hide results

    FAQ/Walkthrough by TheaN

    Version: 2.20 | Updated: 05/19/16 | Search Guide | Bookmark Guide

    ===============================================================================
                                U   U      l         k
                                U   U      l ii      k k
                                U   U ppp  l    nnn  kk
                                U   U p  p l ii n  n k k
                                UUU  ppp  l ii n  n k  k
                                     p
                 01010101 01110000 01101100 01101001 01101110 01101011
    -------------------------------------------------------------------------------
    ===============================================================================
             ##              #        #     #           ### #           ### 
            #   ### ###  ## ### ### ###     ### # #      #  ### ###  ## # # 
            #   #   ##  # #  #  ##  # #     # # ###      #  # # ##  # # # # 
            #   #   ### ###  ## ### ###     ###   #      #  # # ### ### # # 
             ##                                 ###      #              # # 
    ===============================================================================
    -------------------------------------------------------------------------------
    
    -------------------------------------------------------------------------------
    0   Version
    -------------------------------------------------------------------------------
    
    Version 2.20 (2016-05-19):
    - Added a small portion at the post-tutorial guide how to create your first
    saved connection before you start hacking Internal Service Systems.
    - 'Make donations' missions can target you. This effectively turns them into 
    illegitimate bank hacks; added a notion at the mission.
    - Replayed both storylines: 
      - the ARC 'Trace a hacker' mission for the RevelationCore is offered randomly
      and may not appear at all, but the method works for the storyline regardless.
      - added dates when missions appear or are posted. Essentially Arunmor is 
      ahead of ARC by four days except initially and at the end.
      - during an ARC playthrough you can send Revelation to Arunmor for an 
      additional $25000, elaborated at ARC's first mission.
      - several missions were extended upon, especially those with specific LANs.
      - I've severely redone and extended upon my 'GrandTour' strategy after, once 
      again, realizing the near impossibility of ARC's final mission.
    
    Version 2.10 (2016-05-17):
    - Adjusted the frame missions to reflect both frame missions bugging out, it 
    does happen with data destruction more often than banks, but I've had it 
    happen for both.
    - Dashes at the ranks section were somehow replaced with code; I've replaced 
    them with colons as it's more natural anyway.
    
    Version 2.00 (2016-05-16): 
    - The first of my contributions to receive a complete overhaul since the birth
    of my GameFAQs contributions. I'm adding a v2 overhaul section to the guide to
    reflect changes. 
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    1.0
    -------------------------------------------------------------------------------
    1.1   FAQ Info
    -------------------------------------------------------------------------------
    Version:                2.20
    Last update:            2016-05-19.
    Game version:		    1.6 (last release).
    
    -------------------------------------------------------------------------------
    1.2   Introduction
    -------------------------------------------------------------------------------
    This is a FAQ of Qoko, known as TheaN on Gamefaqs messageboards.
    My real name is Arno Middelkoop and I'm from the Netherlands. View the
    credits section on how to contact me for additional info, questions or
    corrections, but refrain from flaming or insulting, because it will not do
    anything good. That was my introduction, on to the subject of this FAQ:
    
    -------------------------------------------------------------------------------
    1.3   Subject introduction
    -------------------------------------------------------------------------------
    This is, in my opinion, one of the most unique sandbox games ever released.
    It offers a simulator of a hacker's practice and everything that comes with it.
    I love this game, that's why I decided to make a FAQ about it quite some years
    ago. I originally wrote the bank hacking guide, but decided to make a full
    version. Good luck with hacking and enjoy my biggest and most elaborative work
    until now.
    
    -------------------------------------------------------------------------------
    1.4   Version 2 overhaul
    -------------------------------------------------------------------------------
    Over the years I've gotten quite some good reviews and responses to this guide
    as it is, besides a large HTML-based FAQ on Modlink, the only fullblown guide 
    to a sandbox type game that's pretty complex raw. However, reading this now in
    2016, 12 years (!) after its original release I'm surprised how horrendous some
    parts were written. My English greatly improved going from my mid-teens to 
    end-twenties as non-native speaker, and I've decided that my pet project would
    be the first of my contribution list to get a major overhaul.
    
    This was changed in version 2:
    
    Content
    =======
    1) Startup guide: a guide explaining the tutorial and what to do right after,
       for new players, including some general Q&A with regards to missions.
    2) Chronological upgrades list: recommendations on when to buy what throughout
       a playthrough. A guideline, not set in stone.
    3) Bank hacking guide removal: it's a seperate project. I've briefly mentioned
       it in the easter eggs section as reference.
    4) No more TheaN10K320: I've completely lost my own Gateway over the years, and
       lets be honest, it was completely overpowered and undervalued to begin with.
    
    Display
    =======
    1) Headings: noticed that the centered headings aren't as appealing in text.
    2) Listings: changed the way lists are presented, for a better overview.
    3) Spelling and grammar: do excuse me if there are still minor flaws, but the 
       most obvious mistakes should have been corrected.
     
    -------------------------------------------------------------------------------
    1.5   Copyright
    -------------------------------------------------------------------------------
    This FAQ is created by me: Arno Middelkoop, aka TheaN, nowadays Qoko. 
    
    PERSONAL USE
    ============
    Feel free to modify for PERSONAL USE ONLY. This includes, and is pretty much
    limited to, saving only sections you need onto your computer, copying/pasting
    sections to print out for personal use. Once you are distributing it to sites,
    magazines or selling it for profit, even without claiming it's your work, you
    are breaking my copyright.
    
    SITES ONLINE
    ============
    You cannot copy this FAQ/Guide to your site without my permission:
    - do without permission, and you're plagiarizing.
    - do with permission, but change a digit, and you're plagiarizing.
    Email me to grant permission on your site. Although I'll keep an eye out for
    plagiarizing or changing the format. In most cases, I'll reject the offer,
    unless I have proof of a good format.
    
    Linking to any of the allowed three however, is allowed. GameFAQs and Neoseeker
    both have connections to other sites, and it would be unfair to not grant them
    that connection. I am not aware of any connections to supercheats, but if it's
    a connection, once again, don't mail me.
    
    Until now, these sites have permission to post:
    www.gamefaqs.com        (main host)
    www.neoseeker.com       (second host)
    www.supercheats.com     (third host)
    
    ILLEGAL POSTING
    ===============
    These sites got their permission revoked:
    www.dlh.net             (and connections)       
    www.cheatbook.de        (and connections)
    
    Email me if this FAQ is on one of the revoked sites or another one, but don't
    false-positive any direct links.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    2.0   Table of Contents
    -------------------------------------------------------------------------------
    ===============================================================================
    Introduction                                            1.0
    -------------------------------------------------------------------------------
    FAQ Info                                                1.1
    Introduction                                            1.2
    Subject introduction                                    1.3
    Version 2 overhaul                                      1.4
    Copyright                                               1.5
    ===============================================================================
    Table of Contents                                       2.0
    ===============================================================================
    Startup guide                                           3.0
    -------------------------------------------------------------------------------
    Tutorial                                                3.1
    Post-tutorial                                           3.2
        Creating a saved bounced connection                     3.2.1
        General mission notes                                   3.2.2
    ===============================================================================
    Uplink basics                                           4.0
    -------------------------------------------------------------------------------
    HUD                                                     4.1
    Long connections                                        4.2
    Tracing: active and passive                             4.3
    Deleting your logs                                      4.4
    Gateway security                                        4.5
    Save backup                                             4.6
    Agent rank                                              4.7
    Neuromancer rating                                      4.8
    ===============================================================================
    Uplink Internal Service System                          5.0
    -------------------------------------------------------------------------------
    News                                                    5.1
    Missions                                                5.2
    Software list                                           5.3
    Hardware list                                           5.4
    Gateways                                                5.5
    Faith progress                                          5.6
    Rankings                                                5.7
    Help                                                    5.8
    ===============================================================================
    Security                                                6.0
    -------------------------------------------------------------------------------
    ID Verification                                         6.1
    Voice Print Identification                              6.2
    Elliptic-Curve Encryption Cypher                        6.3
    Proxy                                                   6.4
    Firewall                                                6.5
    Monitor                                                 6.6
    ===============================================================================
    Systems                                                 7.0
    -------------------------------------------------------------------------------
    Internal Service System                                 7.1
    Government                                              7.2
        InterNIC                                                7.2.1
        International Stock Market                              7.2.2
        International Academic Database                         7.2.3
        International Social Security Database                  7.2.4
        Global Criminal Database                                7.2.5
    Central Mainframe                                       7.3
    International Bank                                      7.4
    Local Area Network (LAN)                                7.5
    Relevant unhackable systems                             7.6
    ===============================================================================
    Random missions                                         8.0
    -------------------------------------------------------------------------------
    Steal or destroy one file                               8.1
    Change academic records                                 8.2
    Change social records                                   8.3
    Change criminal records                                 8.4
    Check account info                                      8.5
    Trace a balance transfer                                8.6
    Delete multiple files                                   8.7
    Steal multiple files                                    8.8 
    Destroy a system                                        8.9
    Trace a hacker                                          8.10
    Make donations                                          8.11
    Removal job & frame for computer crimes                 8.12
    Frame for bank fraud                                    8.13
    Frame for data destruction                              8.14
    ===============================================================================
    Awards                                                  9.0
    -------------------------------------------------------------------------------
    Regular storyline start                                 9.1
    Complicated storyline start                             9.2
    Receive email from ARC                                  9.3
        Notes on Revelation                                     9.3.1
    Arunmor                                                 9.4
        'Backfire'                                              9.4.1
        'Tracer'                                                9.4.2
        'TakeMeToYourLeader'                                    9.4.3
        'ARCInfiltration'                                       9.4.4
        'CounterAttack'                                         9.4.5
    Andromeda Research Corporation (ARC)                    9.5
        'Maiden Flight'                                         9.5.1
        'Darwin'                                                9.5.2
        'SaveItForTheJury'                                      9.5.3
        'SkinnyHammer'                                          9.5.4
        'GrandTour'                                             9.5.5
    Mole????                                                9.6
    Wargames????                                            9.7
    ===============================================================================
    Chronological upgrades list                             10.0
    ===============================================================================
    Easter eggs                                             11.0     
    -------------------------------------------------------------------------------
    Introversion software                                   11.1
    Steve Jackson's game server                             11.2
    Meet the makers                                         11.3
    Own government records & self arrest                    11.4
    Bank hacking / illegitimate money transfer to yourself  11.5
    ===============================================================================
    Credits                                                 12.0    
    ===============================================================================
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    3.0   Startup guide
    -------------------------------------------------------------------------------
    When you start the game you'll be prompted straight away to provide login
    credentials for the Uplink database. This can be anything, though beware that 
    the username will be used ingame as well as display that as your user, so you
    want to choose it carefully. If you are disavowed you can no longer access that
    specific user and you either have to restore a backup or make a new one. After
    your registration you are connected to your Gateway and you'll get your first
    mission and the tutorial to open.
    
    -------------------------------------------------------------------------------
    3.1   Tutorial
    -------------------------------------------------------------------------------
    Part of your initial memory banks is the tutorial file. When you access your 
    user for the first time, you will be prompted to run the tutorial. I'd suggest 
    any new player or returning player to go through it completely; it will take 
    ten minutes at best and should give you a decent overview of what Uplink has
    to offer.
    
    PART ONE
    ========
    Part one of the tutorial contains a summarized explanation of the HUD (I go
    more indepth in the next section) and everything relevant to you on screen. It
    will briefly explain how to make connections also by letting you open the world
    map. Going through this is basically just reading whatever is presented and 
    press next when you need to.
    
    PART TWO
    ========
    In part two you'll attempt and then complete your first hack. The tutorial will
    point you to the Uplink Test Machine. You are first required to hack it in a 
    direct connection, which will obviously fail. Then the tutorial advises you to
    buy a Trace Tracker v2 and use a longer connection to hack the Uplink Test
    Machine. Copy the Uplink Test Data and finish the mission to end part two.
    
    PART THREE
    ==========
    Part three goes slightly more indepth about what to do after the tutorial. In
    essence part three is what the next sections are in my guide: what the Uplink 
    Internal Service System provides, how the Help section could help you get going
    on more advanced security and what the influence of ranks and neuromancer 
    ratings is. It ends by telling you you are eventually able to upgrade your
    Gateway and get the best software and specs available.
    
    -------------------------------------------------------------------------------
    3.2   Post-tutorial
    -------------------------------------------------------------------------------
    The most obvious thing to do right after finishing the game's tutorial is to 
    start doing some missions. Initially you'll only be offered missions to steal
    or delete one file. The biggest advantage of these missions is that they can be
    done in bulk, especially useful if multiple missions target one Internal 
    Service System. However, there are always a few things I do before I start 
    hacking properly. 
    
    3.2.1: Creating a saved bounced connection
    ==========================================
    Before you start hacking you should create a sufficient bounce to increase the
    active trace time. Active traces are influenced greatly by active user- or 
    admin account credentials. Admin credentials are revoked when an active trace
    passes the system, but user accounts cannot be revoked. This can be used to 
    your advantage:
    
    1) After the Uplink Test Mission, unlink the Uplink Test Machine/Access Server.
    2) Go to InterNIC and add the government systems and all banks.
    3) Go to all non-Uplink banks and make a new account on each.
    4) Make all of the systems highlighted systems by clicking once on the %.
    5) Go to the World Map.
    6) Make a bounce: InterNIC > Uplink Service System > all banks > government.
    7) Save the connection.
    
    You can use the connection indefinitely, and you can still easily connect to 
    banks or government systems by simply clicking on the system you need twice: 
    it will initially unbounce the system and then connect to it via the remaining 
    bounces. You can increase this saved connection with File Servers once you 
    start getting them, but this will be sufficient for most systems.
    
