Uplink Guide
Uplink Guide
15
Welcome to the Ultimate Uplink Guide. This guide contains pretty much everything you will ever need
to know to be successful in Uplink, and is designed to help those that have never played the game
before to get to grips with it, but also to allow people who know what they are doing to see if there is
anything they could do better. It has mission guides, general tips, and although it wont actually contain
all the secrets of the game, it will point you in the right direction to finding them your self.
Section Listing
Section 1 – The Basics
1.1 – The HUD
1.2 – Connection Bouncing
1.3 – Being Traced
1.4 – Logs
1.5 – Server Links
1.6 – Uplink Internal Services
1.7 – The Game Over Screen
Section 2 – Game Information
2.1 – Uplink Rating
2.2 – Neuromancer Rating
2.3 – Software
2.4 – Hardware
2.5 – Gateways
2.6 – System Types
2.7 – Security Systems
2.8 – Console Commands
2.9 – Changing Your Records
2.10 – User Accounts
Section 3 – Mission Guides
3.1 - LANs
Section 4 – Storyline Missions
4.1 – Arunmor Missions
4.2 – ARC Missions
Section 5 – Special Servers
5.1 – Important Servers
5.2 – Fun/Joke Servers
Section 6 – Hacking Help
6.1 – Bank Hacking
6.2 – General Tips
Section 7 – Common Bugs
Section 8 – FAQ
Section 9 – Secrets
Section 10 – The Bonus Disk
Section 11 – Patch Additions
Section 12 – Pop Tarts
12.1 – Pop Tart Flavours
12.2 –Uses for Pop Tarts
12.3 – Which Flavour is best?
12.4 - Conclusion
Section 13 – Conclusion
13.1 – Contact
13.2 - Links
Section 1 – The Basics
This section describes the basics of the game, how to get started and to hack successfully with out
being caught.
Uplink HUD
At the Bottom of the screen there are 6 Buttons, and an area that holds any email/mission statements
you have. The first, and largest of the buttons opens the software menu, allowing you to run any
software you currently have in your memory. The rest of the buttons allow you to view your current
hardware, files, Personal status, and to send email. When you click one of these buttons, the
appropriate display appears to the right.
1.4 – Logs
Every time you connect to a server, you create logs. Using these logs, a Company/Hacker can do a
‘Passive Trace’ on you, by following the logs back through your bounce route and to your machine.
To prevent this, you need to clear your logs. The safest way to do this is to delete your logs from your
first bounce point. Because InterNIC’s password never changes, and they do not trace you, it is the best
server to use for your first bounce point, as you can easily access the server’s logs and delete them.
When you go to delete your logs, you must make sure you delete the right ones. The main logs you
need to delete are the ‘Bounce’ logs, and the ‘Password Accepted’ logs, which look like the following;
‘Connection from 127.0.0.1 routed to xxx.xxx.xxx.xxx’ (Bounce Log)
‘From 127.0.0.1: Password authentication accepted’ (Password Accepted Log)
These are the logs you need to delete. It is important that you leave the actual connection logs there
though, because you also leave logs when you disconnect, and it would look suspicious if there was a
disconnection log but no connection.
By deleting these logs from your first bounce point after every hack, you should never be caught, as
long as you aren’t too slow in doing it.
Remember, everywhere keeps logs, including Voice Phone Systems. Just because you can’t get to the
logs, it doesn’t mean they aren’t there.
Grade 16 – Registered
Grade 15 – Beginner
Grade 14 – Novice
Grade 13 – Confident
Grade 12 – Intermediate
Grade 11 – Skilled
Grade 10 – Experienced
Grade 9 – Knowledgeable
Grade 8 – Uber-Skilled
Grade 7 – Professional
Grade 6 – Elite
Grade 5 – Mage
Grade 4 – Expert
Grade 3 – Veteran
Grade 2 – Techno-mage
Grade 1 – TERMINAL
2.3 – Software
Following is a guide of each piece of Software available in Uplink, and how to use it.
Decrypter
Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7
Cost 800c 1200c 1600c 2200c 3000c 7000c 15000c
Size 2Gq 2Gq 2Gq 2Gq 3Gq 4Gq 5Gq
Description Decrypt files with equal or lower encryption than the version, by clicking on them.
Decypher
Version 1 Version 2 Version 3
Cost 3000c 5000c 8000c
Size 2Gq 2Gq 2Gq
Description Decypher Elliptic Curve Encryption by clicking on the Cypher box with the
program running. Higher versions work faster.
Dictionary Hacker
Cost: 1000c
Size: 4Gq
Attempts to break passwords with a dictionary file. Used by clicking on the password box with the
program running. Not always Successful
File Copier
Cost: 100c
Size: 1Gq
Copies a file, by clicking on the file, then on the memory location you wish to copy too.
File Deleter
Cost: 100c
Size: 1Gq
Deletes a file, by clicking on the file in the memory/file server.
Defrag
Cost: 5000c
Size: 2Gq
Sorts all the files in your memory to optimize free space, by moving files to fill in gaps.
Firewall Bypass
Version 1 Version 2 Version 3 Version 4 Version 5
Cost 3000c 4000c 6000c 8000c 10000c
Size 1Gq 1Gq 1Gq 1Gq 1Gq
Description Bypasses a Firewall with equal or lower level to the version. Open the connection
Analyser, and click on the Firewall icon with the Firewall Bypass Selected.
Firewall Disable
Version 1 Version 2 Version 3 Version 4 Version 5
Cost 2000c 3000c 4000c 6000c 8000c
Size 1Gq 1Gq 1Gq 2Gq 3Gq
Description Disables a Firewall with equal or lower level to the version. Simply click the ‘Go’
button to start the process. A Trace will begin automatically when you use this.
HUD ConnectionAnalysis
Cost: 20000c
Size: -
Gives you the Connection Analysis menu, and allows you to use Bypassers.
HUD MapShowTrace
Cost: 5000c
Size: -
Allows you to see the progress of a trace on the World Map
HUD LAN View
Cost: 50000c
Size: -
Gives you the LAN View menu, which allows you to view systems on a LAN you are currently
connected to.
IP Lookup
Cost: 500c
Size: 1Gq
Allows you to enter an IP and that IP is added to your Server Links Automatically.
IP Probe
Version 1 Version 2 Version 3
Cost 2000c 4000c 5000c
Size 3Gq 3Gq 3Gq
Description Allows you to enter an IP, and get information on the types of security at
that IP, via Email. Higher versions give more Information
LAN Probe
Version 1 Version 2 Version 3
Cost 15000c 20000c 30000c
Size 3Gq 3Gq 4Gq
Description Shows you the type, and all connections coming from, any system on a
LAN. Higher versions work on higher level systems.
LAN Scan
Version 1 Version 2 Version 3
Cost 10000c 15000c 25000c
Size 2Gq 2Gq 2Gq
Description Shows you all the system present on a LAN you are connected to. Higher
versions work on higher level LANs.
LAN Spoof
Version 1 Version 2 Version 3
Cost 20000c 30000c 45000c
Size 2Gq 3Gq 5Gq
Description Fools the Network into thinking you are connected to a system, allowing you
access to systems protected by Subnets. Higher versions work on higher
level systems.
