## FANDOM

1,079 Pages

This page can be used for testing everything you need before uploading to a current page.

• This page isn't protected in any way - Please preserve this message at the top of the page
• Be respectful of other content currently on here.
• Please copy and paste the following at the very end of each entry:

<br clear="all" />
~~~~
----

• Please delete any test information once completed.

## Table Transclusions Edit

### Reputation TablesEdit

 Rank Appearance Title ReputationRequired Rank down whenReputation reaches Extra \$ perwin condition Extra B-coin perwin condition 1 Noob - - 0 0 2 Rookie 500 400 500 20 3 Talent 750 650 800 30 4 Skilled 1,000 900 1,750 60 5 Experienced 1,250 1,150 3,500 120 6 Advanced 1,500 1,400 6,500 220 7 Senior 1,750 1,650 9,500 330 8 Expert 2,000 1,900 12,000 400 9 Veteran 2,250 2,150 27,000 900 10 Master 2,500 2,400 55,000 2,000 11 Elite 3,000 2,750 120,000 4,000

### ICE Wall TablesEdit

 ProgramLevel BufferSize CompilationPrice 1 400 B8 2 495 B15 3 545 B30 4 600 B60 5 660 B90 6 725 B120 7 800 B150 8 880 B180 9 960 B210 10 1,060 B240 11 1,170 B270 12 1,280 B300 13 1,410 B330 14 1,550 B360 15 1,710 B390 16 1,880 B420 17 2,070 B450 18 2,275 B510 19 2,500 B570 20 2,750 B630 21 3,030 B690
 ProgramLevel UpgradeCost ExperienceGained ResearchTime RequiredEvolver Level 1 B128 125 15 Minutes 1 2 B1,024 300 4 Hours 2 3 B2,048 375 6 Hours 3 4 B4,096 400 8 Hours 4 5 B8,000 425 10 Hours 4 6 B16,000 450 12 Hours 5 7 B32,000 475 18 Hours 5 8 B60,000 500 24 Hours 6 9 B70,000 575 30 Hours 6 10 B80,000 650 36 Hours 7 11 B90,000 725 42 Hours 7 12 B100,000 800 48 Hours 8 13 B120,000 825 54 Hours 8 14 B140,000 850 60 Hours 9 15 B160,000 875 64 Hours 9 16 B180,000 900 72 Hours 10 17 B200,000 930 80 Hours 10 18 B220,000 960 88 Hours 11 19 B240,000 1,000 96 Hours 11 20 B300,000 1,125 108 Hours 12 21 B360,000 1,250 120 Hours 12

### Protector TablesEdit

 ProgramLevel BufferSize RegenerationPer Second CompilationPrice 1 650 46 B30 2 748 52 B60 3 860 60 B90 4 989 69 B120 5 1,137 80 B150 6 1,307 91 B180 7 1,503 105 B210 8 1,730 121 B240 9 1,988 139 B270 10 2,286 160 B300 11 2,630 184 B330 12 3,024 212 B360 13 3,477 243 B390 14 4,000 280 B420 15 4,600 322 B450 16 5,290 370 B510 17 6,080 426 B570 18 7,000 490 B630 19 8,050 564 B690 20 9,250 648 B750 21 10,640 745 B1,000
 ProgramLevel UpgradeCost ExperienceGained ResearchTime RequiredEvolver Level 1 B1,024 300 4 Hours 3 2 B4,096 450 12 Hours 3 3 B8,000 475 18 Hours 4 4 B16,000 500 24 Hours 4 5 B32,000 575 30 Hours 5 6 B48,000 650 36 Hours 5 7 B60,000 725 42 Hours 6 8 B80,000 800 48 Hours 6 9 B100,000 825 54 Hours 7 10 B140,000 850 60 Hours 7 11 B160,000 875 66 Hours 8 12 B180,000 900 72 Hours 8 13 B200,000 930 80 Hours 9 14 B220,000 960 88 Hours 9 15 B260,000 1,000 96 Hours 10 16 B300,000 1,080 104 Hours 10 17 B340,000 1,160 112 Hours 11 18 B380,000 1,250 120 Hours 11 19 B420,000 1,375 132 Hours 12 20 B460,000 1,500 144 Hours 12 21 B500,000 1,750 168 Hours 12

