ICE Wall | Protector |
Summary[]
ICE Wall and Protector are used in conjunction with Offensive Programs during a Brute Force hack, providing protection against network securities and enabling the capture of tougher nodes. Each defensive program has a "Buffer Size." This represents the amount of damage it can intercept before Offensive programs begin depleting the target node's firewall.
- ICE Walls offer basic protection, intercepting damage before it reaches a node.
- Protectors can regenerate their buffer, greatly increasing the time before a node is recaptured.
Statistics[]
Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.
Program | Install Time |
Disk Space |
Compilation Time |
ICE Wall | 0.5 Seconds | 2 | 2 Minutes |
Protector | 4.0 Seconds | 4 | 5 Minutes |
Tips[]
- Defensive programs can not be used in stealth attacks.
- Once the buffer of a defensive program is depleted, it is removed from the node, freeing up a slot to place another program. Programs can also be removed manually by selecting the node and tapping the program.
- See Offensive Strategies for additional tips.
Hackers Wikia - Programs List | ||
---|---|---|
Programs | Nodes | Gameplay |
Offensive Programs |
Battering Ram
Beam Cannon
Blaster
Kraken | |
Defensive Programs | ||
Stealth Programs | ||
A.I. Programs |