Difference between revisions of "Exploits"
Jump to navigation
Jump to search
m (almost empty) |
m (Added a DISCLAIMER) |
||
Line 1: | Line 1: | ||
+ | '''WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.''' | ||
+ | If you choose to continue, then somethings can make problems less severe: | ||
− | + | * archive any files deemed important within your operating system (eg: family photos, work documents, music etc.). | |
+ | * have available the installation files or disks that contain the game(s) in case you need to re-install the game. | ||
+ | * make copies of any files which may be changed (eg: savegame folders) | ||
+ | * understand and know the outcome of the exploit which you trying use. | ||
− | + | ||
+ | |||
+ | |||
+ | =Xcom Exploits= | ||
This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep. | This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep. | ||
Line 9: | Line 17: | ||
The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted. | The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted. | ||
− | |||
− | [[ExploitsA]] | + | [[ExploitsA|Expoilt: Free Items]] |
− | [[ExploitsB]] | + | [[ExploitsB|Exploit: Mind Control]] |
− | [[ExploitsC]] | + | [[ExploitsC|Exploit: Collision Detection]] |
− | [[ExploitsD]] | + | [[ExploitsD|Exploit: Geoscape Only]] |
− | [[ExploitsE]] | + | [[ExploitsE|Exploit: Tactical Only]] |
− | [[ExploitsF]] | + | [[ExploitsF|needing filler]] |
Revision as of 12:27, 11 October 2007
WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.
If you choose to continue, then somethings can make problems less severe:
- archive any files deemed important within your operating system (eg: family photos, work documents, music etc.).
- have available the installation files or disks that contain the game(s) in case you need to re-install the game.
- make copies of any files which may be changed (eg: savegame folders)
- understand and know the outcome of the exploit which you trying use.
Xcom Exploits
This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep.
The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted.
To Do List
For writing up
- Destroying unique alien type/rank combos by way of transfering to a throw-away base with a containment + lab (nothing else necessary), starting research on the uniques, dismantling base completely. Repeat ad infinitum. Not exactly a very exciting exploit, but a useful one to know.