Table of Contents

Splitbit

Splitbit has been my long-term personal name for various cyberpunk gameworld projects. The most recent incarnation is my desire to see it adopted as a revision of the popular game known as Uplink; I really liked that game, but I haven't seen anything like it since. So, the notes here are on sections I would need to design, and what I would need to do for each.

Heads Up Display

The main display area. Relevant stats include the current date / time, what IP you are currently connecting to, CPU usage, RAM usage, HD usage, and world map, with bounce routes.

At the bottom of the map are the menu buttons, as well as an area to display email/mission statements.

Software: Allows you to run any software you currently have installed.

Hardware: View current gateway hardware setup.

Files: Browse your hard drive's file manager.

Status: Overview of your game status.

Email: Send and receive email.

Mission: View your current mission list.

Connection Bouncing

The number of systems you connect through determines how long it takes to trace your connection path, and the relative ease with which you can be traced. The more servers you bounce through in different locations, the longer tracking you down will take. Having better machine access also means longer time-to-trace; no access versus regular account access versus administrative access means that you can do more to delay the inevitable. Also, having administrative access means that you can get into a system to remove log files… important when you want to ensure your tracks are covered.

Being Traced

Active Trace

As soon as a system detects that you are tampering with it, or accessing a restricted function, it begins trying to trace you. If it succeeds, you are disconnected and caught, and if your equipment is located, your game is over and you'll need to start completely from scratch. This is a Very Bad Thing. Fortunately, there are programs available that let you track the progress of a trace attempt, giving you some measure of warning so that you can disconnect before it's too late.

Passive Trace

Assuming you have been up to something unpleasant or delving into a system you oughtn't, the people who own target systems can initiate a passive trace against you to follow your movements by following a chain of log file traces from server to server. Obviously, this is one reason to clear logs from the machines you regularly use. You will not receive a warning when this occurs, although you may notice pertinent job postings from companies trying to follow your tracks… assuming the game has gone multiplayer, you may be dealing with an expert player who will have no compunction against turning you in for the reward money. Fortunately, if there are more players, there's also more chance that trackers will go astray chasing the wrong lead.

Log Files

In a highly interfaced world, all manner of activities are logged as a matter of course. Connections and disconnections to systems, password authentications, and bounce logs can leave a trail to you if you aren't careful… but they can also give you an opportunity to create false trails, if you know what you're doing, or to create other sorts of mischief. And in multiplayer, the actions of fellow players may help - or hurt! - as people look to create scapegoats for their wrongful activities, or clear system logs entirely to cover a swarm of potential wrongdoings. Be advised that while many machine systems create log files, not all of these logs are accessible - so be sure you have a way to clear your path.

Software

The various software tools you need to do your job, fortunately, can be 'acquired' through the appropriate channels - from authorized sources or grey or black-market dealers. Some basic software follows:

Encryptor

Allows you to encrypt an item so that someone without the appropriate private passkey file (or a sufficiently strong Decryptor program) cannot access it. Usually you are requested to encrypt files using a public passkey so that your clients can open them. Can use an existing private and public passkey, or can create new ones.

Private Passkey

A private passkey allows you to decrypt any message generated with the public passkey coded to match it. If you happen to have another user's private passkey, you can decrypt things intended for them without needing an expensive Decryptor program.

Public Passkey

A public passkey is required to encrypt messages, usually to deliver them to clients through otherwise insecure channels. Running a file through a public passkey will encrypt it; afterwards, only the private passkey, or a Decryptor of equal or greater level to that passkey, can decrypt it.

Decryptor

A Decryptor program uses processing power to forcibly decrypt an encrypted file without having the private passkey it needs. Higher grade Decryptors work on stronger encryption. The passkey that opens the file will be stored locally, allowing you to decrypt other files from the same source with much greater ease.

Dictionary Hacker

This tool attempts to guess passwords by running through a list of dictionary words and other common passwords; it almost never works against administrative accounts (as most of them are smart enough not to use dictionary words), but can be surprisingly effective against other users.

File Transfer

Allows you to transfer a file between your system and the target system. This is a basic component of the Splitbit OS.

File Delete

Lets you delete a file. This is a basic component of the Splitbit OS.

Folder Create

Allows you to create a folder. This is a basic component of the Splitbit OS.

Folder Delete

Allows you to delete a folder. This is a basic component of the Splitbit OS.

Defrag

Re-organizes file storage to fill gaps and improve hard drive efficiency.

Firewall Bypass

Allows you to bypass firewalls of lesser or equal strength without alerting the target system.

Firewall Disable

Allows you to break through a Firewall of lesser or equal strength; however, the system will be alerted as soon as you start.

Connection Analyzer

Allows you to read information about your connection, including the existence of any proxies, firewalls, or monitors that might inhibit your hacking pleasure (and, assuming you have appropriate software, launch points to disable them.)

Map Upgrade - Show Trace

Lets you see the progress of a trace on your world map in real time.

LAN Map View

Allows you to map your way through a local area network.

IP Lookup

Identify (and add to your link list) an IP address, along with any publicly available information about that IP.

DNS Lookup

Looks up the DNS records for a particular domain name and matches it up to its corresponding IP address. Most public systems have domain records; most private systems do not.

IP Scan

This scans an IP address for known vulnerabilities and security systems, and sends results to you by email.

LAN Scan

Shows you the type, and all connections coming from, any system on a LAN. Higher versions work on higher level systems.

LAN Spoof

Fools the Network into thinking you are connected to a system, allowing you access to systems protected by Subnets. Higher versions work on higher level systems.

LAN Force

Opens a lock on a LAN system. Higher versions open higher level Locks. The System Administrator will log on if you use this tool.

Log Deleter

Deletes a Log by clicking on it. Higher versions become harder to detect, with Version 4 being impossible to detect.