LAN Force
Version 1 Version 2 Version 3
Cost 15000c 20000c 25000c
Size 2Gq 3Gq 4Gq
Description Opens a lock on a LAN system. Higher versions open higher level Locks.
The Systems Administrator will log on if you use this tool.
Log Deleter
Version 1 Version 2 Version 3 Version 4
Cost 500c 1000c 2000c 4000c
Size 1Gq 1Gq 1Gq 1Gq
Description Deletes a Log by clicking on it. Higher versions become harder to detect, with
Version 4 being impossible to detect.
Log Modifier
Version 1 Version 2
Cost 4000c 6000c
Size 2Gq 2Gq
Description Modify a Log by clicking on it. Version 2 can create new logs from
blank spaces.
Log UnDeleter
Cost: 5000c
Size: 1Gq
Recover deleted logs, or restore modified logs, by clicking on them.
Monitor Bypass
Version 1 Version 2 Version 3 Version 4 Version 5
Cost 10000c 12000c 16000c 20000c 25000c
Size 1Gq 1Gq 1Gq 1Gq 1Gq
Description Bypasses a Monitor with equal or lower level to the version. Open the connection
Analyser, and click on the Monitor icon with the Monitor Bypass Selected.
Password Breaker
Cost: 1500c
Size: 2Gq
Break a password by clicking on the password box.
Proxy Bypass
Version 1 Version 2 Version 3 Version 4 Version 5
Cost 6000c 8000c 12000c 16000c 20000c
Size 1Gq 1Gq 1Gq 1Gq 1Gq
Description Bypasses a Proxy with equal or lower level to the version. Open the connection
Analyser, and click on the Proxy icon with the Proxy Bypass Selected.
Proxy Disable
Version 1 Version 2 Version 3 Version 4 Version 5
Cost 3000c 4000c 6000c 8000c 10000c
Size 1Gq 1Gq 1Gq 2Gq 3Gq
Description Disables a Proxy with equal or lower level to the version. Simply click the ‘Go’
button to start the process. A Trace will begin automatically when you use this.
Trace Tracker
Version 1 Version 2 Version 3 Version 4
Cost 300c 600c 1400c 2500c
Size 1Gq 1Gq 2Gq 3Gq
Description Tells you if you are being traced, and how long you have with increasing
accuracy as the Version gets higher.
Voice Analyser
Cost: 5000c
Size: 4Gq
Allows you to record a voice pattern for breaking Voice Verification Security. Find the phone number
of the Admin of the system, run this while he’s talking, and hit play when you need to play the voice
back.
2.4 – Hardware
Here is a run down of what each piece of hardware does, and its cost.
Processors
CPU CPU CPU CPU CPU CPU CPU
(20Ghz) (60Ghz) (80Ghz) (100Ghz) (120Ghz) (150Ghz) (200Ghz)
Cost 250c 1000c 1300c 3000c 5000c 8000c 12000c
Description The Faster your processor speed, the faster your gateway can do things, such as break
Cyphers.
Memory
Memory (8Gq) Memory (16Gq) Memory (24Gq) Memory (32Gq)
Cost 3000c 5500c 8000c 11000c
Description The more memory you have the more files you can store at one time.
Modems
Modem Modem Modem Modem Modem Modem
(1Gq/s) (2Gq/s) (4Gq/s) (6Gq/s) (8Gq/s) (10Gq/s)
Cost 1000c 2000c 4000c 6000c 8000c 10000c
Description Supposedly makes file transfer faster, though it makes no noticeable difference.
Security
Gateway Self Destruct.
Cost: 20000c
Fits explosives to your gateway, and gives you a piece of software that can be used to detonate these
explosives should the Feds get to close to your gateway.
Gateway Motion Sensor
Cost: 10000c
Fits motion sensing equipment to your Gateway, and gives you a piece of software that allows you to
see the status of the Motion Sensor. When run, the Software, a small light appears under the Time
Controls. When this light turns yellow, some one is fitting new hardware on your gateway. If it turns
Red, the Feds are near your gateway, and you should use the Gateway Nuke.
Note that each one of these pieces of Security is useless without the other. Without the Motion Sensor,
you will not know when to use the Gateway Nuke, and without the Gateway Nuke, you won’t be able
to do anything when you see the Feds coming.
Also, you should never use the Gateway Nuke when the light Isn’t Red, otherwise it won’t work, and
you can still be traced for anything you have done before you used the Nuke.
Gateway Alpha
Max CPUs: 1
Max Memory: 32Gq
Max Security: 0
Max Bandwidth: 1Gq/s
The gateway you start the game with, and go back to if your gateway is ever destroyed. It’s very
simple, with only one CPU slot and 32Gq Max Memory space. There is no room for security, and this
model cannot handle a better modem. Due to its lack of speed, this Gateway becomes pretty useless as
soon as you are required to do anything even remotely intensive, like cracking an Encryption, and it is
recommended you upgrade as soon as possible.
Rating: 4 out of 10
This Gateway is almost exactly the same as the ALPHA, except it has an extra CPU slot, which means
it can have double the processor power, and for the low price, is quite a good investment at the start of
the game. A lot more versatile than the ALPHA, with the extra CPU it can better handle more
strenuous activities, although its lack of memory means you will still be wanting something bigger
quite quickly.
Rating: 5 out of 10
This is the same as the ALPHA but with twice as much memory space. Unfortunately, because it still
only has one processor slot, the extra memory won’t do you much good because you won’t be able to
do anything else. It’s not bad it you need some extra storage space early on, because it’s quite cheap,
but otherwise I would suggest against it.
Rating: 4 out of 10
The Description says you cannot be caught with this Gateway, though a few people have reported that
they have been caught with it. It has 2 CPU slots and enough space for 48Gq of memory, though no
space for security. Not to bad for the price, but personally I would save up a little more and go for the
next one.
Rating: 6 out of 10
An excellent Gateway, the ZION has 3 CPU slots, enough space for 96Gq of memory, 2 security
devices and a 6Gqs Modem. At Just over 10000c more than the KRONOS, this is excellent value for
money. It has enough space to do most database copying missions, enough CPU space to make
breaking encryptions nice and quick, and have both security devices available. I highly recommend this
gateway as a stopping point before buying the Trinity.
Rating: 9 out of 10
I personally find this Gateway pretty pointless. Its main feature is 4 security device spaces, but since
there are only 2 in the game, and having more than one is pointless, this Gateway is just a big waste of
time. It also has less memory space than the ZION. Its redeeming feature is that is has 4 CPU slots, but
at nearly 70000c I personally think this is the biggest waste of money there is.
Rating: 5 out of 10
This Gateway has a huge amount of memory space, at 256gq, you will be able to do 2 database
missions with this and still have space left. The 3 CPU slots is a bit of a let down, but it is sufficient for
most things, though you may be left wanting more power towards the later missions. 2 Security devices
make it a nice safe gateway once you have the equipment fitted, but you really have to ask your self,
'Do I really need that much memory?'
