Intrusive Search

Item

Image creepy-eye25.jpg
Description Equipped with a list of common security flaws, this target search is able to worm its way into more advanced systems. It takes a little longer, but you're more likely to hit a big score.
Type Data (Search)
Use The search doesn't come back with any results. It seems those systems have been shut down.
Warning No-longer-available item consumed on use!

Sources

Create a Target Search utilizing a Vulnerability Database
computerchip.jpg
Target Search Vulnerability Database
= Intrusive Search

Uses

Hammer25.jpg This item is not a component for any sort of crafting.
computerchip.jpg security patches, ?
GoldCoins.jpg This item can be discarded via the gang stash.

History

Before July 21, 2016, using this gave:
Requires 1 Energy
Use It takes a while, but you find a new site to crack into with your intrusive search.

You've found some security vulnerabilities in <site name> that you should be able to exploit.

And if you don't currently have a computer with free processors equipped:
You'll need a computer capable of getting to the Net if you want to go after it.
Effects Finds new sites for Hacking, with better content than those found with Target Search
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License