Difference between revisions of "Hackware"
Jump to navigation
Jump to search
m |
m |
||
Line 6: | Line 6: | ||
|?rating=Rating | |?rating=Rating | ||
|?name=Name | |?name=Name | ||
− | |||
|?coverage=Coverage | |?coverage=Coverage | ||
|?integrity=Integrity | |?integrity=Integrity | ||
− | |||
− | |||
|?effect=Effect | |?effect=Effect | ||
|mainlabel=- | |mainlabel=- |
Revision as of 16:01, 12 January 2018
Processors dedicated to hacking are categorized separately for easy recognition. Hackware provide either offensive or defensive capabilities applicable to both machine and robot hacking. Once attached, hackware cannot be removed without rendering it useless.
Hackware
{{#ask:
|?rating=Rating |?name=Name |?coverage=Coverage |?integrity=Integrity |?effect=Effect |mainlabel=- |sort=rating,name |order=asc,asc
}}