Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:dojo:wiki:exploration-guide [2018/05/24 21:10] – [T1] Ishido Kindesai | public:dojo:wiki:exploration-guide [2025/03/09 16:16] (current) – [Pathfinder] Remove link to Pathfinder Tian Khamez | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | |||
======Exploration Guide====== | ======Exploration Guide====== | ||
+ | < | ||
+ | <col md=" | ||
+ | {{INLINETOC 2-2}} | ||
+ | </ | ||
+ | </ | ||
+ | < | ||
+ | {{ https:// | ||
+ | < | ||
+ | <fs large> | ||
- | {{INLINETOC: | + | Created by Ruxe Nemico |
+ | </ | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
Line 21: | Line 33: | ||
It is vital to know that there are certain systems that are off-limits for members of Brave to explore in. | It is vital to know that there are certain systems that are off-limits for members of Brave to explore in. | ||
- | <fs large> | + | <fs large> |
=====TL; | =====TL; | ||
Line 45: | Line 57: | ||
* Astrometric Rangefinding (+5%/lvl scan probe strength) | * Astrometric Rangefinding (+5%/lvl scan probe strength) | ||
* Astrometric Aquisition (+5/lvl scan prob duration) | * Astrometric Aquisition (+5/lvl scan prob duration) | ||
- | * Astrometrice | + | * Astrometrics |
Line 60: | Line 72: | ||
- | You can import the fits from below to EVE by copying the text (including the [Heron, Heron scanner] part at the top), then opening the fitting window in EVE, clicking on " | + | You can import the fits from below to EVE by copying the text (including the [Ship, Name] part at the top), then opening the fitting window in EVE, clicking on " |
+ | |||
+ | ====T1 / Low Skill==== | ||
+ | |||
+ | Although we originally provided fits for all factions, we now strongly suggest the Heron for T1 explo exclusively. Now anyone can fly it regardless of faction, and it's a short train. | ||
+ | |||
+ | The slot layout on the heron makes it the most recommended T1 explo frigate. Being able to fit two rangefinding arrays will make life easier for scanning with low sp characters. Alpha characters who are unable to fit a cloak can just remove it. The ship remains quite cost effective (especially considering dojo hands them out for free). | ||
+ | |||
+ | It should be noted that Sisters Core Probes can be used with any launcher including the basic one. These probes should be the first upgrade you make on your Exploratory vessel. | ||
- | ====T1==== | ||
^ Low Skill T1 Explo^ | ^ Low Skill T1 Explo^ | ||
| < | | < | ||
Line 74: | Line 93: | ||
Relic Analyzer I | Relic Analyzer I | ||
Data Analyzer I | Data Analyzer I | ||
- | Cargo Scanner | + | Scan Rangefinding Array I |
Scan Rangefinding Array I | Scan Rangefinding Array I | ||
Line 86: | Line 105: | ||
</ | </ | ||
- | |Although we originally provided fits for all factions, we now strongly suggest | + | ====T2 / CovOps==== |
+ | Unless you want to scare off other explorers or want some additional safety, the T2 Exploration Frigates are the next logical steps after the T1 frigate. They offer the huge advantage | ||
- | The slot layout on the heron makes it the most recommended T1 explo frigate. Being able to fit two rangefinding arrays will make life easier | + | These fits are meant to work for the majority of players |
- | ====T2==== | + | |
- | Unless you want to scare off other explorers or want some additional safety, the T2 Exploration Frigates | + | |
- | Another option when it comes to T2 frigates are Interceptors. They don't have a bonus towards exploration, but can be fit to be "insta-warp" (align time of less than 2s) and are bubble immune, so for null sec exploration they have a certain advantage. If you specialise in one type of exploration (relic or data), then you can use rigs and modules to focus on that and mitigate the lack of a hull bonus a bit. Fits again depend on your skills (especially for the align time), so you will have to find out on your own what works for you.\\ Interceptors that can be fit to insta-warp are the Ares, the Raptor, the Stiletto and the Crusader. | + | ^ Ninja Explo Relic Astero |
+ | | < | ||
+ | Nanofiber Internal Structure II | ||
+ | Inertial Stabilizers II | ||
+ | Type-D Restrained Overdrive Injector | ||
+ | ' | ||
- | ====Sisters of Eve==== | + | Relic Analyzer I |