Log Modifier

Modify a log by clicking on it. Version 2 can create new logs from blank spaces.

Log UnDeleter

Recover deleted logs, or restore modified logs, by clicking on them.

Monitor Bypass

Bypasses a Monitor with equal or lower level to the version. Open the connection Analyser, and click on the Monitor icon with the Monitor Bypass Selected.

Password Breaker

Break a password by clicking on the password box.

Proxy Bypass

Bypasses a Proxy with equal or lower level to the version. Open the connection Analyser, and click on the Proxy icon with the Proxy Bypass Selected.

Proxy Disable

Disables a Proxy with equal or lower level to the version. Simply click the ‘Go’ button to start the process. A Trace will begin automatically when you use this.

Trace Tracker

Tells you if you are being traced, and how long you have with increasing accuracy as the Version gets higher.

Voice Analyser

Allows you to record a voice pattern for breaking Voice Verification Security. Find the phone number of the Admin of the system, run this while he’s talking, and hit play when you need to play the voice back.

System Hardware

Here is a run down of what each piece of hardware does, and its cost.

Processors

Each processor has a rated speed, which is measured in Ghz. The game makes the simplifying assumption that faster processors solve problems more quickly - for instance, cracking a Cypher or Encryption scheme. Multiple processors allows a system to better handle multiple brute processing tasks simultaneously.

Memory

RAM allows you to operate more programs at one time, allowing you to use intensive applications in unison without a performance impact. Insufficient RAM causes drastic impacts on your system's performance.

Hard Drive

Lets you store files - more hard drive space means more storage. File servers often have huge hard drives to work with.

Modems

Faster modems allow for faster file transfers, which is mostly important when uploading or downloading large files, although faster modems do slightly increase the maximum speed of all other hacking operations.

Security Systems

Gateway Self Destruct

Fits explosives to your gateway, and gives you a piece of software that can be used to detonate these explosives should the Feds get too close to your gateway. Since having your gateway captured would give away information about your true identity, this is vital if you expect that your gateway might be found. Note that once the gateway is destroyed, you will have to build a new gateway (under a new IP address), and the original IP address will be listed as 'unavailable' for a period of 90 days.

Gateway Motion Sensor

Fits motion sensing equipment to your Gateway, and gives you a piece of software that allows you to see the status of the Motion Sensor. When the software is running, an indicator appears on your HUD. When nobody is near your gateway, the light is white. When the light turns yellow, a maintenance technician is approaching; expect a gateway shutdown while new hardware is installed, but do not panic unless you were up to something. When the light turns red, an unauthorized person is approaching (such as federal agents) to seize the gateway, and you should use the self-destruct if at all possible.

Gateway EMP Surge

Fits an electromagnetic surge generator to your gateway, and gives you a piece of software that can be used to trigger it. This triggers a powerful electromagnetic surge that entirely wipes out all data on the gateway. Yhis will (obviously) forcibly disconnect you from whatever you were doing at the time.

Gateway Architecture

Following is a guide on all the Gateways available in the game.

Gateway Name

Max CPUs: The more CPUs you can add to a gateway, the more powerful you can make it in terms of raw processing power.

Max CPU Speed: Limits on CPU speed can restrict you from doing incredible feats of hacking just as much as limits on the number of CPUs you can pack in, although twenty CPUs at 1 GHz each can still handle complex problems more readily than one CPU with 20 GHz.

Max Memory Slots: The more memory you can add to a system, the more programs you can operate simultaneously without problems, and the more powerful your system will be.

Max Memory Per Slot: Restrictions on chip size are irritating, particularly when you just want more power and don't care who knows it.

Max Security: The maximum number of security devices you can add to your gateway.

Max Bandwidth: The maximum bandwidth your gateway can handle.

Max Modems: The maximum number of modems you can install on your machine. Most machines only allow for one.

Server Types

Following is a list of each type of server, and the kind of security you can expect to find on each server.

Internal Services Machine

This is the most common type of System in the game. They are easy to hack into, and a lot of the missions in the game will involve these systems. They have a File Server, a Console, a Links page, and Log access, as well as a few useless features such as Security viewing and Accounts. Security varies slightly between systems, but they always have a Password screen, and usually have a monitor as their only main defence so a Password breaker will be sufficient to enter the system. Later on it the game, they start getting Proxy’s and Firewall’s at different levels, so a Bypass or Disabler will be required to change anything on the server. Generally, traces, both active and passive, are slow from these Systems, though a few storyline servers will trace faster.

Central Mainframe

A lot more secure than an Internal Services Machine, though fewer in numbers, Central Mainframes sport a large amount of security, and faster traces. They also only accept connections from ‘Trusted Systems’, meaning systems owned by the same company. That means that in order to be able to connect to one, your last bounce point before the Central Mainframe has to be a server owned by the same company. They always have a Password Screen, some have a Voice Print Analyser, others have Elliptic Curve Cyphers, and some have both. They always have Monitor’s, Proxy’s and Firewall’s of varying levels, though most of them will be level 4 or 5. They have a File Server, Console and Log Access, but these don’t have any Link’s section. Most of the harder missions will involve these servers.

Public Access Servers

These systems can’t be hacked, there is nothing there. All these systems are for is detailing the Admin for the relevant companies systems. This is where you go if you need the phone number of an Admin in order to break through a Voice Print Analyser.

Remote Access Terminals

These do nothing. Period.

Banks

Supposedly one of the most secure types of server in the game, though oddly the easiest to hack. Because using a Monitor Bypass disables all Active Traces, you have all the time you need in the system. Don’t let your self be fooled though, banks have the fastest passive traces in the game, sometimes tracing you in a matter of minutes, so once you are done, you need to work fast to clear your logs.

