Hackers Wikia
Advertisement


  Български - Възел  简体中文 - 节点  正體中文 - 節點  Čeština - Uzly  English - Nodes  Français - Noeuds  Deutsch - Nodes(Deutsche)  Bahasa Indonesia - Node(Bahasa Indonesia)  Italiano - Nodi  日本語 - ノード  Bahasa Malayu - Nod  Polski - Węzły  Português - Nodos  Română - Noduri  Русский - Узлы  Español - Nodos(Español)  Türk - Bağlantı  Tiếng Việt - Các Nút mạng


Summary[]

Nodes are the building blocks of every network. Linking them into a specific structure allows each node's unique function to support and improve the network as a whole. There are four types of nodes, each of which are necessary for the success of a network.

Types[]

Business[]

B-coin Mine B-coin Mixer Core Database Server Farm

Business nodes support the rest of the system by providing and storing resources, and allowing expansion and connections to other networks.

Security[]

Black ICE Code Gate Guardian Sentry Scanner Turret

Security nodes prevent intruders from stealing resources and lowering reputation.

  • Sentries are the fundamental security, spreading antivirus throughout the network as soon as an intruder is detected.
  • Turrets provide extra power to defend directly connected nodes.
  • Black ICEs have even higher strength, but take time to charge and fire.
  • Code Gates are password protected gates which significantly reduce damage and the installation time of Access programs while the filter is active.
  • Scanners increase the visibility of stealth programs on nodes within 3 links.
  • Guardians provide shields to connected nodes for added defense.

Hacking[]

Compiler Evolver Program Library

Hacking nodes provide all the tools necessary to infiltrate other networks and acquire resources and reputation.

Artificial Intelligence[]

AI Beetle AI Hawk AI Squid
  • The AI Beetle protects against intrusions by repairing the firewall of nearby damaged nodes.
  • The AI Hawk attacks nearby nodes that have been breached by an attacker.
  • The AI Squid performs focussed scans for stealth programs on nearby nodes.

Statistics[]

Each node has a specific number of connection slots available, which allow it to be linked to other nodes. Each link takes up one slot on each of the linked nodes.

Each node has a specific number of program slots, which allow programs to be installed on it during a hack. Each program takes up one slot on a node.

Each node has a certain amount of firewall depending on the node level, which must be depleted by offensive programs installed on connecting nodes before it can be captured during a hack. Each node also has a certain amount of firewall regeneration, listed as percent per second.

Business Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
B-coin Mine 3 3 2% per second
B-coin Mixer 4 3 2% per second
netConnection 1 3 -
Core 5 5 1% per second
Database 4 3 2% per second
Server Farm 3 3 2% per second
Security Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
Black ICE 4 5 1% per second
Code Gate 3 3 2% per second
Guardian 5 4 1% per second
Scanner 4 3 1% per second
Sentry 4 4 1% per second
Turret 4 4 1% per second
Hacking Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
Compiler 3 3 2% per second
Evolver 3 3 3% per second
Program Library 3 3 2% per second
A.I. Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
AI Beetle 4 4 1% per second
AI Hawk 3 4 1% per second
AI Squid 5 4 1% per second


Notes[]

  • netConnections do not have any firewall and cannot be reclaimed by the network during a hack
Hackers Wikia - Nodes List
Nodes Programs Gameplay
Business Nodes

B-coin Mine  B-coin Mixer  netConnection  Core  Database  Server Farm 

Security Nodes

Black ICE  Code Gate  Guardian  Scanner  Sentry  Turret 

Hacking Nodes

Compiler  Evolver  Program Library 

A.I. Nodes

 A.I. Beetle   A.I. Hawk   A.I. Squid 

Advertisement