You are on page 1of 36

The Ultimate Uplink Guide v1.

15
Welcome to the Ultimate Uplink Guide. This guide contains pretty much everything you will ever need
to know to be successful in Uplink, and is designed to help those that have never played the game
before to get to grips with it, but also to allow people who know what they are doing to see if there is
anything they could do better. It has mission guides, general tips, and although it wont actually contain
all the secrets of the game, it will point you in the right direction to finding them your self.
Section Listing
Section 1 The Basics
1.1 The HUD
1.2 Connection Bouncing
1.3 Being Traced
1.4 Logs
1.5 Server Links
1. U!"ink #nterna" Services
1.$ The %a&e 'ver Screen
Section 2 %a&e #n(or&ation
2.1 U!"ink )ating
2.2 *euro&ancer )ating
2.3 So(t+are
2.4 Hard+are
2.5 %ate+a,s
2. S,ste& T,!es
2.$ Securit, S,ste&s
2.- Conso"e Co&&ands
2.. Changing /our )ecords
2.10 User 1ccounts
Section 3 2ission %uides
3.1 3 L1*s
Section 4 Stor,"ine 2issions
4.1 1run&or 2issions
4.2 1)C 2issions
Section 5 S!ecia" Servers
5.1 #&!ortant Servers
5.2 4un56oke Servers
Section Hacking He"!
.1 Bank Hacking
.2 %enera" Ti!s
Section $ Co&&on Bugs
Section - 417
Section . Secrets
Section 10 The Bonus Disk
Section 11 8atch 1dditions
Section 12 8o! Tarts
12.1 8o! Tart 4"avours
12.2 Uses (or 8o! Tarts
12.3 9hich 4"avour is :est;
12.4 3 Conc"usion
Section 13 Conc"usion
13.1 Contact
13.2 3 Links
Section 1 The Basics
This section describes the basics of the game, how to get started and to hack successfully with out
being caught.
1.1 The HUD
The focus of the whole game, your Heads Up isplay.
!long the top, you have the date, the I" you are currently connected to, the #"U usage and Time
#ontrols, and the World $ap. Underneath the #"U usage gauge is a list of all software currently
running, amount of the #"U they are currently using, and buttons to increase or decrease the #"U
usage of each program. The Time #ontrols are % buttons that allow you to pause, and speed up time,
and of course, return it to normal. The World $ap shows your current connection route, and by
clicking on it, you get a large version that allows you to select bounce routes, and buttons to save the
routes while the game is still running.
U!"ink HUD
!t the &ottom of the screen there are ' &uttons, and an area that holds any email(mission statements
you have. The first, and largest of the buttons opens the software menu, allowing you to run any
software you currently have in your memory. The rest of the buttons allow you to view your current
hardware, files, "ersonal status, and to send email. When you click one of these buttons, the
appropriate display appears to the right.
1.2 Connection Bouncing
When you attempt to hack any server, you will need to bounce your connection through other servers
otherwise you will be traced instantly, and disconnected before you)ve even gained access.
When you want to connect to a server, go to the World $ap, and click on the other servers
*+epresented by White ,-uares. around the map before clicking on the machine you want to connect
to. This will give you time to do whatever it is you need to do on the server.
The time you get depends on how many servers you bounce through, and what kind of access you have
on those servers. ! +egular account on a machine, like a &ank !ccount, *Indicated by the doted lines
surrounding the server. will give you longer than a machine that you don)t have an account on, and a
machine that you have !dmin access on *Indicated by the solid bo/ surrounding the server. will give
you even longer.
When you start to bounce your connection, it is a good idea to use Inter0I# as the first bounce point
*i.e. the first server you click on.. This will be e/plained in the ne/t section.
If you find that an area of the map is too cluttered to see what links you are clicking on, you can use the
1oom feature to enlarge a section of the map, and make it easier to click the link you need.
1.3 Being Traced
!lmost any server you connect to will try to trace you the second you start hacking their security. The
time this trace takes depends on how you have bounced your connection, but in the end, the same thing
happens. The trace finishes, you are disconnected, and most likely disavowed, or at least fined and
having something added to your criminal record. It)s part of your 2ob to finish what ever you are doing
before the time reaches 3. 4or this you need the Trace Tracker, to tell you how long there is before you
are traced. 5ou should always give your self enough time to do the 2ob, there)s nothing worse then
getting half was through a 2ob, to then have to disconnect because you don)t have enough time left. The
more e/perienced you become, the better your abilities will get, and the faster you will be able to do
things, therefore needing less time. The only thing for this is practice. The more you do, the better you
get.
1.4 Logs
6very time you connect to a server, you create logs. Using these logs, a #ompany(Hacker can do a
7"assive Trace) on you, by following the logs back through your bounce route and to your machine.
To prevent this, you need to clear your logs. The safest way to do this is to delete your logs from your
first bounce point. &ecause Inter0I#)s password never changes, and they do not trace you, it is the best
server to use for your first bounce point, as you can easily access the server)s logs and delete them.
When you go to delete your logs, you must make sure you delete the right ones. The main logs you
need to delete are the 7&ounce) logs, and the 7"assword !ccepted) logs, which look like the following8
7#onnection from 9:;.3.3.9 routed to ///.///.///.///) *&ounce <og.
74rom 9:;.3.3.9= "assword authentication accepted) *"assword !ccepted <og.
These are the logs you need to delete. It is important that you leave the actual connection logs there
though, because you also leave logs when you disconnect, and it would look suspicious if there was a
disconnection log but no connection.
&y deleting these logs from your first bounce point after every hack, you should never be caught, as
long as you aren)t too slow in doing it.
+emember, everywhere keeps logs, including >oice "hone ,ystems. ?ust because you can)t get to the
logs, it doesn)t mean they aren)t there.
1.5 Server Links
The main thing you will see when you aren)t connected to a server is the links screen. This displays all
the links that you currently have.
!t the bottom of this screen, there is a filter, which allows you to type in a piece of te/t, and show only
the links containing that te/t. This is useful if you have a large number of links and need to find a
specific one.
!t either side of each link, there is a blue bo/. The one on the left has a cross in it. #licking on this will
delete the link from your system, and will no longer show up on the World $ap. The one on the right
contains : circles. #licking on this will make the bo/ disappear, and then that link will not appear on
the World $ap, useful if the map is cluttered but you don)t want to delete your links.
5ou can also connect directly to any server, simply by clicking on the appropriate link.
5ou can find a collection of most of the <inks in the game at Inter0I#. #onnecting to the Inter0I#
server, and clicking on the &rowse button will bring up a list similar to your own <ink display, that
contains a huge number of links that you can add to your own list by clicking the blue bo/ with the @
symbol in.
1. U!"ink #nterna" Services
This is the most important server in the game, and should be the first one you connect to. This is where
you get your $issions, ,oftware, Hardware, Gateways, !gent +ankings and 0ews. These are the guys
that provide and maintain your Gateway and upgrade when re-uired. The provide the ability to contact
any employers you wish to speak to, in order to get more details on missions, or get higher pay. 5ou
will also spend -uite a bit of time there watching the news.
1.$ The %a&e 'ver Screen
When your agent is caught, or something else happens that stops him from working, when you try to
log in with you character, the Game Aver status screen will be displayed. This will contain the
information of what you have done during your career.
Section 2 U!"ink #n(or&ation
This section contains Information about Uplink, such as Uplink +atings, 0euromancer ratings and how
they change, and ,oftware and Hardware Info.
2.1 U!"ink )atings
This is a list of the Uplink ratings you ac-uire through the game. 5ou increase your rating by hacking
systems and doing 2obs. The harder the work you do, the more your rating goes up.
Grade 9' B +egistered
Grade 9C B &eginner
Grade 9% B 0ovice
Grade 9D B #onfident
Grade 9: B Intermediate
Grade 99 B ,killed
Grade 93 B 6/perienced
Grade E B Fnowledgeable
Grade G B UberH,killed
Grade ; B "rofessional
Grade ' B 6lite
Grade C B $age
Grade % B 6/pert
Grade D B >eteran
Grade : B TechnoHmage
Grade 9 B T6+$I0!<
2.2 *euro&ancer )atings
5our 0euromancer +ating is an unofficial rating given to you by the hacker community. It has little
effect in the game, though it does say something about your morals as a hacker. If you are the kind of
person who will do things that damage a company, your rating will go up, but if you do things that are
bad for other hackers, your rating will drop. !nd it is ! <AT easier to make it drop than it is to make it
go up. oing missions such as 7estroy a #orporate atabase) will improve your 0euromancer rating,
where as doing missions like 7Trace a Hacker) will decrease it a lot.
0eutral H !ggressive H ,ingle $inded H !ctivist H !narchic B +evolutionary *Good ,ide.
0eutral H Untrustworthy H 0otorious H Indiscriminate H ,ociopathic H $orally &ankrupt *&ad ,ide.
2.3 So(t+are
4ollowing is a guide of each piece of ,oftware available in Uplink, and how to use it.
ecrypter
>ersion 9 >ersion : >ersion D >ersion % >ersion C >ersion ' >ersion ;
#ost G33c 9:33c 9'33c ::33c D333c ;333c 9C333c
,i1e :G- :G- :G- :G- DG- %G- CG-
escription ecrypt files with e-ual or lower encryption than the version, by clicking on them.
ecypher
>ersion 9 >ersion : >ersion D
#ost D333c C333c G333c
,i1e :G- :G- :G-
escription ecypher 6lliptic #urve 6ncryption by clicking on the #ypher bo/ with the
program running. Higher versions work faster.
ictionary Hacker
#ost= 9333c
,i1e= %G-
!ttempts to break passwords with a dictionary file. Used by clicking on the password bo/ with the
program running. 0ot always ,uccessful
4ile #opier
#ost= 933c
,i1e= 9G-
#opies a file, by clicking on the file, then on the memory location you wish to copy too.
4ile eleter
#ost= 933c
,i1e= 9G-
eletes a file, by clicking on the file in the memory(file server.
efrag
#ost= C333c
,i1e= :G-
,orts all the files in your memory to optimi1e free space, by moving files to fill in gaps.
4irewall &ypass
>ersion 9 >ersion : >ersion D >ersion % >ersion C
#ost D333c %333c '333c G333c 93333c
,i1e 9G- 9G- 9G- 9G- 9G-
escription &ypasses a 4irewall with e-ual or lower level to the version. Apen the connection
!nalyser, and click on the 4irewall icon with the 4irewall &ypass ,elected.
4irewall isable
>ersion 9 >ersion : >ersion D >ersion % >ersion C
#ost :333c D333c %333c '333c G333c
,i1e 9G- 9G- 9G- :G- DG-
escription isables a 4irewall with e-ual or lower level to the version. ,imply click the 7Go)
button to start the process. ! Trace will begin automatically when you use this.
HU #onnection!nalysis
#ost= :3333c
,i1e= H
Gives you the #onnection !nalysis menu, and allows you to use &ypassers.
