Get quick and convenient access to just the hints you need for Uplink, without staying on our website. Just download a free trial
version of our UHS Reader software and
a copy of these hints. You will get the
same gradual hints you see here -- unlike ordinary cheats or a
walkthrough that can spoil your game.
You can also buy the full version of the UHS Reader
for Windows or macOS. For just $14.95, you get full access to hints for
hundreds of games and 1 year of free updates. You can also search, decode, or print an entire
game's worth of hints at once.
Ask the Author
If you have questions about a puzzle that aren't answered
anywhere in these hints,
you may contact the author.
Uplink Hints
A comprehensive list of all mission types
Here's a list of all the mission types you can get. (It's quite possibly not complete yet, most of the regular missions are listed and others can be pretty much deduced. DEFINITELY not a pretty list but it gets the job done ;))
(beg) = Early game
(mid) = Midgame
(end) = Endgame
-NM = Neuromancer Rating goes down.
+NM = Neuromancer Rating goes up
--NM = Neuromancer Rating goes way down
++NM = Neuromancer Rating goes way up
Copying / Deleting (beg)
*Gain access to a rival system and steal research files.
*Access a remove system and copy important data files.
*Find and destroy crucial data on a mainframe.
*Steal important data from a rival company's file server.
*Gain access to a rival system and steal research files.
International Academic Database (beg) -NM
-Modifying
*X Needs a first class degree
*Qualifications required for a wealthy individual.
*Help us prove a fellow employee is over-rated
*Generate a university degree for a friend
*Qualifications required for a wealthy individual
*Modify an Academic Record
Banks (beg/mid/end)
*Client interested in financial data (beg) no proxy
*Find financial details of one of our associates
*Trace a recent bank transfer (beg) no proxy
*Our esteemed colleague wishes to make a donation (mid) proxy -NM
*Frame a man for bank fraud (mid/end) -NM
*Trace an unauthorised money transfer (end) -NM
International Social Security Database (mid) proxy v1.0 -NM
*Create a part of a new identity
*Falsify a Social Security Document
Framing people (mid/end) -NM
*Frame a man for bank fraud (mid/end)
*Frame a man for computer related crimes (mid/end)
*Frame a man for destruction of data (mid/end)
*Prevent a hacker from ever working again. (mid/end)
-Destroying lives (end) --NM
Global Criminal Database (mid/end) proxy v1.0 -NM
*Help to discredit one of our rivals (mid)
*Clear a criminal record (mid)
*Help to stop a hacker from ever working again
*Highly skilled agent required for removal job
-Destroying lives (end)
Stealing research/customer data (mid/end) firewall +NM
-100 Gq assignments (STEER CLEAR!) -- mostly mainframes. (end)
-70 Gq assignments (OK but sometimes buggy) -- often firewalls, ignore the proxy. Sometimes mainframes. (mid/end)
*Copy proprietary source code database
*Break into High Security System and steal customer records.
Destroying Research/Customer Data (mid/end) +NM
-Normal systems (mid) usually proxy/firewall
-Mainframes (end) proxy, firewall
*Destroy rival software in progress
*Destroy customer records on a sales system
Counter-hacking (end) --NM
-Tracing hackers. (misc)
*Trace a hacker who recently broke into our systems
*Trace an unauthorised money transfer -NM
Destroying Systems (end) proxy, firewall ++NM
*Elite agent required for destruction of computer system.