Hackers Wikia
Advertisement


  Български - Защитни  简体中文 - 防御病毒  正體中文 - 防禦程式  Čeština - Obranné  English - Defensive  Français - Défensif  Deutsch - Defensiv  Bahasa Indonesia - Program Pertahanan  Italiano - Difensivi  日本語 - 防御  Bahasa Malayu - Pertahanan  Polski - Obronne  Português - Defensivo  Română - Defensiv(Română)  Русский - Защитные  Español - Defensivo(Español)  Türk - Savunma  Tiếng Việt - Phần Mềm Phòng Thủ


ICE Wall Protector

Summary[]


ICE Wall and Protector are used in conjunction with Offensive Programs during a Brute Force hack, providing protection against network securities and enabling the capture of tougher nodes. Each defensive program has a "Buffer Size." This represents the amount of damage it can intercept before Offensive programs begin depleting the target node's firewall.

  • ICE Walls offer basic protection, intercepting damage before it reaches a node.
  • Protectors can regenerate their buffer, greatly increasing the time before a node is recaptured.

Statistics[]

Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Defensive Programs Statistics
Program Install
Time
Disk
Space
Compilation
Time
ICE Wall 0.5 Seconds 2 2 Minutes
Protector 4.0 Seconds 4 5 Minutes

Tips[]

  • Defensive programs can not be used in stealth attacks.
  • Once the buffer of a defensive program is depleted, it is removed from the node, freeing up a slot to place another program. Programs can also be removed manually by selecting the node and tapping the program.
  • See Offensive Strategies for additional tips.
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

 Battering Ram   Beam Cannon   Blaster   Kraken 
 Maniac   Shocker   Shuriken   Worms 

Defensive Programs

 ICE Wall   Protector 

Stealth Programs

 Access   Data Leech   Portal   Wraith 

A.I. Programs

 A.I. Beetle   A.I. Hawk   A.I. Squid 

Advertisement