    3.2.2: General mission notes
    ============================
    1) Always contact the employer.
    2) Ask for more money and half the money in advance. Generally the 10% bonus 
       is only given if your rank grealy surpasses the mission difficulty, but the 
       advance payment is accepted more often than not. The advantage of getting 
       the money in advance is that you can buy more software or hardware before 
       actually attempting the mission.
    3) Even if missions are still out of your league but acceptable, just accept 
       them with an advance payment; you'll get to completing them eventually.
    4) Whatever is generated on the mission screen is completely random. I've had
       mission lists with five file missions, but also more than ten. Some tiers of
       missions might be completely missing initially in your game, and they'll 
       only start appearing after you fastforward significantly.
    
    As you complete about five file missions your rank will once again increase.
    This will render the academic missions available. As you start to move on, it 
    would be smart to check the upcoming missions and potential software you 
    require to complete incoming missions. As more missions are being done, the 
    higher your rank, the higher the rewards and the more difficult the missions.
    Everything else you need to know is further in the guide: there isn't really
    an incentive to create a complete walkthrough of this game, as it's played more
    as a sandbox than anything else.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    4.0   Uplink basics
    -------------------------------------------------------------------------------
    This section will explain some basics of the game that are not fully explained
    in detail during the tutorial but are useful to know.
    
    -------------------------------------------------------------------------------
    4.1   Headsup display
    -------------------------------------------------------------------------------
    A slightly more descriptive explanation about the HUD the game provides.
    
    ======
    Left
    ======
    Shows any of your links added. A % symbol means it's currently on the 
    full-screen World Map, clicking it once turns it into a + which is a 
    highlighted link. Clicking again makes it disappear from the map. Clicking the
    X removes the link from the list. You can filter your links in the bottem line 
    here. You can directly connect to any system by clicking on it, but this is ill
    advised if you want to hack something.
    =========
    Topleft
    =========
    Shows the time, date, the quit symbol and your IP adress. The IP is important
    as it reveals any logs related to you; anything with 127.0.0.1 is potentially
    dangerous.
    =====
    Top
    =====
    Shows the game speed and CPU usage. Speed can be paused (no time expires), 
    normal (second/per second), fast (ten minutes/per second) and very fast (3 
    hours/per second). The usage for speeding time is to fastforward for news 
    confirmation or when you need to reach a certain date. CPU usage should always
    be 100% unless you're not using anything, it can however slightly bug out if 
    you close a multitude of programs succesfully. You can change which program 
    gets priority over others by clicking the corresponding < or > buttons which is
    very important for the Password_Breaker and Decypher. 
    ==========
    Topright
    ==========
    Shows the world map. Click on it to get it full screen and showing your 
    currently activated links. Used to make a connection. Links can have different
    colors and borders:
    1) Green: links that are required for missions.
    2) Orange: highlighted links.
    3) Dotted: links with active user credentials.
    4) Bolded: links with active admin credentials.
    =======
    Right
    =======
    Shows emails, missions, hardware, memorybanks, hacker status, bank accounts or 
    hardware applications, if selected.
    =============
    Bottomright
    =============
    Shows emails and missions. Clicking on one makes it appear in the right 
    section. You can close, reply and delete emails and close, reply or abandon
    missions there.
    ============
    Bottomleft
    ============
    The taskbar with software applications, hardware and more. Basically your base
    of operation. From left to the right:
    1) Software applications
        a) File utillities: shows any files dedicated software. 
            - Defrag
            - File_Copier
            - File_Deleter
        b) Hardware drivers: your security hardware.
            - Motion_Sensor
            - Gateway_Nuke
        c) Security: security during hacking.
            - Log_Undeleter
            - Log_Deleter
            - Log_Modifier
            - Trace_Tracker
        d) Crackers: any security cracking devices.
            - Password_Breaker
            - Dictionary_Hacker
            - Proxy & Firewall_Disabler
            - Decypher
            - Decrypter
        e) Bypassers: bypass devices, work together with the HUD analysis upgrade.
            - Proxy & Firewall & Monitor_Bypass.
        f) Other: all others, these are the common ones you can buy:
            - IP_Lookup
            - IP_Probe
            - Voice_Analyser
    2) Hardware
    Shows your hardware, including security devices and HUD upgrades. The gateway
    can be viewed here to give you an idea of what you can still upgrade in your
    current gateway.
    3) Memory banks
    Shows any files stored in your memory except for HUD upgrades which don't take
    any space.
    4) Status
    Shows your Uplink rating and neuromancer rating. It also shows your criminal
    record and earned awards.
    5) Money
    Shows all your accounts, eight max, and what the account and total balance is.
    6) New email
    Send an email. This is an email from scratch, you are usually better off just
    replying to mission descriptions to complete a mission.
    7) HUD upgrades
    These are explained at the software list as they are not initially available.
    
    -------------------------------------------------------------------------------
    4.2   Long connection
    -------------------------------------------------------------------------------
    When you finally start to hack for your missions, go to the world map. You can
    hack the system directly, but you'll be traced instantly which is not a good 
    idea. First bounce to InterNIC on the world map, then to about another 10 
    systems, then to the target system. More systems inbetween means a longer 
    trace. Systems with accounts influence the trace time more.
    
    You can save the connections to spare time. Let say you save a connection 
    through InterNIC and eight banks, you can use it anytime. Kept even when 
    logging out or when removing systems from the list. You can actually connect
    to a system that's part of your chain by clicking the specific system: it will
    just remove that system from the chain, and now you can click it to make it 
    your final bounce.
    
    For an idea of what connection to make, I've made a suggestion in the 
    post-tutorial section.
    
    -------------------------------------------------------------------------------
    4.3   Tracing: active and passive
    -------------------------------------------------------------------------------
    As I mentioned above, you'll be traced. Once you hack something access related,
    you'll be actively traced. If you have a trace tracker running you'll be
    informed by a beep. Once this expires you'll be disconnected. Most of the time
    you'll get an instant mail to let you pay a fine. If the system is compromising
    enough nothing might happen straight away, but you'll be passively traced, see
    below. 
    
    Mind that the active trace is grealy influenced by systems you have an account 
    on. The dotted account is an user account, a bolded line is an admin account. 
    Admin accounts increase traces more than user accounts, but they are also 
    revoked more quickly. As active traces get closer to your system they'll revoke
    any accounts they can, though user specific accounts are unaffected. I've 
    explained this in more detail at 'Creating a saved bounced connection' in the 
    post-tutorial guide.
    
    After a connection, starting from the Global Criminal Database on, you'll be 
    passively traced. The feds go from system to system until they find yours and 
    seize your hardware. In the last case Uplink disavows you and it is GAME OVER 
    for the current user. When you are thrown off a dangerous system by the active 
    trace, the passive trace will be much quicker. The key is to delete your logs 
    from the moment on you start to hack the GCD or banks.
    
    Long story short: avoid active trace completions and delete logs to avoid 
    passive traces.
    
    -------------------------------------------------------------------------------
    4.4   Deleting your logs
    -------------------------------------------------------------------------------
    Most passive traces will find you in three days gametime. In that time you
    have this intended way to avoid being traced: go to one of your systems you 
    used in the connection, which is preferred InterNIC, crack the admin section 
    and delete the relative logs. Relative logs apply both to the hack you are 
    covering up and the acceptance of the admin section on the system you're 
    accessing. For the first system in your connection it's these two logs:
    1) '127.0.0.1 admin access password accepted' log. 
    2) 127.0.0.1 routed to *next system* log. 
    Try to get a Log Deleter v4 as soon as possible for permanent log removal.
    
    -------------------------------------------------------------------------------
    4.5   Gateway security
    -------------------------------------------------------------------------------
    The second way to avoid a game over is to allow the passive trace to complete 
    and then to blow up your Gateway before it can be seized. This is more of a 
    failsafe system rather than something to rely on. Once you have bought a Motion
    Sensor and Gateway Nuke, keep the Sensor running. If at any point it goes red
    you screwed something up. When this happens you have about ten seconds to blow
    up your Gateway. If done so, the passive trace will void, yet you will have to
    start over with a startup Gateway. Anything besides your Gateway is unaffected,
    Uplink will send you an email that you nearly escaped arrest. Instead of the 
    Gateway Nuke you can use Revelation instead.
    
    -------------------------------------------------------------------------------
    4.6   Save backup
    -------------------------------------------------------------------------------
    The third way to avoid losing your user does not involve the game. Go to the
    'users' map in the Uplink directory, copy *you*.usr and *you*.tmp to another
    location. Now  you can copy them back anytime you want to continue where you
    just left off. Mind that when your Gateway disconnects, the .usr file in the
    Uplink directory is instantly overwritten, so you'll have to backup after it
    updates.
    
    -------------------------------------------------------------------------------
    4.7   User rank
    -------------------------------------------------------------------------------
    By completing missions, you'll raise in rank. If you abandon missions you can 
    drop in rank. The higher the rank, the better mission you can do. From Elite on
    all missions are acceptable, yet not all are auto-acceptable. These are all the
    ranks from the first rank to the last:
    
    Grade 16: Registered
    Grade 15: Beginner
    Grade 14: Novice
    Grade 13: Confident
    Grade 12: Intermediate
    Grade 11: Skilled
    Grade 10: Experienced
    Grade 9: Knowledgeable
    Grade 8: Uber-Skilled
    Grade 7: Professional
    Grade 6: Elite
    Grade 5: Mage
    Grade 4: Expert
    Grade 3: Veteran
    Grade 2: Techno-mage
    Grade 1: TERMINAL
    
    -------------------------------------------------------------------------------
    4.8   Neuromancer rating
    -------------------------------------------------------------------------------
    Your neuromancer rating is also shown at the status screen. A rating given
    by other hackers simply showing your moral values. Anything involving
    individuals makes it go down, whilst anything involving companies makes it go
    up. It has very little implication on gameplay but it's challenging to have a
    positive rating. I'll mention at every mission if it will either raise or lower
    your neuromancer rating. For what it's worth, it does go down a bit faster than
    it goes up.
    
    RANK 5: Revolutionary
    RANK 4: Anarchist
    RANK 3: Activist
    RANK 2: Single Minded
    RANK 1: Aggressive
    RANK 0: Neutral
    RANK -1: Untrustworthy
    RANK -2: Notorious
    RANK -3: Indiscriminate
    RANK -4: Sociopathic
    RANK -5: Morally bankrupt
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    5.0   Uplink Internal Service System
    -------------------------------------------------------------------------------
    The hacker's corporation main system. You'll get everything you need here: 
    news reports, missions, software, hardware, Gateways and rankings. In a normal
    game you would actually connect about a 1000 times to the UISS.
    
    -------------------------------------------------------------------------------
    5.1   News
    -------------------------------------------------------------------------------
    Shows anything that happened recently. The news is often required for missions 
    to complete. Furthermore the news displays all major events in the storyline.
    
    -------------------------------------------------------------------------------
    5.2   Missions
    -------------------------------------------------------------------------------
    Although this has been explained to some extend in the post-tutorial section,
    it's probably useful to repeat the basics. On this screen you can accept any
    mission available to you. Whatever is generated is random. You can directly 
    accept a mission or contact the employer. In the contact screen you can ask 
    about whom or what to hack, ask for more money and a payment in advance, either
    half or all. It generally works to ask for both more money and half the payment
    in advance. Though the money increase is only supplied if you outrank the 
    mission, the advance payment is accepted more often than not, which is really
    useful to get crucial soft- and hardware upgrades for the missions at hand.
    
    -------------------------------------------------------------------------------
    5.3   Software list
    -------------------------------------------------------------------------------
    Here you buy your software to access target systems. All bought software is 
    added instantly, unless you have insuffient money or memory. I'll give a full
    list with name, versions, price, memory size, type and a description. In the
    second-to-last section of the guide I present a chronological guideline when to
    buy what.
    
