Both sides previous revisionPrevious revisionNext revision | Previous revision |
programs:turing [2020/05/22 23:03] – andrew | programs:turing [2020/06/16 00:38] (current) – andrew |
---|
[{{ turing.png|Turing program icon}}] | [{{ turing.png|Turing program icon}}] |
| |
**Turing** is a [[:programs:#breakers|breaker program]] which breaks 2 [[:firewalls]] on every [[:mainframe devices:|mainframe device]] in the whole facility, for a cost of 5 [[:PWR]]. It has a cooldown of 3 turns. | **Turing** is a [[:programs:#breakers|breaker program]] which breaks 2 [[:firewalls]] on every [[:mainframe device]] in the whole facility, for a cost of 5 [[:PWR]]. It has a cooldown of 3 turns. |
| |
Turing is acquired only in the [[:missions:OMNI Mainframe]] mission, after [[:agents:Monst3r]] has completed hacking the [[:mainframe devices:Security Hub]]. When Turing is acquired, if you do not have a spare [[:Incognita]] program slot then a new program slot is created for it. | Turing is acquired only in the [[:missions:OMNI Mainframe]] mission, after [[:agents:Monst3r]] has completed hacking the [[:mainframe devices:Security Hub]]. When Turing is acquired, if you do not have a spare [[:Incognita]] program slot then a new program slot is created for it. |
The program Turing is given to the player relatively late in the mission, after the first objective has been completed. At this point in the mission, [[:agents:Monst3r]] needs to make his way from the [[:mainframe devices:Security Hub]] to the [[:mainframe devices:Mainframe Lock]]; [[:agents:Central]] needs to get there too, if she isn't already. | The program Turing is given to the player relatively late in the mission, after the first objective has been completed. At this point in the mission, [[:agents:Monst3r]] needs to make his way from the [[:mainframe devices:Security Hub]] to the [[:mainframe devices:Mainframe Lock]]; [[:agents:Central]] needs to get there too, if she isn't already. |
| |
At this point in the mission, many of the devices in the facility which you want to hack have already been hacked, but some have been recaptured by [[:daemons:Failsafe]]. Turing can be a useful way to hack any recaptured cameras, lower the remaining [[:armor]] of [[:guards:OMNI Protector|OMNI Protectors]], and break some firewalls on the Mainframe Lock all at once. If you need to do several of those, then Turing can be a more efficient use of PWR than your other programs; if not, then you may not need to use it at all. | By this time, many of the devices in the facility which you want to hack have already been hacked, but some have been recaptured by [[:daemons:Failsafe]]. Turing can be a useful way to hack any recaptured [[:mainframe devices:Security Cameras]], lower the remaining [[:armor]] of [[:guards:OMNI Protector|OMNI Protectors]], and break some firewalls on the Mainframe Lock all at once. If you need to do several of those, then Turing can be a more efficient use of PWR than your other programs; if not, then you may not need to use it at all. |
| |
Turing breaks firewalls on //all// devices, including those with [[:daemons:]] installed. If there are devices on 1 or 2 firewalls with severe daemons such as [[:daemons:Validate]], [[:daemons:Labyrinth]] or [[:daemons:Modulate]], then it is usually best not to use Turing. On the other hand, if there are no particularly harmful daemons installed on any such devices, hacking weak or ineffectual daemons can be a beneficial side-effect of Turing due to the PWR bonus from [[:agents:Central]]'s [[:augments:Antiviral Proxy]] augment. | Turing breaks firewalls on //all// devices, including those with [[:daemons:]] installed. If there are devices on 1 or 2 firewalls with severe daemons such as [[:daemons:Validate]], [[:daemons:Labyrinth]] or [[:daemons:Modulate]], then it is usually best not to use Turing. On the other hand, if there are no particularly harmful daemons installed on any such devices, then triggering weak or ineffectual daemons can be a beneficial side-effect of Turing due to the PWR bonus from [[:agents:Central]]'s [[:augments:Antiviral Proxy]] augment. |
| |