The accounts section is protected by a Password Screen, using the account number as the user name. Firewalls and Proxy’s of varying levels protect the banks though, so these will need to be circumvented in order to make any changes to an account.

The Admin section is protected by a Password, Voice Print and Elliptic Curve Cypher, and allows you access to the bank's connection logs, and also the account number and password of every account at that bank.

Each bank lists their Admin in an ‘About’ screen, and you have the ability to create a new account as well.

File Servers

A lot of companies have stand alone File Servers used for storing large amounts of data away from the main system. You will mainly uses these when you do ‘Copy a Database’ missions, as you will have to dump the files that you have copied there. They have no monitor, and although they have a password screen, these servers cannot actually be hacked. The only way to get the passwords for them is to get them via missions. If you do happen to have access to a File Server, they are very useful for backing up your programs, should something bad happen to your gateway and you have files that you cannot get again.

Voice Phone Systems

Basically, dial into a person’s phone, and record their voice. You can’t hack anything here, but this is where you get the voices for the Voice Print Analyser. Connect to the phone system and run the Voice Analyser to record the voice.

Personal Computers

These serve little purpose. They are there so you know the IP address of someone you need to frame for a crime, that’s about it really. They cannot be entered because they do not accept external connections.

Local Area Networks (LANs)

A new type of system, added in version 1.2. They are the most secure type of system in the game, requiring a lot of time and skill to break into them. They have numerous different security features, including the standard ones found on other servers. Expensive software and HUD upgrades will be required before you can even enter these systems, and if you aren’t careful, the systems admin will log on and hunt you down on the system. These systems will appear in later missions and in the story line as well.

Security Systems

There are multiple security systems in Uplink, and each of them needs to be tackled in a different way. Here is a list of each type of security and how to get round it.

Login/Password Screen

The most common form of security you will come across. This is easily defeated by using the Password Breaker on it. The only variation in the power of this security is the amount of time it takes to break the password, on more secure systems it will take longer.

Elliptic Curve Cypher

A Complex, hard to crack Cypher, represented by a screen of numbers that cancel to 0 as it is cracked. To get past this you will need a Decypher. Once again, the more secure the system, the longer it takes to crack. Cracking these is very CPU intensive, so you should make sure you have a good machine before attempting to hack a server with one of these.

Voice Print Analysis

Uses a recorded message of the System Administrators voice, so that only the person with that voice can access the system. This is defeated by using a Voice Analyser, with the appropriate voice recorded into it. Simply playing sample back will unlock the security and allow you to enter.

Monitors

Most systems in the game have a monitor. It is what tells the company that someone is trying to hack into their system so that they can trace you while you are still attempting to enter the server. These are overcome using a Monitor Bypass, though the Bypass has to be of equal or higher level to the Monitor itself. If the Monitor is bypassed, you can break all of the systems security before they begin tracing you.

Proxy’s/Firewall’s

A lot of systems have either a Proxy, or and Proxy and a firewall. These don’t do anything to stop you from accessing the system, but they do stop you from modifying anything on that system should you gain access. There are 2 ways around these. The Bypass, which works in the exact same way as the Monitor Bypass, and the Disabler. The Disabler will stop a security device from working while you are connected to the server, allowing you to modify the files or records on the server. They do, however, take time to work, and will alert the company to your presence almost instantly.

Console Commands

On a lot of the servers in Uplink, there are consoles that allow you to manually enter commands to the system. Following is a list of commands that can be used in the console, and what they do.

Help – display a list of commands

cd <directory> - opens a directory

cd .. – closes the current directory

Delete – delete the whole contents of the currently open directory

Shutdown – Shuts down the system.

Disconnect – disconnects from the system

Exit – exits the console and returns to the menu

Run <program> - runs the program you entered. (only works from the usr directory)

It is worth noting, that while the console may still be performing the task you told it to, you can still enter commands, which will be executed in the order they are entered after the current process is finished.

Changing Your Records

During the game, you will have the ability to change your Academic, Social, and Criminal records. For the most part this will have little effect, though it can be rather fun to give yourself numerous first class degrees. However, should you ever wind up with a criminal record, you may find it difficult getting a good job.

What you will need to do in order to rectify this situation, is hack the Global Criminal Data, access your record, and delete anything on it. Once you have done this, you will be able to take jobs normally again.

User Accounts

Certain systems have other user accounts than Admin that you can hack into. The main ones are the International Academic Database, Social Security Database, and Global Criminal Database. These systems have 2 other accounts you can hack; readwrite, and readonly. You can access these accounts by entering these names into the user name box of the password screen before using the password breaker. The advantage of using these is that you are not traced when you enter a system with these accounts (provided you use the Monitor Bypass). The disadvantage is that you cannot access the admin section of the system (which means you can’t directly access the systems logs). It is entirely down to personal preference which you use when hacking these systems, but it can make life easier not having to worry about being traced when you have a lot of work to do on the system.

Mission Guides

This Section contains a walkthrough for every standard mission in the game. Each one is titled with a general description of the mission, and has the actual description from the game, the required rating to be able to do this mission (Note: You may have to contact the employers to be able to accept at this level), the difficulty rating and the required software to be able to complete the mission. There are also notes for any missions that have extra details to them.

Copy a file

Mission Descriptions:

Access a remote system and copy important data files

Steal important data from a rival companies file server

Gain Access to a rival system and steal research files

Ranking: Beginner (Novice)

Difficulty Rating: 2 (3)

Required Software: Password Breaker, File Copier (Decrypter)

Dead easy, just bounce your way to the target server, use a password breaker to gain access, enter the file server, and copy the relevant file to your memory. The simply attach the file to the reply email. Once you reach Novice, this mission will sometimes require you to decrypt the file before sending it. You can tell this because the difficulty will be 3 and the Pay will be higher.

