Formatted Site

Note: This page refers to Oldos hacking, and no longer exists in the game.

Formatted sites can be identified because they have the low-level site icon:

MatrixBuilding.jpg

but have this message when viewed:

Maddening bursts of static echo from your computer's speakers, accompanied by strange hitches and stutters in the visual. It almost manages to drown out the complex stream of data, flowing beneath the surface.

Formatted sites are created from an infected level 1-3 site using a viral formatter.
Defenders at each access level will be one or more copies of The Virus.

Actions

Action Access Alert* Notes
Elevate Privileges - variable
Browse Security Logs Full control/Level 3 0
Cancel Alert Full control/Level 5 5 Allowed safely 2/4 times
Browse Public Files Level 1 5/8
Browse Secure Files Level 2 ?
Browse Hidden files Level 3 ? Requires deep file scan
Apply relay code Full control/Level 3 20
Follow data stream Full control/Level 3 5
Log out - 1/3 Alert = site level?

* Incognito reduces this - see Alert level for details.

Browse Public Files

This entire site seems to be packed with useless gibberish. It's random enough that it might be a cypher, but after poring over the data, all you have to show for it is a creeping sense of boredom.

You've earned 3 XP in Perception

Or, with Studious Nature:
This entire site seems to be packed with useless gibberish. It's random enough that it might be a cypher, but after poring over the data, all you have to show for it is new insights into human interaction with chaos.

You've earned 6 XP in Perception

This entire site seems to be packed with useless gibberish. It's random enough that it might be a cypher, but after poring over the data, all you have to show for it is a headache.

You've earned 3 XP in Will

Browse Secure Files

Amid the sea of encrypted data, you find a bit that's behind a security wall but unencrypted. It's probably part of the virus that's infected this site.

You found 3 of: file interface, viral code, automation routine, networking code

Or, the following line, followed by one of the following:

Behind the basic security locks that the virus has left in place, you find a pool of partially-encrypted data. From what you can tell, it's just audio of people talking to one another.

The conversations themselves are ordinary enough, but they seem to be directed here from other sites. You manage to copy one link out of the data before another pass of encryption renders everything to gibberish.

(gain 1 link to uninfected site), or:
The link leads to an abandoned, dead site. Hmmmm.

The conversations themselves are ordinary enough, but they seem to be directed here from other sites. You copy out a handful of links before another pass of encryption reduces everything to gibberish.

(gain 2-3 links to uninfected sites)

The conversations themselves are ordinary although some of them trace back to someone named <Name of somebody who has been talking to 05Cleaner>, which is a little weird.

You've earned 4 XP in Perception

The conversations themselves are ordinary… although some just seem ordinary because they're conversations you've had recently.

You've earned 4 XP in Perception

Apply Antiviral Patch (special)

You apply the patch which rapidly spreads through the site, removing viral data. By the time it's done, there's nothing left of <site name> but a faint echo.

(Same as data scrubber)

Browse Hidden Files (requires Deep File Scan)

Deep in the recesses of the infected site, you find a few hidden directories that seem to be handling the actual processing.

And then one of:

You copy over the files that look like they might be useful.

You found: automation routine, file interface, infection attempts, or viral code

It seems to be mostly logs of bad access attempts on other sites. You copy them down for reference.

You found: infection attempts

It's quite a treasure trove, really.

You found 11-13(?) of: automation routines, pieces of viral code, lists of infection attempts, file interfaces, versions of networking code

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License