### Data Leech TablesEdit

 ProgramLevel Visibility(per second) DownloadBoost CompilationPrice 1 28 / second 50% B5 2 26 / second 55% B10 3 24 / second 60% B20 4 22 / second 65% B30 5 20 / second 70% B40 6 18 / second 75% B50 7 16 / second 80% B60 8 14 / second 85% B70 9 13 / second 90% B80 10 12 / second 95% B90 11 11 / second 100% B100 12 10 / second 105% B110 13 9 / second 110% B120 14 8 / second 115% B130 15 7 / second 120% B140 16 6 / second 125% B150 17 5 / second 130% B170 18 4 / second 135% B190 19 3 / second 140% B210 20 2 / second 145% B230 21 1 / second 150% B250
 ProgramLevel UpgradeCost ExperienceGained ResearchTime RequiredEvolver Level 1 B512 200 2 Hours 2 2 B2,048 300 4 Hours 2 3 B4,096 400 8 Hours 3 4 B8,000 450 12 Hours 4 5 B16,000 500 24 Hours 4 6 B32,000 575 30 Hours 5 7 B48,000 650 36 Hours 5 8 B60,000 725 42 Hours 6 9 B80,000 800 48 Hours 6 10 B100,000 825 54 Hours 7 11 B120,000 850 60 Hours 7 12 B140,000 875 66 Hours 8 13 B160,000 900 72 Hours 8 14 B180,000 930 80 Hours 9 15 B200,000 960 88 Hours 9 16 B220,000 1,000 96 Hours 10 17 B260,000 1,080 104 Hours 10 18 B300,000 1,160 112 Hours 11 19 B340,000 1,250 120 Hours 11 20 B380,000 1,375 132 Hours 12 21 B420,000 1,500 144 Hours 12

### Access TablesEdit

 ProgramLevel Visibility(per second) CompilationPrice 1 162 / second B12 2 156 / second B24 3 150 / second B36 4 144 / second B48 5 138 / second B60 6 132 / second B72 7 126 / second B84 8 120 / second B100 9 114 / second B116 10 108 / second B132 11 102 / second B148 12 96 / second B164 13 90 / second B180 14 84 / second B200 15 78 / second B220 16 72 / second B240 17 66 / second B260 18 60 / second B280 19 54 / second B300 20 48 / second B320 21 42 / second B350
 ProgramLevel UpgradeCost ExperienceGained ResearchTime RequiredEvolver Level 1 B4,096 375 6 Hours 4 2 B8,000 475 18 Hours 4 3 B16,000 500 24 Hours 5 4 B32,000 575 30 Hours 5 5 B48,000 650 36 Hours 6 6 B60,000 725 42 Hours 6 7 B80,000 800 48 Hours 7 8 B100,000 825 54 Hours 7 9 B120,000 850 60 Hours 8 10 B140,000 875 66 Hours 8 11 B160,000 900 72 Hours 9 12 B180,000 930 80 Hours 9 13 B200,000 960 88 Hours 9 14 B220,000 1,000 96 Hours 10 15 B260,000 1,080 104 Hours 10 16 B300,000 1,160 112 Hours 10 17 B340,000 1,250 120 Hours 11 18 B380,000 1,375 132 Hours 11 19 B420,000 1,500 144 Hours 11 20 B440,000 1,625 156 Hours 12 21 B460,000 1,750 168 Hours 12

### Wraith TablesEdit

 ProgramLevel Visibility(per second) CompilationPrice 1 135 / second B100 2 130 / second B200 3 125 / second B300 4 120 / second B400 5 115 / second B500 6 110 / second B600 7 105 / second B700 8 100 / second B800 9 95 / second B900 10 90 / second B1,000 11 85 / second B1,100 12 80 / second B1,200 13 75 / second B1,300 14 70 / second B1,400 15 65 / second B1,500 16 60 / second B1,600 17 55 / second B1,700 18 50 / second B1,800 19 45 / second B1,900 20 40 / second B2,000 21 35 / second B2,100
 ProgramLevel UpgradeCost ExperienceGained ResearchTime RequiredEvolver Level 1 B8,000 475 18 Hours 5 2 B16,000 550 24 Hours 5 3 B32,000 625 32 Hours 6 4 B48,000 700 40 Hours 6 5 B60,000 800 48 Hours 7 6 B80,000 830 54 Hours 7 7 B100,000 860 60 Hours 8 8 B120,000 900 72 Hours 8 9 B140,000 930 80 Hours 9 10 B160,000 960 88 Hours 9 11 B180,000 1,000 96 Hours 9 12 B200,000 1,080 104 Hours 10 13 B220,000 1,160 112 Hours 10 14 B260,000 1,250 120 Hours 10 15 B300,000 1,330 128 Hours 11 16 B340,000 1,410 136 Hours 11 17 B380,000 1,500 144 Hours 11 18 B420,000 1,625 156 Hours 11 19 B440,000 1,750 168 Hours 12 20 B460,000 1,875 180 Hours 12 21 B480,000 2,000 192 Hours 12

