Difference between revisions of "Exploits"
Jump to navigation
Jump to search
m (Added a DISCLAIMER) |
m (one liners, and a bit of formatting on the side.) |
||
Line 1: | Line 1: | ||
+ | <br> | ||
+ | <br> | ||
+ | <br> | ||
+ | <br> | ||
+ | <br> | ||
'''WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.''' | '''WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.''' | ||
− | If you choose to continue, | + | If you choose to continue, here are some things you can do to make problems less severe: |
* archive any files deemed important within your operating system (eg: family photos, work documents, music etc.). | * archive any files deemed important within your operating system (eg: family photos, work documents, music etc.). | ||
− | * have available the installation files or disks that contain the game(s) in case you need to re-install | + | * have available the installation files or disks that contain the game(s) in case you need to re-install it. |
− | * make copies of any files which may be changed (eg: savegame folders) | + | * make copies of any files or folders which may be changed (eg: savegame folders) |
− | * understand and know the outcome of the exploit which you trying use. | + | * understand and know the outcome of the exploit which you are trying use. |
− | + | <br> | |
− | + | <br> | |
− | + | <br> | |
− | + | <br> | |
− | =Xcom Exploits= | + | <br> |
+ | <br> | ||
+ | <br> | ||
+ | <br> | ||
+ | <br> | ||
+ | <br> | ||
+ | <br> | ||
+ | ==Xcom Exploits== | ||
This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep. | This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep. | ||
− | The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted. | + | The following categories primarily concern the first game in the series, [[X-COM|Enemy Unknown]], but can also be used with [[TFTD|Terror From The Deep]], unless noted. |
− | [[ExploitsA| | + | [[ExploitsA|Exploit: For Free]] |
+ | * Underhandedly get out of paying wages, how to raid for items, and how to abuse the rules of combat. | ||
[[ExploitsB|Exploit: Mind Control]] | [[ExploitsB|Exploit: Mind Control]] | ||
+ | * Methods on how to psychologically break your enemy for your own devious gains. | ||
[[ExploitsC|Exploit: Collision Detection]] | [[ExploitsC|Exploit: Collision Detection]] | ||
+ | * The mystical art of moving through solid objects. | ||
[[ExploitsD|Exploit: Geoscape Only]] | [[ExploitsD|Exploit: Geoscape Only]] | ||
+ | * Break some rules of global proportions. | ||
[[ExploitsE|Exploit: Tactical Only]] | [[ExploitsE|Exploit: Tactical Only]] | ||
+ | * Break some rules of the battlefield. | ||
[[ExploitsF|needing filler]] | [[ExploitsF|needing filler]] | ||
+ | * ''insert cheesy one liner here'' | ||
+ | |||
+ | |||
+ | |||
+ | NOT SURE what to do with this if not moved to "needing filler" section: | ||
== To Do List == | == To Do List == |
Revision as of 10:55, 12 October 2007
WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.
If you choose to continue, here are some things you can do to make problems less severe:
- archive any files deemed important within your operating system (eg: family photos, work documents, music etc.).
- have available the installation files or disks that contain the game(s) in case you need to re-install it.
- make copies of any files or folders which may be changed (eg: savegame folders)
- understand and know the outcome of the exploit which you are trying use.
Xcom Exploits
This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep.
The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted.
- Underhandedly get out of paying wages, how to raid for items, and how to abuse the rules of combat.
- Methods on how to psychologically break your enemy for your own devious gains.
- The mystical art of moving through solid objects.
- Break some rules of global proportions.
- Break some rules of the battlefield.
- insert cheesy one liner here
NOT SURE what to do with this if not moved to "needing filler" section:
To Do List
For writing up
- Destroying unique alien type/rank combos by way of transfering to a throw-away base with a containment + lab (nothing else necessary), starting research on the uniques, dismantling base completely. Repeat ad infinitum. Not exactly a very exciting exploit, but a useful one to know.