now solving the password.  Eventually, it will be
finished and you will see the boxes filled in with "admin" for name and 
"*******" for code.  During this time, you will see trace tracker giving you
a time period you have left.  It should be around 130 seconds.
	
Click proceed as soon as you see the code typed in.  Now, go back into
your menu and open up "File copier".  Click on the "Access fileserver" button,
and then click on the Uplink Test File.  It'll be copying, rather slowly, so
give it a nudge, and click the right arrow on the CPU bar and push it up to the
same dark blue you did with Password Breaker.  Ah, that's faster.

Open your memory banks button and wait for the file to finish copying.
Click on File Copier and then click on an empty space in your data banks.  As
soon as you see a transparent green box that says "Uplink Test Data" in there,
DISCONNECT!  Never, EVER leave a connection going when you are doing work.
As soon as your mission is complete, get out. Uplink is a game of speed, so if
you aren't fast enough on doing this, you'll see the game over screen pretty
quick.
	
Click on your e-mail from Uplink.  Should look like a little peice of 
paper.  Hit Reply, and then "File: None Attached".  Click on Uplink Test Data 
that comes up on your menu.  The button should now read "Uplink Test Data".  
Send the e-mail.

Congradulations.  You have now completed your first mission with Uplink.
	
For those of you speeding through this, the password for this level is 
'rosebud' and will always stay that way.

------

[002] Destroy or Copy Files

Before starting either of these missions, you want to go into your 
memory banks and use the tool "File Deleter" to erase "Uplink Test Data" 
and the "Tutorial" program if you feel confident enough with the game to do so.

To get any missions, you need to log on to the Uplink Internal Services
machine and access the Mission List button.  You may or may not see any "white"
missions.  Any mission that is a dark gray is one you cannot accept.  Fast 
forward time on your time bar and wait until something comes up. You have the
options of accepting straight out or contacting.

MetroidFox suggests that you should always contact the employer and ask for
more money.  If they say no, say "No, thanks" and then come back and try
again until they say yes.

The suggestion, while possibly tedious (it took a brand new character of
mine 8 attempts once), will actually net you a good deal of extra money.

Also, while doing these missions, you may want to keep a list of what
companies you are hacking into and destroying and which you are helping.  
This information is useful when it comes to playing the Stockmarket, 
details on that later in this FAQ.

Level 1 missions are simple to complete and will give you a little bit
of quick cash to upgrade your gateway with.  It should only take about 1 
mission of each type to progress on to the next level of missions.  However, 
you may want to play around in this area for about 10 missions to make sure 
that you have enough money to continue and so that you have a good feel for 
what to do.

Finally, if you have not already done so, log into InterNIC and click the
"Admin" button.  Get the password (you will not be traced).  This will
become exceedingly handy for the rest of the game.


***Destroy the File Mission***

Objective: Delete the file from company A for Company B
Required Software: File Deleter V 1.0 - 100 c - 1gq 
                   Password Breaker v 1.0 - 1500 c - 1gq 
                   Trace Tracker v. 4.0 - 3 gq
Suggested Tools: None
Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
Hardware Upgrade: None
Security Level: Low
Threat: Low
Money recieved: 1000 c - 1500 c

When you accept this type of mission, make sure that you know which
company you are going into and what file you are supposed to delete.  Most 
of the servers you go into are slow, but occasionally, you run across the 
server or two that is fast enough to make your job hard.

First, make your connection route, using InterNIC or Uplink Test Machine as
your first bounce point.  It's suggested that you have one saved.  It's
convient and saves time.  Sadly, you must redo this route every 
time you log out and log back into Uplink, but it's a small price to pay.

When you access the server, it should look a LOT like the Uplink Test 
Machine.  Go ahead and turn on Trace Tracker (you may as well leave it on for
now on) and password breaker.  Be certain to set password breaker to the
highest limits it can go WITHOUT turning off Trace Tracker.  Again, Uplink is
a game of speed.  I suggest that while the password breaker is solving said
password, click on your application menu and hover your mouse above the 
"file deleter" application.  Once the password is solved, click on file 
deleter, hit proceed, then access the "fileserver" menu.  Delete the file that 
you were sent out to delete.  I would suggest to make file deleter to go faster 
by kicking up the speed via the CPU menu bars. If you have extra time, and you 
want to REALLY mess up this company for some reason, feel free to
delete more files,just don't get caught.  As soon as your work is
done, hit disconnect.

Go to the corresponding e-mail for your mission and reply.  If you have
not gotten the V. 1.31 patch for Uplink from Introversion's website
(http://www.introversion.co.uk) or from Ambrosia
(http://www.ambrosiasw.com/news/), you will have to wait for the WHOLE e-mail
to be typed out before you hit send.  Otherwise, feel free to be trigger happy.

===

***Copy the File Mission***

Objective: Copy the file from company A for Company B and send it back to
           Company B
Required Software: File Copier V 1.0 - 100 c - 1gq 
                   Password Breaker v 1.0 - 1500 c - 1gq
                   Trace Tracker v. 4.0 - 2500 c - 3gq
Suggested Tools: None
Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
Hardware Upgrade: None
Security Level: Low
Threat: Low
Money recieved: 1000 c - 1500 c

When you accept this type of mission, make sure that you know which
company you are going into and what file you are supposed to delete.  Most
of the servers you go into are slow, but occasionally, you run across the
server or two that is fast enough to make your job hard.

First, make your connection route.  It's suggested that you have one
saved.  It's convient and saves time.  Sadly, you must redo this route every
time you log out and log back into Uplink, but it's a small price to pay.

When you access the server, it should look a LOT like the Uplink Test
Machine.  Go ahead and turn on Trace Tracker (you may as well leave it on for
now on) and password breaker.  Be certain to set password breaker to the
highest limits it can go WITHOUT turning off Trace Tracker.  Again, Uplink is
a game of speed.  I suggest that while the password breaker is solving said
password, click on your application menu and hover your mouse above the
"password copier" application.  Once the password is solved, click on file
copier, hit proceed, then access the "fileserver" menu.  Copy the file that
you were sent out to copy.  I would suggest to nudge up file copier's speed via
the CPU speed bar.  While it is copying, open up your memory banks and wait.
When it is finished copying, click on file copier and then click on an empty
ammount of space.  There is not much that can be gained by copying other random
files, so disconnect as soon as this is done.

Go to the corresponding e-mail for your mission and reply.  Click on 
the "File: none attached" button, and attach the correct file for the mission.
Send it out and wait for a response.  Once recieved, use file deleter to delete
the file you copied.  You'll run out of space fast if you ignore this step. If
you have not gotten the V. 1.31 patch for Uplink from Introversion's website
(http://www.introversion.co.uk) or from Ambrosia
(http://www.ambrosiasw.com/news/), you will have to wait for the WHOLE e-mail
to be typed out before you hit send.

--------

[003] Changing Academic Records


Objective: Change an academic record for your employer
Required Software: Password Breaker v 1.0 - 1500 c - 1gq (SUGGESTED)
                   Trace Tracker v 4.0  - 2500 c - 3 gq
Suggested Tools: Log Deleter v 1.0 to v 4.0
                        - v 1.0 - 500 c - 1gq
                        - v 2.0 - 1000 c - 1gq
                        - v 3.0 - 2000 c - 1gq
                        - v 4.0 - 4000 c - 1gq
Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
Hardware Upgrade: None
Security Level: Low
Threat: Medium-Low
Money recieved: 2000 c to 3500 c

Once you feel you are ready to go to the next step to take these missions,
go ahead and try to sign up for one from your BBS.  Sometimes it will show up
white and say you're to low of a level to take the mission on.  Solution?
Contact the company and then click "ok, agreed."  If you are getting this
message, however, you might want to reconsider and take on lower level
misssions for a while longer.