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Name                    Version         Cost            Size    Type
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Decrypter               1.0             $  800          2Gq     Cracker
                            2.0             $ 1200          2Gq
                            3.0             $ 1600          2Gq
                            4.0             $ 2200          2Gq
                            5.0             $ 3000          3Gq
                            6.0             $ 7000          4Gq
                            7.0             $15000          5Gq
    Descripts files based on version. For example, v4.0 decrypts files with an
    encryption of level 4 and below. Decrypter version and encryption level 7 is
    the maximum.
    -------------------------------------------------------------------------------
    Decypher                1.0             $ 3000          2Gq     Cracker
                            2.0             $ 5000          2Gq
                            3.0             $ 8000          2Gq
    Cracks an Elliptic-Curve Encryption Cypher. Version decides the software's 
    speed. v1 and v2 are obsolete considering the minor cost difference.
    -------------------------------------------------------------------------------
    Dictionary_Hacker       1.0             $ 1000          4Gq     Cracker
    Cracks ID passwords by using all English words. Faster than a Password_Breaker,
    but can fail in finding the password because most passwords are totally random
    or words from other languages. When used on an ID Verification Screen, it will
    automatically crack the admin account. This can be remotely useful for earlier
    missions or LAN passwords, but the Password_Breaker cracks anything regardless.
    -------------------------------------------------------------------------------
    File_Copier             1.0             $  100          1Gq     File Utillities
    Basic tool given in the beginning. Copies one file. Can be put in your memory
    banks or on any file server. Remains open after using.
    -------------------------------------------------------------------------------
    File_Deleter            1.0             $  100          1Gq     File Utillities
    Basic tool given in the beginning. Deletes one file. Either from your memory or
    from a random file server. Remains open after using.
    -------------------------------------------------------------------------------
    Defrag                  1.0             $ 5000          1Gq     File Utillities
    Puts all memory data in the top of your memory banks. Never essential, but can
    be a convenience.
    -------------------------------------------------------------------------------
    Firewall_Bypass         1.0             $ 3000          1Gq     Bypasser
                            2.0             $ 4000          1Gq
                            3.0             $ 6000          1Gq
                            4.0             $ 8000          1Gq
                            5.0             $10000          1Gq
    Bypasses a firewall. The firewall prevents you from interacting with files. 
    Version is based on security level. For example, a Bypass level 3 bypasses a 
    Firewall level 3 or lower. Bypass version and security level 5 is the maximum.
    REQUIRED: HUD_ConnectionAnalysis
    -------------------------------------------------------------------------------
    Firewall_Disable        1.0             $ 2000          1Gq     Security
                            2.0             $ 3000          1Gq
                            3.0             $ 4000          1Gq
                            4.0             $ 6000          2Gq
                            5.0             $ 8000          3Gq
    Disables a firewall. Version is based on security level, see Firewall_Bypass. 
    Difference with a bypass is that this requires time and it will be detected 
    when using.
    -------------------------------------------------------------------------------
    HUD_ConnectionAnalysis  1.0             $20000          0Gq     HUD
    HUD Upgrade. When used you'll see the connection between you and the target
    plus all security systems. When open, bypassers can be used on the security.
    It will appear directly right of the email button; it may require a reload to 
    reposition the HUD buttons.
    -------------------------------------------------------------------------------
    HUD_IRC-Client          1.0             $ 4000          0Gq     HUD
    HUD Upgrade. Let you use IRC from within Uplink. In this time and age IRC is
    somewhat obsolete. You can purchase this if you want to use the Uplink IRC or
    want to max out your purchases.  It will appear directly right of the 
    ConnectionAnalysis; it may require a reload to reposition the HUD buttons.
    -------------------------------------------------------------------------------
    HUD_MapShowTrace        1.0             $ 5000          0Gq     HUD
    HUD Upgrade. Shows an active trace on the mini-world map. Connection lines 
    displayed in red are traced, white is remaining. Has the same kind of usage as
    the Trace_Tracker, but won't use the CPU. It appears on the world map when an 
    active trace starts.
    -------------------------------------------------------------------------------
    HUD_LANView             1.0             $50000          0Gq     HUD
    Once connected to a LAN router you can't do anything, unless you're having this
    HUD. When clicking on it will show the current connected LAN and you'll be able
    to crack through it with LAN software. It will appear directly right of the
    LANView; it may require a reload to reposition the HUD buttons.
    -------------------------------------------------------------------------------
    IP_Lookup               1.0             $  500          1Gq     Other
    Scans given IP and gives name of the system. The system is added to the links
    list if it's a new link. Useful for 'Trace balance transfer' missions, required
    for 'Trace a hacker' missions.
    -------------------------------------------------------------------------------
    IP_Probe                1.0             $ 2000          3Gq     Other
                            2.0             $ 4000          3Gq
                            3.0             $ 5000          3Gq
    Scans given IP for connection security. The info is sent in an email.
    V1.0 = provides security.
    V2.0 = provides security and levels.
    V3.0 = provides security, levels and their status (enabled/disabled).
    Remotely useful if you do not yet have the HUD_ConnectionAnalysis and lv5 
    bypassers, but by the time connection security becomes a problem you should
    probably have that instead.
    -------------------------------------------------------------------------------
    LAN_Probe               1.0             $15000          3Gq     LAN Tools
                            2.0             $20000          3Gq
                            3.0             $30000          4Gq
    Scans a standalone LAN system, gives connections to other systems, but does not
    provide the identity of the connected systems. Closed locks can't be probed.
    Version is based on the LAN Level, 1-3. This can't be checked anywhere, better
    to buy the v3.0 LAN software over the 1.0 and 2.0. When the LAN level is higher
    than your software level, the software can't be used at all. Level and version
    3.0 is the maximum.
    -------------------------------------------------------------------------------
    LAN_Scan                1.0             $10000          2Gq     LAN Tools
                            2.0             $15000          2Gq
                            3.0             $25000          2Gq
    Scans the whole LAN for all systems, those behind a closed locks won't be 
    detected. Version is based on the LAN level, see LAN_Probe.
    -------------------------------------------------------------------------------
    LAN_Spoof               1.0             $20000          2Gq     LAN Tools
                            2.0             $30000          3Gq
                            3.0             $45000          5Gq
    Spoofs any cracked subnet. Once a subnet terminal is spoofed, you can connect
    to the corresponding system. Version is based on the LAN level, see LAN_Probe.
    -------------------------------------------------------------------------------
    LAN_Force               1.0             $15000          2Gq     LAN Tools
                            2.0             $20000          3Gq
                            3.0             $25000          4Gq
    Cracks any locks. The system admin will log on and start chasing you and an 
    active trace will start. If you're planning to do things silent, you don't 
    need this. However, there are situations where you can get stuck in front of an
    isolation bridge, and then Force is the only thing that can still break the 
    lock. Version is based on the LAN level, see LAN_Probe.
    -------------------------------------------------------------------------------
    Log_Deleter             1.0             $  500          1Gq     Security
                            2.0             $ 1000          1Gq
                            3.0             $ 2000          1Gq
                            4.0             $ 4000          1Gq
    Deletes logs.
    Version 1.0 =   Leaves empty log behind.
    Version 2.0 =   Leaves blank space behind.
    Version 3.0 =   Cover up with other logs.       
    Version 4.0 =   Shifts logs after deletion.
    Essentially, only the v4 log deleter will prevent any detection at all. Though
    the v3 is very safe it will still allow you to be passively traced after
    hacking the most sophisticated systems, so the Log_Deleter v4 should just be 
    bought when one starts to hack the Global Criminal Database.
    -------------------------------------------------------------------------------
    Log_Modifier            1.0             $ 4000          2Gq     Security
                            2.0             $ 6000          2Gq
    Changes logs or creates them.
    Version 1.0 =   Change existing logs.
    Version 2.0 =   Create new logs in empty spaces and change existing logs.
    As you never actually have to create new logs v1 will suffice. Used in frame 
    missions.
    -------------------------------------------------------------------------------
    Log_Undeleter           1.0             $ 5000          1Gq     Security
    Recover deleted or changed logs. Use it on a log or empty space to make it 
    change, if changable of course. Used in trace missions.
    -------------------------------------------------------------------------------
    Monitor_Bypass          1.0             $10000          1Gq     Bypasser
                            2.0             $12000          1Gq
                            3.0             $16000          1Gq
                            4.0             $20000          1Gq
                            5.0             $25000          1Gq
    Bypasses the monitor. Version is based on security level, see Firewall_Bypass.
    Used to prevent detection for almost all access cracking software, except ID
    Verification admin accounts.
    REQUIRED: HUD_ConnectionAnalysis
    -------------------------------------------------------------------------------
    Password_Breaker        1.0             $ 1500          1Gq     Cracker
    First tool you buy. Cracks ID Passwords, by using all digits. Slower than
    the Dictionary_Hacker but can find all passwords, because it cracks digit by
    digit. When used on an ID Verification Screen, it will automatically crack the
    admin account.
    -------------------------------------------------------------------------------
    Proxy_Bypass            1.0             $ 6000          1Gq     Bypasser
                            2.0             $ 8000          1Gq
                            3.0             $12000          1Gq
                            4.0             $16000          1Gq
                            5.0             $20000          1Gq
    Bypasses the proxy. The proxy prevents you from interacting with most in the 
    admin section: security, logs and the console among others. Version is based on
    security level, see Firewall_Bypass.
    REQUIRED: HUD_ConnectionAnalysis
    -------------------------------------------------------------------------------
    Proxy_Disable           1.0             $ 3000          1Gq     Security
                            2.0             $ 4000          1Gq
                            3.0             $ 6000          1Gq
                            4.0             $ 8000          2Gq
                            5.0             $10000          3Gq
    Disables the proxy. Version is based on security level, see Firewall_Bypass.
    Difference with a bypass is that this requires time and it will be detected 
    when using.
    -------------------------------------------------------------------------------
    Trace_Tracker           1.0             $  300          1Gq     Security
                            2.0             $  600          1Gq
                            3.0             $ 1400          2Gq
                            4.0             $ 2500          3Gq
    Second tool you should buy. Shows any progress on active traces.
    V1.0: shows that a trace is active.
    V2.0: shows that a trace is active and percentage done.
    V3.0: shows that a trace is active and the exact time remaining.
    V4.0: v3 with a realtime remaining time estimation added.
    For any version above 2.0: the more CPU the Trace_Tracker is using, the more
    accurate the percentage or exact time remaining: for v4 this counts ONLY for
    the exact time remaining, making v4 considerably more useful than v3.
    -------------------------------------------------------------------------------
    Voice_Analyser          1.0             $ 5000          4Gq     Other
                            2.0             $10000          5Gq
    Voice capture device. v1 scans any given voice and changes it into the admin 
    verification line. You need this to hack the admin of Central Mainframes, 
    International Banks and LANs. v2 gives you the possibility to store the voice
    data: click the analyser, and click an empty memory space to store the data for
    1Gq. To download that data to the analyser: open the analyser and click the 
    data while having the analyser selected. The v2 feature is great for
    corporations you will be hacking multiple times.
    
    -------------------------------------------------------------------------------
    5.4   Hardware list
    -------------------------------------------------------------------------------
    Make your Gateway and CPU better by upgrading your hardware. Hardware will be
    installed by Uplink, it starts after ~12-18h and will be completed in about
    30-60 minutes. This list is divided by processors, memory, modems and security.
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Name                    Speed/Amount    Cost        Price per Ghz/Gq
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Processors               20Ghz          $  250      $ 12.50
                             60Ghz          $ 1000      $ 16.66
                             80Ghz          $ 1300      $ 16.25
                            100Ghz          $ 3000      $ 30 
                            120Ghz          $ 5000      $ 41.66
                            150Ghz          $ 8000      $ 53.33
                            200Ghz          $12000      $ 60
    What the Gateway is running on. The faster is it the faster it cracks 
    security, copies and deletes files, and deletes and shifts logs. In the endgame
    you want to fill up your Gateway with the maximum of 200Ghz processors: mind 
    that the price per Ghz greatly increases as processor power does, but the 
    limitation is the amount of CPU slots in your Gateway.
    -------------------------------------------------------------------------------
    Memory                   8Gq            $ 3000      $ 375
                            16Gq            $ 5500      $ 343.75
                            24Gq            $ 8000      $ 333.33
                            32Gq            $11000      $ 343.75
    Fills your Gateway with 8Gq memory slots. Buying 24Gq slots plus the rest is 
    always the cheapest, which I reckon was an oversight by the developers. To 
    elaborate, 24Gqs it's the lowest price per Gq, whilst 24Gq + 8Gq is as 
    expensive as one 32Gq module and 24Gq + 16Gq is cheaper than 32Gq + 8Gq. On or 
    above 48Gq price differences repeat themselves.
    -------------------------------------------------------------------------------
    Modems                   1Gq/sec        $ 1000      $ 1000
                             2Gq/sec        $ 2000      $ 1000
                             4Gq/sec        $ 4000      $ 1000
                             6Gq/sec        $ 6000      $ 1000
                             8Gq/sec        $ 8000      $ 1000
                            10Gq/sec        $10000      $ 1000
    Your bandwidth connection to other servers. Essentially, the modem does not
    influence your hacking speed greatly, but it interacts with the processor: the
    more you upgrade your CPU speed, the more influencial a modem upgrade becomes.
    Given the small cost, upgrading to the quickest modem possible will usually be
    a good idea.
    -------------------------------------------------------------------------------
    Gateway Security        Motion Sensor   $10000
                            Self-destruct   $20000
    Protects you from the authorities. If the sensor is black, nothing is
    happening. If it's yellow, Uplink is performing hardware upgrades. Red is bad
    news, the authorities are close to your proximity location. When it goes red,
    and ONLY then, you can use the self destruction device to start over with an
    original Gateway instead of being disavowed. For what it's worth, normally one
    system is useless with the other: a passive trace continues if you blow up your
    Gateway unprovoked. However, there is a way to make a single Motion Sensor 
    useful, and that is to use Revelation as a Gateway reset instead of the Nuke.
    -------------------------------------------------------------------------------
    
    -------------------------------------------------------------------------------
    5.5   Gateways
    -------------------------------------------------------------------------------
    This will list all the Gateways given by Introversion, plus how to create your
    own. Every Gateway has its own cost: a new Gateway is the normal value minus
    75% of the value of your current Gateway. By default I proceed VIRTUANET >
    ZION > AM-CORE and then TRINITY well before the last storyline mission.
    
