typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 25 Virus City

The huge tide of data began to surge back. Waves made of 0s and 1s repeatedly hit the beach. The binary values ​​​​remaining in the sand continued to flash. Finally, two figures sat up from the beach.

"This is my virtual machine in cyberspace. It can track the IP addresses of most data nodes. You—fuck you!!!"

Hiro turned around and saw a peerless shota looking lazily at the sun on the beach, with thin lips, a high bridge of nose, apple muscles that looked like he wanted to take a bite, and eyes as pure as spring water.

Hiro's heart beat hard twice.

'You already have a family, and the other person is a man!'

Ah Hong forced his eyes away and said with a slightly red face: "Your appearance has changed too much!"

When a normal person logs into the cyber network, due to the decomposition and reorganization of consciousness, his appearance and personality will undergo a huge change. However, this is the first time that Hiro has seen someone change from a macho man to a shot.

The senior engineer ignored the other party and said: "If you find the data concept, you can take your pink-haired little girl far away, so don't ask so many questions and get to work quickly."

Hiro rolled his eyes and gave a virtual command. The next moment, the beach disappeared and was replaced by an 'Internet cafe'.

In front of every computer in the Internet cafe, there is a "Hong" sitting there, his fingers tapping the keyboard frantically.

"You actually created a backdoor account. I haven't seen such ancient hacking methods for a long time. Your master must be an old-fashioned hacker."

Today's hackers prefer to hack directly into the brain.

"If you are bored, you can find a computer and turn it on. My master has stored at least 100TB of ancient games and tens of thousands of ancient short movies."

"Where is your master now?"

"have no idea."

"have no idea?"

"The old man has never appeared again since he kept talking about what kind of 'electronic ascension' he was going to do. I, my senior sister, and my senior brother all agreed that either the old man's personality was ruined by a virtual virus, or he couldn't build a local area network.

, caught in the data turmoil.”

"Are electrons soaring?"

Electronic ascension is definitely not a serious civilization ascension, it is probably some kind of means of mastering big data.

"Do you still have brothers and sisters?"

"Senior Sister, Second Senior Brother, plus me, there are three of us."

“It’s really special.”

Generally, hackers are single apprentices, and few have three apprentices. Many veteran hackers even directly copy part of their personality to create an artificial intelligence.

'Where are your senior brother and sister?'

"Senior brother has gone to the mother city, and senior sister--" Hong hesitated, "senior sister has gone to join the rebel army."

"Tsk, we are mortal enemies of each other, what a bloody plot," the senior engineer said lazily, and suddenly let out a light sigh.

"Your senior sister's hacker codename is not Bird of Paradise, right?"

Now it was Hiro's turn to be shocked. Hundreds of Hiro's in the entire Internet cafe raised their heads at the same time.

"how do you know!?"

"I won't tell you."

The senior engineer shrugged. One of the 11 most famous hackers in the future had captured Arasaka Tower and severely damaged the Deep Web. How could he not have heard of it?

The fall of Arasaka Tower was a landmark event in the middle of the Mecha Star, which meant that the Mother City had lost control of cyberspace.

To be honest, a large part of the reason why he decided to change his career as a cyberhacker was to participate in this part of the plot.

The Mother City and the Cyber ​​Tide are like two behemoths about to collide.

And only by jumping on every wave accurately can you avoid being crushed to pieces by the huge waves.

'I didn't expect there would be an unexpected surprise.'

The peerless young lady smiled, looking super cute and cute.

"Introduce your senior sister to me some other time."

Hiro rolled his eyes: "What a beautiful thought, senior sister hasn't contacted me for almost ten years."

The time lapse in the virtual machine can be adjusted, which is related to the technical level of the cyber hacker and is also limited by the nervous system.

According to Ah Hong, the ratio of the time of his virtual machine to the real time is 10 to 1. In other words, after 10 hours of virtual machine time, the real time is only one hour.

After watching a full 10 ancient short films, Gao Gong didn't even fast-forward before Hiro's voice sounded, his tone a little hesitant.

"Found one, but it's not a secure data node."

"It's not safe, what should I say?"

"It was a virus city."

In the cyber network, data nodes are like islands in the sea, used to house AI, hackers, and cyber tribes.

But not every data node is safe.

The safest is naturally the data haven of large enterprises.

However, most of the territory of large companies is not open to the outside world.

Some of the data nodes open to the outside world are cloud servers, some are local area networks in the real world, and some are virtual network communities.

None of them are particularly safe.

After all, even a truly safe place cannot be hacked by cyber hackers.

But the truly dangerous data nodes are ones that even hackers dare not set foot on easily.

Because there are all kinds of Internet viruses out there.

Some of these viruses are ancient computer viruses, some are error codes in human brain servers, some are personality-shattering AIs, and even some destructive neural signals.

All in all, ghosts, ghosts, and snakes dance wildly.

This type of red data node has another nickname - Virus City

“Surely there’s a big data monster out there?”

"It has been confirmed that the underlying framework of the data node has changed."

"That's almost it."

The concept of data, the big data monster, is actually something that is difficult for people to understand.

To put it more vividly, this thing is Du Niang, Brother Gu, and Penguin Chengjing.

Since the cyber network does not use binary data, but quasi-sensory data, huge data flows in and out of network portals over the years, which naturally makes such search engines and chat tools anthropomorphic, becoming a kind of thing between AI and viruses.

Super monster.

Why big data monsters can achieve "data enlightenment" is because they themselves are the result of countless big data enlightenments.

"Let's go."

"you sure?"

"certainly."

Hiro shrugged without saying anything.

Among the group of cyber hackers, there are autistic children, lunatics, freaks, and anti-humanists, but there are absolutely no cowards.

Hundreds of Hiro merged into one, the Internet cafe began to disappear, and a white door appeared.

The door opens, a large amount of data flow covers the virtual machine, the page switches, and the virtual machine disappears.

The two of them were in the air and fell directly from the atmosphere. Rolling data clouds surrounded the two of them, and the data redundancy created a fierce wind.

"Damn it, the system virus has destroyed the underlying structure of this data node!" Hong exclaimed.

"I knew you were unreliable!"

Gao Gong grabbed it with both hands, and a large number of 0's and 1's came out where his fingers were.

[USER DATA LOST]

[USER DATA LOST]

[USER DATA LOST]

[USER DATA LOST]


This chapter has been completed!
Previous Bookshelf directory Bookmark Next