Start with Mechanical Hunter

Chapter 518 Merging the underlying protocol puzzle (Part 1)

There is an old saying that goes well——

With great ability comes great responsibility.

Ahem, I went to the wrong set.

To be precise, the larger the life form, whether it is a mechanical body or a carbon-based species, the greater the consumption.

For the planet host, it may have to process hundreds of billions of data interactions every second. This level of data processing is a powerful consumption even for it.

Therefore, sleeping every once in a while has become inevitable.

But no one expected that this time of hibernation happened to be at the stage of replacement of the underlying logic of 'Fortress' and 'Deep Web'.

Then, Gao Gong came up with a good idea.

If this thing can be done, not only can he hack into the old man's head, but he can also sneak into Cybertron and get some good things for free.

"On my side, the big data interface has been opened."

Not far away, Hitomi opened his mouth to report.

"It's also open here," a neural modeler from the fortress said in the same way.

Due to the particularity of cyberspace, the big data interface is not just a processing page, but an existence similar to a 'different-dimensional space'.

It can be embodied in reality, and what is displayed is a complex 'golden door' full of cracks.

It's a bit like the 'void cavity' in a certain comic, and it's also a bit like the lair of some Cthulhu monsters.

As soon as the 'interface' is opened, all kinds of strange emotional data, personality fragment data, and sensory data spurt out from the 'door' like a torrent.

Thanks to the satellite-level energy field suppression, 95% of the human senses of everyone present were sealed. Otherwise, at least a few people present would go crazy.

At the same time, waves of terrifying and indescribable aura overflowed from the 'interface'. The big data interface was originally prepared for the concept of big data.

The replacement of the underlying network protocol, or the golden rule, requires the participation of all big data concepts.

In other words, the integration of all big data concepts is the complete underlying protocol.

With his blurry vision, the senior engineer could see that endless black pipes spurted out from a door, directly squeezing and cracking the edges of the door, and then inserted into the planet's host.

It was as if the sea of ​​data appeared in reality. Even if most of his senses were reduced, Gao Gong still had a strong feeling of melting.

The phantom of an old man in black disappeared.

‘Old acquaintance! ’

Pipeline dominance!

The traffic king in hardware, in reality, the fusion of all cables and base stations.

With the arrival of the Pipe Master, the other nine soon appeared one by one.

Some are just like the 'pipeline'. As soon as Fang appears, the huge form seems to fill the entire space. It is the 'Prosthetic Giant', the 'King of Information', and the 'Data Shelter'.

Some are relatively mild, and their appearance is more manifested into concrete images in reality, such as a bridge and rows of cameras, which are the 'bridge of the deep web' and the 'peeping eye'.

Others appear very hidden, and if it weren’t for the positioning on the screen, you wouldn’t even know they exist.

They are ‘artificial intelligence ghosts’ and ‘hidden ones’.

The former is an existence similar to the 'inner demon', just like people are afraid of ghosts. For artificial intelligence, the 'ghost' is that ghost.

Even if the most advanced artificial intelligence is haunted by a 'ghost', it is only a matter of time before the personality template disappears and the intelligent data is stolen.

But in the AI ​​world, it has always been an urban legend, and no one knows whether it is true or not, and whether it actually exists.

The latter is the collection of all 'hidden files'. Those small cloud disk movies you watch, or the hidden folders hidden in various places, including company confidential files, are its essence.

It is also the big data concept most closely related to the 'cyber hacker'. The more secrets it has, the more powerful it is. Even in the later stages, it will issue tasks to players and let them search for things that are not under its control. 'Secret File', and the reward it gives is also a rare second-level information skill.

There are also some rather peculiar big data concepts.

For example, as soon as Fang appeared, the data of everyone present was stripped away, the concept of big data, cyber girl, search engine incarnation, and the mother of data - Alyssa.

‘Why are you here? Who gave you the qualification, oh, old man Aramaki, this old man is indeed not dead. ’

Alyssa's curious words suddenly sounded in Gao Gong's mind.

At the same time, a series of prompts sounded on Gao Gong's system panel.

[Infected by the simulated hormones of the 'Queen of Mimics', your reproductive system modification rate +1%]

[Infected by the simulated hormones of the ‘Queen of Mimics’, your reproductive system modification rate +1%]

[Infected by the simulated hormones of the ‘Queen of Mimics’, your reproductive system modification rate +1%]

Almost at the same time, Gao Gong's mind suddenly heard a lazy, heart-racing voice of Sister Yu. At the same time, Gao Gong's sight was suddenly filled with colorful figures of Sister Yu in various forms. Fill up.

'Little handsome boy, I have a feeling that you will become a great person in the future. Become my disciple and I will teach you the three thousand skills of becoming a female/male! ’

[Are you a believer in the level 75 big data concept body, the ‘Queen of Simulations’? ]

At the same time, Gao Gong could feel that every part of his body was being gently touched by a soft little hand.

Hormones are being secreted crazily——

The Queen of Simulation, the youngest big data conceptual entity, and she rose to the throne with just one piece of hardware.

That piece of hardware is called a virtual machine, a must-have for men and women, healthy for use, and not suitable for children.

Good guy, you actually preached to me, a former virtual master, who do you think I am!

Need more money!

Gao Gong resolutely chose ‘no’.

There was a cold snort in the air, and the next moment, all the little hands disappeared, and Gao Gong suddenly felt a sense of emptiness and loneliness.

Damn it, why don't you just leave like this without giving me any more advice? Maybe if you give me some more advice, I'll just obey.

The ten major concepts gathered together, and the last piece of the underlying protocol puzzle was completed. The next moment, the planet host, that is, the huge lattice metal ball began to shine, and starting from it, the entire Cybertron satellite lit up with thick energy. The shields were raised layer after layer, covering the entire satellite with an 'energy atmosphere'.

The replacement time of the underlying protocol is also the time when cyberspace is at its weakest. This level of weakness is fatal. I don’t know how many super hackers and network departments of large companies are thinking about this moment.

Gaining dominance over cyberspace, in a sense, means gaining dominance over this cyber testing ground.

The method adopted by Cybertron is also very simple. It directly shuts down your Internet and cuts off all signals. Not to mention hacking, it prevents you from even hacking.

Generally speaking, this level of defense is used for fighting interstellar wars. Interstellar fortresses, galaxy fortresses, and super battleships of advanced civilizations are all protected in this way. Unless you kill its body, any hacking methods will be useless. use.

At least in this galaxy, no civilization dares to directly attack the cyber testing ground controlled by advanced civilizations.

But there is a small problem. The protection of cyberspace is invincible.

But the protection of Cybertron's body is not so strict.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like