Hackers Wikia
Register
Advertisement


  Български - Пиявица  简体中文 - 网络水蛭  正體中文 - 資料水蛭  Čeština - Datová pijavice  English - Data Leech  Français - Sangsus de Données  Deutsch - Datenleck  Bahasa Indonesia - Lintah Data(Bahasa Indonesia)  Italiano - Sanguisuga di Dati  日本語 - データリーチ  Bahasa Malayu - Lintah Data  Polski - Pijawka  Português - Sanguessuga de dados  Română - Lipitori de Date  Русский - Пиявка Данных  Español - Succiona datos  Türk - Veri Emici  Tiếng Việt - Đỉa Dữ liệu


This page is currently in English. Please translate into Portuguese.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



Resumo[]


This greedy malware speeds up the downloading of money, B-coins and Core databases. May be used even in stealth mode on nodes you have access to.

The Data Leech is a Hybrid Program that can be used in both Stealth and Brute Force Hacks to increase the speed at which resources are taken from Business Nodes. Data Leech can also be installed on a Core to increase the speed at which the Core's information is downloaded.

If the player is discovered during a Stealth hack while Data Leech programs are installed, they will be removed from the nodes. Any resources taken are kept, and the Core download will continue from the same point once the Core is captured. If the player successfully downloads the Core and chooses to commence a Brute Force attack, they will still need to capture the Core to fulfil the control win condition. During both types of hacks, installing more Data Leeches on a captured node will further shorten the download time.

Estatísticas[]

  • Notes: While the Data Leech is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Program Stats
Nível Visibilidade Download
Boost
Custo de
Compilação
1 28 / Segundo 50% B5
2 26 / Segundo 55% B10
3 24 / Segundo 60% B20
4 22 / Segundo 65% B30
5 20 / Segundo 70% B40
6 18 / Segundo 75% B50
7 16 / Segundo 80% B60
8 14 / Segundo 85% B70
9 13 / Segundo 90% B80
10 12 / Segundo 95% B90
11 11 / Segundo 100% B100
12 10 / Segundo 105% B110
13 9 / Segundo 110% B120
14 8 / Segundo 115% B130
15 7 / Segundo 120% B140
16 6 / Segundo 125% B150
17 5 / Segundo 130% B170
18 4 / Segundo 135% B190
19 3 / Segundo 140% B210
20 2 / Segundo 145% B230
21 1 / Segundo 150% B250
Research Stats
Nível Custo de
Atualização
Experience
Gained
Tempo de
Pesquisa
Nível de Desenvolvedor
Necessário
1 B512 200 1 Hora 2
2 B2,048 300 4 Horas 2
3 B4,096 400 8 Horas 3
4 B8,000 450 12 Horas 4
5 B16,000 500 24 Horas 4
6 B32,000 575 30 Horas 5
7 B48,000 650 36 Horas 5
8 B60,000 725 42 Horas 6
9 B80,000 800 48 Horas 6
10 B100,000 825 54 Horas 7
11 B120,000 850 60 Horas 7
12 B140,000 875 66 Horas 8
13 B160,000 900 72 Horas 8
14 B180,000 930 80 Horas 9
15 B200,000 960 88 Horas 9
16 B220,000 1,000 96 Horas 10
17 B260,000 1,080 104 Horas 10
18 B300,000 1,160 112 Horas 11
19 B340,000 1,250 120 Horas 11
20 B380,000 1,375 132 Horas 12
21 B420,000 1,500 144 Horas 12
Total B3,070,656 17,305 1,333 Horas 12


Tips[]

  • A Level 1 Core takes around 30 seconds to download. Using a Data Leech on the Core when the time remaining is between 20 and 30 seconds will result in a full download.
  • In stealth, multiple Data Leeches are not always more efficient (download boost/visibility cost). It is always best to install a single Leech on each node targeted until they are level 7. Scanners also influence the efficiency of Data Leeches, with higher level scanners requiring higher level Leeches before multiple is more efficient than one.
Hackers Wikia - Programa
Início
Programa Nodos Jogabilidade
Ofensivo

Battering ram Aríete  Ion cannon Canhão Laser  Blaster Explosão  Kraken Kraken 
Maniac Maníaco  Shock Raio  Shuriken Shuriken  Worms Vermes 

Defensivo

Icewall Muralha-ICE  Protector Protetor 

Furtivo

Access Acesso  Dataleach Sanguessuga de dados  Portal Portal  Wraith Espetro 

Advertisement