Difference between revisions of "Exploits"

From UFOpaedia
Jump to navigation Jump to search
m (Added a DISCLAIMER)
m (one liners, and a bit of formatting on the side.)
Line 1: Line 1:
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 
'''WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.'''
 
'''WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.'''
  
If you choose to continue, then somethings can make problems less severe:
+
If you choose to continue, here are some things you can do to make problems less severe:
  
 
* archive any files deemed important within your operating system (eg: family photos, work documents, music etc.).
 
* archive any files deemed important within your operating system (eg: family photos, work documents, music etc.).
* have available the installation files or disks that contain the game(s) in case you need to re-install the game.
+
* have available the installation files or disks that contain the game(s) in case you need to re-install it.
* make copies of any files which may be changed (eg: savegame folders)
+
* make copies of any files or folders which may be changed (eg: savegame folders)
* understand and know the outcome of the exploit which you trying use.
+
* understand and know the outcome of the exploit which you are trying use.
 
+
<br>
 
+
<br>
 
+
<br>
 
+
<br>
=Xcom Exploits=
+
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
==Xcom Exploits==
  
 
This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep.
 
This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep.
  
The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted.
+
The following categories primarily concern the first game in the series, [[X-COM|Enemy Unknown]], but can also be used with [[TFTD|Terror From The Deep]], unless noted.
  
  
[[ExploitsA|Expoilt: Free Items]]
+
[[ExploitsA|Exploit: For Free]]
 +
* Underhandedly get out of paying wages, how to raid for items, and how to abuse the rules of combat.
  
 
[[ExploitsB|Exploit: Mind Control]]
 
[[ExploitsB|Exploit: Mind Control]]
 +
* Methods on how to psychologically break your enemy for your own devious gains.
  
 
[[ExploitsC|Exploit: Collision Detection]]
 
[[ExploitsC|Exploit: Collision Detection]]
 +
* The mystical art of moving through solid objects.
  
 
[[ExploitsD|Exploit: Geoscape Only]]
 
[[ExploitsD|Exploit: Geoscape Only]]
 +
* Break some rules of global proportions.
  
 
[[ExploitsE|Exploit: Tactical Only]]
 
[[ExploitsE|Exploit: Tactical Only]]
 +
* Break some rules of the battlefield.
  
 
[[ExploitsF|needing filler]]
 
[[ExploitsF|needing filler]]
 +
* ''insert cheesy one liner here''
 +
 +
 +
  
 +
NOT SURE what to do with this if not moved to "needing filler" section:
  
 
== To Do List ==
 
== To Do List ==

Revision as of 10:55, 12 October 2007






WARNING: Use of the exploits listed within the following links can corrupt your game installation, or your savegames, or your operating system. If you are not prepared to possibly lose data then DO NOT USE the exploits.

If you choose to continue, here are some things you can do to make problems less severe:

  • archive any files deemed important within your operating system (eg: family photos, work documents, music etc.).
  • have available the installation files or disks that contain the game(s) in case you need to re-install it.
  • make copies of any files or folders which may be changed (eg: savegame folders)
  • understand and know the outcome of the exploit which you are trying use.












Xcom Exploits

This page lists the exploits currently found within Xcom:Enemy Unknown and Xcom:Terror From The Deep.

The following categories primarily concern the first game in the series, Enemy Unknown, but can also be used with Terror From The Deep, unless noted.


Exploit: For Free

  • Underhandedly get out of paying wages, how to raid for items, and how to abuse the rules of combat.

Exploit: Mind Control

  • Methods on how to psychologically break your enemy for your own devious gains.

Exploit: Collision Detection

  • The mystical art of moving through solid objects.

Exploit: Geoscape Only

  • Break some rules of global proportions.

Exploit: Tactical Only

  • Break some rules of the battlefield.

needing filler

  • insert cheesy one liner here



NOT SURE what to do with this if not moved to "needing filler" section:

To Do List

For writing up

  • Destroying unique alien type/rank combos by way of transfering to a throw-away base with a containment + lab (nothing else necessary), starting research on the uniques, dismantling base completely. Repeat ad infinitum. Not exactly a very exciting exploit, but a useful one to know.