typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 82 Hacker Classroom

As a senior network hacker, Sasha’s professionalism goes without saying.

In terms of popularizing and educating Lin Mo about "enlightenment" hacker knowledge, Sasha explained many things in a simple and easy-to-understand way, explaining the profound in a simple way, which made Lin Mo gain a lot.

And he also understood one thing, that is, the hacker settings in the game cannot be applied to the current cyber world that has become reality.

At this point, Lin Mo could guess it even without Sasha's guidance.

After all, how can the simple settings in the game compare to the complexity and variability of reality?

However, there is a lot of common sense in common, such as the explanation of RAM, network access warehouse and quick cracking, etc., which are also very different from the settings in the game.

In reality, hackers also need to adjust their hacking strategies (intrusion protocols) to deal with different enemies.

Quick cracking is a brainless, one-step attack method that often uses the simplest and most effective method to hack into the opponent.

As for what this "method" is, every hacker has his or her own approach.

Some people break into ICE like a battering ram, while others secretly bypass ICE's protection.

The differences in these "methods" will also lead to different RAM consumption. The more sophisticated the hacker, the more effective their unique "methods" will be, and the lower the RAM consumption will be.

When hearing about this knowledge, Lin Mo also thought of intelligence attributes.

The more skilled the hacker, in other words, the hacker with higher intelligence attribute, the less RAM they consume when hacking, which is very similar to the setting in the game.

"Tell me, what else do you want to ask?"

Sasha sat quietly on the chair, with a calm and indifferent expression. Her upright posture highlighted her charming body curves, like a delicate Siamese cat.

Lin Mo also sat opposite her with a serious face, his expression serious like a good student who was obediently listening to the class. Facing the teacher's question, he raised his little hand and asked studiously:

"Teacher, I would like to ask, what is self-ICE?"

At that time, Sasha wanted to hack into Brutus' brain processor, but was resisted by a prosthetic body called "self-ICE".

Lin Mo knows that Self-ICE is a prosthetic body in the game, but what is the principle of [Self-ICE]?

Seeing Lin Mo pretending to be "I am a good student", Sasha couldn't help but smile. She put her elbows on the armrests, her fingers on her temples, and looked at Lin Mo with soft eyes:

"Self-ICE, whose full name is Self-Confrontation Electronic System, is an electronic prosthetic implanted in the frontal cortex, which is right next to the processor in everyone's brain."

"And its function is actually very simple. This prosthesis is a mechanical structure similar to a small plug-in. It has several built-in ICE defense systems to protect the safety of the user's whole body."

Having said this, Sasha held her chin, looked into Lin Mo's eyes, and said with regret:

"Actually, if it just provides a few additional ICE defense systems, then it's nothing. At most, the turtle shell is thicker."

"But the most brilliant thing about this prosthetic body is its replacement. As long as a hacker tries to hack into the prosthetic implanter with a quick crack, this prosthetic body will replace the user's ICE network in a very short time.

Offset the effect of the quick crack."

Lin Mo suddenly realized it and expressed his opinion:

"So this is like a replaceable city gate. When a hacker tries to break through the city gate, this prosthetic body can quickly change to another city gate, making the hacker's attack method immediately ineffective!"

Sasha nodded, with a satisfied smile on his lips.

"You're right. This is also the most difficult point of self-ICE. When being hacked, you can instantly switch to the next set of ICE. Unless the hacker can quickly hack in the short time it switches, otherwise the implanter will

Will be immune to current quick cracks."

"The current attack is immune, can hackers continue to use other golems to hack?" Lin Mo asked again.

In the conversation just now, he also learned that if a hacker uses a quick crack, no matter whether it is effective or not, the golem will go into cooling down, and it will take a while for the network access warehouse to reconstruct the [golem].

In other words, if the opponent is immune to this attack, unless you wait for the cooldown to end, you can only use other types of quick cracks.

Sasha touched the ends of her black hair, thought for a while and replied:

"Yes, but the premise is that hackers must have multiple sets of quick cracking components. This is not a simple matter."

Lin Mo's eyes narrowed, revealing some doubts.

What's wrong? Why does it sound like quick cracking components are so rare?

When he first played the game, Lin Mo still remembered that most of the hacking components only required the player's intelligence attributes to meet the requirements, and they could be produced after activating their expertise.

If that doesn't work, just find a hacker store, which also sells many quick cracking components.

Looking at Lin Mo's puzzled look, Sasha seemed to understand what he was thinking, so he continued to explain patiently with a smile:

"Perhaps you have misunderstood some common sense about hackers. For us network hackers, quick cracking components are our last trump card against the enemy. Do you think these trump cards can be easily exposed?"

Lin Mo shook his head: "It is indeed impossible to expose it easily."

Sasha's smile became even brighter, she held her chin in her hand and looked straight at Lin Mo.

Every time she smiles from the bottom of her heart, her beautiful eyebrows will always narrow, revealing only her beautiful eyelashes and a touch of pink eye shadow.

"Let me ask you again, the quick cracking component is the materialization of the golem program, and then it is loaded into the network access warehouse. Generally speaking, apart from making it by themselves, how can hackers obtain it?"

She asked like a teacher asking a student in class.

Lin Mo pondered for a while, frantically searching his brain for clues to the answer to the question.

Finally, his face became a little strange, and he tried to answer a little uncertainly:

This chapter is not over yet, please click on the next page to continue reading! "Spend money to buy on the secret black market?"

Sasha's slightly arched eyebrows widened instantly, and she stared at Lin Mo blankly, blinking several times in a row, as if she didn't expect Lin Mo to answer like this.

After a long time, she sighed and said helplessly:

"You rich kids, do you really think that you can buy everything with money? If you buy hacker components from unknown sources on the black market, you won't be afraid of getting viruses? Besides, really good goods are not so easy to buy back.

?”

Seeing Lin Mo's innocent look, Sasha did not continue to show off, and then replied:

"In the City of Night, for every wild cyber hacker, there is one thing they cannot escape on their way to becoming a cyber hacker, and that is to enter cyberspace, commonly known as cyberspace."

Lin Mo raised his eyebrows. After hearing this, he finally came to a field that he knew a little bit about.

After all, he has been in this world for a long time, and he still knows a little bit about the common sense of cyberspace.

In this world, in addition to using regular terminals, computers or personal cables to access the network, there is often another way for network hackers (network walkers).

That is to use a special network interface, coupled with a special network eyepiece, a network hacker can sense and connect to the network world in a 3D view.

Behind this intuitive way of observing the online world is a huge amount of data transmission. If ordinary people do not undergo specialized training like hackers, they will basically "roast their brains" every minute due to nerve overload, which will lead to body temperature and height.

die.

Even specially trained hackers need some external equipment to assist them.

For example, a bathtub filled with ice cubes is a cheap and practical way to reduce body temperature.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next