Uplink
doughnut001 May 24, 2017 @ 8:40am
Bypassers in uplink OS
How do they work? I got caught stealing from a bank, I think it was because I didn't use the monitor and proxy bypassers properly.

I'm on my second playthrough now and have just gotten to the stage where I'm buying bypassers.

When you use the proxy bypass the proxy of the machine you are hacking has a lock symbol on it and a ring that appears round its border now and again.

When hacking the social security DB should I only do stuff while the lock is open, when the ring around their proxy is gone or both?

Am I maybe just trying to use a bypasser with a woefully underpowered machine? In my current playthrough I'm still just using the basic hardware so I only have 60Hz worth of processing power.
< >
Showing 1-13 of 13 comments
🐱 May 25, 2017 @ 1:09am 
UplinkOS will show you if your programs don't have enough resources (read: CPU power) by displaying a red circle around them, and their name will be in red in the task manager thing. I think when the proxy bypasser is working, the "ring" around it will spin.

I'm not so sure about this but I believe the Proxy/Firewall bypassers are only used to edit eg. the logs, or the Criminal Record thing, and don't affect your tracability. I haven't really found an use to the Monitor bypass, I'm pretty sure I've completed hacks without using it? Maybe it's just because I got a giant bounce network.
Last edited by 🐱; May 25, 2017 @ 1:14am
seronis May 25, 2017 @ 7:00pm 
Monitor bypass is like a true/false toggle on what actions you can perform that will initiate an active trace. If the monitor bypass works active trace doesnt start. the biggest use is the initial password crack
🐱 May 26, 2017 @ 12:51am 
Thanks for the clarification! Are there actions that, performed when using a monitor bypass, will trigger an active trace anyway?
doughnut001 May 26, 2017 @ 9:20am 
Originally posted by 😺:
Thanks for the clarification! Are there actions that, performed when using a monitor bypass, will trigger an active trace anyway?

Yes definately, If you log into the test server again using the monitor bypass a trace will still always start as soon as you log in or crack the code again.

Does anyone know if putting more processor power into the monitor bypass changes what sets off an active trace?
Syndicake ☠ Jun 18, 2017 @ 4:34am 
How it works:

Monitor bypassers stop the monitor from seeing your activity. Monitor watches the proxy and firewall to make sure they are not compromised, it also checks for password and dictionary crackers being run against it. Lastly it initiates a trace once the admin logs in.

Disabler, disables the relevant security system however the monitor will detect this if it is not bypassed first and initiate a trace. Monitor can still detect a bypass against the proxy and firewall if it is not bypassed first. This usually takes a second however, while a proxy disable is detected before it even finishes.

Bypassing the monitor, stops it from detecting all activities above, except logging in. It will always initiate a trace when logging in even if bypassed or disabled. (this only applies to the admin account). Bypassers run instantly, while disablers take time (and processing power.)

The proxy bypasses the proxy (derp) which lets you edit and delete records, usually system access logs and database records.

The firewall does the same except its for protecting files and programs.

Last edited by Syndicake ☠; Jun 18, 2017 @ 4:36am
No gf Jun 27, 2017 @ 3:57am 
A little spoiler for bank hacking:
Unlike hacking normal terminals, transfering money from one bank account to another will generates a money-transfering log IN THE ACCOUNTS OF BOTH WITHDRAWING AND DEPOSITING PARTIES. To come out clean from a bank job one must not only remove the bouncing logs in internic, but also the transfering logs in both bank accounts.
After you clicked the transfer button, you will have roughly 30 seconds to remove BOTH transfering logs in both accounts IF you got monitor bypassor running during the job. Do not attempt to make transfer without monitor bypassor. Once you removed both logs, proceed to internic and delete the bouncing log. If you did it right Uplink will send you an email announcing your new ranking.
Last edited by No gf; Jun 27, 2017 @ 3:59am
the ouch mouse Jul 5, 2017 @ 4:45pm 
Originally posted by No gf:
A little spoiler for bank hacking:
Unlike hacking normal terminals, transfering money from one bank account to another will generates a money-transfering log IN THE ACCOUNTS OF BOTH WITHDRAWING AND DEPOSITING PARTIES. To come out clean from a bank job one must not only remove the bouncing logs in internic, but also the transfering logs in both bank accounts.
After you clicked the transfer button, you will have roughly 30 seconds to remove BOTH transfering logs in both accounts IF you got monitor bypassor running during the job. Do not attempt to make transfer without monitor bypassor. Once you removed both logs, proceed to internic and delete the bouncing log. If you did it right Uplink will send you an email announcing your new ranking.
Oh, ♥♥♥♥, and don't forget to transfer the dosh to a SEPARATE ACCOUNT that YOU created, THEN transfer it to your MAIN account. If you transfer even one credit to your main account from an account you broke into, the game-over screen appears.

Tl;dr: launder your ♥♥♥♥♥♥♥ money
seronis Jul 8, 2017 @ 10:20pm 
You do not need to use a secondary account at all. You just have to properly clear logs. Have all your bypassers running, transfer the money from source account, immediately delete transaction history from source account page, log into your own acct (using hops and bypassers, dont direct connect), delete transaction history for incoming money, quickly get to internic and clear logs. thats it. No middleman accounts are EVER needed
the ouch mouse Jul 9, 2017 @ 9:41am 
Originally posted by seronis:
You do not need to use a secondary account at all. You just have to properly clear logs. Have all your bypassers running, transfer the money from source account, immediately delete transaction history from source account page, log into your own acct (using hops and bypassers, dont direct connect), delete transaction history for incoming money, quickly get to internic and clear logs. thats it. No middleman accounts are EVER needed
Wait, really? I tried to transfer the money directly to my acc once and I got a game-over screen, with bypassers and all that.

Eh. Guess I'm going nuts.
seronis Jul 10, 2017 @ 1:09am 
You'll get game over if you dont clear evidence fast enough. But as long as you clear BOTH transaction logs from both bank accounts, and THEN clear the internic bounce log, then you will be fine.
CrowZ Jul 10, 2017 @ 10:50am 
when u hack a bank u need monitor bypass v5 n proxy bypass v5, HUD ConnectionAnalysis,Log Deleter v4, HUD Randomizer (For EZ Call Bouncing)
simple step for hacking bank
1. find target
1.1 use randomizer for call bouncing then connect to ur target bank
2. run proxy and monitor bypass
3. login into target account
4. transfer their money into ur acc
5. delete log for transfering money in view statement menu from ur target acc
6. disconect
7. use randomizer for easy call bouncing then connect to ur bank account
8. run proxy and monitor bypass
9. login into ur bank acc
10. delete the log "..... deposit from <target bank IP> acc <target acc number"
11. login nic then delete ur log

PS : Me Just Trying to help
[ITA] maxi Oct 18, 2021 @ 3:53pm 
I always use the Uplink Test Machine as the first hop in my connection network, so that's very easy to login and delete the bouncing logs.
But you are all using INTERNIC.
Is INTERNIC better or more safe than the Uplink Test Machine in some way?
Mc2m Oct 18, 2021 @ 4:11pm 
the answer is yes. InterNIC has no trace on the admin section, so you can direct connect and clean your logs.
< >
Showing 1-13 of 13 comments
Per page: 1530 50