hide results

    FAQ/Walkthrough by Reverent

    Version: 0.65 | Updated: 06/02/04 | Printable Version | Search This Guide

    Uplink FAQ for version 1.0 of Uplink
    created by: Reverent
    date: 5/06/04
    e-mail: annie@reverent.net
    version: 0.61
    Note: This is an faq in progress, many sections may
    not yet be present.  All sections completed are noted
    with a *, those in progress with a +.
    
    ----
    
    Table of contents
    
    [254] Version History +
    [975] Introduction *
    [357] Getting Started *
    [193] GamePlay Tips +
    [452] Missions +
            [001] Uplink Test Machine *
            [002] Distroy or Copy Files *
            [003] Changing Academic Records *
            [004] Changing Social Security Records *
            [005] Changing Criminal Records *
            [006] Bank Account Information *
            [007] Delete Computer Database *
            [008] Trace a Bank Transfer *
            [009] Copy and Secure a Large Database *
            [010] Trace a hacker +
            [011] Transfer Money *
            [012] Ruin a life *
            [013] Frame a person for Computer Crimes *
    [623] Storyline Missions +
    	[301] Revelation *
            [302] ARC Mission 1 - MaidenFlight +
            [303] ARC Mission 2 - Darwin
    	[304] ARC Mission 3 - SaveItForTheJury
    	[305] ARC Mission 4 - ShinyHammer
    	[306] ARC Mission 5 - GrandTour
    	[307] Arunmor Mission 1 - BackFire +
    	[308] Arunmor Mission 2 - Tracer
    	[309] Arunmor Mission 3 - TakeMeToYourLeader
    	[310] Arunmor Mission 4 - ARCInfiltration
    	[311] Arunmor Mission 5 - Counter Attack
    	[312] Special Mission 1 - Wargames *
    	[313] Special Mission 2 - Mole *
    [735] Uplink Internal Services
            [101] News
            [102] Mission Lists
            [103] Software Upgrades *
            [104] Hardware Upgrades
            [105] Gateway Upgrades
            [106] Rankings
            [107] Help
            [108] Administration
    [236] Miscellaneous +
            [401] Name Generations
            [402] Cheats *
            [403] Secrets
    	[404] Game Play Hints
            [405] Software Explainations
            [406] Uplink Patch 1.31
            [407] LANs
            [408] Game Bible
            [409] Bugs
    
    -----
    
    [254] Version History
    
    0.33 - 4/27/04 - Started work on Uplink FAQ.  Aren't I special!?
    0.51 - 5/06/04 - Added about five more missions
                     Fixed up a lot of the alignment
                     Added in a GamePlay Tips Section
                     Filled in the Cheats Section
                     Added Game Play Hints and Filled it in
                     Fixed up the Storyline Missions listing
                     I NEED TO FIX MY STATEMENTS OF WHAT TO BUY
                     PLEASE LOOK FOR THEM IN MY NEXT UPDATE!
    0.55 - 5/07/04 - Added about three more missions
                     Did not fix statements about what to
                     buy, coming soon.
    0.56 - 5/08/04 - Fixed the "Frame a man for Computer Crimes"
                     Mission.  Figured out that you don't need
                     to hack a central mainframe for sucess.
    0.60 - 5/12/04 - Started work on the Storyline missions
                     Revelation Overview complete
                     Backfire Complete
                     Wargames Complete
                     More information was put into the Cheats section.
                     GameBible Information added
    0.61 - 5/24/04 - Working on suggested posted on the www.gamefaqs.com
                     Message boards, thanks are at the bottom of the FAQ.
    
    0.65 - 6/2/04  - Made more corrections from the suggestions on the
                     gamefaqs.com message boards
                     Completed Uplink version 1.0 software upgrades
                     Started on In-depth Software explainations
    -----
    
    [975] Introduction
    
    Uplink is a stratagy "hacking" game created by the folks over at Introversion.
    It was first released in the UK and Europe 10/01/01 and in the US in 10/09/01.
    Though this was very much an underground release, it gained quite a bit of 
    popularity and was given high reviews.
    
    Since then, Uplink has been updated by Introversion and has been adapted for
    Linux and Mac users to play.
    
    Introversion - http://www.introversion.co.uk (Creators; Windows and Linux
    versions)
    Ambrosia - http://www.ambrosiasw.com/news/ (Mac version of Game)
    
    -----
    
    [357] Getting Started
    
    Go ahead and launch Uplink, which I hope you have already installed.
    The first things you will see is a screen with two buttons.  One tells you
    about Uplink Corporation.  Uplink corp is the worlds largest freelance hacker
    industry in the world.  Guess what?  They want you to join their elite ranks.
    Pressing the second button will give you the same speach.  Read through if you
    want.  The next screen will be asking you to put in any screen handle and
    password you want.  Don't worry about writing down your password, as Uplink
    has been designed to store it for you.  Remember: ALWAYS KEEP YOUR CURSOR OVER
    THE TEXT BOX YOU ARE TYPING IN!  For some reason, Uplink doesn't like it if you
    don't.  You will be then asked for a location of your gateway.  It's really not
    important, so choose anywhere you'd like.
    	
    After you have chosen a location you will be then asked to put in a
    code from the card you recieved with the game.  Don't e-mail me asking for
    what numbers or such that you should be putting in if you didn't buy the
    actual game.  I will just delete your e-mail and laugh.  Uplink will ask
    you every time you create a new user for this information, so keep your key
    card.
    
    Uplink will show a "download" of information on your screen and,
    BAM, you are now an offical Uplink Agent.
    
    As an agent, you are connecting to a computer that is stored at the
    Uplink corporation building.  Through their internal services server, which
    you have free access to, you can request a change in memory, modems, security
    devices, processors, gateways (computer), and software.  They also give you
    access to a Buliten Board System that places jobs for hackers like you.
    
    All of this, for the cost of 300 c a month.
    
    When you log on, there is an in game tutorial of how to use Uplink.  If
    you are a first time player, I highly suggest you read through it, as from here
    on out I will be assuming that you understand the basics.
    
    ------
    [193] GamePlay Tips
    
    * Buy Password Breaker and Trace Tracker v 4.0 in the beginning of the
    game.
    
    * Do NOT buy anything but the best version of something.  It saves
    money and time in the long run to just wait it out with the little
    programs you have than to buy every version of an application.
    
    * Do not waste your money with any of these programs: Firewall Disable,
    Dictonary Hacker, and Proxy Disable.
    
    * With the exception of the "Frame a hacker" missions, make as many
    bounce points as possible.
    
    * Always try to bounce through a system you already have admin access to.
    
    * ALWAYS use InterNic OR Uplink Test System as your FIRST bounce.
    
    * Always go back and delete logs of your entry; remember, you can be
    passive traced.
    
    * If you've been slapped on the wrist and made to pay a fine, go back
    and delete your criminal record later.
    
    * Keeping a small pad of paper in front of you for a basic description
    of your target and what needs to be done can be helpful.
    
    * Remember, this is a game of speed.  If you get down to anywhere
    less than 10 seconds on Trace Tracker v 3.0+ or are hearing a beep more
    than once a second, disconnect immediately.
    
    * If you are doing the story line missions, becareful on who you do missions
    for!  If you do any missions for ARC, you will be hurting youself later
    unless you are doing the ARC storyline.
    
    * Try not to abandon a mission.  It doesn't look good for you.
    
    * Try to milk as much money out of your employers as you can.  If they
    do not give you more money, say "No, thanks" and ask them again. Thanks
    MetroidFox
    
    * Your loan amount will increase every new rank as an Uplink agent. If
    you are straped for cash, having a loan can get you out of a tight spot.
    Thanks Alex.
    
    * Untested tip by Alex: If you use "readwrite" as the account you are
    hacking instead of "admin", you will not be traced and the password
    will stay on government acounts ONLY.  You must have Montior Bypass
    of the appropriate level on as well to make this trick work.
    
    ------
    [452] Missions
    
    ===
    [001] Uplink Test Machine
    
    Objective: Copy "Uplink Test Data" and send it back to Uplink Corp.
    Required Software: File Copier V 1.0 - 100 c - 1gq (preloaded)
                       Password Breaker v 1.0 - 1500 c - 1gq (SUGGESTED)
                       OR
                       Dictonary Hacker v 1.0 - 1000 c - 4gq (NOT SUGGESTED)
    Suggested Tools: Trace Tracker v. 4.0 - 2500 c - 3 gq
    Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
    Hardware Upgrade: None
    Security Level: Low
    Threat: Non-existant
    Money Recieved: 0 c
    
    Your first mission when you sign on is to hack into and copy a file
    on the Uplink Test Machine.  Though the in game tutorial explains how, I
    will cover this mission anyway.
    
    First things first, you have 3000 c to play with in your account, but to
    get the best that you can at this point, go to the Uplink International
    Bank and pull out a loan of 4000 c.  This isn't a lot of money and it
    will help you out a LOT in the beginning.
    
    To get into any machine in Uplink, you will have to have at least a
    password or something of a similar sort. So, let's get a cracker!  You have
    your choice between two flavors of password crackers.  The first that you will
    see is Dictonary Hacker.  It's cheaper than Password Breaker, and is faster
    all around.  The drawback that is after your third or fourth mission, the
    software will be obsolete for the REST OF THE GAME.  I wouldn't even waste my
    time or money on buying it.  Sooo... There is also Password Breaker.
    It's slower, but it WILL get the password eventually.
    
