Difference between revisions of "Terminal"

From Grid Sage Wiki
Jump to navigation Jump to search
(Added lore.)
Line 74: Line 74:
 
   Schematic(NAME)
 
   Schematic(NAME)
 
Use this command to attempt to download the target schematic. Works for [[part]]s, even those you have not yet seen in the current run. Also works for [[robot]]s, but only if you have the exact name (E.g. 'Schematic(M-28 Smith)' not 'Schematic(Mechanic)').
 
Use this command to attempt to download the target schematic. Works for [[part]]s, even those you have not yet seen in the current run. Also works for [[robot]]s, but only if you have the exact name (E.g. 'Schematic(M-28 Smith)' not 'Schematic(Mechanic)').
 +
 +
== Unauthorized Hacks (Indirect Hacking) ==
 +
  Trojan(Track)
 +
Reports to you the current location of all robots within a square zone around the terminal, as if you were standing there with sensors and an Adv. Signal Interpreter. The area of effect is determined by the security level of the Terminal--higher tier systems have a greater range.
 +
  Trojan(Assimilate)
 +
An Operator attempting to use this Terminal will instead be permanently converted to an ally (to join your personal hacker network :D).
 +
  Trojan(Botnet)
 +
As long as this terminal is active, it provides a bonus to both direct and indirect hacks at any other machine on the same floor. This effect stacks across multiple infected Terminals (with diminishing returns, in the same way multiple allied Operators stack). Build your own network!
  
 
[[Category:Machines]]
 
[[Category:Machines]]

Revision as of 11:59, 10 April 2016

/Results/
>>Query(Terminal)

Interactive station connected to the central network via reliable hard line. Relevant information is monitored and relayed by the terminal's Operator. Types of information accessible directly from each terminal are limited in order to mitigate the negative impacts of unauthorized access. Access is restricted by shielding the system behind multi-layered security, the first layer of which requires a dynamic key to clear without triggering defense mechanisms.

X

Terminals are the most common type of interactive machine, providing access to local and central networks and databases. At the time of access, the terminal interface lists all potential hacking targets found for direct hacking. Unlisted targets can be hacked by manually entering the associated command, though so-called "indirect hacking" is more difficult (-15% chance, though tunneling hackware can be used to counteract this difficulty, and even make indirect hacks easier). The precise difficulty of indirect hacks is also an unknown factor, making them more dangerous for the inexperienced hacker.

Operators are stationed at some terminals. Destroying the operator and retrieving its data core will extract its dynamic key and provide a 1.5x bonus to the first hack at that operator's terminal, but only if the connection is established before the key expiry.

Higher security terminals have direct access to more functions at once.

Manual Commands (Indirect Hacking)

While accessing a terminal, pressing 'z' will allow you to enter the following manual prompts.

Access()

 Access(Branch)

This command reveals locations of any Branch stairwells.

 Access(Emergency)

This command scans a small radius around you and will highlight any 'emergency' doorways, a.k.a. hidden doors.

 Access(Main)

This command downloads the locations of all main stairways on the current floor.

Alert()

 Alert(Check)

Outputs the current security level of the floor.

 Alert(Purge)

Lowers your current 'threat rating', displayed as a Security Rating. This persists from floor to floor, making it rather useful to lower. Each Alert(Purge) lowers your rating by 200, and each Security Rating (i.e. 1, 2, 3, 4) is twice the previous amount of points away. More explicitly, Security Rating 4 is hit when you reach 1600, Security Rating 3 is at 800, Security Rating 2 at 400, and Security Rating 1 at 200.

Analysis()

 Analysis(BOTNAME)

Gives a little bio on a unit. BOTNAME must be exact, e.g. 'Analysis(M-28 Smith)'. You cannot just type in Mechanic.

Control()

 Control(Machines)

Attempts to sabotage a machine elsewhere on the map, i.e. a fusion reactor. If successful the machine detonates, drawing attention (perhaps away from you). Can possibly be used multiple times.

Enumerate()

 Enumerate(Assaults)
 Enumerate(Exterminations)
 Enumerate(Maintenance)
 Enumerate(Reinforcements)
 Enumerate(Squads)
 Enumerate(Surveillance)
 Enumerate(Transport)

This one has many possible states. It will give you the current location of the targets. 'Assaults', 'Exterminations', and 'Squads' are all combat unit-related. 'Maintenance' will give you the location of Mechanics. 'Transport' will tell you where the haulers are ('a' and 'A').

Index()

 Index(Fabricators)
 Index(Repair Units)
 Index(Terminals)
 Index(Scanalyzers)
 Index(Recycling Units)

Use this to gain the locations of all requested devices. There is a discrepancy between what is known as 'Repair Stations' being called 'Repair Units' on the command, and same with 'Recycling Units'.

 Index(Machines)

Downloads coordinate data for ALL machines on the current floor.

Inventory()

 Inventory(Components)

Lists stockpiles and their locations. These get marked on your radar.

 Inventory(Prototypes)

Lists prototypes and their locations. These get marked on your radar.

Recall()

 Recall(Assault)
 Recall(Extermination)
 Recall(Reinforcements)

Recalls the given squad.

Other Commands

 Manifests

Displays data on what haulers are hauling. Will NOT give you the locations on the haulers.

 Open

Used at special Terminals to open blast doors.

 Prototypes

Downloads data on prototypes. Note: this command only gives you info on a few prototypes. It must be used multiple times if you want comprehensive information.

 Query(NAME)

Downloads a text article containing lore on your subject. Viewed on Terminals as "Record [Earth]".

 Schematic(NAME)

Use this command to attempt to download the target schematic. Works for parts, even those you have not yet seen in the current run. Also works for robots, but only if you have the exact name (E.g. 'Schematic(M-28 Smith)' not 'Schematic(Mechanic)').

Unauthorized Hacks (Indirect Hacking)

 Trojan(Track)

Reports to you the current location of all robots within a square zone around the terminal, as if you were standing there with sensors and an Adv. Signal Interpreter. The area of effect is determined by the security level of the Terminal--higher tier systems have a greater range.

 Trojan(Assimilate)

An Operator attempting to use this Terminal will instead be permanently converted to an ally (to join your personal hacker network :D).

 Trojan(Botnet)

As long as this terminal is active, it provides a bonus to both direct and indirect hacks at any other machine on the same floor. This effect stacks across multiple infected Terminals (with diminishing returns, in the same way multiple allied Operators stack). Build your own network!