This page is currently in English. Please translate into Indonesian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.

Icewall Protector
ICE Wall Protector

Summary Edit

Defensive programs such as ICE Wall and Protector are used in conjunction with Offensive programs during a Brute Force hack.

Defensive Properties Edit

Defensive programs have the "Buffer Size" statistic. This represents the amount of damage they can intercept before Security Nodes continue taking over a node.

Tips Edit

  • They have no use in stealth attacks.
  • Once Buffer Size is depleted, it is removed from the node, freeing up a slot to place another program.
Hackers Wikia - Programs List
Programs(Bahasa Indonesia) Nodes(Bahasa Indonesia) Permainan
Programs Penyerangan

Battering ram Pemukul Dinding  Ion cannon Meriam(Bahasa Indonesia)  Blaster Blaster(Bahasa Indonesia)  Kraken Kraken(Bahasa Indonesia) 
Maniac Maniak(Bahasa Indonesia)  Shuriken Shuriken(Bahasa Indonesia)  Shock Pengejut  Worms Cacing(Bahasa Indonesia) 

Programs Pertahanan

Icewall Dinding Es  Protector Pelindung(Bahasa Indonesia) 

Programs Stealth

Access Akses(Bahasa Indonesia)  Dataleach Lintah Data(Bahasa Indonesia)  Portal Portal(Bahasa Indonesia)  Wraith Hantu(Bahasa Indonesia) 

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.