typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 46: Kwai Lily

This is not unwarranted confidence.

Russell even had several solutions to this problem...

His psychic "invisible weapon" can directly penetrate the surface of the iron mask, penetrate deep into it, and cut off the designated line; he can also directly cut off a small piece of skin connected to the child's iron mask.

Russell also knows how to use a disc - he can use it to perform traditional data intrusions, and he also has psychic hacking skills and can drill in using his avatar form.

...Compared with investigating "devils" and sneaking into nightclubs, bomb disposal and invasion are what Russell is best at.

Rather, he killed several people after joining the company before finally seeing the first problem within his professional field.

——The problem of modern college students’ mismatched professional work needs to be solved urgently.

Since there are still ten minutes left, let’s start with the most flexible way.

The model of Russell's left prosthetic limb is called "Sunflower Lily". This is the name Russell gave him... This flower also has another name, called "Astrology Lily".

It is an intrusion prosthetic with sixteen interfaces - usually used by psionic hackers, and only models from six to eight interfaces. The special thing is that there are two more disc interfaces, and some have two more.

Common interface.

For combat prostheses and camouflage prostheses that have no engineering requirements, the number of interfaces must be less than four.

A universal interface that can be used to physically connect with others or insert a chip. This is a necessary interface for all prosthetics. Sometimes there are two, one of which is used as a backup.

Coupled with the calibration link adapted to most long-range weapons... Some firearms in this era no longer require the use of crosshairs and sights for aiming, especially automatic weapons, which can be directly physically linked to the weapon interface, using the back of the head

The chip collects information from other target capture prostheses, processes and calibrates it, and displays the aiming interface in front of your eyes for real-time calibration.

The scene in their eyes is like a shooting game - it will even prompt the "size of the crosshair" and the distance to the target. The more advanced software also has built-in perspective, and if the arm has a prosthetic body, it can also be equipped with self-aiming.

When moving the firearm, it is like using a gyroscope to turn the handle.

Another necessary interface is used when plugging in some special plug-in interfaces. For example, when the prosthetic eye modification is not carried out, a sight can be plugged in. For example, when on an airship, those black bodyguards...

The red light emitting from their heads is an auxiliary aiming plug-in called "Cyclops". Similar plug-ins also include adaptive gas masks, as well as "equipment" such as jet packs and magnetic boots.

Using a switch to start is too slow.

Just like the battle card drawing that Russell complained about before - this kind of device must be connected to the prosthetic interface in advance, and then activated directly when needed.

The reason why everyone in this world has prosthetics is not for aesthetics, nor for any disability, nor to optimize physical performance.

The purpose is very simple, which is to at least provide a data interface for the chip.

Otherwise, you won’t even be able to add friends, and you won’t be able to transfer any important data offline.

Although the chip itself does not need to be charged, if it is equipped with a prosthetic body with more complex functions, it will need to be charged occasionally. The interface itself can also be connected to a charger.

Sixteen interfaces are the theoretical maximum number of interfaces that a prosthetic body can hold. Before this year, this "theoretical maximum number" was twelve.

Although in normal use, in most cases, only one or two interfaces will be connected at the same time, and at most, more than four interfaces will not be connected simultaneously... However, in terms of design, it is absolutely not allowed to "data will be lost once too many interfaces are connected."

"flow, lag, overheating" situation.

Once you exceed eight interfaces, special protocols are required to keep things running.

"Aoi Lily" is called this because it is the first batch of new engineering prosthetics adapted to the "Astrologer Protocol".

Although positioning is for intrusion, it is equipped with a rare interface with a special protocol, and can even be directly linked to the computing hub of a large workstation, or invade a giant engineering robot - even the "annealing nerve center" that requires special equipment to enter

, Russell can directly invade with naked connection.

Not to mention this is just a small iron mask.

This small metal device is most likely used to write data using a magnetic connector.

So Russell raised his left arm, and with a thought, a magnetic connector and a data cable suddenly popped out of the prosthesis on his left arm.

"Are you okay?"

The inferior frowned, still a little worried: "You can also go in first to take a look and collect some information. Then tell me when you come out. I will talk to the Delphinium on the road first..."

"When you see me carrying this unpopular access line with me, you should know that this is no problem."

Russell replied without hesitation.

Different from his cautious tone before, Russell's words at this moment were full of the confidence of a professional.

"Oh, by the way, what TPT is used for this intrusion protocol..."

The inferior quickly added.

"I understand."

Russell responded casually.

He turned back to look at the inferior, the corners of his mouth raised slightly: "You know what?

"The company that is best at network security and artificial intelligence technology is Sogo Technology Group; the core talent training base under Sogo Group is Sogo University; the core college of Sogo University is the School of Information Security and Intelligence Control... and I have been in college since I was a student.

Until I graduated from graduate school, I was always the top student in our grade.

"Although I may have less experience, technically... I don't think I'm any worse than Delphinium."