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Name                    CPU's           Security        Bandwidth       Memory 
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    GatewayALPHA            1               0               1Gq/Sec         32Gq
    Cost:                   $15000
    The basic Gateway, given to all agents. Carries the minimum amounts possible.
    -------------------------------------------------------------------------------
    GatewayALPHA 1CPU       2               0               1Gq/Sec         32Gq
    Cost:                   $20000
    Just one extra CPU. Not really worth the money for the upgrade per se. The
    extra CPU can help quite decently but for just the extra 7000 you should save 
    for the VIRTUANET, which enables you to get especially the memory
    -------------------------------------------------------------------------------
    GatewayALPHA 1MEMORY    1               0               2Gq/Sec         64Gq
    Cost:                   $20000
    Better modem and more memory, yet still inferior to the 1CPU Gateway: at the
    early game more memory is not necessary. Either buy the 1CPU or the VIRTUANET.
    -------------------------------------------------------------------------------
    VIRTUANET R-Acces       2               0 (*)           2Gq/Sec         48Gq
    Cost:                   $27000
    Useful allround Gateway upgrade early on. Definitely worth a buy. 
    *supposingly the transmitter gives you anonimity and prevents disavows. I never
    tested this myself and I don't find the need to: just clear the logs anyway.
    -------------------------------------------------------------------------------
    KRONOS Corp 80-860      2               1               4Gq/Sec         64Gq
    Cost:                   $38000
    Upgraded modem and memory from the VIRTUANET but that's minor in comparison. 
    The single security system is pointless unless you have Revelation, which you
    should not have at this point in the upgrade tree. You should wait for ZION or 
    the AM-CORE.
    -------------------------------------------------------------------------------
    ZION-780 Workstation    3               2               6Gq/Sec         96Gq
    Cost:                   $50000
    Midupgrade allround Gateway and a step up to the final Gateways. Two security 
    slots, faster modem and good memory capacity. This is relatively the best 
    price-quality Gateway.
    -------------------------------------------------------------------------------
    UNITY High-Security     4               4               6Gq/Sec         64Gq
    Cost:                   $80000
    This is one of the worst designs Introversion came up with. Its only pro is the
    additional CPU which is not critical. It has less memory and the third and
    fourth security slots are completely obsolete. It looks nice, but has no
    function whatsoever. Wait for the AM-CORE.
    -------------------------------------------------------------------------------
    AM-CORE File Server     3               2               10Gq/Sec        256Gq
    Cost:                   $100000
    The second best or best Gateway, based on personal preference. Highest memory 
    capacity, fastest modem and two security systems. The only lack is the triple 
    CPUs. A monitor bypass can prevent early detection endgame and the only real 
    reason you'd want more CPU power is to simply break through stuff more 
    quickly, it's not vital. In the endgame the TRINITY should be prefered, but
    whilst you're doing multiple file missions, go with AM-CORE.
    -------------------------------------------------------------------------------
    OMEGA Supercomputer     16              1               4Gq/Sec         48Gq
    Cost:                   $100000
    A very fast Gateway but lacking on all other accounts. The worst of the final
    Gateways, given that the difference between 8 and 16 CPUs is as good as 
    neglecible. If you want high speed, go with the TRINITY. Mind that even if 
    you'd prefer the CPU speed over anything else, 48Gq is not even enough to have 
    all software.
    -------------------------------------------------------------------------------
    TRINITY-1686A           8               2               8Gq/Sec         128Gq
    Cost:                   $125000
    The best allround Gateway. It is very balanced, however, the second best modem 
    and half the memory of the AM-CORE makes the AM-CORE competitive. Decide 
    whether you want more memory for file missions or higher speed to crack through
    stuff more quickly in general and base your decision on that. My preference 
    goes to the TRINITY for the fact that multiple file missions are somewhat 
    uncommon endgame: you can always do them in two hacks instead of one, 
    especially if all other missions are faster due to the five additional CPUs.
    -------------------------------------------------------------------------------
    
    CREATE A GATEWAY
    ================
    You can actually create a gateway yourself. This needs:
    - A *Gateway Name*.tif file, the Gateway itself, not bigger than 400x300.
    - A *Gateway Name*_t.tif file, the thumbnail, not bigger than 200x140.
    - A *Gateway Name*.txt file, with locations of its hardware and a description.
    To get this, you must change all .DAT files (except for data and world) in your
    game directory to .ZIP. Extract them in the same folder. Now you can throw away
    the ZIP files if you want. Now the .TIF files need to be copied into 
    uplink/graphics/gateway and the .TXT in uplink/data/gateways. For how to make a
    TXT or TIF files, please go to www.modlink.net for tutorials, it's beyond the
    point of this guide.
    
    -------------------------------------------------------------------------------
    5.6   Faith progress
    -------------------------------------------------------------------------------
    This will state the difference in version between Faith and Revelation, which
    differ between v1.0 and v4.0. Not that important, although it's interesting to 
    see the version drop or raise by actions, either by you or other agents. See 
    the Awards section for more info.
    
    -------------------------------------------------------------------------------
    5.7   Rankings
    -------------------------------------------------------------------------------
    All agents in the top 10 are displayed here. If you aren't in the top 10,
    you'll be mentioned  in a line below the 10, stating your position. Of these
    agents will also be mentioned if they're either 'Active', 'Deceased' or
    'In Jail', the latter because of your actions.
    
    -------------------------------------------------------------------------------
    5.8   Help
    -------------------------------------------------------------------------------
    The game's somewhat elaborative help section. Give it a read if you want, but
    you should be able to find any info you need in this guide a bit more to the 
    point.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    6.0   Security
    -------------------------------------------------------------------------------
    This sections contains all access and connection security systems you will come
    across.
    -------------------------------------------------------------------------------
    Security type:          access or connection.
    Compromising software:  possible software to crack the security.
    Best software:          best software to crack the security.
    Time to hack:           an approximation of hack duration.
    Systems:                systems the security is on.
    -------------------------------------------------------------------------------
    A full description.
    
    -------------------------------------------------------------------------------
    6.1   ID Verification
    -------------------------------------------------------------------------------
    Security type:          access.
    Compromising software:  - Dictionary_Hacker
                            - Password_Breaker
    Best software:          Password_Breaker
    Time to hack:           average.
    Systems:                all hackable systems.
    -------------------------------------------------------------------------------
    The first access security. You need to give an username and password to
    proceed. To hack the admin, just run the Password_Breaker and click on either
    the user or password section. Make sure to max out the CPU speed on the
    breaker. There are a few systems which you either have the login info for or it
    can't be hacked. The Dictionary_Hacker works, but only for the first few
    systems. Mind that the ID Verification is the only security that ignores a
    monitor bypass once you proceed; you gained unauthorized access to an admin
    account and will be traced.
    
    readwrite
    =========
    Government systems have an option of a readwrite- and readonly account, besides
    admin. The readwrite will suffice for the missions: in contrary to the admin
    account you won't be actively traced if you have a monitor bypass running.
    Government missions made easy.
    
    -------------------------------------------------------------------------------
    6.2   Voice Print Identification
    -------------------------------------------------------------------------------
    Security type:          access.
    Compromising software:  Voice_Analyser
    Best software:          Voice_Analyser 2.0
    Time to hack:           approximately five seconds (fixed).
    Systems:                Central Mainframes, Banks and Main Servers.
    -------------------------------------------------------------------------------
    Quite easy to compromise and without risk.
    - Buy the Voice_Analyser.
    - Go to InterNIC and connect to the the company's Public Access Server.
    - Activate the admin's link.
    - Call him and keep the Voice_Analyser running.
    - Once in the Voice Print Identification, play the Voice_Analyser.
    If you're not using a monitor bypass, you won't be detected while the Analyser
    repeats the sentence, it will begin after you proceed. Mind that you do not
    need a long connection for the access server nor the admin's telephone line,
    despite that it generates clear leads to your Gateway if you hack one of their
    systems afterwards.
    
    -------------------------------------------------------------------------------
    6.3   Elliptic-Curve Encryption Cypher
    -------------------------------------------------------------------------------
    Security type:          access.
    Compromising software:  Decypher 1.0 - 3.0
    Best software:          Decypher 3.0
    Time to hack:           above average.
    Systems:                GCD, Banks and Authentication Servers. 
                            CM and ISS of ARC & Arunmor.
    -------------------------------------------------------------------------------
    A randomly generated cypher. The code will slowly be decyphered and make you
    ready for progress. This is by far the toughest access security to crack, yet
    with a monitor bypass you avoid detection at all. To start, click the decypher
    tool, and click on the encoding. Make sure to maximize the CPU speed on the
    decypher.
    
    -------------------------------------------------------------------------------
    6.4   Proxy
    -------------------------------------------------------------------------------
    Security type:          connection.
    Compromising software:  - Proxy_Disable 1.0 - 5.0
                            - Proxy_Bypass 1.0 - 5.0
    Best software:          Proxy_Bypass 5.0
    Time to hack:           above average (disabler).
    Systems:                all high security systems.
    -------------------------------------------------------------------------------
    The proxy prevents you from uing the console, deleting logs and statements, 
    changing government records and disabling the connection security in the admin
    section. All of these are very annoying. Proxy is the security you'd want to 
    compromise for pretty much all endgame systems, except when stealing multiple 
    files. Mind that if you use the console for anything file related, the firewall
    needs to be compromised as well. An offline proxy allows you to disable 
    the other connection security in the admin section of a system, essentially 
    voiding the need for firewall software: I'd recommend it anyway. If you're 
    using a proxy disable, start it before hacking anything else and start hacking 
    access security once the active trace starts.
    
    -------------------------------------------------------------------------------
    6.5   Firewall
    -------------------------------------------------------------------------------
    Security type:          connection.
    Compromising Software:  - Firewall_Disable 1.0 - 5.0
                            - Firewall_Bypass 1.0 - 5.0
                            - (Proxy sofware)
    Best software:          Firewall_Bypass 5.0
    Time to hack:           above average (disabler).
    Systems:                all systems with files, except for some ISSs.
    -------------------------------------------------------------------------------
    The firewall prevents you from doing anything file related: copying, deleting,
    adding or running. The firewall is a system you want to compromise when you are
    dealing with file missions. Mind that breaking the proxy enables you to break
    the firewall in the security section of as system, yet I'd recommend firewall 
    software for convenience. If you're using a firewall disabler, start it before 
    hacking anything and start cracking access security once the active trace 
    starts.
    
    -------------------------------------------------------------------------------
    6.6   Monitor
    -------------------------------------------------------------------------------
    Security type:          connection.
    Compromising software:  Monitor_Bypass 1.0 - 5.0
    Best software:          Monitor_Bypass 5.0
    Time to hack:           N/A
    Systems:                almost all.
    -------------------------------------------------------------------------------
    If you bypass the monitor, the only action that will still start an active
    trace is proceeding after hacking an admin ID Verification. Any other security
    system will not trigger a trace with a bypassed monitor. Essentially this means
    that with a bypass you can hack anything but the ID (first) without being
    detected. Near mandatory for LANs, very useful for others. Interesting to note
    that with an offline proxy you can also turn off the monitor security in the 
    admin section of a system, but this is useless as the trace already began.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    7.0   Systems
    -------------------------------------------------------------------------------
    -------------------------------------------------------------------------------
    7.1   Internal Service System
    -------------------------------------------------------------------------------
    ADMIN SECURITY:
    - ID Verification
    - (RARE) Elliptic-Curve Encryption Cypher (Uplink only)
    CONNECTION SECURITY:
    - Proxy:    few     (1/2/3)
    - Firewall: few     (1/2/3)
    - Monitor:  most    (1)
            
    Length of connection:   5-10.
    Active trace:           average, fee if completed.
    Passive trace:          none.
    -------------------------------------------------------------------------------
    The systems you are required to hack right after hacking the Uplink Test
    Machine. In the first missions these will have no proxy and firewall, while 
    they have later on. You'll be using the file server or console on these 
    systems. Watch the active trace, otherwise these aren't as dangerous.
    
    -------------------------------------------------------------------------------
    7.1   Government systems
    -------------------------------------------------------------------------------
    7.2.1:  INTERNIC
    -------------------------------------------------------------------------------
    ACCESS SECURITY:
    - ID Verification (fixed credential)
    
    Active trace:           none.
    Passive trace:          none.
    -------------------------------------------------------------------------------
    The link directory from the government. Every link can be added here to your 
    links, by pressing the + near a link. InterNIC itself has a filter function, 
    so that you can find your needed links easily. InterNIC doesn't have:
    - Central Mainframes.
    - LANs, except for the Sample LAN.
    - Phone systems.
    - Personal computers.
    - Secret systems.
    InterNIC is ideal for log deletion: the credentials are fixed for one user 
    there is no trace nor any other security. It is a matter of connecting directly
    to InterNIC, access the admin section with a known password and delete the 
    relevant logs.
    
    7.2.2: INTERNATIONAL STOCK MARKET
    -------------------------------------------------------------------------------
    ACCESS SECURITY:
    - ID Verification
    CONNECTION SECURITY:
    - Proxy:    always  (1)
    - Monitor:  always  (1)
    
    Active trace:           relatively slow.
    Passive trace:          none.
    -------------------------------------------------------------------------------
    The global stock market. Create a user and you're ready to roll. I've never
    used this though, stocks only update each month, way too unreliable to work
    well. The idea is that if you've helped a certain company multiple times their
    stock value will increase the next month. In the end, the money gained from
    this is somewhat insignificant compared to just mission grinding. 
    
    7.2.3: INTERNATIONAL ACADEMIC DATABASE
    -------------------------------------------------------------------------------
    ACCESS SECURITY:
    - ID Verification
    CONNECTION SECURITY:
    - Monitor:  always  (1)
    
    Active trace:           very slow, warning if completed.
    Passive trace:          none.
    -------------------------------------------------------------------------------
    When you raise to rank Novice, things are starting to get serious. Well, not
    just yet. Very slow active trace, and if they find you you'll be warned.
    Multiple academic missions can be done at once.
    
    7.2.4: INTERNATIONAL SOCIAL SECURITY DATABASE
    -------------------------------------------------------------------------------
    ACCESS SECURITY:
    - ID Verification
    CONNECTION SECURITY:
    - Proxy:    always  (1)
    - Monitor:  always  (1)
    
    Active trace:           relatively fast, $1000 fine if completed.
    Passive trace:          none.
    -------------------------------------------------------------------------------
    This system isn't that dangerous, but you'll come across your first proxy,
    and an above average trace. As you can see, for the proxy you only need a
    level 1 disabler and that's what I recommend when the the related missions
    first appear.
    
