typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 255 You are dead!

The man with glasses has such confidence, so of course he has something to back it up.

It is his professional habit to immediately leave a large number of "traps" after gaining control of the security system. The struggle and control of authority often occur in an instant. Even if you gain control of the system, the loopholes for the enemy's attack are likely to be there.

When you don't expect it, the defender will lose control without even realizing it.

"Traps" can block and delay enemies.

The bespectacled man left numerous traps, including three destructive virus programs, an anti-infiltration bait, two deceptive system files, modified parameters at most key nodes, and implanted "backdoors."

If the enemy takes control away from him, the three virus programs will be activated immediately, causing the entire security system to be "fake paralyzed".

If the opponent tries to remove the virus program, it is very likely to trigger the anti-infiltration bait, a deception program disguised as a system file, and he can obtain more specific information about the enemy, such as location, identity, etc.

And those inconspicuous "backdoors" allow him to easily regain control of the system.

In other words, he has built a complete position in the security system. Any enemy who wants to compete with him for this position needs to face his all-round attack.

He is confident.

The short-haired man is also confident. His companion, nicknamed "Siren", is a terrifying guy who can invade galaxy-level servers, and a dangerous person who can be on the hacker's most wanted list.

And he is equally dangerous!

The short-haired man returned his attention to the army of metal ants he controlled.

In order to build this huge army of metal ants, he carefully planned for half a year, added the necessary equipment and modules through various channels, and kidnapped four unmanned mechanical engineers to build it day and night.

The bodies of the engineers were buried in the courtyard of the park. The weeds nearby grew particularly lush, probably because there was sufficient fertilizer.

Each metal ant is equipped with optical equipment that can be monitored remotely. However, due to the size of the metal ants and the limitations of signal transmission, the definition is relatively low, and the captured field of view is also very narrow.

Of course, in the face of such a huge number of metal ants, these shortcomings are not a problem.

Metal ants have two control modes. One is to set a predetermined plan and the metal ants will execute it automatically.

The other is the manual control mode, such as a small group of metal ants controlled remotely by the short-haired man at this time.

He didn't want to delay. Since the firepower point in the stairs was destroyed, no matter who won the battle with the security system, nothing could stop him from killing everyone in the stairs.

The two metal ants at the front turned the corner from two different routes.

Bang bang!

A dull crashing sound reached the ears of the short-haired man, and the image transmitted by the two metal ants turned into darkness.

On the signal characteristics of the metal ants on the other light screen, two metal ants have a red "X" on them, indicating that they have been destroyed.

Judging from the sound of the attack, it should have been an attack with a blunt instrument such as a hammer.

The metal ant's attack damage is considerable, but its size is destined to be unable to withstand blunt force attacks.

The short-haired man was unmoved. Metal ants were originally a consumption method. In order to be able to consume them, he saved a total of 4126. Now more than 4,000 metal ants are infiltrating into every corner of this building. The loss of one or two

Of no importance.

Two more metal ants pounced on me.

Bang bang!

Two heavy blows were exactly the same as before, and the transmission screen of the two metal ants turned black again.

Nothing could be seen clearly.

The short-haired man judged the opponent's possible position, and four metal ants rushed towards him from different directions.

Bang bang bang bang!

Four metal ants were reimbursed at the same time.

The short-haired man was stunned for a moment. The attack routes of the four metal ants were quite different, and they were attacked at the same time!

How did the other party do it?

Just at this time, a damaged metal ant was captured in front of the carcass. Its head was completely crushed and dented, which was completely consistent with the judgment that the short-haired man had been hit hard with a blunt object.

The short-haired man was a little curious, who else was on the stairs?

According to intelligence, Hank is a two-dimensional dead man with zero combat effectiveness.

The short-haired man could not imagine the scene of a dead man using a sledgehammer to kill so many metal ants.

Almost in the blink of an eye, more than half of the small group of metal ants he commanded were killed or injured, but the metal ants like a tide had already surged in from behind, forming a large and dense mass.

He was determined.

¥¥¥¥¥¥¥¥¥¥¥¥¥

Jasmine entered the security system without any effort.

Hey, three virus programs?

Jasmine's eyes lit up. Any virus program was like a sweet snack to her. The more powerful virus programs are, the higher their core intelligence is and the smarter they are. They already have certain biological characteristics, such as camouflage and reproduction.

, destruction, self-protection.

Many AIs are derived from mutations of virus programs.

Jasmine devoured the three virus programs without hesitation and absorbed their core algorithms, which enriched her algorithm library.

Jasmine, still unfinished, immediately activated the small radar and scanned frantically.

Found a reverse osmosis bait!

Hey... isn't this the [sequin] she made?

When she was still very young, no, she is also very young now. Well, when she was young and not very smart... when the algorithm library was not very rich, she hung out in the hacker forum for a while, [Sequin]

It was at that time that her work was used to exchange some virus programs with other hackers.

[Sequins] is inspired by a fishing method called lure.

This method uses false bait, controls the fishing rod, and drags the false bait to attract fish to bite the hook. Sequins are one type of false bait. They sparkle and attract fish that are easily attracted by light.

Because it was an early work, Jasmine disliked it for being crude and abandoned it long ago. Unexpectedly, someone was still using it...

Jasmine couldn't help but feel a little proud.

She has not set foot in this field for a long time because it is very dangerous.

The core of virus programs is AI. They often mutate and can lose control if you are not careful.

Human beings don't matter, but she is a new human being. Strange virus programs are delicious snacks, but virus programs cultivated by oneself are deadly poisons that can be easily reversed.

Because the virus programs you cultivate yourself will use various algorithms in your own algorithm library, which means that the virus program and the creator have a certain "homogeneous" quality, and the creator's defense mechanism is often easily deceived by these virus programs.

Jasmine has been around for a while and has become smarter... After enriching the algorithm library, she found more interesting things

--play games!

After becoming addicted to games, Jasmine soon discovered that she didn’t have enough money to spend...

Then I started to earn pocket money in various ways, such as data analysis and so on.

My youth...

Jasmine remembered with emotion, how could it be like living in fear of going to class every day now? She skillfully triggered the [Sequin] and entered the command. At that time, she left three backdoors in [Sequin], and she didn't know that there are still three backdoors in [Sequin].

How many can be used?

invalid!

invalid!

Hey, it works!

Jasmine immediately became excited and activated the back door, revealing all the information in the [Sequin] before her eyes.

She followed the clues, found the communication nodes, found the signal source, and

——The geographical location of the signal source!

--caught you!

A cold and cold light flashed in Jasmine's eyes.

"You are dead!"


This chapter has been completed!
Previous Bookshelf directory Bookmark Next