public:dojo:wiki:exploration-guide

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:dojo:wiki:exploration-guide [2019/11/03 02:35]
Aernir Ridley
public:dojo:wiki:exploration-guide [2023/07/21 20:14] (current)
Tian Khamez [Selling Loot]
Line 33: Line 33:
 It is vital to know that there are certain systems that are off-limits for members of Brave to explore in. It is vital to know that there are certain systems that are off-limits for members of Brave to explore in.
  
-<fs large>**<fc #ff0000>If you are in Brave, please read [[/member/alliance/military/standing_orders#exploration_in_and_around_catch|our standing orders page]] before heading out to explore!</fc>**</fs>+<fs large>**<fc #ff0000>If you are in Brave, please read [[/member/alliance/military/standing_orders#exploration|our standing orders page]] before heading out to explore!</fc>**</fs>
  
 =====TL;DR===== =====TL;DR=====
Line 57: Line 57:
   * Astrometric Rangefinding (+5%/lvl scan probe strength)   * Astrometric Rangefinding (+5%/lvl scan probe strength)
   * Astrometric Aquisition (+5/lvl scan prob duration)   * Astrometric Aquisition (+5/lvl scan prob duration)
-  * Astrometrice (+5%/lvl scan strength, -5%/lvl scan probe time, -5%/lvl scan deviation)+  * Astrometrics (+5%/lvl scan strength, -5%/lvl scan probe time, -5%/lvl scan deviation)
  
  
Line 79: Line 79:
  
 The slot layout on the heron makes it the most recommended T1 explo frigate. Being able to fit two rangefinding arrays will make life easier for scanning with low sp characters. Alpha characters who are unable to fit a cloak can just remove it. The ship remains quite cost effective (especially considering dojo hands them out for free). The slot layout on the heron makes it the most recommended T1 explo frigate. Being able to fit two rangefinding arrays will make life easier for scanning with low sp characters. Alpha characters who are unable to fit a cloak can just remove it. The ship remains quite cost effective (especially considering dojo hands them out for free).
 +
 +It should be noted that Sisters Core Probes can be used with any launcher including the basic one. These probes should be the first upgrade you make on your Exploratory vessel. 
  
 ^ Low Skill T1 Explo^ ^ Low Skill T1 Explo^
Line 104: Line 106:
 </code> | </code> |
 ====T2 / CovOps==== ====T2 / CovOps====
-Unless you want to scare off other explorers or want some additional safety, the T2 Exploration Frigates are the next logical steps after the T1 frigate. They offer the huge advantage of a Covops Cloak. This cloak is an upgrade over the normal cloaks used with the T1 ships and allows you to warp while cloaked, making it very hard to catch you (Big gatecamps with bubbles are still a danger to avoid). As such, we focused on stealth and/or the ability to escape over tank. Specialization is key and it's best to focus on a fit's strengths whether based on the hull's boosts or the fit's purpose.+Unless you want to scare off other explorers or want some additional safety, the T2 Exploration Frigates are the next logical steps after the T1 frigate. They offer the huge advantage of a CovOps Cloak. This cloak is an upgrade over the normal cloaks used with the T1 ships and allows you to warp while cloaked, making it very hard to catch you (Big gatecamps with bubbles are still a danger to avoid). As such, we focused on stealth and/or the ability to escape over tank. Specialization is key and it's best to focus on a fit's strengths whether based on the hull's boosts or the fit's purpose.
  
