Hackers Wikia
Advertisement
Hackers Wikia


  Български - Ядро(Български)  简体中文 - 核心  正體中文 - 核心(TC)  Čeština - Jádro  English - Core  Français - Coeur  Deutsch - Kern  Bahasa Indonesia - Inti  Italiano - Nucleo  日本語 - コア  Bahasa Malayu - Teras  Polski - Rdzeń  Português - Núcleo  Română - Nucleu  Русский - Ядро  Español - Núcleo(Español)  Türk - Çekirdek  Tiếng Việt - Trung tâm



Summary[]


"The Core is the most important node. It stores information about your network and the complete download of a core database makes an attack successful. 'Upgrade your Core to unlock new node types."

The Core is a Business Node which represents the main node of the network. It holds the main database of the network, which can be downloaded by hackers as part of a successful hack. It holds a small amount of money and B-coins similar to the Database and B-coin Mixer.

Upgrading the Core will increase the total number of Nodes that can be built in the network, as well as unlock and/or increase the maximum number of individual nodes that can be built. The maximum level a Core can be upgraded to is 13. The maximum number of Cores you can have on your network is one. Unlike other Business Nodes, it is not possible to remove the Core from the network.

The Core can store up to $2000 and B64, similar to the Database and B-coin Mixer nodes respectively. As 30% of your resources are able to be stolen from each node, this results in $600 and B19 being available for completely downloading the Core.

ReadMe File[]

The Core also contains a ReadMe file which stores text messages. A network administrator can view their own ReadMe File by selecting the Core, then tapping on the text document icon "Text document icon.png".

A hacker that successfully downloads the Core database during a hack will be given temporary access to the file. Hackers are granted 2 minutes at the end of a hack to submit their own message to the ReadMe file by selecting the "Access ReadMe File" button during the results screen.

Leaving a message will give the hacker "Read Only" access to view the target's ReadMe file from the Hacks Log, by selecting "ReadMe" from the Hacks list for as long as the message exists. All messages that are submitted will be shown to the owner of the network the next time they log on as 'Unauthorized ReadMe Edit'.

The administrator can delete messages from the ReadMe file. This can be done selectively using the red "⛔" button besides each message, or by selecting the "Clear All" button. Removing a message sent by a player will also remove their access to your ReadMe file. Future attempts to access the file will display the message "Access Denied: Your ReadMe backdoor has been removed."

The ReadMe File can store up to 20 messages. If a new message is added when the limit has been reached, the earliest message will be deleted.

Both administrators and hackers can use simplified CSS editing to customise their messages.[1] To implement these changes, place the desired text between the parameters as detailed below.

Bold Italic Underline Strike-through Superscript Subscript
[b]Text[/b] [i]Text[/i] [u]Text[/u] [s]Text[/s] [sup]Text[/sup] [sub]Text[/sub]
Color Text - Use [colour code]Text
[ff0000]Red [ffff00]Yellow [00ff00]Green [00ffff]Cyan [0000ff]Blue [ff00ff]Purple [c]Highlight

If you are only using a single style change, you do not need to use the [/] command, and can simply format your text using the opening command. Example: [b]text, [i]text, [u]text, [s]text, [colour code]text, [sup]text, [sub]text.

Statistics[]

Defensive Stats
Node
Level
Firewall Download
Time
1 300 13.9 Seconds
2 380 30.4 Seconds
3 480 31.8 Seconds
4 580 33.4 Seconds
5 780 33.6 Seconds
6 1,000 35.6 Seconds
7 1,250 36.6 Seconds
8 1,500 36.6 Seconds
9 2,000 37.9 Seconds
10 2,500 39.5 Seconds
11 3,250 40.0 Seconds
12 4,000 42.9 Seconds
13 5,000 42.9 Seconds
Construction Stats
Node
Level
Upgrade
Cost
Experience
Gained
Completion
Time
Minimum
netConnections
1 $0 0 None 1
2 $1,000 100 5 Minutes 1
3 $8,000 200 1 Hour 2
4 $60,000 300 4 Hours 2
5 $125,000 500 24 Hours 2
6 $250,000 800 48 Hours 3
7 $500,000 1,000 96 Hours 3
8 $1,500,000 1,500 144 Hours 3
9 $3,000,000 2,000 192 Hours 4
10 $5,000,000 3,000 240 Hours 4
11 $10,000,000 4,000 288 Hours 4
12 $15,000,000 5,000 336 Hours 5
13 $15,000,000 6,000 336 Hours 5
Total $50,444,000 24,400 1,709 Hours
5 Minutes
5
Increasing Network Capacity
Core
Level
Maximum
Nodes
Maximum $
Capacity
Maximum ฿
Capacity
1 7 $4,000 B128
2 10 $10,000 B320
3 13 $66,000 B2,112
4 16 $130,000 B4,160
5 19 $258,000 B8,064
6 22 $514,000 B16,064
7 25 $2,002,000 B60,064
8 27 $3,202,000 B100,064
9 29 $5,002,000 B150,064
10 31 $15,002,000 B450,064
11 33 $24,002,000 B750,064
12 35 $24,002,000 B750,064
13 37 $24,002,000 B750,064