I have suggested that you get the Virtuanet gateway at this point.
I personally love this gateway because, as stated, you CANNOT get caught. That's
right.  If you stay on to a computer for to longer, it will just boot you.  No 
game overs.  However, for your own sake for later in the game, keep in the 
habbit of disconnecting before Trace Tracker v. 3.0 reads 6 seconds or below 
OR you are disconnected.

***NOTE: I am writing the FAQ currently for version 1.0 release of
Uplink.  If you are using any of the newer patches, there is a possiblity
of your STILL being caught if you are using the Virtuanet gateway, according
to Alex.  I have seen this happen when I played v 1.31 a while back, but
it's been a while. ***

The Academic Database is a little tougher than the run of the mill
computers you have been working with.  I highly suggest that you make your
connection line a lot longer.  To find new connection points, go to the InterNIC
server.  Government computers work well, but remember that you want to make your
first connection on the line an Uplink machine (I suggest the Uplink Test Data
Machine OR the InterNIC since it is easy to get into and you can freely change
the logs later).

Before you get going, make sure you know exactly what the name of the
target is and what the employer wants done.  Having the name written down before
hand is a BIG help.  Once your string is set, log on to the Academic Database.
Have the password breaker get through the admin account and then click
on "Search Records".

***ANOTHER NOTE: This is untested by me, but according to Alex again from
www.gamefaqs.com message board, if you use the account "read write" for 
this type of mission, you will not be actively traced AND the password will
not be revoked!  Make sure that you have the appropriate level of Montior
Bypass (might as well use level 5) running when you are doing this trick
otherwise it won't work!***

It will have a text box saying "enter name here" with the buttons "ok"
and "cancel" below that.  Type in your target's name and let it search. The
names are pulled up in alphabetical order.  So if your target is Alex Cowell,
you'll get to the record quick.  If your target is Warren Simpson, it'll
be a while longer.  Make sure you keep this in mind and give yourself enough
time to get to the record and change it.

It will only take about two of these missions to go to the next level,
 but I suggest four to six.

Please refer to the diagram below before you scroll to your appropriate
mission.

        International Academic Database
        view record

   ---------------     -------------------------------------
  |               |   | Target Name                         |
  |               |    -------------------------------------
  | Target        |            College Qualifications 
  | Photo         |    -------------------------------------
  |               |   | Class        *                      |
  |               |   | Class2       *                      |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
  |               |    -------------------------------------
  |               |            Graduate Qualifications
   ---------------     -------------------------------------
                      |Qualification name, Class x          |
                      |                                     |
                       -------------------------------------
                               Other Qualifications
   ---------------     -------------------------------------
  |   Commit      |   |Accreditation                        |
   ---------------    |                                     |
   ---------------     -------------------------------------
  |   Done        |
   ---------------         

The Boxes above is what you will be looking at for the Academic Database.
You will be required to mostly mess with Graduate Qualifications or Other
Qualifications.  * stands for a letter grade achieved (A through G, oddly) and
the "X" for class stands for a number 1 through 3. 1 being the best, 3 the
worse.

When you are done with a mission, hit commit, then click okay on the box
that comes up.  If you have multiple missions in the Academic database, hit done
and repeat the process.  For some reason, Uplink doesn't like it if you complete
multiple missions and THEN send out the e-mails, so I would suggest e-mailing
your employer directly after you finish the changes on the appropriate academic
record.  Remember, disconnect ASAP.  This is a government machine and if you
get caught  to many times, it's game over.

***Target scored to highly on test, give him a 3rd class replacement***

In the Graduate Qualifications Box, change the Class 1 to Class 3 then
hit commit.

***Target needs first class degree***
	
This is the oppisite of the first type of mission.  Go into the file,
and erase the 3 or 2 after class and replace it with a 1.  Commit.

***Individual urgently requires Qualification***

It's hard to tell which goes where, but if you see the word "certified"
or "accredited" in the title line of what the job is, it will be in the Other
Qualifications box.  Simply type in, CORRECTLY, the title of the job and hit
commit.

***Individual urgently requires Degree/Generate a University Degree***
	
This is the same as above, but it's not a certification or anything of
the such, so in the Graduate Qualifications, type in the WHOLE job (I often
times forgot to put in "engineer" or something silly of the sort, so be 
careful), and hit commit.

When you are finished with the mission, go to the first bounce point
on your string, which is either Uplink Test Machine OR InterNIC, and
delete the logs of you ever doing any of this. Access the server and
use "Log Deleter" whatever version you like to delete ANY log with
your I.P. number in it.  This trick will be a good habit to remember and will
save you from detection in the future.  Remember, ALWAYS DELETE THE LOGS OF AT
LEAST ONE, IF NOT UP TO THREE OF THE COMPUTERS ON THE CONNECTION STRING!  Just
because you got out before you were booted doesn't mean that the
company/insitiution doesn't care anymore and will stop looking for you.
At this level, it isn't a big deal, but it will be soon.

---------

[003] Changing Social Security Records


Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 4.0 - 2500 c - 3 gq
                   Log Deleter v 4.0 - 4000 c - 1 gq
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 - 6000 c - 1gq
Suggested Tools: None
Gateway Suggested: The VIRTUANET R-ACCESS Gateway - 15750 c.
Hardware Upgrade: None
Security Level: Medium
Threat: Medium
Money recieved: 

Everything up to here has been a cake walk.  From here on out, no 
matter what, you must be fast.  Always disconnect after your missions, make
sure that you are hovering above the application you need before you have to
use it, use long connection strings, and delete the logs of your bounces on at
least two or so computers.

These missions require you to hack into the Social Security Database
and change information on different people.  These missions pay more, but if
you are caught, it is a fine, and a second time is definately a game over.
If you haven't already switched gateways, now is the time to do it.
	
Also, you need quite a bit of credits to be able to complete these
missions.  You MUST have a HUD ConnectionAnalysis program installed, along
with quite a bit more software.  It is advised that you work on lower level
missions, play the stockmarket, so on so forth, before you start this mission
evel.

Finally, before you start this mission, be aware that the "Contact" 
option on the mission BBS is now a VERY useful source of information.  Asking
who the target is and what level the security is at will be beneficial to you.
Also, if you are getting stuck, you may want to look at the help menu on the
Uplink Internal Services Server.  It will often times help point you in the 
right direction.

***NOTE: This is untested by me, but according to Alex again from
www.gamefaqs.com message board, if you use the account "read write" for 
this type of mission, you will not be actively traced AND the password will
not be revoked! Make sure that you have the appropriate level of Montior
Bypass (might as well use level 5) running when you are doing this trick
otherwise it won't work!***

You will have somewhere in the area of 40 to 60 seconds to complete one
mission, depending on what upgrades you have.  Make sure you act fast.  When
you log on to the SSD, start using password breaker. While it is going, open up
HUD ConectionAnalysis (it is the newest button in your menu panel on the bottom
left hand corner of the screen).  You will see that there is a proxy server in
your way.  Hover your mouse above "Proxy Bypass" (whatever version you have, v
1.0 is sufficent) and get ready to click on it once the password breaker is
finished.  Click on the Proxy server on your HUD CA.  The little round red dot
should turn green.