Rating: 8 out of 10
This computer is really all down to personal Preference. With 16 CPU slots, it’s by far the most
powerful Gateway available, but with only 48Gq of Memory space, you won’t have nearly enough
space for those 'Copy a Database' missions. A big let down is that it only has 1 security slot, but
otherwise, it’s not too bad.
Rating: 8 out of 10
The TRINITY-1686a Gateway
Max CPUs: 8
Max Memory: 128Gq
Max Security: 3
Max Bandwidth: 8Gq/s
My personal favourite, this gateway has everything you could possibly want. With 8 CPU slots, it’s
easily fast enough to do anything in the game in a matter of seconds, and 128Gq of Memory space
means you have plenty of room for files. The only downside of this gateway, which isn't really
important, is the completely pointless 3rd Security slot. All Agents should aspire to own this Gateway.
Rating: 10 out of 10
These are the basic Gateways that come with the game, though there are numerous mods that will add
more to the game.
Central Mainframe
A lot more secure than an Internal Services Machine, though fewer in numbers, Central Mainframe
sport a large amount of security, and faster traces. They also only accept connections from ‘Trusted
Systems’, meaning systems owned by the same company. That means that in order to be able to
connect to one, your last bounce point before the Central Mainframe has to be a server owned by the
same company. They always have a Password Screen, some have a Voice Print Analyser, others have
Elliptic Curve Cyphers, and some have both. They always have Monitor’s, Proxy’s and Firewall’s of
varying levels, though most of them will be level 4 or 5. They have a File Server, Console and Log
Access, but these don’t have any Link’s section. Most of the harder missions will involve these servers.
Banks
Supposedly one of the most secure types of server in the game, though oddly the easiest to hack.
Because using a Monitor Bypass disables all Active Traces, you have all the time you need in the
system. Don’t let your self be fooled though, banks have the fastest passive traces in the game,
sometimes tracing you in a matter of minutes, so once you are done, you need to work fast to clear your
logs.
The accounts section is protected by a Password Screen, using the account number as the user name.
Firewalls and Proxy’s of varying levels protect the banks though, so these will need to be circumvented
in order to make any changes to an account.
The Admin section is protected by a Password, Voice Print and Elliptic Curve Cypher, and allows you
access to the banks connection logs, and also the account number and password of every account at that
bank.
Each bank lists their Admin in an ‘About’ screen, and you have the ability to create a new account as
well.
File Servers
A lot of companies have stand alone File Servers used for storing large amounts of data away from the
main system. You will mainly uses these when you do ‘Copy a Database’ missions, as you will have to
dump the files that you have copied there. They have no monitor, and although they have a password
screen, these servers cannot actually be hacked. The only way to get the passwords for them is to get
them via missions. If you do happen to have access to a File Server, they are very useful for backing up
your programs, should something bad happen to your gateway and you have files that you cannot get
again.
Personal Computers
These serve little purpose. They are there so you know the IP address of someone you need to frame
for a crime, that’s about it really. They cannot be entered because they do not accept external
connections.
Login/Password Screen
The most common form of security you will come across. This is easily defeated by using the
Password Breaker on it. The only variation in the power of this security is the amount of time it takes to
break the password, on more secure systems it will take longer.
Monitors
Most systems in the game have a monitor. It is what tells the company that someone is trying to hack
into their system so that they can trace you while you are still attempting to enter the server. These are
overcome using a Monitor Bypass, though the Bypass has to be of equal or higher level to the Monitor
itself. If the Monitor is bypassed, you can break all of the systems security before they begin tracing
you.
Proxy’s/Firewall’s
A lot of systems have either a Proxy, or and Proxy and a firewall. These don’t do anything to stop you
form accessing the system, but they do stop you from modifying anything on that system should you
gain access. There are 2 ways around these. The Bypass, which works in the exact same way as the
Monitor Bypass, and the Disabler. The Disabler will stop a security device from working while you are
connected to the server, allowing you to modify the files or records on the server. They do, however,
take time to work, and will alert the company to your presence almost instantly.
2.8 – Console Commands
On a lot of the servers in Uplink, there are consoles that allow you to manually enter commands to the
system. Following is a list of commands that can be used in the console, and what they do.
It is worth noting, that while the console may still be performing the task you told it to, you can still
enter commands, which will be executed in the order they are entered after the current process is
finished.
Copy a file
Mission Descriptions:
Access a remote system and copy important data files
Steal important data from a rival companies file server
Gain Access to a rival system and steal research files
Dead easy, just bounce your way to the target server, use a password breaker to gain access, enter the
file server, and copy the relevant file to your memory. The simply attach the file to the reply email.
Once you reach Novice, this mission will sometimes require you to decrypt the file before sending it.
You can tell this because the difficulty will be 3 and the Pay will be higher.
NOTES: If the file is not there, you have to abandon the mission, as it has been deleted either by you at
an earlier point, or by an NPC hacker.
This is the exact same type of mission as the test mission.
Before you copy the file from the target machine, check the Encryption Level. If it is 8 or higher, then
disconnect and abandon the mission, because you can’t decrypt anything higher than 7.
Delete a file
Mission Descriptions:
Break into a rival computer system and sabotage files
Hack into a computer and delete Key files
Find and destroy crucial data on a mainframe
Ranking: Beginner
Difficulty Rating: 2
Required Software: Password Breaker, File Deleter
This is another really easy one. Just bounce to the server, password break your way in, enter the file
server and use your File Deleter to remove the relevant file. Then just reply to the email.
NOTES: If the file is not there, you can simply reply to the mail and finish the mission without doing
any work.
Ranking: Novice
Difficulty Rating: 3
Required Software: Password Breaker
Bounce your way to the International Academic Database, and use your password breaker to gain
access. Enter the search menu and enter the name you've been given. When it comes up, enter or
change the relevant qualification. As a guide, if it says add a qualification, put it in the bottom box
(Other Qualifications) and if it says University degree put it in the second box (Graduate
Qualifications). When you've made the changes, click the commit button. Then simply send a reply
email to receive your payment
Change Social Security Details
Mission Descriptions:
Create part of a new identity
Falsify a Social Security Document
Ranking: Confident
Difficulty Rating: 4 - 5
Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0
Connect to the International Social Security Database with as many bounces as possible, as they trace
you quite a lot faster than the previous missions, go to InterNIC to get some more addresses if you need
to.
Ideally you should have the HUD Connection Analysis upgrade, but it’s unlikely at this point. If you do
have it, then activate the Proxy Bypass. Otherwise, start the Proxy Disable. Wait until the second they
start tracing you, then start the password breaker as well (make sure your password breaker CPU usage
is all the way up), this will make sure your not waiting around for the proxy to be disabled when your
inside. When you get in, enter the search section and enter the name you were given. When it comes
up, change the relevant details and click the commit button. Then to receive your payment, send a reply
email.
Ranking: Intermediate
Difficulty Rating: 5
Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher v1-v3
Connect to the Global Criminal Database (GCD), and click the Log in button. If you have the Proxy
Bypass, use it now, if you only have the dis able, start it now and wait for the trace to start before
continuing. Click the 'Elliptic Curve Encryption Cypher' button, and start the Decypher, making sure
the Decypher is turned up to max CPU usage. When it is completed, click the 'Proceed' button, and
break the Password with the password Breaker. Once that has finished, click 'Proceed', then enter the
search section. Enter the Targets name, and wait for it to come up.
