This page is currently in English. Please translate into Vietnamese.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.
![]() |
![]() |
ICE Wall | Protector |
Summary[]
Defensive programs such as ICE Wall and Protector are used in conjunction with Offensive programs during a Brute Force hack.
Defensive Properties[]
Each defensive program has a "Buffer Size," listed in the program statistics. This represents the amount of damage it can intercept before damage begins to deplete the firewall of the node on which it is installed.
Comparison of Statistics[]
Two ICE Walls cost the same disk space to install as one Protector. It takes an additional 3.5 seconds to install the latter. A level 1 Protector will regenerate the equivalent buffer of a level 1 ICE Wall in less than 9 seconds. A level 21 Protector will regenerate the equivalent buffer of a level 21 ICE Wall in about 4 seconds.
Program | Firewall | Disk Usage | Install Time | Regeneration |
Ice Wall | 400 | 2 | 0.5 seconds | None |
Protector | 650 | 4 | 4 seconds | 45.5 per second |
Program | Firewall | Disk Usage | Install Time | Regeneration |
Ice Wall | 3,030 | 2 | 0.5 seconds | None |
Protector | 10,640 | 4 | 4 seconds | 745 per second |
Tips[]
- Defensive programs cannot be used in stealth attacks.
- Once the buffer of a defensive program is depleted, it is removed from the node, freeing up a slot to place another program. Programs can also be removed manually by selecting the node and tapping the program.
- See Offensive Strategies for additional tips.