Confused data streams flickered through the cyber goggles in front of him. In a dazzling and colorful data stream, Lin Mo finally saw the world that fascinated countless people.
With the ever-changing neon colors, rotating and flying grids, and illusory and erratic particles, the world in front of you has become "simpler", but also more complex and changeable.
Unconsciously, he was already in the vast network.
This feeling was quite strange. Lin Mo could not feel any sensation of his real body at all. He felt as if he had become a ghost floating in the void, without breathing, weight, or touch.
But his hearing and vision still exist, and this world is particularly vivid and magnificent. Data particles of various colors are like the molecules that construct this world, forming objects of various shapes.
This is a spacious data space, like a large "matchbox" shaped house, with all kinds of objects floating around.
Lin Mo curiously tried to touch the rectangular, rhombus and even circular objects around him.
If he guessed correctly, these objects were network data models he had prepared in advance in the real world.
In addition to instruments and equipment such as hacking base stations, he also kept some other miscellaneous items in the warehouse. In the past, when he was free, he would come here to splice prosthetic equipment to improve his "craftsmanship."
During the time when he was studying in Kangtao, he did try to "splice" a simple speed component with his bare hands in the warehouse.
All in all, this warehouse is actually his small base in Shenyang. It is usually used to pile up sundries and conduct manual experiments, of which network data is naturally used.
For this exercise, he specially created some "models" on the computer in the warehouse, and the various objects that appear now, and even this "matchbox" house, are all his masterpieces.
For example, one of the circular data objects contains data from a past experiment.
Lin Mo tried to reach out and touch it. The moment his palm touched the object, the round object turned into a stream of data and poured into his body. A box appeared in front of him, and the information on it was
his experimental data.
"It's perfect!" He couldn't help but exclaimed. This novel experience was indeed nostalgic.
Looking at the past, even without the concept of "cyberspace", the online world still allowed real people to be immersed in it. Now that the Internet has become a visual world, it will inevitably become more addictive.
However, when Lin Mo continued to "play" for more than ten seconds, he quickly realized a problem.
"Strange, where are Sasha and Lucy?" He looked up and couldn't see the second person in the huge space.
With the help of the hacker base station, Sasha and Lucy will definitely enter cyberspace much faster than him.
But now why is it that I still haven’t seen the two of them even though I’m “online”?
In last night's simulation, there was no suggestion that there would be any problems in today's test.
Just when Lin Mo felt something bad in his heart and was about to log out from the online world, a cluster of "flames" appeared in a corner of his field of vision.
The extraordinary reaction speed was not lost even in the cyberspace. Lin Mo suddenly took a few steps back and watched the cluster of flames vigilantly.
This is a "flame" composed of blue-green data particles. The shape is similar to the flames in the [Minecraft] game he once played in the Blue Star World. It looks like several textures mixed together.
Then, under his gaze, the flame became more intense and powerful, and gradually turned into a raging fireball several meters high, swallowing up all kinds of objects in the space.
Immediately afterwards, the flames exploded silently, and the scattered particles of light floated down like falling rain. A graceful figure appeared at the location where the flames exploded, falling in mid-air, and drifted towards Lin Mo like a flame elf.
Even in the virtual online world, many things are not as clear as reality, but Lin Mo still saw the playful smile on the other person's face.
"What do you want to do? Lucy." Lin Mo sighed and stared at Lucy.
Under his gaze, the girl's facial details gradually transformed into something familiar to him.
——Appearances and shapes in the online world are often not trustworthy. As long as they master the method of changing their shapes, anyone can change their own shape at will.
These shapes can be warriors, dinosaur monsters, or even inhuman things such as a group of indescribable tentacles or a symbolic shape.
Now that she is surrounded by familiar people, Lucy doesn't need to use a "false face" to communicate with Lin Mo.
"I just wanted to scare you, but I didn't expect you to be not scared at all." Lucy joked with a smile.
Lin Mo glanced at her speechlessly, not knowing what to say.
But he could also see that after last night's "surprise attack", Lucy seemed to have let go of some burden, and her attitude towards him was not as cold as before...
In the past, she would never have made such a joke.
"Where is Sasha?" Lin Mo had no choice but to change the topic.
"You can look behind you." Lucy tilted her head and glanced behind him.
Lin Mo frowned slightly, and a bad feeling surged up in his heart like a fire.
