This page describes Oldos hacking, which has been completely replaced by Novos. The mechanics referred to here are no longer part of the game. For an overview of how it works now, see hacking. |
There are several known (and some under debate) types of websites that you can hack.
Finding New Sites
Originally, you could find low security sites with a target search and higher level sites with an intrusive search. More ways to find sites have been added since then.
For details, see searches.
Identifying Sites
The name of a site often gives enough information to determine what kind of site it is, at least in general. Failing that, seeing which actions become available at different access levels can help - note that a given website type always has the same order for hacking options. For example, an advertising agency always has public files on level 1, sabotage on level 2, secure files on level 3, etc. (This is assuming that the site is high enough level to have all these options - only the highest-security versions of a given site type will have all of the listed actions available.) See the Available Actions column below for other sites.
Website Type/Subtype | Available Actions (by Required Access Level) | Uniquely Identifying Name Components |
---|---|---|
- Advertising Agency | Browse public files (1) Enact sabotage (2) Browse secure files (3) Steal funds (4) Browse hidden files (6) |
"Ad", "(Tele)Marketing", "(Sh)outreach" |
-Antiques Shop: - Antique Weapons Shop - Junk Shop - Vintage Clothing |
Browse public files (1) Reroute shipment (2) Steal funds (3) Browse secure files (4) Browse hidden files (6) |
"Beloved?", "Antiques", "Junk", "Memories", "Memento", "Nostalgia", "Rags"?, "Treasures", "Used" |
- Blog: - Poetry Blog - Science Blog - Sports Blog - Survivalist Site |
Browse public files (1) Browse secure files (2) Browse hidden files (3) |
"Blag", "(Shout)Blog", "Board"?, "Chamber", "Comm(shout)", "Diary", "Echo", "Feed", "Getaway", "Home", "Journal", "Mirror", "Nest"?, "Page", "Personal Site", "Rambling", "Reflection", "<Name's> Site", "Stream", "Suppositions"?, "Thoughts", "Tide", "Tube"?, "Vanity Site", "Voice", "Shout" |
Goods Companies: | (Varies: see individual site type) | "Engineering" "(Consumer/Dry) Goods", "Materials", "Parts", "Processing", "Products" |
- Consumer Goods: - Food Store - Clothing Store - Toy Store - Candy Store |
Browse public files (1) Reroute shipment (2) Misdirect supplies (3) Steal funds (4) |
"Consumer Goods", "Treats", "Dry Goods" ? |
- Electronics Supply | Browse public files (1) Reroute shipment (2) Steal funds (3) Misdirect supplies (4) Browse hidden files (6) |
"Circuitry", "Electronics" |
- Materials Supplier | Browse public files (1) Enact sabotage (2) Misdirect supplies (3) Reroute shipment (4) Browse hidden files (6) |
"Industries", "Production", "Products and Services" |
- Software Company | Browse public files (1) Misdirect supplies (2) Browse secure files (3) Steal funds (4) Browse hidden files (6) |
"Codesmiths", "Consultants", "Consulting", "Modules", "Software" |
Formatted Sites: - Formatted Site |
Browse public files (1) Browse secure files (2) Browse hidden files (3) |
(Has low-level icon and "maddening" message) |
(NB: the following terms appear to be shared by multiple website types, but most are probably not universal to all. More testing may narrow down some of these terms to certain types of sites:
Acclaimed, Adult, Amalgamated, Approved, Authentic, Award-Winning, Barrel, Beyond Belief, Bleeding Edge, Bunker, Carnival, Complete, Crypt, Den, Depot, Emporium, Epic, Famous, Festival, Five Star, Font, Four Star, Guerilla, Inc., National, of the Future, of Today, of Tomorrow, Remix, Services, Source, Super, Teen, Trendsetting, Vanity?, Warehouse, WarRetro, Wicked … and others)
Certain actions are available on any type of web site:
Action | Access Required | Notes |
---|---|---|
Elevate Privileges | Any except full control | Fight defender(s) to increase access |
Browse Security Logs | Level 5 or full control, whichever is lowest | |
Cancel Alert | Level 5 or full control, whichever is lowest | Requires Eavesdropping Tools, Network Interpreter, or Network Scan |
Trash System | Full Control | Requires Data Scrubber; removes system from you target list |
Site Message
Sites have the following messages when viewing them.
First, an image:Site size (maximum access level) | ||
---|---|---|
1-3 | 4-6 | 4-6 with level 4+ access |
Access | Message |
---|---|
No access* | Your avatar floats within [site name]. |
No access, unknown condition | Your avatar floats over the circuitry-covered building representing [site name]. All's quiet, but you can see lines of data zipping along beneath you. |
Some access | Your avatar floats over the circuitry-covered building representing [site name], watching over the data zipping in and out of the system. The faint hum of moving data echoes from your computer's speakers. |
Full access - 1* | Your avatar floats within [site name]. From what you can determine, only one final access lock seperates you from total control of the system. |
Full access - 1, unknown condition | Your avatar floats within [site name]. From what you can determine, only one final access lock seperates you from total control of the system. The faint hum of moving data echoes from your computer's speakers. |
Full access | Your avatar has merged with [site name]. The system bends to your every command. You have complete control. |
Full access, unknown condition | Your avatar has merged with [site name]. The system bends to your every command. You have complete control. The faint hum of moving data echoes from your computer's speakers. |
* The "No Access" message takes priority over the "Full Access - 1" message. On sites with just one level, it doesn't say that one level separates you from total control.
And then, if part of a network:Network | Message |
---|---|
Infected/relayed (other gang) | Staccato bursts of static echo from your computer's speakers, making the site sound like it's at the center of a gunfight. It almost manages to drown out the complex stream of data, flowing beneath the surface. |
Relayed & hub (other gang) | A steady rhythm of data traffic echoes from your computer's speakers, identifying it as a hub in someone's network. |
Relayed (your gang) | A familiar rhythm of static echoes from your computer's speakers, identifying it as part of your gang's network. It almost manages to drown out the complex stream of data, flowing beneath the surface. |
Relayed (your network) | A familiar rhythm of static echoes from your computer's speakers, identifying it as part of your network. It almost manages to drown out the complex stream of data, flowing beneath the surface. |
Majorly infected site | Maddening bursts of static echo from your computer's speakers, accompanied by strange hitches and stutters in the visual. Tangled streams of data spasm, merge, and separate in time with the echoing static. |
Relayed majorly infected (your gang) | You recognize a few of the countless streams as connecting back to your gang's network. The rest are anyone's guess. |
Relayed majorly infected (your network) | You recognize a few of the countless streams as connecting back to your network. The rest are anyone's guess. |
And then, if you have a network interpreter, it displays the current alert level.
High Security Sites
Sites with 6 levels of access are "High-Security Sites". These are notable for having shiny awesome unspaded content and hidden files. They can be identified by the fact that the "Browse security logs" and "Cancel alert" actions become available at access level 5, before full control is gained. Also, Intercept Data sometimes fails in combat for their control, though this is unreliable.
Known High Security Sites
See Also: website titles
History
The majorly infected message used to be:
Maddening bursts of static echo from your computer's speakers, accompanied by strange hitches and stutters in the visual. It almost manages to drown out the complex stream of data, flowing beneath the surface.