Search found 2 matches

by infiliator27
Fri Oct 07, 2016 1:24 am
Forum: HACKING STRATEGIES
Topic: Program Composition for attacking
Replies: 2
Views: 1471

Re: Program Composition for attacking

On the bit coin part, i used 1 worm 2 blasters 9 ice wall and the rest beam. I only started on 1 connection left or right, you choose then used 1 beam and 1 ice wall+ worm for the turret. Then 1 blaster+worm on the code gate. The worm will eventually spreads and will reach the other part. Be sure to...
by infiliator27
Fri Oct 07, 2016 1:14 am
Forum: HACKING STRATEGIES
Topic: Replays
Replies: 1
Views: 708

Replays

Is it me or i just cant play the replay of my attaacker?