Section 2 - Uplink Information

This section contains Information about Uplink, such as Uplink Ratings, Neuromancer ratings and how they change, and Software and Hardware Info.

2.1 - Uplink Ratings

This is a list of the Uplink ratings you acquire through the game. You increase your rating by hacking systems and doing jobs. The harder the work you do, the more your rating goes up.

Grade 16 - Registered
Grade 15 - Beginner
Grade 14 - Novice
Grade 13 - Confident
Grade 12 - Intermediate
Grade 11 - Skilled
Grade 10 - Experienced
Grade 9 - Knowledgeable
Grade 8 - Uber-Skilled
Grade 7 - Professional
Grade 6 - Elite
Grade 5 - Mage
Grade 4 - Expert
Grade 3 - Veteran
Grade 2 - Techno-mage
Grade 1 - TERMINAL

2.2 - Neuromancer Ratings

Your Neuromancer Rating is an unofficial rating given to you by the hacker community. It has little effect in the game, though it does say something about your morals as a hacker. If you are the kind of person who will do things that damage a company, your rating will go up, but if you do things that are bad for other hackers, your rating will drop. And it is A LOT easier to make it drop than it is to make it go up. Doing missions such as 'Destroy a Corporate Database' will improve your Neuromancer rating, where as doing missions like 'Trace a Hacker' will decrease it a lot.

Neutral - Aggressive - Single Minded - Activist - Anarchic - Revolutionary (Good Side)
Neutral - Untrustworthy - Notorious - Indiscriminate - Sociopathic - Morally Bankrupt (Bad Side)

2.3 - Software

Following is a guide of each piece of Software available in Uplink, and how to use it.

  Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7
Cost 800c 1200c 1600c 2200c 3000c 7000c 15000c
Size 2Gq 2Gq 2Gq 2Gq 3Gq 4Gq 5Gq
Description Decrypt files with equal or lower encryption than the version, by clicking on them.
Decrypt files with equal or lower encryption than the version, by clicking on them.

  Version 1 Version 2 Version 3
Cost 3000c 5000c 8000c
Size 2Gq 2Gq 2Gq
Description Decypher Elliptic Curve Encryption by clicking on the Cypher box with the program running. Higher versions work faster.

Dictionary Hacker
Cost: 1000c
Size: 4Gq
Attempts to break passwords with a dictionary file. Used by clicking on the password box with the program running. Not always Successful.

File Copier
Cost: 100c
Size: 1Gq
Copies a file, by clicking on the file, then on the memory location you wish to copy too.

File Deleter
Cost: 100c
Size: 1Gq
Deletes a file, by clicking on the file in the memory/file server.

Cost: 5000c
Size: 2Gq
Sorts all the files in your memory to optimize free space, by moving files to fill in gaps.

Firewall Bypass
  Version 1 Version 2 Version 3 Version 4 Version 5
Cost 3000c 4000c 6000c 8000c 10000c
Size 1Gq 1Gq 1Gq 1Gq 1Gq
Description Bypasses a Firewall with equal or lower level to the version. Open the connection Analyser, and click on the Firewall icon with the Firewall Bypass Selected.

Firewall Disable
  Version 1 Version 2 Version 3 Version 4 Version 5
Cost 2000c 3000c 4000c 6000c 8000c
Size 1Gq 1Gq 1Gq 2Gq 3Gq
Description Disables a Firewall with equal or lower level to the version. Simply click the Go button to start the process. A Trace will begin automatically when you use this.

HUD ConnectionAnalysis
Cost: 20000c
Size: -
Gives you the Connection Analysis menu, and allows you to use Bypassers.

HUD IRC Client
Cost: 4000c
Size: -
Allows you to connect to the Uplink IRC channel online, and talk with other hackers.

HUD MapShowTrace
Cost: 5000c
Size: -
Allows you to see the progress of a trace on the World Map

Cost: 50000c
Size: -
Gives you the LAN View menu, which allows you to view systems on a LAN you are currently connected to.

IP Lookup
Cost: 500c
Size: 1Gq
Allows you to enter an IP and that IP is added to your Server Links Automatically.