    The next purchase I suggest you to do is Trace Tracker v 4.0.  You 
    don't have to buy versions 1.0 and 2.0 first, so save your money.  Stick with
    Trace Tracker until you can save up for the HUDMapShowTrace.  I personally like
    having an exact time, so you may keep it regardless.  Anyway, for the test
    machine, it isn't required, but you may as well since you will have to use it
    in the next set of missions and for the rest of the game.
    
    After you're all suited up, go into your map screen.  In the tutorial,
    you were told that you can bounce calls off of different machines.
    This is a required trick, since this will be what buys you the most
    ammount of time for anything. Click on every dot on screen, leaving Uplink 
    Test Machine to be your last click.  When you have it all loaded up, hit
    connect.
    
    Read the paragraph about the machine if you'd like, and then click on 
    the "Start Test" button.  You will now be looking at a screen that looks 
    like this:
    
    	
            Uplink 
            Test Machine
    
            -----------------------------------
           | User Authorisation Required       |
           |                                   |
           | Name ______________________       |
           | Code ______________________       |
           |                                   |
            -----------------------------------
                                     |Proceed|
                                      -------
    
    
    Time for your first hack.  Fire up password breaker and trace tracker.
    You should notice that the CPU usage bar has both listed and there is a light
    blue bar 1/2 way filled behind them.  Click on the right arrow button on the
    "Password Breaker" bar. Fill it up until that bar is a deep blue and the
    "Trace Tracker" bar is a neon green.  Click on the Password Breaker program
    running below the Autorisation box, then click the Autorisation box.
    
    Password Breaker is now solving the password.  Eventually, it will be
    finished and you will see the boxes filled in with "admin" for name and 
    "*******" for code.  During this time, you will see trace tracker giving you
    a time period you have left.  It should be around 130 seconds.
    	
    Click proceed as soon as you see the code typed in.  Now, go back into
    your menu and open up "File copier".  Click on the "Access fileserver" button,
    and then click on the Uplink Test File.  It'll be copying, rather slowly, so
    give it a nudge, and click the right arrow on the CPU bar and push it up to the
    same dark blue you did with Password Breaker.  Ah, that's faster.
    
    Open your memory banks button and wait for the file to finish copying.
    Click on File Copier and then click on an empty space in your data banks.  As
    soon as you see a transparent green box that says "Uplink Test Data" in there,
    DISCONNECT!  Never, EVER leave a connection going when you are doing work.
    As soon as your mission is complete, get out. Uplink is a game of speed, so if
    you aren't fast enough on doing this, you'll see the game over screen pretty
    quick.
    	
    Click on your e-mail from Uplink.  Should look like a little peice of 
    paper.  Hit Reply, and then "File: None Attached".  Click on Uplink Test Data 
    that comes up on your menu.  The button should now read "Uplink Test Data".  
    Send the e-mail.
    
    Congradulations.  You have now completed your first mission with Uplink.
    	
    For those of you speeding through this, the password for this level is 
    'rosebud' and will always stay that way.
    
    ------
    
    [002] Destroy or Copy Files
    
    Before starting either of these missions, you want to go into your 
    memory banks and use the tool "File Deleter" to erase "Uplink Test Data" 
    and the "Tutorial" program if you feel confident enough with the game to do so.
    
    To get any missions, you need to log on to the Uplink Internal Services
    machine and access the Mission List button.  You may or may not see any "white"
    missions.  Any mission that is a dark gray is one you cannot accept.  Fast 
    forward time on your time bar and wait until something comes up. You have the
    options of accepting straight out or contacting.
    
    MetroidFox suggests that you should always contact the employer and ask for
    more money.  If they say no, say "No, thanks" and then come back and try
    again until they say yes.
    
    The suggestion, while possibly tedious (it took a brand new character of
    mine 8 attempts once), will actually net you a good deal of extra money.
    
    Also, while doing these missions, you may want to keep a list of what
    companies you are hacking into and destroying and which you are helping.  
    This information is useful when it comes to playing the Stockmarket, 
    details on that later in this FAQ.
    
    Level 1 missions are simple to complete and will give you a little bit
    of quick cash to upgrade your gateway with.  It should only take about 1 
    mission of each type to progress on to the next level of missions.  However, 
    you may want to play around in this area for about 10 missions to make sure 
    that you have enough money to continue and so that you have a good feel for 
    what to do.
    
    Finally, if you have not already done so, log into InterNIC and click the
    "Admin" button.  Get the password (you will not be traced).  This will
    become exceedingly handy for the rest of the game.
    
    
    ***Destroy the File Mission***
    
    Objective: Delete the file from company A for Company B
    Required Software: File Deleter V 1.0 - 100 c - 1gq 
                       Password Breaker v 1.0 - 1500 c - 1gq 
                       Trace Tracker v. 4.0 - 3 gq
    Suggested Tools: None
    Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
    Hardware Upgrade: None
    Security Level: Low
    Threat: Low
    Money recieved: 1000 c - 1500 c
    
    When you accept this type of mission, make sure that you know which
    company you are going into and what file you are supposed to delete.  Most 
    of the servers you go into are slow, but occasionally, you run across the 
    server or two that is fast enough to make your job hard.
    
    First, make your connection route, using InterNIC or Uplink Test Machine as
    your first bounce point.  It's suggested that you have one saved.  It's
    convient and saves time.  Sadly, you must redo this route every 
    time you log out and log back into Uplink, but it's a small price to pay.
    
    When you access the server, it should look a LOT like the Uplink Test 
    Machine.  Go ahead and turn on Trace Tracker (you may as well leave it on for
    now on) and password breaker.  Be certain to set password breaker to the
    highest limits it can go WITHOUT turning off Trace Tracker.  Again, Uplink is
    a game of speed.  I suggest that while the password breaker is solving said
    password, click on your application menu and hover your mouse above the 
    "file deleter" application.  Once the password is solved, click on file 
    deleter, hit proceed, then access the "fileserver" menu.  Delete the file that 
    you were sent out to delete.  I would suggest to make file deleter to go faster 
    by kicking up the speed via the CPU menu bars. If you have extra time, and you 
    want to REALLY mess up this company for some reason, feel free to
    delete more files,just don't get caught.  As soon as your work is
    done, hit disconnect.
    
    Go to the corresponding e-mail for your mission and reply.  If you have
    not gotten the V. 1.31 patch for Uplink from Introversion's website
    (http://www.introversion.co.uk) or from Ambrosia
    (http://www.ambrosiasw.com/news/), you will have to wait for the WHOLE e-mail
    to be typed out before you hit send.  Otherwise, feel free to be trigger happy.
    
    ===
    
    ***Copy the File Mission***
    
    Objective: Copy the file from company A for Company B and send it back to
               Company B
    Required Software: File Copier V 1.0 - 100 c - 1gq 
                       Password Breaker v 1.0 - 1500 c - 1gq
                       Trace Tracker v. 4.0 - 2500 c - 3gq
    Suggested Tools: None
    Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
    Hardware Upgrade: None
    Security Level: Low
    Threat: Low
    Money recieved: 1000 c - 1500 c
    
    When you accept this type of mission, make sure that you know which
    company you are going into and what file you are supposed to delete.  Most
    of the servers you go into are slow, but occasionally, you run across the
    server or two that is fast enough to make your job hard.
    
    First, make your connection route.  It's suggested that you have one
    saved.  It's convient and saves time.  Sadly, you must redo this route every
    time you log out and log back into Uplink, but it's a small price to pay.
    
    When you access the server, it should look a LOT like the Uplink Test
    Machine.  Go ahead and turn on Trace Tracker (you may as well leave it on for
    now on) and password breaker.  Be certain to set password breaker to the
    highest limits it can go WITHOUT turning off Trace Tracker.  Again, Uplink is
    a game of speed.  I suggest that while the password breaker is solving said
    password, click on your application menu and hover your mouse above the
    "password copier" application.  Once the password is solved, click on file
    copier, hit proceed, then access the "fileserver" menu.  Copy the file that
    you were sent out to copy.  I would suggest to nudge up file copier's speed via
    the CPU speed bar.  While it is copying, open up your memory banks and wait.
    When it is finished copying, click on file copier and then click on an empty
    ammount of space.  There is not much that can be gained by copying other random
    files, so disconnect as soon as this is done.
    
    Go to the corresponding e-mail for your mission and reply.  Click on 
    the "File: none attached" button, and attach the correct file for the mission.
    Send it out and wait for a response.  Once recieved, use file deleter to delete
    the file you copied.  You'll run out of space fast if you ignore this step. If
    you have not gotten the V. 1.31 patch for Uplink from Introversion's website
    (http://www.introversion.co.uk) or from Ambrosia
    (http://www.ambrosiasw.com/news/), you will have to wait for the WHOLE e-mail
    to be typed out before you hit send.
    
    --------
    
    [003] Changing Academic Records
    
    
    Objective: Change an academic record for your employer
    Required Software: Password Breaker v 1.0 - 1500 c - 1gq (SUGGESTED)
                       Trace Tracker v 4.0  - 2500 c - 3 gq
    Suggested Tools: Log Deleter v 1.0 to v 4.0
                            - v 1.0 - 500 c - 1gq
                            - v 2.0 - 1000 c - 1gq
                            - v 3.0 - 2000 c - 1gq
                            - v 4.0 - 4000 c - 1gq
    Gateway Suggested: Gateway ALPHA - 3750 c (starting computer)
    Hardware Upgrade: None
    Security Level: Low
    Threat: Medium-Low
    Money recieved: 2000 c to 3500 c
    
    Once you feel you are ready to go to the next step to take these missions,
    go ahead and try to sign up for one from your BBS.  Sometimes it will show up
    white and say you're to low of a level to take the mission on.  Solution?
    Contact the company and then click "ok, agreed."  If you are getting this
    message, however, you might want to reconsider and take on lower level
    misssions for a while longer.
    
