Hackers Wikia
Register
Advertisement


  Български - Защитни  简体中文 - 防御病毒  正體中文 - 防禦程式  Čeština - Obranné  English - Defensive  Français - Défensif  Deutsch - Defensiv  Bahasa Indonesia - Program Pertahanan  Italiano - Difensivi  日本語 - 防御  Bahasa Malayu - Pertahanan  Polski - Obronne  Português - Defensivo  Română - Defensiv(Română)  Русский - Защитные  Español - Defensivo(Español)  Türk - Savunma  Tiếng Việt - Phần Mềm Phòng Thủ


This page is currently in English. Please translate into Indonesian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



Icewall Protector
ICE Wall Protector

Summary[]

Defensive programs such as ICE Wall and Protector are used in conjunction with Offensive programs during a Brute Force hack.

Defensive Properties[]

Defensive programs have the "Buffer Size" statistic. This represents the amount of damage they can intercept before Security Nodes continue taking over a node.

Tips[]

  • They have no use in stealth attacks.
  • Once Buffer Size is depleted, it is removed from the node, freeing up a slot to place another program.
Hackers Wikia - Programs
Beranda
Program Node Permainan
Program Penyerangan

Battering ram Pemukul Dinding  Ion cannon Meriam Laser  Blaster Blaster  Kraken Kraken 
Maniac Maniak  Shock Pengejut  Shuriken Shuriken  Worms Cacing 

Program Pertahanan

Icewall PGE-Dinding  Protector Pelindung 

Program Sembunyi

Access Akses  Dataleach Lintah Data  Portal Portal  Wraith Roh 

Advertisement