HU I+# #lient
#ost= %333c
,i1e= H
!llows you to connect to the Uplink I+# channel online, and talk with other hackers.
HU $ap,howTrace
#ost= C333c
,i1e= H
!llows you to see the progress of a trace on the World $ap
HU <!0 >iew
#ost= C3333c
,i1e= H
Gives you the <!0 >iew menu, which allows you to view systems on a <!0 you are currently
connected to.
I" <ookup
#ost= C33c
,i1e= 9G-
!llows you to enter an I" and that I" is added to your ,erver <inks !utomatically.
I" "robe
>ersion 9 >ersion : >ersion D
#ost :333c %333c C333c
,i1e DG- DG- DG-
escription !llows you to enter an I", and get information on the types of security at that
I", via 6mail. Higher versions give more Information
<!0 "robe
>ersion 9 >ersion : >ersion D
#ost 9C333c :3333c D3333c
,i1e DG- DG- %G-
escription ,hows you the type, and all connections coming from, any system on a
<!0. Higher versions work on higher level systems.
<!0 ,can
>ersion 9 >ersion : >ersion D
#ost 93333c 9C333c :C333c
,i1e :G- :G- :G-
escription ,hows you all the system present on a <!0 you are connected to. Higher
versions work on higher level <!0s.
<!0 ,poof
>ersion 9 >ersion : >ersion D
#ost :3333c D3333c %C333c
,i1e :G- DG- CG-
escription 4ools the 0etwork into thinking you are connected to a system, allowing you
access to systems protected by ,ubnets. Higher versions work on higher
level systems.
<!0 4orce
>ersion 9 >ersion : >ersion D
#ost 9C333c :3333c :C333c
,i1e :G- DG- %G-
escription Apens a lock on a <!0 system. Higher versions open higher level <ocks.
The ,ystems !dministrator will log on if you use this tool.
<og eleter
>ersion 9 >ersion : >ersion D >ersion %
#ost C33c 9333c :333c %333c
,i1e 9G- 9G- 9G- 9G-
escription eletes a <og by clicking on it. Higher versions become harder to detect, with
>ersion % being impossible to detect.
<og $odifier
>ersion 9 >ersion :
#ost %333c '333c
,i1e :G- :G-
escription $odify a <og by clicking on it. >ersion : can create new logs from
blank spaces.
<og Uneleter
#ost= C333c
,i1e= 9G-
+ecover deleted logs, or restore modified logs, by clicking on them.
$onitor &ypass
>ersion 9 >ersion : >ersion D >ersion % >ersion C
#ost 93333c 9:333c 9'333c :3333c :C333c
,i1e 9G- 9G- 9G- 9G- 9G-
escription &ypasses a $onitor with e-ual or lower level to the version. Apen the connection
!nalyser, and click on the $onitor icon with the $onitor &ypass ,elected.
"assword &reaker
#ost= 9C33c
,i1e= :G-
&reak a password by clicking on the password bo/.
"ro/y &ypass
>ersion 9 >ersion : >ersion D >ersion % >ersion C
#ost '333c G333c 9:333c 9'333c :3333c
,i1e 9G- 9G- 9G- 9G- 9G-
escription &ypasses a "ro/y with e-ual or lower level to the version. Apen the connection
!nalyser, and click on the "ro/y icon with the "ro/y &ypass ,elected.
"ro/y isable
>ersion 9 >ersion : >ersion D >ersion % >ersion C
#ost D333c %333c '333c G333c 93333c
,i1e 9G- 9G- 9G- :G- DG-
escription isables a "ro/y with e-ual or lower level to the version. ,imply click the 7Go)
button to start the process. ! Trace will begin automatically when you use this.
Trace Tracker
>ersion 9 >ersion : >ersion D >ersion %
#ost D33c '33c 9%33c :C33c
,i1e 9G- 9G- :G- DG-
escription Tells you if you are being traced, and how long you have with increasing accuracy
as the >ersion gets higher.
>oice !nalyser
#ost= C333c
,i1e= %G-
!llows you to record a voice pattern for breaking >oice >erification ,ecurity. 4ind the phone number
of the !dmin of the system, run this while he)s talking, and hit play when you need to play the voice
back.
2.4 Hard+are
Here is a run down of what each piece of hardware does, and its cost.
"rocessors
#"U
*:3Gh1.
#"U
*'3Gh1.
#"U
*G3Gh1.
#"U
*933Gh1.
#"U
*9:3Gh1.
#"U
*9C3Gh1.
#"U
*:33Gh1.
#ost :C3c 9333c 9D33c D333c C333c G333c 9:333c
escription The 4aster your processor speed, the faster your gateway can do things, such as break
#yphers.
$emory
$emory *GG-. $emory *9'G-. $emory *:%G-. $emory *D:G-.
#ost D333c CC33c G333c 99333c
escription The more memory you have the more files you can store at one time.
$odems
$odem
*9G-(s.
$odem
*:G-(s.
$odem
*%G-(s.
$odem
*'G-(s.
$odem
*GG-(s.
$odem
*93G-(s.
#ost 9333c :333c %333c '333c G333c 93333c
escription ,upposedly makes file transfer faster, though it makes no noticeable difference.
,ecurity
Gateway ,elf estruct.
#ost= :3333c
4its e/plosives to your gateway, and gives you a piece of software that can be used to detonate these
e/plosives should the 4eds get to close to your gateway.
Gateway $otion ,ensor
#ost= 93333c
4its motion sensing e-uipment to your Gateway, and gives you a piece of software that allows you to
see the status of the $otion ,ensor. When run, the ,oftware, a small light appears under the Time
#ontrols. When this light turns yellow, some one is fitting new hardware on your gateway. If it turns
+ed, the 4eds are near your gateway, and you should use the Gateway 0uke.
0ote that each one of these pieces of ,ecurity is useless without the other. Without the $otion ,ensor,
you will not know when to use the Gateway 0uke, and without the Gateway 0uke, you won)t be able
to do anything when you see the 4eds coming.
!lso, you should never use the Gateway 0uke when the light Isn)t +ed, otherwise it won)t work, and
you can still be traced for anything you have done before you used the 0uke.

%ate+a, *uke52otion Sensor

#( it +orked< ,ou shou"d get this &ai"
2.5 %ate+a,s
4ollowing is a guide on all the Gateways available in the game.
Gateway Alpha
$a/ #"Us= 9
$a/ $emory= D:G-
$a/ ,ecurity= 3
$a/ &andwidth= 9G-(s
The gateway you start the game with, and go back to if your gateway is ever destroyed. It)s very
simple, with only one #"U slot and D:G- $a/ $emory space. There is no room for security, and this
model cannot handle a better modem. ue to its lack of speed, this Gateway becomes pretty useless as
soon as you are re-uired to do anything even remotely intensive, like cracking an 6ncryption, and it is
recommended you upgrade as soon as possible.
+ating= % out of 93
Gateway Alpha ICPU
$a/ #"Us= :
$a/ $emory= D:G-
$a/ ,ecurity= 3
$a/ &andwidth= 9G-(s
This Gateway is almost e/actly the same as the !<"H!, e/cept it has an e/tra #"U slot, which means
it can have double the processor power, and for the low price, is -uite a good investment at the start of
the game. ! lot more versatile than the !<"H!, with the e/tra #"U it can better handle more strenuous
activities, although its lack of memory means you will still be wanting something bigger -uite -uickly.
+ating= C out of 93
Gateway Alpha IMEMORY
$a/ #"Us= 9
$a/ $emory= '%G-
$a/ ,ecurity= 3
$a/ &andwidth= 9g-(s
This is the same as the !<"H! but with twice as much memory space. Unfortunately, because it still
only has one processor slot, the e/tra memory won)t do you much good because you won)t be able to
do anything else. It)s not bad it you need some e/tra storage space early on, because it)s -uite cheap,
but otherwise I would suggest against it.
+ating= % out of 93
The VIRTUANET RAccess Gateway
$a/ #"Us= :
$a/ $emory= %GG-
$a/ ,ecurity= 3
$a/ &andwidth= :G-(s
The escription says you cannot be caught with this Gateway, though a few people have reported that
they have been caught with it. It has : #"U slots and enough space for %GG- of memory, though no
space for security. 0ot to bad for the price, but personally I would save up a little more and go for the
ne/t one.
+ating= ' out of 93
The !RONOS Co"p #$#%$ Gateway
$a/ #"Us= :
$a/ $emory= '%g-
$a/ ,ecurity= 9
$a/ &andwidth= %G-(s
0amed after the 6vil #orporation from the hit !nime series Guyver, this -uite a good Gateway to buy
as your first one. With double the #"U and $emory space of the !<"H!, space for a %G-s $odem
and 9 security device, its good value for money, and will see you through most of the missions of
difficulty C or ' -uite well. The downside is that one security device isnIt really much help H 6ven if
you have a motion sensor there is nothing you can do about it when it turns red.
+ating= ; out of 93
The &ION'#$ Se"ies (o")station
$a/ #"Us= D
$a/ $emory= E'G-
$a/ ,ecurity= :
$a/ &andwidth= 'G-(s
!n e/cellent Gateway, the JIA0 has D #"U slots, enough space for E'G- of memory, : security
devices and a 'G-s $odem. !t ?ust over 93333c more than the F+A0A,, this is e/cellent value for
money. It has enough space to do most database copying missions, enough #"U space to make
breaking encryptions nice and -uick, and have both security devices available. I highly recommend this
gateway as a stopping point before buying the Trinity.
+ating= E out of 93
The UNITY *ighSec+"ity Plat,o"-
$a/ #"Us= %
$a/ $emory= '%G-
$a/ ,ecurity= %
$a/ &andwidth= 'G-(s
I personally find this Gateway pretty pointless. Its main feature is % security device spaces, but since
there are only : in the game, and having more than one is pointless, this Gateway is 2ust a big waste of
time. It also has less memory space than the JIA0. Its redeeming feature is that is has % #"U slots, but
at nearly ;3333c I personally think this is the biggest waste of money there is.
+ating= C out of 93
The AMCORE .ile Se"/e"
$a/ #"Us= D
$a/ $emory= :C'G-
$a/ ,ecurity= :
$a/ &andwidth= 'G-(s
This Gateway has a huge amount of memory space, at :C'g-, you will be able to do : database
missions with this and still have space left. The D #"U slots is a bit of a let down, but it is sufficient for
most things, though you may be left wanting more power towards the later missions. : ,ecurity devices
make it a nice safe gateway once you have the e-uipment fitted, but you really have to ask your self,
Io I really need that much memoryKI
+ating= G out of 93
The OMEGA S+pe" Co-p+te"
$a/ #"Us= 9'
$a/ $emory= %GG-
$a/ ,ecurity= 9
$a/ &andwidth= %G-(s
This computer is really all down to personal "reference. With 9' #"U slots, it)s by far the most
powerful Gateway available, but with only %GG- of $emory space, you won)t have nearly enough
space for those I#opy a atabaseI missions. ! big let down is that it only has 9 security slot, but
otherwise, it)s not too bad.