    I have suggested that you get the Virtuanet gateway at this point.
    I personally love this gateway because, as stated, you CANNOT get caught. That's
    right.  If you stay on to a computer for to longer, it will just boot you.  No 
    game overs.  However, for your own sake for later in the game, keep in the 
    habbit of disconnecting before Trace Tracker v. 3.0 reads 6 seconds or below 
    OR you are disconnected.
    
    ***NOTE: I am writing the FAQ currently for version 1.0 release of
    Uplink.  If you are using any of the newer patches, there is a possiblity
    of your STILL being caught if you are using the Virtuanet gateway, according
    to Alex.  I have seen this happen when I played v 1.31 a while back, but
    it's been a while. ***
    
    The Academic Database is a little tougher than the run of the mill
    computers you have been working with.  I highly suggest that you make your
    connection line a lot longer.  To find new connection points, go to the InterNIC
    server.  Government computers work well, but remember that you want to make your
    first connection on the line an Uplink machine (I suggest the Uplink Test Data
    Machine OR the InterNIC since it is easy to get into and you can freely change
    the logs later).
    
    Before you get going, make sure you know exactly what the name of the
    target is and what the employer wants done.  Having the name written down before
    hand is a BIG help.  Once your string is set, log on to the Academic Database.
    Have the password breaker get through the admin account and then click
    on "Search Records".
    
    ***ANOTHER NOTE: This is untested by me, but according to Alex again from
    www.gamefaqs.com message board, if you use the account "read write" for 
    this type of mission, you will not be actively traced AND the password will
    not be revoked!  Make sure that you have the appropriate level of Montior
    Bypass (might as well use level 5) running when you are doing this trick
    otherwise it won't work!***
    
    It will have a text box saying "enter name here" with the buttons "ok"
    and "cancel" below that.  Type in your target's name and let it search. The
    names are pulled up in alphabetical order.  So if your target is Alex Cowell,
    you'll get to the record quick.  If your target is Warren Simpson, it'll
    be a while longer.  Make sure you keep this in mind and give yourself enough
    time to get to the record and change it.
    
    It will only take about two of these missions to go to the next level,
     but I suggest four to six.
    
    Please refer to the diagram below before you scroll to your appropriate
    mission.
    
            International Academic Database
            view record
    
       ---------------     -------------------------------------
      |               |   | Target Name                         |
      |               |    -------------------------------------
      | Target        |            College Qualifications 
      | Photo         |    -------------------------------------
      |               |   | Class        *                      |
      |               |   | Class2       *                      |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
      |               |    -------------------------------------
      |               |            Graduate Qualifications
       ---------------     -------------------------------------
                          |Qualification name, Class x          |
                          |                                     |
                           -------------------------------------
                                   Other Qualifications
       ---------------     -------------------------------------
      |   Commit      |   |Accreditation                        |
       ---------------    |                                     |
       ---------------     -------------------------------------
      |   Done        |
       ---------------         
    
    The Boxes above is what you will be looking at for the Academic Database.
    You will be required to mostly mess with Graduate Qualifications or Other
    Qualifications.  * stands for a letter grade achieved (A through G, oddly) and
    the "X" for class stands for a number 1 through 3. 1 being the best, 3 the
    worse.
    
    When you are done with a mission, hit commit, then click okay on the box
    that comes up.  If you have multiple missions in the Academic database, hit done
    and repeat the process.  For some reason, Uplink doesn't like it if you complete
    multiple missions and THEN send out the e-mails, so I would suggest e-mailing
    your employer directly after you finish the changes on the appropriate academic
    record.  Remember, disconnect ASAP.  This is a government machine and if you
    get caught  to many times, it's game over.
    
    ***Target scored to highly on test, give him a 3rd class replacement***
    
    In the Graduate Qualifications Box, change the Class 1 to Class 3 then
    hit commit.
    
    ***Target needs first class degree***
    	
    This is the oppisite of the first type of mission.  Go into the file,
    and erase the 3 or 2 after class and replace it with a 1.  Commit.
    
    ***Individual urgently requires Qualification***
    
    It's hard to tell which goes where, but if you see the word "certified"
    or "accredited" in the title line of what the job is, it will be in the Other
    Qualifications box.  Simply type in, CORRECTLY, the title of the job and hit
    commit.
    
    ***Individual urgently requires Degree/Generate a University Degree***
    	
    This is the same as above, but it's not a certification or anything of
    the such, so in the Graduate Qualifications, type in the WHOLE job (I often
    times forgot to put in "engineer" or something silly of the sort, so be 
    careful), and hit commit.
    
    When you are finished with the mission, go to the first bounce point
    on your string, which is either Uplink Test Machine OR InterNIC, and
    delete the logs of you ever doing any of this. Access the server and
    use "Log Deleter" whatever version you like to delete ANY log with
    your I.P. number in it.  This trick will be a good habit to remember and will
    save you from detection in the future.  Remember, ALWAYS DELETE THE LOGS OF AT
    LEAST ONE, IF NOT UP TO THREE OF THE COMPUTERS ON THE CONNECTION STRING!  Just
    because you got out before you were booted doesn't mean that the
    company/insitiution doesn't care anymore and will stop looking for you.
    At this level, it isn't a big deal, but it will be soon.
    
    ---------
    
    [003] Changing Social Security Records
    
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 4.0 - 2500 c - 3 gq
                       Log Deleter v 4.0 - 4000 c - 1 gq
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 - 6000 c - 1gq
    Suggested Tools: None
    Gateway Suggested: The VIRTUANET R-ACCESS Gateway - 15750 c.
    Hardware Upgrade: None
    Security Level: Medium
    Threat: Medium
    Money recieved: 
    
    Everything up to here has been a cake walk.  From here on out, no 
    matter what, you must be fast.  Always disconnect after your missions, make
    sure that you are hovering above the application you need before you have to
    use it, use long connection strings, and delete the logs of your bounces on at
    least two or so computers.
    
    These missions require you to hack into the Social Security Database
    and change information on different people.  These missions pay more, but if
    you are caught, it is a fine, and a second time is definately a game over.
    If you haven't already switched gateways, now is the time to do it.
    	
    Also, you need quite a bit of credits to be able to complete these
    missions.  You MUST have a HUD ConnectionAnalysis program installed, along
    with quite a bit more software.  It is advised that you work on lower level
    missions, play the stockmarket, so on so forth, before you start this mission
    evel.
    
    Finally, before you start this mission, be aware that the "Contact" 
    option on the mission BBS is now a VERY useful source of information.  Asking
    who the target is and what level the security is at will be beneficial to you.
    Also, if you are getting stuck, you may want to look at the help menu on the
    Uplink Internal Services Server.  It will often times help point you in the 
    right direction.
    
    ***NOTE: This is untested by me, but according to Alex again from
    www.gamefaqs.com message board, if you use the account "read write" for 
    this type of mission, you will not be actively traced AND the password will
    not be revoked! Make sure that you have the appropriate level of Montior
    Bypass (might as well use level 5) running when you are doing this trick
    otherwise it won't work!***
    
    You will have somewhere in the area of 40 to 60 seconds to complete one
    mission, depending on what upgrades you have.  Make sure you act fast.  When
    you log on to the SSD, start using password breaker. While it is going, open up
    HUD ConectionAnalysis (it is the newest button in your menu panel on the bottom
    left hand corner of the screen).  You will see that there is a proxy server in
    your way.  Hover your mouse above "Proxy Bypass" (whatever version you have, v
    1.0 is sufficent) and get ready to click on it once the password breaker is
    finished.  Click on the Proxy server on your HUD CA.  The little round red dot
    should turn green.
    
    Proceed.  Click on Search Records.  Enter the name of the target like
    you did in the Academic database. Unlike the Academic Database, the Social
    Security Database will randomly search. Be sure you have at LEAST 20 seconds
    left on Trace Tracker before you start changing records, or you will get caught
    
    
    Refer to the diagram below for the Social Security Database set up
    
    
    International Social Security Database
    view record
    
       ---------------            Name
      |               |    -------------------------------------    
      | Target        |   | Target Name                         |
      |               |    ------------------------------------- 
      | Photo         |           Social Security Number
      |               |    -------------------------------------
      |               |   |123-45-6789                          |
      |               |    -------------------------------------
      |               |           Date of Birth
      |               |    -------------------------------------
      |               |   | DD-MM-YYYY                          |
      |               |    -------------------------------------
      |               |           Marital Status
      |               |    -------------------------------------
      |               |   |Marital Status                       |
       ---------------     -------------------------------------
                                  Personal Status
                           -------------------------------------
                          |Personal Status                      |
                           -------------------------------------
                                 
       ---------------     
      |   Commit      |   
       ---------------   
       ---------------     
      |   Done        |
       ---------------         
    	
    		
    For these missions, you are going to be completely
    concerned with ONLY the personal status text box.  You can, of course, have
    fun and mess around with other people's status if you want (this will often
    times show up in the news), but it's not required.  Typically this box will
    say either "Self-employed", "Employed", or "Deceased".
    
    ***Target living to easily***
    
    Clear out whatever is already in the box for Personal Status and put 
    down "Deceased".  Remember, always spell things right, or the computer will 
    tell you that you haven't changed the record yet.  Hit commit and you're done.
    
