Terminal
Terminals are the most common type of interactive machine, providing access to local and central networks and databases. At the time of access, the terminal interface lists all potential hacking targets found for direct hacking. Unlisted targets can be hacked by manually entering the associated command, though so-called "indirect hacking" is more difficult (-15% chance, though tunneling hackware can be used to counteract this difficulty, and even make indirect hacks easier). The precise difficulty of indirect hacks is also an unknown factor, making them more dangerous for the inexperienced hacker.
Operators are stationed at some terminals. Destroying the operator and retrieving its data core will extract its dynamic key and provide a 1.5x bonus to the first hack at that operator's terminal, but only if the connection is established before the key expiry.
Higher security terminals have direct access to more functions at once.
- This page is a stub. You could probably expand this page should you wish to do so.