Hackers Wikia
Advertisement


  Български - Защитни  简体中文 - 防御病毒  正體中文 - 防禦程式  Čeština - Obranné  English - Defensive  Français - Défensif  Deutsch - Defensiv  Bahasa Indonesia - Program Pertahanan  Italiano - Difensivi  日本語 - 防御  Bahasa Malayu - Pertahanan  Polski - Obronne  Português - Defensivo  Română - Defensiv(Română)  Русский - Защитные  Español - Defensivo(Español)  Türk - Savunma  Tiếng Việt - Phần Mềm Phòng Thủ


Icewall Protector
ICE Wall Protector

Summary[]


ICE Wall and Protector are used in conjunction with Offensive Programs during a Brute Force hack, providing protection against network securities and enabling the capture of tougher nodes. Each defensive program has a "Buffer Size." This represents the amount of damage it can intercept before Offensive programs begin depleting the target node's firewall.

  • ICE Walls offer basic protection, intercepting damage before it reaches a node.
  • Protectors can regenerate their buffer, greatly increasing the time before a node is recaptured.

Statistics[]

Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Defensive Programs Statistics
Program Install
Time
Disk
Space
Compilation
Time
ICE Wall 0.5 Seconds 2 2 Minutes
Protector 4.0 Seconds 4 5 Minutes

Tips[]

  • Defensive programs can not be used in stealth attacks.
  • Once the buffer of a defensive program is depleted, it is removed from the node, freeing up a slot to place another program. Programs can also be removed manually by selecting the node and tapping the program.
  • See Offensive Strategies for additional tips.
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

A.I. Programs

Beetle A.I. Beetle  Hawk A.I. Hawk  Squid A.I. Squid 

Advertisement