Proceed.  Click on Search Records.  Enter the name of the target like
you did in the Academic database. Unlike the Academic Database, the Social
Security Database will randomly search. Be sure you have at LEAST 20 seconds
left on Trace Tracker before you start changing records, or you will get caught


Refer to the diagram below for the Social Security Database set up


International Social Security Database
view record

   ---------------            Name
  |               |    -------------------------------------    
  | Target        |   | Target Name                         |
  |               |    ------------------------------------- 
  | Photo         |           Social Security Number
  |               |    -------------------------------------
  |               |   |123-45-6789                          |
  |               |    -------------------------------------
  |               |           Date of Birth
  |               |    -------------------------------------
  |               |   | DD-MM-YYYY                          |
  |               |    -------------------------------------
  |               |           Marital Status
  |               |    -------------------------------------
  |               |   |Marital Status                       |
   ---------------     -------------------------------------
                              Personal Status
                       -------------------------------------
                      |Personal Status                      |
                       -------------------------------------
                             
   ---------------     
  |   Commit      |   
   ---------------   
   ---------------     
  |   Done        |
   ---------------         
	
		
For these missions, you are going to be completely
concerned with ONLY the personal status text box.  You can, of course, have
fun and mess around with other people's status if you want (this will often
times show up in the news), but it's not required.  Typically this box will
say either "Self-employed", "Employed", or "Deceased".

***Target living to easily***

Clear out whatever is already in the box for Personal Status and put 
down "Deceased".  Remember, always spell things right, or the computer will 
tell you that you haven't changed the record yet.  Hit commit and you're done.

***Falsify a Social Security Document***

Changed the word "Deceased" to "Employed".  Commit.  You're done.

---------
[005] Changing Criminal Records

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 5.0 20000 c. - 1 gq
                   Decypher v 3.0 - 8000 c - 2 gq
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

You will need to plunk down another 33000 c. for these missions, at the
most, so save up again.  Some of you may even want to get HUDMapShowTrace,
but really, you will only NEED Trace Tracker in Uplink, so remember that
it is an optional upgrade.

However, you must get at least version 1.0 of Decypher.  I would suggest
to go ahead and get Monitor Bypass too.  It will help with all missions
after this one, though it is not completely required for this mission.

Looking into the Global Criminal Database, there will be a new challange
waiting for you here.  The Ellptic-Curve Encryption Cypher.

When doing these missions, I find it's more time efficent to use the
Decypher first before the password breaker.  It takes a little more time,
so if they aren't tracing you when you are using it, that's a little
time saved.  Having Decypher 3.0 from the get-go is also a big help.

If you haven't already done so, now is the time to start hardware upgrades.
Just like software, don't even bother with getting anything but the best.
Remember to check what type of modem is the high end for your respective
gateway.  Spending more money than you have to is always a bad thing.

***NOTE: This is untested by me, but according to Alex again from
www.gamefaqs.com message board, if you use the account "read write" for 
this type of mission, you will not be actively traced AND the password will
not be revoked!  Make sure that you have the appropriate level of Montior
Bypass (might as well use level 5) running when you are doing this trick
otherwise it won't work!***

Go ahead and start making your bounces now.  Turn on HUDConnectionAnaylsis,
Trace Tracker, Decypher, and if you got it, Monitor Bypass, it'll give
you a couple of extra seconds at the very least.  Click on the
Ellptic-Curve button, and then drag Decypher on the screen of random
numbers.  Put this up to the max on CPU usage.  When it is done, use
password breaker on the password portion of the server.  Turn on Proxy
Bypass, and proceed.

This server searches through records alphabetically, so judge your time
wisely.  Also, as a time saving measure, I have found that you can
go ahead and type the new criminal record you want to type during
the search in if that is your mission.  Remember, always hit
Add. Otherwise, just hover your mouse above "clear history".  


        Glovbal Criminal Database
        view Criminal Records

   ---------------                 Name 
  |               |    ------------------------------------- 
  |               |   | Target Name                         |
  |               |    -------------------------------------
  | Target        |             Criminal History
  | Photo         |    -------------------------------------
  |               |   | Criminal Act 1                      |
  |               |   | Criminal Act 2                      |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
  |               |   |                                     |
   ---------------    |                                     |
   ----------------   |                                     |
  |Clear History   |  |                                     |
   ----------------    -------------------------------------
   ----------------   |                                |ADD | 
  |Authorise Arrest|   -------------------------------------
   ---------------- 
   ----------------   
  |   Done         |
   ----------------        

*** Help to stop a hacker from ever working again***
   
   Go into the record, and find the man you're going after.
When you find him, if he doesn't already have any records,
add in something interesting if you weren't told what to put
down.  Be creative. n_n  Hit done.

*** Help to discredit one of our rivals***

  Search the record for the appropriate man, and then add
the charge that the company wants you to.  Hit done.

*** Clear a criminal record ***

  Probably the easiest mission of this type.  Hit "Clear
History".  Hit done.

And remember boys and girls, clear your history!!

-------
[006] Bank Account Information

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v 4.0 
                   Log Deleter v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
Suggested Tools:   Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 5000 c. to 7000 c.

The security in this is similar to that of the Global Criminal Database.
Turning on Monitor Bypass, if you have it, will give you a few more
seconds that could definately help.  Upgrade whatever you can (excluding
your gateway, make sure you are saving up for the Trinity).  Everything
that I have listed otherwise you MUST have.

It is, also, again, a generally good idea if you write down the
number of the account you are jacking into and what detail you are
looking for.

You will actually NOT need Proxy Bypass for this mission since you
won't be changing any details, rather just writing some down.

Make several bounces, and log into the appropriate bank server.
Click on Manage an Existing Account and then type in the number
of the account you want the number of.  Put password breaker to
work.

In this instance, the missions are practically the same.  You will
either need to write down the current balance of the account, the
current loan, or the most recent bank transfer.

***Balance***
  
   Once you are in, click on "View Account" and the third row
down will say "Balance".  The number next to it is the one that
you are concerned with.

***Loan***

   Go into "View Account" and the fourth row down is "Loan". The
number next to that is the one you want.

***Recent Bank Tranfer***

   Click on "View Statement" and then find the appropriate transfer.
Write down the ammount.

In any of these cases, once you have recieved the information, delete
the appropriate logs, and then reply to the e-mail.  When the e-mail
finishes writing itself out, hover your cursor over the e-mail body
and hit enter.  Then type in the number that the employer wanted to know.
Don't even bother putting in "c." or "Credits" or something of the sort.
They don't really care.

----
[007] Delete Computer Database

Objective: Delete everything on a database
Required Software: Password Breaker v 1.0
                   Trace Tracker v 4.0 
                   Log Deleter v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Monitor Bypass v 5.0
                   Proxy Bypass v 5.0
                   Firewall Bypass v 5.0
                   Voice Analyser v 1.0
                   Decypher v 3.0
Suggested Tools: None   
Gateway Suggested: Trinity 1686a
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: High
Threat: Medium-High
Money recieved: 7500 c. to 8900 c.

I would suggest that you go ahead and purchase the highest versions of
Monitor, Proxy, and Firewall Bypass.  The servers you will be breaking
into will have varied security levels, so you may as well.  If you don't,
you will eventually run into the case that you will not be able to
get through, and abandoning missions is never good.

Most of the computers you will be breaking into are Central Mainframes.
This is the first time in the game that you will HAVE to do a little
research for the computer you are breaking into.

Go to InterNIC and search for the company you are going to be destroying.
There should be something that says "Public Access Server" with the
company name preceeding it.  Click on "About Us" and click on the "+"
sign for the systems administrator.

Give the man a call.  Have voice analyser running through the WHOLE call.
Wait until he hangs up on you and the voice analyser is ready for playback
before you disconnect.

