Reborn Ace Hack

Chapter 832 Intelligent Network Node

After unpacking the gadget, Xiao Yuan found a piece of code in it.

The storage method of this code is very strange. It is not continuously embedded in the binary code of the gadget. Instead, a relative pointer of only 32 bits and 4 bytes is set at the beginning of the gadget. You can use this pointer to find

The next code segment, the end of this code segment is a pointer to the third code segment, and so on.

Following this rule, Xiao Yuan extracted the complete code embedded in the gadget's code. This code is very short, only 1024 bytes.

After a more in-depth analysis of this code, the conclusion reached surprised Xiao Yuan, because this code of only 1kbytes turned out to be a low-level intelligent node code. The reason why it is said to be low-level is that it is compared to high-level code such as Ning Lan.

In terms of intelligent programs, according to the current level of artificial intelligence development around the world, this code is not low-level at all, it can even be said to be very advanced.

This code is automatically executed when the gadget is executed, and can turn the computer running the gadget into a node similar to a brain nerve unit. 1024 such nodes can form a more complex computing unit, and so on.

Xiao Yuan set up a large-scale network with 2 nodes in his brain system, and ran this node program in this network. This program automatically divided these nodes into 1024 computing units, and used these 1024

The computing units form a very large-scale computing network. As a whole, this network has begun to possess some low-level intelligence, so this 1024x1024 computing network can be called a low-level intelligent network.

This intelligent network allowed Xiao Yuan to see the most basic computing model of the human brain. The human brain is actually a very large computing network composed of countless neurons. Of course, compared to the astronomical number of network nodes in the human brain, 1024x1024 nodes are still

There are too few, so small that they are not even comparable to a drop of water in the vast ocean. Even so, this intelligent network can be regarded as an epoch-making work in the current world environment.

Another point is that because individual computing nodes need to undertake very few computing tasks and generate very little network data, the impact on the computing resources and network bandwidth of the infected computer is almost negligible. This is also the reason for this kind of intelligent network.

One of the advancements.

The third level of advancement is that the implementation of these nodes is very clever and highly concealable. It is no exaggeration to say that it is impossible to detect these node codes using any conventional detection methods, because the nodes

When the code is embedded in a gadget, its code does not exist alone like an ordinary virus. Instead, it cleverly uses the code of the gadget itself through a special algorithm. In other words, these codes

Every section of code, even

The four-byte address that connects segments to each other is a normal part of the gadget code. This is a very advanced embedding method. The reason why an advanced agent like Ninglan can navigate the network without any control

Taboo, any conventional detection means cannot detect her existence, and this storage method is also used. If Xiao Yuan had not studied this implementation method in detail after the brain system transformation was completed, he would not have been able to discover this code, let alone

Said it was extracted from the gadget code.

"Who designed these nodes? Could it be!" Xiao Yuan was shocked, because this design method either came from the base or blackskull.

"Xuan Nie, come and test these codes." Thinking of this, Xiao Yuan immediately contacted the base's intelligent mother body, Xuan Nie, and sent his findings there.

"This is the low-level algorithm I deliberately released when I recycled Intelligent System No. 002. You can search it in your brain system storage area and you will see it." Soon, Xuan Nie responded.

When Xiao Yuanhe and Fatty were thrown into the tropical rainforest of South America to perform their mission, Xuannie used Xiao Yuan and Liu Wenwen's communicator to connect to the satellite in the sky, and then pretended to be Tang Sa and called Smith. In order not to be exposed

Base, Xuan Nie released an algorithm in the name of Xiao Yuan.

Before Xiao Yuan left the base, Xuan Nie told him the whole thing. Because the algorithm was very low-level, Xiao Yuan did not study the algorithm carefully, so he did not recognize it. After Xuan Nie reminded him, he quickly identified it.

I used another part of my mind to search the storage area, found the description document of the algorithm, and compared it with the code in front of me. Sure enough, I found that the algorithm embedded in the gadget was exactly the algorithm described in the document.

"What does Rubin want to do?"

After comparing, Xiao Yuan thought of this problem. He also understood the subsequent development of the matter through Xuan Nirvana. Professor Smith suddenly became ill. Frank took advantage of the chaos and stole the algorithm. He even gave the original data on Smith's computer to him in order to get the rare goods.

Deleted, Frank later sold this algorithm to Rubin, so when an intelligent node based on this algorithm appeared on the network again, he naturally thought of Rubin.

Taking this problem as a starting point, Xiao Yuan quickly made deductions in his brain system and got several possible reasons why Rubin did this. The most probable reason is that Rubin wanted to use this algorithm to design his own intelligent network.

In the process of the war between China and American hackers, he will

This code is implanted into a small tool released by the Honker Alliance, which can spread these codes quickly and efficiently on the network, accelerating the construction of smart networks. At the same time, because in the process of hackers from both sides attacking each other, the network is in chaos. This chaos is undoubtedly

This will make the spread of these codes more covert.

There is also a possibility that Rubin wants to use Chinese hackers as a shield. If this smart network loses control, with this shield, he can escape completely.

"Haha, Rubin, the Morgan family."

Xiao Yuan laughed, adjusted the algorithms of these codes in the brain system, and then put these codes on the Internet. For the Luo family, although the Morgan family is slightly weaker, this family can be used to transfer the Luo family.

It is a good choice to pay attention to the family and blackskull to provide better protection for yourself.

After doing this, Xiao Yuan regained his consciousness, exited the brain system, and turned off the computer, as if the hustle and bustle on the Internet suddenly left him.

It was completely dark, and Xiao Yuan felt a little hungry, so he was going to the kitchen to make something to eat. Not long after he walked into the kitchen, he heard his cell phone ringing outside.

"Hello, I'm Yuan Xiao, who is this?" Xiao Yuan came out of the kitchen and answered the phone and said.

"Mr. Yuan, this is Rose. Are you free tonight? I would like to invite you out for a drink." Rose's pleasant voice came from the other end of the phone.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like