- | The SoE ships are faction ships, making them much more expensive that normal T1 and T2 ships of the same size. They do offer some advantages, like a non-level-based bonus on your scanning (however if you train the T2 frigates to five they will have a higher bonus) and more safety, since they feature some defensive capabilities. The Astero, the SoE frigate, also can be fit to insta-warp very easily. Since the ships are drone boats, they can easily kill other explorers (and are often used by hunters who just take an interest in killing them) so you will be able to secure sites you otherwise would not get. | + | 5MN Microwarpdrive II |
+ | Scan Rangefinding Array I | ||
+ | Scan Rangefinding Array I | ||
- | The downside of the Astero | + | Core Probe Launcher I |
+ | Covert Ops Cloaking Device II | ||
+ | |||
+ | Small Low Friction Nozzle Joints I | ||
+ | Small Polycarbon Engine Housing I | ||
+ | Small Emission Scope Sharpener I | ||
+ | |||
+ | |||
+ | |||
+ | Hornet EC-300 x15 | ||
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | |||
+ | </ | ||
+ | Nanofiber Internal Structure II | ||
+ | Inertial Stabilizers II | ||
+ | Damage Control II | ||
+ | Warp Core Stabilizer II | ||
+ | |||
+ | Relic Analyzer II | ||
+ | 5MN Microwarpdrive II | ||
+ | Scan Rangefinding Array I | ||
+ | Cargo Scanner II | ||
+ | |||
+ | Sisters Core Probe Launcher | ||
+ | Covert Ops Cloaking Device II | ||
+ | |||
+ | Small Hyperspatial Velocity Optimizer II | ||
+ | Small Low Friction Nozzle Joints II | ||
+ | Small Gravity Capacitor Upgrade I | ||
+ | |||
+ | |||
+ | |||
+ | Hornet EC-300 x15 | ||
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | Nanite Repair Paste x85 | ||
+ | |||
+ | </ | ||
+ | | | ||
+ | The Astero, | ||
+ | |||
+ | ^ Buzzard | ||
+ | |< | ||
+ | Inertial Stabilizers II | ||
+ | Micro Auxiliary Power Core II | ||
+ | Inertial Stabilizers II | ||
+ | |||
+ | 5MN Microwarpdrive II | ||
+ | Relic Analyzer I | ||
+ | Data Analyzer I | ||
+ | Scan Rangefinding Array I | ||
+ | Scan Rangefinding Array I | ||
+ | |||
+ | Core Probe Launcher I | ||
+ | Covert Ops Cloaking Device II | ||
+ | Interdiction Nullifier I | ||
+ | |||
+ | Small Gravity Capacitor Upgrade I | ||
+ | Small Gravity Capacitor Upgrade I | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | </ | ||
+ | Inertial Stabilizers II | ||
+ | Warp Core Stabilizer II | ||
+ | Nanofiber Internal Structure II | ||
+ | Nanofiber Internal Structure II | ||
+ | |||
+ | 5MN Microwarpdrive II | ||
+ | Data Analyzer I | ||
+ | Relic Analyzer I | ||
+ | Scan Rangefinding Array I | ||
+ | |||
+ | Core Probe Launcher I | ||
+ | Covert Ops Cloaking Device II | ||
+ | Interdiction Nullifier I | ||
+ | |||
+ | Small Gravity Capacitor Upgrade I | ||
+ | Small Gravity Capacitor Upgrade I | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | |||
+ | </ | ||
+ | |||
+ | ^ Cheetah | ||
+ | |< | ||
+ | Micro Auxiliary Power Core I | ||
+ | Warp Core Stabilizer II | ||
+ | Inertial Stabilizers II | ||
+ | Inertial Stabilizers II | ||
+ | |||
+ | 5MN Y-T8 Compact Microwarpdrive | ||
+ | Data Analyzer I | ||
+ | Relic Analyzer I | ||
+ | Scan Rangefinding Array I | ||
+ | |||
+ | Core Probe Launcher I | ||
+ | Covert Ops Cloaking Device II | ||
+ | Interdiction Nullifier I | ||
+ | |||
+ | Small Gravity Capacitor Upgrade I | ||
+ | Small Gravity Capacitor Upgrade I | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | </ | ||
+ | Inertial Stabilizers II | ||
+ | Warp Core Stabilizer II | ||
+ | Nanofiber Internal Structure II | ||
+ | |||
+ | 5MN Microwarpdrive II | ||
+ | Relic Analyzer I | ||
+ | Data Analyzer I | ||
+ | Scan Rangefinding Array I | ||
+ | Scan Rangefinding Array I | ||
+ | |||
+ | Core Probe Launcher I | ||
+ | Covert Ops Cloaking Device II | ||
+ | Interdiction Nullifier I | ||
+ | |||
+ | Small Gravity Capacitor Upgrade I | ||
+ | Small Emission Scope Sharpener I | ||
+ | |||
+ | |||
+ | |||
+ | Hornet EC-300 x1 | ||
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | |||
+ | Another option when it comes to T2 frigates | ||
- | The bigger version of the Astero is the Stratios. It is cruiser sized, has much more tank, dps and a larger cargohold, enabling it to carry multiple refits and more cargo. | ||
- | It can also be used as a pure combat ship, but for the purpose of this guide we will stick with the exploration role. The Stratios can fit a covops cloak like the Astero and the T2 frigates and can force any of them out of a site. It presents the next step up over the astero in that regards. | + | **Note: Interceptors are not inherently immune to warp bubbles after the May 2021 nullification changes, they need Interdiction Nulifier module equipped. Brave Dojo has a good YouTube video on this topic [[https:// |
