



Core Category Business Node Availability Statistics Unlocked at Additional Nodes Start of the Game None Connectivity Statistics Node Connections Program Slots 5 5 Node Statistics • Small Storage • Global Stealth Detection Regenerates 1% of Maximum Firewall per second

Contents show]





Summary Edit

"The Core is the most important node. It stores information about your network and the complete download of a core database makes an attack successful. 'Upgrade your Core to unlock new node types."

The Core is a Business Node which represents the main node of the network. It holds the main database of the network, which can be downloaded by hackers as part of a successful hack. It holds a small amount of money and B-coins similar to the Database and B-coin Mixer.

Upgrading the Core will increase the total number of Nodes that can be built in the network, as well as unlock and/or increase the maximum number of individual nodes that can be built. The maximum level a Core can be upgraded to is 13. The maximum number of Cores you can have on your network is one. Unlike other Business Nodes, it is not possible to remove the Core from the network.

The Core can store up to $2000 and B64, similar to the Database and B-coin Mixer nodes respectively. As 30% of your resources are able to be stolen from each node, this results in $600 and B19 being available for completely downloading the Core.

ReadMe File Edit

The Core also contains a ReadMe file which stores text messages. A network administrator can view their own ReadMe File by selecting the Core, then tapping on the text document icon " ".

A hacker that successfully downloads the Core database during a hack will be given temporary access to the file. Hackers are granted 2 minutes at the end of a hack to submit their own message to the ReadMe file by selecting the "Access ReadMe File" button during the results screen.

Leaving a message will give the hacker "Read Only" access to view the target's ReadMe file from the Hacks Log, by selecting "ReadMe" from the Hacks list for as long as the message exists. All messages that are submitted will be shown to the owner of the network the next time they log on as 'Unauthorized ReadMe Edit'.

The administrator can delete messages from the ReadMe file. This can be done selectively using the red "⛔" button besides each message, or by selecting the "Clear All" button. Removing a message sent by a player will also remove their access to your ReadMe file. Future attempts to access the file will display the message "Access Denied: Your ReadMe backdoor has been removed."

The ReadMe File can store up to 20 messages. If a new message is added when the limit has been reached, the earliest message will be deleted.

Both administrators and hackers can use simplified CSS editing to customise their messages.[1] To implement these changes, place the desired text between the parameters as detailed below.

Bold Italic Underline Strike-through Superscript Subscript [b]Text[/b] [i]Text[/i] [u]Text[/u] [s]Text[/s] [sup]Text[/sup] [sub]Text[/sub] Col or Te xt - Use [colour code]Text [ff0000] Red [ffff00] Yellow [00ff00] Green [00ffff] Cyan [0000ff] Blue [ff00ff] Purple [c] Highlight

If you are only using a single style change, you do not need to use the [/] command, and can simply format your text using the opening command. Example: [b]text, [i]text, [u]text, [s]text, [colour code]text, [sup]text, [sub]text.

Statistics Edit

Defensive Stats Node

Level Firewall Download

Time 1 300 13.9 Seconds 2 380 30.4 Seconds 3 480 31.8 Seconds 4 580 33.4 Seconds 5 780 33.6 Seconds 6 1,000 35.6 Seconds 7 1,250 36.6 Seconds 8 1,500 36.6 Seconds 9 2,000 37.9 Seconds 10 2,500 39.5 Seconds 11 3,250 40.0 Seconds 12 4,000 42.9 Seconds 13 5,000 42.9 Seconds

Construction Stats Node

Level Upgrade

Cost Experience

Gained Completion

Time Minimum

netConnections 1 $0 0 None 1 2 $1,000 100 5 Minutes 1 3 $8,000 200 1 Hour 2 4 $60,000 300 4 Hours 2 5 $125,000 500 24 Hours 2 6 $250,000 800 48 Hours 3 7 $500,000 1,000 96 Hours 3 8 $1,500,000 1,500 120 Hours 3 9 $3,000,000 2,000 192 Hours 4 10 $5,000,000 3,000 240 Hours 4 11 $10,000,000 4,000 288 Hours 4 12 $15,000,000 5,000 336 Hours 5 13 $15,000,000 6,000 336 Hours 5 Total $50,444,000 24,400 1,685 Hours