+ating= G out of 93
The TRINITY0%#%a Gateway
$a/ #"Us= G
$a/ $emory= 9:GG-
$a/ ,ecurity= D
$a/ &andwidth= GG-(s
$y personal favourite, this gateway has everything you could possibly want. With G #"U slots, it)s
easily fast enough to do anything in the game in a matter of seconds, and 9:GG- of $emory space
means you have plenty of room for files. The only downside of this gateway, which isnIt really
important, is the completely pointless Drd ,ecurity slot. !ll !gents should aspire to own this Gateway.
+ating= 93 out of 93
These are the basic Gateways that come with the game, though there are numerous mods that will add
more to the game.
2. Server T,!es
4ollowing is a list of each type of server, and the kind of security you can e/pect to find on each server.
#nterna" Services -achine
This is the most common type of ,ystem in the game. They are easy to hack into, and a lot of the
missions in the game will involve these systems. They have a 4ile ,erver, a #onsole, a <inks page, and
<og access, as well as a few useless features such as ,ecurity viewing and !ccounts. ,ecurity varies
slightly between systems, but they always have a "assword screen, and usually have a monitor, as their
only main defence so a "assword breaker will be sufficient to enter the system. <ater on it the game,
they start getting "ro/y)s and 4irewall)s at different levels, so a &ypass or isabler will be re-uired to
change anything on the server. Generally, traces, both active and passive, are slow from these ,ystems,
though a few storyline servers will trace faster.
Centra" -ain(ra&e
! lot more secure than an Internal ,ervices $achine, though fewer in numbers, #entral $ainframe
sport a large amount of security, and faster traces. They also only accept connections from 7Trusted
,ystems), meaning systems owned by the same company. That means that in order to be able to
connect to one, your last bounce point before the #entral $ainframe has to be a server owned by the
same company. They always have a "assword ,creen, some have a >oice "rint !nalyser, others have
6lliptic #urve #yphers, and some have both. They always have $onitor)s, "ro/y)s and 4irewall)s of
varying levels, though most of them will be level % or C. They have a 4ile ,erver, #onsole and <og
!ccess, but these don)t have any <ink)s section. $ost of the harder missions will involve these servers.
.u/"ic 0ccess Servers
These systems can)t be hacked, there is nothing there. !ll these systems are for is detailing the !dmin
for the relevant companies systems. This is where you go if you need the phone number of an !dmin in
order to break through a >oice "rint !nalyser.
)e&ote 0ccess Ter&ina"s
These do nothing. "eriod.
Banks
,upposedly one of the most secure types of server in the game, though oddly the easiest to hack.
&ecause using a $onitor &ypass disables all !ctive Traces, you have all the time you need in the
system. on)t let your self be fooled though, banks have the fastest passive traces in the game,
sometimes tracing you in a matter of minutes, so once you are done, you need to work fast to clear your
logs.
The accounts section is protected by a "assword ,creen, using the account number as the user name.
4irewalls and "ro/y)s of varying levels protect the banks though, so these will need to be circumvented
in order to make any changes to an account.
The !dmin section is protected by a "assword, >oice "rint and 6lliptic #urve #ypher, and allows you
access to the banks connection logs, and also the account number and password of every account at that
bank.
6ach bank lists their !dmin in an 7!bout) screen, and you have the ability to create a new account as
well.
1i"e Servers
! lot of companies have stand alone 4ile ,ervers used for storing large amounts of data away from the
main system. 5ou will mainly uses these when you do 7#opy a atabase) missions, as you will have to
dump the files that you have copied there. They have no monitor, and although they have a password
screen, these servers cannot actually be hacked. The only way to get the passwords for them is to get
them via missions. If you do happen to have access to a 4ile ,erver, they are very useful for backing up
your programs, should something bad happen to your gateway and you have files that you cannot get
again.
2oice .hone S,ste&s
&asically, dial into a person)s phone, and record their voice. 5ou can)t hack anything here, but this is
where you get the voices for the >oice "rint !nalyser. #onnect to the phone system and run the >oice
!nalyser to record the voice.
.ersona" Co&!uters
These serve little purpose. They are there so you know the I" address of someone you need to frame for
a crime, that)s about it really. They cannot be entered because they do not accept e/ternal connections.
Loca" 0rea *et+orks 3L0*s4
! new type of system, added in version 9.:. They are the most secure type of system in the game,
re-uiring a lot of time and skill to break into them. They have numerous different security features,
including the standard ones found on other servers. 6/pensive software and HU upgrades will be
re-uired before you can even enter these systems, and if you aren)t careful, the systems admin will log
on and hunt you down on the system. These systems will appear in later missions and in the story line
as well.
2.$ Securit, S,ste&s
There are multiple security systems in Uplink, and each of them needs to be tackled in a different way.
Here is a list of each type of security and how to get round it.
Login5.ass+ord Screen
The most common form of security you will come across. This is easily defeated by using the
"assword &reaker on it. The only variation in the power of this security is the amount of time it takes to
break the password, on more secure systems it will take longer.
6""i!tic Curve C,!her
! #omple/, hard to crack #ypher, represented by a screen of numbers that cancel to 3 as it is cracked.
To get past this you will need a ecypher. Ance again, the more secure the system, the longer it takes
to crack. #racking these is very #"U intensive, so you should make sure you have a good machine
before attempting to hack a server with one of these.
The =""i!tic Curve C,!her
2oice .rint 0na",sis
Uses a recorded message of the ,ystem !dministrators voice, so that only the person with that voice
can access the system. This is defeated by using a >oice !nalyser, with the appropriate voice recorded
into it. ,imply playing sample back will unlock the security and allow you to enter.

The >oice 1na",sis
-onitors
$ost systems in the game have a monitor. It is what tells the company that someone is trying to hack
into their system so that they can trace you while you are still attempting to enter the server. These are
overcome using a $onitor &ypass, though the &ypass has to be of e-ual or higher level to the $onitor
itself. If the $onitor is bypassed, you can break all of the systems security before they begin tracing
you.
.ro7,8s51ire+a""8s
! lot of systems have either a "ro/y, or and "ro/y and a firewall. These don)t do anything to stop you
form accessing the system, but they do stop you from modifying anything on that system should you
gain access. There are : ways around these. The &ypass, which works in the e/act same way as the
$onitor &ypass, and the isabler. The isabler will stop a security device from working while you are
connected to the server, allowing you to modify the files or records on the server. They do, however,
take time to work, and will alert the company to your presence almost instantly.
2.9 Conso"e Co&&ands
An a lot of the servers in Uplink, there are consoles that allow you to manually enter commands to the
system. 4ollowing is a list of commands that can be used in the console, and what they do.
Help B display a list of commands
cd LdirectoryM H opens a directory
cd .. B closes the current directory
elete B delete the whole contents of the currently open directory
,hutdown B ,huts down the system.
isconnect B disconnects from the system
6/it B e/its the console and returns to the menu
+un LprogramM H runs the program you entered. *only works from the usr directory.
It is worth noting, that while the console may still be performing the task you told it to, you can still
enter commands, which will be e/ecuted in the order they are entered after the current process is
finished.
2.: Changing ;our )ecords
uring the game, you will have the ability to change your !cademic, ,ocial, and #riminal records. 4or
the most part this will have little effect, though it can be rather fun to give your self numerous first
class degrees
However, should you ever wind up with a criminal record, you may find it difficult getting a good 2ob.
What you will need to do in order to rectify this situation, is hack the Global #riminal ata, access
your record, and delete anything on it. Ance you have done this, you will be able to take 2obs normally
again.
2.1< User 0ccounts
#ertain systems have other user accounts than !dmin that you can hack into. The main ones are the
International !cademic atabase, ,ocial ,ecurity atabase, and Global #riminal atabase. These
systems have : other accounts you can hack8 readwrite, and readonly. 5ou can access these accounts by
entering these names into the user name bo/ of the password screen before using the password breaker.
The advantage of using these is that you are not traced when you enter a system with these accounts
*provided you use the $onitor &ypass.. The disadvantage is that you cannot access the admin section
of the system *which means you can)t directly access the systems logs.. It is entirely down to personal
preference which you use when hacking these systems, but it can make life easier not having to worry
about being traced when you have a lot of work to do on the system.
Section 3 -ission %uides
This ,ection contains a walkthrough for every standard mission in the game. 6ach one is titled with a
general description of the mission, and has the actual description from the game, the re-uired rating to
be able to do this mission *0ote= 5ou may have to contact the employers to be able to accept at this
level., the difficulty rating and the re-uired software to be able to complete the mission.
There are also notes for any missions that have e/tra details to them.
Co!, a (i"e
$ission escriptions=
!ccess a remote system and copy important data files
,teal important data from a rival companies file server
Gain !ccess to a rival system and steal research files
+anking= &eginner *0ovice.
ifficulty +ating= : *D.
+e-uired ,oftware= "assword &reaker, 4ile #opier *ecrypter.
ead easy, 2ust bounce your way to the target server, use a password breaker to gain access, enter the
file server, and copy the relevant file to your memory. The simply attach the file to the reply email.
Ance you reach 0ovice, this mission will sometimes re-uire you to decrypt the file before sending it.
5ou can tell this because the difficulty will be D and the "ay will be higher.
0AT6,= If the file is not there, you have to abandon the mission, as it has been deleted either by you at
an earlier point, or by an 0"# hacker.
This is the e/act same type of mission as the test mission.
&efore you copy the file from the target machine, check the 6ncryption <evel. If it is G or higher, then
disconnect and abandon the mission, because you can)t decrypt anything higher than ;.
De"ete a (i"e
$ission escriptions=
&reak into a rival computer system and sabotage files
Hack into a computer and delete Fey files
4ind and destroy crucial data on a mainframe
+anking= &eginner
ifficulty +ating= :
+e-uired ,oftware= "assword &reaker, 4ile eleter
This is another really easy one. ?ust bounce to the server, password break your way in, enter the file
server and use your 4ile eleter to remove the relevant file. Then 2ust reply to the email.
0AT6,= If the file is not there, you can simply reply to the mail and finish the mission without doing
any work.
Change 0cade&ic Detai"s
$ission escriptions=
Improve our associatesI academic standing
Help us prove a fellow employee is overHrated
Generate a University egree for a friend
Nualifications re-uired for wealthy professional
+anking= 0ovice
ifficulty +ating= D
+e-uired ,oftware= "assword &reaker
&ounce your way to the International !cademic atabase, and use your password breaker to gain
access. 6nter the search menu and enter the name youIve been given. When it comes up, enter or
change the relevant -ualification. !s a guide, if it says add a -ualification, put it in the bottom bo/
*Ather Nualifications. and if it says University degree put it in the second bo/ *Graduate
Nualifications.. When youIve made the changes, click the commit button. Then simply send a reply
email to receive your payment
Change Socia" Securit, Detai"s
$ission escriptions=
#reate part of a new identity
4alsify a ,ocial ,ecurity ocument
+anking= #onfident
ifficulty +ating= % H C
+e-uired ,oftware= "assword &reaker, "ro/y &ypass("ro/y isable v9.3
#onnect to the International ,ocial ,ecurity atabase with as many bounces as possible, as they trace
you -uite a lot faster than the previous missions, go to Inter0I# to get some more addresses if you need
to.
