Hackers Wikia
Register
Advertisement


  Български - Достъп  简体中文 - 隐形接口  正體中文 - 權限  Čeština - Přístup  English - Access  Français - Accès  Deutsch - Zugriff  Bahasa Indonesia - Akses(Bahasa Indonesia)  Italiano - Accesso  日本語 - アクセス  Bahasa Malayu - Akses  Polski - Dostęp  Português - Acesso  Română - Acces  Русский - Доступ  Español - Acceso  Türk - Geçit  Tiếng Việt - Đường Tắc


This page is currently in English. Please translate into Spanish.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



Summary[]


An essential program for stealth hacking. Access opens connection to neighbor nodes and allows you to install the Data Leech, Portal and Wraith programs without raising an alarm immediately.

The Access program is a Stealth program which enables Stealth Hacking.

If Access is the first program installed on a netConnection, a Stealth Hack commences. During a Stealth hack you have a limited time (represented as a visibility bar) to install other stealth programs, including more Access, on adjacent nodes before the network reboot phase starts.

Once you are spotted on the network, all active Stealth Programs (excluding Portal) will be removed from the network. Access cannot be installed once the Stealth Hack has ended or any other Brute Force Offensive programs have been installed.

Statistics[]

  • Notes: While the Access program is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Estadísticas Programas
Nivel Visibility
(per second)
Precio
Compilación
1 162 / Segundo B12
2 156 / Segundo B24
3 150 / Segundo B36
4 144 / Segundo B48
5 138 / Segundo B60
6 132 / Segundo B72
7 126 / Segundo B84
8 120 / Segundo B100
9 114 / Segundo B116
10 108 / Segundo B132
11 102 / Segundo B148
12 96 / Segundo B164
13 90 / Segundo B180
14 84 / Segundo B200
15 78 / Segundo B220
16 72 / Segundo B240
17 66 / Segundo B260
18 60 / Segundo B280
19 54 / Segundo B300
20 48 / Segundo B320
21 42 / Segundo B350
Estadísticas de Investigación
Nivel Costo
Mejora
Experiencia
Ganada
Tiempo
Investigación
Nivel Evolucionador
Requerido
1 B4,096 375 6 Horas 4
2 B8,000 475 18 Horas 4
3 B16,000 500 24 Horas 5
4 B32,000 575 30 Horas 5
5 B48,000 650 36 Horas 6
6 B60,000 725 42 Horas 6
7 B80,000 800 48 Horas 7
8 B100,000 825 54 Horas 7
9 B120,000 850 60 Horas 8
10 B140,000 875 66 Horas 8
11 B160,000 900 72 Horas 9
12 B180,000 930 80 Horas 9
13 B200,000 960 88 Horas 9
14 B220,000 1,000 96 Horas 10
15 B260,000 1,080 104 Horas 10
16 B300,000 1,160 112 Horas 10
17 B340,000 1,250 120 Horas 11
18 B380,000 1,375 132 Horas 11
19 B420,000 1,500 144 Horas 11
20 B440,000 1,625 156 Horas 12
21 B460,000 1,750 168 Horas 12
Total B3,968,096 20,180 1,656 Horas 12


Hackers Wikia - Lista de Programas
Inicio
Programas Nodos Cómo jugar
Ofensivo

Battering ram Ariete  Ion cannon Cañón de rayos  Blaster Blaster  Kraken Kraken 
Maniac Maníaco  Shock Aturdidor  Shuriken Shuriken  Worms Gusanos 

Defensivo

Icewall Muro de hielo  Protector Protector 

Sigilo

Access Acceso  Dataleach Succiona datos  Portal Portal  Wraith Espectro 

Advertisement