Interdimensional science and technology starting from cyberpunk
Chapter 617 Demonic Program Group
The cyberspace of Dog Town is a small but very dense and complex place.
Hackers operating here will see many distorted data barriers, which keep flashing like buggy programs, and the data structure is almost unreadable, looking as disordered as ordinary data tumors.
In a relatively safe and normal cyberspace, hackers may be keen to tinker with these data spores and try their luck that there may be valuable data inside.
But in Dog Town, except for the Voodoo Gang, almost no hackers would tinker with these things——
The data here is very complex, and some hackers try to search for this data with that idea. Most of them will encounter military-level ICE counterattacks.
Because even Hansen, who occupied this place, was not sure how many secrets there were.
These hackers avoided the data spores of Dog Town and built their own networks and servers with their relatively poor technology and inferior equipment. When one day they felt that their wings were strong, they began to try to contact them and slowly hone their skills. Technology, I look forward to one day taking it to the next level.
But today, hackers saw a scene they will never forget:
The data that can be demodulated by the cyber demodulator tends to be bright blue, while the logical programs and software show a certain shape, which is basically in line with human thinking and imagination.
The data in Dog Town is more dark, like a lifeless ancient ruin.
In large places like the Luxor Sports Academy, signals are transmitted through transcontinental cables, and they themselves will not appear in cyberspace: However, as hackers use wireless means to attack, stray wireless signals will appear in cyberspace. space, and with contact with it, exposes the data barriers of the entire Luxor Sports Academy to the public space.
A huge data barrier appears in cyberspace. This data barrier looks extremely delicate. Just from the outside, you can see its dense, complex but obviously logical outer firewall. When specific programs and servers support it, It will also maintain high frequency of changes, typical of corporate firewalls.
They may not see this kind of program structure once in their lifetime. After all, the first layer of security measures for the company's data barriers is secrecy. If it is not necessary, it will first remain secretive to reduce the escape of electromagnetic signals as much as possible to prevent it from being supplied.
However, now, this data barrier has been dug out: a black and red chain suddenly appeared in the cyberspace. It is not known how the attacker did it, and directly locked this huge data from the cyberspace where there was nothing. barrier!
Red ground chains are scattered in the background noise of cyberspace. Following the electromagnetic signals exposed by the data barrier and almost impossible to detect, this thing is completely revealed!
The violent electromagnetic oscillation caused the entire cyberspace to tremble. Some hackers using the Dog Town power grid immediately detected a sharp rise in the temperature of their hardware. However, when they prepared to disconnect and log off in panic, they found that they had been locked in the cyberspace. Bo space!
The electric current instantly penetrated their safety devices, completely making them part of this mammoth attack!
As more and more hackers on the line are controlled, the chain continues to infect the data barrier, pulling it completely out of the void:
The first thing to be exposed is the firewall. After being caught, the firewall can no longer move or transform. It trembles repeatedly like a stuck machine and finally collapses.
Even the Voodoo Gang ran away after seeing this scene.
This kind of crushing attack and control is simply irresistible, and you don't even know where the attack is coming from, it's like it came out of thin air!
And the black and red chain quickly locked an external line related to the data barrier——
Attacked all the way to V's brain-computer interface.
The electrode in Lille's hand was quickly connected, completely cutting off the circuits that might be overclocked by hackers and damaging the brain, and immediately started brain overclocking, and a black and red data chain appeared in front of him.
Si'an Westan started at full power, and even in cyberspace where measured time was far smaller than reality, everything still slowed down.
The black and red data lines are obviously AI-level attacks.
He could see the problem with the mysterious and powerful attack in the eyes of ordinary people: precisely because of the use of AI-style distributed computing power scheduling, it was possible to capture the attack from the electromagnetic escape that was almost completely hidden at Luxor Villa. A little signal.
But it is impossible for AI to solve all problems, and it is impossible for AI to invade a company's confidential facilities so easily. Otherwise, the world would have been dominated by AI.
[Muramasa: The opponent knows the communication protocols used by those facilities, otherwise even AI would not be able to invade so smoothly. 】
[Muramasa: But this guy looks like a ruthless character, but in fact he has obvious redundancy in computing power. He is more like a hacker equipped with AI than an AI. You may not have seen this kind of hacker, but I Saw a lot. 】
[Muramasa: Among the hackers who use AI, this person can only be considered a beginner: her AI is very intrusive, but her cooperation is not very good, and she drags down the AI. 】
[Muramasa: However, the opponent's actions are very covert. If you want to counter-intrusion, you must first convert the communication tower into signal collection mode and implement data sweeping according to the software I provided. 】
[Leal: Internet Monitoring taught me a wide-area search process. 】
That kind of program was used by Lear on the Internet in the Marvel world, and burned down Hydra's network, directly burning Dr. Zola offline.