 These fits are meant to work for the majority of players who are flying CovOps for exploration. There are upgrades you could make but they generally come at increased SP or ISK requirements. If you can run T2 Relic or Data analyzers, T2 scanning rigs or are willing to put out isk for a Sister’s Core Probe Launcher, it can boost your explo returns.  These fits are meant to work for the majority of players who are flying CovOps for exploration. There are upgrades you could make but they generally come at increased SP or ISK requirements. If you can run T2 Relic or Data analyzers, T2 scanning rigs or are willing to put out isk for a Sister’s Core Probe Launcher, it can boost your explo returns. 
Line 111: Line 113:
 | <code>[Astero, Ninja Explo Relic Astero] | <code>[Astero, Ninja Explo Relic Astero]
 Nanofiber Internal Structure II Nanofiber Internal Structure II
-'Halcyon' Core Equalizer I +Inertial Stabilizers II 
-'Halcyon' Core Equalizer I+Type-D Restrained Overdrive Injector
 'Halcyon' Core Equalizer I 'Halcyon' Core Equalizer I
  
Line 126: Line 128:
 Small Polycarbon Engine Housing I Small Polycarbon Engine Housing I
 Small Emission Scope Sharpener I Small Emission Scope Sharpener I
 +
 +
  
 Hornet EC-300 x15 Hornet EC-300 x15
  
-Sisters Core Scanner Probe x16</code> | <code>[Astero, Ninja Explo InstaWarp Relic Astero] +Sisters Core Scanner Probe x16 
-Nanofiber Internal Structure II+ 
 + 
 +</code> | <code>[Astero, Ninja Explo InstaWarp Relic Astero]
 Nanofiber Internal Structure II Nanofiber Internal Structure II
-Warp Core Stabilizer II+Inertial Stabilizers II 
 +Damage Control II
 Warp Core Stabilizer II Warp Core Stabilizer II
  
Line 144: Line 151:
  
 Small Hyperspatial Velocity Optimizer II Small Hyperspatial Velocity Optimizer II
-Small Hyperspatial Velocity Optimizer II+Small Low Friction Nozzle Joints II
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
 +
 +
  
 Hornet EC-300 x15 Hornet EC-300 x15
  
 +Sisters Core Scanner Probe x16
 Nanite Repair Paste x85 Nanite Repair Paste x85
-Sisters Core Scanner Probe x16 </code>+ 
-| The Astero, according to many, is the quintessential explo frigate. It is certainly one of the purposes for which CCP created it. With boosts to scanning, hacking and, of course, CovOps cloak, it's easy to see why. You can swap one of the mids (cargo scanner or a rangefinder array) with a data analyzer if you would like.||+</code>
 + 
 +The Astero, according to many, is the quintessential explo frigate. It is certainly one of the purposes for which CCP created it. With boosts to scanning, hacking and, of course, CovOps cloak, it's easy to see why. You can swap one of the mids (cargo scanner or a rangefinder array) with a data analyzer if you would like.
  
 ^ Buzzard                             ^ Anathema ^ ^ Buzzard                             ^ Anathema ^
 |<code>[Buzzard, Buzzard CovOps Scanning Fit] |<code>[Buzzard, Buzzard CovOps Scanning Fit]
-Nanofiber Internal Structure II+Inertial Stabilizers II
 Micro Auxiliary Power Core II Micro Auxiliary Power Core II
 +Inertial Stabilizers II
  
 5MN Microwarpdrive II 5MN Microwarpdrive II
Line 166: Line 179:
 Core Probe Launcher I Core Probe Launcher I
 Covert Ops Cloaking Device II Covert Ops Cloaking Device II
-Salvager I+Interdiction Nullifier I
  
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
  
-Sisters Core Scanner Probe x16</code> | <code>[Anathema, Anathema CovOps Scanning Fit] + 
-Warp Core Stabilizer II+ 
 + 
 +Sisters Core Scanner Probe x16 
 + 
 +</code> | <code>[Anathema, Anathema CovOps Scanning Fit] 
 +Inertial Stabilizers II
 Warp Core Stabilizer II Warp Core Stabilizer II
 +Nanofiber Internal Structure II
 Nanofiber Internal Structure II Nanofiber Internal Structure II
  
Line 183: Line 202:
 Core Probe Launcher I Core Probe Launcher I
 Covert Ops Cloaking Device II Covert Ops Cloaking Device II
-Salvager I+Interdiction Nullifier I
  