- | The third ship in the SoE line is the Nestor. It is a battleship, and while it has an exploration bonus, usually isn't used for exploration (excluding some special cases where you have a Sleeper Chache close to you and can use a Nestor to easily run it. The Nestor has too many downsides to be used in exploration, | ||
====T3==== | ====T3==== | ||
Line 112: | Line 280: | ||
=====When & Where to Explore===== | =====When & Where to Explore===== | ||
- | When you do exploration you can do it in any part of New Eden (taking [[https:// | + | When you do exploration you can do it in any part of New Eden (taking [[/ |
Where to explore is mostly up to taste, skills & the ship you use among other things. | Where to explore is mostly up to taste, skills & the ship you use among other things. | ||
Line 120: | Line 288: | ||
When you are a bit more experienced, | When you are a bit more experienced, | ||
+ | Here is a link that can help you decide where to explore if you want the best isk/site ratio, but keep in mind that others are aware of this information as well, so the most lucritive places will have higher competition and camped more often than others. | ||
+ | |||
+ | https:// | ||
+ | |||
+ | This link also contains data abaut where to find which T2 salvage material if you want to hunt for specific ones. | ||
====Optimal Time==== | ====Optimal Time==== | ||
Line 145: | Line 318: | ||
==NULL SEC== | ==NULL SEC== | ||
Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone' | Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone' | ||
- | |||
- | ==BRAVE SPACE== | ||
- | |||
- | The best places to explore are Catch itself (not in GE since at any given time there may be hunters) and Stain. Stain is more dangerous as an NPC null sec area but the rewards can be great. | ||
==NPC NULL SPACE== | ==NPC NULL SPACE== | ||
Line 194: | Line 363: | ||
In Wormhole Systems, you will find an entirely different type of sites (sometimes in addition to standard sites). Those have rats in them and require more than a T1 frigate to run. | In Wormhole Systems, you will find an entirely different type of sites (sometimes in addition to standard sites). Those have rats in them and require more than a T1 frigate to run. | ||
- | In Drone Regions you won't find Relic sites. The Data Sites have loot that is completely different from all other space. While they can drop valuable Items, in general you won't find enough of them to make up for thir rarity. | + | In Drone Regions you won't find Relic sites. The Data Sites have loot that is completely different from all other space. While they can drop valuable Items, in general you won't find enough of them to make up for their rarity. |
====Planning a Route==== | ====Planning a Route==== | ||
Line 227: | Line 396: | ||
====Standing Fleet==== | ====Standing Fleet==== | ||
- | If you're exploring in Catch it's a good idea to join standing fleet. This way if you're pointed, you may increase your chances of survival by calling out xxx's to standing. | + | If you're exploring in our space it's a good idea to join regional |
- | Make sure to include your ship type and what's attacking you. A difficult | + | Make sure to include your ship type and what's attacking you. A difficult |
====Comms==== | ====Comms==== | ||
Line 237: | Line 406: | ||
====Intel Chat Channels==== | ====Intel Chat Channels==== | ||
- | Sign in to the intel chat channel for the region. We have 2: Int.Catch & Int.Impass. | + | Sign in to the intel chat channel for the region. We have 1 currently: <fc # |
* Look around the channel to see if a system is trouble. | * Look around the channel to see if a system is trouble. | ||
* You can report neut and hostile sightings | * You can report neut and hostile sightings | ||
* Drag the name from local | * Drag the name from local | ||
- | * Drag the system from the system name on the top left of your clie | + | * Drag the system from the system name on the top left of your client |
* Drag the ship type from D-scan. | * Drag the ship type from D-scan. | ||
* If your D-scan does not pick up the ship, put NV for No Visual | * If your D-scan does not pick up the ship, put NV for No Visual | ||
Line 289: | Line 458: | ||
In order to help you save time and enable you to help other explorers, there are tools that provide intel on the various signatures in a system. | In order to help you save time and enable you to help other explorers, there are tools that provide intel on the various signatures in a system. | ||