IP Probe
  Version 1 Version 2 Version 3
Cost 2000c 4000c 5000c
Size 3Gq 3Gq 3Gq
Description Allows you to enter an IP, and get information on the types of security at that IP, via Email. Higher versions give more Information

LAN Probe      
  Version 1 Version 2 Version 3
Cost 15000c 20000c 30000c
Size 3Gq 3Gq 4Gq
Description Shows you the type, and all connections coming from, any system on a LAN. Higher versions work on higher level systems.

LAN Scan      
  Version 1 Version 2 Version 3
Cost 10000c 15000c 25000c
Size 2Gq 2Gq 2Gq
Description Shows you all the system present on a LAN you are connected to. Higher versions work on higher level LANs.

LAN Spoof      
  Version 1 Version 2 Version 3
Cost 20000c 30000c 45000c
Size 2Gq 3Gq 5Gq
Description Fools the Network into thinking you are connected to a system, allowing you access to systems protected by Subnets. Higher versions work on higher level systems.

LAN Force      
  Version 1 Version 2 Version 3
Cost 15000c 20000c 25000c
Size 2Gq 3Gq 4Gq
Description Opens a lock on a LAN system. Higher versions open higher level Locks. The Systems Administrator will log on if you use this tool.

Log Deleter
  Version 1 Version 2 Version 3
Cost 500c 1000c 2000c
Size 1Gq 1Gq 1Gq
Description Deletes a Log by clicking on it. Higher versions become harder to detect, with Version 4 being impossible to detect.

Log Modifier
  Version 1 Version 2
Cost 4000c 6000c
Size 2Gq 2Gq
Description Modify a Log by clicking on it. Version 2 can create new logs from blank spaces.

Log UnDeleter
Cost: 5000c
Size: 1Gq
Recover deleted logs, or restore modified logs, by clicking on them.

Monitor Bypass
  Version 1 Version 2 Version 3 Version 4 Version 5
Cost 10000c 12000c 16000c 20000c 25000c
Size 1Gq 1Gq 1Gq 1Gq 1Gq
Description Bypasses a Monitor with equal or lower level to the version. Open the connection Analyser, and click on the Monitor icon with the Monitor Bypass Selected.

Password Breaker
Cost: 1500c
Size: 2Gq
Break a password by clicking on the password box.

Proxy Bypass
  Version 1 Version 2 Version 3 Version 4 Version 5
Cost 6000c 8000c 12000c 16000c 20000c
Size 1Gq 1Gq 1Gq 1Gq 1Gq
Description Bypasses a Proxy with equal or lower level to the version. Open the connection Analyser, and click on the Proxy icon with the Proxy Bypass Selected.

Proxy Disable
  Version 1 Version 2 Version 3 Version 4 Version 5
Cost 3000c 4000c 6000c 8000c 10000c
Size 1Gq 1Gq 1Gq 2Gq 3Gq
Description Disables a Proxy with equal or lower level to the version. Simply click the Go button to start the process. A Trace will begin automatically when you use this.

Trace Tracker
  Version 1 Version 2 Version 3 Version 4
Cost 300c 600c 1400c 2500c
Size 1Gq 1Gq 2Gq 3Gq
Description Tells you if you are being traced, and how long you have with increasing accuracy as the Version gets higher.

Voice Analyser
Cost: 5000c
Size: 4Gq
Allows you to record a voice pattern for breaking Voice Verification Security. Find the phone number of the Admin of the system, run this while he's talking, and hit play when you need to play the voice back.

2.4 - Hardware

Here is a run down of what each piece of hardware does, and its cost.

  CPU (20Ghz) CPU (60Ghz) CPU (80Ghz) CPU (100Ghz) CPU (120Ghz)
Cost 250c 1000c 1300c 3000c 5000c
Description The Faster your processor speed, the faster your gateway can do things, such as break Cyphers.

  Memory (8Gq) Memory (16Gq) Memory (24Gq) Memory (32Gq)
Cost 3000c 5500c 8000c 11000c
Description The more memory you have the more files you can store at one time.

  Modem (1Gq/s) Modem (2Gq/s) Modem (4Gq/s) Modem (6Gq/s) Modem (8Gq/s)
Cost 1000c 2000c 4000c 6000c 8000c
Description Supposedly makes file transfer faster, though it makes no noticeable difference.