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
 +
 +
 +
  
 Sisters Core Scanner Probe x16 Sisters Core Scanner Probe x16
 +
 +
 </code> | </code> |
  
 ^ Cheetah                            ^ Helios ^ ^ Cheetah                            ^ Helios ^
 |<code>[Cheetah, Cheetah CovOps Scanning Fit] |<code>[Cheetah, Cheetah CovOps Scanning Fit]
-Warp Core Stabilizer II 
-Warp Core Stabilizer II 
 Micro Auxiliary Power Core I Micro Auxiliary Power Core I
 +Warp Core Stabilizer II
 +Inertial Stabilizers II
 +Inertial Stabilizers II
  
 5MN Y-T8 Compact Microwarpdrive 5MN Y-T8 Compact Microwarpdrive
Line 204: Line 229:
 Core Probe Launcher I Core Probe Launcher I
 Covert Ops Cloaking Device II Covert Ops Cloaking Device II
-Salvager I+Interdiction Nullifier I
  
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
  
-Sisters Core Scanner Probe x16</code> | <code>[Helios, Helios CovOps Scanning Fit] + 
-Warp Core Stabilizer II+ 
 + 
 +Sisters Core Scanner Probe x16 
 + 
 +</code> | <code>[Helios, *Helios CovOps Scanning Fit] 
 +Inertial Stabilizers II
 Warp Core Stabilizer II Warp Core Stabilizer II
 Nanofiber Internal Structure II Nanofiber Internal Structure II
Line 222: Line 252:
 Core Probe Launcher I Core Probe Launcher I
 Covert Ops Cloaking Device II Covert Ops Cloaking Device II
 +Interdiction Nullifier I
  
 Small Gravity Capacitor Upgrade I Small Gravity Capacitor Upgrade I
 Small Emission Scope Sharpener I Small Emission Scope Sharpener I
 +
 +
  
 Hornet EC-300 x1 Hornet EC-300 x1
  
-Sisters Core Scanner Probe x16</code>|+Sisters Core Scanner Probe x16 
 + 
 +</code>|
  
  
  
 Another option when it comes to T2 frigates are Interceptors. They don't have a bonus towards exploration, but can be fit to be "insta-warp" (align time of less than 2s) and are bubble immune, so for null sec exploration they have a certain advantage. If you specialise in one type of exploration (relic or data), then you can use rigs and modules to focus on that and mitigate the lack of a hull bonus a bit. Fits again depend on your skills (especially for the align time), so you will have to find out on your own what works for you.\\ Interceptors that can be fit to insta-warp are the Ares, the Raptor, the Stiletto and the Crusader. Another option when it comes to T2 frigates are Interceptors. They don't have a bonus towards exploration, but can be fit to be "insta-warp" (align time of less than 2s) and are bubble immune, so for null sec exploration they have a certain advantage. If you specialise in one type of exploration (relic or data), then you can use rigs and modules to focus on that and mitigate the lack of a hull bonus a bit. Fits again depend on your skills (especially for the align time), so you will have to find out on your own what works for you.\\ Interceptors that can be fit to insta-warp are the Ares, the Raptor, the Stiletto and the Crusader.
 +
 +
 +**Note: Interceptors are not inherently immune to warp bubbles after the May 2021 nullification changes, they need Interdiction Nulifier module equipped. Brave Dojo has a good YouTube video on this topic [[https://youtu.be/lqOeVe8gEw0|Here]].**
  
  
Line 280: Line 318:
 ==NULL SEC== ==NULL SEC==
 Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone's staging system). However, you must still be vigilant and check intel. Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone's staging system). However, you must still be vigilant and check intel.
- 
-==BRAVE SPACE== 
- 
-The best places to explore are Catch itself (not in GE since at any given time there may be hunters) and Stain. Stain is more dangerous as an NPC null sec area but the rewards can be great. 
  
