Hackers Wikia
Advertisement


  Български - Защитни  简体中文 - 防御病毒  正體中文 - 防禦程式  Čeština - Obranné  English - Defensive  Français - Défensif  Deutsch - Defensiv  Bahasa Indonesia - Program Pertahanan  Italiano - Difensivi  日本語 - 防御  Bahasa Malayu - Pertahanan  Polski - Obronne  Português - Defensivo  Română - Defensiv(Română)  Русский - Защитные  Español - Defensivo(Español)  Türk - Savunma  Tiếng Việt - Phần Mềm Phòng Thủ


This page is currently in English. Please translate into Indonesian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



ICE Wall Protector

Summary[]

Defensive programs such as ICE Wall and Protector are used in conjunction with Offensive programs during a Brute Force hack.

Defensive Properties[]

Defensive programs have the "Buffer Size" statistic. This represents the amount of damage they can intercept before Security Nodes continue taking over a node.

Tips[]

  • They have no use in stealth attacks.
  • Once Buffer Size is depleted, it is removed from the node, freeing up a slot to place another program.
Hackers Wikia - Programs
Beranda
Program Node Permainan
Program Penyerangan

 Pemukul Dinding   Meriam Laser   Blaster   Kraken 
 Maniak   Pengejut   Shuriken   Cacing 

Program Pertahanan

 PGE-Dinding   Pelindung 

Program Sembunyi

 Akses   Lintah Data   Portal   Roh 

Advertisement