Ideally you should have the HU #onnection !nalysis upgrade, but it)s unlikely at this point. If you do
have it, then activate the "ro/y &ypass. Atherwise, start the "ro/y isable. Wait until the second they
start tracing you, then start the password breaker as well *make sure your password breaker #"U usage
is all the way up., this will make sure your not waiting around for the pro/y to be disabled when your
inside. When you get in, enter the search section and enter the name you were given. When it comes
up, change the relevant details and click the commit button. Then to receive your payment, send a reply
email.
Change Cri&ina" )ecords
$ission escriptions=
Help to stop a hacker from ever working again
Help to discredit one of our rivals
#lear a criminal record
+anking= Intermediate
ifficulty +ating= C
+e-uired ,oftware= "assword &reaker, "ro/y &ypass("ro/y isable v9.3, ecypher v9HvD
#onnect to the Global #riminal atabase *G#., and click the <og in button. If you have the "ro/y
&ypass, use it now, if you only have the disable, start it now and wait for the trace to start before
continuing. #lick the I6lliptic #urve 6ncryption #ypherI button, and start the ecypher, making sure
the ecypher is turned up to ma/ #"U usage. When it is completed, click the I"roceedI button, and
break the "assword with the password &reaker. Ance that has finished, click I"roceedI, then enter the
search section. 6nter the Targets name, and wait for it to come up.
If, for your mission, you are re-uired to clear some ones record, simply click the I#lear +ecord &uttonI.
Atherwise, enter what ever conviction you need to, and click I!ddI. When you are finished, disconnect
from the server, and reply to the mail to receive your money.
1ind 1inancia" Detai"s
$ission escriptions=
#lient interested in financial data on an enemy
4ind 4inancial etails of one of our associates
+anking= Intermediate
ifficulty +ating= C
+e-uired ,oftware= "assword &reaker
+ecommended ,oftware= $onitor &ypass vC
#onnect to the bank you are given in the mission statement. If you have the monitor bypass, you will
not need many bounces. If you have it, use the monitor bypass. #lick on the I$anage 6/isting !ccountI
button, and enter the targets account number in the user name field. Use the "assword &reaker to gain
access to the account. #lick on the I>iew !ccount detailsI button, and note down the amount of money
in the persons account. isconnect from the machine, and reply to the mail. $ake sure you type the
amount of money in the account at the end of the mail before you send it. If you used the $onitor
&ypass, don)t forget to clean up your logs, 2ust because there is no active trace, you can still be passive
traced.
Destro, Data/ase
$ission escriptions=
estroy corporate data of a rival company
estroy customer records on a sales system
estroy rival software in development
+anking= Intermediate
ifficulty +ating= C H '
+e-uired ,oftware= "assword &reaker, 4irewall &ypass(isable vC, "ro/y &ypass(isable vC *The
level of firewall(pro/y on these missions differ for each server, some of them have level C so it)s best to
stick with version C bypasses.
#onnect to the target, and &ypass(isable the 4irewall and "ro/y. &reak the password using the
"assword &reaker. 6nter the !dmin section, then the console. Ance you are in the console, enter the usr
directory *type Icd usrI. and then type IdeleteI to delete all files on the system. isconnect and cover
your logs, and then go to the Uplink 0ews "age, and wait for news of your hack to appear. Ance it
does, you can reply to the mail and finish the mission.
0AT6,= This mission sometimes targets <!0 systems, which means you will need <!0 software to
be able to complete it.
Co!, Data/ase
$ission escriptions=
#opy large and secure corporate database
#opy proprietary source code database
,teal valuable scientific research documents
&reak into high security system and steal customer records
+anking= Intermediate
ifficulty +ating= C H '
+e-uired ,oftware= "assword &reaker, 4ile #opier, ecrypter v;, "ro/y &ypass(isable vC, 4irewall
&ypass(isable vC *you won)t always need this one.
Ather +e-uirements= '3H9:3G-Is of $emory ,pace
#onnect to the server and bypass(disable the "ro/y and 4irewall *If they have one.. &reak the password
and enter the file server. !t the end of the file list, there should be a group of large files *around GH
9:G-. all with .dat at the end. 5ou need to copy all these files to your $emory. When you have
finished copying them, disconnect and clear your logs as usual. !fter that, connect to the file server of
the company that hired you, and enter using the password they gave. #opy all the files from your
memory to the file server, and use the 4ile ecrypter on them. Ance that is done, you can reply to the
mail and finish the mission.
0AT6,= &efore you copy the files from the target machine, check the 6ncryption <evel. If it is G or
higher, then disconnect and abandon the mission, because you can)t decrypt anything higher than ;.
,ometimes, you won)t be able to fit all of the files on the file server. #opy as many as you can, and
delete the rest. 5ou will still be able to finish the mission, but you will get a little less money.
This mission sometimes targets <!0 systems, which means you will need <!0 software to be able to
complete it.
Trace Ba"ance Trans(er
$ission escriptions=
Trace a recent balance transfer
Trace an unauthorised money transfer
+anking= Intermediate
ifficulty +ating= C
+e-uired ,oftware= "assword &reaker
+ecommended ,oftware= $onitor &ypass vC
#onnect to the bank that you are told in the mail. If you have the $onitor &ypass you won)t need many
bounces. 6nter the I$anage 6/isting !ccountI section, and put the account number in as the user name.
&reak the password, and enter the accounts I>iew ,tatementI section. ,omewhere near the top, there
should be a large amount of money transferred *normally over :33,333c.. 5ou need to note down the
account number, and I" of the bank that it was transferred too. Ance you have done that, disconnect
from the &ank. #onnect to the &ank whose I" you got from the statement *you can get the link either
from Inter0I# or the I" <ookup Tool.. &ypass the monitor if you can, and break into the account of the
person whose number you noted down. Ance you are into the account, go to the I>iew !ccountI
section, and note down the name of the !ccount Awner. isconnect from the bank, and reply to the
mail, making sure you add the 0ame you noted down before you click send.
0AT6,= If you want, you can delete the logs before you connect to the second bank, though if you do
the 2ob -uick enough, you shouldn)t need to.
Destro, a Co&!uter S,ste&
$issions escriptions=
6lite agent re-uired for destruction of computer system
+anking= ,killed
ifficulty +ating= '
+e-uired ,oftware= "assword &reaker, >oice !nalyser, "ro/y &ypass(isable vC, 4irewall
&ypass(isable vC
4irst, go to Inter0I#, and look for the "ublic !ccess ,erver of the Target #ompany. !dd this server to
your links, and also add the phone number of the system administrator. #onnect to the !dministrators
>oice "hone system, and start the >oice !nalyser. Wait till the call has finished and the voice has been
recorded, and then disconnect. A 0AT #<A,6 TH6 >AI#6 !0!<5,56+. 0ow, connect to the
#entral $ainframe, making sure that the bounce point 2ust before the Target computer is the "ublic
!ccess server for that company. Use your &ypassers(isablers on the "ro/y and 4irewall, and then
enter the I>oice "rint IdentificationI section. "ress the play button on the >oice !nalyser, and wait for
the button to turn green, and then click on it. 6nter the "assword screen and break the password. Ance
you are inside the system, enter the console. Apen the usr directory *type Icd usrI. then type IdeleteI.
!fter that, close the usr directory *type Icd ..I. open the sys directory *type Icd sysI. then IdeleteI again.
Ance this is finished, you can type IshutdownI and disconnect from the system. #lear your logs, the go
to the Uplink 0ews page, and wait for news that the companies system has been destroyed. Ance this
appears, you can reply to the mail and finish the mission.
0AT6,= When typing in the console commands, you don)t have to wait for the current action to finish
before typing the ne/t one, as the console will remember what you have typed, and complete the
actions in order.
Trace a Hacker
$ission escriptions=
Trace a hacker who recently broke into our systems
Trace an unauthorised money transfer
+anking= 6/perienced
ifficulty +ating= ;
+e-uired ,oftware= "assword &reaker, ecypher vD, >oice !nalyser, <og UnHeleter, "ro/y
&ypass(isable vC, 4irewall &ypass(isable vC
Ather +e-uirements= ,omething to note down I"Is
To start with, you will need to break into the computer of the company that hired you, as they do not
give you sufficient access to view the logs. Ance you are into the system you are told in the mission
statement, enter the <ogs. An the email, there will be a date and time that the hack occurred. This isn)t
the actual time, this is the time they first noticed it. <ook though the logs, and look for the one with the
closest date &64A+6 the one you are given. This will be the log you need to trace. Use the <og
Uneleter on that log, note down the I" and the time(date of the log, and disconnect. 6nter the I" you
noted down into the I" <ookup to add it to your links. 0ow break into that system, enter the logs, and
look for a log that has the same date as the one you noted down *It should be a bounce log.. Use the
<og Uneleter on that log, and note down the 4I+,T I" on the bounce log *the I4romI I".. isconnect
from the system, and repeat this process until you get to a "ersonal #omputer. +eply to the mail,
adding the name of the person who owns the computer to the mail.
0AT6,= If you take one of these missions, make sure it isn)t more than a couple of hours old, by
checking the date it was posted. If the mission is too old, it will be impossible, because the hacker will
have gone back and totally removed his logs.
$ake sure you delete your logs between every connection. o not leave all the logs until you have
finished the mission as you maybe passive traced before you are finished.
If the <og points to a bank *or it is an Unauthorised $oney transfer mission, which starts at the bank.
make sure you hack the admin section and not someone)s account. The logs you need cannot be found
in an account.
-one, Trans(er
$ission escriptions=
Aur 6steemed colleague wishes to make a donation
+anking= 6/perienced
ifficulty +ating= ; H G
+e-uired ,oftware= "assword &reaker, "ro/y &ypass(isable vC, 4irewall &ypass(isable vC
+ecommended ,oftware= $onitor &ypass vC
#onnect to the bank told to you in the mission statement. isable(&ypass the "ro/y and 4irewall, and
the monitor if you can, and break into the account with the "assword &reaker, using the account
number you were given as the User name. Ance you are into the account, enter the ITransfer $oneyI
section. Type in the &ank I" and account number, and then the amount of money, in the relevant bo/es,
and once you are sure all the numbers are correct, hit the ITransferI button. +eply to the email after you
have transferred the money. espite what the mail says, you don)t have to delete the statements, but
don)t forget to clear your own logsO
I$"A+T!0T= 5ou must reply to the mail before you delete the transfer logs, or your employer will say
you havenIt transferred the money.