 ==NPC NULL SPACE== ==NPC NULL SPACE==
Line 329: Line 363:
 In Wormhole Systems, you will find an entirely different type of sites (sometimes in addition to standard sites). Those have rats in them and require more than a T1 frigate to run. In Wormhole Systems, you will find an entirely different type of sites (sometimes in addition to standard sites). Those have rats in them and require more than a T1 frigate to run.
  
-In Drone Regions you won't find Relic sites. The Data Sites have loot that is completely different from all other space. While they can drop valuable Items, in general you won't find enough of them to make up for thir rarity.+In Drone Regions you won't find Relic sites. The Data Sites have loot that is completely different from all other space. While they can drop valuable Items, in general you won't find enough of them to make up for their rarity.
  
 ====Planning a Route==== ====Planning a Route====
Line 362: Line 396:
 ====Standing Fleet==== ====Standing Fleet====
  
-If you're exploring in Catch it's a good idea to join standing fleet. This way if you're pointed, you may increase your chances of survival by calling out xxx's to standing.+If you're exploring in our space it's a good idea to join regional standing fleet. This way if you're pointed, you may increase your chances of survival by calling out xxx's to standing.
  
-Make sure to include your ship type and what's attacking you. A difficult think to remember and do when you're trying to, you know, not die. However, this will increase your chances of standing responding as they are less likely to come to a confrontation with the unknown. +Make sure to include your ship type and what's attacking you. A difficult thing to remember and do when you're trying to, you know, not die. However, this will increase your chances of standing responding as they are less likely to come to a confrontation with the unknown. 
  
 ====Comms==== ====Comms====
Line 372: Line 406:
 ====Intel Chat Channels==== ====Intel Chat Channels====
  
-Sign in to the intel chat channel for the region. We have 2: Int.Catch & Int.Impass. +Sign in to the intel chat channel for the region. We have 1 currently<fc #00ff00>Int.PureBlind</fc>
   * Look around the channel to see if a system is trouble.    * Look around the channel to see if a system is trouble. 
   * You can report neut and hostile sightings   * You can report neut and hostile sightings
     * Drag the name from local     * Drag the name from local
-    * Drag the system from the system name on the top left of your clie+    * Drag the system from the system name on the top left of your client
     * Drag the ship type from D-scan.      * Drag the ship type from D-scan. 
     * If your D-scan does not pick up the ship, put NV for No Visual     * If your D-scan does not pick up the ship, put NV for No Visual
Line 424: Line 458:
 In order to help you save time and enable you to help other explorers, there are tools that provide intel on the various signatures in a system. In order to help you save time and enable you to help other explorers, there are tools that provide intel on the various signatures in a system.
  
-====Deepsafe==== 
  
-**https://deepsafe.xyz/** 
- 
-  * Log in with Eve CREST (login). Deepsafe will follow you, loading to your current system when you jump. 
-  * To the right of the map is a list of the signatures in the system that people have logged and a description of what they are. Be advised the list may not be current. 
-  * To remove a signature that no longer exists, click the delete button for that line item (x). 
-  * To add a signature, scan it to 75%, copy it from your probe scanner panel (CTRL-C), paste in the form (CTRL-V) and click submit.  
  
 ====Pathfinder==== ====Pathfinder====
Line 494: Line 521:
     * Drag the probes closer to the signature individually. You will need to move 7 probes (5 around, 1 on top & 1 on bottom).     * Drag the probes closer to the signature individually. You will need to move 7 probes (5 around, 1 on top & 1 on bottom).
     * Do not move them too close, or you will create a void pocket where no scan signal will reach.     * Do not move them too close, or you will create a void pocket where no scan signal will reach.
 +
 +More experienced explorers should be aware that no signature will ever spawn further than 4 AU from a celestial object, which is coincidentally the default positioning of probes when you launch them.
 +
 +To utilise this, in your system map (default key is F9), in top left corner open options and deselect everything. After that you will see that there are white dots on that map, those are celestials like planets and moons. Position your probes centered on celestial that is either inside or in close proximity to Signature bubble. This will shorten your scan time for usually 2 scans. 
  
