Hackers Wikia
Advertisement
Hackers Wikia


  Български - Хакерски Възли  简体中文 - 病毒节点  正體中文 - 程式節點  Čeština - Uzly pro hackování  English - Hacking Nodes  Français - Noeuds de piratage  Deutsch - Hackingnodes  Bahasa Indonesia - Nodes Hacking  Italiano - Nodi di Hacking  日本語 - ハッキングノード  Bahasa Malayu - Nod Menggodam  Polski - Węzły hakerskie  Português - Nodes de Hacking  Română - Noduri de Hacking  Русский - Узлы для взлома  Español - Nodos de Hackear  Türk - Hackleme Bağlantı  Tiếng Việt - Các Nốt Hacking


Compiler 04.png Evolver 11-12.png Program Library 17-21.png
Compiler Evolver Program Library

Summary[]


Hacking Nodes are used to compile, store and upgrade programs used in launching attacks. Successful hacks will gain you resources used for buying and upgrading defenses, and reputation used to access new Missions and display your successes on the various leaderboards.

  • Compiler: Creates unique viruses used for hacking other networks.
  • Program Library: Stores all of your compiled programs.
  • Evolver: Upgrades current viruses, as well as developing new ways to capture and infiltrate networks.

Statistics[]

Each node has a specific number of connection slots available, which allow it to be linked to other nodes. Each link takes up one slot on each of the linked nodes. Each node also has a specific number of program slots, which allow programs to be installed on it during a hack. Each program takes up one slot on a node.

Hacking nodes also have a certain amount of firewall depending on the node level, which can be depleted by installing offensive programs on connecting nodes. Nodes will naturally recover firewall when not shocked or stunned, at the regeneration rates shown below.

Hacking Node Statistics
Node Connection
Slots
Program
Slots
Firewall
Regeneration
Compiler 3 3 2% per second
Evolver 3 3 3% per second
Program Library 3 3 2% per second

Tips[]

Hackers Wikia - Nodes List
Nodes Programs Gameplay
Business Nodes

B-coin Mine 19-21.pngB-coin Mine  B-coin Mixer 19-21.pngB-coin Mixer  Structure Connection.pngnetConnection  Core 11-12.pngCore  Database 19-21.pngDatabase  Server Farm 19-21.pngServer Farm 

Security Nodes

Black ICE 19-21.pngBlack ICE  Code Gate 19-21.pngCode Gate  Guardian 21.pngGuardian  Scanner 19-21.pngScanner  Sentry 19-21.pngSentry  Turret 19-21.pngTurret 

Hacking Nodes

Compiler 04.pngCompiler  Evolver 11-12.pngEvolver  Program Library 17-21.pngProgram Library 

A.I. Nodes

Beetle ImageServing.png A.I. Beetle  Hawk ImageServing.png A.I. Hawk  Squid ImageServing.png A.I. Squid