Get quick and convenient access to just the hints you need for Uplink, without staying on our website. Just download a free trial
version of our UHS Reader software and
a copy of these hints. You will get the
same gradual hints you see here -- unlike ordinary cheats or a
walkthrough that can spoil your game.
You can also buy the full version of the UHS Reader
for Windows or macOS. For just $14.95, you get full access to hints for
hundreds of games and 1 year of free updates. You can also search, decode, or print an entire
game's worth of hints at once.
Ask the Author
If you have questions about a puzzle that aren't answered
anywhere in these hints,
you may contact the author.
Uplink Hints
Active tracking
1 of 12: Active tracking is what the "trace tracker" and the Map Tracer display. It works only when you are connected.
2 of 12: It can be defended against by "call bouncing" through many nodes. I.e. click through as many of the servers in your map as you see fit.
3 of 12: The tracking slows down if you have an active username/password to the system you're bouncing through. This will be shown on the map by small dots flowing around the server.
4 of 12: It will be even slower if you have admin access to the computer. This will be shown as a larger square outside the server dot in the Map screen.
5 of 12: Do NOT let the active trace find you. You'll be booted off the system and legal action will take place -- depending on your crime.
6 of 12: Later in the game it'll be possible to hack your way in without traces.
7 of 12: All servers who notice your hacking are using Monitors of some sort. Software exists with which you can ignore these.
8 of 12: Ignore or bypass.
9 of 12: A Monitor Bypass (v5.0 costs 20,000c -- don't bother buying any lesser) literally silences the Monitor on the other end. A must for any long-lasting Decyphering or Password Breaking. Hacking will not be completely safe even with this baby, though.
10 of 12: Whenever you enter as an Administrator, tracking will commence no matter what Bypasses you have on.
11 of 12: If you do not need to access logs or something alike, you should use other user usernames whenever possible.
12 of 12: Most Government servers have "readwrite" users. They can read and modify records but do not get traced. I.e. you have no hurry of getting out (but don't overdo it).