If, for your mission, you are required to clear some ones record, simply click the 'Clear Record Button'.
Otherwise, enter what ever conviction you need to, and click 'Add'. When you are finished, disconnect
from the server, and reply to the mail to receive your money.
Ranking: Intermediate
Difficulty Rating: 5
Required Software: Password Breaker
Recommended Software: Monitor Bypass v5
Connect to the bank you are given in the mission statement. If you have the monitor bypass, you will
not need many bounces. If you have it, use the monitor bypass. Click on the 'Manage Existing Account'
button, and enter the targets account number in the user name field. Use the Password Breaker to gain
access to the account. Click on the 'View Account details' button, and note down the amount of money
in the persons account. Disconnect from the machine, and reply to the mail. Make sure you type the
amount of money in the account at the end of the mail before you send it. If you used the Monitor
Bypass, don’t forget to clean up your logs, just because there is no active trace, you can still be passive
traced.
Destroy Database
Mission Descriptions:
Destroy corporate data of a rival company
Destroy customer records on a sales system
Destroy rival software in development
Ranking: Intermediate
Difficulty Rating: 5 - 6
Required Software: Password Breaker, Firewall Bypass/Disable v5, Proxy Bypass/Disable v5 (The
level of firewall/proxy on these missions differ for each server, some of them have level 5 so it’s best
to stick with version 5 bypasses)
Connect to the target, and Bypass/Disable the Firewall and Proxy. Break the password using the
Password Breaker. Enter the Admin section, then the console. Once you are in the console, enter the
usr directory (type 'cd usr') and then type 'delete' to delete all files on the system. Disconnect and cover
your logs, and then go to the Uplink News Page, and wait for news of your hack to appear. Once it
does, you can reply to the mail and finish the mission.
NOTES: This mission sometimes targets LAN systems, which means you will need LAN software to
be able to complete it.
Copy Database
Mission Descriptions:
Copy large and secure corporate database
Copy proprietary source code database
Steal valuable scientific research documents
Break into high security system and steal customer records
Ranking: Intermediate
Difficulty Rating: 5 - 6
Required Software: Password Breaker, File Copier, Decrypter v7, Proxy Bypass/Disable v5, Firewall
Bypass/Disable v5 (you won’t always need this one)
Other Requirements: 60-120Gq's of Memory Space
Connect to the server and bypass/disable the Proxy and Firewall (If they have one). Break the password
and enter the file server. At the end of the file list, there should be a group of large files (around 8-
12Gq) all with .dat at the end. You need to copy all these files to your Memory. When you have
finished copying them, disconnect and clear your logs as usual. After that, connect to the file server of
the company that hired you, and enter using the password they gave. Copy all the files from your
memory to the file server, and use the File Decrypter on them. Once that is done, you can reply to the
mail and finish the mission.
NOTES: Before you copy the files from the target machine, check the Encryption Level. If it is 8 or
higher, then disconnect and abandon the mission, because you can’t decrypt anything higher than 7.
Sometimes, you won’t be able to fit all of the files on the file server. Copy as many as you can, and
delete the rest. You will still be able to finish the mission, but you will get a little less money.
This mission sometimes targets LAN systems, which means you will need LAN software to be able to
complete it.
Ranking: Intermediate
Difficulty Rating: 5
Required Software: Password Breaker
Recommended Software: Monitor Bypass v5
Connect to the bank that you are told in the mail. If you have the Monitor Bypass you won’t need many
bounces. Enter the 'Manage Existing Account' section, and put the account number in as the user name.
Break the password, and enter the accounts 'View Statement' section. Somewhere near the top, there
should be a large amount of money transferred (normally over 200,000c). You need to note down the
account number, and IP of the bank that it was transferred too. Once you have done that, disconnect
from the Bank. Connect to the Bank whose IP you got from the statement (you can get the link either
from InterNIC or the IP Lookup Tool). Bypass the monitor if you can, and break into the account of the
person whose number you noted down. Once you are into the account, go to the 'View Account'
section, and note down the name of the Account Owner. Disconnect from the bank, and reply to the
mail, making sure you add the Name you noted down before you click send.
NOTES: If you want, you can delete the logs before you connect to the second bank, though if you do
the job quick enough, you shouldn’t need to.
Ranking: Skilled
Difficulty Rating: 6
Required Software: Password Breaker, Voice Analyser, Proxy Bypass/Disable v5, Firewall
Bypass/Disable v5
First, go to InterNIC, and look for the Public Access Server of the Target Company. Add this server to
your links, and also add the phone number of the system administrator. Connect to the Administrators
Voice Phone system, and start the Voice Analyser. Wait till the call has finished and the voice has been
recorded, and then disconnect. DO NOT CLOSE THE VOICE ANALYSYER. Now, connect to the
Central Mainframe, making sure that the bounce point just before the Target computer is the Public
Access server for that company. Use your Bypassers/Disablers on the Proxy and Firewall, and then
enter the 'Voice Print Identification' section. Press the play button on the Voice Analyser, and wait for
the button to turn green, and then click on it. Enter the Password screen and break the password. Once
you are inside the system, enter the console. Open the usr directory (type 'cd usr') then type 'delete'.
After that, close the usr directory (type 'cd ..') open the sys directory (type 'cd sys') then 'delete' again.
Once this is finished, you can type 'shutdown' and disconnect from the system. Clear your logs, the go
to the Uplink News page, and wait for news that the companies system has been destroyed. Once this
appears, you can reply to the mail and finish the mission.
NOTES: When typing in the console commands, you don’t have to wait for the current action to finish
before typing the next one, as the console will remember what you have typed, and complete the
actions in order.
Trace a Hacker
Mission Descriptions:
Trace a hacker who recently broke into our systems
Trace an unauthorised money transfer
Ranking: Experienced
Difficulty Rating: 7
Required Software: Password Breaker, Decypher v3, Voice Analyser, Log Un -Deleter, Proxy
Bypass/Disable v5, Firewall Bypass/Disable v5
Other Requirements: Something to note down IP's
To start with, you will need to break into the computer of the company that hired you, as they do not
give you sufficient access to view the logs. Once you are into the system you are told in the mission
statement, enter the Logs. On the email, there will be a date and time that the hack occurred. This isn’t
the actual time, this is the time they first noticed it. Look though the logs, and look for the one with the
closest date BEFORE the one you are given. This will be the log you need to trace. Use the Log
UnDeleter on that log, note down the IP and the time/date of the log, and disconnect. Enter the IP you
noted down into the IP Lookup to add it to your links. Now break into that system, enter the logs, and
look for a log that has the same date as the one you noted down (It should be a bounce log). Use the
Log UnDeleter on that log, and note down the FIRST IP on the bounce log (the 'From' IP). Disconnect
from the system, and repeat this process until you get to a Personal Computer. Reply to the mail,
adding the name of the person who owns the computer to the mail.
NOTES: If you take one of these missions, make sure it isn’t more than a couple of hours old, by
checking the date it was posted. If the mission is too old, it will be impossible, because the hacker will
have gone back and totally removed his logs.