    ***Falsify a Social Security Document***
    
    Changed the word "Deceased" to "Employed".  Commit.  You're done.
    
    ---------
    [005] Changing Criminal Records
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 5.0 20000 c. - 1 gq
                       Decypher v 3.0 - 8000 c - 2 gq
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    You will need to plunk down another 33000 c. for these missions, at the
    most, so save up again.  Some of you may even want to get HUDMapShowTrace,
    but really, you will only NEED Trace Tracker in Uplink, so remember that
    it is an optional upgrade.
    
    However, you must get at least version 1.0 of Decypher.  I would suggest
    to go ahead and get Monitor Bypass too.  It will help with all missions
    after this one, though it is not completely required for this mission.
    
    Looking into the Global Criminal Database, there will be a new challange
    waiting for you here.  The Ellptic-Curve Encryption Cypher.
    
    When doing these missions, I find it's more time efficent to use the
    Decypher first before the password breaker.  It takes a little more time,
    so if they aren't tracing you when you are using it, that's a little
    time saved.  Having Decypher 3.0 from the get-go is also a big help.
    
    If you haven't already done so, now is the time to start hardware upgrades.
    Just like software, don't even bother with getting anything but the best.
    Remember to check what type of modem is the high end for your respective
    gateway.  Spending more money than you have to is always a bad thing.
    
    ***NOTE: This is untested by me, but according to Alex again from
    www.gamefaqs.com message board, if you use the account "read write" for 
    this type of mission, you will not be actively traced AND the password will
    not be revoked!  Make sure that you have the appropriate level of Montior
    Bypass (might as well use level 5) running when you are doing this trick
    otherwise it won't work!***
    
    Go ahead and start making your bounces now.  Turn on HUDConnectionAnaylsis,
    Trace Tracker, Decypher, and if you got it, Monitor Bypass, it'll give
    you a couple of extra seconds at the very least.  Click on the
    Ellptic-Curve button, and then drag Decypher on the screen of random
    numbers.  Put this up to the max on CPU usage.  When it is done, use
    password breaker on the password portion of the server.  Turn on Proxy
    Bypass, and proceed.
    
    This server searches through records alphabetically, so judge your time
    wisely.  Also, as a time saving measure, I have found that you can
    go ahead and type the new criminal record you want to type during
    the search in if that is your mission.  Remember, always hit
    Add. Otherwise, just hover your mouse above "clear history".  
    
    
            Glovbal Criminal Database
            view Criminal Records
    
       ---------------                 Name 
      |               |    ------------------------------------- 
      |               |   | Target Name                         |
      |               |    -------------------------------------
      | Target        |             Criminal History
      | Photo         |    -------------------------------------
      |               |   | Criminal Act 1                      |
      |               |   | Criminal Act 2                      |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
      |               |   |                                     |
       ---------------    |                                     |
       ----------------   |                                     |
      |Clear History   |  |                                     |
       ----------------    -------------------------------------
       ----------------   |                                |ADD | 
      |Authorise Arrest|   -------------------------------------
       ---------------- 
       ----------------   
      |   Done         |
       ----------------        
    
    *** Help to stop a hacker from ever working again***
       
       Go into the record, and find the man you're going after.
    When you find him, if he doesn't already have any records,
    add in something interesting if you weren't told what to put
    down.  Be creative. n_n  Hit done.
    
    *** Help to discredit one of our rivals***
    
      Search the record for the appropriate man, and then add
    the charge that the company wants you to.  Hit done.
    
    *** Clear a criminal record ***
    
      Probably the easiest mission of this type.  Hit "Clear
    History".  Hit done.
    
    And remember boys and girls, clear your history!!
    
    -------
    [006] Bank Account Information
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v 4.0 
                       Log Deleter v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
    Suggested Tools:   Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 5000 c. to 7000 c.
    
    The security in this is similar to that of the Global Criminal Database.
    Turning on Monitor Bypass, if you have it, will give you a few more
    seconds that could definately help.  Upgrade whatever you can (excluding
    your gateway, make sure you are saving up for the Trinity).  Everything
    that I have listed otherwise you MUST have.
    
    It is, also, again, a generally good idea if you write down the
    number of the account you are jacking into and what detail you are
    looking for.
    
    You will actually NOT need Proxy Bypass for this mission since you
    won't be changing any details, rather just writing some down.
    
    Make several bounces, and log into the appropriate bank server.
    Click on Manage an Existing Account and then type in the number
    of the account you want the number of.  Put password breaker to
    work.
    
    In this instance, the missions are practically the same.  You will
    either need to write down the current balance of the account, the
    current loan, or the most recent bank transfer.
    
    ***Balance***
      
       Once you are in, click on "View Account" and the third row
    down will say "Balance".  The number next to it is the one that
    you are concerned with.
    
    ***Loan***
    
       Go into "View Account" and the fourth row down is "Loan". The
    number next to that is the one you want.
    
    ***Recent Bank Tranfer***
    
       Click on "View Statement" and then find the appropriate transfer.
    Write down the ammount.
    
    In any of these cases, once you have recieved the information, delete
    the appropriate logs, and then reply to the e-mail.  When the e-mail
    finishes writing itself out, hover your cursor over the e-mail body
    and hit enter.  Then type in the number that the employer wanted to know.
    Don't even bother putting in "c." or "Credits" or something of the sort.
    They don't really care.
    
    ----
    [007] Delete Computer Database
    
    Objective: Delete everything on a database
    Required Software: Password Breaker v 1.0
                       Trace Tracker v 4.0 
                       Log Deleter v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Monitor Bypass v 5.0
                       Proxy Bypass v 5.0
                       Firewall Bypass v 5.0
                       Voice Analyser v 1.0
                       Decypher v 3.0
    Suggested Tools: None   
    Gateway Suggested: Trinity 1686a
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: High
    Threat: Medium-High
    Money recieved: 7500 c. to 8900 c.
    
    I would suggest that you go ahead and purchase the highest versions of
    Monitor, Proxy, and Firewall Bypass.  The servers you will be breaking
    into will have varied security levels, so you may as well.  If you don't,
    you will eventually run into the case that you will not be able to
    get through, and abandoning missions is never good.
    
    Most of the computers you will be breaking into are Central Mainframes.
    This is the first time in the game that you will HAVE to do a little
    research for the computer you are breaking into.
    
    Go to InterNIC and search for the company you are going to be destroying.
    There should be something that says "Public Access Server" with the
    company name preceeding it.  Click on "About Us" and click on the "+"
    sign for the systems administrator.
    
    Give the man a call.  Have voice analyser running through the WHOLE call.
    Wait until he hangs up on you and the voice analyser is ready for playback
    before you disconnect.
    
    While you are doing the bounces, I would highly suggest making the bounce
    before the Central Mainframe be the Public Access Server.  Not always,
    but sometimes the Central Mainframes do not allow access from anything
    but a "trusted source".  That occasionally doesn't work, so you might
    also want to try their Internal Services Machine or something else that
    the company uses.
    
    When you log on, turn on the appropriate Bypassers.  You will usually
    have to use all three.  The voice analyser should still be on, so click
    on Voice ID, and hit play.  Wait for the voice to stop talking and the
    green "Access Granted" lettering.  Click on the ID screen and then continue
    to use password breaker.
    
    Proceed.  Go into Console (for those of you who are familiar with DOS, this
    will be VERY SIMILAR to it, if you want a hint). Type in "cd usr" then
    type delete.
    
    Disconnect and do your usual clean up of logs.  Hit fastforward and wait
    for the news to hit.  Hit reply and, boom, your done.
    
    ---
    [008] Trace a Bank Transfer
    
    Objective: Find out who just got a lotta money and report back
    Required Software: Password Breaker v 1.0
                       Trace Tracker v 4.0 
                       Log Deleter v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Monitor Bypass v 5.0
                       Proxy Bypass v 5.0
                       Firewall Bypass v 5.0
                       Voice Analyser v 1.0
                       Decypher v 3.0
    Suggested Tools: None   
    Gateway Suggested: Trinity 1686a
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: High
    Threat: Medium-High
    Money recieved:
    
    This is much like the missions that you took perviously of searching for
    financial data of an enemy.  This time it's a little more complicated, but
    not by much.
    
    First, go to the bank of your target.  Remember to type in their account
    number and use password breaker.  Go into the "Veiw Statements" file. 
    There will be a LARGE transfer somewhere on that list (if you got the mission
    early, it'll be close to the top, otherwise, start scrounging around
    for the largest transfer, and that'll usually be it).  Write down
    what the account number was that it was transfered to and the IP of the
    bank that it was transfered to.
    
    Delete your logs!  If you are taking to long, you can be passively traced
    and that's what makes this mission a little more difficult and more easy
    to get caught.
    
    Log on to bank number two and do the same thing.  Log into the account
    that the money was transfered to and write down the name of the man that
    owns the account.
    
    Log out, delete logs, and then reply to the employer.  Hover your mouse
    about the e-mail body, hit enter, and type in the name of the man who
    got the money.
    
    Simple as pie, neh?
    
    ---
    [009] Copy and Secure a Large Database
    
    Objective: Copy as many files as you can, decrypt them, and upload them
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 4.0 
                       Log Deleter v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Monitor Bypass v 5.0
                       Proxy Bypass v 5.0
                       Firewall Bypass v 5.0
                       Voice Analyser v 1.0
                       Decypher v 3.0
                       Decrypter v 7.0
    Suggested Tools: None   
    Gateway Suggested: Trinity 1686a
    Hardware Upgrade: A LOT of memory; As much as you can get
    Security Level: High
    Threat: Medium
    Money recieved:
    
    I personally despise these missions and never accept them if I can avoid it.
    
