Overturned Tower

Chapter 46: Aoi 0 together (thanks to the lord who fed the law~)

This is not unwarranted confidence.

Russell even has several solutions to this problem...

His psychic "vessel of non-existence" can directly go over the surface of the iron mask, penetrate into it, and cut off the designated line; he can also directly cut off a small piece of the child's skin connected to the iron mask.

Russell will also use discs - he can use discs for data intrusion in traditional forms, and he also has the skills of psychic hacking, which can be drilled in avatar form.

...Compared to investigating "demons" and infiltrating nightclubs, Russell is best at dismantling bombs and intruding.

Rather, he cut down several people after he joined the job, and finally saw the first problem in his professional field.

——The problem that modern college students do not match their professional work needs to be solved urgently.

Since there are still more than ten minutes left, let's start with the most flexible way.

The model of Russell's left hand prosthesis is called "Aoi Lily". That's the name Russell gave him... There's another name for this flower, "Ghost Lily."

It was an intrusion prosthetic with sixteen interfaces—usually the ones used by psychic hackers, but only in models from six to eight. The special feature is that there are two more disc interfaces, and some have two more general interfaces.

For combat prostheses and camouflage prostheses without engineering requirements, the number of interfaces must be less than four.

A common interface that can be used to physically link with others or insert a chip. This is a necessary interface for all prosthetics. Sometimes there are two, one of which is used as a backup.

Coupled with the calibration link for most long-range weapons... Some firearms of this era no longer need to use front sights and scopes to aim, especially automatic weapons, which can be directly physically linked to the weapon interface and use the chip on the back of the brain Collect the information of other target capture prostheses and perform processing and calibration, and display the aiming interface in front of your eyes for real-time calibration.

The picture in their eyes is like a shooting game - it will even prompt the "size of the crosshair" and the distance of the target. The more advanced software also has its own perspective. If the arm has a prosthetic body, it can also be equipped with a self-aiming.

When moving the firearm, it is like using a gyroscope to turn the handle.

Another necessary interface is used when plugging in some special plug-in interfaces. For example, when the prosthetic eye is not modified, a sight can be plugged in. For example, on the airship, those bodyguards of the men in black... the red light above their heads is the aiming aid plug-in called "Cyclops". The same kind of add-on also includes adaptive gas masks, as well as "equipment" such as jet packs and magnetic boots.

Using a switch to start would be too slow.

It's just like the battle draw that Russell complained about before - this kind of device must be connected to the prosthetic interface in advance, and then it will be activated directly when the thought is needed.

The reason why everyone in this world has a prosthetic body is not for aesthetics, or for any disability, or to optimize physical performance.

The purpose is very simple, that is, at least provide a data interface for the chip.

Otherwise, you can't even add friends, and you can't do any important data that needs to be transmitted offline.

Although the chip itself does not need to be charged, it needs to be recharged occasionally if it is equipped with a prosthesis with more complex functions. This interface itself can also be connected to the charger.

The sixteen interfaces are the theoretical maximum number of interfaces that a prosthesis can hold. Before this year, this "theoretical maximum number" was twelve.

Although in normal use, in most cases, only one or two interfaces will be connected at the same time, and no more than four interfaces will be connected synchronously at most... However, in terms of design, it is absolutely impossible to allow "once too many connections will cause data to flow , freezing, overheating".

Once you exceed eight interfaces, special protocols are required to keep things going.

"Kui Lily" is called this name because it is the first batch of new engineering prosthetics adapted to the "Astrologer Protocol".

Although positioning is for intrusion, it is equipped with rare interfaces with special protocols, and can even be directly linked to the computing hub of a large workstation, or invade giant engineering robots—even the "annealing nerve center", which requires special equipment to enter, Russell can directly invade even naked.

Not to mention a small iron mask.

This kind of small metal device is likely to be the data written by the magnetic connector.

So Russell raised his left arm, and with a thought, a magnetic connector and a data cable popped out of the prosthetic limb of his left arm.

"Are you okay?"

The inferior frowned, still a little uneasy: "You can also go in first to have a look and collect information. Then tell me when you come out, I will tell the delphinium on the road first..."

"You should know it's okay when you see me carrying around this cold access line."

Russell replied without hesitation.

Different from the cautious tone before, Russell's words are full of professional confidence at this moment.

"Oh, by the way, what kind of TPT is used for this intrusion protocol..."

The inferior hastily added.

"I know."

Russell responded casually.

He turned his head to look at the inferior, the corners of his mouth slightly raised: "You know what?

"The company that is best at network security and artificial intelligence technology is Sogo Technology Group; the core talent training base under Sogo Group is Sogo University; the core college of Sogo University is the School of Information Security and Information Control... and I have been studying since I went to college. After graduating from graduate school, he has always been the chief of our grade.