While you are doing the bounces, I would highly suggest making the bounce
before the Central Mainframe be the Public Access Server.  Not always,
but sometimes the Central Mainframes do not allow access from anything
but a "trusted source".  That occasionally doesn't work, so you might
also want to try their Internal Services Machine or something else that
the company uses.

When you log on, turn on the appropriate Bypassers.  You will usually
have to use all three.  The voice analyser should still be on, so click
on Voice ID, and hit play.  Wait for the voice to stop talking and the
green "Access Granted" lettering.  Click on the ID screen and then continue
to use password breaker.

Proceed.  Go into Console (for those of you who are familiar with DOS, this
will be VERY SIMILAR to it, if you want a hint). Type in "cd usr" then
type delete.

Disconnect and do your usual clean up of logs.  Hit fastforward and wait
for the news to hit.  Hit reply and, boom, your done.

---
[008] Trace a Bank Transfer

Objective: Find out who just got a lotta money and report back
Required Software: Password Breaker v 1.0
                   Trace Tracker v 4.0 
                   Log Deleter v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Monitor Bypass v 5.0
                   Proxy Bypass v 5.0
                   Firewall Bypass v 5.0
                   Voice Analyser v 1.0
                   Decypher v 3.0
Suggested Tools: None   
Gateway Suggested: Trinity 1686a
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: High
Threat: Medium-High
Money recieved:

This is much like the missions that you took perviously of searching for
financial data of an enemy.  This time it's a little more complicated, but
not by much.

First, go to the bank of your target.  Remember to type in their account
number and use password breaker.  Go into the "Veiw Statements" file. 
There will be a LARGE transfer somewhere on that list (if you got the mission
early, it'll be close to the top, otherwise, start scrounging around
for the largest transfer, and that'll usually be it).  Write down
what the account number was that it was transfered to and the IP of the
bank that it was transfered to.

Delete your logs!  If you are taking to long, you can be passively traced
and that's what makes this mission a little more difficult and more easy
to get caught.

Log on to bank number two and do the same thing.  Log into the account
that the money was transfered to and write down the name of the man that
owns the account.

Log out, delete logs, and then reply to the employer.  Hover your mouse
about the e-mail body, hit enter, and type in the name of the man who
got the money.

Simple as pie, neh?

---
[009] Copy and Secure a Large Database

Objective: Copy as many files as you can, decrypt them, and upload them
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 4.0 
                   Log Deleter v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Monitor Bypass v 5.0
                   Proxy Bypass v 5.0
                   Firewall Bypass v 5.0
                   Voice Analyser v 1.0
                   Decypher v 3.0
                   Decrypter v 7.0
Suggested Tools: None   
Gateway Suggested: Trinity 1686a
Hardware Upgrade: A LOT of memory; As much as you can get
Security Level: High
Threat: Medium
Money recieved:

I personally despise these missions and never accept them if I can avoid it.

This is a lot like the missions early in the game where you have to copy a
file from a server, except for now that these are really big files and
more stubborn servers.

Make the neccisary bounces and log on to the server.  Ensure that any
Firewalls, Proxies, or Montiors will not be in your way.  When you log
in, try to be as quick as you can.  Just download and go.  If for whatever
reason you cannot get all the files in the first go, don't worry about it.
You can always come back for a trip two if need be.  Don't get cocky
either.  If it looks like you cannot finish a download, disconnect and
log back in.

Delete the logs, and then use Decrypter on every file you just downloaded.
After they are all decrypted (the employer will NOT accept the files if
they are still encrypted), go to the employer's file server and copy
over each file.  Once it is copied over, feel free to delete them.  No
longer needed.

Once you have the files up, reply and get your cash.

There are a couple of problems with this mission type.  The first being
that the file servers provided by the employer are not always big enough
to house all the files they asked you to download.  Swell, eh?  Don't
sweat though.  They will accept "most" of the files if you got them up,
but they will only pay you "most" of what you agreed.

The second problem is one that I personally haven't ran into, but according
to Icepick at www.modlink.net, some files will have an encryption level
of 8.  Obviously, you cannot decrypt these and are forced to abort the
mission.

----
[010] Trace a hacker

Objective: Steal money from the victim and deposit it elsewhere
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 4.0 
                   Log Deleter v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Monitor Bypass v 5.0
                   Proxy Bypass v 5.0
                   Firewall Bypass v 5.0
                   Voice Analyser v 1.0
                   Decypher v 3.0
Suggested Tools: None   
Gateway Suggested: Trinity 1686a
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium to High
Threat: Medium
Money recieved:

Another annoying hack.

Your objective is to find out who hacked a companies server and report
back.  However, first off, the company, though they give you access to
their server, does not give you enough access to view the logs so you
can get cracking.  Next, they don't even tell you the right time.  

---
[011] Transfer Money

Objective: Steal money from the victim and deposit it elsewhere
Required Software: Password Breaker v 1.0
                   Trace Tracker v. v 4.0 
                   Log Deleter v v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Monitor Bypass v 5.0
                   Proxy Bypass v 5.0
                   Firewall Bypass v 5.0
                   Voice Analyser v 1.0
                   Decypher v 3.0
Suggested Tools: None   
Gateway Suggested: Trinity 1686a
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: High
Threat: Medium-High
Money recieved:

These missions are the best because after transfering the ammount
your employer asks for, you can also transfer the rest of their money
to your own account.  n_n  Basically a great mission for anyone
who is trying to get a lot of money.

Write down the bank IP and account number that you will be tranfering
to.  It saves you a lot of time.

Break into the bank.  Turn on all the relevent Bypassers and type in
the bank account number you are about to hijack into the user name
portion of the log in box.  Use password breaker to get in.

When you are in, click on the third option down of "Tranfer Money"
(things are user friendly in the future :)) Type in the bank IP
that the money is going to, the account number that it is going to,
and the amount.  Remember to delete the "Fill this in" text before
you type whatever you want in.

Though the e-mail says to delete the transfer logs, DON'T!  Reply that
the transfer has gone through first.  Hopefully you're reply will
come before you're caught.  Delete the transfer logs (if you have also
"borrowed" money especially), and then clear up the bounce logs.

Don't worry about the transfer logs on their end.
----
[012] Ruin a life

Objective: Send some poor sap to jail
Required Software: Password Breaker v 1.0
                   Trace Tracker v. v 4.0 
                   Log Deleter v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 5.0 
                   Decypher v 3.0
Suggested Tools: None   
Gateway Suggested: Trinity 1686a (or lower)
Hardware Upgrade: None
Security Level: Medium
Threat: Medium
Money recieved:

I'm not all to sure WHY this was put in for one of the more
difficult missions, but hey, whatever, right?

Break into the Global Criminal Database in the same manner you
did when you were adjusting different criminal records.

So, make your bounce points, and connect up to the database.
Your computer will e considerably faster by now, so you can
turn on proxy bypasser and password breaker at the same time.

What is required in these missions is for you to throw someone
in jail.  Put down crimes like "High Tech Fraud", or, heck, you
could put in "Jay Walking" if you'd really like, as long as there
is at least TWO infractions of the law listed.  Then, type in
"Parole Break", or anything else that has the word "Parole" in it.
Authorise an arrest.

Clear out your logs and wait about three hours and look at the
news on Uplink's Internal Services Machine.  When you see something
of the jist of "Hacker arrested", reply.

-----
[013] Frame a person for Hacking a Bank

Objective: Frame a poor sap
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 4.0 
                   Log modifier v 2.0
Suggested Tools: HUDMapTrace 
Gateway Suggested: Trinity 1686a (or lower)
Hardware Upgrade: None
Security Level: Medium-high
Threat: High
Money recieved:

This mission does not seem difficult when you take it, but the speed
required to finish this mission so you do not get a game over is what
makes it worthy to be a difficult one.

