Start with a Mechanical Hunter

Chapter 222: virus city

   Chapter 222 Virus City

  The huge data tide began to return, the waves made of 0 and 1 beat repeatedly on the beach, and the binary values ​​remaining in the sand kept flashing. Finally, two figures sat up from the beach.

   "This is my virtual machine in cyberspace, which can track the IPs of most data nodes, you- FUCK!!"

  Ahong turned his head and saw a peerless Zhengtai looking lazily at the sun on the beach, with thin lips, a high nose bridge, apple muscles that looked like he wanted to take a bite, and eyes that were as pure as spring water.

  A Hong's heart beat fiercely twice.

  'You already have a family, and the other party is a man! ’

  A Hong forcibly turned his eyes away and said with a reddish face, "Your appearance has changed too much!"

   When a normal person logs on to the cybernet, due to the decomposition and reorganization of consciousness, there will be a great change in appearance and personality, but it is the first time that Ahong has seen him from being a savage man to being a gentleman all of a sudden.

  The senior engineer ignored the other party and said, "If you find the data concept body, you can take your pink-haired girl to fly away, so don't have so many problems, hurry up and work."

   A Hong rolled his eyes, and with a virtual command, the next moment, the beach disappeared, replaced by an 'Internet cafe'.

   In front of every computer in the 'Internet cafe', there is an 'A Hong', his fingers frantically tapping the keyboard.

   "It's actually a backdoor account. I haven't seen such an ancient hacking method for a long time. Your master must be an old-fashioned hacker."

   Today’s hackers prefer to hack directly into the brain.

   "You can find a computer to turn it on when you are bored. My master has stored at least 100TB of ancient games and tens of thousands of ancient small movies."

   "Where is your master now?"

"do not know."

"do not know?"

"The old man hasn't appeared since he talked about what he was going to do 'electronic ascension'. I, my senior sister and senior brother all agreed that either this old man was ruined by a virtual virus, or he could not build a local area network. , caught in a turbulent flow of data.”

   "Does the electron fly?"

  Electronic ascension is definitely not a serious civilization ascension, it is probably some kind of means of mastering big data.

   "Do you still have brothers and sisters?"

   "Senior Sister, Second Senior Brother, plus I are three."

   "It's really special."

   Generally, hackers are single-handed, and few have three apprentices. Many old hackers even directly copy part of their personality to create an artificial intelligence.

  ‘Where are your brothers and sisters? ’

   "Senior brother went to the mother city, senior sister—" A Hong hesitated, "Senior sister went to join the rebel army."

   "Tsk, we are each other's mortal enemies, it's a **** plot," the senior engineer said lazily, and suddenly let out a light murmur.

   "Your senior sister's hacker code name is not the bird of paradise, right?"

   Now it was A Hong's turn to be surprised. Hundreds of A Hong raised their heads at the same time in the entire Internet cafe.

"how do you know!?"

   "I won't tell you."

   Gao Gong shrugged, one of the 11 most famous hackers in the future, fell to the Arasaka Tower and severely damaged the Deep Web, how could he have not heard of it.

  The fall of Arasaka Tower is a symbolic event in the mid-cycle of Mechs, which means that the mother city has lost control of the cyberspace.

   To be honest, a considerable part of the reason why he had to change his career as a cyber hacker was to participate in this part of the plot.

Whether it is the mother city or the tide of cyberspace, it is like two giants that are about to collide.

   And only by jumping on every wave accurately can you not be crushed to pieces by the huge waves.

  ‘I didn’t expect there to be unexpected joy. ’

   Peerless Zhengtai smiled and looked super cute and super cute.

   "Introduce your senior sister to me another day."

   A Hong rolled his eyes: "I think beautifully, Senior Sister hasn't contacted me for almost ten years."

  The passage of time in the virtual machine can be adjusted, which is related to the technical level of cyber hackers and is also limited by the nervous system.

   According to A Hong, the ratio of the time of his virtual machine to the real time is 10 to 1, that is to say, after 10 hours of the virtual machine, the reality is only one hour.

   After watching a full 10 small ancient movies, the senior engineer didn't even fast forward, and A Hong's voice rang, and his tone was a little hesitant.

   "Found one, but it's not a secure data node."

   "It's not safe, how do you say it?"

   "It was a virus city."

  In the cyber network, data nodes are like islands in the sea, used to house AI, hackers, and cyber clans.

   But not every data node is safe.

   The safest is naturally the data haven of large enterprises.

   However, the sites of large enterprises are mostly closed to the outside world.

   The data nodes that are open to the outside world are some cloud servers, some are real-world local area networks, and some are virtual network communities.

  Each is not particularly safe.

  After all, a truly safe place, cyber hackers can't hack it.

   But the really dangerous data nodes are not even hackers dare to set foot in easily.

  Because there are all kinds of internet viruses.

   These viruses are ancient computer viruses, faulty codes in human brain servers, depersonalized AI, and even some destructive neural signals.

   In short, bulls, ghosts, snakes and gods dance wildly.

   And this kind of red data node has another nickname - Virus City

   "Sure there's a big data monster out there?"

   "It has been confirmed that the underlying framework of the data node has changed."

   "That's about it."

  Data concepts and big data monsters are actually something that is difficult for people to understand.

   is more vivid, this thing is Du Niang, Gu Ge, and Penguin Cheng Jing.

Since the cyber network does not use binary data, but simulacrum data, the huge data flow entering and exiting the network portal for many years will naturally make such search engines and chat tools anthropomorphic, and become a kind of between AI and viruses. super monster.

  Why big data monsters can "data enlightenment", because they themselves are the existence of countless big data enlightenment births.

   "Let's go."

"you sure?"

"certainly."

  Ahong shrugged, without saying a word.

  There are autistic children, lunatics, freaks, and anti-humanists in this group of cyber hackers, but there are absolutely no cowards.

   Hundreds of Ah Hong merged into one, the Internet cafe began to disappear, and a white door appeared.

  The door opens, a large amount of data flow covers the virtual machine, the page switches, and the virtual machine disappears.

   The two of them were empty under their feet and fell directly from the atmosphere. The rolling data clouds surrounded the two of them, and the data redundancy formed a violent wind noise.

   "Fuck, the system virus has destroyed the underlying structure of this data node!" A Hong exclaimed.

   "I knew you were unreliable kid!"

  The senior worker grabbed with both hands, and where the five fingers grabbed, a large number of 0s and 1s appeared.

  [USER DATA LOSS]

  [USER DATA LOSS]

  [USER DATA LOSS]

  [USER DATA LOSS]

   (end of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like