Make sure you delete your logs between every connection. Do not leave all the logs until you have
finished the mission as you maybe passive traced before you are finished.
If the Log points to a bank (or it is an Unauthorised Money transfer mission, which starts at the bank)
make sure you hack the admin section and not someone’s account. The logs you need cannot be found
in an account.
Money Transfer
Mission Descriptions:
Our Esteemed colleague wishes to make a donation
Ranking: Experienced
Difficulty Rating: 7 - 8
Required Software: Password Breaker, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5
Recommended Software: Monitor Bypass v5
Connect to the bank told to you in the mission statement. Disable/Bypass the Proxy and Firewall, and
the monitor if you can, and break into the account with the Password Breaker, using the account
number you were given as the User name. Once you are into the account, enter the 'Transfer Money'
section. Type in the Bank IP and account number, and then the amount of money, in the relevant boxes,
and once you are sure all the numbers are correct, hit the 'Transfer' button. Reply to the email after you
have transferred the money. Despite what the mail says, you don’t have to delete the statements, but
don’t forget to clear your own logs!
IMPORTANT: You must reply to the mail before you delete the transfer logs, or your employer will
say you haven't transferred the money.
Ruin Life
Mission Descriptions:
Highly skilled agent required for removal job
Ranking: Knowledgeable
Difficulty Rating: 8
Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher
Connect to the GCD, and break in as you did in previous missions. Enter the search section, and type
the targets name into the search box. When his record comes up, you will need to add 2 criminal
convictions (It doesn’t matter what, you can have them arrested for anything). Once you have added 2
things, add something with the word 'Parole' in it (i.e. 'Broke Parole'). Once that is done, click the
'Authorise Arrest' button, close the box that pops up, and disconnect from the GCD. Clear your logs,
then go to the Uplink News page, and fast forward 3 hours, until the Arrest appears. Once it has, reply
to the mail and finish the mission.
NOTES: This mission is really easy, and it is possible to do a large number of them at once. If you
want, you can take a group of these missions, and do them all in one connection to the GCD.
Frame a Person for computer crimes
Mission Descriptions:
Frame a user for computer crimes
Ranking: Uber-Skilled
Difficulty Rating: 9 - 10
Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher
Connect to the GCD, and break in as you did in previous missions. Enter the search section, and type
the targets name into the search box. When his record comes up, you will need to add 2 criminal
convictions (It doesn’t matter what, you can have them arrested for anything). Once you have added 2
things, add something with the word 'Parole' in it (i.e. 'Broke Parole'). Once that is done, click the
'Authorise Arrest' button, close the box that pops up, and disconnect from the GCD. Clear your logs,
then go to the Uplink News page, and fast forward 3 hours, until the Arrest appears. Once it has, reply
to the mail and finish the mission.
NOTES: This mission is exactly the same as the 'Removal Job' mission, and you can do these at the
same time if you wish to do a group of them.
Ranking: Uber-Skilled
Difficulty Rating: 9 - 10
Required Software: Password Breaker, Log Modifier
Connect to the Bank specified in the mission statement, using only 3 or 4 bounces. If you use too
many, the mission won’t work. WITHOUT bypassing the security, attempt to break the password on
the Banks Admin section. When the trace has started, disconnect from the bank after a few seconds.
Now connect to your first bounce point (InterNIC hopefully), break into the admin account and access
the logs. Look for your bounce log from the last connection (It should be the third one from the top)
and use the Log Modifier on it. Change the log so that the 'From' IP is the one given to you in the
mission statement (i.e. Change 127.0.0.1 to whatever IP you have been given). Delete the 'Admin
Access' log, and disconnect. Go to the Uplink News page, and fast forward, until news that the target
has been arrested for hacking the Bank appears. Once it does, you can reply to the mail and finish the
mission.
Ranking: Uber-Skilled
Difficulty Rating: 9 - 10
Required Software: Password Breaker, Log Modifier, Proxy Bypass/Disable v5, Firewall
Bypass/Disable v5, Monitor Bypass v5 (Voice Analyser, Decypher, depending on the security of the
system)
Connect to the system given to you in the mission statement. You must only use 3 or 4 bounce points
on this mission. If the trace is too long, the mission won’t work (you need the trace to be about 25
seconds). Bypass the Proxy, Firewall and Monitor, and then crack the password. After this, you must
act quickly. Enter the console, open the usr directory, and delete the contents (type 'cd usr' then
'delete'). As soon as this is finished, disconnect from the system, and quickly go to your first bounce
point (InterNIC hopefully) and break into the Admin account. Look for your bounce log from the last
connection (It should be the third one from the top) and use the Log Modifier on it. Change the log so
that the 'From' IP is the one given to you in the mission statement (i.e. Change 127.0.0.1 to whatever IP
you have been given). Delete the 'Admin Access' log, and disconnect. Go to the Uplink News page, and
fast forward, until news that the target has been arrested for hacking the company’s system. Once it
does, reply to the mail and finish the mission.
NOTES: You will only get a couple of tries at this before it stops appearing in the news and the
mission becomes impossible, so make sure you get it right the first time.
3.1 - LANs
Later in the game, some of the missions you will get will require you to hack a LAN system instead of
an Internal Services or Central Mainframe system. These systems are hard to hack, require a lot of
expensive software, and a lot of time. Every LAN is different, so there is no set way of being able to
attack one. You will need to work out the correct course of action you need to take from what systems
are present on the LAN. Following is information on each type of system you will come across on a
LAN, and what you need to do to get around it.
Router
The first system you will see on any LAN, it connects the LAN to the rest of the Internet. You can do
nothing with these systems.
Hub
Connects multiple systems on the LAN together. They have no security, and there is no need to do
anything to them, they simply connect more than one system to another, e.g. a Router to the rest of the
LAN.
Terminal
A basic computer connected to the network, that the employees of the company you are hacking work
at. These server several purposes, though normally they are there to distract you, and waste your time.
On a system that contains a Wireless Transmitter, a Terminal might contain the frequencies of the
Wireless Receivers on the LAN. By hacking the Terminal, the frequencies will be displayed to you.
Sometimes, Terminals also form Subnets that protect certain other systems. In order to be able to
access these systems, you will need to fool that system into thinking you are part of the Subnet. To do
this, you will require the LAN Spoof software. By running LAN Spoof on a Terminal that’s part of a
Subnet, you can then access systems protected by the Subnet.
Lock
Locks prevent you from moving further into a LAN. Before you can progress past the Lock , you must
deactivate it. There are 2 ways of doing this. The first is to use the LAN Force software on the Lock.
This is the quickest, easiest way to get past a lock , but as soon as you do this, the systems
Administrator will log on and begin hunting you through the LAN, and a trace will begin on your
connection.
The second way is to find the correct Authentication Server for the Lock, hack into it, and turn of the
locks your self. This method is more time consuming, as you must first find the Authentication Server,
and they are often protected by Subnet’s or hidden on other parts of the LAN. You can tell which
Authentication Server is correct by the dotted yellow box that appears around it when you have the lock
selected, along with the words ‘Controller’.