NOTES: If the file is not there, you have to abandon the mission, as it has been deleted either by you at an earlier point, or by an NPC hacker.

This is the exact same type of mission as the test mission.

Before you copy the file from the target machine, check the Encryption Level. If it is 8 or higher, then disconnect and abandon the mission, because you can’t decrypt anything higher than 7.

Delete a file

Mission Descriptions:

Break into a rival computer system and sabotage files

Hack into a computer and delete Key files

Find and destroy crucial data on a mainframe

Ranking: Beginner

Difficulty Rating: 2

Required Software: Password Breaker, File Deleter

This is another really easy one. Just bounce to the server, password break your way in, enter the file server and use your File Deleter to remove the relevant file. Then just reply to the email.

NOTES: If the file is not there, you can simply reply to the mail and finish the mission without doing any work.

Change Academic Details

Mission Descriptions:

Improve our associates' academic standing

Help us prove a fellow employee is over-rated

Generate a University Degree for a friend

Qualifications required for wealthy professional

Ranking: Novice

Difficulty Rating: 3

Required Software: Password Breaker

Bounce your way to the International Academic Database, and use your password breaker to gain access. Enter the search menu and enter the name you've been given. When it comes up, enter or change the relevant qualification. As a guide, if it says add a qualification, put it in the bottom box (Other Qualifications) and if it says University degree put it in the second box (Graduate Qualifications). When you've made the changes, click the commit button. Then simply send a reply email to receive your payment.

Change Social Security Details

Mission Descriptions:

Create part of a new identity

Falsify a Social Security Document

Ranking: Confident

Difficulty Rating: 4 - 5

Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0

Connect to the International Social Security Database with as many bounces as possible, as they trace you quite a lot faster than the previous missions, go to InterNIC to get some more addresses if you need to.

Ideally you should have the HUD Connection Analysis upgrade, but it’s unlikely at this point. If you do have it, then activate the Proxy Bypass. Otherwise, start the Proxy Disable. Wait until the second they start tracing you, then start the password breaker as well (make sure your password breaker CPU usage is all the way up), this will make sure your not waiting around for the proxy to be disabled when your inside. When you get in, enter the search section and enter the name you were given. When it comes up, change the relevant details and click the commit button. Then to receive your payment, send a reply email.

Change Criminal Records

Mission Descriptions:

Help to stop a hacker from ever working again

Help to discredit one of our rivals

Clear a criminal record

Ranking: Intermediate

Difficulty Rating: 5

Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher v1-v3

Connect to the Global Criminal Database (GCD), and click the Log in button. If you have the Proxy Bypass, use it now, if you only have the disable, start it now and wait for the trace to start before continuing. Click the 'Elliptic Curve Encryption Cypher' button, and start the Decypher, making sure the Decypher is turned up to max CPU usage. When it is completed, click the 'Proceed' button, and break the Password with the password Breaker. Once that has finished, click 'Proceed', then enter the search section. Enter the Targets name, and wait for it to come up.

If, for your mission, you are required to clear someone's record, simply click the 'Clear Record Button'. Otherwise, enter what ever conviction you need to, and click 'Add'. When you are finished, disconnect from the server, and reply to the mail to receive your money.

Find Financial Details

Mission Descriptions:

Client interested in financial data on an enemy

Find Financial Details of one of our associates

Ranking: Intermediate

Difficulty Rating: 5

Required Software: Password Breaker

Recommended Software: Monitor Bypass v5

Connect to the bank you are given in the mission statement. If you have the monitor bypass, you will not need many bounces. If you have it, use the monitor bypass. Click on the 'Manage Existing Account' button, and enter the targets account number in the user name field. Use the Password Breaker to gain access to the account. Click on the 'View Account details' button, and note down the amount of money in the persons account. Disconnect from the machine, and reply to the mail. Make sure you type the amount of money in the account at the end of the mail before you send it. If you used the Monitor Bypass, don’t forget to clean up your logs, just because there is no active trace, you can still be passive traced.

Destroy Database

Mission Descriptions:

Destroy corporate data of a rival company

Destroy customer records on a sales system

Destroy rival software in development

Ranking: Intermediate

Difficulty Rating: 5 - 6

Required Software: Password Breaker, Firewall Bypass/Disable v5, Proxy Bypass/Disable v5 (The level of firewall/proxy on these missions differ for each server, some of them have level 5 so it’s best to stick with version 5 bypasses)

Connect to the target, and Bypass/Disable the Firewall and Proxy. Break the password using the Password Breaker. Enter the Admin section, then the console. Once you are in the console, enter the usr directory (type 'cd usr') and then type 'delete' to delete all files on the system. Disconnect and cover your logs, and then go to the Uplink News Page, and wait for news of your hack to appear. Once it does, you can reply to the mail and finish the mission.

NOTES: This mission sometimes targets LAN systems, which means you will need LAN software to be able to complete it.

Copy Database

Mission Descriptions:

Copy large and secure corporate database

Copy proprietary source code database

Steal valuable scientific research documents

Break into high security system and steal customer records

Ranking: Intermediate

Difficulty Rating: 5 - 6

Required Software: Password Breaker, File Copier, Decrypter v7, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5 (you won’t always need this one)

Other Requirements: 60-120Gq's of Memory Space

Connect to the server and bypass/disable the Proxy and Firewall (If they have one). Break the password and enter the file server. At the end of the file list, there should be a group of large files (around 8- 12Gq) all with .dat at the end. You need to copy all these files to your Memory. When you have finished copying them, disconnect and clear your logs as usual. After that, connect to the file server of the company that hired you, and enter using the password they gave. Copy all the files from your memory to the file server, and use the File Decrypter on them. Once that is done, you can reply to the mail and finish the mission.

