Summary[]
The Protector is a Brute Force Defensive Program which protects captured nodes against attacks from Security Nodes. The Protector will absorb damage equal to its Buffer Size. The Protector regenerates 7% per second of its total Buffer Size over time. Once the Buffer Size is depleted, the Protector will be removed from the node.
Statistics[]
- Notes: While the Protector is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
More Info here: Max amount of B-coins at Core Level.
Program Level |
Buffer Size |
Regeneration Per Second |
Compilation Price |
1 | 650 | 46 | B30 |
2 | 748 | 52 | B60 |
3 | 860 | 60 | B90 |
4 | 989 | 69 | B120 |
5 | 1,137 | 80 | B150 |
6 | 1,307 | 91 | B180 |
7 | 1,503 | 105 | B210 |
8 | 1,730 | 121 | B240 |
9 | 1,988 | 139 | B270 |
10 | 2,286 | 160 | B300 |
11 | 2,630 | 184 | B330 |
12 | 3,024 | 212 | B360 |
13 | 3,477 | 243 | B390 |
14 | 4,000 | 280 | B420 |
15 | 4,600 | 322 | B450 |
16 | 5,290 | 370 | B510 |
17 | 6,080 | 426 | B570 |
18 | 7,000 | 490 | B630 |
19 | 8,050 | 564 | B690 |
20 | 9,250 | 648 | B750 |
21 | 10,640 | 745 | B1,000 |
Program Level |
Upgrade Cost |
Experience Gained |
Research Time |
Required Evolver Level |
1 | B1,024 | 300 | 4 Hours | 3 |
2 | B4,096 | 450 | 12 Hours | 3 |
3 | B8,000 | 475 | 18 Hours | 4 |
4 | B16,000 | 500 | 24 Hours | 4 |
5 | B32,000 | 575 | 30 Hours | 5 |
6 | B48,000 | 650 | 36 Hours | 5 |
7 | B60,000 | 725 | 42 Hours | 6 |
8 | B80,000 | 800 | 48 Hours | 6 |
9 | B100,000 | 825 | 54 Hours | 7 |
10 | B140,000 | 850 | 60 Hours | 7 |
11 | B160,000 | 875 | 66 Hours | 8 |
12 | B180,000 | 900 | 72 Hours | 8 |
13 | B200,000 | 930 | 80 Hours | 9 |
14 | B220,000 | 960 | 88 Hours | 9 |
15 | B260,000 | 1,000 | 96 Hours | 10 |
16 | B300,000 | 1,080 | 104 Hours | 10 |
17 | B340,000 | 1,160 | 112 Hours | 11 |
18 | B380,000 | 1,250 | 120 Hours | 11 |
19 | B420,000 | 1,375 | 132 Hours | 12 |
20 | B460,000 | 1,500 | 144 Hours | 12 |
21 | B500,000 | 1,750 | 168 Hours | 12 |
Total | B3,909,120 | 18,930 | 1,510 Hours | 12 |
Tips[]
- A node that is guarded by the Protector will show a revolving white/magenta light around it. This light depletes as the Protector absorbs damage, is restored as the shield regenerates, and disappears completely when the shield is destroyed.
- Beware of Node Firewalls - The Node might be recaptured before the protector could be installed. Be sure to bring up ICE Walls and Shockers (Level 3 or above) to prevent its recapture.
- Protector shields are consumed after ICE Wall shields.
- Due to its regeneration, Programs that interrupt damage being inflicted to the Protector's shield can improve its effectiveness. These include Shocker, ICE Wall, Blaster and Wraith (If used on hostile defense)
- Protector can be used on a node that doesn't have a free slot to place it in. Doing so will remove the first installed Beam Cannon, Shuriken, Worm or ICE Wall
- The Protector in conjunction with the Shuriken can work well on a Guardian or well defended Core since they allow so many Security Nodes to be connected to them.
- A level 3 Shocker takes 0.5 seconds to install and shocks for 4 seconds. Installing a Shocker of level 3 or higher will ensure the successful install of a Protector placed immediately afterward. Be aware that Turret has a 0.5 second damage delay, and other security functions take even longer.
- See Offensive Strategies for additional tips.
Hackers Wikia - Programs List | ||
---|---|---|
Programs | Nodes | Gameplay |
Offensive Programs |
Battering Ram
Beam Cannon
Blaster
Kraken | |
Defensive Programs |
ICE Wall Protector | |
Stealth Programs | ||
A.I. Programs |