Hackers Wikia
Hackers Wikia

  Български - Защитни  简体中文 - 防御病毒  正體中文 - 防禦程式  Čeština - Obranné  English - Defensive  Français - Défensif  Deutsch - Defensiv  Bahasa Indonesia - Program Pertahanan  Italiano - Difensivi  日本語 - 防御  Bahasa Malayu - Pertahanan  Polski - Obronne  Português - Defensivo  Română - Defensiv(Română)  Русский - Защитные  Español - Defensivo(Español)  Türk - Savunma  Tiếng Việt - Phần Mềm Phòng Thủ

Icewall.png Protector.png
ICE Wall Protector


ICE Wall and Protector are used in conjunction with Offensive Programs during a Brute Force hack, providing protection against network securities and enabling the capture of tougher nodes. Each defensive program has a "Buffer Size." This represents the amount of damage it can intercept before Offensive programs begin depleting the target node's firewall.

  • ICE Walls offer basic protection, intercepting damage before it reaches a node.
  • Protectors can regenerate their buffer, greatly increasing the time before a node is recaptured.


Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Defensive Programs Statistics
Program Install
ICE Wall 0.5 Seconds 2 2 Minutes
Protector 4.0 Seconds 4 5 Minutes


  • Defensive programs can not be used in stealth attacks.
  • Once the buffer of a defensive program is depleted, it is removed from the node, freeing up a slot to place another program. Programs can also be removed manually by selecting the node and tapping the program.
  • See Offensive Strategies for additional tips.
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram.png Battering Ram  Ion cannon.png Beam Cannon  Blaster.png Blaster  Kraken.png Kraken 
Maniac.png Maniac  Shock.png Shocker  Shuriken.png Shuriken  Worms.png Worms 

Defensive Programs

Icewall.png ICE Wall  Protector.png Protector 

Stealth Programs

Access.png Access  Dataleach.png Data Leech  Portal.png Portal  Wraith.png Wraith 

A.I. Programs

Beetle.png A.I. Beetle  Hawk.png A.I. Hawk  Squid.png A.I. Squid