Interdimensional science and technology starting from cyberpunk
Chapter 229 The big hand of the octopus (thanks to Bai Yin’s adoptive father Frozen)
[Lille: Bryce, I’m coming in. 】
[Bryce: Did you come in? Your access. Fuck you. 】
[Lille: This is a legal donation from citizens. 】
[Bryce: Damn it, are you responsible for what happened in the Kabuki District? I asked you to investigate secretly, and you just made the headlines? ! 】
[Lear: The greater the movement in the real world, the more cover can be provided for network activities. The more secretive the cyberspace investigation is, the smaller the movement will be. 】
[Lille: So the greater the movement, the smaller the movement. 】
[Bryce: Brainless! 】
[Bryce: Forget it, let’s report the progress. 】
[Lille: The Tiger Claw Gang has made a big impact. We rescued a stall owner. He supplied illegal Mewtwo equipment to the Tiger Claw Gang. He is familiar with the black market in the market area. I will send you a document on the situation. 】
[Bryce: This is not bad. It is an unexpected surprise. Hacking activities are quite rampant in that place. It may be able to help us target some hackers. 】
[Lille: What about the commission? 】
[Bryce: There are a lot of hackers active in the Kabuki District. I have to go back and ask my colleagues to check the situation. Don’t worry, you will be indispensable in the end. 】
[Liel: OK, the second thing is that we also caught a guy from the Tiger Claw Gang. He confessed about the human trafficking situation of the Tiger Claw Gang, but he kept silent about the man behind it. 】
[Lil: It was done by a guy named Jae Hyun, but he doesn’t know more about it. 】
[Bryce: Damn, these bastards are really beasts. What are you going to do? 】
[Lille: Of course, continue to investigate. 】
[Bryce: It's nice to see these beasts killed, but don't forget that our goal is to investigate the anomalies in Genting. 】
[Lille: I'm sure this matter will be related to Genting. This industry chain also involves the top brass of the NCPD. Someone came to ask for someone just now. 】
[Bryce: I still don’t see the connection with Genting. Did you hand your people over to them? 】
[Lille: No, but isn’t there someone covering Genting? Maybe together. 】
[Bryce: It's possible. 】
[Bryce: Look, I'd love to see someone doing something heroic, but I'd rather you focus on our goals, which are more important. 】
[Liel: Listen, now I have something I need your help with: I want to hack into the NCPD, steal experimental equipment, sneak into the vegetative man's head, and check things. 】
[Bryce:? 】
[Bryce: Did you not listen to me? 】
[Lille: There is no time to explain. Once they finish processing the clues, we will have no excuse to rush to Genting. 】
[Lille: Just say whether you want to help or not. 】
[Bryce: Do it yourself. I have NCPD’s data barriers and ICE architecture plan here. 】
[Liel: Yes, trust me, I will definitely complete the task for you. 】
[File received. 】
[Bryce: Remember your mission. 】
In cyberspace, Lear happened to receive news from River: They had arrived at the NCPD.
The network coordinates were transformed, and a towering digital wall appeared in front of Lille.
Now he wants to break through NCPD's data barrier.
River and Anna walked into the NCPD. There were very few people in the headquarters, and most of them were on duty outside.
Especially since another major incident occurred in the Kabuki District, a lot of police force had to be allocated.
The two entered the police station as if nothing had happened, and then walked through the corridor toward the evidence department.
[River: Lil, we are in a situation. Which interface do you need? 】
[Liel: Wait a minute, let me take a look at the engineering instructions. 】
[River:? 】
[River: Did I say that we need to scan for open available access points first? This was the case when we cooperated with the Network Security Section before. 】
[Liel: It’s true. I’ve received your prosthetic eye. Let’s start scanning. 】
River swallowed and began to doubt Leal's professionalism.
He glanced at all the electronic equipment in the bureau.
【\u003eScanning. Open ports found: 80, 22, 443, 3306, 3389】
[Lille: Can it be connected to the CCTV system? I need to take a look at the network wiring arrangement. 】
[Anna: I’ll do it. 】
【\u003ePort selection: 32105, 22, 2939, 2】
【\u003eInstruction received. 】
Ports are like coordinates in a maze. Using these ports as coordinates, Lille's position in cyberspace changes repeatedly.
The path of change happened to cross the barrier built by ICE and all the way to the inside of the barrier.
Barriers alternate and change before Lille's eyes, and may even pop up like traps--
This scene may seem soft, but in fact, if a hacker touches these walls when trying to bypass data barriers, he will be caught up by ICE, and the entire fortress will be turned into a weapon, flooding into the hacker's brain, disrupting computing equipment, Endlessly improve computing speed.
This is caused by the underlying design of the cyberspace access protocol. Hackers can either find equipment with equal computing power for a head-on confrontation, or they can timidly risk the possibility of running into ICE and quietly bypass these walls.
Of course, if you know the construction logic and add a little trial and error, it is completely feasible to bypass these deadly protective devices.
In cyberspace, Lear passed through the outer layer of the data barrier and reached the second layer.
It was still far away from the Evidence Branch database - at least Leal couldn't scan what he wanted from this layer of data.