    7.2.5: GLOBAL CRIMINAL DATABASE
    -------------------------------------------------------------------------------
    ACCESS SECURITY:
    - ID Verification
    - Elliptic-Curve Encryption Cypher
    CONNECTION SECURITY:
    - Proxy:    always  (1)
    - Monitor:  always  (1)
    
    Active trace:           fast.
    Passive trace:          3 hours, active trace completion, 1 day normally.
    -------------------------------------------------------------------------------
    Your first passive trace system. It comes with an Elliptic-Curve Encryption
    Cypher, so have your decypher ready. Because the Criminal Database also comes
    with proxy, you'd want a monitor bypass (for readwrite), a long trace or a
    somewhat fast CPU. You can actually clear your own record if you have one, 
    preventing any contract issues with random missions.
    
    -------------------------------------------------------------------------------
    7.3   Central Mainframe
    -------------------------------------------------------------------------------
    ACCESS SECURITY:
    - ID Verification
    - Voice Print Identification
    - Elliptic-Curve Encryption Cypher (ARC & Arunmor only)
    CONNECTION SECURITY:
    - Proxy:    always  (1, 5)
    - Firewall: always  (1, 5)
    - Monitor:  always  (1, 5)
    
    Active trace:           fast.
    Passive trace:          3 hours, active trace completion, 1 day normally.
    -------------------------------------------------------------------------------
    A step up in the hacking world. The main system of a company. Fast trace and a
    high risk. You'll be mostly here to destroy the system. Make sure when hacking
    these that when you bypass monitor, you first hack the voice print before doing
    the ID. If you're here to destroy the system, you need to disable or bypass
    both the firewall and proxy. Companies with high security will have level 5
    connection security, otherwise level 1.
    
    -------------------------------------------------------------------------------
    7.4   International Bank
    -------------------------------------------------------------------------------
    ACCESS SECURITY (account):
    - ID Verification (requires account number)
    ACCESS SECURITY (admin):
    - ID Verification
    - Voice Print Identification
    - Elliptic-Curve Encryption Cypher
    CONNECTION SECURITY:
    - Proxy:    always  (1, 5)
    - Monitor:  always  (1, 5)
    
    Active trace:           very fast.
    Passive trace:          3 hours, active trace completion, 1 day normally.
        Personal transfer:  20 seconds (!!).
    -------------------------------------------------------------------------------
    Accounts are almost as internal service systems and are relatively easy, though
    mind the fast active trace. The admin section is more complicated which is 
    required for tracing an unauthorized money transfer. If you are attempting a 
    personal transfer be ready to delete both the sending statement and receiving 
    statement within twenty seconds at best: any later and you'll be near instantly
    disavowed. I've given more info in my seperate document or at the sandbox guide
    for a personal transfer.
    
    -------------------------------------------------------------------------------
    7.5   Local Area Network (LAN)
    -------------------------------------------------------------------------------
    ACCESS SECURITY:
    - ID Verifications
    - Voice Print Identification (Main Server)
    - Elliptic-Curve Encryption Cyphers (Authentication Servers)
    CONNECTION SECURITY:
    - Proxy:    always  (1, 5)
    - Monitor*: always  (1, 5)
    
    Active trace:           relatively slow + admin log on chase.
    Passive trace:          3 hours, active trace/chase completion, 1 day normally.
    
    *the monitor bypass for LANs works differently. Connecting to the main server
    will in fact prompt the admin to log on and the trace to start. It keeps you
    under the radar for anything else though and is highly recommended.
    -------------------------------------------------------------------------------
    A LAN is a standalone network of multiple computers that each have their own
    function within the network. Your goal is to find and hack the Main Server and
    do whatever is necessary there.
     
    LAN startup tutorial: once you connect to a LAN, open the HUD_LANViewer. What
    you probably will see is the router. Bypass the monitor first. Now open the
    LAN_Scan tool and use it. The LAN will expand and seperate systems will become
    visible. Open the LAN_Probe tool and click on the router, and it will discover 
    the systems connected to the router. Continue probing until you encounter 
    locks, you cannot continue or you reach the Main Server. Locks can be unlocked 
    in several ways explained below. If there are no locks, but you are stuck 
    anyway, connect to terminals for phone numbers. Your goal, as stated, is to 
    find the Main Server and get access to it.
    
    Small recap before I explain all systems:
    - LAN_Scan shows all parts except those behind active locks.
    - LAN_Probe will be your basic software to discover systems.
    - If you're stuck, search in terminals for phone numbers.
    - A monitor bypass is crucial for a LAN: see the system summary for more info.
    
    ROUTER:
    The starting system. Probe this and you'll be in the LAN. It's wise if you
    start with the LAN to scan it. You'll see the whole LAN except for systems
    behind active locks.
    
    HUB:
    As it says, basically. No hacking here, probe on.
    
    TERMINAL:
    The basic system in a LAN. Terminals have several purposes to proceed in the
    LAN, but are not required by default. If you don't know if they do don't waste
    your time hacking them unnecessarily. You only need to hack a password if you 
    need to hack a terminal. They can provide:
    - Wireless Transmitter's frequency: see the transmitter specifically.
    - Modem's phone number: IP_Lookup to connect to another portion of the LAN.
    - Subnet: opens the connection to an Authentication Server. See 'Subnet'.
    
    LOCKS:
    These block your path. There are three ways to open them:
    - Authentication Server: just disable the lock after hacking it.
    - Isolation Bridge: one lock opens, one closes, visible on the HUD which.
    - LAN_Force: breaks a lock, but prompts an admin log on and active trace as if
      you accessed the Main Server. Last resort software. Force is ideal to use 
      when you know you're close to the Main Server: you would have gotten the 
      trace upon connecting to the Main Server anyway.
    
    AUTHENTICATION SERVER:
    Opens locks. Protected by a password and Elliptic-Curve Encryption Cypher, so
    you've got some hacking to do. Again though, you're not detected if you use a
    monitor bypass. You can see which lock it unlocks, by yellow dots with the
    text: locks/unlocks. These can be protected by Subnets.
    
    SUBNET:
    Always a terminal, a Subnet opens the connection to an Authentication Server.
    You can see which terminals are subnets by clicking on the Authentication
    Server. To spoof a Subnet, hack the corresponding terminal, disconnect from it
    and spoof the terminal. Now you can access the Authentication Server. In rare
    occasions subnets can protect another terminal to prevent probing said system.
    
    ISOLATION BRIDGE:
    One lock opens, one closes. If you enable the bridge, you'll be resetted to
    the connected router or modem. Both locks that are (un)locked will usually be
    close together. The bridge has no login security, so it's just matter of using
    the right setting.
    
    WIRELESS TRANSMITTER/RECEIVER:
    Internal connection within the LAN. By using the right transmitter frequency,
    you'll reach the receiver. Frequencies are usually stored on a standalone
    terminal. This connection won't reset the admin's log on; he will have to use
    the transmitter himself to get to you.
    
    MODEMS:
    External connection to the LAN. If there's no obvious way to continue on your
    current LAN connection, search for a phone number on a terminal. If you
    have one, disconnect, IP_Lookup, and reconnect to the part of the LAN that was
    just looked up. The system admin's log on will start from the Modem. In some
    occasions modems will be connected to the main part of the LAN, yet you are 
    required to log on to them to bypass a complicated setup with an Isolation
    Bridge: in this case, the Modem itself provides the phone number as well.
    
    MAIN SERVER:
    Basically identical to Central Mainframes. One difference on LANs is that
    immediately upon connecting to the Main Server the admin will log on, starting
    a chase and active trace. He will log on to the router or modem that is
    connected to the main server. The admin trace will be like a map trace and
    there's no real indication of how fast he is; just check the LAN periodically
    when you are busy in the Main Server and log off if he's about to reach it.
    
    Modem to Main Server bug
    ========================
    It is possible that the Main Server is the very first system to be connected to
    a modem. This makes the admin chase a matter of seconds and extremely 
    difficult to do anything on the Main Server. In order to give yourself some 
    extra time, connect once, hack the voice print and disconnect. The voice print
    will still be enabled, so reconnect to the modem again and break the ID 
    verification on the Server ASAP. Now you have about five to ten seconds to 
    delete or copy a few files before you have to disconnect. You can repeat this 
    process until you are done with the mission.
    
    Protected Main Server & required LAN_Force
    ==========================================
    For the higher protected LANs Main Servers may in fact be connected closely to
    the Router, yet not accessible without breaking three guardian locks. This is
    similar to how subnets work for Authentication Servers. In most occasions the
    locks will be the final parts of the LAN's sections, and no way of opening them
    conventionally. In this case LAN_Force is actually required. The idea is to
    hack your way up to probing all three locks, then force them all 
    subsequentially. In this case you can reconnect after forcing said locks, as 
    the Main Server will still be accessible.
    
    -------------------------------------------------------------------------------
    7.6   Relevant unhackable systems
    -------------------------------------------------------------------------------
    Five common systems that are not hackable. They do have purposes though.
    
    PUBLIC ACCESS SERVER:
    As it says, a Public Access Server. These supply the phone numbers of the
    company's admin and director, so that you can use the voice analyser on them.
    The link of the phone number can be added by clicking on the +. Public Access
    Servers are ideal to use to connect to a Central Mainframe, considering you
    need the phone number of the company's admin for the voice print anyway.
    
    VOICE PHONE SYSTEM:
    Connect to these to record the voice of the user. There's nothing else to do
    but listen to the answering voice and wait for the voice to register. You can
    get phone numbers at the company's Public Access Server.
    
    FILE SERVER:
    The IP and credentials for these are given by companies you need to supply
    multiple files for. You can copy them there and, if not done yet, decrypt them.
    As you're not able to hack an admin account, you'll never be traced. An added
    bonus of file servers is that your credentials never expire: you can use them
    as a file dump, but more importantly, to greatly increase active trace time.
    
    PERSONAL COMPUTER:
    These systems are the same as your Gateway and can't be entered. You'll use
    their IPs for 'Trace a hacker' missions. To access the only PC that you're
    possible to, see 'Complicated story start'.
    
    ACCESS TERMINAL:
    These are the terminals from the company's LAN. An external connection will
    prompt "No public log-ons permitted". Clear enough, these have no purpose
    besides the LAN.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    8.0   Random missions
    -------------------------------------------------------------------------------
    Now for the real work, all the missions you can attempt. I'll give this summary
    before giving a mission description:
    -------------------------------------------------------------------------------
    Mission description:    any description that might give this mission.
    Uplink difficulty:      rated Uplink difficulty.
    Lowest uplink rank:     the first rank that makes you able to do this mission.
    Compromising system(s): any system(s) you might be hacking for this mission.
    Additional software:    whether you need any additional software compared to
                            the latter mission type.
    Neuromancer:            if it goes up or down.
    -------------------------------------------------------------------------------
    
    -------------------------------------------------------------------------------
    8.1   Delete or steal a file
    -------------------------------------------------------------------------------
    Mission descriptions:   
    DELETE:
    - Break into a rival computer system and sabotage files.
    - Hack into a computer and delete key files.
    - Find and destroy crucial data on a mainframe.
    STEAL:
    - Access a remote system and copy important data files.
    - Steal important data from a rival companies file server.
    - Gain Access to a rival system and steal research files.
    
    Uplink difficulty:      2
    Lowest Uplink rank:     Beginner
    Compromising system(s): Internal Service Systems
    Needed software:        - Password_Breaker
                            - RARE: Decrypter v1.0-4.0
    Neuromancer:            Up
    -------------------------------------------------------------------------------
    The startup missions. Once in the system, go to the file server and delete or
    copy what you need, then disconnect. Reply, with the data if you're doing a
    steal mission, and you're done. Multiple of these missions can be done at once
    if other missions have the same target. Sometimes you need to decrypt a file,
    usually the mission reward is more than the decrypter cost. Mind that the same
    files can be used in both copy and delete missions, beware: always check before
    deleting files if other missions need them.
    
    -------------------------------------------------------------------------------
    8.2   Change academic records
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Improve our associates' academic standing.
    - Help us prove a fellow employee is over-rated.
    - Generate a University Degree for a friend.
    - Qualifications required for wealthy professional.
    
    Uplink difficulty:      3
    Lowest Uplink rank:     Novice
    Compromising system(s): International Academic Database
    Additional software:    none.
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    Hack the system. You'll have much time, usually about ten times more than you
    had on the Internal Service Systems. You have to either:
    - Add a graduate qualification with class (Mechanical Engineering, Class 1).
    - Change graduate class (Class 1 <> Class 3).
    - Add 'Other qualification'.
    Commit the update, disconnect. Multiple of these mission can be done at once, 
    because of the very slow trace on the Academic Database.
    
    -------------------------------------------------------------------------------
    8.3   Change social records
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Create part of a new identity.
    - Falsify a Social Security Document.
    
    Uplink difficulty:      4/5
    Lowest Uplink rank:     Confident
    Compromising system(s): International Social Security Database
    Additional software:    Proxy_Disable (Bypass) v1.0
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    Once connected, disable the proxy (bypass if you have it, of course). Once the
    trace starts when disabling, start hacking the ID. When ready, search for the
    person. Now you either have to change the personal status to 'Deceased' or
    'Employed'. Commit once the proxy is disabled and disconnect. Early on it might
    be tricky doing multiple of these, but as long as you have 30sec+ on the trace
    you can attempt additional changes. Once you're ready to buy a 
    HUD_ConnectionAnalysis and the bypassers these will be much easier.
    
    -------------------------------------------------------------------------------
    8.4   Change criminal records
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Help to stop a hacker from ever working again.
    - Help to discredit one of our rivals.
    - Clear a criminal record.
    