The next second, he hid behind Lucy without thinking. His movements were so nimble and professional that Lucy opened her eyes wide in surprise. She glanced sideways at Lin Mo who was hiding behind her, and twitched the corners of her mouth to reveal her helplessness.
A stunned smile.
At this moment, Lin Mo also saw the "monster" that originally appeared behind him.
——A huge demon with green flames. It has thick fangs and a ferocious face. Its breath is like steam. Its powerful and thick body makes it look like an abyss demon running out of the magical world.
The devil seemed to want to scare him, but when he saw him hiding behind Lucy, the devil was stunned. After a while, it gradually shrank until it turned into a petite silhouette.
"I wouldn't have scared you if I had known. Why are you so scared and hiding behind Lucy?" Sasha looked at Lin Mo with a slightly unhappy tone.
"This is not fear, but assessment of the situation. I don't have any combat capabilities in cyberspace. What else can I do if I don't hide when I encounter danger?" Lin Mo said matter-of-factly: "And how can you blame me for this?
Isn’t this because of your prank?”
"This is not a prank..." Sasha looked a little disappointed, as if Lin Mo's reaction did not meet her expectations:
"I deliberately acted like this to show you the devil."
"Devil? You said that the demon image just now was actually a demon?" Lin Mo opened his eyes wide in surprise.
"yes."
Sasha smiled softly, stretched out his hand to wave to the ground beside him, and soon the figure of the ferocious demon appeared, but compared to the huge body that was several meters high, the demon now seemed to be a mini version.
, only a few dozen centimeters in size.
"The Golem - the Blessing Demon, is a variant of the famous golem Hell Hound. According to my personal classification, it is a protective golem. Its function is to counter other offensive golems. Well, to put it simply, it is anti-invasion.
"She explained softly.
Under her control, the demon figure gradually began to perform various actions, like a pet that was obedient and obedient.
Looking at the small demon figure in front of him, Lin Mo was amazed. This was the first time he had seen a visual demon program.
However, he was not too surprised.
Although when he saw this demon just now, he did not recognize the nature of the demon at first sight, but now that he recalled the hacking knowledge he learned in the past, he also understood the reason why the current demon was materialized.
The essence is that the true strength of cyber hackers will be fully revealed in cyberspace.
They are the "magicians" in cyberspace, and these puppet programs are their spells.
And creating a suitable image for the golem program is just a simple means among their many abilities.
Lin Mo has read a lot of information. In the current network world, due to the "masterpiece" of the legendary hacker Bartmos, most of the networks have collapsed and become dangerous "old networks". The small part of the network that humans can use can only be shrunk into black walls.
Under the protection of.
And this also indirectly led to the current situation of lack of cooperation in the hacker community.
——The new generation of hackers cannot imagine the "glory" of the past network world. Compared with the older generation of network hackers, the new generation of hackers are still "resting on their laurels."
To put it simply, the technical development in the hacker field has stagnated, and many golem programs still use "old stuff" from previous eras.
Because of this, in today's hacker community, the "cyber heritage" of past eras is extremely precious.
Some top hackers will also risk their lives to sneak into the "old network" to hunt for gold. If they can obtain a few "spell books" (texts recording golems), they will undoubtedly make a lot of money.
Through the records in those books, Lin Mo also gained an in-depth understanding of several classic puppets in the hacker world of the past era.
Just like the [Hell Hound] Sasha just mentioned. Looking at the past, this is a top hacker puppet. It can locate a target in cyberspace and then send a specific biological signal (who knows what kind of black technology)
, causing the target's body to be severely damaged in reality.
Once the attack takes effect, in most cases the victim will die suddenly and immediately.
And if the attack is dodged by the target, the hound will also hover near the login coordinates of the target hacker, lurking there until the target logs back online and continues to attack, without stopping!
In cyberspace, the image of [Hell Hound] is generally a giant wolf, and other specific appearance details can be set at will by the user.
Other classic golems also include [Anteater] - a program to locate the opponent and attack, [Killer Series] - a program to counter the golem, [Slowdown Cage] - detection, stealth and speed limit, etc.
[In view of the general environment, this site may be closed at any time, please move to the permanently operating source app, huanyuanapp as soon as possible]
In a sense, network hackers are indeed "magicians" in cyberspace. All puppet programs are their spells and magic. They can launch a silent and fierce "spell" in cyberspace at any time.
fight!
...
...
ps: The relevant settings are so complicated... I feel like the explanation alone would take thousands of words, so after thinking about it, I might as well simplify it.