Gateway Self Destruct.
Cost: 20000c
Fits explosives to your gateway, and gives you a piece of software that can be used to detonate these explosives should the Feds get to close to your gateway.
Gateway Motion Sensor
Cost: 10000c
Fits motion sensing equipment to your Gateway, and gives you a piece of software that allows you to see the status of the Motion Sensor. When run, the Software, a small light appears under the Time Controls. When this light turns yellow, some one is fitting new hardware on your gateway. If it turns Red, the Feds are near your gateway, and you should use the Gateway Nuke.
Note that each one of these pieces of Security is useless without the other. Without the Motion Sensor, you will not know when to use the Gateway Nuke, and without the Gateway Nuke, you won't be able to do anything when you see the Feds coming.
Also, you should never use the Gateway Nuke when the light Isn't Red, otherwise it won't work, and you can still be traced for anything you have done before you used the Nuke.

Gateway Nuke/Motion Sensor

If it worked, you should get this mail

2.5 - Gateways

Following is a guide on all the Gateways available in the game.

Gateway Alpha
Max CPUs: 1
Max Memory: 32Gq
Max Security: 0
Max Bandwidth: 1Gq/s

The gateway you start the game with, and go back to if your gateway is ever destroyed. It's very simple, with only one CPU slot and 32Gq Max Memory space. There is no room for security, and this model cannot handle a better modem. Due to its lack of speed, this Gateway becomes pretty useless as soon as you are required to do anything even remotely intensive, like cracking an Encryption, and it is recommended you upgrade as soon as possible.
Rating: 4 out of 10

Gateway Alpha ICPU
Max CPUs: 2
Max Memory: 32Gq
Max Security: 0
Max Bandwidth: 1Gq/s

This Gateway is almost exactly the same as the ALPHA, except it has an extra CPU slot, which means it can have double the processor power, and for the low price, is quite a good investment at the start of the game. A lot more versatile than the ALPHA, with the extra CPU it can better handle more strenuous activities, although its lack of memory means you will still be wanting something bigger quite quickly.
Rating: 5 out of 10

Gateway Alpha IMEMORY
Max CPUs: 1
Max Memory: 64Gq
Max Security: 0
Max Bandwidth: 1gq/s

This is the same as the ALPHA but with twice as much memory space. Unfortunately, because it still only has one processor slot, the extra memory won't do you much good because you won't be able to do anything else. It's not bad it you need some extra storage space early on, because it's quite cheap, but otherwise I would suggest against it.
Rating: 4 out of 10

The VIRTUANET R-Access Gateway
Max CPUs: 2
Max Memory: 48Gq
Max Security: 0
Max Bandwidth: 2Gq/s

The Description says you cannot be caught with this Gateway, though a few people have reported that they have been caught with it. It has 2 CPU slots and enough space for 48Gq of memory, though no space for security. Not to bad for the price, but personally I would save up a little more and go for the next one.
(Note This gateway loses its radio modem feature after v1.2)
Rating: 6 out of 10

The KRONOS Corp 80-860 Gateway
Max CPUs: 2
Max Memory: 64gq
Max Security: 1
Max Bandwidth: 4Gq/s

Named after the Evil Corporation from the hit Anime series Guyver, this quite a good Gateway to buy as your first one. With double the CPU and Memory space of the ALPHA, space for a 4Gqs Modem and 1 security device, its good value for money, and will see you through most of the missions of difficulty 5 or 6 quite well. The downside is that one security device isn't really much help - Even if you have a motion sensor there is nothing you can do about it when it turns red.
Rating: 7 out of 10

The ZION-780 Series Workstation
Max CPUs: 3
Max Memory: 96Gq
Max Security: 2
Max Bandwidth: 6Gq/s

An excellent Gateway, the ZION has 3 CPU slots, enough space for 96Gq of memory, 2 security devices and a 6Gqs Modem. At Just over 10000c more than the KRONOS, this is excellent value for money. It has enough space to do most database copying missions, enough CPU space to make breaking encryptions nice and quick, and have both security devices available. I highly recommend this gateway as a stopping point before buying the Trinity.
Rating: 9 out of 10

The UNITY High-Security Platform
Max CPUs: 4
Max Memory: 64Gq
Max Security: 4
Max Bandwidth: 6Gq/s

