If they want a qualification added, this goes into the third field. If they want a degree changed (perhaps giving the target a Class 1 degree), this goes in the second field. If they want a grade changed (giving the target an 'A' in a class, for example), this goes in the first field. It is important to note which type of qualifications the employer wants changed. If you have a monitor bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. This mission type requires hacking into the International Academic Database. Qualifications required for wealthy professional.Generate a University Degree for a friend.Help us prove a fellow employee is over-rated.Improve our associates' academic standing.Then reply to the employer, including the file as an attachment.Ĭhange academic records Mission Descriptions If so, use a decrypter program to remove the encryption. If this was a difficulty 3 mission, the file may be encrypted. This mission type is very similar to previous one, however instead of deleting the file, copy it to the Gateway's memory. Required Software: Password Breaker, File Copier, Decrypter (for difficulty 3 only) Gain Access to a rival system and steal research files.Steal important data from a rival companies file server.Access a remote system and copy important data files.Cover your tracks and send a reply to receive payment.Ĭopy a file Mission Descriptions Locate the file mentioned in the mission e-mail, then delete it. Crack the password and access the file server. It's a good idea to bounce the connection a few times, as always, but not much time will be needed to complete the mission. Required Software: Password Breaker, File Deleter Find and destroy crucial data on a mainframe.Hack into a computer and delete Key files.Break into a rival computer system and sabotage files.
0 Comments
Leave a Reply. |