Search found 11 matches

by Lecusto
Fri Mar 03, 2017 5:37 pm
Forum: NETWORK ARCHITECTURE
Topic: Core 9 layout (help for extra nodes)
Replies: 1
Views: 1015

You only need 2 databases for core 11 (it's also true for core 12).
As fore the mixer, one is enough too at least to get to beam lvl 14 at least.
To get the code gate, you'll have to wait for core 11 so get the scanner.
by Lecusto
Sat Feb 18, 2017 7:08 am
Forum: NETWORK ARCHITECTURE
Topic: question about choke points
Replies: 3
Views: 1458

Re: question about choke points

Well. Turrets counter IceWall. BlackIce counters Protector. I guess most common is the 2 Turrets and 1 BlackIce combo. I preffer 3 Turrets because they're a lot faster and a lot people still can't handle it. I completely agree. By the way, how do you handle the case when even shockers take too much...
by Lecusto
Sun Feb 12, 2017 3:27 pm
Forum: GENERAL DISCUSSION
Topic: Lets Make It A Poll Then
Replies: 16
Views: 4118

Re: Lets Make It A Poll Then

Voted yes. Before the change farming was the only viable way of progressing. Yet there was no real challenge in hacking and every hack was the same as the previous one. With the new system, there is some challenge in the target I get. Now, it may happen that I fail some hacks. On the other side, my ...
by Lecusto
Fri Feb 10, 2017 6:16 pm
Forum: HACKING STRATEGIES
Topic: Stealth 'cheat sheet'
Replies: 13
Views: 6173

Re: Stealth 'cheat sheet'

Newbie wrote: Hi Lecusto, at column I (calculation of disk space), the indirect source should be referenced to column $E instead of $D.

Thx for your great work!!!
Right, its fixed. Thanks for reporting it !
by Lecusto
Thu Feb 09, 2017 10:59 am
Forum: GENERAL DISCUSSION
Topic: search algorithm is kinda funny after the maintenance
Replies: 34
Views: 9175

Re: search algorithm is kinda funny after the maintenance

I had to decrease my reputation a lot due to that change. At lvl 38, I'm hacked by people at lvl 45+ and my search gave me mostly lvl 50-55 to hack :shock:
Shouldn't it be some level cap in the people you can find?
by Lecusto
Tue Feb 07, 2017 6:44 am
Forum: NETWORK ARCHITECTURE
Topic: Want some opinions on my layout (Lv.8)
Replies: 8
Views: 2479

Re: Want some opinions on my layout (Lv.8)

Now I would put the evolver between the two guardians, or even the core itself. So that the attacker really needs to get through the high firewall of the core to get to your ressources. Then I would be afraid of the kraken so I let you think about it. For your mine, I prefer having a lot of defences...
by Lecusto
Mon Feb 06, 2017 10:26 am
Forum: NETWORK ARCHITECTURE
Topic: Want some opinions on my layout (Lv.8)
Replies: 8
Views: 2479

Re: Want some opinions on my layout (Lv.8)

Better, next suggestions would be to work on getting the net connection one node before the code gate.
Other sugestions, connect your last defences to the guardian and connect your core to the evolver so that an attacker wastes time on it.
The mine can be moved somewhere else.
by Lecusto
Sun Feb 05, 2017 11:52 am
Forum: NETWORK ARCHITECTURE
Topic: Missing certain defense nodes
Replies: 6
Views: 2027

Re: Missing certain defense nodes

Some think that they are too slow to be a reliable defence. Moreover, they have 5 program slots so, once taken, all that is connected is easy to take too. Yet, I do think that well placed they are quite important, especially against walls and protectors. The fact that they do not make continuous dam...
by Lecusto
Sun Feb 05, 2017 11:39 am
Forum: NETWORK ARCHITECTURE
Topic: Want some opinions on my layout (Lv.8)
Replies: 8
Views: 2479

Re: Want some opinions on my layout (Lv.8)

A first advice would be to put your first code gate before your scanner. If your network pop up in the search, I would portal into the sentry or the black ICE and your first set of defences would be nearly useless. Also, my opinion is that with 5 program slots ICE is really not an effective choke po...
by Lecusto
Tue Jan 31, 2017 8:23 pm
Forum: HACKING STRATEGIES
Topic: Stealth 'cheat sheet'
Replies: 13
Views: 6173

Re: Stealth 'cheat sheet'

Updated post with a link to my excel sheet: https://drive.google.com/file/d/0B_r8hUYdmUpzUHBCcG9QcWNtNGc/view?usp=sharing. Thinking out loud, this kind of sheet might be even more useful for brute force hack. Like cheking if a choke has risks to be recaptured or if the time taken to go through the n...