Hackers Wikia
Advertisement


  Български - Отчет на защитата  简体中文 - 被侵记录  正體中文 - 安全日誌  Čeština - Bezpečnostní záznamy  English - Network Logs  Français - Journal de sécurité  Deutsch - Sicherheitslog  Bahasa Indonesia - Log Keamanan  Italiano - Log di Sicurezza  日本語 - ネットワークログ  Bahasa Malayu - Log Sekuriti  Polski - Dziennik Bezpieczeństwa  Português - Registo de Segurança  Română - Log de Securitate  Русский - Журнал безопасности  Español - Registros de Red  Türk - Güvenlik Kaydı  Tiếng Việt - Lịch Sử Hệ Thống


This page is currently in English. Please translate into Bulgarian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



Summary[]

The security log is an in-game console which provides information on hack attempts to a player's network. When a player logs in, a visual indicator (exclamation mark) will appear over the console to indicate that there are security events to review. Replays are available to view for 7 days and the logs are available to view for 14 days.

Available Information[]

The security log provides detailed information of every hack attempt including:

  • Player codename, level and country
  • Programs used for the attack
  • Date and time of the attack
  • Result of the attack. This can be either Hacked (one of the hacking objectives have been fulfilled; core, resources, control) or Secured (it was not)
  • Points obtained (or lost) by the player as a result of the hack
  • Resources (dollars and B-coins) obtained by the hacker

From the security log console the attacks can be replayed and an attacker can be retraced, unless the attack was a stealth attack.

Replaying attacks[]

When an attacked is replayed a real-time simulation of the hack attempt is shown. This replay can be paused or restarted. There is no possibility to rewind or fast forward. A replay can be exited using the "Disconnect" button.

Replaying a successful or unsuccessful hack attempt can provide insight on how a network was compromised and how it defended itself against an attack. The replay will show the programs activated by the attacker in each of the nodes compromised (red nodes).

A player can find it useful to learn about different hacking techniques and the actual behaviour of different programs. This information can be useful, for example, to decide which programs should be investigated in the Evolver.

Retracing attacks[]

Any Brute Force hack, whether successful or not, can be retraced back to the originating player. Hacks that were made using only Stealth programs are unable to be retraced. If the "Retrace" button is selected, the player can connect to the network of the attacker, and can decide to either hack it now or disconnect and attack later.

Once a retrace attack has been attempted, the "Retrace" button will disappear from the Security Log for all available retraces to that player, so it is advised not to wait too long before retracing an attack. Note that a target may also be able to retrace your counter attack, based on the above criteria.

Hackers Wikia - Геймплей
Начало
Геймплей Възел Програми
Хакване

Световна карта • Хакове • Мисии • Отчет на защитата • симулации • Репутация 

Разнообразен

Началния екран • Построяване на мрежа • Ресурси • Черен пазар • Конфигурирани бележки 

Стратегии

Ръководство за Начинаещи • Офанзивни стратегии • Дефанзивни стратегии • Съвети 

Advertisement