Uplink Hints

Any special notes?

  • 1 of 6: Remember that whenever you log _in_ to a system as admin, an active trace will start no matter what.
  • 2 of 6: You have an option here. In every government-run Database, actually.
  • 3 of 6: There are three user handles to all the Databases. Admin, Readwrite and Read.
  • 4 of 6: Readwrite users can read and modify the records, without anyone tracking them (well, beyond the Monitor as you hack the first time, that is).
  • 5 of 6: Just hack in as readwrite, (disconnect if you don't have a Monitor Bypass) and reconnect. No traces to be found.
  • 6 of 6: You'll still have to bypass the Proxy system, though.