 =====Warping to Sites==== =====Warping to Sites====
Line 526: Line 557:
 On activating the appropriate module on the can, the hacking interface will come up.  On activating the appropriate module on the can, the hacking interface will come up. 
  
-{{http://imgur.com/WLQYpjn.png}}+{{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/WLQYpjn.png}}
  
-At the bottom left is your hacking virus status. The bottom number & the meter to the left is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the right is your coherence (health). This can be hurt by hostile nodes & the system core. +At the bottom left is your hacking virus status. The bottom number & the meter to the right is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the left is your coherence (health). This can be hurt by hostile nodes & the system core. 
  
 Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected. Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected.
  
-{{https://i.imgur.com/nphwq2V.png }}+{{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/nphwq2V.png }}
 As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core. As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core.
  
Line 541: Line 572:
 All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites. All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites.
  
-^ {{http://imgur.com/WR9DKO8.png?90}} | This is the Core node for the Rubble/Com Tower hacks. It has the weakest coherence. | +^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/WR9DKO8.png?90}} | This is the Core node for the Rubble/Com Tower hacks. It has the weakest coherence. | 
-^ {{http://imgur.com/2Txh2v3.png?90}} | This is the Core node for the Remains/Mainframe hack. It has moderate coherence. | +^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/2Txh2v3.png?90}} | This is the Core node for the Remains/Mainframe hack. It has moderate coherence. | 
-^ {{http://imgur.com/kCiGdQJ.png?90}} | This is the Core node for the Ruins/Databank hack. It has strong coherence. |+^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/kCiGdQJ.png?90}} | This is the Core node for the Ruins/Databank hack. It has strong coherence. |
  
 ==HOSTILE NODES== ==HOSTILE NODES==
  
  
-^ {{http://imgur.com/kxPypCo.png?90}} | **Firewalls** take two to three clicks to kill but you will take take 20-40 total damage to defeat it. It's best to leave unless you have no other option. | +^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/kxPypCo.png?90}} | **Firewalls** take two to three clicks to kill but you will take take 20-40 total damage to defeat it. It's best to leave unless you have no other option. | 
-^ {{http://imgur.com/SH36lLs.png?90}} | **Anti-Virus** subsystems may only take two to three click to kill, but you will take 40-80 damage in doing so. Try to ignore these until you have no other option. If you need to attack it, make sure you have the Kernal Rot or Polymorphic Shield utilities | +^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/SH36lLs.png?90}} | **Anti-Virus** subsystems may only take two to three click to kill, but you will take 40-80 damage in doing so. Try to ignore these until you have no other option. If you need to attack it, make sure you have the Kernal Rot or Polymorphic Shield utilities | 
-^ {{http://imgur.com/pfqTmvZ.png?90}} | **The Restoration Node** is the second most annoying node you will encounter. You **must** attack this defensive system as soon as it pops up. Aside from having high health (albeit low damage), with each click or action this node will increase the health of another revealed node on the grid. This node take 3-4 click to take down with 20-30 damage taken. Use a Kernal Rot or Self repair to mitigate the damage. | +^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/pfqTmvZ.png?90}} | **The Restoration Node** is the second most annoying node you will encounter. You **must** attack this defensive system as soon as it pops up. Aside from having high health (albeit low damage), with each click or action this node will increase the health of another revealed node on the grid. This node take 3-4 click to take down with 20-30 damage taken. Use a Kernal Rot or Self repair to mitigate the damage. | 
-^ {{http://imgur.com/QkIx98Q.png?90}} | The **Virus Suppressor** will ruin a hack for you. Aside from having high health (albeit low damage), once revealed your damage capability will be halved. It will take 4-6 clicks to take this node down, while you takes 45-70 in damage. The secondary Vector utility is most effective in attacking this defensive system, with the Kernal Rot not far behind.. |+^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/QkIx98Q.png?90}} | The **Virus Suppressor** will ruin a hack for you. Aside from having high health (albeit low damage), once revealed your damage capability will be halved. It will take 4-6 clicks to take this node down, while you takes 45-70 in damage. The secondary Vector utility is most effective in attacking this defensive system, with the Kernal Rot not far behind.. |
  
 ==UTILITY SUBSYSTEMS== ==UTILITY SUBSYSTEMS==
Line 557: Line 588:
 The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it. The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it.
  
