Seen a shortcut through your opponent's network, but Attack Priorities are distracting your programs?
There's an a̶p̶p̶ program for that
Smart network designers will try to grab the attention of your programs, using high priority nodes to protect their weak points and leading you away from their resources. Don't get distracted - and ensure your programs don't either!
The Flanking combo can be used to easily sidestep your opponent's traps, leading you on the literal fast track to victory!
Use an ICE Wall to block attacks, and let a few Shurikens show you the shortcut through the network. This works especially well when there's a slow firing Black ICE or a high defence but weak attack Code Gate connected, that would normally capture the attention of your single target programs.
As a bonus, this tactic can also be used as a cheaper Sweeper tactic mentioned previously. Be on the lookout for nodes that have no Security nodes attached and clean up those resources!
If you do use this tactic to capture a weak link, you'll need to be ready to defend it. More tips on that next time!
Disclaimer: No warranty is implied or guaranteed by these statements.
Various ways of using programs during hacks
1 post • Page 1 of 1
Who is online
Users browsing this forum: Bing [Bot] and 1 guest