Authentication Server
Protected Servers that control Locks on the LAN. You can tell which locks a particular server controls
by the dotted yellow box that appears around each lock , along with the words ‘Locks/Unlocks’.
The servers themselves are usually protected by a Password and Elliptic Curve Cypher, both of which
will need to be broken before you can deactivate any locks controlled by the system.
Wireless Transmitter
Radio Transmitters are used when sections of the LAN are separated from each other. When you
connect to a Transmitter, you will be presented with a screen requesting a radio frequency. When you
enter a correct frequency, you will be connected to the relevant receiver and be allowed to continue on
the other part of the LAN. You can find the frequencies required to operate the Wireless Transmitters
on the LANs Terminals.
Wireless Receiver
These do little other than receive connections from Wireless Transmitters. There is nothing to do when
connecting to them and simply serve as connections to other points in the LAN.
Modem
Modems act in a similar way to Transmitters and Receivers, by separating sections of the LAN so you
can’t directly connect from one to the other. In order to connect to a Modem, you will first need to find
its phone number. This is stored on a Terminal on the LAN. Once you have the phone number, you will
need to disconnect from the LAN, enter the phone number EXACTLY as it appeared on the system into
the IP Lookup tool. This will give you a link to the modem. By clicking this link, you will enter the
LAN from the Modem, and can continue on the system.
Isolation Bridge
An Isolation Bridge works in a similar way to an Authentication Server, except that instead of
controlling one lock , it controls 2. One of these locks will always be open, and the other will always be
closed. When you use the Isolation Bridge, the closed lock will open and the open one will close.
Subnet
Subnets aren’t actually types of system, but groups of Terminals used to protect other systems. A
system protected by a Subnet will not accept connections from anything that isn’t a part of that Subnet.
When you click on a system, ‘Valid Subnet’ will appear on any systems forming a Subnet that’s
guarding that system, along with a dotted yellow box. To connect to one of these protected systems,
you will need to use LAN Spoof to fool the system into thinking you are part of that Subnet. Once you
have used LAN Spoof, you will be able to connect to the system normally.
Main Server
Your eventual target on the LAN. This is the system that runs the LAN, and any missions you have on
a LAN will most likely be targeted at this machine. They are heavily defended, require a Password and
Voice ID to connect to them, and when you do connect to them, the System Admin will log on
automatically and begin hunting you, as well as starting a trace on your connection. They are laid out
the same as Central Mainframe systems when you connect to them; they have a File Server, Console
and Log section. Working your way through the LAN will always lead to this system.
Navigating LANs
In order to connect to systems on a LAN, you will need to make a connection path through the LAN to
that system first. When you first connect to a LAN, you will only be able to see the router. The first
thing you should do is run LAN Scan. This will show all the systems on the LAN that aren’t protected
by closed locks (If nothing appears, you will need to buy a higher version of LAN Scan). Once this is
finished, you should run LAN Probe on the Router to show where it connects to. Run LAN Probe on a
few systems to give you an idea of the layout of the LAN. Now you need to make a connection to the
first system. From the Router, click the first system connected to it (usually a Hub). A dotted line will
appear over the connection line to the Hub. This line is your connection path. Clicking on another
system connected to the Hub will extend your path to that system. Continue this process till you reach
the first system you need to hack. This is where the 3 options to the right come in. The first option is
‘Back’. Use this to move your connection path back to the previous system. The next one is ‘Reset’.
This will move your connection back to the Router, and reset any access you had on the system (though
any opened locks will remain open). The 3rd is ‘Connect’. This is what you use to connect to a system
you currently have a path to. Click the system, then click connect and the contents of the system will be
displayed.
If at any point, the System Admin should log on, he will try and hunt you through the LAN by
following your connection. If he reaches the system you are connected to, he will dis connect you from
the LAN.
Attacking LANs
The first thing you should remember about LANs is that, just like other systems, they have Proxies and
Monitor, which will need bypassing or disabling if you intend to be successful. You should also make
sure you have the voice print for the companies Administrator before you connect, as you will need it
to enter the Main Server. Since every LAN will be different, there is no set way of attacking them, as
you don’t know what types of security will be on the LAN. Use the above information to tackle each
system as it comes. Remember that Using LAN Force or Connecting to the Main Server will cause the
Systems Admin to log on, and that a trace will start on your connection. As long as you have the right
software, and don’t rush and make mistakes, you shouldn’t have many problems hacking a LAN. You
should also remember that, if the system admin reaches your location in the LAN, you will be cut off,
regardless of how long you have left on the trace. You can tell when he logs on because the siren will
sound.
Description: After accepting the offer from ARC, wait for Arunmor to give you a counter-offer. Reply
to the mail they send you, with Revelation attached, and they will give you 15000c. After completing
this mis sion, you will be on the Arunmor side of the storyline.
Tracer
Mission Description: Upload and run a file.
Payment: 10000c
Software Requirements: File Copier, Password Breaker, Monitor Bypass v5, Proxy Bypass v5, Firewall
Bypass v5
Description: First, connect to the Arunmor File Server, and copy the RevelationTracer to your memory.
Next, connect to ARC Internal Services Machine, and bypass all the Monitor, Proxy and Firewall.
Break the password and enter the File Server. Run your file copier on the RevelationTracer, then copy
it to the File Server, then go to the Console. Enter the usr directory (type ‘cd usr’) and the run the
RevelationTracer (type ‘run revelationtracer’) and wait for it to say the program is hiding itself. Once
this is done, disconnect, clear your logs and reply to the email.
TakeMeToYourLeader
Mission Description: Upload and run a file.
Payment: 30000c
Software Requirements: File Copier, Password Breaker, Monitor Bypass v5, Proxy Bypass v5, Firewall
Bypass v5
Description: This mission is almost identical to the last one. If you still have the copy of Revelation
that ARC sent you, you can proceed with the mission. Otherwise you will need to connect to Arunmor
File Server and get a copy before hand. Connect to Arunmor Internal Services Machine and bypass the
Monitor, Proxy and Firewall. Break the password and enter the File Server. Run your file copier on
Revelation, then copy it to the File Server, then go to the Console. Enter the usr directory (type ‘cd
usr’) and the run Revelation (type ‘run revelation’) and wait for the Virus to become active. You will
automatically be disconnected when it does, and a red square will appear on the world map. Once this
is done, disconnect, clear your logs and reply to the email.
ARCInfiltration
Mission Description: Copy a Database.
Payment: 30000c
Software Requirements: File Copier, Password Breaker, Monitor Bypass v5, Proxy Bypass v5, LAN
Scan, LAN Probe, LAN Spoof, Voice Analyser, Decypher, Decrypter v5
Other Requirements: 90Gq Memory Space
Description: Before you connect to ARC Local Area Network, you will need to get the Voice Pattern
of the ARC Admin, so go to the ARC Public Access Server to get his number, then connect and record
his voice.