-^ {{http://imgur.com/sw0yGB1.png?90}} | This is the **Self Repair Utility**. When you activate this tool, it will heal your coherence a little on activation and for each of the next 2 turns. These are useful to activate when you are about to take or have taken some heavy damage. | +^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/sw0yGB1.png?90}} | This is the **Self Repair Utility**. When you activate this tool, it will heal your coherence a little on activation and for each of the next 2 turns. These are useful to activate when you are about to take or have taken some heavy damage. | 
-^ {{http://imgur.com/BjTY0RP.png?90}} | This is the **Secondary Vector Utility**. Activate the tool then click on the hostile node you want to damage. This will apply 60 damage to the target node over 3 turns - 20 damage immediately and another 20 for each of the next 2 turns. This is great for softening up some of the higher health target and really useful to take down the 'halving' node. | +^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/BjTY0RP.png?90}} | This is the **Secondary Vector Utility**. Activate the tool then click on the hostile node you want to damage. This will apply 60 damage to the target node over 3 turns - 20 damage immediately and another 20 for each of the next 2 turns. This is great for softening up some of the higher health target and really useful to take down the 'halving' node. | 
-^ {{http://imgur.com/b3Oj4JX.png?90}} | This is the **Kernel Rot Utility**. After activation, you can click on a hostile node and take that node down to half of its health. For most hostile nodes, this means that you will take the node down in 1-2 clicks. Save these for the Restoration Node or the Virus Suppressor. |+^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/b3Oj4JX.png?90}} | This is the **Kernel Rot Utility**. After activation, you can click on a hostile node and take that node down to half of its health. For most hostile nodes, this means that you will take the node down in 1-2 clicks. Save these for the Restoration Node or the Virus Suppressor. |
 ^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks | ^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks |
  
 ==DATA CACHES== ==DATA CACHES==
  
-^ {{http://imgur.com/9LTRIf5.png?90}} | The **Data Cache** will randomly give you a tool or create a hostile node. These nodes can really mess up your hack though, so approach with caution. The best way to deal with these nodes is to first try to solve the hack without clicking them, then clicking them when you're stuck. |+^ {{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/9LTRIf5.png?90}} | The **Data Cache** will randomly give you a tool or create a hostile node. These nodes can really mess up your hack though, so approach with caution. The best way to deal with these nodes is to first try to solve the hack without clicking them, then clicking them when you're stuck. |
  
 ==SYSTEM CORE LOCATION== ==SYSTEM CORE LOCATION==
  
-The system core can be anywhere - in the middle of nowhere blocked by layers of hostile nodes or even right next to your starting point! Often, however, it is located in the general vicinity that is at the opposite end of the hacking window. This should be your goal at least in the beginning of the hack.+The system core can be anywhere - but there is still some logic behind it. If your starting point is in the corner of the hacking window, System Core will never be closer than 8 nodes from your starting point. Which can speed your hack immensely because it allows you to skip entire regions that are trying to bait you.  
 +However, if you spawn in the middle, there is no logic used, the core can be anywhere
  
 ==THE RULE OF 6== ==THE RULE OF 6==
Line 575: Line 607:
  
