He turned his head to look at the inferior, the corners of his mouth slightly raised: "You know what?

"The company that is best at network security and artificial intelligence technology is Sogo Technology Group; the core talent training base under Sogo Group is Sogo University; the core college of Sogo University is the School of Information Security and Information Control... and I have never been in college. He has always been the chief of our grade until he graduated from graduate school.

"Although I may have less experience, technically... I don't think I'm much worse than Delphinium."

He doesn't need to use the normal protocol at all.

The "Astrologer Protocol" directly has a variety of conventional protocols built in... This is the "Grand Unification Protocol" that Sally Ruth has been planning for the past few years. , Without the use of engineering prostheses, external devices with rare interfaces can also be directly connected.

Russell's mentor, Sally Ruth, loved designing prosthetics, but her true specialty was her ability as a cybersecurity engineer.

The "A·ICE"—the anti-intrusion electronic technology scientifically known as "offensive defense wall"—that is deployed by almost every company and every director is invented by Sally Ruth.

Without the underlying technology of A·ICE, today's psychic hackers can enter almost anywhere they want and manipulate almost anyone's prosthetic body.

But now, if their avatars try to break into this invisible A·ICE, they will be instantly infected by massive amounts of spam.

It can even overheat their chips and blow up their brains in turn... At the end of the day, it can also leave "frostbite marks" for reverse tracking.Some advanced models can also reverse track immediately, or temporarily block the opponent's ability to enter the matrix world.

Sally Ruth successively invented seven types of defense walls, including A-type, B-type, D-type, and T-type, and continuously updated and maintained their technologies, and these technologies are completely open source.

The biggest difference between a defense wall and a firewall is that the defense wall is specially used to fight against psychic hackers who can directly destroy the underlying data, rather than viruses or other types of intrusions.

Today's commercial firewalls and commercial defense walls, whether it is "black ice", "honeypot" or "deep sea", are all extensions of Sally Ruth's underlying technology.The ice-breaking cones that can break through this level of ICE are only in the few largest psychic hacking organizations.Only after the ice is broken, can the phantom body be used to intrude—and if the phantom body is not used to enter, that is to say, the unique method of psychic hacking is not used, and the "magic puppet" built into the disc board must be used.

Golems are similar to the Trojan horse viruses of the old days.

But unlike the Trojan horse, the behavior of the puppet is highly automated... as long as it is released, it can complete the task by itself and then destroy itself, just like a puppet that acts on its own.

These puppets are integrated in those discs.

However, the puppets built into these discs must be assisted by the hackers' cloud servers-the most critical "ice-breaking cone" technology is not integrated in the puppets at all.Otherwise, the calculations that can be performed by such a small piece of metal simply cannot penetrate the various defense walls of this era.

Yes, the highest level of psionic hacking groups, in fact, hardly ever hack at all.

Instead, they sell “starter kits” and “upgrade kits” necessary for hacking for a profit.All the discs they sell at low prices are time-limited. If you do not renew after the expiration, they will directly become invalid, or the download of the icebreaker will become very slow.

But if you renew, you will also be bundled and recommended some "optimized packages" that you don't need at all.

For example, the "God's Eye" used by Delphinium can only invade public cameras of six common models.If you want to hack pocket cameras, private cameras, and prosthetic eyes, you have to add another layer of money; if you want to hack speakers, you have to pay more;

It can be said that they disassembled the functions of the disc board so that it can look "more luxurious" when packed.

All open source firewalls and defense technologies developed based on Sally Ruth have fixed loopholes.This is also the reason why no matter how the company updates the protection system, the disc board will be effective soon.

And this is actually the back door that Sally Ruth left for her to invade.

——After all, the people who build the firewall can't block themselves out.

In Kui Lily, more than [-] attack programs are integrated.Sally Ruth even categorized Russell so that he could call the corresponding cracking program with one click in front of any defense wall.

Just from this point alone, we can see that Sally Ruth attaches great importance to and trusts Russell.

and a strong will to support.

"Don't be afraid, child."

Looking at the child who was still trembling slightly, Russell supported his head with both hands, and comforted him softly: "Remember... don't sit down or squat down while standing, you can jump lightly when your feet are sore. Don't put brother Rip off the thread... just hold on for another 10 minutes and you'll be saved.

"Come on, okay? I'll be with you."

This is an appropriate, reasonable consolation.

Prevent the "patient" from directly tearing off the thread because of excessive tension - although there are inferior people who help Russell to watch, Russell still habitually gives instructions first.

Seeing the boy nodded slowly, Russell smiled with satisfaction.

"So nice."

Russell spoke softly.

He knelt down on the ground and closed his eyes.