Write down the IP of the victim.  Once you start this mission, it
should take you LESS than a minute to complete it.  Messing with an
e-mail is the last thing you want to do to slow you down.

This mission, as much as speed it is, is also one to test your nerves
a little.  Don't be TO paranoid about the job either.  If you have
HUDMapTrace (which I really have to suggest for these missions)
you should allow about one, and, if you are extremely gutsy, two 
computers actively traced.

InterNIC almost HAS to be your first bounce.  It's the fastest to
get into, and you need the edge.  At this point in the game, using
the Uplink Test Data Machine is no longer recommended.

At this point, I will also have to advise you to take what the e-mail
tells you to do with a grain of salt.  You are told that they want you
to hack completely into the system and possibly shut down a security
measure or two.

Guess what?  You're not going to be doing that.

Make up to five bounces.  I really would suggest three, first being
InterNIC, and two others that you have admin access to.  That will
give you just about the amount of time you are looking for.

Log into the target bank system.  Click on "Administration". Use
password breaker and then click on proceed.  You should already have
a trace going out on you.

Disconnect.  Go to InterNIC and change the third log down (should be
something like "From 127.0.0.1 to xxx.xxx.xxx.xxx", not a "connection
made from...", "...disconnected from...", or "...accessed file..." log)
and use Log Modifier to modify the "From" to be the address of the
person you are trying to frame.

Delete all other logs that pertain to you.

Go to Uplink's Internal Services Machine and wait until you see news
that the Bank Machine has had a hacking attempt made.  You have NOT
thrown your victim in jail yet!  You are setting him up, however.

Make your three to five bounce points again and log back into the
bank server.  Click on "Administration" again.  You should see
a trace occur immediately.  If you do not, try using Decypher to get
things going.

Go back to InterNIC, again, and change the same log that you had to
last time.  Again, deleting all other logs.

Fastfoward again and wait for news of your victim's arrest.  Reply
to your employer.
----
[014] Frame a person for Destroying a Database

Objective: Poor saps should ph33r you, so frame them
Required Software: Password Breaker v 1.0
                   Trace Tracker v 4.0 
                   Log modifier v 2.0
                   Log Deleter v 4.0
                   Proxy Bypass v 5.0
                   Monitor Bypass v 5.0
                   Firewall Bypass v 5.0
                   Voice Analyser v 1.0
                   Decypher v 3.0
Suggested Tools: HUDMapTrace 
Gateway Suggested: Trinity 1686a (or lower)
Hardware Upgrade: Best you can lay your hands on
Security Level: High
Threat: High
Money recieved:

These missions are definately the second most difficult in the
game, next to the last "Arunmor" storyline mission.

I would suggest that you get a lot of practice on the Frame a man
for bank hacking missions before you attempt this one.  It's much
the same, but it requires a little more skill.

You're objective is to break into a HIGH level computer, take it down,
and pin it on someone else.

You will want to write down the IP of the person you are going to
frame, yet again, just so you can do this all quick like.

The employer does NOT give you a computer that they want to hack into,
so you are free to chose any system you'd like.  Go into InterNIC
and type in "Internal" into the filter. Go ahead and pick out your
favorite company name, since it really doesn't matter.

Make a few bounces (internic being the first) to the Internal Services
Machine and hack into it.  Take down their Proxy, Montior, and Firewall
if they have em.  Next, use password breaker.

The second you log into the systems, start moving.  Go to "Console" and
type in "cd usr", then type delete.  Wait for the console to read back
that all files have been deleted, and then disconnect.  If HUDMapTrace
has only InterNIC to get to or Trace Tracker gets down to 5 or so seconds,
disconnect regardless.  You are cutting it to close at that point.  So
close, actually, that you'll have about a  75% chance of it being pinned
on you. (I've lost so many characters on this mission. n_n)

Connect to InterNIC and change the third log down with log modifier to
make the "From" IP be from your victim.

When you are waiting for the news, you will FIRST see a news story saying
that the company you targeted lost millions in research.  THEN about
two to three stories later, you will see your man has gone to jail.

This mission is hard, and if you mess it up to much, you will pretty
much have to abandon it.  I would give it three or so tries on pinning
the guy for computer destruction before you should hang up the towel.
-------
[623] Storyline Missions
[301] Storyline Mission information

This is a bit of a spoiler section, so read ahead if you don't care,
but don't say you weren't warned about it.

Revelation, basically, is an uber evil virus made by the
Umbrella-esque ARC.  Your actions in the game decides if
Revelation is put to an end, or if every computer in the
world, including yours, is brought down.

There are three main paths you can take.  Apathy, side with
ARC, and side with Arunmor.  Apathy has the same outcome as
if you were working for Arunmor (such smart NPC's), however,
you should really give the storylines a go at least once.  Hell
even play around with the ARC storyline too! :)

As a warning though, accepting EITHER the ARC or Arunmor storylines
will cause an immediate game over if you fail their final missions.

The ARC/Arunmor missions have their own set timeline in which
they occur.  I would suggest playing through a couple of agents
and get used to all the normal missions before you start up with
the storyline missions.  If you spend to much time trying to 
accumulate money for your missions (believe me, these missions
require you to have at least a decent machine), you will have
missed an opprotunity to do a mission, and an NPC will be assigned
to do your work for you.

Do a few bank hacks, take out as many loans as you can, and maybe
even do a couple of missions.  On 4/09/10 you will receieve an e-mail
from a dead uplink agent.  If you ignore the e-mail past 4/25/10, you
will no longer be able to play through either of the storyline missions.
However, if you wish to play them, first hack into ARC with the password
that you were given, and disconnect.  Don't even bother erasing your
logs.  When that is complete, make sure you have 4 GQ of memory open. You
will be contacted by ARC and given Revelation.  If you want to work for
ARC, do their mission ASAP.  If you want to work for Arunmor, wait about
two hours game time and follow their instructions.

The time line you have is roughly this:

