Search found 36 matches

by Prochlub
Sun Jun 19, 2016 7:49 pm
Forum: VIDEO GALLERY
Topic: Videos of successful hacks
Replies: 42
Views: 15998

Re: Videos of successful hacks

Wow! :D Your timing, just, ... wow :lol: Both Stealth and Brute, can't believe it worked out actually :lol:
by Prochlub
Tue Jun 07, 2016 2:59 pm
Forum: NETWORK ARCHITECTURE
Topic: Positioning Turret
Replies: 5
Views: 3345

Re: Positioning Turret

Also, when positioning Turrets, it's good to keep in mind the boost for spreading Sentry program - it's often benefitial to connect them to some sentry as well.
by Prochlub
Tue Jun 07, 2016 2:25 pm
Forum: NETWORK ARCHITECTURE
Topic: Positioning Turret
Replies: 5
Views: 3345

Re: Positioning Turret

Defenses are often connected to Scanner, because of 3 reasons: - it does not have big firewall, meaning it can be taken back more easily - it has 4 neighbors, meaning you can connect 3 defenses to it to take it faster - it has only 3 program slots, meaning attacker has less space to manuever (usuall...
by Prochlub
Mon Jun 06, 2016 9:30 pm
Forum: HACKING STRATEGIES
Topic: Scanner
Replies: 8
Views: 4601

Re: Scanner

Don't "ever" use Access on a non-disabled CodeGate if a Scanner is in range I know you mean well, but seriously, the space Wraith takes can be more valuable than the stealth bar you save by doing this. Again, really depends, but I purposefully did exactly that several times, install access on activ...
by Prochlub
Mon Jun 06, 2016 9:25 pm
Forum: HACKING STRATEGIES
Topic: Scanner
Replies: 8
Views: 4601

Re: Scanner

Kenny: Nice :) Yeah, it depends. For sure it can be well worth it. On higher levels, scanners sensitivity can be 300% for example, or 400% etc. So with just 300%, you can either install 2 Wraiths next to that scanner for "6Wcost", or install Wraith on scanner (3Wc) and 3 more somewhere else = 4 in ...
by Prochlub
Sat Jun 04, 2016 11:47 am
Forum: HACKING STRATEGIES
Topic: Kraken
Replies: 21
Views: 10337

Re: Kraken

non-Kraken strategies would beat this kind of base easily Yep that's kinda the point I guess - you can make it almost useless (or at least not a favorable choice) quite easily, but than for example Shocker+Shuriken combos gain huge advantage and so on. Pick your poison kind of thing. Yes I meant pl...
by Prochlub
Sat Jun 04, 2016 11:16 am
Forum: HACKING STRATEGIES
Topic: Kraken
Replies: 21
Views: 10337

Re: Kraken

Fantom: In your other posts you mentioned, that the biggest problems are with sentries so you try to disable them if possible. But I have not yet seen anyone trying to take advantage of them really. I mean, networks are so often structured libraries -> defense cluster -> resources, where these part...
by Prochlub
Tue May 24, 2016 9:36 pm
Forum: GENERAL DISCUSSION
Topic: Beta testing
Replies: 6
Views: 2578

Re: Beta testing

Oh great... Now the whole wide world will see how miserable I actually am at this thing :oops:
by Prochlub
Mon May 23, 2016 2:47 am
Forum: NETWORK ARCHITECTURE
Topic: Priority order
Replies: 11
Views: 5235

Re: Priority order

The priorities for most programs are something like this: - the highest priority is on 'active security nodes' (black ice, turret, sentry) - after that, the focus goes on 'black' nodes (= where sentry program is uploaded, on 'non security nodes') - than nodes where sentry is loading at that moment -...
by Prochlub
Thu May 19, 2016 1:45 am
Forum: NETWORK ARCHITECTURE
Topic: Network Build screenshots
Replies: 626
Views: 215448

Re: Network Build screenshots

All Krakens aim to reach the Core, and once there, it sticks out tentacles too all neighboring nodes. Does not spread further, but attacks all adjacent nodes. It actually looks kinda funny (they take 7 'library slots' though and can be pain in the a** to 'protect' sometimes... it only attacks in 1 d...