)uin Li(e
$ission escriptions=
Highly skilled agent re-uired for removal 2ob
+anking= Fnowledgeable
ifficulty +ating= G
+e-uired ,oftware= "assword &reaker, "ro/y &ypass("ro/y isable v9.3, ecypher
#onnect to the G#, and break in as you did in previous missions. 6nter the search section, and type
the targets name into the search bo/. When his record comes up, you will need to add : criminal
convictions *It doesn)t matter what, you can have them arrested for anything.. Ance you have added :
things, add something with the word I"aroleI in it *i.e. I&roke "aroleI.. Ance that is done, click the
I!uthorise !rrestI button, close the bo/ that pops up, and disconnect from the G#. #lear your logs,
then go to the Uplink 0ews page, and fast forward D hours, until the !rrest appears. Ance it has, reply
to the mail and finish the mission.
0AT6,= This mission is really easy, and it is possible to do a large number of them at once. If you
want, you can take a group of these missions, and do them all in one connection to the G#.
1ra&e a .erson (or co&!uter cri&es
$ission escriptions=
4rame a user for computer crimes
+anking= UberH,killed
ifficulty +ating= E H 93
+e-uired ,oftware= "assword &reaker, "ro/y &ypass("ro/y isable v9.3, ecypher
#onnect to the G#, and break in as you did in previous missions. 6nter the search section, and type
the targets name into the search bo/. When his record comes up, you will need to add : criminal
convictions *It doesn)t matter what, you can have them arrested for anything.. Ance you have added :
things, add something with the word I"aroleI in it *i.e. I&roke "aroleI.. Ance that is done, click the
I!uthorise !rrestI button, close the bo/ that pops up, and disconnect from the G#. #lear your logs,
then go to the Uplink 0ews page, and fast forward D hours, until the !rrest appears. Ance it has, reply
to the mail and finish the mission.
0AT6,= This mission is e/actly the same as the I+emoval ?obI mission, and you can do these at the
same time if you wish to do a group of them.
1ra&e a !erson (or Bank 1raud
$ission escriptions=
4rame a man for bank fraud
+anking= UberH,killed
ifficulty +ating= E H 93
+e-uired ,oftware= "assword &reaker, <og $odifier
#onnect to the &ank specified in the mission statement, using only D or % bounces. If you use too many,
the mission won)t work. WITHAUT bypassing the security, attempt to break the password on the
&anks !dmin section. When the trace has started, disconnect from the bank after a few seconds.
0ow connect to your first bounce point *Inter0I# hopefully., break into the admin account and access
the logs. <ook for your bounce log from the last connection *It should be the third one from the top.
and use the <og $odifier on it. #hange the log so that the I4romI I" is the one given to you in the
mission statement *i.e. #hange 9:;.3.3.9 to whatever I" you have been given.. elete the I!dmin
!ccessI log, and disconnect. Go to the Uplink 0ews page, and fast forward, until news that the target
has been arrested for hacking the &ank appears. Ance it does, you can reply to the mail and finish the
mission.
1ra&e !erson (or Data Destruction
$ission escriptions=
4rame a user for destruction of data
+anking= UberH,killed
ifficulty +ating= E H 93
+e-uired ,oftware= "assword &reaker, <og $odifier, "ro/y &ypass(isable vC, 4irewall
&ypass(isable vC, $onitor &ypass vC *>oice !nalyser, ecypher, depending on the security of the
system.
#onnect to the system given to you in the mission statement. 5ou must only use D or % bounce points
on this mission. If the trace is too long, the mission won)t work *you need the trace to be about :C
seconds.. &ypass the "ro/y, 4irewall and $onitor, and then crack the password. !fter this, you must
act -uickly. 6nter the console, open the usr directory, and delete the contents *type Icd usrI then IdeleteI..
!s soon as this is finished, disconnect from the system, and -uickly go to your first bounce point
*Inter0I# hopefully. and break into the !dmin account. <ook for your bounce log from the last
connection *It should be the third one from the top. and use the <og $odifier on it. #hange the log so
that the I4romI I" is the one given to you in the mission statement *i.e. #hange 9:;.3.3.9 to whatever I"
you have been given.. elete the I!dmin !ccessI log, and disconnect. Go to the Uplink 0ews page, and
fast forward, until news that the target has been arrested for hacking the company)s system. Ance it
does, reply to the mail and finish the mission.
0AT6,= 5ou will only get a couple of tries at this before it stops appearing in the news and the mission
becomes impossible, so make sure you get it right the first time.
3.1 = L0*s
<ater in the game, some of the missions you will get will re-uire you to hack a <!0 system instead of
an Internal ,ervices or #entral $ainframe system. These systems are hard to hack, re-uire a lot of
e/pensive software, and a lot of time. 6very <!0 is different, so there is no set way of being able to
attack one. 5ou will need to work out the correct course of action you need to take from what systems
are present on the <!0. 4ollowing is information on each type of system you will come across on a
<!0, and what you need to do to get around it.
)outer
The first system you will see on any <!0, it connects the <!0 to the rest of the Internet. 5ou can do
nothing with these systems.
Hu/
#onnects multiple systems on the <!0 together. They have no security, and there is no need to do
anything to them, they simply connect more than one system to another, e.g. a +outer to the rest of the
<!0.
Ter&ina"
! basic computer connected to the network, that the employees of the company you are hacking work
at. These server several purposes, though normally they are there to distract you, and waste your time.
An a system that contains a 9ire"ess Trans&itter, a Ter&ina" might contain the fre-uencies of the
9ire"ess )eceivers on the <!0. &y hacking the Ter&ina", the fre-uencies will be displayed to you.
,ometimes, Ter&ina"s also form Su:nets that protect certain other systems. In order to be able to access
these systems, you will need to fool that system into thinking you are part of the Su:net. To do this, you
will re-uire the <!0 ,poof software. &y running <!0 ,poof on a Ter&ina" that)s part of a Su:net, you
can then access systems protected by the Su:net.
Lock
Locks prevent you from moving further into a <!0. &efore you can progress past the Lock, you must
deactivate it. There are : ways of doing this. The first is to use the <!0 4orce software on the Lock.
This is the -uickest, easiest way to get past a "ock, but as soon as you do this, the systems !dministrator
will log on and begin hunting you through the <!0, and a trace will begin on your connection.
The second way is to find the correct 1uthentication Server for the Lock, hack into it, and turn of the
"ocks your self. This method is more time consuming, as you must first find the 1uthentication Server,
and they are often protected by Su:net?s or hidden on other parts of the <!0. 5ou can tell which
1uthentication Server is correct by the dotted yellow bo/ that appears around it when you have the
"ock selected, along with the words 7#ontroller).
0uthentication Server
"rotected ,ervers that control Locks on the <!0. 5ou can tell which "ocks a particular server controls
by the dotted yellow bo/ that appears around each "ock, along with the words 7<ocks(Unlocks).
The servers themselves are usually protected by a "assword and 6lliptic #urve #ypher, both of which
will need to be broken before you can deactivate any "ocks controlled by the system.
>ire"ess Trans&itter
+adio Transmitters are used when sections of the <!0 are separated from each other. When you
connect to a Trans&itter, you will be presented with a screen re-uesting a radio fre-uency. When you
enter a correct fre-uency, you will be connected to the relevant receiver and be allowed to continue on
the other part of the <!0. 5ou can find the fre-uencies re-uired to operate the 9ire"ess Trans&itters
on the <!0s Ter&ina"s.
>ire"ess )eceiver
These do little other than receive connections from 9ire"ess Trans&itters. There is nothing to do when
connecting to them and simply serve as connections to other points in the <!0.
-ode&
$odems act in a similar way to Trans&itters and )eceivers, by separating sections of the <!0 so you
can)t directly connect from one to the other. In order to connect to a 2ode&, you will first need to find
its phone number. This is stored on a Ter&ina" on the <!0. Ance you have the phone number, you will
need to disconnect from the <!0, enter the phone number =@1CTL/ as it appeared on the system into
the #8 Looku! tool. This will give you a link to the modem. &y clicking this link, you will enter the
<!0 from the 2ode&, and can continue on the system.
#so"ation Bridge
!n #so"ation Bridge works in a similar way to an 1uthentication Server, e/cept that instead of
controlling one "ock, it controls :. Ane of these "ocks will always be open, and the other will always be
closed. When you use the #so"ation Bridge, the closed "ock will open and the open one will close.
Su/net
,ubnets aren)t actually types of system, but groups of Ter&ina"s used to protect other systems. !
system protected by a Su:net will not accept connections from anything that isn)t a part of that Su:net.
When you click on a system, 7>alid ,ubnet) will appear on any systems forming a Su:net that)s
guarding that system, along with a dotted yellow bo/. To connect to one of these protected systems,
you will need to use <!0 ,poof to fool the system into thinking you are part of that Su:net. Ance you
have used <!0 ,poof, you will be able to connect to the system normally.
1i"e Servers and Log Servers
These do very little in the system, e/cept for, as their names suggest, store file and logs.
-ain Server
5our eventual target on the <!0. This is the system that runs the <!0, and any missions you have on a
<!0 will most likely be targeted at this machine. They are heavily defended, re-uire a "assword and
>oice I to connect to them, and when you do connect to them, the ,ystem !dmin will log on
automatically and begin hunting you, as well as starting a trace on your connection. They are laid out
the same as #entral $ainframe systems when you connect to them8 they have a 4ile ,erver, #onsole
and <og section. Working your way through the <!0 will always lead to this system.

2ie+ing the L0*
When you first open the <!0 >iewer while connected to a <!0, you might find things a little
confusing, but things will become simpler as you get used to it. 4irst of all, you have the main window,
which shows the <!0 itself. isplayed here are any systems you have currently found on the <!0.
The dotted line represents your current connect path, and a white bo/ around a system means you are
currently connected to that system. To the right is the information bo/, which will show some info on
the system you currently have selected. This bo/ also has D options= &ack, +eset and #onnect *These
will be e/plained later.. If you should do something that)s attracts attention to what you are doing, the
,ystem !dministrator will log on. ! +ed warning message will appear, and a siren will sound. The
,ystem !dmin is represented by red dotted lines *his connection path. and a red bo/ around a system
*the system he is currently connected to.. When you connect to a system on the <!0, the <!0 viewer
will close, and the ,ystem will be shown on the main screen. Ance you have finished with it, you
simply click on the viewer again to continue on your way.
*avigating L0*s
In order to connect to systems on a <!0, you will need to make a connection path through the <!0 to
that system first. When you first connect to a <!0, you will only be able to see the router. The first
thing you should do is run <!0 ,can. This will show all the systems on the <!0 that aren)t protected
by closed "ocks *If nothing appears, you will need to buy a higher version of <!0 ,can.. Ance this is
finished, you should run <!0 "robe on the +outer to show where it connects to. +un <!0 "robe on a
few systems to give you an idea of the layout of the <!0. 0ow you need to make a connection to the
first system. 4rom the +outer, click the first system connected to it *usually a Hu:.. ! dotted line will
appear over the connection line to the Hu:. This line is your connection path. #licking on another
system connected to the Hu: will e/tend your path to that system. #ontinue this process till you reach
the first system you need to hack. This is where the D options to the right come in. The first option is
7&ack). Use this to move your connection path back to the previous system. The ne/t one is 7+eset).