Availability of Nodes[]

Business Node Limits
Core
Level
netConnection Server Farm Database B-coin Mine B-coin Mixer
Amount Amount Level Amount Level Amount Level Amount Level
1 1 1 2 1 2 1 2 1 1
2 2 1 5 1 3 1 5 1 3
3 3 2 7 1 6 2 7 1 6
4 3 2 9 1 7 2 9 1 7
5 4 2 11 1 8 2 11 1 8
6 4 3 13 1 9 3 13 1 9
7 4 3 15 2 11 3 15 2 11
8 5 3 17 2 13 3 17 2 13
9 5 3 21 2 15 3 21 2 15
10 5 3 21 3 18 3 21 3 18
11 5 4 21 3 21 4 21 3 21
12 5 4 21 3 21 4 21 3 21
13 5 4 21 3 21 4 21 3 21
Security Node Limits
Core
Level
Sentry Turret Black ICE Code Gate Scanner Guardian
Amount Level Amount Level Amount Level Amount Level Amount Level Amount Level
1 1 1 0 0 0 0 0 0 0 0 0 0
2 2 3 1 2 0 0 0 0 0 0 0 0
3 2 4 2 3 1 1 0 0 0 0 0 0
4 2 5 2 4 1 3 1 3 1 2 0 0
5 3 6 3 5 1 4 2 4 2 4 0 0
6 3 7 3 6 2 5 2 5 2 6 1 2
7 3 11 3 10 2 9 2 9 2 8 1 5
8 3 13 3 12 2 10 2 11 2 10 2 7
9 4 16 4 15 2 12 3 14 2 13 2 10
10 4 18 4 17 3 15 3 17 3 16 2 13
11 4 20 5 19 3 18 4 20 3 19 3 16
12 4 21 5 21 3 21 5 21 3 21 3 21
13 5 21 6 21 4 21 5 21 4 21 4 21
Hacking Node Limits
Core
Level
Compiler Evolver Program Library
Amount Level Amount Level Amount Level
1 1 1 1 1 1 1
2 1 1 1 2 1 2
3 1 1 1 3 1 3
4 1 1 1 4 1 4
5 1 2 1 5 2 5
6 1 2 1 6 2 6
7 1 3 1 7 2 8
8 1 4 1 8 2 10
9 1 4 1 9 3 13
10 1 4 1 10 3 16
11 1 4 1 11 3 19
12 1 4 1 12 3 21
13 1 4 1 12 3 21
Artificial Intelligence Node Limits
Core
Level
A.I. Hawk A.I. Beetle A.I. Squid
Amount Level Amount Level Amount Level
1 0 0 0 0 0 0
2 0 0 0 0 0 0
3 0 0 0 0 0 0
4 0 0 0 0 0 0
5 0 0 0 0 0 0
6 0 0 0 0 0 0
7 1 2 0 0 0 0
8 1 4 1 4 0 0
9 1 7 1 7 1 7
10 1 10 1 10 1 10
11 1 13 1 13 1 13
12 1 17 1 17 1 17
13 1 21 1 21 1 21


Gallery[]

Core 01.png Core 02.png Core 03.png Core 04.png Core 05.png
Level 1 Level 2 Level 3 Level 4 Level 5
Core 06.png Core 07-08.png Core 09-10.png Core 11-12.png Core 13.png
Level 6 Levels 7-8 Levels 9-10 Levels 11-12 Level 13


Tips[]

  • NetConnections do not count towards your maximum node capacity.
  • Players will be able to choose from up to 50 additional nodes to build on their network. As the maximum number of nodes allowed is 37, players will need to choose which nodes support the type of network they want to build.
  • Upgrading the Core is vital to expanding the Network and gives various bonuses for doing so. Upgrading your Core costs an increasing amount of $, and each upgrade will take longer to complete. Higher levels of the Core allows you to have more nodes in your network, giving you the ability to produce more resources, make larger attacks, and build better defenses.
  • Be wary on where you place your Core. The Kraken will head straight for it, causing massive damage and ignoring nodes not in its path. However, once it reaches the Core, it will attack every node attached to it.
  • You will need 2 Database Nodes to upgrade your Core past level 7.

References[]

Hackers Wikia - Nodes List
Nodes Programs Gameplay
Business Nodes

B-coin Mine 19-21.pngB-coin Mine  B-coin Mixer 19-21.pngB-coin Mixer  Structure Connection.pngnetConnection  Core 11-12.pngCore  Database 19-21.pngDatabase  Server Farm 19-21.pngServer Farm 

Security Nodes

Black ICE 19-21.pngBlack ICE  Code Gate 19-21.pngCode Gate  Guardian 21.pngGuardian  Scanner 19-21.pngScanner  Sentry 19-21.pngSentry  Turret 19-21.pngTurret 

Hacking Nodes

Compiler 04.pngCompiler  Evolver 11-12.pngEvolver  Program Library 17-21.pngProgram Library 

A.I. Nodes

Beetle ImageServing.png A.I. Beetle  Hawk ImageServing.png A.I. Hawk  Squid ImageServing.png A.I. Squid