Uplink Hints

A comprehensive list of all mission types

  • Here's a list of all the mission types you can get. (It's quite possibly not complete yet, most of the regular missions are listed and others can be pretty much deduced. DEFINITELY not a pretty list but it gets the job done ;))

    (beg) = Early game
    (mid) = Midgame
    (end) = Endgame
    -NM = Neuromancer Rating goes down.
    +NM = Neuromancer Rating goes up
    --NM = Neuromancer Rating goes way down
    ++NM = Neuromancer Rating goes way up

    Copying / Deleting (beg)
    *Gain access to a rival system and steal research files.
    *Access a remove system and copy important data files.
    *Find and destroy crucial data on a mainframe.
    *Steal important data from a rival company's file server.
    *Gain access to a rival system and steal research files.

    International Academic Database (beg) -NM
    -Modifying
    *X Needs a first class degree
    *Qualifications required for a wealthy individual.
    *Help us prove a fellow employee is over-rated
    *Generate a university degree for a friend
    *Qualifications required for a wealthy individual
    *Modify an Academic Record

    Banks (beg/mid/end)
    *Client interested in financial data (beg) no proxy
    *Find financial details of one of our associates
    *Trace a recent bank transfer (beg) no proxy
    *Our esteemed colleague wishes to make a donation (mid) proxy -NM
    *Frame a man for bank fraud (mid/end) -NM
    *Trace an unauthorised money transfer (end) -NM

    International Social Security Database (mid) proxy v1.0 -NM
    *Create a part of a new identity
    *Falsify a Social Security Document

    Framing people (mid/end) -NM
    *Frame a man for bank fraud (mid/end)
    *Frame a man for computer related crimes (mid/end)
    *Frame a man for destruction of data (mid/end)
    *Prevent a hacker from ever working again. (mid/end)
    -Destroying lives (end) --NM

    Global Criminal Database (mid/end) proxy v1.0 -NM
    *Help to discredit one of our rivals (mid)
    *Clear a criminal record (mid)
    *Help to stop a hacker from ever working again
    *Highly skilled agent required for removal job
    -Destroying lives (end)

    Stealing research/customer data (mid/end) firewall +NM
    -100 Gq assignments (STEER CLEAR!) -- mostly mainframes. (end)
    -70 Gq assignments (OK but sometimes buggy) -- often firewalls, ignore the proxy. Sometimes mainframes. (mid/end)
    *Copy proprietary source code database
    *Break into High Security System and steal customer records.

    Destroying Research/Customer Data (mid/end) +NM
    -Normal systems (mid) usually proxy/firewall
    -Mainframes (end) proxy, firewall
    *Destroy rival software in progress
    *Destroy customer records on a sales system

    Counter-hacking (end) --NM
    -Tracing hackers. (misc)
    *Trace a hacker who recently broke into our systems
    *Trace an unauthorised money transfer -NM

    Destroying Systems (end) proxy, firewall ++NM
    *Elite agent required for destruction of computer system.

    Mainframe hacking (end)