I personally find this Gateway pretty pointless. Its main feature is 4 security device spaces, but since there are only 2 in the game, and having more than one is pointless, this Gateway is just a big waste of time. It also has less memory space than the ZION. Its redeeming feature is that is has 4 CPU slots, but at nearly 70000c I personally think this is the biggest waste of money there is.
Rating: 5 out of 10

The AM-CORE File Server
Max CPUs: 3
Max Memory: 256Gq
Max Security: 2
Max Bandwidth: 6Gq/s

This Gateway has a huge amount of memory space, at 256gq, you will be able to do 2 database missions with this and still have space left. The 3 CPU slots is a bit of a let down, but it is sufficient for most things, though you may be left wanting more power towards the later missions. 2 Security devices make it a nice safe gateway once you have the equipment fitted, but you really have to ask your self, 'Do I really need that much memory?'
Rating: 8 out of 10

The OMEGA Super Computer
Max CPUs: 16
Max Memory: 48Gq
Max Security: 1
Max Bandwidth: 4Gq/s

This computer is really all down to personal Preference. With 16 CPU slots, it's by far the most powerful Gateway available, but with only 48Gq of Memory space, you won't have nearly enough space for those 'Copy a Database' missions. A big let down is that it only has 1 security slot, but otherwise, it's not too bad.
Rating: 8 out of 10

The TRINITY-1686a Gateway
Max CPUs: 8
Max Memory: 128Gq
Max Security: 3
Max Bandwidth: 8Gq/s

My personal favourite, this gateway has everything you could possibly want. With 8 CPU slots, it's easily fast enough to do anything in the game in a matter of seconds, and 128Gq of Memory space means you have plenty of room for files. The only downside of this gateway, which isn't really important, is the completely pointless 3rd Security slot. All Agents should aspire to own this Gateway.
Rating: 10 out of 10

These are the basic Gateways that come with the game, though there are numerous mods that will add more to the game.

2.6 - Server Types

Following is a list of each type of server, and the kind of security you can expect to find on each server.

Internal Services Machine
This is the most common type of System in the game. They are easy to hack into, and a lot of the missions in the game will involve these systems. They have a File Server, a Console, a Links page, and Log access, as well as a few useless features such as Security viewing and Accounts. Security varies slightly between systems, but they always have a Password screen, and usually have a monitor, as their only main defence so a Password breaker will be sufficient to enter the system. Later on it the game, they start getting Proxy's and Firewall's at different levels, so a Bypass or Disabler will be required to change anything on the server. Generally, traces, both active and passive, are slow from these Systems, though a few storyline servers will trace faster.

Central Mainframe
A lot more secure than an Internal Services Machine, though fewer in numbers, Central Mainframe sport a large amount of security, and faster traces. They also only accept connections from 'Trusted Systems', meaning systems owned by the same company. That means that in order to be able to connect to one, your last bounce point before the Central Mainframe has to be a server owned by the same company. They always have a Password Screen, some have a Voice Print Analyser, others have Elliptic Curve Cyphers, and some have both. They always have Monitor's, Proxy's and Firewall's of varying levels, though most of them will be level 4 or 5. They have a File Server, Console and Log Access, but these don't have any Link's section. Most of the harder missions will involve these servers.

Public Access Servers
These systems can't be hacked, there is nothing there. All these systems are for is detailing the Admin for the relevant companies systems. This is where you go if you need the phone number of an Admin in order to break through a Voice Print Analyser.

Remote Access Terminals
These do nothing. Period.

Supposedly one of the most secure types of server in the game, though oddly the easiest to hack. Because using a Monitor Bypass disables all Active Traces, you have all the time you need in the system. Don't let your self be fooled though, banks have the fastest passive traces in the game, sometimes tracing you in a matter of minutes, so once you are done, you need to work fast to clear your logs.
The accounts section is protected by a Password Screen, using the account number as the user name. Firewalls and Proxy's of varying levels protect the banks though, so these will need to be circumvented in order to make any changes to an account.
The Admin section is protected by a Password, Voice Print and Elliptic Curve Cypher, and allows you access to the banks connection logs, and also the account number and password of every account at that bank.
Each bank lists their Admin in an 'About' screen, and you have the ability to create a new account as well.

