Hackers Wikia
Advertisement


Summary


"The Core is the most important node. It stores information about your network and the complete download of a core database makes an attack successful. 'Upgrade your Core to unlock new node types."

The Core is a Business Node which represents the main node of the network. It holds the main database of the network, which can be downloaded by hackers as part of a successful hack. It holds a small amount of money and B-coins similar to the Database and B-coin Mixer. It also contains a ReadMe which stores messages posted by the network owner (or administrator) and any hacker that has successfully downloaded the Core database. The administrator can delete your readme. The core has a max. of readme, when the core is filled with readme and someone puts another, the readme of the bottom will be deleted, to avoid this, delete useless readme with the "⛔" button or clean the core with the red button in the bottom.

Upgrading the Core will increase the total number of Nodes that can be built in the network, as well as unlock and/or increase the maximum number of individual nodes that can be built. The maximum level a Core can be upgraded to is 12[1]. The maximum number of Cores you can have on your network is one. Unlike other Business Nodes, it is not possible to remove the Core from the network.

The Core can store up to $2000 and B64, similar to the Database and B-coin Mixer nodes respectively. As 30% of your resources are able to be stolen from each node, this results in $600 and B19 being available for completely downloading the Core.

ReadMe File

The ReadMe file is a repository for messages of the Core. The administrator may access this file by selecting the Core, then tapping on the text document icon "Text document icon".

The administrator can submit their own messages to the ReadMe File at any time. This file can be also accessed by a hacker after a successful download of the Core. Once downloaded, the hacker is given 2 minutes at the end of a hack to optionally submit their own message to the ReadMe file. Doing so will give the hacker the option to view the target's ReadMe file from the Hacks Log by selecting "ReadMe" from the Hacks list, for as long as the message exists. All messages that are submitted will be shown to the owner of the network the next time they log on as 'Unauthorized Access'.

The administrator can also remove any messages sent by other players. This can be done selectively using the red "-" button besides each message, or by selecting the "Clear All" button. Removing a message sent by a player will also remove their access to your ReadMe file.

Both administrators and hackers can use simplified CSS editing to customise their messages with emboldened, italicized, underlined, struck-through and coloured text.[2] To implement these changes, place the desired text between the parameters as detailed below.

Bold Italic Underline Strike-through Superscript Subscript
[b]Text[/b] [i]Text[/i] [u]Text[/u] [s]Text[/s] [sup]Text[/sup] [sub]Text[/sub]
Color Text - Use [colour code]Text
[ff0000]Red [ffff00]Yellow [00ff00]Green [00ffff]Cyan [0000ff]Blue [ff00ff]Purple

If you are only using a single style change, you do not need to use the [/] command, and can simply format your text using the opening command. Example: [b]text, [i]text, [u]text, [s]text, [colour code]text, [sup]text, [sub]text.

Statistics

Defensive Stats
Node
Level
Firewall Max
Nodes
Download
Time
1 300 7 30 seconds
2 380 10 32 seconds
3 480 13 33 seconds
4 580 16 34 seconds
5 780 19 35 seconds
6 1,000 22 36 seconds
7 1,250 24 37 seconds
8 1,500 26 38 seconds
9 2,000 28 38 seconds
10 2,500 30 39 seconds
11 3,250 32 40 seconds
12 4,000 34 41 seconds
Construction Stats
Node
Level
Upgrade
Cost
Experience
Gained
Completion
Time
Required # of
NetConnections
1 $0 0 None 1
2 $1,000 100 5 Minutes 1
3 $8,000 200 1 Hour 2
4 $60,000 300 4 Hours 2
5 $125,000 500 24 Hours 2
6 $250,000 750 48 Hours 3
7 $500,000 1,000 96 Hours 3
8 $1,500,000 1,500 120 Hours 3
9 $3,000,000 2,000 192 Hours 4
10 $5,000,000 3,000 240 Hours 4
11 $10,000,000 4,000 288 Hours 4
12 $15,000,000 5,000 336 Hours 5
Total $35,444,000 18,350 1,349 hours, 5 min. 5


Gallery

Core 01 Core 02 Core 03 Core 04 Core 05
Level 1 Level 2 Level 3 Level 4 Level 5
Core 06 Core 07-08 Core 09-10 Core 11-12
Level 6 Level 7-8 Level 9-10 Level 11-12

Increasing the Number of Available Nodes

Upgrading the Core increases the amount of available nodes that can be built on a network. The total number of nodes that can be placed in the network will always be less than the total of nodes available.

