Start with a Mechanical Hunter

Chapter 518: Underlying Protocol Puzzle Merger (Part 1)

   There is an old saying that goes well—

  With great power comes great responsibility.

  Ahem, I went to the wrong set.

   To be precise, the larger the life, whether it is a mechanical body or a carbon-based species, the greater the consumption.

  For the planet host, it may process hundreds of millions of data interactions every second. This level of data processing is a powerful consumption even for it.

  So, sleeping every once in a while becomes inevitable.

  But no one thought that this time of dormancy happened to be in the stage of replacing the underlying logic of the 'Fortress' and 'Deep Web'.

  So Gao Gong came up with a good idea.

  If this thing can be done, not only can hack into the old man's head, but also steal into Cybertron's interior, and get some good things for free.

   "On my side, the big data interface has been opened."

  Not far away, Hitomi reported.

   "It's enabled on my side, too," a neural modeler from the fortress said in the same way.

  Due to the particularity of cyberspace, the big data interface is not just a processing page, but an existence similar to a "different dimension space".

  It can be visualized in reality, and what it shows is a complex and cracked 'golden gate'.

  It's a bit like a 'void cavity' from a comic book, and a bit like some Cthulhu monster's lair.

   Once the 'interface' is opened, all kinds of strange emotional data, personality fragment data, and sensory data are ejected from the 'door' like a torrent.

   Thanks to the suppression of the satellite-level energy field, 95% of the human senses of all the people present were sealed.

  At the same time, a horrible, indescribable aura overflowed from the 'interface'. The big data interface was originally prepared for the concept of big data.

  The underlying network protocol, or the replacement of the golden rule, requires the participation of all big data concepts.

  In other words, the integration of all big data concepts is the complete underlying protocol.

  With his blurred vision, Gao Gong could see that endless black pipes spewed out from a door, directly squeezed the edge of the door, and then inserted into the planet host.

  As if the sea of ​​data appeared in reality, even though most of the senses were reduced, Gao Gong still had a strong feeling of melting.

  The phantom of an old man in black disappeared in a flash.

  ‘Old acquaintance! '

  Pipe master!

  The traffic king in hardware, in reality, the combination of all cables and base stations.

  Following the arrival of the pipe master, soon, the other nine also appeared one by one.

  Some of them are like 'pipes'. As soon as Fang appears, the huge shape seems to fill the entire space. They are 'Prosthetic Giants', 'King of Information', and 'Data Shelter'.

   There are also some that are relatively mild, and their appearance is more manifested into concrete images in reality, such as a bridge and rows of cameras, which are the "bridge of the deep net" and "peeping eyes".

   There are also others that appear very covertly. If it wasn't for the positioning on the screen, they wouldn't even know their existence.

  They are 'AI ghosts', 'hidden ones'.

  The former is an existence similar to a "demon", just like people are afraid of ghosts. For artificial intelligence, a "ghost" is that ghost.

  Even the top artificial intelligence, once it is entangled by "ghosts", it is only a matter of time before the personality template dissipates and the intelligence data is stolen.

   But in the AI ​​world, it has always been an urban legend, no one knows whether it is true or not, whether it really exists.

  The latter is a collection of all 'hidden files'. Those small movies on the cloud disk you watch, or hidden folders hidden in various places, including company confidential files, are its main body.

It is also a big data conceptual body that is most closely related to the "cyber hacker". The more secrets it has, the stronger it is, and even, in the later stage, it will issue tasks for players to search for information that is not under its control. The 'Secret File', and the reward it gives is also a rare second-order information system skill.

   There are also some peculiar big data concepts.

  For example, as soon as Fang appeared, the data of everyone present was stripped of the big data concept body, Cyberdu Niang, search engine avatar, mother of data—Alyssa.

  ‘Why are you here, kid? Who gave you the qualification, oh, old man Huangjuan, this old man is indeed not dead. '

  In Gao Gong's mind, Alisa's curious words suddenly sounded.

  At the same time, a series of prompts sounded on Gaogong's system panel.

  [Infected by the simulated hormone of the 'Simulation Queen', your reproductive system transformation rate +1%]

  [Infected by the simulated hormone of the 'Simulation Queen', your reproductive system transformation rate +1%]

  [Infected by the simulated hormone of the 'Simulation Queen', your reproductive system transformation rate +1%]

  …

Almost at the same time, a lazy and heart-pounding voice of Miss Yu suddenly came from Gao Gong's mind. fill up.

  ‘Little handsome guy, I have a feeling that you will become a great weapon in the future, worship me, and I will teach you the three thousand methods of royal women/royal men! '

  [Are you becoming a 75-level big data concept body, a believer in the "Queen of Simulated Senses"? ]

  At the same time, Gao Gong could feel that every part of his body was being gently touched by a soft little hand.

   Hormones are being secreted crazily—

  The queen of simulation, the youngest concept body of big data, and the throne that was ascended to the throne with only one piece of hardware.

   That piece of hardware is called a virtual machine, a must for men and women, healthy for use, and unsuitable for children.

   Good guy, you actually preached to me this former virtual master, who do you think I am!

   Need to add money!

  Gao Gong resolutely chose 'No'.

  There was a cold snort in the air, and the next moment, all the little hands disappeared, and Gao Gong felt a sense of emptiness and loneliness in his heart.

  Damn it hurts, you just leave, why don't you stop persuading me, maybe if you persuade me again, I will obey.

The ten concept bodies gathered together, and the last piece of the underlying agreement puzzle was complete. The next moment, the planetary host, that is, the huge lattice metal ball began to emit light, and from it, the entire Cybertron satellite lit up, thick energy The shields rose layer by layer, covering the entire satellite with an 'energy atmosphere'.

  The replacement time of the underlying protocol is also when cyberspace is at its weakest. This level of weakness is fatal. I don’t know how many super hackers and network departments of large enterprises are thinking about this moment.

   Obtaining the dominance of the cyberspace, in a sense, means obtaining the dominance of this cyber testing ground.

  The method Cybertron adopts is also very simple. It directly shuts down your network and cuts off all signals, let alone hacking, so that you can’t even hack.

Generally speaking, this level of defense is used to fight Star Wars. The interstellar fortresses of advanced civilizations, galaxy fortresses, and super battleships are all protected in this way. Unless you kill its body, any hacking methods will be useless. use.

  At least in this galaxy, no civilization dares to attack the cyber testing ground controlled by advanced civilizations.

   But there is a small problem, the protection of cyberspace is invincible.

   But the protection of Cybertron itself is not so strict.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like