However, Muramasa immediately stopped his behavior.
[Muramasa: That kind of program will completely expose you to cyberspace, and can easily cause unnecessary counterattacks or unnecessary attacks:
You have to know that the programs given to you by network monitoring are all old technologies from decades ago. If you use them now, there is a high probability that signal towers without blackwalls will be captured by some cunning and dangerous critical entities and invade the network. It makes sense to monitor and prohibit the activation of civilian channels that are not equipped with blackwalls. 】
[Lille: Give me a plan and move quickly. 】
[Muramasa: I am giving you a plan, I will give you a set of commonly used detection procedures]
[Hacker Program: Demon Mirror]
[Description: Detecting "invisible" images]
[Hacker Program: Hidden Virtues]
[Description: Detecting "reality" in virtual reality]
[Hacker Program: Speed Limit Trap]
[Description: Detecting hidden programs in wide-area space takes up a lot of computing power]
[Muramasa: I have improved this set of programs. I am not good at network attacks, but I am good at covert operations. Now that the program is loaded on me, I can act as a "devil" program set to run these detection AIs. 】
[Muramasa: Alternatively, you can try loading and running these software——]
【Muramasa: After all, you are already.】
[Lille: I will run the detection program group, and you will be in charge of the attack program group. 】
[Muramasa: Writing. 】
In cyberspace, Leal's new data form turned into a human body wearing some kind of strange cloak, with no facial features on his face.
He grabbed the data stream and connected it to the signal tower. As the program group was writing, the signal tower began to deform, and it seemed to have turned into a scepter in his hand——
Muramasa did not choose to transform into a samurai image that was closer to a human form, but instead transformed into a samurai sword.
The discussion was completed in an instant, and the katana was held in Lear's hand. As one program after another was written into the memory and opened permissions to Muramasa, the sword became brighter and brighter as if it was charging, and became brighter and brighter——
[Attack Program Loading: Arsonist (Muramasa)]
[Description: Causes a surge in power supply, causing equipment to heat up or even burn out. The unique Artisan AI will cause more serious fires]
[Attack Program Loading: Hellhound (Muramasa)]
[Description: Track hackers and implement continuous attacks against special sources. The unique Artisan AI will permanently lock the enemy device. Even if the hacker immediately cuts off the connection, it will trigger a variant hellhound attack and simultaneously track all related devices to implement the attack]
[Attack Program Group Loading: Agitation]
[Description: Attacking the nervous system, directly causing the hacker's short-term reaction to decrease]
[Attack program group loading]
All programs are loaded.
Buzz——
Hidden fluctuations echoed in the data space, and all tremors stopped.
The hackers who were unable to escape felt that time had stopped.
Their memory was completely blocked, their thinking and calculation speed were as slow as a turtle crawling, and their brains changed from violent oscillations and panic to a state of dementia in which even thinking slowed down.
They themselves were actually unaware that their thinking had slowed down. They could realize that it was because those huge chains suddenly began to tremble at crazy high speeds, and the originally natural and harmonious fluctuations seemed to be pressed into fast forward——
Shake, tremble, and then be completely exposed
A giant mechanical bird with wings made of chains is revealed!
A samurai sword pierced the bird's chest along the line, and when it hit the chain, it made a sharp noise that could pierce the eardrum. Countless flaming hellhounds stepped on the chain and roared up. The entire cyberspace was heating up!
You'll Also Like
-
Yu-Gi-Oh: Stop it, this is not a duel!
Chapter 180 5 hours ago -
Type-Moon lists the top ten virtues, and the defense of Valhalla is broken
Chapter 167 5 hours ago -
Someone edited a video at Marvel, making everyone in the Avengers cry
Chapter 129 5 hours ago -
Starry Sky Railway: I develop mobile games in Xianzhou
Chapter 472 5 hours ago -
Intercept Hu Lingling, I create the Lunaria Protoss
Chapter 414 5 hours ago -
Zombie Agreement: One-click max level, join the chat group
Chapter 256 5 hours ago -
American comics: The opening time is wrong, crazy plundering entries
Chapter 186 5 hours ago -
People are in Bengtie, join the chat group
Chapter 413 11 hours ago -
Special Forces: Fusion of Death Shot, Support for Long Xiaoyun!
Chapter 190 11 hours ago -
Spoilers from the original Spider-Man
Chapter 355 15 hours ago