    Uplink difficulty:      5
    Lowest Uplink rank:     Intermediate
    Compromising system(s): Global Criminal Database
    Additional software:    Decypher v3.0, Log Deleter v4.0
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    Once connected, disable the proxy (bypass if you have it, of course). Once the
    trace starts when disabling, start hacking the ID and the cypher. When ready,
    search for the person. Now you either have to clear a record or add a specific
    crime ('Robbery' of 'High tech fraud'). Commit and disconnect. Log deletion 
    becomes a priority. Buy the Log_Deleter V4 now, before you run out of funds. 
    Early on doing multiple GCD missions is very tricky due to the complexity of 
    the access security without a monitor bypass. In the endgame, these and removal
    missions can be done in bulk if you use the readwrite account.
    
    -------------------------------------------------------------------------------
    8.5   Check account info
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Client interested in financial data on an enemy.
    - Find Financial Details of one of our associates.
    
    Uplink difficulty:      5
    Lowest Uplink rank:     Intermediate
    Compromising system(s): International Banks
    Additional software:    none
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    These are relatively easy compared to the last. Connect to the bank, go 
    'Manage Existing Account'. Enter the account number, hack the password and 
    check the info you need. Reply the email with the data and disconnect. There is
    a minor exploit here: replying 0 in the email, especially with loans, there is 
    a decent chance it's actually correct; the game does not actually recognize 
    that you've hacked the system.
    
    -------------------------------------------------------------------------------
    8.6   Trace balance transfer
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Trace a recent balance transfer.
    
    Uplink difficulty:      5
    Lowest Uplink rank:     Intermediate
    Compromising system(s): International Banks
    Additional software:    IP_Lookup
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    Similar to the 'Check account info' missions, only that these have two accounts
    involved. Hack the account given, write down the IP and account number of the 
    last statement (200000C or above). Go to the target bank (either just check 
    which bank has the IP or look it up), hack the account and check the name. 
    Reply the mail with the name and delete logs.
    
    -------------------------------------------------------------------------------
    8.7   Delete multiple files
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Destroy corporate data of a rival company.
    - Destroy customer records on a sales system.
    - Destroy rival software in development.
    
    Uplink difficulty:      5/6/7
    Lowest Uplink rank:     Intermediate
    Compromising system(s): Internal Service Systems, Central Mainframes or LANs.
    Additional software:    - Voice_Analyser
                            - Proxy (& Firewall)_Bypass v5.0
    Neuromancer:            Up
    -------------------------------------------------------------------------------
    These are the first type of missions you'll have to mess with the firewall 
    besides the proxy: if you cannot yet afford firewall software and you can get 
    the proxy offline, you can go to security in the admin section and 
    just disable the firewall there. This would work indefinitely, but using a 
    bypasser eventually makes it much easier. Once the proxy and firewall are gone,
    go to the console and enter the commands 'cd usr' and 'delete'. Once done, 
    disconnect and delete logs, fastforward the news to be able to complete the 
    mission.
    
    -------------------------------------------------------------------------------
    8.8   Steal multiple files
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Copy large and secure corporate database.
    - Copy proprietary source code database.
    - Steal valuable scientific research documents.
    - Break into high security system and steal customer records.
    
    Uplink difficulty:      5/6/7
    Lowest Uplink rank:     Intermediate
    Compromising system(s): Internal Service Systems, Central Mainframes or LANs.
    Additional software:    Decrypter v7.0                        
    Neuromancer:            Up
    -------------------------------------------------------------------------------
    After bypassing the firewall and accessing the system, go to the File Server. 
    Copy all .dat files, likely going up in numbers (TheaN0.dat, TheaN1.dat, etc).
    Disconnect and delete logs. Go to the enlister's File Server, copy the files,
    decrypt them, disconnect and reply. You can delete any files currently present
    on the File Server if you lack space. If you somehow forget files, the mission
    will complete but with a lesser reward.
    
    -------------------------------------------------------------------------------
    8.9   Destroy a system
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Elite agent required for destruction of a computer system.
    
    Uplink difficulty:      6/7
    Lowest Uplink rank:     Skilled
    Compromising system(s): Central Mainframes
    Additional software:    none
    Neuromancer:            Up
    -------------------------------------------------------------------------------
    The regular way is to delete every file and all systes files on the system, 
    then shut it down. Once you've bypassed the security and accessed the system,
    go to the console. Use the following commands:
    - cd usr
    - delete
    - cd sys
    - delete
    - shutdown
    You don't have to wait for the other commands to be ready, you can type all
    five commands right after each other. You might want to wait with 'shutdown' 
    until the system files start to delete, in order to avoid unnecessary 
    disconnects if you mistype something. Once the system is rebooting you can 
    disconnect. Delete the logs, go to the news, fastforward three hours and reply.
    It is generally advised to delete logs via the console also (cd log, delete), 
    but this is not crucial for the destruction. As you delete logs externally, 
    there's no need to.
    
    The less complicated way, yet it requires the start of the storyline, is to
    run Revelation. Once you're inside, copy Revelation in the File Server, access
    the console and enter 'cd usr', 'run Revelation'. You'll instantly disconnect,
    the system will appear on the world map affected by Revelation. Delete logs 
    and finish the mission, there's no need for a fastforward. The use of 
    Revelation does not come with repurcussions even though you are literally the 
    only hacker that can have a copy of Revelation. Note that this works for 
    'delete files' missions also but that is almost as quick using the commands.
     
    -------------------------------------------------------------------------------
    8.10   Trace a hacker
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Trace a hacker who recently broke into our systems.
    - Trace an unauthorised money transfer.
    
    Uplink difficulty:      Hacker:         7
                            Transfer:       9
    Lowest Uplink rank:     Hacker:         Experienced
                            Transfer:       Professional
    Compromising system(s): all
    Additional software:    - Log_Undeleter
                            - IP_Lookup
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    Go to the system that was compromised, hack to the logs. Undelete the log that 
    matches the time and date, especially if it's not a routed log. IP_Lookup the 
    first IP in the routed log.. Now do the same at the system given by the 
    IP_Lookup. Continue until you get to a PC, reply the mission with the name of 
    the owner of the PC. For a transfer, don't look at the statements but at the 
    bank's logs. You can be the hacker they're talking about. In this case you're 
    not able to accept the mission or contact the employer. In the rare occasion 
    there isn't a log matching time and date, you are most likely doing ARC's 
    'Trace a hacker' mission which involves the storyline. See 'Complicated 
    storyline start'.
    
    -------------------------------------------------------------------------------
    8.11   Make donations
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Our esteemed colleague wishes to make a donation.
    
    Uplink difficulty:      7
    Lowest Uplink rank:     Experienced
    Compromising system(s): International Banks
    Additional software:    none.
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    Go to the target bank. Bypass security and hack the accountnumber given. Go to
    transfer, and input all data as in the description. Transfer the credits, 
    verify it completes and disconnect. Connect to InterNIC while replying the 
    mission, once a completion has returned, delete your logs. Deleting your logs 
    before replying the mission sometimes voids the transfer. You do not need to 
    delete statements as you are not the sender or receiver* of the credits.
    
    *This CAN in fact be the case if you made accounts on other banks. These 
    missions will never target the Uplink bank, but they can let you donate to 
    yourself on other banks; why they'd want this I don't know. If it is the case,
    you have no choice but to abandon the mission or to approach this as an actual
    illegitimate bank hack, see my other guide or the small summary in the easter 
    eggs section. You will get the rank increase and the credits; usually the 
    amount is so minor it's just a nice extra.
    
    -------------------------------------------------------------------------------
    8.12   Removal job or frame for computer crimes
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Highly skilled agent required for removal job.
    - Frame a user for computer crimes.
    
    Uplink difficulty:      Removal:        7
                            Frame:          9
    Lowest Uplink rank:     Removal:        Knowledgeable
                            Frame:          Uber-Skilled
    Compromising system(s): Global Criminal Database
    Additional Software:    none.
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    These are very easy at this point in the run because you only need to hack the 
    GCD and this can be done without an active trace. Bypass security and hack the
    'readwrite' account. Once in, note that this prompts no active trace. Search 
    for the name, add 'Parole' and press 'Add' two times to fake two additional 
    crimes. Authorise arrest, make sure it is accepted. Disconnect and delete logs,
    fastforward the news and reply any missions you have. You can do loads of these
    at once and the credits awarded by these should get you to the point where 
    you'll be able to buy any remaining upgrades you need. Computer crimes also an
    be done by framing someone as required for the last two types of missions but 
    authorizing arrest is by far the easiest method.
    
    -------------------------------------------------------------------------------
    8.13   Frame for bank fraud
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Frame a man for bank fraud.
    
    Uplink difficulty:      9/10
    Lowest Uplink rank:     Uber-Skilled
    Compromising system(s): International Banks
    Additional software:    Log_Modifier.                        
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    I want to warn you up front: frame missions can bug out pretty often, even if
    done right and they take a long time ingame to finish: it usually takes more 
    than a day for the news to appear but it can sometimes just not appear at all.
    Honestly, at this point in the game fastforwarding slightly and waiting for
    removal or computer crimes missions is probably the safe option. If you are
    inclined to finish all missions, backup your save everytime you want to accept
    a frame mission and restore it if the mission doesn't properly complete.
    
    The mission itself is actually straightforward: hack the target bank with a low
    amount of bounces, use five non-account systems at most. No need to bypass 
    anything as you're supposed to be discovered. Hack the ID Verification and 
    disconnect with about two seconds left on the active trace. Go to InterNIC and
    modify the routed log with the IP of the target individual, delete the admin 
    acceptance log. Fastforward the news and if the news item appears that the 
    person has been arrested for the hack, it worked.
    
    -------------------------------------------------------------------------------
    8.14   Frame for data destruction
    -------------------------------------------------------------------------------
    Mission descriptions:   
    - Frame a user for destruction of data.
    
    Uplink difficulty:      9/10
    Lowest Uplink rank:     Uber-Skilled
    Compromising system(s): Internal Service Systems
    Additional software:    none.                        
    Neuromancer:            Down
    -------------------------------------------------------------------------------
    These are essentially a combination of the 'Delete multiple files'
    and 'Frame for bank fraud' missions and therefore require no seperate 
    description, just beware that you make a short connection that is sufficient to
    delete all files. As with bank fraud, it takes a long ingame time to finish and
    they bug out, so do them at your own risk.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    9.0   Awards
    -------------------------------------------------------------------------------
    This section will explain the basics of the storyline: how to begin, what the
    missions are and how to do the finale, regardless of what side you're on. In
    addition it will describe the two missions that give awards but otherwise do
    not influence the story.
    
    The missions will be divided by this summary:
    -------------------------------------------------------------------------------
    Mission type:           either like a random mission or something else.
    Mission date:           the date the mission will be given.
    Credits:                the reward.
    Compromising system:    which system to hack.
    -------------------------------------------------------------------------------
    Description.
    
    -------------------------------------------------------------------------------
    9.1   Regular storyline start
    -------------------------------------------------------------------------------
    If you manage to follow the news in the first weeks of the game, you'll notice
    that the top rank agent is working for ARC, and that the second rank agent does
    not trust them. On 9 April you'll see a news bulletin that the top rank agent 
    died in an apparant suicide. A week later, 16 April, you'll receive an email 
    from him, stated that ARC cannot be trusted. Hack the ARC Central Mainframe at 
    least once in the next days to receive an email from ARC a few days later. If 
    you don't attempt to hack the ARC CM your current user will skip the storyline.
    
    -------------------------------------------------------------------------------
    9.2   Complicated storyline start
    -------------------------------------------------------------------------------
    There is another, perhaps more intended way to receive an ARC email. Once the 
    hacker is dead, so before his email, write down the date and time he died. ARC
    might post a 'Trace a hacker' mission around this time on the Uplink mission 
    board. The hack originated from the ARC Central Mainframe.
    
    Hack the ARC Central Mainframe and go to the logs, you'll see a "Copied
    RevelationCore 0.7" log. The time of this log might NOT be identical to the one
    in the mission if, you have it, as the time of the above logs is very precise.
    Regardless there shouldn't be a log matching the mission, you are supposed to 
    follow the RevelationCore. The IP of the copy log is unknown, but at the same 
    time someone has logged on. Undelete the logs and follow IPs as intended, until
    you get to the personal computer: you can complete the mission from ARC if you 
    have it, but that's not the purpose of this trace.
    
    This is in fact the only PC in the game you can enter. Break or enter the 
    password, which is MySocratesNote, the password the top rank agent gives you 
    in his email you are supposed to recieve later. In his PC there is a section 
    "Filez" and "Emailz". "Emailz" will contain the email he sents you after a week
    and one about a subscription to Hacker Magazine. "Filez" will contain the 
    RevelationCore0.7. Copy the core and decrypt it. ARC will sent you an email 
    about your incredible hack at approximately the same time you would get their 
    regular mail. Beyond this point, the PC is no longer accessible.
    
    -------------------------------------------------------------------------------
    9.3   Receive email from ARC
    -------------------------------------------------------------------------------
    Which of the two mails you get, it doesn't matter for the followup. Reply to
    the email and you'll get your first ARC mission and Revelation v1.0.
    
    8.3.1: Notes on Revelation
    ==========================
    For those that did not yet get this: Revelation is an extremely agressive 
    virus. It has some uses besides the storyline:
    1) It serves as a replacement to destroy a system, upload it and run it via
       the console. This counts for just files as well.
    2) If ran locally Revelation will in fact completely corrupt your Gateway, this
       mimics a Gateway_Nuke and makes a standalone Motion_Sensor useful.
    3) If run by mistake a similar or higher version of Faith will neutralize the 
       virus if used in time.
    In short, be careful. Revelation infections are clearly visible on the world 
    map by relative large red blocks.
    