This will move your connection back to the +outer, and reset any access you had on the system *though
any opened locks will remain open.. The D
rd
is 7#onnect). This is what you use to connect to a system
you currently have a path to. #lick the system, then click connect and the contents of the system will be
displayed.
If at any point, the ,ystem !dmin should log on, he will try and hunt you through the <!0 by
following your connection. If he reaches the system you are connected to, he will disconnect you from
the <!0.
0ttacking L0*s
The first thing you should remember about <!0s is that, 2ust like other systems, they have "ro/ies and
$onitor, which will need bypassing or disabling if you intend to be successful. 5ou should also make
sure you have the voice print for the companies !dministrator before you connect, as you will need it
to enter the 2ain Server. ,ince every <!0 will be different, there is no set way of attacking them, as
you don)t know what types of security will be on the <!0. Use the above information to tackle each
system as it comes. +emember that Using <!0 4orce or #onnecting to the $ain ,erver will cause the
,ystems !dmin to log on, and that a trace will start on your connection. !s long as you have the right
software, and don)t rush and make mistakes, you shouldn)t have many problems hacking a <!0. 5ou
should also remember that, if the system admin reaches your location in the <!0, you will be cut off,
regardless of how long you have left on the trace. 5ou can tell when he logs on because the siren will
sound.
Section 4 Stor,"ine -issions
This section contains details on each of the ,toryline missions in the game. Ance you have finished the
first storyline mission, these will be sent to you automatically during the game. 6very time you finish
one of these missions, you will get a badge in you ,tatus screen representing the mission.
The storyline starts at about !pril 9%
th
:393 when the top Uplink !gent *deceased. sends you an email.
In this mail will be a link to !+# #entral $ainframe, along with his user name and password. In order
to enter the storyline, you must connect to !+# #entral $ainframe, and try to hack the system using
the #odes that the !gent sent you. The codes wont work, but the act of trying alerts !+# to your
presence. &efore you do this, make sure you have at least %G- of memory space left, or you wont get
the file that !+# send you when they contact you. ! week or two later, !+# will send you an email
offering you a 2ob. !ccept this and the storyline begins.
4.1 0run&or -issions
5ou will get these missions if you accept !runmor)s proposal when it is offered to you after !+# ask
you to destroy !runmor)s system.
4inish S!ecia" 2issions< and get "itt"e a+ards.
Back(ire
$ission escription= ,end a 4ile
"ayment= 9C333c
,oftware +e-uirements= +evelation
escription= !fter accepting the offer from !+#, wait for !runmor to give you a counterHoffer. +eply
to the mail they send you, with +evelation attached, and they will give you 9C333c. !fter completing
this mission, you will be on the !runmor side of the storyline.
Tracer
$ission escription= Upload and run a file.
"ayment= 93333c
,oftware +e-uirements= 4ile #opier, "assword &reaker, $onitor &ypass vC, "ro/y &ypass vC, 4irewall
&ypass vC
escription= 4irst, connect to the !runmor 4ile ,erver, and copy the +evelationTracer to your memory.
0e/t, connect to !+# Internal ,ervices $achine, and bypass all the $onitor, "ro/y and 4irewall.
&reak the password and enter the 4ile ,erver. +un your file copier on the +evelationTracer, then copy
it to the 4ile ,erver, then go to the #onsole. 6nter the usr directory *type 7cd usr). and the run the
+evelationTracer *type 7run revelationtracer). and wait for it to say the program is hiding itself. Ance
this is done, disconnect, clear your logs and reply to the email.
Take-eTo;ourLeader
$ission escription= Upload and run a file.
"ayment= D3333c
,oftware +e-uirements= 4ile #opier, "assword &reaker, $onitor &ypass vC, "ro/y &ypass vC, 4irewall
&ypass vC
escription= This mission is almost identical to the last one. If you still have the copy of +evelation
that !+# sent you, you can proceed with the mission. Atherwise you will need to connect to !runmor
4ile ,erver and get a copy before hand. #onnect to !runmor Internal ,ervices $achine and bypass the
$onitor, "ro/y and 4irewall. &reak the password and enter the 4ile ,erver. +un your file copier on
+evelation, then copy it to the 4ile ,erver, then go to the #onsole. 6nter the usr directory *type 7cd
usr). and the run +evelation *type 7run revelation). and wait for the >irus to become active. 5ou will
automatically be disconnected when it does, and a red s-uare will appear on the world map. Ance this
is done, disconnect, clear your logs and reply to the email.
0)C#n(i"tration
$ission escription= #opy a atabase.
"ayment= D3333c
,oftware +e-uirements= 4ile #opier, "assword &reaker, $onitor &ypass vC, "ro/y &ypass vC, <!0
,can, <!0 "robe, <!0 ,poof, >oice !nalyser, ecypher, ecrypter vC
Ather +e-uirements= E3G- $emory ,pace
escription= &efore you connect to !+# <ocal !rea 0etwork, you will need to get the >oice "attern of
the !+# !dmin, so go to the !+# "ublic !ccess ,erver to get his number, then connect and record his
voice.
0ow, go to !+# <ocal !rea 0etwork, and &ypass the $onitor and "ro/y. 5ou will now need to work
your way through the <!0 ,ince the <!0 is randomly generated each time, there is no set way to do
this, but you should aim for the 2ain Server system *+efer to ,ection D.9 if you need help getting
through <!0s.. When you are in the system, enter the 4ile ,erver, and at the bottom should be E files,
93G- each, named !+#H+evelation /.dat. These are the files you need to copy. #opy all the files to
your memory, disconnect, and clear your logs. 0ow, connect to the !runmor 4ile ,erver and copy all of
the files onto it. If there isn)t enough space, delete any useless files that may have appeared. Ance you
have copied all of the files, use the ecrypter on them, and then you can reply to the mail and finish the
mission. If you didn)t have enough memory space for all the files, you will need to make : trips.
Counter0ttack
$ission escription= estroy +evelation
"ayment= C3333c
+e-uired ,oftware= 4aith, +evelation Tracker, I" <ookup, >oice !nalyser, ecypher, $onitor &ypass
vC, "ro/y &ypass vC, 4irewall &ypass vC, 4ile #opier.
escription= The final !runmor mission. There is only one way to do this one, and that is -uickly. 4irst
of all, go to !runmor)s 4ile ,erver, and get a copy of 4aith and +evelation Tracker. +un +evelation
Tracker straight away, as that will give you I")s of infected systems. Use your I" lookup to get the link
from each I", and connect to the system. &reak through what ever security the system has, and enter the
file server. #opy 4aith to the system, then go into the console and run it. ! few seconds later,
+evelation should be cleared from the system. isconnect, and continue doing the same thing until the
mission is complete. 5ou do not have time to clear your logs on this one, so make sure you have a
$otion ,ensor and Gateway 0uke, and that the $otion ,ensor is running.
HI0T,= on)t bother with &anks or #entral $ainframes. <eave them and let +evelation spread to a
system that you can hack -uicker *Internal ,ervices..
on)t waste time. +evelation only needs : minutes to be able to spread to : other systems. isinfect a
system and then move on to the ne/t one.
!fter you have finished the mission, keep an eye on your $otion ,ensor. ,ince you didn)t have time to
cover your logs, you will be traced, so you will need to 0uke your gateway. Its also worth noting that
!+# may try and frame you a while after this mission, so you should keep your eye on your motion
sensor at all times, or you may well find yourself isavowed for hacking !+# #entral $ainframe
when you didn)t do it. 5ou will also have a criminal record that needs clearing if this happens.
!lternate Ways of 4ighting +evelation
An the forums, several other ways of fighting the virus have been put forward. Though I)ve not tested
these myself, I)m told they work by others. ,o, here they are.
9. Instead of running faith on a system, go straight to the console, and shut the system down *by
deleting the sys directory and then using the shutdown command.. +evelation will still show up on the
map, but when the : minutes pass, since the system is no longer running, the virus cannot spread and
the infection will disappear.
:. When the +evelation outbreak occurs, connect to !+# #entral mainframe and crash the system. This
will stop the virus from spreading to other computers.
5ou should note that people have said, using this method, that +evelation will start again when the
system comes back online.
)eve"ation in action
Don?t "et )eve"ation in(ect ,our gate+a,A
This is the end of the !runmor side of the storyline. !fter you have finished this mission, keep your eye
on the news for the ending of the story.
4.2 0)C -issions
5ou will get these missions if you destroy the !runmor Internal ,ervices $achine using revelation
when they give you the mission.
-aiden1"ight
escription= Upload and run a file
"ayment= 93333c
+e-uired ,oftware= 4ile #opier, "assword &reaker, $onitor &ypass vC, "ro/y &ypass vC, 4irewall
&ypass vC
#onnect to !runmor Internal ,ervices $achine and bypass the $onitor, "ro/y and 4irewall. &reak the
password and enter the 4ile ,erver. +un your file copier on +evelation, then copy it to the 4ile ,erver,
then go to the #onsole. 6nter the usr directory *type 7cd usr). and the run +evelation *type 7run
revelation). and wait for the >irus to become active. 5ou will automatically be disconnected when it
does, and a red s-uare will appear on the world map. Ance this is done, disconnect, clear your logs and
reply to the email.
Dar+in
escription= #opy a database
"ayment= 9C333c
+e-uired ,oftware= 4ile #opier, "assword &reaker, $onitor &ypass vC, "ro/y &ypass vC, <!0 ,can,
<!0 "robe, <!0 ,poof, >oice !nalyser, ecypher, ecrypter vC
escription= &efore you connect to arwin <ocal !rea 0etwork, you will need to get the >oice "attern
of the arwin !dmin, so go to the arwin "ublic !ccess ,erver to get his number, then connect and
record his voice.
0ow, go to arwin <ocal !rea 0etwork, and &ypass the $onitor and "ro/y, 5ou will now need to
work your way through the <!0 ,ince the <!0 is randomly generated each time, there is no set way
to do this, but you should aim for the 2ain Server system *+efer to ,ection D.9 if you need help getting
through <!0s.. When you are in the system, enter the 4ile ,erver, and at the bottom should be E files,
93G- each names arwH!+WI0 /.dat. These are the files you need to copy. #opy all the files to your
memory, disconnect, and clear your logs. 0ow, connect to the !+# 4ile ,erver and copy all of the files
onto it. If there isn)t enough space, delete any useless files that may have appeared. Ance you have
copied all of the files, use the ecrypter on them, and then you can reply to the mail and finish the
mission. If you didn)t have enough memory space for all the files, you will need to make : trips.
Save#t1orThe?ur,
escription= 4rame a user for bank fraud
"ayment= :3333c
+e-uired ,oftware= "assword &reaker, <og $odifier
escription= Using only D or % bounce points *Inter0I# being the first as always., connect to the bank
that !+# gave you in the mission statement. Without bypassing any security, enter the password entry
and attempt to break the password. <et the trace run until only ; or G seconds remain, and then
disconnect. 0ow -uickly connect to Inter0I# and enter the log section. +un the log modifier on the
bounce log, and change the log so that the 74rom) I" is the I" of the !runmor Technical irector.
