Search found 2 matches
Search found 2 matches • Page 1 of 1
- Fri Oct 07, 2016 1:24 am
- Forum: HACKING STRATEGIES
- Topic: Program Composition for attacking
- Replies: 2
- Views: 1670
On the bit coin part, i used 1 worm 2 blasters 9 ice wall and the rest beam. I only started on 1 connection left or right, you choose then used 1 beam and 1 ice wall+ worm for the turret. Then 1 blaster+worm on the code gate. The worm will eventually spreads and will reach the other part. Be sure to...