Uplink Hints

Monitors

  • 1 of 5: This type of internal protection is widely used due to its effectiveness.
  • 2 of 5: A Monitor simply watches over the system, ensuring immediate notification should any unauthorised schemes be wrought within.
  • 3 of 5: In other words, if a system has an active Monitor, they will notice you hacking into their system and begin an active trace immediately.
  • 4 of 5: Monitors also occasionally check upon other safety systems, to ensure they're not being bypassed or disabled by any malicious agents (no pun intended). Should you come in possession of HUD_ConnectionAnalysis software, you will see these 'check-ups' as red lines around the system in question.
  • 5 of 5: Monitors can only be bypassed by a Monitor_Bypasser. This will ensure that the Monitor will not notice your password cracking attempts or any disabler software. You will require the HUD_ConnectionAnalysis upgrade for any bypassers to work.