3/25/10 8:00 - Unusual Hiring Practices Noticed by Analyists - ARC
Hiring Top Uplink Agents
3/29/10 18:00 - High Ranking Agents Rasie Doubts Over ARC
4/01/10 19:00 - Top Uplink Agent Reassures Community - Highest ranking
Active Uplink Agent is hired to speak for ARC
4/09/10 2:00 - Top Uplink Agent Working for ARC Found Dead - Agent
from previous news story is found dead, assumed sleeping pills
4/14/10 16:00 - Recieve e-mail from dead agent - Included password
to ARC mainframe.
4/18/10 - ? Important Event
4/25/10 5:00 - Storyline Mission start - If player has not yet
accepted either ARC's or Arunmor's offer, NPCs assigned to both
companies.
4/25/10 5:00 - Unknown virus Outbreak at Arunmor (occurs only if player
choses to join ARC OR if player ignores storyline missions)
4/25/10 9:00 - The Arunmor Virus Outbreak - A Special Report - Virus
found to only be able to infect target systems.
4/26/10 17:00 - Arunmor We will Retailiate - Faith project started
(occurs only if player choses to join ARC OR if player ignores storyline
missions)
4/26/10 17:00 - New Uplink Service Available - Player able to see
progress of both Faith and Revelation
4/29/10 4:00 - Arunmor Releases Information on Revelation - This
mission is just there to make the player feel bad if they chose
ARC. (occurs only if player choses to join ARC OR if player ignores
storyline missions)
5/01/10 11:00 - Federal Agents Release Findings on ARC - ARC is
found to be ran techno-anarchists.
5/03/10 16:00 - ? Important Event
5/07/10 23:00 - Digital Life Research Stolen - Darwin Research Company
has all of their research on a cyber-biological application stolen.
5/10/10 - ? Important Event
5/11/10 1:00 - ARC Internal Services System Attacked - ARC systems
Attacked
5/12/10 - ? Important Event
5/16/10 7:00 - Arunmor Corportation in Corporate Fraud - High Up in
Arunmor Corporation found for Financial Fraud. (occurs only if player
choses to join ARC OR if player ignores storyline missions)
5/19/10 9:00 - CEO of Andromeda Research Company arrested - Just
as the head line reads (occurs only if player
choses to join Arunmor OR if player ignores storyline missions)
5/20/10 - ? Important Event
5/24/10 18:00 - Arunmor Central Mainframe suffers crippling blow
5/27/10 17:00 - ArC Central Mainframe Compromised
6/05/10 2:00 - Revelation Launch Due Soon? - WHEN YOU SEE THIS
MAKE SURE THAT YOU ARE READY FOR EITHER A GAME OVER OR TO FINISH
YOUR STORYLINE!!!
6/05/10 8:00 - Revelation Virus Outbreak Leaves Systems Crippled
- You have roughly two hours of game time to complete your storyline
when this comes up.
6/07/10 18:00 - First Press Release from Andromeda Leader
6/14/10 19:00 - Leader of Andromeda Jailed - Anarchy bad, go to 
jail! ?
6/18/10 19:00 - Revelation A Retrospect - Arunmor's rich now.
--------
[302] ARC Mission 1 - MaidenFlight

Objective: Infiltrate Arunmor's Server and infect it with Relevation
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

If you are having problems with starting this mission, please
read my introduction to Revelation above.

Wait until 4/14/10 when you get the e-mail from the dead agent.
Make a bounce chain (it doesn't matter how long) and connect to
the ARC Internal Services Machine and then to the ARC
--------
[303] ARC Mission 2 - Darwin

Objective: Hack Darwin's server and retrieve Digital Life
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

-------
[304] ARC Mission 3 - SaveItForTheJury

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

------
[305] ARC Mission 4 - ShinyHammer

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

------
[306] ARC Mission 5 - GrandTour

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

-----
[307] Arunmor Mission 1 - BackFire

Objective: Backstab ARC and give Arunmor a copy of Revelation
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

If you have problems with starting this mission, please read my
introduction to Relevation above.

Simply reply to the e-mail and attach Revelation onto it.  As a side
note, if you did NOT get Revelation from ARC (you did not have enough GQ
to download it), you need to make a new character.  Remember, you MUST
have the 4 GQ open to do this mission!

-------
[308] Arunmor Mission 2 - Tracer

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

-------
[309] Arunmor Mission 3 - TakeMeToYourLeader

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

------
[310] Arunmor Mission 4 - ARCInfiltration

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

--------
[311] Arunmor Mission 5 - Counter Attack

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

--------
[312] Special Mission 1 - Wargames

Objective: Hack the Protovision Server
Required Software: None
Suggested Tools: None
Gateway Suggested: None
Hardware Upgrade: None
Security Level: Insane
Threat: None
Money recieved: None

You do NOT need to have any programs, etc, to get into this server.

All you need to do is rent a copy of Wargames.  n_n  Seriously.  If for
whatever reason you are unable to do that, I have the password listed
in the cheats section, but really, it's no fun that way.

Upon completing this mission, you get to play "Global Thermonuclear War"
and to check out a hint ("I wonder what the IP to Introversion's server?")
server.

-------
[313] Special Mission 2 - Mole

Objective: Change the Social Security Records of a target for an employer
Required Software: Password Breaker v 1.0
                   Trace Tracker v. 1.0 to v 4.0 
                   Log Deleter v 1.0 to v 4.0
                   HUD ConnectionAnalysis - 20000 c - 3gq
                   Proxy Bypass v 1.0 to 5.0 
                     v 1.0 - 6000 c - 1gq
                   Decypher v 1.0 to 3.0
Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                 Monitor Bypass v 1.0 to 5.0
Gateway Suggested: 
Hardware Upgrade: The best CPUs and Modems you can get
Security Level: Medium
Threat: Medium
Money recieved: 8800 c.

--------
[735] Uplink Internal Services
[101] News
[102] Mission Lists
[103] Software Upgrades

This is to be used as a basic "How much is this program
and what does it do?"  Refer to the software
section in the miscellaneous section for a more 
indepth explaination of how each  program works.


Name: Decrypter V 1.0
Purpose: Decrypts files encrypted level 1
Price: 800 c
Memory: 2 gq

Name: Decrypter V 2.0
Purpose: Decrypts files encrypted 2 or lower
Price: 1200 c
Memory: 2 gq

Name: Decrypter V 3.0
Purpose: Decrypts files encrypted 3 or lower
Price: 1600 c
Memory: 2 gq

Name: Decrypter V 4.0
Purpose: Decrypts files encrypted 4 or lower
Price: 2200 C
Memory: 2 gq

Name: Decrypter V 5.0
Purpose: Decrypts files encrypted 5 or lower
Price: 3000 c
Memory: 3 gq

Name: Decrypter V 6.0
Purpose: Decrypts files encrypted 6 or lower
Price: 7000 c
Memory: 4 gq

Name: Decrypter V 7.0
Purpose: Decrypts all encrypted files
Price: 15000 c
Memory: 5 gq

Name: Decypher v 1.0
Purpose: Used to bypass Ellptic Curve; slowest version
Price: 3000 c
Memory: 2 gq

Name: Decypher v 2.0
Purpose: Used to bypass Ellptic Curve; faster version
Price: 5000 c
Memory: 2 gq

Name: Decypher v 3.0
Purpose: Used to bypass Ellptic Curve; fastest version
Price: 8000 c
Memory: 2 gq

Name: Dictonary Hacker
Purpose: Hacks passwords; fast though will not always work
Price: 1000 c
Memory: 4 gq

Name: File Copier
Purpose: Used to copy files from server to gateway
or vise versa
Price: 100 c
Memory: 1 gq

Name: File Deleter
Purpose: Deletes a file on a server or gateway
Price: 100 c
Memory: 1 gq

Name: Firewall Bypasser v 1.0
Purpose: Bypasses a firewall at level 1
Price: 3000 c
Memory: 1 gq

Name: Firewall Bypasser v 2.0
Purpose: Bypasses a firewall level 2 and below
Price: 4000 c
Memory: 1 gq

Name: Firewall Bypasser v 3.0
Purpose: Bypasses a firewall level 3 and below
Price: 6000 c
Memory: 1 gq

Name: Firewall Bypasser v 4.0
Purpose: Bypasses a firewall level 4 and below
Price: 8000 c
Memory: 1 gq

Name: Firewall Bypasser v 5.0
Purpose: Bypasses all firewalls
Price: 10000 c
Memory: 1 gq

Name: Firewalll Disable v 1.0
Purpose: Disables a firewall at level 1,
action detected immediately
Price: 2000 c
Memory: 1 gq

Name: Firewall Diable v 2.0
Purpose: Disables firewalls level 2 and below,
action detected immediately
Price: 3000 c
Memory: 1 gq

Name: Firewall Diable v 3.0
Purpose: Disables firewalls level 3 and below,
action detected immediately
Price: 4000 c
Memory: 1 gq

Name: Firewall Diable v 4.0
Purpose: Disables firewalls level 4 and below,
action detected immediately
Price: 6000 c
Memory: 2 gq