He doesn't need to use ordinary protocols at all.

The "Astrologer Protocol" has built-in a variety of conventional protocols directly... This is the "Unified Protocol" that Sally Ruth is planning in recent years. It is compatible with more than two hundred protocols on the market, allowing the public interface to be used only through an adapter cable.

, without using engineering prosthetics, it can also directly connect to external devices with rare interfaces.

Although Russell's mentor Sally Ruth likes to design prosthetics, her real expertise lies in her ability as a network security engineer.

Nowadays, almost every company and every director is equipped with "A·ICE" - an anti-intrusion electronic technology whose scientific name is "offensive defense", which was invented by Sally Ruth.

Without the underlying technology of A·ICE, today's psychic hackers can enter almost anywhere they want and control almost anyone's prosthetic body.

But now, if their avatars try to break into this invisible A·ICE, they will be instantly infected by a massive amount of spam.

It can even overheat their chips, which in turn will fry their brains... At the end of the day, it can also leave "frostbite traces" for reverse tracking. More advanced models can also reverse tracking immediately, or temporarily ban them.

The other party's ability to enter the matrix world.

Sally Ruth has successively invented seven types of defense walls, including Type A, Type B, Type D, and Type T, and has continuously carried out technical updates and maintenance on them, and these technologies are completely open source.

The biggest difference between a defense wall and a firewall is that the defense wall is specifically designed to fight against psychic hackers who can directly destroy underlying data, rather than viruses or other types of intrusions.

Today's commercial firewalls and commercial defense walls, whether they are "Black Ice", "Honey Pot" or "Deep Sea", are all extensions of Sally Ruth's underlying technology. And the ice cone that can break through this level of ICE is only available in

Among several of the largest psionic hacker organizations, only after breaking the ice can the avatar be used to invade - and if one does not use the avatar to enter, that is to say, if one does not use the unique means of psionic hackers, the disc must be used.

Built-in "golem".

The golem is similar to the Trojan horse virus of the old era.

But unlike the Trojan horse, the behavior pattern of the golem is highly automated...as long as it is released, it can complete its tasks and then self-destruct, just like a golem that acts autonomously.

These golems are integrated into those disc boards.

However, the magic dolls built into these disks must be assisted by these hackers' cloud servers - the most critical "ice pick" technology is not integrated into the magic dolls at all. Otherwise, it can only be done with such a small piece of metal.

The calculations carried out simply cannot penetrate the various defense walls of this era.

Yes, the highest-level psychic hacking organizations almost no longer engage in hacking activities.

Instead, they sell "starter packages" and "upgrade packages" necessary for hacking operations to make profits. All the discs they sell at low prices are time-limited. If you don't renew after the expiration, they will become invalid directly, or the download will be broken.

The ice pick becomes very slow.

But if you renew, some "optimized packages" will be bundled and recommended that are not used at all.

For example, the "God's Eye" used by Delphinium can only hack into six ordinary public cameras. If you want to hack into pocket cameras, private cameras and prosthetic eyes, you have to pay extra.

You will need to pay more to hack into the speaker, and you will need to pay more to hack into the screen.

It can be said that they separated the functions of the disc board so that it can look "more luxurious" when packaged.

All open source firewalls and defense technologies based on Sally Ruth's development have fixed vulnerabilities. This is why no matter how companies update their protection systems, the disk can be effective quickly and effectively.

And this is actually the backdoor Sally Ruth left for herself to invade.

——After all, those who build firewalls cannot keep themselves out.

There are more than sixty attack programs integrated into Aoi Lily. Sally Ruth even classified Russell, allowing him to call the corresponding cracking program in front of any defense wall with one click.

From this point alone, it can be seen that Sally Ruth attaches great importance to and trusts Russell.

and a strong desire to support.

"Don't be afraid, kid."

Looking at the child who was still trembling slightly, Russell held his head with both hands and comforted him softly: "Remember... don't sit down when standing, don't squat down. If your feet are sore, you can jump lightly. Don't hurt your brother."

Pull off the thread... just hold on for ten more minutes and you will be saved.

"Come on, okay? I'll be with you."

This is appropriate and reasonable comfort.

To prevent the "patient" from directly pulling off the thread due to excessive tension - although there were inferior people watching for Russell, Russell still habitually gave instructions first.

Seeing the boy nodding slowly, Russell smiled with satisfaction.

"So good."

Russell said softly.

He knelt down on the ground and closed his eyes.

[Please select access mode]

——Invasion mode.

When Russell gently pressed the button, a harsh warning sounded in his ears.

[The accessing party sets the connection rules to - intrusion mode]

[Warning, this physical link will forcefully unlock data exchange permissions!]

[Warning, this physical connection will forcefully unlock administrator rights!]

[Confirmed without permission, determined to be malicious intrusion]

【warn--】

Russell couldn't hear the sound after that.

Because the avatar he turned into data has flowed into the little iron mask along the physical link.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next