"Although I may have less experience, technically... I don't think I'm much worse than Delphinium."

He doesn't need to use the normal protocol at all.

The "Astrologer Protocol" directly has a variety of conventional protocols built in... This is the "Grand Unification Protocol" that Sally Ruth has been planning for the past few years. External devices that can be directly connected to rare interfaces without using engineering prostheses.

Russell's mentor, Sally Ruth, loved designing prosthetics, but her true specialty was her ability as a cybersecurity engineer.

"A·ICE"—the anti-intrusion electronic technology scientifically known as "offensive defense wall"—is invented by Sally Ruth.

Without the underlying technology of A·ICE, today's psychic hackers can enter almost anywhere they want and manipulate almost anyone's prosthetic body.

But now, if their avatars try to break into this invisible A·ICE, they will be instantly infected by massive amounts of spam.

It can even overheat their chips, blowing up their brains in turn... and at the end of the day, it can leave "frostbite marks" for reverse tracking. Some advanced models can also reverse track immediately, or temporarily block the opponent's ability to enter the matrix world.

Sally Ruth successively invented seven types of defense walls, including A-type, B-type, D-type, and T-type, and continuously updated and maintained their technologies, and these technologies are completely open source.

The biggest difference between a defense wall and a firewall is that the defense wall is specially used to fight against psychic hackers who can directly destroy the underlying data, rather than viruses or other types of intrusions.

Today's commercial firewalls and commercial defense walls, whether it is "black ice", "honeypot" or "deep sea", are all extensions of Sally Ruth's underlying technology. The ice-breaking cones that can break through this level of ICE are only in the few largest psychic hacking organizations. Only after the ice is broken can the phantom body be used to intrude—and if the phantom body is not used to enter, that is to say, the unique method of psychic hacking is not used, and the "magic puppet" built into the disc board must be used.

Golems are similar to the Trojan horse viruses of the old days.

But different from the Trojan horse, the behavior of the puppet is highly automated... Once it is released, it can complete the task by itself and then destroy itself, just like a puppet that acts on its own.

These puppets are integrated in those discs.

However, the puppets built into these discs must be assisted by the hackers' cloud servers—the puppets do not integrate the most critical "ice-breaking cone" technology at all. Otherwise, the calculations that can be performed by such a small piece of metal simply cannot penetrate the various defense walls of this era.

Yes, the highest level of psionic hacking groups, in fact, hardly ever hack at all.

Instead, they sell “starter kits” and “upgrade kits” necessary for hacking for a profit. All the discs they sell at low prices are time-sensitive. If you don’t renew after the expiration, they will directly become invalid, or the download of the icebreaker will become very slow.

But if you renew, you will also be bundled and recommended some "optimized packages" that you don't need at all.

For example, the "God's Eye" used by Delphinium can only invade public cameras of six common models. If you want to hack pocket cameras, private cameras, and prosthetic eyes, you have to add another layer of money; if you want to hack speakers, you have to pay more;

It can be said that they disassembled the functions of the disc board so that it can look "more luxurious" when packed.

All open source firewalls and defense technologies developed based on Sally Ruth have fixed loopholes. This is also the reason why no matter how the company updates the protection system, the disc board will be effective soon.

And this is actually the back door that Sally Ruth left for her to invade.

— After all, the people who build the firewall can't block themselves out. UU Reading www.uukanshu.com

In Kui Lily, more than 60 attack programs are integrated. Sally Ruth even categorized Russell so that he could call the corresponding cracking program with one click in front of any defense wall.

Just from this point alone, we can see that Sally Ruth attaches great importance to and trusts Russell.

and a strong will to support.

"Don't be afraid, child."

Looking at the child who was still trembling slightly, Russell supported his head with both hands, and comforted him softly: "Remember...don't sit down or squat down when you're standing, you can jump lightly when your feet are sore. The thread is ripped off... just ten more minutes and you'll be saved.

"Come on, okay? I'll be with you."

This is an appropriate, reasonable consolation.

To prevent the "patient" from tearing off the thread directly because of excessive tension—although there are inferior people who help Russell to watch, Russell still habitually gives instructions first.

Seeing the boy nodded slowly, Russell smiled with satisfaction.

"So cute."

Russell spoke softly.

He knelt down on the ground and closed his eyes.

【Please select the access mode】

- Intrusion mode.

When Russell tapped the button lightly, a piercing warning sounded in his ears.

[The access party sets the connection rule to - intrusion mode]

[Warning, this physical link will forcibly unlock data exchange permissions! 】

[Warning, this physical connection will forcibly unlock administrator privileges! 】

[Confirm that there is no permission, judged as malicious intrusion]

【warn-】

After that sound, Russell couldn't hear it.

Because his avatar transformed into data has already flowed into the little iron mask along the physical link.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like