    This is a lot like the missions early in the game where you have to copy a
    file from a server, except for now that these are really big files and
    more stubborn servers.
    
    Make the neccisary bounces and log on to the server.  Ensure that any
    Firewalls, Proxies, or Montiors will not be in your way.  When you log
    in, try to be as quick as you can.  Just download and go.  If for whatever
    reason you cannot get all the files in the first go, don't worry about it.
    You can always come back for a trip two if need be.  Don't get cocky
    either.  If it looks like you cannot finish a download, disconnect and
    log back in.
    
    Delete the logs, and then use Decrypter on every file you just downloaded.
    After they are all decrypted (the employer will NOT accept the files if
    they are still encrypted), go to the employer's file server and copy
    over each file.  Once it is copied over, feel free to delete them.  No
    longer needed.
    
    Once you have the files up, reply and get your cash.
    
    There are a couple of problems with this mission type.  The first being
    that the file servers provided by the employer are not always big enough
    to house all the files they asked you to download.  Swell, eh?  Don't
    sweat though.  They will accept "most" of the files if you got them up,
    but they will only pay you "most" of what you agreed.
    
    The second problem is one that I personally haven't ran into, but according
    to Icepick at www.modlink.net, some files will have an encryption level
    of 8.  Obviously, you cannot decrypt these and are forced to abort the
    mission.
    
    ----
    [010] Trace a hacker
    
    Objective: Steal money from the victim and deposit it elsewhere
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 4.0 
                       Log Deleter v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Monitor Bypass v 5.0
                       Proxy Bypass v 5.0
                       Firewall Bypass v 5.0
                       Voice Analyser v 1.0
                       Decypher v 3.0
    Suggested Tools: None   
    Gateway Suggested: Trinity 1686a
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium to High
    Threat: Medium
    Money recieved:
    
    Another annoying hack.
    
    Your objective is to find out who hacked a companies server and report
    back.  However, first off, the company, though they give you access to
    their server, does not give you enough access to view the logs so you
    can get cracking.  Next, they don't even tell you the right time.  
    
    ---
    [011] Transfer Money
    
    Objective: Steal money from the victim and deposit it elsewhere
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. v 4.0 
                       Log Deleter v v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Monitor Bypass v 5.0
                       Proxy Bypass v 5.0
                       Firewall Bypass v 5.0
                       Voice Analyser v 1.0
                       Decypher v 3.0
    Suggested Tools: None   
    Gateway Suggested: Trinity 1686a
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: High
    Threat: Medium-High
    Money recieved:
    
    These missions are the best because after transfering the ammount
    your employer asks for, you can also transfer the rest of their money
    to your own account.  n_n  Basically a great mission for anyone
    who is trying to get a lot of money.
    
    Write down the bank IP and account number that you will be tranfering
    to.  It saves you a lot of time.
    
    Break into the bank.  Turn on all the relevent Bypassers and type in
    the bank account number you are about to hijack into the user name
    portion of the log in box.  Use password breaker to get in.
    
    When you are in, click on the third option down of "Tranfer Money"
    (things are user friendly in the future :)) Type in the bank IP
    that the money is going to, the account number that it is going to,
    and the amount.  Remember to delete the "Fill this in" text before
    you type whatever you want in.
    
    Though the e-mail says to delete the transfer logs, DON'T!  Reply that
    the transfer has gone through first.  Hopefully you're reply will
    come before you're caught.  Delete the transfer logs (if you have also
    "borrowed" money especially), and then clear up the bounce logs.
    
    Don't worry about the transfer logs on their end.
    ----
    [012] Ruin a life
    
    Objective: Send some poor sap to jail
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. v 4.0 
                       Log Deleter v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 5.0 
                       Decypher v 3.0
    Suggested Tools: None   
    Gateway Suggested: Trinity 1686a (or lower)
    Hardware Upgrade: None
    Security Level: Medium
    Threat: Medium
    Money recieved:
    
    I'm not all to sure WHY this was put in for one of the more
    difficult missions, but hey, whatever, right?
    
    Break into the Global Criminal Database in the same manner you
    did when you were adjusting different criminal records.
    
    So, make your bounce points, and connect up to the database.
    Your computer will e considerably faster by now, so you can
    turn on proxy bypasser and password breaker at the same time.
    
    What is required in these missions is for you to throw someone
    in jail.  Put down crimes like "High Tech Fraud", or, heck, you
    could put in "Jay Walking" if you'd really like, as long as there
    is at least TWO infractions of the law listed.  Then, type in
    "Parole Break", or anything else that has the word "Parole" in it.
    Authorise an arrest.
    
    Clear out your logs and wait about three hours and look at the
    news on Uplink's Internal Services Machine.  When you see something
    of the jist of "Hacker arrested", reply.
    
    -----
    [013] Frame a person for Hacking a Bank
    
    Objective: Frame a poor sap
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 4.0 
                       Log modifier v 2.0
    Suggested Tools: HUDMapTrace 
    Gateway Suggested: Trinity 1686a (or lower)
    Hardware Upgrade: None
    Security Level: Medium-high
    Threat: High
    Money recieved:
    
    This mission does not seem difficult when you take it, but the speed
    required to finish this mission so you do not get a game over is what
    makes it worthy to be a difficult one.
    
    Write down the IP of the victim.  Once you start this mission, it
    should take you LESS than a minute to complete it.  Messing with an
    e-mail is the last thing you want to do to slow you down.
    
    This mission, as much as speed it is, is also one to test your nerves
    a little.  Don't be TO paranoid about the job either.  If you have
    HUDMapTrace (which I really have to suggest for these missions)
    you should allow about one, and, if you are extremely gutsy, two 
    computers actively traced.
    
    InterNIC almost HAS to be your first bounce.  It's the fastest to
    get into, and you need the edge.  At this point in the game, using
    the Uplink Test Data Machine is no longer recommended.
    
    At this point, I will also have to advise you to take what the e-mail
    tells you to do with a grain of salt.  You are told that they want you
    to hack completely into the system and possibly shut down a security
    measure or two.
    
    Guess what?  You're not going to be doing that.
    
    Make up to five bounces.  I really would suggest three, first being
    InterNIC, and two others that you have admin access to.  That will
    give you just about the amount of time you are looking for.
    
    Log into the target bank system.  Click on "Administration". Use
    password breaker and then click on proceed.  You should already have
    a trace going out on you.
    
    Disconnect.  Go to InterNIC and change the third log down (should be
    something like "From 127.0.0.1 to xxx.xxx.xxx.xxx", not a "connection
    made from...", "...disconnected from...", or "...accessed file..." log)
    and use Log Modifier to modify the "From" to be the address of the
    person you are trying to frame.
    
    Delete all other logs that pertain to you.
    
    Go to Uplink's Internal Services Machine and wait until you see news
    that the Bank Machine has had a hacking attempt made.  You have NOT
    thrown your victim in jail yet!  You are setting him up, however.
    
    Make your three to five bounce points again and log back into the
    bank server.  Click on "Administration" again.  You should see
    a trace occur immediately.  If you do not, try using Decypher to get
    things going.
    
    Go back to InterNIC, again, and change the same log that you had to
    last time.  Again, deleting all other logs.
    
    Fastfoward again and wait for news of your victim's arrest.  Reply
    to your employer.
    ----
    [014] Frame a person for Destroying a Database
    
    Objective: Poor saps should ph33r you, so frame them
    Required Software: Password Breaker v 1.0
                       Trace Tracker v 4.0 
                       Log modifier v 2.0
                       Log Deleter v 4.0
                       Proxy Bypass v 5.0
                       Monitor Bypass v 5.0
                       Firewall Bypass v 5.0
                       Voice Analyser v 1.0
                       Decypher v 3.0
    Suggested Tools: HUDMapTrace 
    Gateway Suggested: Trinity 1686a (or lower)
    Hardware Upgrade: Best you can lay your hands on
    Security Level: High
    Threat: High
    Money recieved:
    
    These missions are definately the second most difficult in the
    game, next to the last "Arunmor" storyline mission.
    
    I would suggest that you get a lot of practice on the Frame a man
    for bank hacking missions before you attempt this one.  It's much
    the same, but it requires a little more skill.
    
    You're objective is to break into a HIGH level computer, take it down,
    and pin it on someone else.
    
    You will want to write down the IP of the person you are going to
    frame, yet again, just so you can do this all quick like.
    
    The employer does NOT give you a computer that they want to hack into,
    so you are free to chose any system you'd like.  Go into InterNIC
    and type in "Internal" into the filter. Go ahead and pick out your
    favorite company name, since it really doesn't matter.
    
    Make a few bounces (internic being the first) to the Internal Services
    Machine and hack into it.  Take down their Proxy, Montior, and Firewall
    if they have em.  Next, use password breaker.
    
    The second you log into the systems, start moving.  Go to "Console" and
    type in "cd usr", then type delete.  Wait for the console to read back
    that all files have been deleted, and then disconnect.  If HUDMapTrace
    has only InterNIC to get to or Trace Tracker gets down to 5 or so seconds,
    disconnect regardless.  You are cutting it to close at that point.  So
    close, actually, that you'll have about a  75% chance of it being pinned
    on you. (I've lost so many characters on this mission. n_n)
    
    Connect to InterNIC and change the third log down with log modifier to
    make the "From" IP be from your victim.
    
    When you are waiting for the news, you will FIRST see a news story saying
    that the company you targeted lost millions in research.  THEN about
    two to three stories later, you will see your man has gone to jail.
    
