Introduction to Exploration
Exploration in Eve: Scanning, Hacking and more
Class Rules
agreed to being recorded.
Text | Preface your questions with “Q” e.g.: “Q: What are bookmarks?” |
Voice | Whenever there are open comms (usually at the end of class during Q&A session). |
Class Overview
INTRODUCTION TO EXPLORATION
3
What is Exploration?
INTRODUCTION TO EXPLORATION
4
These are free to warp to
These need to be scanned down before you can warp to them
Non Exploration Sites
INTRODUCTION TO EXPLORATION
5
Exploration Sites
INTRODUCTION TO EXPLORATION
6
Types of Exploration
INTRODUCTION TO EXPLORATION
7
What you need: Ships
INTRODUCTION TO EXPLORATION
8
Caldari�(Flight Deck)
Minmatar
Gallente
Amarr
What you need: Ship progression
INTRODUCTION TO EXPLORATION
9
Empire Faction Exploration Frigate (T2 Covert Ops)
Sisters of Eve
Amarr
Gallente
Minmatar
Scanning and Hacking bonuses.
T2 / Astero can fit Covert Ops Cloak (can Warp while cloaked.)
+ Astero and Navy Issue get combat bonuses.
Empire Navy/Fleet Issue
Caldari
What you need: Critical modules
INTRODUCTION TO EXPLORATION
10
What you need: Optional Modules
INTRODUCTION TO EXPLORATION
11
Example Fits:
INTRODUCTION TO EXPLORATION
12
Prices may vary
This serve as fitting ideas or examples, not a recommendation / doctrine
Use different module versions to suit your desired stats and price point
What you need: Character skills
INTRODUCTION TO EXPLORATION
13
Per Level:
+5% scan strength
-5% max scan deviation
-5% probe scan time
Per Level:
+5% scan strength
Per Level:
-5% max scan deviation
Per Level:
-5% probe scan time
Per Level:
+10 Virus Coherence
Alpha Limits:
What you need: Player Understanding
INTRODUCTION TO EXPLORATION
14
Scanning down a Site
INTRODUCTION TO EXPLORATION
15
Scan Volume
Probe formations
Recover probes
The Hacking minigame
INTRODUCTION TO EXPLORATION
16
The Hacking m inigame
INTRODUCTION TO EXPLORATION
17
Kernel Rot
Self Repair
Polymorphic
Shield
Secondary Vector
Restoration Node
Virus Suppresor
Antivirus & Firewall
System Core
Data Cache
Utility Subsystems
Defensive Subsystems
Virus Strength
(“Damage“)
Virus Coherence
(“Hitpoints“)
The Rule of 6
INTRODUCTION TO EXPLORATION
18
A node, that is surrounded by six other nodes is always safe
...unless the system core is in one of the six neighbouring nodes.
Seek out areas with multiple ‘6-nodes’ as they are safe.
If you hit a Defensive Subsystem in safe zone, you‘re near System Core
The Rule of 8
INTRODUCTION TO EXPLORATION
19
The System Core will always be on the eighth node or more away from the Starting Node, unless the Starting Node is located in the middle, or if the board is small enough that you can’t get 8 nodes distance
Exploration Tips & Tricks
INTRODUCTION TO EXPLORATION
20
Q&A
INTRODUCTION TO EXPLORATION
21
Please leave feedback via the Class Feedback Form linked in chat!