!s soon as you have done this, delete the !dmin !ccess log and disconnect from Inter0I#, then reply
to the mail straight away *do not wait for it to appear in the news. to finish the mission.
Shin,Ha&&er
escription= estroy a database
"ayment= D3333c
+e-uired ,oftware= "assword &reaker, >oice !nalyser, ecypher, $onitor &ypass vC, "ro/y &ypass
vC, 4irewall &ypass vC.
escription= 4irst of all, you will need to get the link for the !runmor #entral $ainframe. 5ou can do
this by hacking the !runmor Internal ,ervices $achine and going to the links section.
Ance you have done this, connect to the !runmor #entral $ainframe, bypass the $onitor, "ro/y and
4irewall, and break through their security. 6nter the console, and delete everything from the usr and sys
directories, and when that is done, shutdown the system and disconnect. #lear your logs and then reply
to the mail *do not wait for it to appear in the news..
%randTour
escription= estroy the Internet
"ayment= C3333c
+e-uired ,oftware= +evelation, >oice !nalyser, ecypher, $onitor &ypass vC, "ro/y &ypass vC,
4irewall &ypass vC, 4ile #opier.
escription= The final !+# $ission. This mission is made hard by the fact not only do you have to
-uickly spread +evelation, but you also have Uplink planning to disavow you for working for !+#,
and 4aith working against you to stop +evelation, so the pressure is even higher. 5ou should be aware
that if 4aith is a higher version than +evelation at this point, the mission becomes ne/t to impossible,
because it doesn)t spread. &asically, you have to copy +evelation to every server you can, go to the
console, and run it. on)t worry about deleting your logs, because it)s game over regardless of the
result. 5ou will know when you have been successful, because +evelation will spread to your system.
When you have finished the mission, you can confirm it by checking your agent status to see if you
have the GrandTour badge.
HI0T,= ,tick with the easy systems, like Internal ,ervices to start with.
&e 4!,T.
This is the last of the !+# missions, and the end of the game. &y going with !+#, you have
condemned your !gent to the game over screen
Section 5 S!ecia" Servers
Uplink has many uni-ue servers, each of which has something different. ,ome of them are 2ust a little
fun, but others actually contain vital bits of the game. Here is a list of each server, what it)s for, and
what security you can e/pect.
5.1 #&!ortant Servers
This is a list of each of the ,erious ,ervers in the game.
#nter*#C
"erhaps the most important server in the game. This contains links to almost every other server in the
game, which you can add to your <ink <ist. It is also a safe place for your first bounce point. The
!dmin section has a simple password screen for protection, there is never any trace from this server,
and the password never changes.
#nternationa" 0cade&ic Data/ase
This server contains the !cademic details of every person in Uplink, including yours. It is used to some
earlier missions in the game that re-uire you to help someone get a 2ob, and things similar to that.
,ecurity here is very low, there is only a "assword entry and <evel 9 $onitor, and the traces are very
slow.
#nternationa" Socia" Securit, Data/ase
The home of everybody)s personal details, such as &irth date, ,ocial ,ecurity number and "ersonal
,tatus. It is used for some low level missions that involve changing people)s identities. ,ecurity here is
-uite low, with only a "assword and a <evel 9 $onitor and "ro/y, but the traces are -uite fast for the
early stages of the game.
%"o/a" Cri&ina" Data/ase
This holds the #riminal +ecords of everybody in Uplink. Used throughout the game for discrediting
people, having their lives ruined, or clearing their record. ,ecurity his high for the earlier stages of the
game, but relatively easy later on. There is a "assword, 6lliptic #urve #ypher, and a <evel 9 $onitor
and "ro/y.
#nternationa" Stock -arket S,ste&
#ontains details of the ,tock of every company in the game. Here you can create an account, and buy
or sell stock on any company you choose. It shows the changes in the ,tock values for each company
for the last year and the price per share. The !dmin section has relatively low security, but since the
only thing you can do with !dmin access if get to the <ogs, its pretty pointless. There is a "assword, as
well as a <evel 9 $onitor and "ro/y.
U!"ink .u/"ic 0ccess Server
This is one of the most pointless ,ervers in the game. This is where people to go to register as an
Uplink agent, but since you do that at the beginning, you can do nothing here. There is nothing to hack,
and no real reason to ever go here.
5.2 1un5?oke Servers
4ollowing is a list of all the ?oke and 4un servers, or otherwise nonHimportant servers in the game, and
what you can do there. $ost of these can be found at Inter0I#, though some you will have to find
yourself. This ,ection contains .ossi/"e S!oi"ers.
Steve ?ackson %a&es Server
"ut into the game because of the ,ecret ,ervice +aid on the company, for supposedly making a
7Hacking Guide). This guide was actually a work of total fiction for a game the company was making,
and contained technology that didn)t even e/ist. When you connect to this server, you receive a
message saying that this server has been sei1ed by the ,ecret ,ervice, and that your I" has now been
logged. on)t threat however, your I" is not logged, and nothing actually happens from connecting to
this server. There is nothing here that can be hacked.
.rotovision %a&e Server 3S!oi"er4
When you connect to the "rotovision Game ,erver, you are greeted with a "assword ,creen. !fter
using your "assword &reaker on this for 93 minutes, you will have probably realised that this server
cannot be hacked in the normal way. This server is actually a reference to the G3)s movie 7Wargames),
!nd when you enter the server, there is a menu with : options, 7Wargames) and 7Hints). 6ntering the
7Wargames) section will give you a list of games. &y clicking on the bottom one *Global
Thermonuclear War., you get taken to a World $ap with several ma2or cities on it. #licking on each
city will send a red line representing a missile flying towards the city, followed by an e/plosion. The
close button for this screen is underneath the Trace Tracker, should you have it running.
&y clicking on the 7Hint) menu, you are given a very cryptic message about the Introversion I", though
this doesn)t actually have anything to do with it.
0ndro&eda .u/"ic 0ccess Ter&ina"
When connecting to this server, you will see a button with a 7.) on it. If you wait a couple of seconds,
the message 7TH6 TI$6 I, 06!+) appears.
#lick the button to proceed to a menu with D options. &y looking through these options you will see
that this server belongs to some kind of creepy cult that thinks the Internet should be destroyed. This
server actually belongs to the same group as !+# *!ndromeda +esearch #orp..
'C. )e&ote -onitoring S,ste&
This server is a reference to the movie 7+obocop). #onnecting to the server will display the % "rime
Ab2ectives of +obocop, including the %
th
, which is classified. There is nothing to do on this server.
#ntroversion So(t+are
This server belongs to the #reators of Uplink. An it you will find lots of information about things that
inspired Uplink and plans for the future. This server is hidden and you must find it yourself.
Section Hacking He"!
Here you will be able to find help on general hacking in Uplink.
.1 Bank Hacking
espite the risks involved, hacking a &ank is relatively easy. !s long as you are fast, by following this
guide you should have no problems. &efore you start, you will need to know an !ccount 0umber at the
bank you want to hack, your Uplink &ank !ccount number, and the I" of Uplink International &ank.
9. #onnect to the bank, with Inter0I# as your first bounce, and bypass the monitor and pro/y with
<evel C &ypassers.
:. &reak into the account you want to steal from, using the account number as the user name, and the
password breaker to get the password. 5ou should not have a trace on you because of the monitor
bypass.
D. 6nter the transfer screen and transfer money to your Uplink bank account
%. elete the ,tatement logs from the account you stole from saying you 2ust transferred money.
C. #onnect to Uplink bank, log into your account, bypass monitor and pro/y then delete the log saying
you received money
'. #onnect to Inter0I# and delete the bounce logs.
;. ,tart ,pending. 5ou don)t have to wait before you can spend the money you 2ust stole.
0ote that once you have a password of an account, you don)t need the monitor bypass to access it, the
bank doesn)t trace normal account entries.
.2 %enera" Ti!s
If you have to use a "ro/y(4irewall disabler, start it before doing anything else. Wait for the trace to
start before proceeding. That way you won)t be waiting for it to finish while your clock ticks down and
you are in the system.
on)t bother with the ictionary Hacker8 it is a waste of time. ,tick with the "assword &reaker.
When buying ,oftware, only buy the highest version. If you can)t afford the highest, do a couple more
2obs until you can. This way you will save your self the trouble and money of upgrading later on. This
is especially important with <!0 software, as <!0 security varies slightly, and there is no guarantee
that v9 software will work on even the simplest of <!0s.
If you can afford it, buy the "ro/y and 4irewall &ypass instead of isable. It may be more e/pensive,
but it will make your life a lot easier.
on)t waste time while doing a 2ob. !nything else you have to do can wait until a 2ob is finished.
!lways clear your logs as soon as you have done the mission. If you leave them, you will likely forget
and be caught.
!<W!5, keep an eye on your Trace Tracker when doing a 2ob.
Section $ Co&&on Bugs
4ollowing is a list of commonly encountered bugs in Uplink, and if there is a known way of
fi/ing(getting around them. This will not have bugs in that are fi/ed in the v9.39 patch, or bugs in the
demo.
Bank 0ccount Bug
Game crashes when creating a new bank account.
,olution= on)t create a bank account. If you want it because of the increased bounce time, simply
hack another account on that bank.
)eve"ation Bug
While doing the final !runmor mission *,top +evelation., the game will crash repeatedly.
,olution= 0one. !ll you can do is keep loading your game and keep trying. 5ou can avoid the crashes
in #ounterattack by never using the I" <ookup when you have the world map open
)ando& Crashes
Unfortunately, the game crashes, seemingly randomly, and there is no e/planation.
,olution= ,imply reload your game and continue from where you left off.
Sa&!"e L0* Bug
ue to a small glitch in the sample <!0 file, the game crashes when you move the mouse over the
sample <!0 on the World $ap. 5ou can fi/ this yourself by putting a 7H7 between the : sets of
numbers on the modem in the sample.t/t file located in patch.dat.
Section 9 10@
Here)s a list of commonly asked -uestions, and the answers.
N= How do I use the 0etwork AptionsK
!= Inside the Uplink options menu, there is a 0etwork options section.
This is used for setting up a kind of $ultiple $onitor ,et *<ike the on in The $atri/ or ,wordfish.. !s
of yet, there is no ability to use this for any kind of multiHplayer.
To use these options, follow these instructions=
9. An your main computer, load Uplink, and go to the 0etwork options
:. #lick on the I,tart ,erverI &utton and then load you game.
D. An another computer connect to the network, enter the 0etwork options, and click the I#onnect to
,erverI button.
%. 6/it the options screen, and on the main Title screen, there should be : &lue buttons in the top left
corner, one saying I#A$$,I and the other I,T!TU,I. ,elect which ever one you want the monitor to
display. It should load the relevant details on to the screen.
C. If you have a second computer connected to the network, repeat steps D and % and click the other
option.
8"ease note that these net+ork o!tions are un3tested :, the #ntroversion tea&< and there(ore
are "ike", to :e :ugg,< and &a, crash a "ot.
