Български - Протектор(Български)  简体中文 - 防护罩  正體中文 - 防護罩  Čeština - Protektor(čeština)  English - Protector  Français - Protecteur  Deutsch - Protektor  Bahasa Indonesia - Pelindung(Bahasa Indonesia)  Italiano - Protettore  日本語 - プロテクタ  Bahasa Malayu - Pelindung  Polski - Protektor(Polskie)  Português - Protetor  Română - Protector(Română)  Русский - Протектор  Español - Protector(Español)  Türk - Koruyucu  Tiếng Việt - Giáp Bảo Hộ



Summary[edit | edit source]


Effective node protection with regeneration. Its randomized algorithm is useful to protect nodes under constant pressure.

The Protector is a Brute Force Defensive Program which protects captured nodes against attacks from Security Nodes. The Protector will absorb damage equal to its Buffer Size. The Protector regenerates 7% per second of its total Buffer Size over time. Once the Buffer Size is depleted, the Protector will be removed from the node.

Statistics[edit | edit source]

  • Notes: While the Protector is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Program Stats
Program
Level
Buffer
Size
Regeneration
Per Second
Compilation
Price
1 650 46 B30
2 748 52 B60
3 860 60 B90
4 989 69 B120
5 1,137 80 B150
6 1,307 91 B180
7 1,503 105 B210
8 1,730 121 B240
9 1,988 139 B270
10 2,286 160 B300
11 2,630 184 B330
12 3,024 212 B360
13 3,477 243 B390
14 4,000 280 B420
15 4,600 322 B450
16 5,290 370 B510
17 6,080 426 B570
18 7,000 490 B630
19 8,050 564 B690
20 9,250 648 B750
21 10,640 745 B1,000
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1 B1,024 300 4 Hours 3
2 B4,096 450 12 Hours 3
3 B8,000 475 18 Hours 4
4 B16,000 500 24 Hours 4
5 B32,000 575 30 Hours 5
6 B48,000 650 36 Hours 5
7 B60,000 725 42 Hours 6
8 B80,000 800 48 Hours 6
9 B100,000 825 54 Hours 7
10 B140,000 850 60 Hours 7
11 B160,000 875 66 Hours 8
12 B180,000 900 72 Hours 8
13 B200,000 930 80 Hours 9
14 B220,000 960 88 Hours 9
15 B260,000 1,000 96 Hours 10
16 B300,000 1,080 104 Hours 10
17 B340,000 1,160 112 Hours 11
18 B380,000 1,250 120 Hours 11
19 B420,000 1,375 132 Hours 12
20 B460,000 1,500 144 Hours 12
21 B500,000 1,750 168 Hours 12
Total B3,909,120 18,930 1,510 Hours 12


Tips[edit | edit source]

  • A node that is guarded by the Protector will show a revolving white/magenta light around it. This light depletes as the Protector absorbs damage, is restored as the shield regenerates, and disappears completely when the shield is destroyed.
  • Beware of Node Firewalls - The Node might be recaptured before the protector could be installed. Be sure to bring up ICE Walls and Shockers (Level 3 or above) to prevent its recapture.
  • Protector shields are consumed after ICE Wall shields.
  • Due to its regeneration, Programs that interrupt damage being inflicted to the Protector's shield can improve its effectiveness. These include Shocker, ICE Wall, Blaster and Wraith (If used on hostile defense)
  • Protector can be used on a node that doesn't have a free slot to place it in. Doing so will remove the first installed Beam Cannon, Shuriken, Worm or ICE Wall
  • The Protector in conjunction with the Shuriken can work well on a Guardian or well defended Core since they allow so many Security Nodes to be connected to them.
  • A level 3 Shocker takes 0.5 seconds to install and shocks for 3.5 seconds. Installing a Shocker of level 3 or higher will ensure the successful install of a Protector placed immediately afterward. Be aware that Turret has a 0.5 second damage delay, and other security functions take even longer.
  • See Offensive Strategies for additional tips.
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram.png Battering Ram  Ion cannon.png Beam Cannon  Blaster.png Blaster  Kraken.png Kraken 
Maniac.png Maniac  Shock.png Shocker  Shuriken.png Shuriken  Worms.png Worms 

Defensive Programs

Icewall.png ICE Wall  Protector.png Protector 

Stealth Programs

Access.png Access  Dataleach.png Data Leech  Portal.png Portal  Wraith.png Wraith 

A.I. Programs

Beetle.png A.I. Beetle  Hawk.png A.I. Hawk  Squid.png A.I. Squid 

Community content is available under CC-BY-SA unless otherwise noted.