NCPD also uses multiple subnet settings internally, which requires further physical hacking.
The data barriers in cyberspace are very different from buildings in the real world. Lille compared a large amount of data and found the next potentially useful port and the area where it existed.
[Lille: Workstation 3. 】
[River: That is the area under the jurisdiction of the distance network security engineer. 】
[Lille: The camera won’t record you, just stay away from people. 】
[River: I'll do it. 】
River put on his police hat and strutted across the yellow line that read "Internet Security Authorization Zone."
The camera scanned River's face without making any sound.
River's heart was beating fast, but he showed no emotion at all.
All the way to the door of workstation three.
[Lille: There is a hacker inside, and there may be an accomplice. Please be careful. 】
[River: That’s not called an accomplice, it’s called a colleague. 】
River gently opened the door. A hacker was lying in the access chamber, and the other hacker was sitting at the table eating something with his back to the door.
You can clearly see that the hacker's hands are trembling: this is an occupational disease caused by long-term network security work, and there will be more or less neurological problems.
River sighed inwardly and walked up quietly.
[Lille: Use personal links if conditions permit. 】
[River: Are you sure you can bring him down in an instant? NCPD hackers are no dabblers, and their security systems are all imported from network supervisors. 】
[Lille: I’m sure. 】
River gritted his teeth, pulled out the personal link from his palm, and inserted it into the interface on the back of the hacker's head.
The hacker reacted immediately - maybe in less than 100 milliseconds, he judged that he had been penetrated.
But Lille completed the process of bypassing ICE and launching the attack within 50 milliseconds after he reacted.
【\u003ePort link in progress. Tool introduced successfully】
So the hacker flopped down on the table and fell asleep.
River inserted the personal link into the back of the access warehouse hacker's head.
The two high-level permissions gave Lear a lot of room to operate - now he replaced the hackers lying on the table and in the network warehouse.
In addition, there are two hackers in the domain - NCPD seems to like to overlap.
But one good hacker can defeat dozens of hackers.
In cyberspace, Lear stepped forward and entered the core database of NCPD.
This is a treasure trove-like cyber image, where important data is sealed in small data fortresses with the same appearance.
[River: Don’t think about those key documents. 】
[Lille: Got it. 】
【\u003eConnecting. Login successful, obtain high-level permissions】
【\u003eFetching. Data includes: evidence department data, NCPD list, NCPD work log】
【\u003ePermission to write】
【\u003eCleaning up. The operation is completed and the digital track is completely cleared】
The NCPD core database has set access time limits for everyone to ensure that no one copies the information.
Unfortunately, Lear's computing power is much beyond that of normal people, and he still has two accounts.
When Si'an Westan started, the speed of cyberspace slowed down significantly, which was a bit unbelievable. One second in cyberspace was extended to five seconds for Lille.
For normal reading, the operator will have the relevant file number and complete the reading quickly.
But Lear wanted to crack into as many databases as possible and then copy the information.
At this moment, the little octopus suddenly jumped out, looked at the dazzling array of databases, looked at Lille excitedly, and pointed its octopus arm towards the database.
[xe: Can you let me grab it? 】
Leal thought for a moment.
This is a rather risky move.
AI is not necessarily better than humans in cyberspace, especially in designated job categories.
But he really needs to understand his symbiotic AI.
[Lille: Try it. 】
With Lear's consent, the little octopus left his body and posted it on the database.
The huge computing power was transferred from Lille to the little octopus.
Then Lille saw that the octopus began to expand suddenly, the tentacles on its body became longer and larger, and the suckers became more and more delicate--
Beyond Lille’s imagination!
Those safes that store data, it's more like the entire cabinet has been uprooted!
A system pop-up box that had not popped up for a long time appeared in front of Lille:
[Your symbiotic AI has absorbed enough computing power and reached the upper limit of computing power for the first time. 】
[AI Tendency Construction: Data Capture]
[Adapts to any type of data for rapid identification and copying. AI will capture data based on the terms you set and generate original data streams to fill in the core code. 】
[AI with this characteristic will have advantages in data processing, decoding and deciphering. 】
The entire cyberspace represented by the database thought this giant octopus was shaking--
The server cannot bear such exaggerated data exchange!
Lille hurriedly shouted:
[Lille: Grab documents related to Mewtwo! Don’t catch everything! 】
You'll Also Like
-
The extraordinary life of a certain American comic
Chapter 200 6 hours ago -
American comics: Starting from a copycat arms dealer
Chapter 231 6 hours ago -
From the waste of spiritual roots to the practice of asking the devil
Chapter 380 6 hours ago -
Expedition to Europe
Chapter 1080 6 hours ago -
Trickster Hunter
Chapter 363 6 hours ago -
The giant corporations that started in Night City
Chapter 385 6 hours ago -
The apocalypse is weird: I am the number one containment object, what's wrong with being a litt
Chapter 612 6 hours ago -
Time and space transaction: Exchange food for the elf princess at the beginning
Chapter 503 6 hours ago -
I, the villain, trained the loser into a dark boss
Chapter 374 6 hours ago -
One Piece: The Straw Hat Pirates' Max-Level Swordsman
Chapter 462 6 hours ago