    Roughly two minutes after ARC's proposal, Arunmor will plea you to defect from
    ARC, saving their own Internal Service System in the process. Reluctant to run
    an unknown virus from a company you do not know, lets trust their rivals at 
    first.
    
    -------------------------------------------------------------------------------
    9.4   Arunmor
    -------------------------------------------------------------------------------
    9.4.1:  AWARD MISSION ARUNMOR 1:        'Backfire'
    -------------------------------------------------------------------------------
    Mission type:           send a file.
    Mission date:           17 April 2010
    Credits:                $15000
    -------------------------------------------------------------------------------
    Reply the Arunmor mail with Revelation v1.0. Done, as easy as that. Mind that
    it takes ARC a while to find out you defected, but the threats send to you are
    clear enough.
    
    9.4.2:  AWARD MISSION ARUNMOR 2:        'Tracer'
    -------------------------------------------------------------------------------
    Mission type:           upload and run a file.
    Mission date:           26 April 2010
    Credits:                $10000
    Compromising system:    ARC Internal Service System
    -------------------------------------------------------------------------------
    Go to the Arunmor File Server and copy the Tracer. Hack the ARC Internal 
    Service System like you normally would, go to the File Server. Copy the Tracer
    to the system. Go to the console and use the following commands: 'cd usr',
    'run RevelationTracer'. You'll get a bunch of messages in the console that the
    tracer is running and that it hid itself. You can check the File Server to be 
    sure. Delete logs and finish the mission.
    
    9.4.3: AWARD MISSION ARUNMOR 3:         'TakeMeToYourLeader'
    -------------------------------------------------------------------------------
    Mission type:           upload and run a file.
    Mission date:           4 May 2010
    Credits:                $30000
    Compromising system:    Arunmor Internal Service System
    -------------------------------------------------------------------------------
    This mission is exactly the same as ARC proposed to you initially: now however,
    you do it to get the ARC CEO arrested. Hack the system, upload Revelation and
    run it. Somewhat amusing is that during an ARC playthrough both companies will
    ask you to do this, ARC initially and Arunmor when they post this mission on
    the Uplink board; Arunmor needs to review their security measures I reckon.
    
    9.4.4: AWARD MISSION ARUNMOR 4:         'ARCInfiltration'
    -------------------------------------------------------------------------------
    Mission type:           steal multiple files.
    Mission date:           12 May 2010
    Credits:                $30000
    Compromising system:    ARC Local Area Network
    -------------------------------------------------------------------------------
    Like a 'Steal multiple files' mission on a LAN. The ARC LAN will be quite
    complicated but usually not as sophisticated as the Darwin or Arunmor 
    counterparts (see ARC missions). Take the ARC admin voice print, hack the Main 
    Server and copy the 9 .dat files of 10Gqs (Revelation 0-8.dat). Put them on the
    Arunmor File Server, delete anything in your way, decrypt them and reply.
     
    9.4.5: AWARD MISSION ARUNMOR 5:         'CounterAttack'
    -------------------------------------------------------------------------------
    Mission type:           contain Revelation, run Faith multiple times.
    Mission date:           27 May 2010
    Credits:                $50000
    Compromising systems:   multiple varying systems.
    -------------------------------------------------------------------------------
    This mission is tricky but it's not at all the difficulty of 'GrandTour'. The
    point is that Arunmor has always been slightly ahead of ARC in their quest to
    keep the internet up and running, and the NPC way of the outbreak clearly 
    shows this difference. ARC only starts with three infected systems and infect
    three more at most before their systems are seized. If done right, you can
    finish off Revelation shortly after ARC has been seized.
    
    Before the mission starts, which would be early 27th of May, backup your user.
    Make sure all Internal Service Systems are on the map. Now get ready for the 
    outbreak. Once it starts, go to the Arunmor File Server and copy Faith and the 
    RevelationTracker. 
    
    To control the containment:
    - Go to the World Map and try to connect to the red blocks.
    - If you can connect, this should be an Internal Service System.
    - Bypass the firewall and proxy.
    - Hack it, go to the File Server of the system and upload Faith.
    - Go to the console and enter 'cd usr' and 'run Faith'.
    - Once Revelation clears, disconnect and repeat the cycle.
    - If you can't connect to the system run the RevelationTracker.
    - IP_Lookup the IPs in the Tracker.
    - If affected systems are Central Mainframes, attempt to clear them.
    - I would just ignore LANs and let them spread due to time constraint.
    
    After a while Arunmor will send you an email that the ARC Central Mainframe has
    been raided. This marks the point where there will not be any new infections,
    just the one-to-two spreads from the currently infected systems. Once you clear
    the final Revelation after you've gotten this email, the mission completes 
    itself. At no single point is CounterAttack truly dangerous but you do have to
    keep active in order for Revelation not to overhelm you.
    
    You've defeated ARC. Continue following the story up to mid-June, where it 
    becomes clear the leader of the Andromeda group lost faith in the internet as
    it is in Uplink, making everyone's information open to everybody. To some 
    extend, he has a point: if hackers can change everything that corresponds to an
    individual nobody is really safe, framing someone is common practice. To 
    destroy the internet to prevent that,  however... lets call Andromeda 
    chaotically neutral; decide for yourself if they're right. Regardless of what 
    you think, lets follow their storyline next.
    
    -------------------------------------------------------------------------------
    9.5   Andromeda Research Corporation (ARC)
    -------------------------------------------------------------------------------
    Some notes on ARC:
    - Proceeding with ARC makes your agent unavailable after GrandTour. Because of
      this reason I usually make a user with ARC in it so it's clear to myself that
      this is an ARC user that will become unavailable on the 26th of May.
    - Random missions just for rank or neuromancer matter less for ARC due to the
      inevitable end of the game. If you're inclined to end it with max rank, I'd
      suggest performing a few illigitimate personal money transfers.
    - While proceeding with ARC, the second, third and fourth Arunmor mission will 
      appear at the mission screen with an Uplink difficulty of 10. Completing them
      will award the corresponding awards. If you don't do it, another agent will
      regardless, so you might as well.
    - GrandTour is by a large margin the hardest mission ingame. This mission is 
      comparable to CounterAttack in setting but a lot harder to properly execute. 
      I've added four different phases to the mission in order to make your life as
      easy as possible in the mission.
    
    9.5.1:  AWARD MISSION ARC 1:            'MaidenFlight'
    -------------------------------------------------------------------------------
    Mission type:           upload and run a file.
    Mission date:           17 April 2010
    Credits:                $10000
    Compromising system:    Arunmor Internal Service System.
    -------------------------------------------------------------------------------
    Search up the system at InterNIC. Hack the system, upload Revelation and run 
    it. The 'difference' with this compared to the third Arunmor mission is that 
    this actually initiates an ARC playthrough, therefore marking Arunmor missions
    to appear on the mission board when their time arrives.
    
    Shortly after the attack on the Arunmor system Arunmor will post a news 
    bulletin that they give $25000 to anyone with info on  Revelation by mailing to
    internal@Arunmor.net. This is the ONLY point in the game where a standalone 
    mail does something: if you mail Revelation to Arunmor at this point you will 
    get a reward thanking you for supplying them with Revelation and ask no further
    questions. You'll be rewarded $25000 and the ARC storyline continues.
    
    9.5.2:  AWARD MISSION ARC 2:            'Darwin'
    -------------------------------------------------------------------------------
    Mission type:           steal multiple files.
    Mission date:           30 April 2010
    Credits:                $15000
    Compromising system:    Darwin Local Area Network
    -------------------------------------------------------------------------------
    The Darwin LAN has a setup that differs from what you know; the Darwin LAN has
    a security setup that requires you to unlock the Main Server by breaking three
    locks that require LAN_Force as I've explained in the last section at the LAN
    system. Other than the complexity, this is a 'Steal multiple files' missions 
    on a LAN similar as the fourth Arunmor mission.
    
    9.5.3:  AWARD MISSION ARC 3:            'SaveItForTheJury'
    -------------------------------------------------------------------------------
    Mission type:           frame for bank fraud.
    Mission date:           8 May 2010
    Credits:                $20000
    Compromising system:    International Bank.
    -------------------------------------------------------------------------------
    This is even simpler as a regular frame mission as you don't have to wait for 
    the news. Go to the target bank with a few bounces, hack the admin and 
    disconnect when the trace is about to complete. Go to InterNIC and modify the 
    log with the Arunmor Technical Director's IP. Simply reply the mission.
    
    9.5.4:  AWARD MISSION ARC 4:            'SkinnyHammer'
    -------------------------------------------------------------------------------
    Mission type:           destroy a LAN.
    Mission date:           16 May 2010
    Credits:                $30000
    Compromising system:    Arunmor Local Area Network
    -------------------------------------------------------------------------------
    The Arunmor LAN is large but does not require LAN_Force as the Darwin LAN. The 
    Main Server is protected by three locks, with a wireless transmitter nearby. 
    In one of the connected terminals there are three frequencies for the 
    transmitter. Each frequency get you to the part of the LAN that unlocks one of 
    the Main Server locks. An alternative is to just force all three locks from the
    get-go, but there's no fun in that. You have to destroy the Main Server and in
    this case, and why not as ARC, I'd definitely recommend Revelation. Both the 
    admin chase and the relatively fast active trace make the conventional method 
    pretty slow, if doable at all, and now you have the virus, so why not use it
    to our advantage.
    
    9.5.5:  AWARD MISSION ARC 5:            'GrandTour'
    -------------------------------------------------------------------------------
    Mission type:           spread Revelation, run Revelation multiple times.
    Mission date:           26 May 2010
    Credits:                $50000 (*)
    Compromising systems:   multiple Internal Service Systems.
    (*): is only added to your score. The inevitable game over renders it useless.
    -------------------------------------------------------------------------------
    In essence this mission relates to Arunmor's final mission that you'll be 
    hacking a lot of low-security systems, but the intensity of GrandTour greatly 
    surpasses CounterAttack: ARC is clearly in a lesser state than Arunmor by the 
    time the outbreak occurs and therefore this mission is a lot harder than its
    counterpart. The total time for the mission is only fifteen minutes, after 
    which you're disavowed by Uplink for their own safety: this is a hard endpoint
    and cannot be influenced or negated.
    
    For GrandTour I highly suggest you use a prephase. Both the prephase and the 
    mission can, on their own, be divided into two parts.
    
    Prephase part 1: links (24-12hr)
    ================================
    This can be done basically up to the final day but can be done at any time 
    between the fourth and last mission. Connect to InterNIC and add 20 Internal 
    Service Systems to your map. System difficulty does not seem to influence 
    Revelation strength or Arunmor hacking speed so you might as well make it  
    easier on yourself.
    
    Prephase part 2: file space (12-0hr)
    ====================================
    Connect to the 20 systems you searched up previously, bypass the firewall, 
    and clear the top file(s) so that you have 3Gq available. This greatly reduces 
    the need for File_Deleters and scrolling down in File Servers during the actual
    mission.
    
    Mission part 1: credentials & upload (~7min)
    ============================================
    After the mission hits reconnect to previously connected systems. If the 
    credentials are still active you have it easier; if they're not I hope it's 
    clear to you which file servers you cleared out. Once connected, bypass the 
    firewall, go to the File Server and upload Revelation v3. Now disconnect! This
    definitely gives you available credentials and Revelation is dormant on these
    systems. The reason for delaying launching Revelation is that we don't want to
    give Arunmor early targets.
    
    Mission part 2: execution (<15min)
    ==================================
    If you're quick enough you should be about seven minutes in on the mission
    when you're done with arming systems with Revelation. Now start reconnecting
    to those systems. Get a Proxy_Bypass out whilst connecting to the systems, 
    bypass it, go to the console and enter 'cd usr' 'run Revelation'. Each system 
    should take between 10-20 seconds at most. When you're done about a quarter of
    your earlier infections should have been cleared, and you should only have 
    about two minutes left. This time is not really enough to hack more systems, 
    and that will not help much. I suggest to just watch the world map how the 
    spreading goes: you will be succesful with roughly 15+ simultaneous infections.
    
    The end (15min)
    ===============
    The mission can end in failure and success: if the screen goes straight black 
    you've reached the time limit and failed. You've succeeded when your Gateway 
    gets an external Revelation infection and disconnects about ten seconds later.
    
    When you fail, you get a clear notification from Uplink that they have been 
    monitoring you for a while and have disavowed you based on relations with ARC
    and that Revelation has failed. In the game over screen, the disavow reason is
    'Working for Andromeda Research Corporation during the Revelation crisis' and 
    you do not have the GrandTour award.
    
    When you succeed, watch the show. You don't have access to Faith so there's 
    nothing you can do, but lets face it: you don't want to either. The screen will
    go black and you get a message from Uplink. They "somehow lost connection to 
    the core servers which may be the result of a virus", and as the message goes 
    on it becomes scrambled and corrupted until only bytes appear. You've 
    succesfully destroyed every single system connected to the internet, including 
    Uplink's mainframe. In the game over screen it says 'An outbreak of the 
    Revelation virus forced Uplink Corporation to cease operations' and GrandTour 
    should have been awarded. For a synopsis as to why ARC wanted to do this, read
    the final paragraph at 'CounterAttack'.
    
    If done things right, you can have ten of twelve Awards if playing with ARC, 
    missing 'Backfire' and obviously 'CounterAttack'. There used to be a way to 
    get 'Backfire' awarded without negating the ARC storyline but that no longer
    works: sending Revelation midway the ARC storyline only supplies you with 
    $25000, not the award. The consequence of finishing with ARC is that your user 
    is no longer available, every system has been destroyed. When you access the 
    user you see the game over screen and your ten hard earned rewards.
    