5 Minutes 5

Increasing Network Capacity Core

Level Maximum

Nodes Maximum $

Capacity Maximum ฿

Capacity 1 7 $4,000 B128 2 10 $10,000 B320 3 13 $66,000 B2,112 4 16 $130,000 B4,160 5 19 $258,000 B8,064 6 22 $514,000 B16,064 7 25 $2,002,000 B60,064 8 27 $3,202,000 B100,064 9 29 $5,002,000 B150,064 10 31 $15,002,000 B450,064 11 33 $24,002,000 B750,064 12 35 $24,002,000 B750,064 13 37 $24,002,000 B750,064





Availability of Nodes Edit

Business Node Limits Core

Level netConnection Server Farm Database B-coin Mine B-coin Mixer Amount Amount Level Amount Level Amount Level Amount Level 1 1 1 2 1 2 1 2 1 1 2 2 1 5 1 3 1 5 1 3 3 3 2 7 1 6 2 7 1 6 4 3 2 9 1 7 2 9 1 7 5 4 2 11 1 8 2 11 1 8 6 4 3 13 1 9 3 13 1 9 7 4 3 15 2 11 3 15 2 11 8 5 3 17 2 13 3 17 2 13 9 5 3 21 2 15 3 21 2 15 10 5 3 21 3 18 3 21 3 18 11 5 4 21 3 21 4 21 3 21 12 5 4 21 3 21 4 21 3 21 13 5 4 21 3 21 4 21 3 21

Security Node Limits Core

Level Sentry Turret Black ICE Code Gate Scanner Guardian Amount Level Amount Level Amount Level Amount Level Amount Level Amount Level 1 1 1 0 0 0 0 0 0 0 0 0 0 2 2 3 1 2 0 0 0 0 0 0 0 0 3 2 4 2 3 1 1 0 0 0 0 0 0 4 2 5 2 4 1 3 1 3 1 2 0 0 5 3 6 3 5 1 4 2 4 2 4 0 0 6 3 7 3 6 2 5 2 5 2 6 1 2 7 3 11 3 10 2 9 2 9 2 8 1 5 8 3 13 3 12 2 10 2 11 2 10 2 7 9 4 16 4 15 2 12 3 14 2 13 2 10 10 4 18 4 17 3 15 3 17 3 16 2 13 11 4 20 5 19 3 18 4 20 3 19 3 16 12 4 21 5 21 3 21 5 21 3 21 3 21 13 5 21 6 21 4 21 5 21 4 21 4 21

Hacking Node Limits Core

Level Compiler Evolver Program Library Amount Level Amount Level Amount Level 1 1 1 1 1 1 1 2 1 1 1 2 1 2 3 1 1 1 3 1 3 4 1 1 1 4 1 4 5 1 2 1 5 2 5 6 1 2 1 6 2 6 7 1 3 1 7 2 8 8 1 4 1 8 2 10 9 1 4 1 9 3 13 10 1 4 1 10 3 16 11 1 4 1 11 3 19 12 1 4 1 12 3 21 13 1 4 1 12 3 21

Artificial Intelligence Node Limits Core

Level A.I. Hawk A.I. Beetle A.I. Squid Amount Level Amount Level Amount Level 1 0 0 0 0 0 0 2 0 0 0 0 0 0 3 0 0 0 0 0 0 4 0 0 0 0 0 0 5 0 0 0 0 0 0 6 0 0 0 0 0 0 7 1 2 0 0 0 0 8 1 4 1 4 0 0 9 1 7 1 7 1 7 10 1 10 1 10 1 10 11 1 13 1 13 1 13 12 1 17 1 17 1 17 13 1 21 1 21 1 21





Gallery Edit

Level 1 Level 2 Level 3 Level 4 Level 5

Level 6 Levels 7-8 Levels 9-10 Levels 11-12 Level 13





Tips Edit

NetConnections do not count towards your maximum node capacity.

Players will be able to choose from up to 50 additional nodes to build on their network. As the maximum number of nodes allowed is 37, players will need to choose which nodes support the type of network they want to build.

Upgrading the Core is vital to expanding the Network and gives various bonuses for doing so. Upgrading your Core costs an increasing amount of $, and each upgrade will take longer to complete. Higher levels of the Core allows you to have more nodes in your network, giving you the ability to produce more resources, make larger attacks, and build better defenses.

Be wary on where you place your Core. The Kraken will head straight for it, causing massive damage and ignoring nodes not in its path. However, once it reaches the Core, it will attack every node attached to it.

You will need 2 Database Nodes to upgrade your Core past level 7.