NOTES: Before you copy the files from the target machine, check the Encryption Level. If it is 8 or higher, then disconnect and abandon the mission, because you can’t decrypt anything higher than 7. Sometimes, you won’t be able to fit all of the files on the file server. Copy as many as you can, and delete the rest. You will still be able to finish the mission, but you will get a little less money. This mission sometimes targets LAN systems, which means you will need LAN software to be able to complete it.

Trace Balance Transfer

Mission Descriptions:

Trace a recent balance transfer

Trace an unauthorised money transfer

Ranking: Intermediate

Difficulty Rating: 5

Required Software: Password Breaker

Recommended Software: Monitor Bypass v5

Connect to the bank that you are told in the mail. If you have the Monitor Bypass you won’t need many bounces. Enter the 'Manage Existing Account' section, and put the account number in as the user name. Break the password, and enter the accounts 'View Statement' section. Somewhere near the top, there should be a large amount of money transferred (normally over 200,000c). You need to note down the account number, and IP of the bank that it was transferred too. Once you have done that, disconnect from the Bank. Connect to the Bank whose IP you got from the statement (you can get the link either from InterNIC or the IP Lookup Tool). Bypass the monitor if you can, and break into the account of the person whose number you noted down. Once you are into the account, go to the 'View Account' section, and note down the name of the Account Owner. Disconnect from the bank, and reply to the mail, making sure you add the Name you noted down before you click send.

NOTES: If you want, you can delete the logs before you connect to the second bank, though if you do the job quick enough, you shouldn’t need to.

Destroy a Computer System

Missions Descriptions:

Elite agent required for destruction of computer system

Ranking: Skilled

Difficulty Rating: 6

Required Software: Password Breaker, Voice Analyser, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5

First, go to InterNIC, and look for the Public Access Server of the Target Company. Add this server to your links, and also add the phone number of the system administrator. Connect to the Administrators Voice Phone system, and start the Voice Analyser. Wait till the call has finished and the voice has been recorded, and then disconnect. DO NOT CLOSE THE VOICE ANALYSYER. Now, connect to the Central Mainframe, making sure that the bounce point just before the Target computer is the Public Access server for that company. Use your Bypassers/Disablers on the Proxy and Firewall, and then enter the 'Voice Print Identification' section. Press the play button on the Voice Analyser, and wait for the button to turn green, and then click on it. Enter the Password screen and break the password. Once you are inside the system, enter the console. Open the usr directory (type 'cd usr') then type 'delete'. After that, close the usr directory (type 'cd ..') open the sys directory (type 'cd sys') then 'delete' again.

Once this is finished, you can type 'shutdown' and disconnect from the system. Clear your logs, the go to the Uplink News page, and wait for news that the companies system has been destroyed. Once this appears, you can reply to the mail and finish the mission.

NOTES: When typing in the console commands, you don’t have to wait for the current action to finish before typing the next one, as the console will remember what you have typed, and complete the actions in order.

Trace a Hacker

Mission Descriptions:

Trace a hacker who recently broke into our systems

Trace an unauthorised money transfer

Ranking: Experienced

Difficulty Rating: 7

Required Software: Password Breaker, Decypher v3, Voice Analyser, Log Un -Deleter, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5

Other Requirements: Something to note down IP's

To start with, you will need to break into the computer of the company that hired you, as they do not give you sufficient access to view the logs. Once you are into the system you are told in the mission statement, enter the Logs. On the email, there will be a date and time that the hack occurred. This isn’t the actual time, this is the time they first noticed it. Look though the logs, and look for the one with the closest date BEFORE the one you are given. This will be the log you need to trace. Use the Log UnDeleter on that log, note down the IP and the time/date of the log, and disconnect. Enter the IP you noted down into the IP Lookup to add it to your links. Now break into that system, enter the logs, and look for a log that has the same date as the one you noted down (It should be a bounce log). Use the Log UnDeleter on that log, and note down the FIRST IP on the bounce log (the 'From' IP). Disconnect from the system, and repeat this process until you get to a Personal Computer. Reply to the mail, adding the name of the person who owns the computer to the mail.

NOTES: If you take one of these missions, make sure it isn’t more than a couple of hours old, by checking the date it was posted. If the mission is too old, it will be impossible, because the hacker will have gone back and totally removed his logs.

Make sure you delete your logs between every connection. Do not leave all the logs until you have finished the mission as you may be passive traced before you are finished.

If the Log points to a bank (or it is an Unauthorised Money transfer mission, which starts at the bank) make sure you hack the admin section and not someone’s account. The logs you need cannot be found in an account.

Money Transfer

Mission Descriptions:

Our Esteemed colleague wishes to make a donation

Ranking: Experienced

Difficulty Rating: 7 - 8

Required Software: Password Breaker, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5

Recommended Software: Monitor Bypass v5

Connect to the bank told to you in the mission statement. Disable/Bypass the Proxy and Firewall, and the monitor if you can, and break into the account with the Password Breaker, using the account number you were given as the User name. Once you are into the account, enter the 'Transfer Money' section. Type in the Bank IP and account number, and then the amount of money, in the relevant boxes, and once you are sure all the numbers are correct, hit the 'Transfer' button. Reply to the email after you have transferred the money. Despite what the mail says, you don’t have to delete the statements, but don’t forget to clear your own logs!

IMPORTANT: You must reply to the mail before you delete the transfer logs, or your employer will say you haven't transferred the money.

Ruin Life

Mission Descriptions:

Highly skilled agent required for removal job

Ranking: Knowledgeable

Difficulty Rating: 8

Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher

Connect to the GCD, and break in as you did in previous missions. Enter the search section, and type the targets name into the search box. When his record comes up, you will need to add 2 criminal convictions (It doesn’t matter what, you can have them arrested for anything). Once you have added 2 things, add something with the word 'Parole' in it (i.e. 'Broke Parole'). Once that is done, click the 'Authorise Arrest' button, close the box that pops up, and disconnect from the GCD. Clear your logs, then go to the Uplink News page, and fast forward 3 hours, until the Arrest appears. Once it has, reply to the mail and finish the mission.