    -------------------------------------------------------------------------------
    9.6   Mole????
    -------------------------------------------------------------------------------
    Mission type:           steal multiple files.
    Credits:                $50000 (*)
    Compromising system:    Uplink Internal Service Systems
    (*): You won't get all, see below.
    -------------------------------------------------------------------------------
    Be a mole in your own community. Bypass all security and hack the Uplink
    Internal Service System as a normal Internal Service System. Go to the admin
    section and use the decypher. Now copy the Uplink Agents List to your memory
    and all UplinkAgents X.dat files (notice that 4 isn't there). Decrypt the
    files and delete logs. Fastforward at least a week (!) and receive an email 
    from a random company, and the link to their File Server. Copy the agent list 
    program and all data files to the File Server. Reply the mission. Receive only
    $46200 because the 4.dat wasn't there which contains your own info. The news
    item for this mission is somewhat disturbing.
    
    Mind that the Uplink Agents List does work locally, and you see all the names 
    of the hackers working at Uplink. The only practical use for this info is 
    however, that you can theoretically reply 'Trace a hacker' missions with all 
    names in the list. This can be considered an exploit however, as you never 
    actually traced the actual hack.
    
    -------------------------------------------------------------------------------
    9.7   Wargames????
    -------------------------------------------------------------------------------
    Mission type:           blow up cities?... almost.
    Credits:                $0 
    Compromising system:    Protovision Game Server
    -------------------------------------------------------------------------------
    Just connect directly to the server. The password is a name from the movie 
    that has the same name as the mission. If you didn't see the movie: 'joshua'. 
    Go to 'Games', and go to the only link possible there. Click on a single city 
    and the award will be yours. The news entry about this mission is more amusing 
    than it is serious, how a 'remote connection nearly caused WW3'. Good times.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    10.0  Chronological upgrade list
    -------------------------------------------------------------------------------
    Perhaps this section is a bit out of line, but it's something I wanted to add 
    in v2 as well: a list of chronological upgrades as you go through the game. 
    Essentially this list will give you an overview of what to use your initial
    credits on and what software and hardware to get as you move forward in the 
    game. The idea of this section is to sort of present the only 'walkthrough' I
    can provide for a game like this. The 'when' will refer to either a system or
    mission type, whatever applies.
    
    Mind that, if anything, this is a guideline.  Most software is forced for the 
    type of system they're presented at, but Gateway and hardware upgrades are done
    at leisure just to make certain type of missions more doable. Note that you 
    cannot wait too long with hardware upgrades or systems will simply be 
    unhackable as you're too slow. I leave the initial 60Ghz processor in until the
    TRINITY Gateway, it's more efficient to upgrade the Gateway and add an 
    additional 200Ghz processor rather than just replacing it.  
    
    The only real choice is whether or not to buy the AM-CORE. Despite that you 
    will probably end up buying the TRINITY, AM-CORE enables you to do 'steal 
    multiple file' missions in one hack instead of two. TRINITY is not crucial for 
    any mission except 'CounterAttack' or 'GrandTour', where the increased hacking
    speed can be a lifesaver. So up till that point, AM-CORE is actually 
    competitive with TRINITY and I've decided to include it as early as 'steal 
    multiple file' missions, as that's where it really shines. If you somehow end
    up finishing all of those missions without the AM-CORE and with money for the 
    TRINITY, you can safely skip to TRINITY.
    
    Notes
    =====
    1) Increase Uplink's bank loan to $4000 to buy the Trace_Tracker v4 initially.
    2) Initial Decrypter version depends on what you need; used v4 as reference.
    3) Monitor_Bypass is essentially optional, but highly recommended from LANs on.
    4) For memory modules I've always chosen the cheapest combination.
    5) LAN_Scan is not essential, but is included for convenience.
    
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Upgrade             Type        When                     Cost       Total cost
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Tutorial            Software    Registered               $     0    $      0
    File_Copier         Software                             $     0    $      0
    File_Deleter        Software                             $     0    $      0
    Password_Breaker    Software    Uplink Test Machine      $  1500    $   1500
    Trace_Tracker v4    Software                             $  2500    $   4000
    Decrypter v4        Software    Steal files (encrypted)  $  2200    $   6200
    Proxy_Disable v1    Software    Social Security Database $  3000    $   9200
    Decypher v3         Software    Global Criminal Database $  8000    $  17200
    Log_Deleter v4      Software                             $  4000    $  21200
    VIRTUANET           Gateway                              $ 15750    $  36950
    Processor 200Ghz    Hardware                             $ 12000    $  48950
    Modem 2Ghz          Hardware                             $  2000    $  50950
    Memory 24Gq         Hardware                             $  8000    $  58950
    IP_Lookup           Software    Trace a balance transfer $   500    $  59450
    Voice_Analyser v2   Software    Central Mainframes       $ 10000    $  69450
    ConnectionAnalysis  HUD                                  $ 20000    $  89450
    Proxy_Bypass v5     Software                             $ 20000    $ 109450
    Firewall_Bypass v5  Software                             $ 10000    $ 119450
    Decrypter v7        Software    Steal multiple files     $ 15000    $ 134450
    ZION                Gateway                              $ 29750    $ 164200
    Modem 6Ghz          Hardware                             $  6000    $ 170200
    Memory 24Gq         Hardware                             $  8000    $ 178200
    Memory 24Gq         Hardware                             $  8000    $ 186200
    Processor 200Ghz    Hardware                             $ 12000    $ 198200
    AM-CORE             Gateway                              $ 62500    $ 260700
    Memory 24Gq         Hardware                             $  8000    $ 268700
    Memory 24Gq         Hardware                             $  8000    $ 276700
    Memory 24Gq         Hardware                             $  8000    $ 284700
    Memory 24Gq         Hardware                             $  8000    $ 292700
    Memory 24Gq         Hardware                             $  8000    $ 300700
    Memory 24Gq         Hardware                             $  8000    $ 308700
    Memory 16Gq         Hardware                             $  5500    $ 314200
    Modem 10Ghz         Hardware                             $ 10000    $ 324200
    Log_Undeleter       Software    Trace a hacker           $  5000    $ 329200
    Monitor_Bypass v5   Software    Local Area Networks      $ 25000    $ 354200
    LANView             HUD                                  $ 50000    $ 404200
    LAN_Probe v3        Software                             $ 30000    $ 434200
    LAN_Spoof v3        Software                             $ 45000    $ 479200
    LAN_Scan v3         Software                             $ 25000    $ 504200
    LAN_Force v3        Software                             $ 25000    $ 529200
    Log_Modifier v2     Software    Framing missions         $  6000    $ 535200
    TRINITY             Gateway     Endgame & storyline      $ 50000    $ 585200
    Processor 200Ghz    Hardware                             $ 12000    $ 597200
    Processor 200Ghz    Hardware                             $ 12000    $ 609200
    Processor 200Ghz    Hardware                             $ 12000    $ 621200
    Processor 200Ghz    Hardware                             $ 12000    $ 633200
    Processor 200Ghz    Hardware                             $ 12000    $ 645200
    Processor 200Ghz    Hardware                             $ 12000    $ 657200
    RevelationCore v0.7 Data        Storyline entry          $     0    $ 657200
    Revelation v1       Software    Storyline start          $     0    $ 657200
    RevelationTracker   Software    Finale                   $     0    $ 657200
    Faith v3            Software    'CounterAttack'          $     0    $ 657200
    Revelation v3       Software    'GrandTour'              $     0    $ 657200
    -------------------------------------------------------------------------------
    OPTIONAL
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Upgrade             Type        When                     Cost       Total cost
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Dictionary_Hacker   Software    Early file missions/LANs $  1000    $   1000
    Proxy_Disable v5    Software    Central Mainframes       $ 10000    $  11000
    Firewall_Disable v5 Software    Central Mainframes       $  8000    $  19000
    IP_Probe            Software    Steal multiple files     $  5000    $  24000
    Motion_Sensor       Security    Anything that disavows   $ 10000    $  34000
    Gateway_Nuke        Security    Anything that disavows   $ 20000    $  54000
    MapShowTrace        HUD         N/A                      $  5000    $  59000
    Defrag              Software    N/A                      $  5000    $  64000
    IRC-Client          HUD         N/A                      $  4000    $  68000
    Uplink_Agent_List   Software    'Mole????'               $     0    $  68000
    Uplink Agents info  Data        'Mole????'               $     0    $  68000
    -------------------------------------------------------------------------------
    -------------------------------------------------------------------------------
    Total spend                                                         $ 725200
    -------------------------------------------------------------------------------
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    11.0  Easter eggs
    -------------------------------------------------------------------------------
    This section provides and explains easter eggs present in Uplink.
    
    -------------------------------------------------------------------------------
    11.1  Introversion software
    -------------------------------------------------------------------------------
    The creators of the game. They state the future for Uplink here. This one isn't
    available at InterNIC. It corresponds to the IP that is standard for Uplink, 
    which makes sense to some extend. IP_Lookup 128.128.128.128.
    
    -------------------------------------------------------------------------------
    11.2  Steve Jackson's game server
    -------------------------------------------------------------------------------
    This site was seized in real life, because they were making a hacking guide.
    This wasn't true, it was for such a game as Uplink. If you connect to this
    server you'll be told that your IP has been logged, but nothing will happen.
    
    -------------------------------------------------------------------------------
    11.3  Meet the makers
    -------------------------------------------------------------------------------
    Read some weird confessions here. I'll give two hints:
    - Game over isn't so bad.
    - Saw "The Net"? Search for that little icon.
    To get there exactly: get disavowed or complete the ARC storyline, and press 
    the small icon in the bottom left on the user's login screen.
    
    -------------------------------------------------------------------------------
    11.4  Own government records & self arrest
    -------------------------------------------------------------------------------
    Though you are officially nameless ingame (would actually have been great if 
    you could have supplied a real name), you are part of Uplink's society. To that
    extend you also have academic, social and criminal records. You can find these
    by  simply searching for your username at the appropriate systems.
    
    ACADEMIC
    Your academic record is all about working with computers. You have an A-grade
    in Math, Physics, Electronics and Computing, a Computer Science Class 1
    graduation and it specifies you are a registered Uplink agent. I've never 
    actually tampered with the academic record, as I sincerely doubt it affects 
    anything.
    
    SOCIAL
    You are born in 1989, single and 'Self-employed'. Changing your status here
    does not actually do anything, including changing your status to 'Deceased',
    compared to getting yourself arrested, see below.
    
    CRIMINAL
    Of course, this lists everything you have been convicted for during the run.
    The practical use of your criminal record is that you can clear it, so you no
    longer get denied in accepting missions.
    
    Self arrest
    ===========
    You can get yourself arrested without consequence which is actually amusing:
    add 'Parole' to your criminal record and two other crimes like a regular 
    removal mission and authorize arrest. What follows is a very amusing news item
    that the "hacker ring-leader has been arrested", you are known as "PLAYER" and
    you are "accounted for multiple destructive hacks and are a major spill in the
    Uplink network". Well, that is kind of true. Last but not least, your status
    on the rank list will change from 'Active' to 'In Jail', which is hilarious. 
    As said, doing this has absolutely no consequences for your playthrough except
    for the criminal record, which you can clear afterwards.
    
    -------------------------------------------------------------------------------
    11.5  Bank hacking / illegitimate money transfer to yourself
    -------------------------------------------------------------------------------
    You can actually transfer money to your own bank accounts from others. This 
    action is the most monitored action ingame and the passive trace from the 
    transfer statements is approximately ten to twenty seconds only (!).
    
    The jist of the whole idea is to transfer whatever amount you want from an 
    account's balance to one of your own bank accounts. To make it esay on yourself
    you'd want to make an account on all eight banks so that statement deletion is
    easier. You hack the account as you're supposed to for 'Make a donation'  
    missions, yet instead of transferring it to someone else's account you do it 
    to youself. Immediately after transferring, delete the statement in the 
    sender's account, then go to yours and delete the only statement that's there.
    The log should of course also be deleted, but this is not significantly quicker
    as with any other passive trace.
    
    If done correctly, you'll most likely raise a few ranks as it's the highest
    ranked action in the Uplink community and you are able to spend the money. If
    unsuccesful with deleting the statements in time you'll be disavowed within the
    minute.
    
    This is not really an easter egg, but I didn't want to leave it out of my main
    guide completely. I have a seperate guide published about this game mechanic 
    more specifically. As a word of warning, in my opinion you should not use this
    too quickly to get the required funds to get all software, the best Gateway and
    all hardware, it voids the purpose of the game and makes it boring pretty fast.
    
    One addtional note to make is that when you have bank accounts on other banks,
    either for this or to increase active trace time, donate missions can in fact
    target your account. This is extremely lethal, if caught by surprise you'll
    simply be disavowed without warning a minute later.
    _______________________________________________________________________________
    _______________________________________________________________________________
    
    -------------------------------------------------------------------------------
    12.0   Credits
    -------------------------------------------------------------------------------
    - I thank Introversion for creating the game and publishing it in Europe.
    - I thank GameFAQs for posting.
    
    v1-v2 credits
    =============
    - I thank Christoffer C. for notifying me of the LAN_Force typo.
    - I thank GameFAQs User Alex for notifying me on two useful additions:
      - 'readwrite' accounts stay undetected with a monitor bypass.
      - Decyphers stay undetected with a monitor bypass.
      
    v2 credits
    ==========
    - N/A.
    
    If there are any questions, improvements, additional info or info I forgot, 
    get in this list my mailing me at:
    
    arnomiddelkoop_1@hotmail.com
    
    Yours truly,
    Arno "TheaN" Middelkoop
    
    Copyright 2004-2016 Arno Middelkoop

    FAQ Display Options: Printable Version