typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 30 Disc System

Russell's glance at the camera crossed countless rivers of data in an instant and appeared before Delphinium's eyes at the other end.

Many translucent windows appeared in front of her, and she was working on them quickly.

With a calm expression on her face, she stretched out her hand to maximize the window. She also dragged many small windows from all around and placed them around to start simultaneous monitoring and operation.

The location of Delphinium's prosthetic interface is similar to that of the Inferior, between the wrists and forearms of both hands.

At this moment, a data cable extended from the interface of both her wrists and was connected to her thick tactical gloves.

She has a rectangular square in the palm of her gloves. They are emitting a considerable amount of heat. If Delphinium presses her gloves on someone else at this moment, she may even burn them directly.

It was an ultra-portable computing device called a "dishboard system."

In this era, the chip embedded in the back of everyone's head can already meet most daily needs.

Such as time, location, payment, watching live broadcasts, browsing videos, playing games... It can almost be said that there is no room for the survival of "personal computers".

Of course, this small chip cannot have high computing power. Otherwise, once it is running, the brain will be burned, let alone playing games.

In fact, these data are downloaded directly from the cloud after being processed with almost completely synchronous ultra-high download speed. Whether you are watching live broadcasts or videos, or Shuishui forums, watching news, or playing games,

This is done by downloading the final image directly after the calculation is completed, rather than processing the data locally.

In other words, the actual role of this chip in daily life is... like the data cable connected from the graphics card to the monitor.

Even those data that are inconvenient for public calculation do not need chips at all - for example, the data platform used by the bartender in front of Russell is the shared computer in this store. Companies also use this large-scale, integrated computer

A standardized computing system... This is actually to ensure that no one takes the computer away or uses the company's computing resources to calculate something for themselves.

So this world is one of "personal notebooks".

So, how do those psychic hackers and cyber detectives manage to navigate the Internet?

Do they each carry giant desktop computers with them?

——That is of course impossible.

Psychic hackers and cyber detectives can even travel directly in the "Matrix" world.

It is a virtual world full of sympathetic illusions. It looks like the real thing, but is actually different... It is a shared world of "psychic network" constructed from seven islands in the sky. The principle is said to be related to the collective subconscious.

The reason why people's download speed can be so fast, even infinitely close to "simultaneous synchronization", is precisely because the essence of this kind of network is not simply electrical signals, but related to psychic energy.

It's not so much a download as it is a "sympathy".

On the other hand, skilled psychic hackers can penetrate into this matrix world. By using psychic powers to attack "ICE" - that is, the network protection system, they can even paralyze the opponent's firewall at the data level.

The biggest difference between psychic hackers and cyber detectives is "understanding". If they understand the matrix world as the "sea of ​​collective subconscious", they can use psychic powers in it, but it also means that firewalls, anti-virus software, etc.

Things on the data level will also be symbolically transformed into entities in the matrix. If you are killed by those things, or even just suddenly disconnected from the Internet, you will become a vegetative state in reality.

The latter only understands the matrix world as the data world and puts itself in a higher data layer. Therefore, it is possible to enter or leave the matrix world at any time.

The common weapon they need is the "dishboard", a highly integrated auxiliary computing device - which can also be understood as a "prosthetic body of prosthetics".

Because discs are undoubtedly contraband at the same level as firearms and cannot pass most security measures, they can never be directly installed on the body as a prosthetic body.

But as a kind of "equipment", if it can be connected to the prosthetic interface at any time... it will be much easier to carry.

There are only three types of people who can use the disk - psychic hackers, network detectives, and information security engineers. The relationship is probably like that of bandits, vigilantes and escorts.

If you have a disk board, you can invade the surrounding network anytime and anywhere. Quickly control the surrounding cameras, display screens... and even directly control the chip on the back of the other person's head, and then control the prosthetic body on the other person's body.

Of course, different levels of users have different strengths of personal firewalls.

There must have been a psychic hacker among the gangsters on the airship.

That's why he was able to accurately release the virus in the first-class cabin - in the same network environment, the virus developed by the Tower of Babel could even destroy the elves' highest-authority firewall.

Different models of decks integrate different types of functions.

In order to ensure portability, it is characterized by specialization rather than omnipotence... By changing the disc, different types of information intrusion can be achieved.

The disc Delphinium is using is called the "Eye of God". It has a built-in "key" that can quickly crack the security protocols of most cameras.

Originally, if you wanted to hack into a camera, it would take more than ten seconds with Delphinium's technology. It might even be discovered by information security engineers.

But if she uses the assistance of "God's Eye", she can control the cameras of all stores in a street in two or three seconds, and can even accurately disable one of the cameras.

As for display screens such as ordering food, billboards, and billboards, they are basically not protected by security protocols. She can control them easily without the aid of a saucer.

