Difference between revisions of "Local Guristas Backup Server"

From Backstage Lore Wiki
Jump to: navigation, search
(New page: Category:ComplexesCategory:ExplorationCategory:Radar Sites {{Complex |name=Local Guristas Backup Server |sig=Low |class=Radar |ded=unrated |sec=Highsec |region= Lonetreke |...)
 
m
Line 6: Line 6:
 
|ded=unrated
 
|ded=unrated
 
|sec=[[Highsec]]
 
|sec=[[Highsec]]
|region= Lonetreke
+
|region= [[Lonetrek]], [[The Citadel]]
 
|rat=[[Guristas]]
 
|rat=[[Guristas]]
 
|status=
 
|status=
Line 14: Line 14:
  
 
==General Info==
 
==General Info==
This site contains 5 hackable containers; no pirates.
+
This site contains 4-5 hackable containers; no pirates.
  
  
 
{{quote|Half-broken remnants of technology drift aimlessly throughout the vacuum; the end result of infighting, CONCORD raids or one of a thousand other common fates suffered by pirate outfits across the cluster. A codebreaker module will be invaluable in uncovering the secrets that are likely hidden here, locked away inside data vaults and semi-functional computerized networks.}}
 
{{quote|Half-broken remnants of technology drift aimlessly throughout the vacuum; the end result of infighting, CONCORD raids or one of a thousand other common fates suffered by pirate outfits across the cluster. A codebreaker module will be invaluable in uncovering the secrets that are likely hidden here, locked away inside data vaults and semi-functional computerized networks.}}

Revision as of 12:46, 24 January 2011

Complex Details
Local Guristas Backup Server
Signature Strength Low
Type {{{type}}}
DED rating unrated
Security Highsec
Known Regions Lonetrek, The Citadel
Pirate type Guristas



General Info

This site contains 4-5 hackable containers; no pirates.



"Half-broken remnants of technology drift aimlessly throughout the vacuum; the end result of infighting, CONCORD raids or one of a thousand other common fates suffered by pirate outfits across the cluster. A codebreaker module will be invaluable in uncovering the secrets that are likely hidden here, locked away inside data vaults and semi-functional computerized networks."
Personal tools
Namespaces

Variants
Actions
Navigation
Tools