Overturned Tower

Chapter 30: Disc system

Russell's glance at the camera crossed countless rivers of data in an instant, and appeared in front of Delphinium at the other end.

Many translucent windows appeared in front of her, and she was quickly operating on them.

With a calm face, she stretched out her hand to maximize the window. And dragged many small windows from around, placed them around to start simultaneous monitoring and operation.

Delphinium's prosthetic body interface position is similar to that of the inferior one, from the wrist to the forearm of both hands.

At this moment, a data cable extended from the joints on her two wrists and connected to her thick tactical gloves.

She has a rectangular block on the palm of the glove. It is exuding heat that cannot be ignored. If Delphinium presses the gloves on someone else at this moment, it may even burn the other person directly.

It was an ultra-portable computing device called a "board system".

In this era, the chip embedded in the back of everyone's head can already meet most of the daily needs.

Such as time, positioning, payment and payment, and watching live broadcasts, flipping through videos, playing games... It can almost be said that there is no living space for "personal computers".

As a matter of course, this small chip cannot have high computing power. Otherwise, once it is running, I am afraid that the brain will be burned, let alone the operation of playing games.

These data are actually downloaded directly from the cloud after being processed by virtue of the ultra-high download speed that is almost completely synchronized. Whether it's watching live broadcasts or videos, or Shuishui forums, reading news, or playing games, the final images are downloaded directly after the calculations are completed, rather than processing data locally.

In other words, this chip actually plays a role in daily life... like the data cable from the graphics card to the monitor.

Even those data that are not convenient for public calculation do not need a chip at all—for example, the data platform used by the bartender in front of Russell is the shared computer in this store. Companies also use this kind of large-scale, integrated computing system... This is actually to ensure that no one will take the computer away, or use the company's computing resources to calculate something for themselves.

So there is no such thing as a "personal notebook" in this world. Of course, it is also because the group does not allow production.

Then, how do those psychic hackers and network detectives manage to roam the Internet?

Don't they each carry a huge desktop computer with them?

—That is of course impossible.

Psionic hackers and network detectives can even travel directly in the "Matrix" world.

It is a virtual world full of sympathetic illusions. It looks like the real thing, but it is not the same... It is a shared world of "psychic energy network" constructed by seven empty islands. The principle is said to be related to the collective subconscious. The reason why people's download speed can be so fast, even infinitely close to "simultaneous synchronization", is precisely because the essence of this kind of network is not simply electrical signals, but related to spiritual energy.

That is not so much a kind of download, as it is a kind of "sympathy".

Conversely, a skilled psychic hacker can drill into this matrix world. By attacking "ICE"—that is, the network protection system—with psionic energy, it is even possible to paralyze the opponent's firewall at the data level.

The biggest difference between psychic hackers and cyber detectives lies in "understanding". If they understand the matrix world as the "sea of ​​collective subconsciousness", they can use psionic energy in it, but it also means that firewalls, anti-virus software and other things that originally only existed at the data level will also be symbolized in the matrix. for entities. If you are killed by those things, or even just suddenly disconnected from the Internet, you will become a vegetable in reality.

The latter, on the other hand, only understands the matrix world as a data world, allowing itself to be at a higher data level. Therefore, you can enter or leave the matrix world at any time.

The common weapon they need is the "plate". A highly integrated auxiliary computing device—it can also be understood as a "prosthetic body of a prosthetic body".

Because discs are undoubtedly a contraband of the same level as firearms, they cannot pass through most of the security guards, so it is absolutely impossible to directly install them on the body as a prosthetic body.

But as a kind of "equipment", if it is connected to the interface of the prosthetic body at any time... it will be much easier to carry.

There are only three kinds of people who can use discs—psychic hackers, network detectives, and information security engineers. The relationship is probably like a bandit, a knight and a bodyguard.

With a disc board, you can hack into the surrounding network anytime and anywhere. Quickly control the surrounding cameras, display screens...even directly control the chip behind the opponent's head, and then control the prosthesis on the opponent's body.

Of course, users of different levels have personal firewalls of different strengths.

On the airship before, there must have been a psychic hacker among the gangsters.

That's why he was able to accurately release the virus in the first-class cabin—under the same network environment, the virus developed by the Tower of Babel could even destroy the elf's highest-level firewall.

Different types of decks incorporate different types of functions.

In order to ensure portability, it is characterized by specialization rather than omnipotence...By changing the disc board, different types of information intrusion can be realized.

The plate that Delphinium is using is called "God's Eye". Built-in "keys" that can quickly crack most camera security protocols.

Originally trying to hack a camera, it would have taken tens of seconds with Delphinium's technology. It may even be discovered by information security engineers.

But with the help of the "God's Eye", she can control the cameras of all the stores in a street in two to three seconds, and even paralyze one of the cameras accurately.