Now there are dozens of densely packed windows in front of Delphinium.

These windows were in a semi-arc shape, wrapping her inside. They were like a light shield spread out in front of her.

In order to maximize her concentration on using the "dishboard", expand the window, and analyze data, her work efficiency is much higher when she stays in the office than when she goes out.

Although Delphinium is not a psychic hacker, if it receives too much external interference, it is still possible to leave some tails due to distraction.

In order to prevent fatigue caused by the impact of too much information... and also to avoid directly attacking the firewall of the Hive Nightclub, she used Russell as her own invasion springboard - when the bad guy reported to her that Russell had entered the Hive Nightclub, she immediately

Unfold the disc and plunder the information of all surrounding probes indiscriminately.

Because the moment Russell's chip entered the "Hive Nightclub", he had already connected to the LAN of the Hive Nightclub.

Delphinium immediately controlled the sixteen cameras in the lobby of the Honeycomb Nightclub and closed seven of the windows that could not track Russell's location.

When Russell approached the front desk, relying on the listening equipment at the front desk, Delphinium eavesdropped on the conversation between Russell and the bartender.

So she ran the disk system at full capacity again, quickly collected the cameras in all the rooms in the nightclub, and by opening and closing them very quickly, she found Xiao Liuli's room in just five or six seconds.

Behind the Honeycomb Nightclub is a certain director of Tianen Group. It would be very troublesome to hack into its personal user information database.

But if you just look up today's room opening records, it will be much simpler.

Delphinium relied on the room number that she had already learned to search for today's consumption records, and quickly located the customer's identity information.

Only later did she learn the pseudonym used by Xiao Liuli - this was natural.

Since they all came in wearing masks, of course it was impossible to tell their real names. Otherwise, wearing a mask would be the same as not wearing one?

Before the conversation between Russell and the bartender ended, Delphinium quickly wrote the information on the nearest screen that Russell could see.

Looking at the monitor, Russell took a bracelet from the bartender and registered it under his pseudonym.

Delphinium breathed a sigh of relief.

"So this is what's going on here..."

She murmured softly, obviously also curious about the inside of "Beehive Nightclub".

Although Delphinium felt a little worried when Russell was accosted by the female high school student. But in order to control the scene as soon as possible, she still chose to hijack the camera immediately.

Fortunately, Russell managed to get away from them and was not dragged away, otherwise Delphinium would have had to shake the bad one over to save the situation.

After that, she was not idle either.

After just taking a sip of water, taking off her gloves, and changing a set of plates, she started to invade all the prosthetics in the room using the room where Xiao Liuli was as a benchmark.

Delphinium had used the "God's Eye" to see it before, and there was no monitor in Xiao Liuli's room.

But maybe someone will use a hearing-enhanced prosthesis - after all, you can't retrieve information directly from the brain, and the chip will not record what you hear and see. Even if it is screenshots and videos, the cache files are not local.

, but in the server of the Cyber ​​Order.

Her judgment was obviously correct.

The camera showed that besides her, there were only two girls wearing smiling masks in Xiao Liuli's room.

However, the "Tail Spike-C" disc told her that there were four prosthetic transformers quietly hidden in the corner of this room.

"...What's going on? The level of transformation is more than half.

Delphinium's flying fingers stopped, and she frowned in confusion and murmured in a low voice: "The bodyguards hired by Tian'en Daily are too...professional, aren't they?

“Everyone is actually equipped with a personal firewall, so rich!

"But why... the 'deep sea' type?"

[Deep Sea] is a typical passive firewall and a type of customized firewall. The annual membership fee for the personal version of the genuine system costs seven to eight thousand.

It is not as aggressive as [honeypot] and can track intruders; nor is it like [black ice] that uses inert data to make itself indestructible. The biggest feature of the "deep sea" firewall is that it can greatly

To extend the enemy's intrusion time, it is generally used for corporate information databases and is used with alarm systems as internal wall protection.

It's not good at anything else, but it's perfect for "hard drag". It's like a stone wall without an arrow tower.

And this kind of thing is really meaningless for personal protection.

If you really want to invade, Delphinium can still get in in about twenty minutes.

In terms of personal protection, it is far less safe than "honeypot" and "black ice".

The former can make psychic hackers fearful and afraid to go in, worrying that they will not be able to get out; the latter simply has a too high security level and cannot be opened from the inside without social engineering means, which means it will be impossible to open it.

I always felt that something was wrong. But after thinking about it carefully, Delphinium still didn't get any inspiration.

So she continued the invasion.

Because of the firewall, she couldn't directly take over the other party's prosthetic body authority, but she could make a crawler and find ways to bypass information protection and steal intelligence.

It took about half a minute, until after Russell swiped his card to enter, that Delphinium successfully crawled into the listening data of one of the bodyguards' hearing aid prosthesis.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next