Bulgaria  China  Taiwan  Czech  UK  France  Germany  Indonesia  Italy  Japan  Malaysia  Poland  Portugal  Romania  Russia  Spain  Turkey  Vietnam

This page is currently in English. Please translate into Turkish.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.

Icewall Protector
ICE Wall Protector

Summary Edit

Defensive programs such as ICE Wall and Protector are used in conjunction with Offensive programs during a Brute Force hack.

Defensive Properties Edit

Defensive programs have the "Buffer Size" statistic. This represents the amount of damage they can intercept before Security Nodes continue taking over a node.

Tips Edit

  • They have no use in stealth attacks.
  • Once Buffer Size is depleted, it is removed from the node, freeing up a slot to place another program.
Hackers Wikia - Yazılım
Yazılım Bağlantı Oynanış

Battering ram Koçbaşı  Ion cannon Işık Topu  Blaster Patlatıcı  Kraken Kraken 
Maniac Kaçık  Shock Şok Edici  Shuriken Ninja Yıldızı  Worms Solucanlar 


Icewall ICE Duvarı  Protector Koruyucu 


Access Geçit  Dataleach Veri Emici  Portal Portal  Wraith Hayalet 

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.