*et+ork '!tions in action
N. !re there any cheats for UplinkK
!. 5es there are, but they are very well hidden, and weren)t meant to be included in the game. 5ou may
be able to find some hints on how to find them on the Uplink 4orum, but even then it is still hard. They
were removed in Uplink >ersion 9.:.
N. How do I find the Gamebible password(IntroversionIs I"(Pcontinue list of secrets hereQK
!. These are secrets, and should be found your selves. There are numerous hints for most of the secrets
on the game around the Uplink 4orum8 it)s 2ust a matter of looking. &e careful though, some of them
contain the actual answers, and those of you wanting to work them out for your selves may have things
ruined for you.
N. There are no 2obs left on the mission board, what nowK
!. If you click the fast forward button *the blue one at the top with the : arrows on it., then eventually
a mission you can take will appear.
N. I)m Having graphical "roblems with my Fyro II, how can I fi/ itK
!. Try this, I have been told it works, though I)ve not tried it myself.
#reate a new profile for Uplink in the Dd optimisation tab *under properties for screen, settings tab
click advanced then on the optimisation tab..
#lick the arrow to create a profile for Uplink. Give the profile a name and browse to find the .e/e file
for uplink.
0ow click the openG< tab and make sure you check the bo/ in front of Ruse application specified
bufferingR.
,tart the game and hopefully there will be no flickering or tearing.
&y checking the Risable Waiting for >ertical ,yncR bo/ in the openG< optim.. you might gain some
speed in the game.
Tip= ,tay clear of the other bo/es. In most cases it only makes it worse.
N= What is in the Uplink &ank(Government $ainframeK
!= They are unHhackable. &ut even if somehow you did manage to get in, the Government $ainframe
is empty, and the Uplink bank has but one account H yours. ,orry, you canIt hack it.
N. I downloaded the patch, but it doesnIt work, why notK
!. The patch is simply a replacement e/e file. +un the e/tractor and point it to where ever you installed
Uplink. It will then copy the new file over the old one.
N. I)ve ordered Uplink, how long will it take to arriveK
!. If you ordered it using a #redit #ard, it should take about :HD days in the UF, about a week to the
6urope and the U, *normally less though. and maybe a couple of weeks to other places out side
6urope. If you ordered with an International $oney order, you should add a couple of days on for the
payment to reach Introversion first.
Section : Secrets
There are loads of secrets hidden in Uplink. Here is a list of them, and hints on how to find them.
*.ossi/"e S!oi"ers.
%a&e/i/"e.Ai!
An the Uplink #, in the $isc directory, there is a 1ip file called Gamebible. This file is passworded,
and you cannot get the files with out the password.
Hints B 5ou have everything you need when you get the game. Think outside the bo/.
#ntroversion8s #.
Hidden in Uplink is the Introversion ,erver, containing lots of interesting information. Unfortunately,
you have to find this server yourself as it is not at Inter0I#.
Hint B !&H !&H !&H !&H
-eet the -akers
0ot much can be said about this without giving it away, so there is 2ust the hint.
Hint B When would you normally 7$eet your maker)K
Ca((eine5The -entors Last >ords
! hidden little bonus with some interesting bits on it.
Hint B <ook into the 6ye.
)eve"ationcore<.$
The mystery file, deleted from !+# #entral $ainframe before you get to itS
Hint B Trace the logs from !+# #entral $ainframe.
%a&e/i/"e .age 25
If you have managed to get into the Gamebible, page :C hides a little message.
Hint B Try lightening the image.
>arga&esBBB
If you have looked at the status screen after you have lost an agent, you will have seen that there are 9:
special missions, but the storyline missions only cover 93 of thoseS This is one of the other :.
Hint B Would you like to play a gameK
9arga&es;;;
-o"eBBB
!nd this is the other secret mission.
Hint B The last place you would think of hacking, because you already have access.
'h &,< +here did this co&e (ro&;
0"ternate ."ot 6ntr,
There is another way to start the plot, that doesn)t involve using the ead !gents password on !+#
#entral $ainframe. It)s not spectacular, but it)s -uite interesting.
Hint B What if the dead agents email was never sent outS
Section 1< The Bonus Disk
Introversion)s little gift to all those people who have managed to convince another person to buy
Uplink. If you email them your Worldpay 0umber or !ddress that Uplink was shipped to, and that of
another person who has bought the game, they will send you one of these little goodies. 5ou can now
buy the disks as well for a very low price, and its well worth it if you haven)t managed to get on
through the old method.
An the # there are "revious >ersions of Uplink, including one that still has Dd graphicsO There are
loads of pictures, and the music files for the game. There are lots of ideas about Uplink= Anline, as well
as an Ingame history of Uplink #orp.
!lso, there are pictures of the Introversion team, so those of you wondering what the guys look like,
you need the bonus disk.
!nd finally, the Gamebible. #ontained on the bonus disk is &ook :, and how to get book D, but,
surprise surprise, they are encrypted. &oth books : and D have been accessed now, so some help is
available on cracking them.
HI0T,
&ook : B 5ou need to use half the information in the world to get into it.
&ook D B ! #lassic 6ncryption $ethod.
The Bonus Disk 2enu
Section 11 .atch 0dditions
This section will contain all the changes made in patches to Uplink. Hopefully this section will
continually get larger as more and more patches, and thus more features are added to the game.
8atch 1.2
,croll &ars added.
!bility to change Uplink)s resolution added.
Theme menu added to the options screen, allowing you to easily choose which Uplink skin you wish to
use.
The !bility to change the colour of the bars in the game added.
"rocess of adding gateways to the game is simplified.
efrag tool is added to easily sort files in your memory banks.
!bility to 1oom in and out of the World $ap is added, to make life easier when the map is cluttered.
I+# #lient added to the game, to allow to you connect to the Uplink I+# channel online and talk with
others while playing the game.
<!0s added to the game, a ma2or new challenge for e/perienced hackers, re-uiring new software and
skills, and the ability to add your own <!0s and companies to the game.
5ou can no longer delete Inter0I# from the <inks screen.
! <arge list of bug fi/es.
Section 12 .o! Tarts
"op Tarts are the greatest snack food ever invented *6/cept #herry, they suck..
!nyone who wants to be a serious Uplink master must eat "op Tarts everyday. Af course, they must be
eaten warm. !nyone who says you can eat "op Tarts cold must be beaten to death with a spoon right
there and then.
8o! TartsBBB
12.1 .o! Tart 1"avours
In !merica, there are all kinds of #ra1y "op Tart flavours. !nd here they all are
Ce""ogg8sD .o!=TartsD Toaster "astries "lain=
!pple #innamon
&lueberry
&rown ,ugar #innamon
#hocolate #hip
,trawberry
Ce""ogg8sD 1rosted .o!=TartsD Toaster "astries=
&lueberry
&rown ,ugar #innamon
#herry
#hocolate 4udge
#hocolate >anilla #rTme
Grape
+aspberry
,I$ores
,trawberry
Wild &erry
Wild $agic &urst
#hocolate #hip *0ew.
Ce""ogg8sD 1rosted .o!=TartsD <owH4at Toaster "astries=
&rown ,ugar #innamon
#hocolate 4udge
,trawberry
Ce""ogg8sD .o!=Tarts .astr, S+ir"sDE
!pple #innamon
#heese
#heese U #herry
#innamon #reme
,trawberry
Ce""ogg8sD .o!=Tarts Snak=Sti7FE
#ookies and #reme
4rosted &erry
4rosted ,trawberry
Unfortunately, those of us in 6ngland only have C flavours
Ce""ogg8sD .o!=TartsD Toaster "astries
#hocotastic
,trawberry ,ensation
#hocomallow
>ery #herry
>anilla Thrilla
12.2 Uses (or .o! Tarts
espite the obvious eating, "op Tarts also have numerous other uses.
9. ! Handy Throwing weapon, should anyone try to stop you from playing Uplink
:. "op Tarts can be turned into a handy 4lame Thrower(&low Torch contraption.
http=((www.sci.tamucc.edu(Vpmichaud(toast(
D. If you get bored, you would be surprised at the number of different ways you can think of for
cooking "op Tarts
%. They provide an e/cellent e/cuse to leave the room. WIf you will e/cuse me, my "op Tarts 2ust
poppedOX
C. They are an e/cellent conversation piece. http=((www.introversion.co.uk(cgiH
bin(ikonboard(topic.cgiKforumY9UtopicY9D:E
12.3 >hich 1"avour is /estB
There will be numerous discussions about this, but that is all irrelevant. 4ollowing is the official ratings
for the UF 4lavours of "op Tarts.
The '((icia" UC .o! Tart ' -eterG
#hocotastic B Teh UberHWin. &est "op Tarts 6verO
,trawberry ,ensation B AF, but no where near as good as #hocotastic.
#hocomallow B Wrong. 6vil and wrong.
>ery #herry B The ,ource of all that is wrong with the WorldO !void <ike the "lague
>anilla Thrilla B Unrated due to lack of >anilla "op Tarts. *Though they probably suck.
If you should run across some unHinformed individual who disagrees with this, you must correct them
immediately. If they still continue to disagree, you must assault them mercilessly with #herry "op tarts,
while feeding them #hocotastic "op Tarts, until they agree that #herry Y &ad = #hocotastic Y Good.
12.4 Conc"usion
In conclusion, "op Tarts obviously rule. They taste great and have multiple uses. !nyone who says "op
Tarts are bad must be swiftly and brutally dealt with. !nd anyone who says that Toaster ,truddles are
better than "op Tarts must be beaten to death with their beloved ,tuddles. 5ou know who you areO
,ummary=
"op Tarts= Good
6verything 6lse= &ad
Section 13 Conc"usion
,o, that)s it. That)s the end of the Guide. I hope I have covered everything you will need to know about
Uplink, but if there is anything I have missed, or you have any -uestions feel free to contact me.
I am often *read= always. on Uplink)s I+# channel as ZIcepickZ, so you can talk to me there, or you
can 2ust stop by and chat to the people. There is normally some one there to talk to, at peak times the
place is -uite active, and sometimes, #hris elay, the creator of the game stops by for a chat. 5ou can
also email me, or contact me over I#N.
I will update this guide as it is re-uired, either because I have missed something, a new patch is
released, or I think of something else to add.
I would like to thank everybody who has helped contribute to this guide, you know who you are.
,o, thank you for reading, I hope it has helped you.
13.1 Contact
6mail= Icepick;:[ravinglunatic.co.uk
I#N\= E;;E%99C
I+#= irc.openpro2ects.net
"ort ''';
\uplink
13.2 Links
Introversion ,oftware B The Afficial Uplink ,ite
$odlink H $y site, containing Uplink mods and the latest version of this guide
The Hackers ,hadow H The Hackers ,hadow, the best Uplink 4an site around
!ll Information contained in this Guide is copyrighted to Icepick. o not recreate any or part of this Guide for any purpose
without my permission first. Uplink is copyright to Introversion ,oftware.

You might also like