NOTES: This mission is really easy, and it is possible to do a large number of them at once. If you want, you can take a group of these missions, and do them all in one connection to the GCD.

Frame a Person for computer crimes

Mission Descriptions:

Frame a user for computer crimes

Ranking: Uber-Skilled

Difficulty Rating: 9 - 10

Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher

Connect to the GCD, and break in as you did in previous missions. Enter the search section, and type the targets name into the search box. When his record comes up, you will need to add 2 criminal convictions (It doesn’t matter what, you can have them arrested for anything). Once you have added 2 things, add something with the word 'Parole' in it ( i.e. 'Broke Parole'). Once that is done, click the 'Authorise Arrest' button, close the box that pops up, and disconnect from the GCD. Clear your logs, then go to the Uplink News page, and fast forward 3 hours, until the Arrest appears. Once it has, reply to the mail and finish the mission.

NOTES: This mission is exactly the same as the 'Removal Job' mission, and you can do these at the same time if you wish to do a group of them.

Frame a person for Bank Fraud

Mission Descriptions:

Frame a man for bank fraud

Ranking: Uber-Skilled

Difficulty Rating: 9 - 10

Required Software: Password Breaker, Log Modifier

Connect to the Bank specified in the mission statement, using only 3 or 4 bounces. If you use too many, the mission won’t work. WITHOUT bypassing the security, attempt to break the password on the Banks Admin section. When the trace has started, disconnect from the bank after a few seconds. Now connect to your first bounce point (InterNIC hopefully), break into the admin account and access the logs. Look for your bounce log from the last connection (It should be the third one from the top) and use the Log Modifier on it. Change the log so that the 'From' IP is the one given to you in the mission statement (i.e. Change 127.0.0.1 to whatever IP you have been given). Delete the 'Admin Access' log, and disconnect. Go to the Uplink News page, and fast forward, until news that the target has been arrested for hacking the Bank appears. Once it does, you can reply to the mail and finish the mission.

Frame person for Data Destruction

Mission Descriptions: Frame a user for destruction of data

Ranking: Uber-Skilled

Difficulty Rating: 9 - 10

Required Software: Password Breaker, Log Modifier, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5, Monitor Bypass v5 (Voice Analyser, Decypher, depending on the security of the system)

Connect to the system given to you in the mission statement. You must only use 3 or 4 bounce points on this mission. If the trace is too long, the mission won’t work (you need the trace to be about 25 seconds). Bypass the Proxy, Firewall and Monitor, and then crack the password. After this, you must act quickly. Enter the console, open the usr directory, and delete the contents (type 'cd usr' then 'delete'). As soon as this is finished, disconnect from the system, and quickly go to your first bounce point (InterNIC hopefully) and break into the Admin account. Look for your bounce log from the last connection (It should be the third one from the top) and use the Log Modifier on it. Change the log so that the 'From' IP is the one given to you in the mission statement (i.e. Change 127.0.0.1 to whatever IP you have been given). Delete the 'Admin Access' log, and disconnect. Go to the Uplink News page, and fast forward, until news that the target has been arrested for hacking the company’s system. Once it does, reply to the mail and finish the mission.

NOTES: You will only get a couple of tries at this before it stops appearing in the news and the mission becomes impossible, so make sure you get it right the first time.

LANs

Later in the game, some of the missions you will get will require you to hack a LAN system instead of an Internal Services or Central Mainframe system. These systems are hard to hack, require a lot of expensive software, and a lot of time. Every LAN is different, so there is no set way of being able to attack one. You will need to work out the correct course of action you need to take from what systems are present on the LAN. Following is information on each type of system you will come across on a LAN, and what you need to do to get around it.

Router

The first system you will see on any LAN, it connects the LAN to the rest of the Internet. You can do nothing with these systems.

Hub

Connects multiple systems on the LAN together. They have no security, and there is no need to do anything to them, they simply connect more than one system to another, e.g. a Router to the rest of the LAN.

Terminal

A basic computer connected to the network, that the employees of the company you are hacking work at. These serve several purposes, though normally they are there to distract you, and waste your time. On a system that contains a Wireless Transmitter, a Terminal might contain the frequencies of the Wireless Receivers on the LAN. By hacking the Terminal, the frequencies will be displayed to you. Sometimes, Terminals also form Subnets that protect certain other systems. In order to be able to access these systems, you will need to fool that system into thinking you are part of the Subnet. To do this, you will require the LAN Spoof software. By running LAN Spoof on a Terminal that’s part of a Subnet, you can then access systems protected by the Subnet.

Lock

Lock s prevent you from moving further into a LAN. Before you can progress past the Lock , you must deactivate it. There are 2 ways of doing this. The first is to use the LAN Force software on the Lock. This is the quickest, easiest way to get past a lock , but as soon as you do this, the systems Administrator will log on and begin hunting you through the LAN, and a trace will begin on your connection.

The second way is to find the correct Authentication Server for the Lock, hack into it, and turn off the locks your self. This method is more time consuming, as you must first find the Authentication Server, and they are often protected by Subnet’s or hidden on other parts of the LAN. You can tell which Authentication Server is correct by the dotted yellow box that appears around it when you have the lock selected, along with the words ‘Controller’.

Authentication Server

Protected Servers that control Lock s on the LAN. You can tell which lock s a particular server controls by the dotted yellow box that appears around each lock , along with the words ‘Locks/Unlocks’. The servers themselves are usually protected by a Password and Elliptic Curve Cypher, both of which will need to be broken before you can deactivate any locks controlled by the system.