As for the display screens such as ordering food, billboards, and billboards, they are basically not protected by security protocols. She can easily control it without the aid of a disc.

Now there are dozens of windows densely packed in front of Delphinium.

These windows are semi-curved, enveloping her inside. It's like a light shield unfolded in front of you.

In order to concentrate on using the "dish board" to the greatest extent, expand the window, and analyze the data, her work efficiency in the office is much higher than that of going out.

While Delphinium is not a psychic hacker, it is still possible to leave some tails due to distraction if it receives too much outside interference.

In order to prevent fatigue caused by the impact of too much information...and also in order not to directly attack the firewall of the hive nightclub. She used Russell as a springboard for her invasion—when the inferior reported to her that Russell had entered the Hive nightclub, she immediately spread out the plate and plundered the information of all the probes around indiscriminately.

Because the moment Russell's chip entered the "Hive Nightclub", he had already connected to the local area network of the Hive Nightclub.

Delphinium immediately took control of the sixteen cameras in the lobby of the Hive nightclub, and closed seven of the windows that could not track Russell's location.

Delphinium overhears the conversation between Russell and the bartender as Russell approaches the front desk, leaning on the listening device at the reception.

So she ran the disc system at full capacity again, quickly collected the cameras of all the rooms in the entire nightclub, and opened and closed them extremely quickly, and found Xiao Liuli's room in just five or six seconds.

Behind the Honeycomb Nightclub is a certain director of Tianen Group. It is very troublesome to invade its personal user information database.

But if you just look up today's opening records, it will be much simpler.

Relying on the already known room number, Delphinium searched for today's consumption records, and quickly located the customer's identity information.

It was only later that she learned of the pseudonym Xiao Liuli used—and of course.

Since they all came in wearing masks, it is of course impossible to report their real names. Otherwise, wouldn't wearing a mask be the same as not wearing one?

Before Russell's conversation with the bartender ended, Delphinium quickly wrote the information on the nearest screen that Russell could see.

Looking at the monitor, Russell took a bracelet from the bartender and registered his pseudonym.

Delphinium breathed a sigh of relief.

"It turns out that this is the case..."

She murmured softly, obviously also curious about the inside of the "Hive Nightclub".

Although when Russell was accosted by the female high school student, Delphinium felt a little worried. But in order to complete the field control in the first time, she still chose to hijack the camera in the first time.

Fortunately, Russell still got rid of them and was not dragged away, otherwise Delphinium would have to shake the inferior one over to save the scene.

After that, she was not idle either.

After taking a sip of water, taking off her gloves, and replacing a set of plates, she took the room where Xiao Liuli was as a base, and began to invade all the prosthetic bodies in the room in batches.

Delphinium had seen it with the "God's Eye" before, and there was no monitor in Xiao Liuli's room.

But maybe someone will use a prosthetic body that enhances hearing—after all, information cannot be read directly from the brain, and the chip will not record what it hears and sees. Even for screenshots and videos, the cached files are not stored locally, but in the Cyber ​​Cult's server.

Her judgment was obviously correct.

The camera showed that besides her, there were only two girls wearing smiling masks in Xiao Liuli's room.

However, the disc board of "Tailthorn-Type C" told her that in the corner of this room, there were still four prosthetic reformers hidden quietly.

"...What's the situation? The degree of transformation is more than half. UU Reading www.uukanshu.com

The delphinium's flying fingers stopped, and she frowned suspiciously and muttered in a low voice: "The bodyguards hired by Tianen Daily are too...professional, right?

“It’s so rich to have a personal firewall installed per capita!

"But why... the 'Deep Sea' type?"

[Deep Sea] is a typical passive firewall, which is a kind of customized firewall. The annual membership fee of the personal version of the genuine system is seven or eight thousand.

It is not as aggressive as [Honeypot], which can track intruders; nor is it like [Black Ice], which uses inert data to make itself indestructible. The biggest feature of the "deep sea" type firewall is that it can greatly prolong the enemy's intrusion time. It is generally used in the enterprise information base and equipped with an alarm system as the inner wall protection.

Nothing else, but it is a must in "hard dragging". It's like a stone wall without arrow towers.

And this kind of thing is really meaningless for personal protection.

If you really want to invade, delphiniums can still get in after about twenty minutes.

In terms of personal protection, it is far less secure than "honeypot" and "black ice".

The former can make psychic hackers afraid, afraid to go in, and worried that they won't be able to get out; the latter simply has too high a security level, and it can't be opened from the inside without social workers.

I always feel that something is wrong. But after thinking about it carefully, Delphinium still didn't get any inspiration.

So she went ahead with the invasion.

Because of the firewall, she can't directly take over the authority of the other party's prosthetic body, but she can make a crawler and find a way to bypass the information protection to steal information.

It took about half a minute, until Russell swiped his card to enter the door, before Delphinium successfully climbed to the monitoring data of one of the bodyguards' hearing aids.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like