Now, go to ARC Local Area Network, and Bypass the Monitor and Proxy . You will now need to work
your way through the LAN Since the LAN is randomly generated each time, there is no set way to do
this, but you should aim for the Main Server system (Refer to Section 3.1 if you need help getting
through LANs). When you are in the system, enter the File Server, and at the bottom should be 9 files,
10Gq each, named ARC-Revelation x.dat. These are the files you need to copy. Copy all the files to
your memory, disconnect, and clear your logs. Now, connect to the Arunmor File Server and copy all
of the files onto it. If there isn’t enough space, delete any useless files that may have appeared. Once
you have copied all of the files, use the Decrypter on them, and then you can reply to the mail and
finish the mission. If you didn’t have enough memory space for all the files, you will need to make 2
trips.
CounterAttack
Mission Description: Destroy Revelation
Payment: 50000c
Required Software: Faith, Revelation Tracker, IP Lookup, Voice Analyser, Decypher, Monitor Bypass
v5, Proxy Bypass v5, Firewall Bypass v5, File Copier.
Description: The final Arunmor mission. There is only one way to do this one, and that is quickly. First
of all, go to Arunmor’s File Server, and get a copy of Faith and Revelation Tracker. Run Revelation
Tracker straight away, as that will give you IP’s of infected systems. Use your IP lookup to get the link
from each IP, and connect to the system. Break through what ever security the system has, and enter
the file server. Copy Faith to the system, then go into the console and run it. A few seconds later,
Revelation should be cleared from the system. Disconnect, and continue doing the same thing until the
mission is complete. You do not have time to clear your logs on this one, so make sure you have a
Motion Sensor and Gateway Nuke, and that the Motion Sensor is running.
HINTS: Don’t bother with Banks or Central Mainframes. Leave them and let Revelation spread to a
system that you can hack quicker (Internal Services).
Don’t waste time. Revelation only needs 2 minutes to be able to spread to 2 other systems. Disinfect a
system and then move on to the next one.
After you have finished the mission, keep an eye on your Motion Sensor. Since you didn’t have time to
cover your logs, you will be traced, so you will need to Nuke your gateway. Its also worth noting that
ARC may try and frame you a while after this mission, so you should keep your eye on your motion
sensor at all times, or you may well find yourself Disavowed for hacking ARC Central Mainframe
when you didn’t do it. You will also have a criminal record that needs clearing if this happens.
Alternate Ways of Fighting Revelation
On the forums, several other ways of fighting the virus have been put forward. Though I’ve not tested
these myself, I’m told they work by others. So, here they are.
1. Instead of running faith on a system, go straight to the console, and shut the system down (by
deleting the sys directory and then using the shutdown command). Revelation will still show up on the
map, but when the 2 minutes pass, since the system is no longer running, the virus cannot spread and
the infection will disappear.
2. When the Revelation outbreak occurs, connect to ARC Central mainframe and crash the system.
This will stop the virus from spreading to other computers.
You should note that people have said, using this method, that Revelation will start again when the
system comes back online.
Revelation in action
This is the end of the Arunmor side of the storyline. After you have finished this mission, keep your
eye on the news for the ending of the story.
MaidenFlight
Description: Upload and run a file
Payment: 10000c
Required Software: File Copier, Password Breaker, Monitor Bypass v5, Proxy Bypass v5, Firewall
Bypass v5
Connect to Arunmor Internal Services Machine and bypass the Monitor, Proxy and Firewall. Break the
password and enter the File Server. Run your file copier on Revelation, then copy it to the File Server,
then go to the Console. Enter the usr directory (type ‘cd usr’) and the run Revelation (type ‘run
revelation’) and wait for the Virus to become active. You will automatically be disconnected when it
does, and a red square will appear on the world map. Once this is done, disconnect, clear your logs and
reply to the email.
Darwin
Description: Copy a database
Payment: 15000c
Required Software: File Copier, Password Breaker, Monitor Bypass v5, Proxy Bypass v5, LAN Scan,
LAN Probe, LAN Spoof, Voice Analyser, Decypher, Decrypter v5
Description: Before you connect to Darwin Local Area Network, you will need to get the Voice Pattern
of the Darwin Admin, so go to the Darwin Public Access Server to get his number, then connect and
record his voice.
Now, go to Darwin Local Area Network, and Bypass the Monitor and Proxy , You will now need to
work your way through the LAN Since the LAN is randomly generated each time, there is no set way
to do this, but you should aim for the Main Server system (Refer to Section 3.1 if you need help getting
through LANs). When you are in the system, enter the File Server, and at the bottom should be 9 files,
10Gq each names Darw-DARWIN x.dat. These are the files you need to copy. Copy all the files to
your memory, disconnect, and clear your logs. Now, connect to the ARC File Server and copy all of
the files onto it. If there isn’t enough space, delete any useless files that may have appeared. Once you
have copied all of the files, use the Decrypter on them, and then you can reply to the mail and finish the
mission. If you didn’t have enough memory space for all the files, you will need to make 2 trips.
SaveItForTheJur y
Description: Frame a user for bank fraud
Payment: 20000c
Required Software: Password Breaker, Log Modifier
Description: Using only 3 or 4 bounce points (InterNIC being the first as always), connect to the bank
that ARC gave you in the mission statement. Without bypassing any security, enter the password entry
and attempt to break the password. Let the trace run until only 7 or 8 seconds remain, and then
disconnect. Now quickly connect to InterNIC and enter the log section. Run the log modifier on the
bounce log, and change the log so that the ‘From’ IP is the IP of the Arunmor Technical Director.
As soon as you have done this, delete the Admin Access log and disconnect from InterNIC, then reply
to the mail straight away (do not wait for it to appear in the news) to finish the mission.
ShinyHammer
Description: Destroy a database
Payment: 30000c
Required Software: Password Breaker, Voice Analyser, Decypher, Monitor Bypass v5, Proxy Bypass
v5, Firewall Bypass v5.
Description: First of all, you will need to get the link for the Arunmor Central Mainframe. You can do
this by hacking the Arunmor Internal Services Machine and going to the links section.
Once you have done this, connect to the Arunmor Central Mainframe, bypass the Monitor, Proxy and
Firewall, and break through their security. Enter the console, and delete everything from the usr and sys
directories, and when that is done, shutdown the system and disconnect. Clear your logs and then reply
to the mail (do not wait for it to appear in the news).
GrandTour
Description: Destroy the Internet
Payment: 50000c
Required Software: Revelation, Voice Analyser, Decypher, Monitor Bypass v5, Proxy Bypass v5,
Firewall Bypass v5, File Copier.
Description: The final ARC Mission. This mission is made hard by the fact not only do you have to
quickly spread Revelation, but you also have Uplink planning to disavow you for working for ARC,
and Faith working against you to stop Revelation, so the pressure is even higher. You should be aware
that if Faith is a higher version than Revelation at this point, the mission becomes next to impossible,
because it doesn’t spread. Basically, you have to copy Revelation to every server you can, go to the
console, and run it. Don’t worry about deleting your logs, because it’s game over regardless of the
result. You will know when you have been successful, because Revelation will spread to your system.
When you have finished the mission, you can confirm it by checking your agent status to see if you
have the GrandTour badge.
HINTS: Stick with the easy systems, like Internal Services to start with.
Be FAST.
This is the last of the ARC missions, and the end of the game. By going with ARC, you have
condemned your Agent to the game over screen
Uplink has many unique servers, each of which has something different. Some of them are just a little
fun, but others actually contain vital bits of the game. Here is a list of each server, what it’s for, and
what security you can expect.