- | ====Deepsafe==== | ||
- | **https:// | ||
- | |||
- | * Log in with Eve CREST (login). Deepsafe will follow you, loading to your current system when you jump. | ||
- | * To the right of the map is a list of the signatures in the system that people have logged and a description of what they are. Be advised the list may not be current. | ||
- | * To remove a signature that no longer exists, click the delete button for that line item (x). | ||
- | * To add a signature, scan it to 75%, copy it from your probe scanner panel (CTRL-C), paste in the form (CTRL-V) and click submit. | ||
====Pathfinder==== | ====Pathfinder==== | ||
- | |||
- | **https:// | ||
* Scan signature until you know what it is. | * Scan signature until you know what it is. | ||
Line 359: | Line 519: | ||
* Drag the probes closer to the signature individually. You will need to move 7 probes (5 around, 1 on top & 1 on bottom). | * Drag the probes closer to the signature individually. You will need to move 7 probes (5 around, 1 on top & 1 on bottom). | ||
* Do not move them too close, or you will create a void pocket where no scan signal will reach. | * Do not move them too close, or you will create a void pocket where no scan signal will reach. | ||
+ | |||
+ | More experienced explorers should be aware that no signature will ever spawn further than 4 AU from a celestial object, which is coincidentally the default positioning of probes when you launch them. | ||
+ | |||
+ | To utilise this, in your system map (default key is F9), in top left corner open options and deselect everything. After that you will see that there are white dots on that map, those are celestials like planets and moons. Position your probes centered on celestial that is either inside or in close proximity to Signature bubble. This will shorten your scan time for usually 2 scans. | ||
=====Warping to Sites==== | =====Warping to Sites==== | ||
Line 391: | Line 555: | ||
On activating the appropriate module on the can, the hacking interface will come up. | On activating the appropriate module on the can, the hacking interface will come up. | ||
- | {{http://imgur.com/ | + | {{https://raw.githubusercontent.com/ |
- | At the bottom left is your hacking virus status. The bottom number & the meter to the left is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the right is your coherence (health). This can be hurt by hostile nodes & the system core. | + | At the bottom left is your hacking virus status. The bottom number & the meter to the right is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the left is your coherence (health). This can be hurt by hostile nodes & the system core. |
Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected. | Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected. | ||
- | {{https://i.imgur.com/ | + | {{https://raw.githubusercontent.com/ |
As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core. | As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core. | ||
Line 406: | Line 570: | ||
All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites. | All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites. | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==HOSTILE NODES== | ==HOSTILE NODES== | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==UTILITY SUBSYSTEMS== | ==UTILITY SUBSYSTEMS== | ||
Line 422: | Line 586: | ||
The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it. | The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it. | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks | | ^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks | | ||
==DATA CACHES== | ==DATA CACHES== | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==SYSTEM CORE LOCATION== | ==SYSTEM CORE LOCATION== | ||
- | The system core can be anywhere - in the middle of nowhere blocked by layers of hostile nodes or even right next to your starting point! Often, however, it is located | + | The system core can be anywhere - but there is still some logic behind it. If your starting point is in the corner |
+ | However, if you spawn in the middle, there is no logic used, the core can be anywhere. | ||
==THE RULE OF 6== | ==THE RULE OF 6== | ||
Line 440: | Line 605: | ||
