Difference between revisions of "Exploits"
Jump to navigation
Jump to search
m (one liners, and a bit of formatting on the side.) |
m (very minor edit) |
||
Line 5: | Line 5: | ||
<br> |
<br> |
||
'''WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.''' |
'''WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.''' |
||
+ | <br> |
||
− | |||
+ | <br> |
||
+ | <br> |
||
If you choose to continue, here are some things you can do to make problems less severe: |
If you choose to continue, here are some things you can do to make problems less severe: |
||
+ | <br> |
||
− | |||
* archive any files deemed important within your operating system (eg: family photos, work documents, music etc.). |
* archive any files deemed important within your operating system (eg: family photos, work documents, music etc.). |
||
* have available the installation files or disks that contain the game(s) in case you need to re-install it. |
* have available the installation files or disks that contain the game(s) in case you need to re-install it. |
||
Line 32: | Line 34: | ||
[[ExploitsA|Exploit: For Free]] |
[[ExploitsA|Exploit: For Free]] |
||
* Underhandedly get out of paying wages, how to raid for items, and how to abuse the rules of combat. |
* Underhandedly get out of paying wages, how to raid for items, and how to abuse the rules of combat. |
||
+ | |||
[[ExploitsB|Exploit: Mind Control]] |
[[ExploitsB|Exploit: Mind Control]] |
||
* Methods on how to psychologically break your enemy for your own devious gains. |
* Methods on how to psychologically break your enemy for your own devious gains. |
||
+ | |||
[[ExploitsC|Exploit: Collision Detection]] |
[[ExploitsC|Exploit: Collision Detection]] |
||
* The mystical art of moving through solid objects. |
* The mystical art of moving through solid objects. |
||
+ | |||
[[ExploitsD|Exploit: Geoscape Only]] |
[[ExploitsD|Exploit: Geoscape Only]] |
||
* Break some rules of global proportions. |
* Break some rules of global proportions. |
||
+ | |||
[[ExploitsE|Exploit: Tactical Only]] |
[[ExploitsE|Exploit: Tactical Only]] |
||
* Break some rules of the battlefield. |
* Break some rules of the battlefield. |
||
+ | |||
[[ExploitsF|needing filler]] |
[[ExploitsF|needing filler]] |
||
* ''insert cheesy one liner here'' |
* ''insert cheesy one liner here'' |
||
+ | |||
+ | |||
+ | |||
+ | |||
Line 53: | Line 64: | ||
NOT SURE what to do with this if not moved to "needing filler" section: |
NOT SURE what to do with this if not moved to "needing filler" section: |
||
− | == To Do List == |
+ | ==== To Do List ==== |
− | For writing up |
||
* Destroying unique alien type/rank combos by way of transfering to a throw-away base with a containment + lab (nothing else necessary), starting research on the uniques, dismantling base completely. Repeat ad infinitum. Not exactly a very exciting exploit, but a useful one to know. |
* Destroying unique alien type/rank combos by way of transfering to a throw-away base with a containment + lab (nothing else necessary), starting research on the uniques, dismantling base completely. Repeat ad infinitum. Not exactly a very exciting exploit, but a useful one to know. |
Revision as of 12:07, 12 October 2007
WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.
If you choose to continue, here are some things you can do to make problems less severe:
- archive any files deemed important within your operating system (eg: family photos, work documents, music etc.).
- have available the installation files or disks that contain the game(s) in case you need to re-install it.
- make copies of any files or folders which may be changed (eg: savegame folders)
- understand and know the outcome of the exploit which you are trying use.
Xcom Exploits
This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep.
The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted.
- Underhandedly get out of paying wages, how to raid for items, and how to abuse the rules of combat.
- Methods on how to psychologically break your enemy for your own devious gains.
- The mystical art of moving through solid objects.
- Break some rules of global proportions.
- Break some rules of the battlefield.
- insert cheesy one liner here
NOT SURE what to do with this if not moved to "needing filler" section:
To Do List
- Destroying unique alien type/rank combos by way of transfering to a throw-away base with a containment + lab (nothing else necessary), starting research on the uniques, dismantling base completely. Repeat ad infinitum. Not exactly a very exciting exploit, but a useful one to know.