Name: Firewall Diable v 5.0
Purpose: Disables all firewalls, action
detected immediately
Price: 8000 c
Memory: 3 gq

Name: HUDConnectionAnalysis
Purpose: Allows you to view security systems
on servers; used in conjunction with bypassers
menu bar; used with bypassers.
Price: 20000 c
Memory: N/A

Name: HUDMapShowTrace
Purpose: Allows you to see a trace on your connection
on the HUDMap
Price: 5000 c
Memory: N/A

Name: IP Lookup
Purpose: Used to find out the name of the computer
attached to a certain IP, also gives an automatic link
in your Link Menu and on the HUDMap.
Price: 500 c
Memory: 1 gq

Name: IP Probe v 1.0
Purpose: Gives information on what security systems
are in use on the IP given.
Price: 2000 c
Memory: 3 gq

Name: IP Probe v 2.0
Purpose: Gives information on what security systems
are in use and what versions on the IP given.
Price: 4000 c
Memory: 3 gq

Name: IP Probe 3.0
Purpose: Gives information on what security systems
are in use, what versions, and if they are
active or not on the IP given.
Price: 5000 c
Memory: 3 gq

Name: Log Deleter v 1.0
Purpose: Deletes a logs contents, but
the actual log is still left behind
Price: 500 c
Memory: 1 gq

Name: Log Deleter v 2.0
Purpose: Deletes an entire log, however
there is a space left behind.
Price: 1000 c
Memory: 1 gq

Name: Log Deleter v 3.0
Purpose: Deletes logs, removes any gaps
Price: 2000 c
Memory: 1 gq

Name: Log Modifier v 1.0
Purpose: Modifiy an existing log
Price: 4000 c
Memory: 2 gq

Name: Log Modifier v 2.0
Purpose: Modify an existing log or
blank space
Price: 6000 c
Memory: 2 gq

Name: Log UnDeleter
Purpose: Recovers deleted logs
Price: 5000 c
Memory: 1 gq

Name: Monitor Bypass v 1.0
Purpose: Bypasses a Monitor at level 1
Price: 10000 c
Memory: 1 gq

Name: Monitor Bypass v 2.0
Purpose: Bypasses a Monitor level 2 or below
Price: 12000 c
Memory: 1 gq

Name: Monitor Bypass v 3.0
Purpose: Bypasses a Monitor level 3 or below
Price: 16000 c
Memory: 1 gq

Name: Monitor Bypass v 4.0
Purpose: Bypasses a Monitor level 4 or below
Price: 20000 c
Memory: 1 gq

Name: Monitor Bypass v 5.0
Purpose: Bypasses all Monitors
Price: 25000 c
Memory: 1 gq

Name: Password Breaker
Purpose: Gets the password every time,
however it is slower than Dictonary Hacker
Price: 1500 c
Memory: 2 gq

Name: Proxy Bypass v 1.0
Purpose: Bypasses a Proxy at level 1
Price: 6000 c
Memory: 1 gq

Name: Proxy Bypass 2.0
Purpose: Bypasses a Proxy level 2 or below
Price: 8000 c
Memory: 1 gq
 
Name: Proxy Bypass 3.0
Purpose: Bypasses a Proxy level 3 or below
Price: 12000 c
Memory: 1 gq

Name: Proxy Bypass 4.0
Purpose: Bypasses a Proxy level 4 or below
Price: 16000 c
Memory: 1 gq

Name: Proxy Bypass 5.0
Purpose: Bypasses all Proxies
Price: 20000 c
Memory: 1 gq

Name: Proxy Diable v 1.0
Purpose: Disables Proxies v 1.0,
action noticed immediately
Price: 3000 c
Memory: 1 gq

Name: Proxy Disable v 2.0
Purpose: Disables Proxies v 2.0 and
below, action noticed immediately
Price: 4000 c 
Memory: 1 gq

Name: Proxy Disable v 3.0
Purpose: Disables Proxies v 3.0 and
below, action noticed immediately
Price: 6000 c 
Memory: 1 gq

Name: Proxy Disable v 4.0
Purpose: Disables Proxies v 4.0 and
below, action noticed immediately
Price: 8000 c
Memory: 2 gq

Name: Proxy Disable v 5.0
Purpose: Disables all Proxies, action
noticed immediately
Price: 10000 c
Memory: 3 gq

Name: Trace Tracker v 1.0
Purpose: Notifies user if there is a 
trace of their IP happening; "No Trace
Detected", "Trace in Progress", and
"Trace Complete". Beeps to tell user
how far trace is.
Price: 300 c
Memory: 1 gq

Name: Trace Tracker v 2.0
Purpose: Notifies user if there is a 
trace of their IP happening; "No Trace
Detected", percentage of trace, "Trace
Complete"
Price: 600 c
Memory: 1 gq

Name: Trace Tracker v 3.0
Purpose: Notifies user if there is a 
trace of their IP happening; "No Trace
Detected", time remaining before trace
end, "Trace Complete"
Price: 14000 c
Memory: 2 gq

Name: Trace Tracker v 4.0
Purpose: Notifies user if there is a 
trace of their IP happening; "No Trace
Detected", time remaining before trace
end, "Trace Complete"
Price: 2500 c
Memory: 3 gq

Name: Voice Analyser
Purpose: Simulate a targets voice, used
on Voice Print Id lock on servers
Price: 5000 c
Memory: 4 gq



[104] Hardware Upgrades
[105] Gateway Upgrades
[106] Rankings
[107] Help
[108] Administration
-------

-------
[236] Miscellaneous

[401] Name Generations

Coming Soon
-----
[402] Cheats

I.  TooMany Secrets

If you have not downloaded the Version 1.31 patch for Uplink,
when making a character, name it "TooManySecrets".  Hitting F1
while using this character will allow you to have access to the
following abilities:

Give All Links - Exactly how it sounds, only it's not as cool
as you think.  This includes companies that you won't deal with
mission wise in the game, possibly phone servers, so on, so on.
You're entire HUD_Map will be flooded with every link, so I don't
suggest using this.

Give All Software - Gives you every single version of every single
piece of software.  This can be annoying, especially if you need
empty space.  Deleting the five or so other versions of a program
can be a pain.  Another cheat to avoid.

Give All Hardware - This is almost a lie.  It will give you a 
TRINITY 1686a gateway, with 6 150 ghz processors, no upgrade
on modem, and doesn't come with gateway monitor or self destruct.

Give Lots of Money - Yup. Lots and lots of it.

Give Next Rating - Whatever your current Uplink Rating is, go to
the next one.

Give Max Ratings - Become TERMINAL instantly.

Cancel Current Trace - Silly admins, trix are for kids!  You can
still be passively traced, but this makes it to where you'll never
have to worry about a dropped connection ever again.

End Game - Instantly ends the game telling you that...

Debug Print - I think that this puts what's going on into the
debug.txt file for Uplink, but I honestly never checked.
Someone want to verify this for me?

Event Que - Shows what's happening when in the news and will also
give you a good idea of what's going on with Revelation.

Run Revelation - It's just like getting it from ARC and running it
on your own system.  Do this if you've either never seen Revelation
OR you're sadistic.  This WILL take your current character out of
commision until you delete it.

II. My twin brother will avenge me

If you are afraid of getting caught during a new hack, or just
want to play it safe, go into the file where you installed uplink
go to the /users/ file, then make a copy of your character's .usr
file.  Save it into another folder.  Do this whenever you start your
game, and you will never have to worry about a game over.