### Portal TablesEdit

 ProgramLevel Visibility(per second) CompilationPrice 1 55 / second B160 2 50 / second B320 3 48 / second B480 4 46 / second B640 5 44 / second B800 6 42 / second B960 7 40 / second B1,120 8 38 / second B1,280 9 36 / second B1,440 10 34 / second B1,600 11 32 / second B1,760 12 30 / second B1,920 13 28 / second B2,080 14 26 / second B2,240 15 24 / second B2,400 16 22 / second B2,560 17 20 / second B2,720 18 18 / second B2,880 19 16 / second B3,040 20 14 / second B3,200 21 12 / second B3,360
 ProgramLevel UpgradeCost ExperienceGained ResearchTime RequiredEvolver Level 1 B16,000 500 24 Hours 6 2 B32,000 575 30 Hours 6 3 B48,000 650 36 Hours 7 4 B60,000 725 42 Hours 7 5 B80,000 800 48 Hours 8 6 B100,000 825 54 Hours 8 7 B120,000 850 60 Hours 9 8 B140,000 875 66 Hours 9 9 B160,000 900 72 Hours 9 10 B180,000 930 80 Hours 10 11 B200,000 960 88 Hours 10 12 B220,000 1,000 96 Hours 10 13 B260,000 1,080 104 Hours 11 14 B300,000 1,160 112 Hours 11 15 B340,000 1,250 120 Hours 11 16 B380,000 1,375 132 Hours 11 17 B420,000 1,500 144 Hours 12 18 B440,000 1,625 156 Hours 12 19 B460,000 1,750 168 Hours 12 20 B480,000 1,875 180 Hours 12 21 B500,000 2,000 192 Hours 12

Luminaar (talk) 17:13, September 10, 2017 (UTC)

## Infobox Updates Edit

### Program InfoboxesEdit

Luminaar (talk) 21:02, August 30, 2017 (UTC)

### Node InfoboxesEdit

Luminaar (talk) 02:44, September 8, 2017 (UTC)

## Summary Edit

Successful hacking is central to completing missions and simulations, daily challenges, and generally progressing as a hacker. Hacks can be completed using many different programs and strategies, but programs must be sufficiently upgraded to be effective. Understanding attack priorities, the pros, cons and qualities of brute force and stealth, and the strengths, weaknesses, and unique properties of programs will inform decisions and help conquer any network.

## Program Loadouts Edit

Stealth:

• Pros
• Hacks cannot be retraced as long as the visibility bar does not reach 3600 before disconnecting
• Very few programs are needed for each hack
• Cons
• Programs become very expensive at higher levels
• Wraith and Portal take a long time to compile
• Stealth must be continually upgraded to counter rising Scanner levels on target networks

Shuriken and Shocker:

• Pros
• Programs are very cheap
• Hacks can be relatively quick, compared to other brute Force methods
• Cons
• Shockers take 8 minutes to compile and 6 disk space per program
• Having enough Shockers is crucial to a hack, and could be the sharp difference been success and failure

Kraken and Worm:

• Pros
• Very low total disk space
• Kraken can crush strong nodes on the way to the Core while Worms deal with weaker nodes without wasting programs
• Cons
• Defensive programs are almost always needed to defend nodes while Kraken and Worms replicate and move along.
