Search found 18 matches

by Gravemind
Thu Nov 09, 2017 4:32 pm
Forum: HACKING STRATEGIES
Topic: How to defeat certain defense strategies?
Replies: 8
Views: 3632

Re: How to defeat certain defense strategies?

Yeah, and that's why I told to use shocker only if three ice walls don't work. That's quite rare though.
by Gravemind
Thu Nov 09, 2017 7:52 am
Forum: GENERAL DISCUSSION
Topic: Black Nodes
Replies: 11
Views: 3743

Re: Black Nodes

It is nothing mysterious at all. Turrets and black ice are always blacked out since the beginning, on any network. It means the sentry has to only send them a single packet to make them antivirus protected, and spread the antivirus further. Having said that, it is not logical to keep more than one u...
by Gravemind
Thu Nov 09, 2017 7:39 am
Forum: HACKING STRATEGIES
Topic: How to defeat certain defense strategies?
Replies: 8
Views: 3632

Re: How to defeat certain defense strategies?

Or you can consider using a single level 3 shocker and a protector. A level 3 shocker will guarantee that you install your protector irrespective of your opponents defence. But use this only if three ice walls don't work. Because it takes a lot of time to compile, and also uses six disk space. Perso...
by Gravemind
Thu Nov 09, 2017 1:25 am
Forum: NETWORK ARCHITECTURE
Topic: New types of networks
Replies: 6
Views: 2339

Re: New types of networks

I completely agree with you on all three points. However, the first two points can be easily negated, since first use a code gate, an evolver choke point using a black ice, a turret and a guardian, and put a scanner and a sentrybehind them, and then make the two branches, one starting with the black...
by Gravemind
Thu Nov 09, 2017 1:16 am
Forum: GENERAL DISCUSSION
Topic: Stealth Hacks: Access Program Installation Time
Replies: 14
Views: 3857

Re: Stealth Hacks: Access Program Installation Time

I watched your videos and found that it was exactly the same thing I was talking about. The hacker simply clicked on the next node before the access had installed, and it was recorded that way. If you don't believe me, in your next hack, install an access program on a node and click on the next node...
by Gravemind
Mon Nov 06, 2017 10:37 am
Forum: GENERAL DISCUSSION
Topic: Stealth Hacks: Access Program Installation Time
Replies: 14
Views: 3857

Re: Stealth Hacks: Access Program Installation Time

I think I know what has happened. It is exactly the same thing Rage was saying, only you didn't get him. Don't worry, you are not facing any problems at all. When a player selects a node, installs an access program (or any program), he immediately selects the next node, without waiting for the progr...
by Gravemind
Thu Nov 02, 2017 11:52 am
Forum: NETWORK ARCHITECTURE
Topic: New types of networks
Replies: 6
Views: 2339

Re: New types of networks

Yeah, so it does, but it also saves my core and money. Good point by the way.
by Gravemind
Thu Nov 02, 2017 10:06 am
Forum: NETWORK ARCHITECTURE
Topic: New types of networks
Replies: 6
Views: 2339

New types of networks

Hello! I have been playing this game since only 5 days now, but I have already progressed a lot, and read most of the information on wikia fandom. From what I could gather, there are basically three types of networks : the chunk/maelstrom, snake/braid, tree/ring. All these three consist of placing t...