Business Nodes

Core
Level
Max # of
NetConnection
Max # of
Server Farm
Max # of
Database
Max # of
B-Coin Mine
Max # of
B-Coin Mixer
1 1 1 1 1 1
2 2 1 1 1 1
3 3 2 1 2 1
4 3 2 1 2 1
5 4 2 1 2 1
6 4 3 1 2 1
7 4 3 2 3 2
8 5 3 2 3 2
9 5 3 2 3 2
10 5 3 3 3 3
11 5 4 3 4 3
12 5 4 3 4 3

Security Nodes

Core
Level
Max # of
Sentry
Max # of
Turret
Max # of
Black ICE
Max # of
Code Gate
Max # of
Scanner
Max # of
Guardian
1 1 1 0 0 0 0
2 2 1 0 0 0 0
3 2 2 1 0 0 0
4 2 2 1 1 1 0
5 3 3 1 2 2 0
6 3 3 2 2 2 1
7 3 3 2 2 2 1
8 3 3 2 2 2 2
9 4 4 2 3 2 2
10 4 4 3 3 3 2
11 4 5 3 4 3 3
12 4 5 3 5 3 3

Hacking Nodes

Core
Level
Max # of
Compiler
Max # of
Evolver
Max # of
Program Library
1 1 1 1
2 1 1 1
3 1 1 1
4 1 1 1
5 1 1 2
6 1 1 2
7 1 1 2
8 1 1 2
9 1 1 3
10 1 1 3
11 1 1 3
12 1 1 3

Increasing the Level of Available Nodes

Upgrading the Core also increases the maximum level cap for every node.

Business Nodes

Core
Level
Max Level of
Server Farm
Max Level of
Database
Max Level of
B-Coin Mine
Max Level of
B-Coin Mixer
1 2 2 2 2
2 5 3 5 3
3 7 6 7 6
4 9 7 9 7
5 11 8 11 8
6 13 9 13 9
7 15 11 15 11
8 17 13 17 13
9 21 15 21 15
10 21 18 21 18
11 21 21 21 21
12 21 21 21 21

Security Nodes

Core
Level
Max Level
of Sentry
Max Level
of Turret
Max Level
of Black ICE
Max Level
of Code Gate
Max Level
of Scanner
Max Level
of Guardian
1 1 1 0 0 0 0
2 3 2 0 0 0 0
3 4 3 1 0 0 0
4 5 4 3 3 2 0
5 6 5 4 4 4 0
6 7 6 5 5 6 2
7 11 10 9 9 8 5
8 13 12 10 11 10 7
9 16 15 12 14 13 10
10 18 18 18 17 16 13
11 20 20 20 19 19 16
12 21 21 21 21 21 21

Hacking Nodes

  • Notes: While the Compiler is technically allowed to upgrade at earlier levels than displayed, the Capacity of B-coins that can be held at those levels is not sufficient to purchase the upgrade. "Max Level" displays the highest value of both "Core Level" and "Core Level required to purchase the appropriate B-coin Mixer(s)."
Core
Level
Max Level of
Compiler
Max Level of
Evolver
Max Level of
Program Library
1 1 1 1
2 1 2 2
3 1 3 3
4 1 4 5
5 2 5 5
6 2 6 6
7 3 7 8
8 4 8 10
9 4 9 13
10 4 10 15
11 4 11
12 4 12

Tips

  • Upgrading the Core is vital to expanding the Network and gives various bonuses for doing so. Upgrading your Core costs an increasing amount of $, and each upgrade will take longer to complete. Higher levels of the Core allows you to have more nodes in your network, giving you the ability to produce more resources, make larger attacks, and build better defenses.
  • Be wary on where you place your Core. The Kraken will head straight for it, causing massive damage and ignoring nodes not in its path. However, once it reaches the Core, it will attack every node attached to it.
  • Carefully examine the nodes available with each Core level and plan your long-term strategy well in advance. While you can remove nodes, only half of the invested resources and none of the experience you gained is refunded. Every node you buy/upgrade and then delete inflates your level compared to people who delete nothing. Many people do not reach the end-game because they made too many long-term mistakes. This holds true for building/upgrading/unlocking anything in the game. Play smart early on and you'll succeed later.
  • You will need 2 Database Nodes to upgrade your Core past level 7.

References

Hackers Wikia - Nodes List
Nodes Programs Gameplay
Business Nodes

B-coin Mine 19-21B-coin Mine  B-coin Mixer 19-21B-coin Mixer  Structure ConnectionnetConnection  Core 11-12Core  Database 19-21Database  Server Farm 19-21Server Farm 

Security Nodes

Black ICE 19-21Black ICE  Code Gate 19-21Code Gate  Guardian 21Guardian  Scanner 19-21Scanner  Sentry 19-21Sentry  Turret 19-21Turret 

Hacking Nodes

Compiler 04Compiler  Evolver 11-12Evolver  Program Library 17-21Program Library 

A.I. Nodes

Beetle ImageServing A.I. Beetle  Hawk ImageServing A.I. Hawk  Squid ImageServing A.I. Squid 

Advertisement