Hackers Wikia
Advertisement


  Български - Скенер  简体中文 - 扫描仪  正體中文 - 掃描器  Čeština - Skener  English - Scanner  Français - Détecteur  Deutsch - Scanner(Deutsch)  Bahasa Indonesia - Pemindai  Italiano - Scanner(Italiano)  日本語 - スキャナ  Bahasa Malayu - Pengimbas  Polski - Skaner  Português - Observador  Română - Scanner(Română)  Русский - Сканер  Español - Escáner  Türk - Tarayıcı  Tiếng Việt - Máy Quét


This page is currently in English. Please translate into German.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



Zusammenfassung[]


"Der Scanner erhöht die Rate, mit der Stealth-Programme von zu einer Entfernung von drei Knotenpunkten und näher enttarnt werden können.
Zugriff, Geist, Portal und Datenleck alarmieren das Netzwerk schneller."

Der Scanner ist eine defensive Sicherheitsnodes. Während der Brute Force Phase eines hack, wird der Scanner die Sichtbarkeitskosten jedes eingesetzen Stealthprogrammes um die Scannerempfindlichkeit in xxx% zu erhöhen. Wie auch in den Ladebildschirmtipps oft angezeigt wird, ist bei zwei, sich überlappenden Scannerreichweiten nur der Scanner mit dem höchsten Level aktiv.

The maximum level a Scanner can be upgraded to is 21[1]. The maximum number of Scanners you can have on your network is three. Unlike Business Nodes, there are no restrictions on deleting Scanner nodes from the network.

Statistiken[]

Defensive Stats
Level Firewall Scannerempfindlichkeit
1 180 120%
2 200 130%
3 225 140%
4 250 150%
5 285 160%
6 320 180%
7 360 200%
8 400 220%
9 450 240%
10 500 260%
11 560 280%
12 630 300%
13 700 320%
14 790 340%
15 880 360%
16 990 380%
17 1,100 400%
18 1,240 430%
19 1,380 460%
20 1,550 490%
21 1,740 520%
Construction Stats
Node
Level
Kosten Experience
Gained
Bau Zeit Benötigtes
Kernlevel
1 $16,000 300 4 Stunden 4
2 $32,000 450 12 Stunden 4
3 $64,000 500 24 Stunden 5
4 $125,000 650 36 Stunden 5
5 $250,000 800 48 Stunden 6
6 $500,000 850 60 Stunden 6
7 $750,000 900 72 Stunden 7
8 $1,000,000 950 92 Stunden 7
9 $1,500,000 1,000 96 Stunden 8
10 $2,000,000 1,125 108 Stunden 8
11 $2,500,000 1,250 120 Stunden 9
12 $3,000,000 1,375 132 Stunden 9
13 $3,500,000 1,500 144 Stunden 9
14 $4,000,000 1,625 156 Stunden 10
15 $4,500,000 1,750 168 Stunden 10
16 $5,000,000 2,000 192 Stunden 10
17 $6,000,000 2,500 216 Stunden 11
18 $7,000,000 3,000 240 Stunden 11
19 $8,000,000 3,500 264 Stunden 11
20 $10,000,000 4,000 288 Stunden 12
21 $12,000,000 4,500 312 Stunden 12
Totals $71,737,000 34,525 2,784 Stunden 12


Gallery[]

Scanner 01 Scanner 02-03 Scanner 04-05 Scanner 06-07 Scanner 08-09
Level 1 Level 2-3 Level 4-5 Level 6-7 Level 8-9
Scanner 10-12 Scanner 13-15 Scanner 16-18 Scanner 19-21
Level 10-12 Level 13-15 Level 16-18 Level 19-21

Tips[]

General Tips[]

  • Defensively, Scanners have 4 connections and a low firewall relative to other nodes, while only allowing 3 programs to be installed on it. This makes it a good candidate for creating a choke point on your Network if connected to plenty of Security Nodes.
  • When attacking a Scanner that has been used as a choke point, ICE Walls will need to be installed quickly. Consider using Shocker or Protector in conjuction with ICE Walls if the node is being recaptured too quickly.
  • Placement is crucial. If the Scanner is too close to the netConnection, an attacker can disable it with Wraith then Stealth through the remaining nodes. If the Scanner is too far from the netConnection, an attacker can easily disable any defenses close to netConnections.
  • If a network has a single Scanner, the network is especially vulnerable to Stealth attacks during the upgrade of the Scanner. As a defender, upgrade the Scanner as fast as possible. As an attacker, if you notice that the target network has no working Scanner, consider using Stealth as a method of attack.
  • As mentioned in the Loading Screen Tips, if two Scanners would be able to detect a program being installed, only one Scanner will be used. The highest available Scanner will be automatically selected for the task.
  • Security Nodes are prime targets for Wraith or Portal. Try to keep them within range of a Scanner.

Using Stealth Attacks[]

  • Keep an eye on the visibility bar. It will take practice and several attempts before you are able to estimate how many nodes you will able to Access and how many programs you can place before you are detected. Try to take into account the level and placement of the Scanner, and try to determine if you are able to attempt a full Stealth hack or transition into a Brute Force hack.
  • Disabling the Scanner may or may not be worth doing depending on the level and position of the Scanner as well as if there is a second Scanner in the network.
  • Code Gates are prime nodes to have in range of a Scanner, as installation of the Access program is increased proportional to the Filter statistic, almost necessitating the use of the Wraith program to disable a Gate first.

References[]


Hackers Wikia - Node-Liste
Startseite
Nodes Programme Gameplay
Geschäftsnodes

B-coin Mine 19-21B-coin Mine  B-coin Mixer 19-21B-coin Mixer  Structure ConnectionnetVerbindung 
Core 11-12Kern  Database 19-21Datenbank  Server Farm 19-21Serverfarm 

Sicherheitsnodes

Black ICE 19-21Schwarzes EIS  Code Gate 19-21Code-Tor  Guardian 21Beschützer 
Scanner 19-21Scanner  Sentry 19-21Wächter  Turret 19-21Turm 

Hackingnodes

Compiler 04Compiler  Evolver 11-12Entwickler  Program Library 17-21Programmbibliothek 

Advertisement