    This mission is hard, and if you mess it up to much, you will pretty
    much have to abandon it.  I would give it three or so tries on pinning
    the guy for computer destruction before you should hang up the towel.
    -------
    [623] Storyline Missions
    [301] Storyline Mission information
    
    This is a bit of a spoiler section, so read ahead if you don't care,
    but don't say you weren't warned about it.
    
    Revelation, basically, is an uber evil virus made by the
    Umbrella-esque ARC.  Your actions in the game decides if
    Revelation is put to an end, or if every computer in the
    world, including yours, is brought down.
    
    There are three main paths you can take.  Apathy, side with
    ARC, and side with Arunmor.  Apathy has the same outcome as
    if you were working for Arunmor (such smart NPC's), however,
    you should really give the storylines a go at least once.  Hell
    even play around with the ARC storyline too! :)
    
    As a warning though, accepting EITHER the ARC or Arunmor storylines
    will cause an immediate game over if you fail their final missions.
    
    The ARC/Arunmor missions have their own set timeline in which
    they occur.  I would suggest playing through a couple of agents
    and get used to all the normal missions before you start up with
    the storyline missions.  If you spend to much time trying to 
    accumulate money for your missions (believe me, these missions
    require you to have at least a decent machine), you will have
    missed an opprotunity to do a mission, and an NPC will be assigned
    to do your work for you.
    
    Do a few bank hacks, take out as many loans as you can, and maybe
    even do a couple of missions.  On 4/09/10 you will receieve an e-mail
    from a dead uplink agent.  If you ignore the e-mail past 4/25/10, you
    will no longer be able to play through either of the storyline missions.
    However, if you wish to play them, first hack into ARC with the password
    that you were given, and disconnect.  Don't even bother erasing your
    logs.  When that is complete, make sure you have 4 GQ of memory open. You
    will be contacted by ARC and given Revelation.  If you want to work for
    ARC, do their mission ASAP.  If you want to work for Arunmor, wait about
    two hours game time and follow their instructions.
    
    The time line you have is roughly this:
    
    3/25/10 8:00 - Unusual Hiring Practices Noticed by Analyists - ARC
    Hiring Top Uplink Agents
    3/29/10 18:00 - High Ranking Agents Rasie Doubts Over ARC
    4/01/10 19:00 - Top Uplink Agent Reassures Community - Highest ranking
    Active Uplink Agent is hired to speak for ARC
    4/09/10 2:00 - Top Uplink Agent Working for ARC Found Dead - Agent
    from previous news story is found dead, assumed sleeping pills
    4/14/10 16:00 - Recieve e-mail from dead agent - Included password
    to ARC mainframe.
    4/18/10 - ? Important Event
    4/25/10 5:00 - Storyline Mission start - If player has not yet
    accepted either ARC's or Arunmor's offer, NPCs assigned to both
    companies.
    4/25/10 5:00 - Unknown virus Outbreak at Arunmor (occurs only if player
    choses to join ARC OR if player ignores storyline missions)
    4/25/10 9:00 - The Arunmor Virus Outbreak - A Special Report - Virus
    found to only be able to infect target systems.
    4/26/10 17:00 - Arunmor We will Retailiate - Faith project started
    (occurs only if player choses to join ARC OR if player ignores storyline
    missions)
    4/26/10 17:00 - New Uplink Service Available - Player able to see
    progress of both Faith and Revelation
    4/29/10 4:00 - Arunmor Releases Information on Revelation - This
    mission is just there to make the player feel bad if they chose
    ARC. (occurs only if player choses to join ARC OR if player ignores
    storyline missions)
    5/01/10 11:00 - Federal Agents Release Findings on ARC - ARC is
    found to be ran techno-anarchists.
    5/03/10 16:00 - ? Important Event
    5/07/10 23:00 - Digital Life Research Stolen - Darwin Research Company
    has all of their research on a cyber-biological application stolen.
    5/10/10 - ? Important Event
    5/11/10 1:00 - ARC Internal Services System Attacked - ARC systems
    Attacked
    5/12/10 - ? Important Event
    5/16/10 7:00 - Arunmor Corportation in Corporate Fraud - High Up in
    Arunmor Corporation found for Financial Fraud. (occurs only if player
    choses to join ARC OR if player ignores storyline missions)
    5/19/10 9:00 - CEO of Andromeda Research Company arrested - Just
    as the head line reads (occurs only if player
    choses to join Arunmor OR if player ignores storyline missions)
    5/20/10 - ? Important Event
    5/24/10 18:00 - Arunmor Central Mainframe suffers crippling blow
    5/27/10 17:00 - ArC Central Mainframe Compromised
    6/05/10 2:00 - Revelation Launch Due Soon? - WHEN YOU SEE THIS
    MAKE SURE THAT YOU ARE READY FOR EITHER A GAME OVER OR TO FINISH
    YOUR STORYLINE!!!
    6/05/10 8:00 - Revelation Virus Outbreak Leaves Systems Crippled
    - You have roughly two hours of game time to complete your storyline
    when this comes up.
    6/07/10 18:00 - First Press Release from Andromeda Leader
    6/14/10 19:00 - Leader of Andromeda Jailed - Anarchy bad, go to 
    jail! ?
    6/18/10 19:00 - Revelation A Retrospect - Arunmor's rich now.
    --------
    [302] ARC Mission 1 - MaidenFlight
    
    Objective: Infiltrate Arunmor's Server and infect it with Relevation
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    If you are having problems with starting this mission, please
    read my introduction to Revelation above.
    
    Wait until 4/14/10 when you get the e-mail from the dead agent.
    Make a bounce chain (it doesn't matter how long) and connect to
    the ARC Internal Services Machine and then to the ARC
    --------
    [303] ARC Mission 2 - Darwin
    
    Objective: Hack Darwin's server and retrieve Digital Life
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    -------
    [304] ARC Mission 3 - SaveItForTheJury
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    ------
    [305] ARC Mission 4 - ShinyHammer
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    ------
    [306] ARC Mission 5 - GrandTour
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    -----
    [307] Arunmor Mission 1 - BackFire
    
    Objective: Backstab ARC and give Arunmor a copy of Revelation
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    If you have problems with starting this mission, please read my
    introduction to Relevation above.
    
    Simply reply to the e-mail and attach Revelation onto it.  As a side
    note, if you did NOT get Revelation from ARC (you did not have enough GQ
    to download it), you need to make a new character.  Remember, you MUST
    have the 4 GQ open to do this mission!
    
    -------
    [308] Arunmor Mission 2 - Tracer
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    -------
    [309] Arunmor Mission 3 - TakeMeToYourLeader
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    ------
    [310] Arunmor Mission 4 - ARCInfiltration
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    --------
    [311] Arunmor Mission 5 - Counter Attack
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    --------
    [312] Special Mission 1 - Wargames
    
    Objective: Hack the Protovision Server
    Required Software: None
    Suggested Tools: None
    Gateway Suggested: None
    Hardware Upgrade: None
    Security Level: Insane
    Threat: None
    Money recieved: None
    
    You do NOT need to have any programs, etc, to get into this server.
    
    All you need to do is rent a copy of Wargames.  n_n  Seriously.  If for
    whatever reason you are unable to do that, I have the password listed
    in the cheats section, but really, it's no fun that way.
    
    Upon completing this mission, you get to play "Global Thermonuclear War"
    and to check out a hint ("I wonder what the IP to Introversion's server?")
    server.
    
    -------
    [313] Special Mission 2 - Mole
    
    Objective: Change the Social Security Records of a target for an employer
    Required Software: Password Breaker v 1.0
                       Trace Tracker v. 1.0 to v 4.0 
                       Log Deleter v 1.0 to v 4.0
                       HUD ConnectionAnalysis - 20000 c - 3gq
                       Proxy Bypass v 1.0 to 5.0 
                         v 1.0 - 6000 c - 1gq
                       Decypher v 1.0 to 3.0
    Suggested Tools: HUDMapShowTrace v 1.0 - 5000 c. 
                     Monitor Bypass v 1.0 to 5.0
    Gateway Suggested: 
    Hardware Upgrade: The best CPUs and Modems you can get
    Security Level: Medium
    Threat: Medium
    Money recieved: 8800 c.
    
    --------
    [735] Uplink Internal Services
    [101] News
    [102] Mission Lists
    [103] Software Upgrades
    
    This is to be used as a basic "How much is this program
    and what does it do?"  Refer to the software
    section in the miscellaneous section for a more 
    indepth explaination of how each  program works.
    