 You will sometimes find a node surrounded by 6 other nodes (as can be seen in the hacking interface above among the as-of-yet unavailable nodes). It is **very likely, though by no means guaranteed** that the center node is safe. You may even find a path made by nodes surrounded by 6 other nodes that provide you (probably) safe passage to where you want to go in the hack. If you do encounter a defensive subsystem in a center node (like a firewall), then the system core will always be adjacent to that subsystem. You will sometimes find a node surrounded by 6 other nodes (as can be seen in the hacking interface above among the as-of-yet unavailable nodes). It is **very likely, though by no means guaranteed** that the center node is safe. You may even find a path made by nodes surrounded by 6 other nodes that provide you (probably) safe passage to where you want to go in the hack. If you do encounter a defensive subsystem in a center node (like a firewall), then the system core will always be adjacent to that subsystem.
 +
 +A small side note, if you ever encounter Secondary Vector Utility, it means you have a Virus Suppressor somewhere. Try to save it for that nasty thing. 
 +
 +It should also be mentioned that, after using Secondary Vector Utility you don't have to click on that node second or third time for it to apply damage. You can simply click on other nodes. 
  
 ====Failing a Can==== ====Failing a Can====
Line 610: Line 646:
 ====Selling Loot==== ====Selling Loot====
  
-You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at /member/alliance/programs/buybacks?s[]=buyback.+You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at [[/public/alliance/industry/buyback]].
  
-If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at /public/alliance/logistics/start?s[]=hauling+If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at [[/public/alliance/industry/hauling]].
  
 =====Site Respawn===== =====Site Respawn=====
Line 638: Line 674:
  
 ==LIMITED== ==LIMITED==
-After you scan out the site, you will warp to the first room. Here you will see a can and an acceleration gate. Hack the can.+After you scan out the site, you will warp to the first room. Here you will see a can and an acceleration gate. Hack the can. (if you fail this hack, a 2 minute timer will start, after which the can will explode) 
 \\ \\
 \\ \\
Line 656: Line 692:
   * Apply as you would any other signature   * Apply as you would any other signature
   * Once you enter the wormhole, you can apply the system designation by clicking on "unassigned" in the signature line item under the system column and choosing the system from the dropdown.   * Once you enter the wormhole, you can apply the system designation by clicking on "unassigned" in the signature line item under the system column and choosing the system from the dropdown.
- 
-==DEEPSAFE== 
- 
-Apply as you would any other signature 
- 
-==BRAVE HOLE SCOUTS SCANNING REWARD== 
- 
-Brave Hole Scouts offers a **10 million ISK reward** for C5 holes in Catch submitted to Pathfinder. 
- 
-This is to encourage reporting of C5 wormholes. This is important as hostiles can send a significant force against us through via the wormhole. It also alerts people who want to form wormhole krabbing fleets of the availability of the wormhole.  
- 
-  * Join the Brave Hole Scouts mailing list 
-    * On the bottom left of your mail panel click "Add Mailing List" 
-    * Enter "Brave Hole Scouts" in the popup panel and click "Join" 
-  * Apply the wormhole signature to Pathfinder 
-  * Enter hole, apply system, scan down all anomalies in the system & apply them to Pathfinder 
-  * Send an Eve-mail to Brave Hole Scouts with the wormhole information 
- 
-You are entitled to payouts whether or not the wormhole is used. 
- 
-Wormholes in the 9KOE-A -> HED-GP pipe are not accepted. 
  
 ====Wormhole Safety==== ====Wormhole Safety====
Line 706: Line 721:
 This chart was borrowed and adapted from an [[https://forums.eve-scout.com/topic/409/safety-can-i-warp-to-this-site|article]] on Eve-Scout Forums  This chart was borrowed and adapted from an [[https://forums.eve-scout.com/topic/409/safety-can-i-warp-to-this-site|article]] on Eve-Scout Forums 
  
-{{https://i.imgur.com/fdGyLfR.jpg}}+{{https://raw.githubusercontent.com/bravecollective/wiki-files/main/imgur/fdGyLfR.jpg}}
  
 =====Related Activities===== =====Related Activities=====
  • public/dojo/wiki/exploration-guide.1572748532.txt.gz
  • Last modified: 2019/11/03 02:35
  • by Aernir Ridley