typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

A brief introduction to hacker knowledge

Since the hacker setting in "Cyberpunk 2077" is too complex and too cumbersome to include in the plot, it is better to list it separately.

Of course, readers who have played the game probably don’t need to read it, and readers who have read the related works probably don’t need to read it either.

The following content is divided into noun explanations and remaining settings. If you want to save time, just read the noun explanations.

Of course, the following things may not be comprehensive, and there will definitely be some omissions. If necessary in the future, the author will make up for it, and will also post it to the work-related website later. (Oh, it would be nice if these things could be used as daily updates.

.)

First is the explanation of terms.

RAM: Temporary data storage medium (main memory), which is the same as the wizard's spell slot and blue bar. The amount of RAM generally depends on the [network access warehouse] used by the network hacker and his intelligence.

[ICE]: Network firewall in the cyber world

[Quick Crack]: A hacker's attack method, an instant hacking method, which can be regarded as an instant spellcasting by a mage.

[Invasion Protocol]: The strategies and methods of hacking are different for every hacker. Just like the problem-solving ideas during exams, the more skillful the hacker, the stronger the intrusion protocol will be.

[Magic Doll]: Just think of it as a network virus, but it is much stronger than a network virus. To hackers, this is a spell.

[Quick Crack Component]: A very tiny chip that can be installed into the network access warehouse. The hacker uses the network access warehouse to code in advance to create a [golem] attack method.

Generally, they are super large monsters that require consuming RAM to be released. They have significant effects and can directly affect the human body.

It can be simply regarded as a skill in the skill bar in the game. You must drag the skill to the skill bar before you can press it with the shortcut key (equivalent to putting the component into the network access bin) to cast this spell (golem).

[Network Access Warehouse]: An indispensable equipment for becoming a network hacker. It allows network hackers (network runners) to access the huge network data flow at any time.

It can be regarded as the mage's wand, but for hackers, the network access warehouse is more important than the mage's wand. Without it, quick cracking is impossible.

Among them, network access warehouses with different technical specifications can load different numbers of quick cracking components.

The network access bay is also similar to a graphics card. It is a weapon in the hands of network hackers. Using a higher model access bay is like holding a sniper rifle, but you are holding a small dagger to snipe at someone's door.

Of course it's hard to compare.

Of course, if you have high intelligence and can have an intelligence of 20 like Buttermos, then it is not impossible to use a low-end network access warehouse. You can cut your butt with a knife and kill the enemy to death.

Remaining settings:

1. Facing different enemies, due to the different ICE protection capabilities of the processor in the opponent's brain, the RAM consumed by the hacker is different.

2. The hacker’s own ability will make the upload speed different.

3. If you are a trustworthy person such as a teammate, if they give you authorization, it will be equivalent to someone else giving you the computer to play around with. You can ignore any of the above restrictions in the hacking process and do whatever you want, such as in anime.

Qiwei uses [System Reset] on Rebecca

4.Type of golem:

Similar to [Electromagnetic Short Circuit:], [System Reset], [Prosthetic Body Failure] and other golems that act on the human body, they are collectively called super large golems. These golems are large and complex, and almost no network hackers can

It is made up on the spot during the battle, so [Quick Hack Component] is needed

5. When a hacker invades, it is just like a virus invading your computer. It is done secretly. Of course, it does not rule out the possibility of being discovered by the enemy. **** There will be a prompt when V is hacked by the enemy, but the voodoo in the plot

When helping to implant the "Light Chaser" golem, V didn't notice it at all)

6. I haven’t thought about it yet, I will add more if possible in the future.

Here's what a hacker does when attacking an enemy.

First of all, hackers generally have two options when hacking an enemy.

First, first break through the current local area network ICE. After breaking through, all the machines and equipment connected to the local area network, human brain processors (brain computers), protection systems, etc. will be affected to a certain extent.

As for what this impact is, it depends on what devils and methods the hackers have.

Afterwards, due to breaking through the LAN ICE in advance, network hackers will definitely gain certain benefits. After that, hacking will be much easier, and the subsequent operations will be the same as [Part 2].

Secondly, if you are brave and skilled, or if there is no local area network in the current area, then there is no other way. You can only hack directly without any "foreplay".

The intrusion methods of network hackers are divided into physical and remote.

Physical intrusion is to merge into the network through data lines. Ordinary small data transmission can use personal connection lines, but if it is an act that requires huge data stream transmission into cyberspace, it will require neural intubation in the back of the head, which is a hacker.

With the assistance of equipment such as chairs, hacker chairs can improve brain computing capabilities

Remote access:

Function 1: Remotely access other people's brain processors, forcibly generate a data link in cyberspace to connect the two parties, and use data transmission to quickly crack. Because it is a single data link, the traffic that can be transmitted is limited, and it cannot be connected to other people.

The equipment needs to be accessed one by one, and the methods that can be used are limited. Only some simple commands can be used, such as quick cracking and implanting golems.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next