Wireless Transmitter

Radio Transmitters are used when sections of the LAN are separated from each other. When you connect to a Transmitter, you will be presented with a screen requesting a radio frequency. When you enter a correct frequency, you will be connected to the relevant receiver and be allowed to continue on the other part of the LAN. You can find the frequencies required to operate the Wireless Transmitters on the LANs Terminals.

Wireless Receiver

These do little other than receive connections from Wireless Transmitters. There is nothing to do when connecting to them and simply serve as connections to other points in the LAN.

Modem

Modems act in a similar way to Transmitters and Receivers, by separating sections of the LAN so you can’t directly connect from one to the other. In order to connect to a Modem, you will first need to find its phone number. This is stored on a Terminal on the LAN. Once you have the phone number, you will need to disconnect from the LAN, enter the phone number EXACTLY as it appeared on the system into the IP Lookup tool. This will give you a link to the modem. By clicking this link, you will enter the LAN from the Modem, and can continue on the system.

Isolation Bridge

An Isolation Bridge works in a similar way to an Authentication Server, except that instead of controlling one lock, it controls 2. One of these locks will always be open, and the other will always be closed. When you use the Isolation Bridge, the closed lock will open and the open one will close.

Subnet

Subnets aren’t actually types of system, but groups of Terminals used to protect other systems. A system protected by a Subnet will not accept connections from anything that isn’t a part of that Subnet. When you click on a system, ‘Valid Subnet’ will appear on any systems forming a Subnet that’s guarding that system, along with a dotted yellow box. To connect to one of these protected systems, you will need to use LAN Spoof to fool the system into thinking you are part of that Subnet. Once you have used LAN Spoof, you will be able to connect to the system normally.

File Servers and Log Servers

These do very little in the system, except for, as their names suggest, store file and logs.

Main Server

Your eventual target on the LAN. This is the system that runs the LAN, and any missions you have on a LAN will most likely be targeted at this machine. They are heavily defended, require a Password and Voice ID to connect to them, and when you do connect to them, the System Admin will log on automatically and begin hunting you, as well as starting a trace on your connection. They are laid out the same as Central Mainframe systems when you connect to them; they have a File Server, Console and Log section. Working your way through the LAN will always lead to this system.

Viewing the LAN

When you first open the LAN Viewer while connected to a LAN, you might find things a little confusing, but things will become simpler as you get used to it. First of all, you have the main window, which shows the LAN itself. Displayed here are any systems you have currently found on the LAN. The dotted line represents your current connect path, and a white box around a system means you are currently connected to that system. To the right is the information box, which will show some info on the system you currently have selected. This box also has 3 options: Back, Reset and Connect (These will be explained later). If you should do something that’s attracts attention to what you are doing, the System Administrator will log on. A Red warning message will appear, and a siren will sound. The System Admin is represented by red dotted lines (his connection path) and a red box around a system (the system he is currently connected to). When you connect to a system on the LAN, the LAN viewer will close, and the System will be shown on the main screen. Once you have finished with it, you simply click on the viewer again to continue on your way.

In order to connect to systems on a LAN, you will need to make a connection path through the LAN to that system first. When you first connect to a LAN, you will only be able to see the router. The first thing you should do is run LAN Scan. This will show all the systems on the LAN that aren’t protected by closed locks (If nothing appears, you will need to buy a higher version of LAN Scan). Once this is finished, you should run LAN Probe on the Router to show where it connects to. Run LAN Probe on a few systems to give you an idea of the layout of the LAN. Now you need to make a connection to the first system. From the Router, click the first system connected to it (usually a Hub). A dotted line will appear over the connection line to the Hub. This line is your connection path. Clicking on another system connected to the Hub will extend your path to that system. Continue this process till you reach the first system you need to hack. This is where the 3 options to the right come in. The first option is ‘Back’. Use this to move your connection path back to the previous system. The next one is ‘Reset’. This will move your connection back to the Router, and reset any access you had on the system (though any opened locks will remain open). The 3 rd is ‘Connect’. This is what you use to connect to a system

you currently have a path to. Click the system, then click connect and the contents of the system will be displayed. If at any point, the System Admin should log on, he will try and hunt you through the LAN by following your connection. If he reaches the system you are connected to, he will dis connect you from the LAN.

Attacking LANs

The first thing you should remember about LANs is that, just like other systems, they have Proxies and Monitor, which will need bypassing or disabling if you intend to be successful. You should also make sure you have the voice print for the company's Administrator before you connect, as you will need it to enter the Main Server. Since every LAN will be different, there is no set way of attacking them, as you don’t know what types of security will be on the LAN. Use the above information to tackle each system as it comes. Remember that Using LAN Force or Connecting to the Main Server will cause the Systems Admin to log on, and that a trace will start on your connection. As long as you have the right software, and don’t rush and make mistakes, you shouldn’t have many problems hacking a LAN. You should also remember that, if the system admin reaches your location in the LAN, you will be cut off, regardless of how long you have left on the trace. You can tell when he logs on because the siren will sound.

Special Servers

Uplink has many unique servers, each of which has something different. Some of them are just a little fun, but others actually contain vital bits of the game. Here is a list of each server, what it’s for, and what security you can expect.

Important Servers

This is a list of each of the Serious Servers in the game.

InterNIC

Perhaps the most important server in the game. This contains links to almost every other server in the game, which you can add to your Link List. It is also a safe place for your first bounce point. The Admin section has a simple password screen for protection, there is never any trace from this server, and the password never changes.

International Academic Database

This server contains the Academic details of every person in Uplink, including yours. It is used to some earlier missions in the game that require you to help someone get a job, and things similar to that. Security here is very low, there is only a Password entry and Level 1 Monitor, and the traces are very slow.

