FANDOM



  Bulgaria  China  Taiwan  Czech  UK  France  Germany  Indonesia  Italy  Japan  Malaysia  Poland  Portugal  Romania  Russia  Spain  Turkey  Vietnam

This page is currently in English. Please translate into Bulgarian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.


Hackers Title 1024

Hackers Title Logo


Hackers is a mobile multiplayer strategy game, where players build 3D networks using a futuristic interface to hack networks of other players, increasing their reputation to become the best hacker in the world.

To achieve their goals, players have to gather resources by obtaining them from Business Nodes, hacking the networks of other players or by completing the different storyline missions that the game offers.

Features:

http://hackersthegame.com

We have also recently opened up a full Chinese translation wiki and are requesting players fluent in Chinese to help us translate the remaining pages.

Communities:
OFFICIAL FORUM LINK
Join us on Discord!

Unofficial Hackers Facebook Groups:
EnglishItalianTurkishVietnamese

Questions or Requests?
OFFICIAL WIKI FORUM LINK
Community Forums
The founder of this wiki can be found here.

Hackers Wikia - All Pages
Възел
Бизнес Възли

B-coin Mine 19-21Мина за Бикойни  B-coin Mixer 19-21Миксер за Бикойни  Structure ConnectionИнтернет Връзка 
Core 11-12Ядро  Database 19-21База Данни  Server Farm 19-21Сървър Ферма 

Защитни Възли

Black ICE 19-21Черен Лед  Code Gate 19-21Шифровъчна Порта  Guardian 21Пазител 
Scanner 19-21Скенер  Sentry 19-21Стража  Turret 19-21Оръдейна Кула 

Хакерски Възли

Compiler 04Компилатор  Evolver 11-12Лаборатория  Program Library 17-21Програмна библиотека 

Програми
Атакуващи

Battering ram Таран  Ion cannon Лъчево оръдие  Blaster Бластер  Kraken Кракен 
Maniac Маниак  Shock Шоков Удар  Shuriken Шурикен  Worms Червек 

Защитни

Icewall Ледена Стена  Protector Протектор 

Неусетни

Access Достъп  Dataleach Пиявица  Portal Портал  Wraith Призрак 

Геймплей
Хакване

Световна карта • Хакове • Мисии • Отчет на защитата • симулации • Репутация 

Разнообразен

Началния екран • Построяване на мрежа • Ресурси • Черен пазар • Конфигурирани бележки 

Стратегии

Ръководство за Начинаещи • Офанзивни стратегии • Дефанзивни стратегии • Съвети 

Latest activityEdit

  • discussion page Talk:AI Squid
    new comment by Luminaar 17 hours ago
    Comment: Squid prioritises the nodes closest to itself first. While it doesn't have a "priority" and chooses randomly from any equal distance nodes, it will...
  • edit Inicio
    edited by A FANDOM user 19 hours ago diff
  • discussion page Talk:AI Squid
    new comment by 50.Cal-Hackers 1 day ago
    Comment: What is the priority for Squid as a Program? Does it disable any Code Gates/Scanners first? Does it disable the nodes closest to itself first?
  • discussion page Talk:Protector
    new comment by A FANDOM user 2 days ago
    Comment: The comment above me should be pinned lol It literally saves huge amount of time to compile programs. :D
  • discussion page Talk:Scanner
    new comment by A FANDOM user 2 days ago
    Comment: Connect the sentry to the turret to increase spread speed Otherwise somebody can wraith it in higher levels
  • discussion page Talk:AI Squid
    new comment by ExoticDestroyer8530 2 days ago
    Comment: a single squid being installed disabling a code gate would still cost more visibility than using 2 access with a wraith the only good thing is it...
  • discussion page Talk:Scanner
    new comment by ExoticDestroyer8530 2 days ago
    Comment: hows this defense
    Added photo:
  • edit Cañón de rayos
    edited by OnlyAlbert 5 days ago diff
  • edit Cañón de rayos
    edited by OnlyAlbert 5 days ago diff
    Summary: traducción, corrección
  • discussion page Talk:Network Logs
    new comment by Luminaar
    Comment: Networks are capable of detecting the intrusion while also being unable to pinpoint the location of the attacker for performing a retrace. These...
Community content is available under CC-BY-SA unless otherwise noted.