• Kraken has limited use against networks with the Core near the netConnections

Portal and Maniac:

• Pros
• Network security can be eliminated quickly and completely if Portal is well-placed
• Cons
• Compilation time is extremely long and significant disk space is required
• Other programs will be needed for a successful hack, including Access

Blaster and ICE Wall:

• Pros
• Very few nodes will be able to hold for long against a Blaster of reasonable level
• Blasters greatly decrease time spent on difficult nodes such as Code Gates, the Core, and high level storages or Security Nodes.
• Cons
• Blaster is slow to attack, making it almost impossible to use effectively against Maelstroms or low-level nodes
• ICE Walls become expensive very quickly, and many may be needed per hack
• Chokepoints can be difficult to defend, and Security Nodes must be protected to prevent the network recapturing them while Blasters attack other nodes on chokepoints

Beam, Ram and Protector:

• Pros
• Programs are cheap to compile
• Hacking is intuitive and relatively simple, leading to fewer mistakes
• A good average capable of hacking almost any type of network
• Cons
• Battering Ram and Protector take time to compile
• While Code Gates may not be much of an obstacle, nodes with very high firewall and protected by Guardian shields may be very difficult to capture without stronger programs

## Program Placement Edit

• Strong when installed on nodes with low firewall or Security Nodes which could be recaptured by the network
• Weak when installed on nodes with poor strategic position to continue hacking
• Strong when installed on nodes with many connections or nodes connected to one or more strong nodes of higher priority and one or more weak nodes with lower priority but more importance to continue hacking
• Weak when installed on nodes connected to only one uncaptured node of importance
• Strong against chokepoints and high firewall nodes
• Weak against nodes with low firewall or non-threatening nodes
• Strong when installed on nodes connected only to captured, weak, unimportant or non-threatening nodes
• Weak when installed on nodes connected to one or more security nodes or the Core, especially with no other programs to support it
• Strong against chokepoints and high firewall nodes
• Weak against non-threatening nodes
• Strong against Code Gates and high firewall nodes protected by multiple strong Guardian shields
• Weak against very low level Code Gates and Guardian shields, and useless against anything besides filters and shields.
• Strong on chokepoints and against high firewall nodes protected by multiple strong Guardian shields
• Weak against non-threatening or low firewall nodes

## Comparison of Defensive ProgramsEdit

• ICE Wall and Protector level 1 statistics
 Program Firewall Disk Usage Install Time Regeneration Ice Wall 400 2 0.5 seconds None Protector 650 4 4 seconds 45.5 per second

Two ICE Walls cost the same disk space to install as one Protector. It takes an additional 3.5 seconds to install the latter, for a bonus of 45.5 firewall regeneration per second.

### Comparison of Practical Usage Edit

The ICE Wall can be installed quickly on a node that was just captured, potentially saving the node and giving you time to install offensive programs. Installing offensive programs first will works for more damage, as long as the node is able to sustain enough damage. This method also allows the node to regenerate until the shield breaks. Use the first tactic on low firewall nodes such as Scanner and the Guardian.

Once installed, even though the Protector has less than the combined Firewall of 2 ICE Walls, the regeneration makes up for it as long as the Protector stays under attack for 3.3 seconds.

### Efficiency Edit

Disk usage wise, 2 ICE walls equal 1 Protector.

Be aware of having both ICE Wall and Protector remaining once the node is 100% secure. If this happens, using fewer ICE Walls and letting the Protector take more damage, or using an ICE Wall instead of the Protector for cheaper costs/using less disk space would be more efficient.

## References Edit

Hackers Wikia - Gameplay Topics
Gameplay Nodes Programs
Hacking
Networking
Strategies

Froste (talk) 20:24, July 21, 2017 (UTC)