    
    Name: Decrypter V 1.0
    Purpose: Decrypts files encrypted level 1
    Price: 800 c
    Memory: 2 gq
    
    Name: Decrypter V 2.0
    Purpose: Decrypts files encrypted 2 or lower
    Price: 1200 c
    Memory: 2 gq
    
    Name: Decrypter V 3.0
    Purpose: Decrypts files encrypted 3 or lower
    Price: 1600 c
    Memory: 2 gq
    
    Name: Decrypter V 4.0
    Purpose: Decrypts files encrypted 4 or lower
    Price: 2200 C
    Memory: 2 gq
    
    Name: Decrypter V 5.0
    Purpose: Decrypts files encrypted 5 or lower
    Price: 3000 c
    Memory: 3 gq
    
    Name: Decrypter V 6.0
    Purpose: Decrypts files encrypted 6 or lower
    Price: 7000 c
    Memory: 4 gq
    
    Name: Decrypter V 7.0
    Purpose: Decrypts all encrypted files
    Price: 15000 c
    Memory: 5 gq
    
    Name: Decypher v 1.0
    Purpose: Used to bypass Ellptic Curve; slowest version
    Price: 3000 c
    Memory: 2 gq
    
    Name: Decypher v 2.0
    Purpose: Used to bypass Ellptic Curve; faster version
    Price: 5000 c
    Memory: 2 gq
    
    Name: Decypher v 3.0
    Purpose: Used to bypass Ellptic Curve; fastest version
    Price: 8000 c
    Memory: 2 gq
    
    Name: Dictonary Hacker
    Purpose: Hacks passwords; fast though will not always work
    Price: 1000 c
    Memory: 4 gq
    
    Name: File Copier
    Purpose: Used to copy files from server to gateway
    or vise versa
    Price: 100 c
    Memory: 1 gq
    
    Name: File Deleter
    Purpose: Deletes a file on a server or gateway
    Price: 100 c
    Memory: 1 gq
    
    Name: Firewall Bypasser v 1.0
    Purpose: Bypasses a firewall at level 1
    Price: 3000 c
    Memory: 1 gq
    
    Name: Firewall Bypasser v 2.0
    Purpose: Bypasses a firewall level 2 and below
    Price: 4000 c
    Memory: 1 gq
    
    Name: Firewall Bypasser v 3.0
    Purpose: Bypasses a firewall level 3 and below
    Price: 6000 c
    Memory: 1 gq
    
    Name: Firewall Bypasser v 4.0
    Purpose: Bypasses a firewall level 4 and below
    Price: 8000 c
    Memory: 1 gq
    
    Name: Firewall Bypasser v 5.0
    Purpose: Bypasses all firewalls
    Price: 10000 c
    Memory: 1 gq
    
    Name: Firewalll Disable v 1.0
    Purpose: Disables a firewall at level 1,
    action detected immediately
    Price: 2000 c
    Memory: 1 gq
    
    Name: Firewall Diable v 2.0
    Purpose: Disables firewalls level 2 and below,
    action detected immediately
    Price: 3000 c
    Memory: 1 gq
    
    Name: Firewall Diable v 3.0
    Purpose: Disables firewalls level 3 and below,
    action detected immediately
    Price: 4000 c
    Memory: 1 gq
    
    Name: Firewall Diable v 4.0
    Purpose: Disables firewalls level 4 and below,
    action detected immediately
    Price: 6000 c
    Memory: 2 gq
    
    Name: Firewall Diable v 5.0
    Purpose: Disables all firewalls, action
    detected immediately
    Price: 8000 c
    Memory: 3 gq
    
    Name: HUDConnectionAnalysis
    Purpose: Allows you to view security systems
    on servers; used in conjunction with bypassers
    menu bar; used with bypassers.
    Price: 20000 c
    Memory: N/A
    
    Name: HUDMapShowTrace
    Purpose: Allows you to see a trace on your connection
    on the HUDMap
    Price: 5000 c
    Memory: N/A
    
    Name: IP Lookup
    Purpose: Used to find out the name of the computer
    attached to a certain IP, also gives an automatic link
    in your Link Menu and on the HUDMap.
    Price: 500 c
    Memory: 1 gq
    
    Name: IP Probe v 1.0
    Purpose: Gives information on what security systems
    are in use on the IP given.
    Price: 2000 c
    Memory: 3 gq
    
    Name: IP Probe v 2.0
    Purpose: Gives information on what security systems
    are in use and what versions on the IP given.
    Price: 4000 c
    Memory: 3 gq
    
    Name: IP Probe 3.0
    Purpose: Gives information on what security systems
    are in use, what versions, and if they are
    active or not on the IP given.
    Price: 5000 c
    Memory: 3 gq
    
    Name: Log Deleter v 1.0
    Purpose: Deletes a logs contents, but
    the actual log is still left behind
    Price: 500 c
    Memory: 1 gq
    
    Name: Log Deleter v 2.0
    Purpose: Deletes an entire log, however
    there is a space left behind.
    Price: 1000 c
    Memory: 1 gq
    
    Name: Log Deleter v 3.0
    Purpose: Deletes logs, removes any gaps
    Price: 2000 c
    Memory: 1 gq
    
    Name: Log Modifier v 1.0
    Purpose: Modifiy an existing log
    Price: 4000 c
    Memory: 2 gq
    
    Name: Log Modifier v 2.0
    Purpose: Modify an existing log or
    blank space
    Price: 6000 c
    Memory: 2 gq
    
    Name: Log UnDeleter
    Purpose: Recovers deleted logs
    Price: 5000 c
    Memory: 1 gq
    
    Name: Monitor Bypass v 1.0
    Purpose: Bypasses a Monitor at level 1
    Price: 10000 c
    Memory: 1 gq
    
    Name: Monitor Bypass v 2.0
    Purpose: Bypasses a Monitor level 2 or below
    Price: 12000 c
    Memory: 1 gq
    
    Name: Monitor Bypass v 3.0
    Purpose: Bypasses a Monitor level 3 or below
    Price: 16000 c
    Memory: 1 gq
    
    Name: Monitor Bypass v 4.0
    Purpose: Bypasses a Monitor level 4 or below
    Price: 20000 c
    Memory: 1 gq
    
    Name: Monitor Bypass v 5.0
    Purpose: Bypasses all Monitors
    Price: 25000 c
    Memory: 1 gq
    
    Name: Password Breaker
    Purpose: Gets the password every time,
    however it is slower than Dictonary Hacker
    Price: 1500 c
    Memory: 2 gq
    
    Name: Proxy Bypass v 1.0
    Purpose: Bypasses a Proxy at level 1
    Price: 6000 c
    Memory: 1 gq
    
    Name: Proxy Bypass 2.0
    Purpose: Bypasses a Proxy level 2 or below
    Price: 8000 c
    Memory: 1 gq
     
    Name: Proxy Bypass 3.0
    Purpose: Bypasses a Proxy level 3 or below
    Price: 12000 c
    Memory: 1 gq
    
    Name: Proxy Bypass 4.0
    Purpose: Bypasses a Proxy level 4 or below
    Price: 16000 c
    Memory: 1 gq
    
    Name: Proxy Bypass 5.0
    Purpose: Bypasses all Proxies
    Price: 20000 c
    Memory: 1 gq
    
    Name: Proxy Diable v 1.0
    Purpose: Disables Proxies v 1.0,
    action noticed immediately
    Price: 3000 c
    Memory: 1 gq
    
    Name: Proxy Disable v 2.0
    Purpose: Disables Proxies v 2.0 and
    below, action noticed immediately
    Price: 4000 c 
    Memory: 1 gq
    
    Name: Proxy Disable v 3.0
    Purpose: Disables Proxies v 3.0 and
    below, action noticed immediately
    Price: 6000 c 
    Memory: 1 gq
    
    Name: Proxy Disable v 4.0
    Purpose: Disables Proxies v 4.0 and
    below, action noticed immediately
    Price: 8000 c
    Memory: 2 gq
    
    Name: Proxy Disable v 5.0
    Purpose: Disables all Proxies, action
    noticed immediately
    Price: 10000 c
    Memory: 3 gq
    
    Name: Trace Tracker v 1.0
    Purpose: Notifies user if there is a 
    trace of their IP happening; "No Trace
    Detected", "Trace in Progress", and
    "Trace Complete". Beeps to tell user
    how far trace is.
    Price: 300 c
    Memory: 1 gq
    
    Name: Trace Tracker v 2.0
    Purpose: Notifies user if there is a 
    trace of their IP happening; "No Trace
    Detected", percentage of trace, "Trace
    Complete"
    Price: 600 c
    Memory: 1 gq
    
    Name: Trace Tracker v 3.0
    Purpose: Notifies user if there is a 
    trace of their IP happening; "No Trace
    Detected", time remaining before trace
    end, "Trace Complete"
    Price: 14000 c
    Memory: 2 gq
    
    Name: Trace Tracker v 4.0
    Purpose: Notifies user if there is a 
    trace of their IP happening; "No Trace
    Detected", time remaining before trace
    end, "Trace Complete"
    Price: 2500 c
    Memory: 3 gq
    
    Name: Voice Analyser
    Purpose: Simulate a targets voice, used
    on Voice Print Id lock on servers
    Price: 5000 c
    Memory: 4 gq
    
    
    
    [104] Hardware Upgrades
    [105] Gateway Upgrades
    [106] Rankings
    [107] Help
    [108] Administration
    -------
    
    -------
    [236] Miscellaneous
    
    [401] Name Generations
    
    Coming Soon
    -----
    [402] Cheats
    
    I.  TooMany Secrets
    
    If you have not downloaded the Version 1.31 patch for Uplink,
    when making a character, name it "TooManySecrets".  Hitting F1
    while using this character will allow you to have access to the
    following abilities:
    
    Give All Links - Exactly how it sounds, only it's not as cool
    as you think.  This includes companies that you won't deal with
    mission wise in the game, possibly phone servers, so on, so on.
    You're entire HUD_Map will be flooded with every link, so I don't
    suggest using this.
    
    Give All Software - Gives you every single version of every single
    piece of software.  This can be annoying, especially if you need
    empty space.  Deleting the five or so other versions of a program
    can be a pain.  Another cheat to avoid.
    
    Give All Hardware - This is almost a lie.  It will give you a 
    TRINITY 1686a gateway, with 6 150 ghz processors, no upgrade
    on modem, and doesn't come with gateway monitor or self destruct.
    
    Give Lots of Money - Yup. Lots and lots of it.
    