You will sometimes find a node surrounded by 6 other nodes (as can be seen in the hacking interface above among the as-of-yet unavailable nodes). It is **very likely, though by no means guaranteed** that the center node is safe. You may even find a path made by nodes surrounded by 6 other nodes that provide you (probably) safe passage to where you want to go in the hack. If you do encounter a defensive subsystem in a center node (like a firewall), then the system core will always be adjacent to that subsystem. | You will sometimes find a node surrounded by 6 other nodes (as can be seen in the hacking interface above among the as-of-yet unavailable nodes). It is **very likely, though by no means guaranteed** that the center node is safe. You may even find a path made by nodes surrounded by 6 other nodes that provide you (probably) safe passage to where you want to go in the hack. If you do encounter a defensive subsystem in a center node (like a firewall), then the system core will always be adjacent to that subsystem. | ||
+ | |||
+ | A small side note, if you ever encounter Secondary Vector Utility, it means you have a Virus Suppressor somewhere. Try to save it for that nasty thing. | ||
+ | |||
+ | It should also be mentioned that, after using Secondary Vector Utility you don't have to click on that node second or third time for it to apply damage. You can simply click on other nodes. | ||
====Failing a Can==== | ====Failing a Can==== | ||
Line 475: | Line 644: | ||
====Selling Loot==== | ====Selling Loot==== | ||
- | You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at https:// | + | You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at [[/public/alliance/industry/buyback]]. |
- | If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at https:// | + | If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at [[/ |
=====Site Respawn===== | =====Site Respawn===== | ||
Line 503: | Line 672: | ||
==LIMITED== | ==LIMITED== | ||
- | After you scan out the site, you will warp to the first room. Here you will see a can and an acceleration gate. Hack the can. | + | After you scan out the site, you will warp to the first room. Here you will see a can and an acceleration gate. Hack the can. (if you fail this hack, a 2 minute timer will start, after which the can will explode) |
\\ | \\ | ||
\\ | \\ | ||
Line 521: | Line 690: | ||
* Apply as you would any other signature | * Apply as you would any other signature | ||
* Once you enter the wormhole, you can apply the system designation by clicking on " | * Once you enter the wormhole, you can apply the system designation by clicking on " | ||
- | |||
- | ==DEEPSAFE== | ||
- | |||
- | Apply as you would any other signature | ||
- | |||
- | ==BRAVE HOLE SCOUTS SCANNING REWARD== | ||
- | |||
- | Brave Hole Scouts offers a **10 million ISK reward** for C5 holes in Catch submitted to Pathfinder. | ||
- | |||
- | This is to encourage reporting of C5 wormholes. This is important as hostiles can send a significant force against us through via the wormhole. It also alerts people who want to form wormhole krabbing fleets of the availability of the wormhole. | ||
- | |||
- | * Join the Brave Hole Scouts mailing list | ||
- | * On the bottom left of your mail panel click "Add Mailing List" | ||
- | * Enter "Brave Hole Scouts" | ||
- | * Apply the wormhole signature to Pathfinder | ||
- | * Enter hole, apply system, scan down all anomalies in the system & apply them to Pathfinder | ||
- | * Send an Eve-mail to Brave Hole Scouts with the wormhole information | ||
- | |||
- | You are entitled to payouts whether or not the wormhole is used. | ||
- | |||
- | Wormholes in the 9KOE-A -> HED-GP pipe are not accepted. | ||
====Wormhole Safety==== | ====Wormhole Safety==== | ||
Line 566: | Line 714: | ||
If you are not prepared to kill rats (some really strong) you should only do the faction sites. Those are the sites with one of the rat types in the name (like Sansha or Guerista). The other sites have rats that may melt your face. | If you are not prepared to kill rats (some really strong) you should only do the faction sites. Those are the sites with one of the rat types in the name (like Sansha or Guerista). The other sites have rats that may melt your face. | ||
+ | |||
+ | =====Site Safety Check Cheat Sheet===== | ||
+ | A quick cheat sheet for evaluating site danger based on the location name. Location name can be seen once the site is scanned at least 75%. | ||
+ | This chart was borrowed and adapted from an [[https:// | ||
+ | |||
+ | {{https:// | ||
+ | |||
=====Related Activities===== | =====Related Activities===== | ||