InterNIC
Perhaps the most important server in the game. This contains links to almost every other server in the
game, which you can add to your Link List. It is also a safe place for your first bounce point. The
Admin section has a simple password screen for protection, there is never any trace from this server,
and the password never changes.
Introversion Software
This server belongs to the Creators of Uplink. On it you will find lots of information about things that
inspired Uplink and plans for the future. This server is hidden and you must find it yourself.
1. Connect to the bank, with InterNIC as your first bounce, and bypass the monitor and proxy with
Level 5 Bypassers.
2. Break into the account you want to steal from, using the account number as the user name, and the
password breaker to get the password. You should not have a trace on you because of the monitor
bypass.
3. Enter the transfer screen and transfer money to your Uplink bank account
4. Delete the Statement logs from the account you stole from saying you just transferred money.
5. Connect to Uplink bank, log into your account, bypass monitor and proxy then delete the log saying
you received money
6. Connect to InterNIC and delete the bounce logs.
7. Start Spending. You don’t have to wait before you can spend the money you just stole.
Note that once you have a password of an account, you don’t need the monitor bypass to access it, the
bank doesn’t trace normal account entries.
Don’t bother with the Dictionary Hacker; it is a waste of time. Stick with the Password Breaker.
When buying Software, only buy the highest version. If you can’t afford the highest, do a couple more
jobs until you can. This way you will save your self the trouble and money of upgrading later on. This
is especially important with LAN software, as LAN security varies slightly, and there is no guarantee
that v1 software will work on even the simplest of LANs.
If you can afford it, buy the Proxy and Firewall Bypass instead of Disable. It may be more expensive,
but it will make your life a lot easier.
Don’t waste time while doing a job. Anything else you have to do can wait until a job is finished.
Always clear your logs as soon as you have done the mission. If you leave them, you will likely forget
and be caught.
Revelation Bug
While doing the final Arunmor mission (Stop Revelation), the game will crash repeatedly.
Solution: None. All you can do is keep loading your game and keep trying. You can avoid the crashes
in Counterattack by never using the IP Lookup when you have the world map open
Random Crashes
Unfortunately, the game crashes, seemingly randomly, and there is no explanation.
Solution: Simply reload your game and continue from where you left off.
Section 8 – FAQ
Here’s a list of commonly asked questions, and the answers.
Q. I’m Having graphical Problems with my Kyro II, how can I fix it?
A. Try this, I have been told it works, though I’ve not tried it myself.
Create a new profile for Uplink in the 3d optimisation tab (under properties for screen, settings tab
click advanced then on the optimisation tab).
Click the arrow to create a profile for Uplink. Give the profile a name and browse to find the .exe file
for uplink.
Now click the openGL tab and make sure you check the box in front of "use application specified
buffering".
Start the game and hopefully there will be no flickering or tearing.
By checking the "Disable Waiting for Vertical Sync" box in the openGL optim.. you might gain some
speed in the game.
Tip: Stay clear of the other boxes. In most cases it only makes it worse.
Section 9 – Secrets
There are loads of secrets hidden in Uplink. Here is a list of them, and hints on how to find them.
(Possible Spoilers)
Gamebible.zip
On the Uplink CD, in the Misc directory, there is a zip file called Gamebible. This file is passworded,
and you cannot get the files with out the password.
Hints – You have everything you need when you get the game. Think outside the box.
Introversion’s IP
Hidden in Uplink is the Introversion Server, containing lots of interesting information. Unfortunately,
you have to find this server yourself as it is not at InterNIC.
Revelationcore0.7
The mystery file, deleted from ARC Central Mainframe before you get to it…
Gamebible Page 25
If you have managed to get into the Gamebible, page 25 hides a little message.
Wargames???
If you have looked at the status screen after you have lost an agent, you will have seen that there are 12
special missions, but the storyline missions only cover 10 of those… This is one of the other 2.
Mole???
And this is the other secret mission.
Hint – The last place you would think of hacking, because you already have access.
Hint – What if the dead agents email was never sent out…
On the CD there are Previous Versions of Uplink, including one that still has 3d graphics! There are
loads of pictures, and the music files for the game. There are lots of ideas about Uplink: Online, as well
as an Ingame history of Uplink Corp.
Also, there are pictures of the Introversion team, so those of you wondering what the guys look like,
you need the bonus diskJ.
And finally, the Gamebible. Contained on the bonus disk is Book 2, and how to get book 3, but,
surprise surprise, they are encrypted. Both books 2 and 3 have been accessed now, so some help is
available on cracking them.
HINTS
Book 2 – You need to use half the information in the world to get into it.
Book 3 – A Classic Encryption Method.
The Bonus Disk Menu
Patch 1.2
Scroll Bars added.
Ability to change Uplink’s resolution added.
Theme menu added to the options screen, allowing you to easily choose which Uplink skin you wish to
use.
The Ability to change the colour of the bars in the game added.
Process of adding gateways to the game is simplified.
Defrag tool is added to easily sort files in your memory banks.
Ability to zoom in and out of the World Map is added, to make life easier when the map is cluttered.
IRC Client added to the game, to allow to you connect to the Uplink IRC channel online and talk with
others while playing the game.
LANs added to the game, a major new challenge for experienced hackers, requiring new software and
skills, and the ability to add your own LANs and companies to the game.
You can no longer delete InterNIC from the Links screen.
A Large list of bug fixes.
Pop Tarts!!!
If you should run across some un-informed individual who disagrees with this, you must correct them
immediately. If they still continue to disagree, you must assault them mercilessly with Cherry Pop tarts,
while feeding them Chocotastic Pop Tarts, until they agree that Cherry = Bad : Chocotastic = Good.
12.4 – Conclusion
In conclusion, Pop Tarts obviously rule. They taste great and have multiple uses. Anyone who says Pop
Tarts are bad must be swiftly and brutally dealt with. And anyone who says that Toaster Struddles are
better than Pop Tarts must be beaten to death with their beloved Studdles. You know who you are!
Summary:
Pop Tarts: Good
Everything Else: Bad
Section 13 – Conclusion
So, that’s it. That’s the end of the Guide. I hope I have covered everything you will need to know about
Uplink, but if there is anything I have missed, or you have any questions feel free to contact me.
I am often (read: always) on Uplink’s IRC channel as _Icepick_, so you can talk to me there, or you
can just stop by and chat to the people. There is normally some one there to talk to, at peak times the
place is quite active, and sometimes, Chris Delay, the creator of the game stops by for a chat. You can
also email me, or contact me over ICQ.
I will update this guide as it is required, either because I have missed something, a new patch is
released, or I think of something else to add.
I would like to thank everybody who has helped contribute to this guide, you know who you are.
So, thank you for reading, I hope it has helped you.
13.1 – Contact
Email: [email protected]
ICQ#: 97794115
IRC: irc.openprojects.net
Port 6667
#uplink
13.2 – Links
All Information contained in this Guide is copyrighted to Icepick. Do not recreate any or part of this Guide for any purpose
without my permission first. Uplink is copyright to Introversion Software.