File Servers
A lot of companies have stand alone File Servers used for storing large amounts of data away from the main system. You will mainly uses these when you do 'Copy a Database' missions, as you will have to dump the files that you have copied there. They have no monitor, and although they have a password screen, these servers cannot actually be hacked. The only way to get the passwords for them is to get them via missions. If you do happen to have access to a File Server, they are very useful for backing up your programs, should something bad happen to your gateway and you have files that you cannot get again.

Voice Phone Systems
Basically, dial into a person's phone, and record their voice. You can't hack anything here, but this is where you get the voices for the Voice Print Analyser. Connect to the phone system and run the Voice Analyser to record the voice.

Personal Computers
These serve little purpose. They are there so you know the IP address of someone you need to frame for a crime, that's about it really. They cannot be entered because they do not accept external connections.

Local Area Networks (LANs)
A new type of system, added in version 1.2. They are the most secure type of system in the game, requiring a lot of time and skill to break into them. They have numerous different security features, including the standard ones found on other servers. Expensive software and HUD upgrades will be required before you can even enter these systems, and if you aren't careful, the systems admin will log on and hunt you down on the system. These systems will appear in later missions and in the story line as well.

2.7 - Security Systems

There are multiple security systems in Uplink, and each of them needs to be tackled in a different way. Here is a list of each type of security and how to get round it.

Login/Password Screen
The most common form of security you will come across. This is easily defeated by using the Password Breaker on it. The only variation in the power of this security is the amount of time it takes to break the password, on more secure systems it will take longer.

Elliptic Curve Cypher
A Complex, hard to crack Cypher, represented by a screen of numbers that cancel to 0 as it is cracked. To get past this you will need a Decypher. Once again, the more secure the system, the longer it takes to crack. Cracking these is very CPU intensive, so you should make sure you have a good machine before attempting to hack a server with one of these.

Voice Print Analysis
Uses a recorded message of the System Administrators voice, so that only the person with that voice can access the system. This is defeated by using a Voice Analyser, with the appropriate voice recorded into it. Simply playing sample back will unlock the security and allow you to enter.


Most systems in the game have a monitor. It is what tells the company that someone is trying to hack into their system so that they can trace you while you are still attempting to enter the server. These are overcome using a Monitor Bypass, though the Bypass has to be of equal or higher level to the Monitor itself. If the Monitor is bypassed, you can break all of the systems security before they begin tracing you.
A lot of systems have either a Proxy, or and Proxy and a firewall. These don't do anything to stop you form accessing the system, but they do stop you from modifying anything on that system should you gain access. There are 2 ways around these. The Bypass, which works in the exact same way as the Monitor Bypass, and the Disabler. The Disabler will stop a security device from working while you are connected to the server, allowing you to modify the files or records on the server. They do, however, take time to work, and will alert the company to your presence almost instantly.

2.8 - Console Commands

On a lot of the servers in Uplink, there are consoles that allow you to manually enter commands to the system. Following is a list of commands that can be used in the console, and what they do.

Help - display a list of commands
cd - opens a directory
cd .. - closes the current directory
Delete - delete the whole contents of the currently open directory
Shutdown - Shuts down the system.
Disconnect - disconnects from the system
Exit - exits the console and returns to the menu
Run - runs the program you entered. (only works from the usr directory)

It is worth noting, that while the console may still be performing the task you told it to, you can still enter commands, which will be executed in the order they are entered after the current process is finished.

2.9 - Changing Your Records

During the game, you will have the ability to change your Academic, Social, and Criminal records. For the most part this will have little effect, though it can be rather fun to give your self numerous first class degrees :)
However, should you ever wind up with a criminal record, you may find it difficult getting a good job. What you will need to do in order to rectify this situation, is hack the Global Criminal Data, access your record, and delete anything on it. Once you have done this, you will be able to take jobs normally again.

2.10 - User Accounts

Certain systems have other user accounts than Admin that you can hack into. The main ones are the International Academic Database, Social Security Database, and Global Criminal Database. These systems have 2 other accounts you can hack; readwrite, and readonly. You can access these accounts by entering these names into the user name box of the password screen before using the password breaker. The advantage of using these is that you are not traced when you enter a system with these accounts (provided you use the Monitor Bypass). The disadvantage is that you cannot access the admin section of the system (which means you can't directly access the systems logs). It is entirely down to personal preference which you use when hacking these systems, but it can make life easier not having to worry about being traced when you have a lot of work to do on the system.