Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:dojo:wiki:exploration-guide [2021/08/26 09:32] Havana Nox [Wormhole Intel] |
public:dojo:wiki:exploration-guide [2023/07/21 20:14] (current) Tian Khamez [Selling Loot] |
||
---|---|---|---|
Line 318: | Line 318: | ||
==NULL SEC== | ==NULL SEC== | ||
Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone' | Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone' | ||
- | |||
- | ==BRAVE SPACE== | ||
- | |||
- | The best places to explore are: | ||
- | * Querious, | ||
- | * Catch (not in GE since at any given time there may be hunters) and | ||
- | * Stain. Stain is more dangerous as an NPC null sec area but the rewards can be great. | ||
- | **//<fc # | ||
==NPC NULL SPACE== | ==NPC NULL SPACE== | ||
Line 414: | Line 406: | ||
====Intel Chat Channels==== | ====Intel Chat Channels==== | ||
- | Sign in to the intel chat channel for the region. We have 4: <fc # | + | Sign in to the intel chat channel for the region. We have 1 currently: <fc # |
* Look around the channel to see if a system is trouble. | * Look around the channel to see if a system is trouble. | ||
* You can report neut and hostile sightings | * You can report neut and hostile sightings | ||
* Drag the name from local | * Drag the name from local | ||
- | * Drag the system from the system name on the top left of your clie | + | * Drag the system from the system name on the top left of your client |
* Drag the ship type from D-scan. | * Drag the ship type from D-scan. | ||
* If your D-scan does not pick up the ship, put NV for No Visual | * If your D-scan does not pick up the ship, put NV for No Visual | ||
Line 565: | Line 557: | ||
On activating the appropriate module on the can, the hacking interface will come up. | On activating the appropriate module on the can, the hacking interface will come up. | ||
- | {{http://imgur.com/ | + | {{https://raw.githubusercontent.com/ |
At the bottom left is your hacking virus status. The bottom number & the meter to the right is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the left is your coherence (health). This can be hurt by hostile nodes & the system core. | At the bottom left is your hacking virus status. The bottom number & the meter to the right is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the left is your coherence (health). This can be hurt by hostile nodes & the system core. | ||
Line 571: | Line 563: | ||
Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected. | Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected. | ||
- | {{https://i.imgur.com/ | + | {{https://raw.githubusercontent.com/ |
As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core. | As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core. | ||
Line 580: | Line 572: | ||
All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites. | All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites. | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==HOSTILE NODES== | ==HOSTILE NODES== | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==UTILITY SUBSYSTEMS== | ==UTILITY SUBSYSTEMS== | ||
Line 596: | Line 588: | ||
The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it. | The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it. | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks | | ^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks | | ||
==DATA CACHES== | ==DATA CACHES== | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==SYSTEM CORE LOCATION== | ==SYSTEM CORE LOCATION== | ||
Line 656: | Line 648: | ||
You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at [[/ | You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at [[/ | ||
- | If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at [[/ | + | If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at [[/ |
=====Site Respawn===== | =====Site Respawn===== | ||
Line 729: | Line 721: | ||
This chart was borrowed and adapted from an [[https:// | This chart was borrowed and adapted from an [[https:// | ||
- | {{https://i.imgur.com/ | + | {{https://raw.githubusercontent.com/ |
=====Related Activities===== | =====Related Activities===== |