International Social Security Database

The home of everybody’s personal details, such as Birth date, Social Security number and Personal Status. It is used for some low level missions that involve changing people’s identities. Security here is quite low, with only a Password and a Level 1 Monitor and Proxy, but the traces are quite fast for the early stages of the game.

Global Criminal Database

This holds the Criminal Records of everybody in Uplink. Used throughout the game for discrediting people, having their lives ruined, or clearing their record. Security his high for the earlier stages of the game, but relatively easy later on. There is a Password, Elliptic Curve Cypher, and a Level 1 Monitor and Proxy.

International Stock Market System

Contains details of the Stock of every company in the game. Here you can create an account, and buy or sell stock on any company you choose. It shows the changes in the Stock values for each company for the last year and the price per share. The Admin section has relatively low security, but since the only thing you can do with Admin access if get to the Logs, its pretty pointless. There is a Password, as well as a Level 1 Monitor and Proxy.

This is one of the most pointless Servers in the game. This is where people to go to register as an Uplink agent, but since you do that at the beginning, you can do nothing here. There is nothing to hack, and no real reason to ever go here.

Fun/Joke Servers

Following is a list of all the Joke and Fun servers, or otherwise non-important servers in the game, and what you can do there. Most of these can be found at InterNIC, though some you will have to find yourself. This Section contains Possible Spoilers.

Steve Jackson Games Server

Put into the game because of the Secret Service Raid on the company, for supposedly making a ‘Hacking Guide’. This guide was actually a work of total fiction for a game the company was making, and contained technology that didn’t even exist. When you connect to this server, you receive a message saying that this server has been seized by the Secret Service, and that your IP has now been logged. Don’t threat however, your IP is not logged, and nothing actually happens from connecting to this server. There is nothing here that can be hacked.

Protovision Game Server (Spoiler)

When you connect to the Protovision Game Server, you are greeted with a Password Screen. After using your Password Breaker on this for 10 minutes, you will have probably realised that this server cannot be hacked in the normal way. This server is actually a reference to the 80’s movie ‘Wargames’, and when you enter the server, there is a menu with 2 options, ‘Wargames’ and ‘Hints’. Entering the ‘Wargames’ section will give you a list of games. By clicking on the bottom one (Global Thermonuclear War), you get taken to a World Map with several major cities on it. Clicking on each city will send a red line representing a missile flying towards the city, followed by an explosion. The close button for this screen is underneath the Trace Tracker, should you have it running.

By clicking on the ‘Hint’ menu, you are given a very cryptic message about the Introversion IP, though this doesn’t actually have anything to do with it.

Andromeda Public Access Terminal

When connecting to this server, you will see a button with a ‘.’ on it. If you wait a couple of seconds, the message ‘THE TIME IS NEAR’ appears.

Click the button to proceed to a menu with 3 options. By looking through these options you will see that this server belongs to some kind of creepy cult that thinks the Internet should be destroyed. This server actually belongs to the same group as ARC (Andromeda Research Corp).

OCP Remote Monitoring System

This server is a reference to the movie ‘Robocop’. Connecting to the server will display the 4 Prime Objectives of Robocop, including the 4th, which is classified. There is nothing to do on this server.

Introversion Software

This server belongs to the Creators of Uplink. On it you will find lots of information about things that inspired Uplink and plans for the future. This server is hidden and you must find it yourself.

Bank Hacking

Despite the risks involved, hacking a Bank is relatively easy. As long as you are fast, by following this guide you should have no problems. Before you start, you will need to know an Account Number at the bank you want to hack, your Uplink Bank Account number, and the IP of Uplink International Bank.

1. Connect to the bank, with InterNIC as your first bounce, and bypass the monitor and proxy with Level 5 Bypassers.

2. Break into the account you want to steal from, using the account number as the user name, and the password breaker to get the password. You should not have a trace on you because of the monitor bypass.

3. Enter the transfer screen and transfer money to your Uplink bank account.

4. Delete the Statement logs from the account you stole from saying you just transferred money.

5. Connect to Uplink bank, log into your account, bypass monitor and proxy then delete the log saying you received money.

6. Connect to InterNIC and delete the bounce logs.

7. Start Spending. You don’t have to wait before you can spend the money you just stole.

Note that once you have a password of an account, you don’t need the monitor bypass to access it; the bank doesn’t trace normal account entries.

General Tips

If you have to use a Proxy/Firewall disabler, start it before doing anything else. Wait for the trace to start before proceeding. That way you won’t be waiting for it to finish while your clock ticks down and you are in the system.

Don’t bother with the Dictionary Hacker; it is a waste of time. Stick with the Password Breaker.

When buying Software, only buy the highest version. If you can’t afford the highest, do a couple more jobs until you can. This way you will save your self the trouble and money of upgrading later on. This is especially important with LAN software, as LAN security varies slightly, and there is no guarantee that v1 software will work on even the simplest of LANs.

If you can afford it, buy the Proxy and Firewall Bypass instead of Disable. It may be more expensive, but it will make your life a lot easier.

Don’t waste time while doing a job. Anything else you have to do can wait until a job is finished. Always clear your logs as soon as you have done the mission. If you leave them, you will likely forget and be caught.

ALWAYS keep an eye on your Trace Tracker when doing a job.

Scribbles

Console Commands

dir - List files and folders in current directory.

dir <name> - List files and folders in listed subdirectory.

cd <name> - Change to listed subdirectory.

cd \ - Change to local drive root.

cd .. - Go up one directory level.

X: - Change local drive to X:

encrypt <file> <key> - Using public <key>, encrypt <file>

decrypt <file> <key> - using private <key>, decrypt <file>

format X: - Formats the X: drive and deletes all data!

defrag X: - Defragments existing files to conserve free space.

erase <file> - Erases a single file.

copy <file> <destination> - Copy a file to a destination

map X: \127.0.0.1\C: - Map a local drive to a remote drive