III.  God?

When you are disenvowed, go ahead and take a look at your character's
standing.  Look hard at the upper left hand corner and hover over it
with your mouse.  It will be a pie symbol.  Go ahead and click on it
to meet your makers. XD

IV. Introversion Games

When you complete the Wargames mission, there is a hint inside
that says "What was the IP of introversion again?" or something
of that extent.  In all actuallity, this is NOT what their
real IP number is.  o_O

Do an IP Lookup for IP number 128.128.128.128.

V. WarGames

Ah, gotta cheat on this one?  The password is Joshua.

------
[403] Secrets

Coming soon
-----
[404] Game Play Hints

I. Easy Money

When you are pretty a fair way through the game, you will start getting
missions for hacking into a bank and getting someone's bank information.

Well, you're already in there anyway, so why not make a donation to a
charitable cause?  Yourself.

1. Make sure you have the account number of your donator, their password,
the IP number of Uplink's bank, your account number, Proxy Bypass 5,
Monitor Bypass 5, and log deleter.

2. Make your first bounce InterNIC and continue on with an at least
eight bounce long line.

3. Log into your victim's account and transfer the amount of money
you want.

4. Turn on both Proxy Bypass and Monitor Bypass.  DELETE the log
saying that you transfered the money.

5. Go to your bank account at Uplink and delete the log saying you
recieved the money (yet again, you will have to turn on Proxy and
Monitor Bypass).

6. Go to InterNIC and delete all logs that have to deal with you.

7. Go on a shopping spree n_n.


[405] Software Explanation

Often times you'll run your head into a wall when you are faced
with a problem and not know what software is used to solve it.


I first suggest that you read through the help on Uplink Internal
Services Machine.  It often times has the hint you need to find
out what to do.

//Decrypter

In the missions where you are requested to retrieve a file and
send it back into your employer, sometimes on the server,
under the heading "Encryption" there will be something that says
"Level x", x being 1 through 7 (if you see an "8", abandon mission,
you cannot decrypt anything higher than 7).

After the file is downloaded, you must use the Decrypter version
that is at least the same level of the Encryption OR higher. Only
decrypted will your employer allow you to return the file.

To use, open up your memory banks, and scroll until you see the
file that you need to decrypt.  Open your Application menu,
go to Crackers, and click on "Decrypter" then click on the file
in your memory banks.

//Decypher

There are three main "locks" on a system that you will be faced
with bypassing in Uplink.  An Ellpitic Curve is probably the
second one you will see after you are used to password cracking.

The Ellptic Curve is a rectangle with a bunch of numbers randomly
wizzing by, a la Matrix style.

To use the Decypher, go into your Application menu, Crackers, and
then click on Decypher (if you are in a rush and have a problem
with clicking on the wrong application, don't look at the name,
rather the version.  If you got max versions, this will help
you to tell the two programs apart).  After turning the program
on, click anywhere in the rectangle of numbers.

//Dictonary Hacker

This is probably the most useless software in Uplink.  Period.

When you are presented with a password box that says "Authroisation
Required", go to Applications, Crackers, then click on Dictonary
Hacker.

Be warned, if it doesn't seem like it's finding the password, that
is because the company you are going after has wisened up and no
longer uses words found in a dictonary for a password.  They now
use random letters, and you must now buy Password Breaker.

//File Copier

One of the two useful start up programs that you have when your
character is created.

If you are retrieving a file, go into the companies file server
and then locate the correct file.  Go to your Applications,
File Utilities, and the click on File Copier. Click on the
file that you wish to download, and while its downloading,
open up your Memory Banks, then when the file is finished
copying, click on an open part of your memory banks.  Wait
for the file to download.

This is an inefficent way to use file copier, but if you are 
unsure on how to use it, follow this first to get used to it.

On the reverse, if you are uploading a file to a file server,
you want to enter the file database, then open your memory
banks.  Open up File Copier, click on the file in your memory
banks, then when it is finished, click on an empty area of
the file server and wait for it to finish uploading.

//File Deleter

The other useful program that you are given when you
start up your Uplink Character.

Please note if you are having trouble deleting FULL
servers, refer to the section in this faq about Consoles.

To delete a file off a server, locate the appropriate file,
then go to Application menu, File Utilities, and then click
on File Deleter.  Click on the appropriate file.

On the other hand, if you want to delete a file from your
own memory banks, click on your Memory Bank button, click
on the Application menu, File Utilities, and then File
Deleter.  Click on the file that you wish to delete.

//Firewall/Proxy/Monitor Bypass

Remember, before you are even ABLE to use a Bypasser,
you MUST have the HUDConnectionAnaylsis, otherwise having
this program is completely useless to you.

Also, if you know you are using this program properly, but
the little circle is staying red and not covering the
Firewall symbol, you do not have a high enough version to
bypass the Firewall you are attempting at.  Upgrade.

Now then, on how to use it.  When you are in a server, open
up your HUDConnectionAnaylsis window.  Wait a little while
for each of the symbols to show what they are.  When this
is done, click on your Applications menu, click on Bypassers,
and the click on the symbol for the appropriate security system.

There are also three other buttons on the bypassers, that
for the most part, you will not need to concern yourself with.

The upper-left button is the "Pause" button.  If, for some ungodly
reason, you wish to pause bypassing the security, click on this,
and it will put the program into hiatus without turning it off.

The upper-rigth button is the "Exit" button.  If you are familiar
with windows, you should know that the "x" means close.  If you
aren't, you are now.

The lower-left hand button is the "drag" area.  This isn't really
even a button.  It's just a designated area that your mouse goes when
you are draging the bypassers around at.


// Firewall/Proxy Disable

I want to say that if you bought this program, you've wasted your
money.  Bypassers are faster and easier to use than these, and
are definately worth the extra expense.

Also, if for some reason the disabler always seems to fail, you
do not have a high enough version to disable the security that
you are trying against.  That or you are seeing funny text pop
up in your disabler's bar.  That means that there is either no
security, only a monitor, or the other type of security to bypass.

To use a disabler, when you are in a server, go to Application
menu, security, and then click on the disabler.  Even if the
program is running on its own and you have a fast computer, this
WILL take a while and you WILL be noticed.

If you have an HUDConnectionAnalysis window, don't click on the
symbol for the security you just disabled.  It'll turn it on again.

//HUDConnectionAnaylsis

This expensive program is



[406] Uplink Patch 1.31

[408] Game Bible

Well, if you actually BOUGHT Uplink, you will notice there is a strange
.zip file called the gamebible.zip.  This was the start of an at least
four book (some say five) series.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
More to come soon!  Feedback and contributions always welcome! Write me at
annie@reverent.net

Some credit is due to Icepick at www.modlink.com for pointing out
some bugs that I had not previously noted and, honestly, I used 
his guide to a certain degree to be able to remember in what
order some of the missions went.  I got a few backwards.

Also, I wish to thank the following people from the gamefaqs.com message
board:

MetroidFox for the suggestions on getting more money and for finding out
accidentally about the ARC mission problem.

Alex who pointed not only am I a terrible speller, but also several tricks
and points that I didn't know and would have completely missed, including
loans, money tricks, and the "readwrite" trick with the government missions.

Lord Seth for the suggestion of making a marker on what is and is not
done in the FAQ.

Please do not use my FAQ on your website without my prior authorization.
Only www.gamefaqs.com may use this faq.  Do not copy or duplicate this
faq or sell it for a profit.

All trademarks and copyrights contained in this document are owned by their
respective trademark and copyright holders.

Uplink was made by Introvision and all information pertaining to the game
goes to them.  Thanks for making the game Uplink!!! Weee!

(c) Marianne Jarnagan 2004