    Give Next Rating - Whatever your current Uplink Rating is, go to
    the next one.
    
    Give Max Ratings - Become TERMINAL instantly.
    
    Cancel Current Trace - Silly admins, trix are for kids!  You can
    still be passively traced, but this makes it to where you'll never
    have to worry about a dropped connection ever again.
    
    End Game - Instantly ends the game telling you that...
    
    Debug Print - I think that this puts what's going on into the
    debug.txt file for Uplink, but I honestly never checked.
    Someone want to verify this for me?
    
    Event Que - Shows what's happening when in the news and will also
    give you a good idea of what's going on with Revelation.
    
    Run Revelation - It's just like getting it from ARC and running it
    on your own system.  Do this if you've either never seen Revelation
    OR you're sadistic.  This WILL take your current character out of
    commision until you delete it.
    
    II. My twin brother will avenge me
    
    If you are afraid of getting caught during a new hack, or just
    want to play it safe, go into the file where you installed uplink
    go to the /users/ file, then make a copy of your character's .usr
    file.  Save it into another folder.  Do this whenever you start your
    game, and you will never have to worry about a game over.
    
    III.  God?
    
    When you are disenvowed, go ahead and take a look at your character's
    standing.  Look hard at the upper left hand corner and hover over it
    with your mouse.  It will be a pie symbol.  Go ahead and click on it
    to meet your makers. XD
    
    IV. Introversion Games
    
    When you complete the Wargames mission, there is a hint inside
    that says "What was the IP of introversion again?" or something
    of that extent.  In all actuallity, this is NOT what their
    real IP number is.  o_O
    
    Do an IP Lookup for IP number 128.128.128.128.
    
    V. WarGames
    
    Ah, gotta cheat on this one?  The password is Joshua.
    
    ------
    [403] Secrets
    
    Coming soon
    -----
    [404] Game Play Hints
    
    I. Easy Money
    
    When you are pretty a fair way through the game, you will start getting
    missions for hacking into a bank and getting someone's bank information.
    
    Well, you're already in there anyway, so why not make a donation to a
    charitable cause?  Yourself.
    
    1. Make sure you have the account number of your donator, their password,
    the IP number of Uplink's bank, your account number, Proxy Bypass 5,
    Monitor Bypass 5, and log deleter.
    
    2. Make your first bounce InterNIC and continue on with an at least
    eight bounce long line.
    
    3. Log into your victim's account and transfer the amount of money
    you want.
    
    4. Turn on both Proxy Bypass and Monitor Bypass.  DELETE the log
    saying that you transfered the money.
    
    5. Go to your bank account at Uplink and delete the log saying you
    recieved the money (yet again, you will have to turn on Proxy and
    Monitor Bypass).
    
    6. Go to InterNIC and delete all logs that have to deal with you.
    
    7. Go on a shopping spree n_n.
    
    
    [405] Software Explanation
    
    Often times you'll run your head into a wall when you are faced
    with a problem and not know what software is used to solve it.
    
    
    I first suggest that you read through the help on Uplink Internal
    Services Machine.  It often times has the hint you need to find
    out what to do.
    
    //Decrypter
    
    In the missions where you are requested to retrieve a file and
    send it back into your employer, sometimes on the server,
    under the heading "Encryption" there will be something that says
    "Level x", x being 1 through 7 (if you see an "8", abandon mission,
    you cannot decrypt anything higher than 7).
    
    After the file is downloaded, you must use the Decrypter version
    that is at least the same level of the Encryption OR higher. Only
    decrypted will your employer allow you to return the file.
    
    To use, open up your memory banks, and scroll until you see the
    file that you need to decrypt.  Open your Application menu,
    go to Crackers, and click on "Decrypter" then click on the file
    in your memory banks.
    
    //Decypher
    
    There are three main "locks" on a system that you will be faced
    with bypassing in Uplink.  An Ellpitic Curve is probably the
    second one you will see after you are used to password cracking.
    
    The Ellptic Curve is a rectangle with a bunch of numbers randomly
    wizzing by, a la Matrix style.
    
    To use the Decypher, go into your Application menu, Crackers, and
    then click on Decypher (if you are in a rush and have a problem
    with clicking on the wrong application, don't look at the name,
    rather the version.  If you got max versions, this will help
    you to tell the two programs apart).  After turning the program
    on, click anywhere in the rectangle of numbers.
    
    //Dictonary Hacker
    
    This is probably the most useless software in Uplink.  Period.
    
    When you are presented with a password box that says "Authroisation
    Required", go to Applications, Crackers, then click on Dictonary
    Hacker.
    
    Be warned, if it doesn't seem like it's finding the password, that
    is because the company you are going after has wisened up and no
    longer uses words found in a dictonary for a password.  They now
    use random letters, and you must now buy Password Breaker.
    
    //File Copier
    
    One of the two useful start up programs that you have when your
    character is created.
    
    If you are retrieving a file, go into the companies file server
    and then locate the correct file.  Go to your Applications,
    File Utilities, and the click on File Copier. Click on the
    file that you wish to download, and while its downloading,
    open up your Memory Banks, then when the file is finished
    copying, click on an open part of your memory banks.  Wait
    for the file to download.
    
    This is an inefficent way to use file copier, but if you are 
    unsure on how to use it, follow this first to get used to it.
    
    On the reverse, if you are uploading a file to a file server,
    you want to enter the file database, then open your memory
    banks.  Open up File Copier, click on the file in your memory
    banks, then when it is finished, click on an empty area of
    the file server and wait for it to finish uploading.
    
    //File Deleter
    
    The other useful program that you are given when you
    start up your Uplink Character.
    
    Please note if you are having trouble deleting FULL
    servers, refer to the section in this faq about Consoles.
    
    To delete a file off a server, locate the appropriate file,
    then go to Application menu, File Utilities, and then click
    on File Deleter.  Click on the appropriate file.
    
    On the other hand, if you want to delete a file from your
    own memory banks, click on your Memory Bank button, click
    on the Application menu, File Utilities, and then File
    Deleter.  Click on the file that you wish to delete.
    
    //Firewall/Proxy/Monitor Bypass
    
    Remember, before you are even ABLE to use a Bypasser,
    you MUST have the HUDConnectionAnaylsis, otherwise having
    this program is completely useless to you.
    
    Also, if you know you are using this program properly, but
    the little circle is staying red and not covering the
    Firewall symbol, you do not have a high enough version to
    bypass the Firewall you are attempting at.  Upgrade.
    
    Now then, on how to use it.  When you are in a server, open
    up your HUDConnectionAnaylsis window.  Wait a little while
    for each of the symbols to show what they are.  When this
    is done, click on your Applications menu, click on Bypassers,
    and the click on the symbol for the appropriate security system.
    
    There are also three other buttons on the bypassers, that
    for the most part, you will not need to concern yourself with.
    
    The upper-left button is the "Pause" button.  If, for some ungodly
    reason, you wish to pause bypassing the security, click on this,
    and it will put the program into hiatus without turning it off.
    
    The upper-rigth button is the "Exit" button.  If you are familiar
    with windows, you should know that the "x" means close.  If you
    aren't, you are now.
    
    The lower-left hand button is the "drag" area.  This isn't really
    even a button.  It's just a designated area that your mouse goes when
    you are draging the bypassers around at.
    
    
    // Firewall/Proxy Disable
    
    I want to say that if you bought this program, you've wasted your
    money.  Bypassers are faster and easier to use than these, and
    are definately worth the extra expense.
    
    Also, if for some reason the disabler always seems to fail, you
    do not have a high enough version to disable the security that
    you are trying against.  That or you are seeing funny text pop
    up in your disabler's bar.  That means that there is either no
    security, only a monitor, or the other type of security to bypass.
    
    To use a disabler, when you are in a server, go to Application
    menu, security, and then click on the disabler.  Even if the
    program is running on its own and you have a fast computer, this
    WILL take a while and you WILL be noticed.
    
    If you have an HUDConnectionAnalysis window, don't click on the
    symbol for the security you just disabled.  It'll turn it on again.
    
    //HUDConnectionAnaylsis
    
    This expensive program is
    
    
    
    [406] Uplink Patch 1.31
    
    [408] Game Bible
    
    Well, if you actually BOUGHT Uplink, you will notice there is a strange
    .zip file called the gamebible.zip.  This was the start of an at least
    four book (some say five) series.
    
    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    More to come soon!  Feedback and contributions always welcome! Write me at
    annie@reverent.net
    
    Some credit is due to Icepick at www.modlink.com for pointing out
    some bugs that I had not previously noted and, honestly, I used 
    his guide to a certain degree to be able to remember in what
    order some of the missions went.  I got a few backwards.
    
    Also, I wish to thank the following people from the gamefaqs.com message
    board:
    
    MetroidFox for the suggestions on getting more money and for finding out
    accidentally about the ARC mission problem.
    
    Alex who pointed not only am I a terrible speller, but also several tricks
    and points that I didn't know and would have completely missed, including
    loans, money tricks, and the "readwrite" trick with the government missions.
    
    Lord Seth for the suggestion of making a marker on what is and is not
    done in the FAQ.
    
    Please do not use my FAQ on your website without my prior authorization.
    Only www.gamefaqs.com may use this faq.  Do not copy or duplicate this
    faq or sell it for a profit.
    
    All trademarks and copyrights contained in this document are owned by their
    respective trademark and copyright holders.
    
    Uplink was made by Introvision and all information pertaining to the game
    goes to them.  Thanks for making the game Uplink!!! Weee!
    
    (c) Marianne Jarnagan 2004