【Please select the access mode】

- Invasion mode.

When Russell tapped the button lightly, a piercing warning sounded in his ears.

[The access party sets the connection rule to - intrusion mode]

[Warning, this physical link will forcibly unlock data exchange permissions! 】

[Warning, this physical connection will forcibly unlock administrator privileges! 】

[Confirm that there is no permission, judged as malicious intrusion]

【warn--】

After that sound, Russell couldn't hear it.

Because his avatar transformed into data has already flowed into the little iron mask along the physical link.

Chapter 47 Lucky Life

When Russell "opened" his eyes again, he had turned into a dune cat.

He was in a black, starless void.

Turning into one's own relatives in the matrix space - this is the common form of intrusion by psionic hackers.

If this method is not used, it is easy to cause disorientation and confuse reality and matrix space... After all, memory attack is the most common means of counterattack; and if it is a shape that is too irrelevant to oneself, it is easy to cause self-damage in the offensive defense wall leading to the collapse of consciousness.

The cat is in a pure black maze, turning around to examine everything in front of it.

The material of the maze walls is reminiscent of obsidian, because their surface has no metallic luster, and there are some uneven defects.

Every defect is a big or small loophole.

And the current Russell hasn't even touched the defense wall... This is just the outermost firewall, a static defense used to block ordinary intruders.

Russell licked his paws calmly, jumped up and down twice to move his limbs, and then jumped high.

He threw himself on one wall, then turned back and jumped to the next adjacent wall.Among the two walls forming a right angle at ninety degrees, Russell bounced lightly and climbed to a height of three to four meters.

This is the limit of protection of the labyrinth wall - if the plate is used to invade, it will take a while to bypass or smash the wall.

Russell gracefully walked on the wall of the maze, then jumped high and jumped directly to the wall on the opposite side when he needed to make a detour.Repeatedly, he didn't even make a detour, just jumped twice to reach the other side.

It took Russell less than 10 seconds to bypass the inert firewall that can trap ordinary hackers for at least 20 minutes.

"……Um?"

After he jumped over the maze wall, he suddenly raised his tail vigilantly.

The moment he landed, the flames burst into flames—the vast wildfires in all directions completely obscured his vision, and the pain fell on Russell immediately.

What is unreal is that the cat's body is completely engulfed in fire...but the hair on his body is not burning.

"It turned out to be a 'bolide'?"

Russell meowed, feeling a little puzzled for a moment.

This is a rather old defense wall, so old that it has long since disappeared from the market.

It took Russell about two seconds to recall the existence of this thing.

The special feature of "Bolide" is that it is a special kind of offensive defense - its offensive method is that when anyone touches the defense without verifying the key, it immediately transmits Burning pain.

In the offensive defense wall, the most commonly used countermeasures are "memory damage", "pain signal", "reality positioning", and "matrix ban".

The "fire meteor" was once the ancestor of the "pain signal" type of offensive defense.

Its defense logic is as follows: first, immediately conduct an indiscriminate attack on all requesters.It converts the pain sensation of human beings when they are burned by flames into data signals, and then outputs overwhelmingly different intensities of burn pain sensations.

If there is a key in the target chip, then of course it can be passed quickly, and the pain will not be too long... But if you try to break through the defense wall, it will become more and more painful, and may even directly kill people.

For ordinary users, it will only hurt a few tenths of a second when passing by the company.It's like burning your finger with a candle.

But if Russell enters the matrix space far away and attacks the company through the ice-breaking program of the disc...assuming that the disc in his hand does not make mistakes, it will take 10 minutes to calculate the offensive defense wall.Then his avatar needs to stay in the matrix space for 10 minutes.This false burning pain will last for so long.

Of course this pain is fake, everyone knows that they are definitely not burned.

But the avatar has senses—if it hurts enough to blur your consciousness, and you fall here, you can never go back.

It would be much better if you don't use avatars to intrude... Then you just keep receiving massive amounts of spam.If the data is not downloaded, the data will only be transferred to the disc and will not flow into the chip.

But it would be easy to burn the deck... If you don't use avatars, psionic hackers can be said to have no advantage.It is difficult to break through the outermost firewall through technical means.

Thirty years ago, the Bolide was the best commercially available offensive wall.

It works well because it really treats people equally.

Anyway, it only takes a moment to verify when the physical body passes, but it takes a long time to crack remotely.Although the defense may not be strong, the pain of equal treatment will make psychic hackers unwilling to attack this company first.

——As long as the psychic hacking organization is allowed to attack other companies first, rounding up is tantamount to protecting its own company.

Later, it was gradually abandoned, not because the mechanism was cracked by psionic hackers.

Because it has no mechanism at all - its ice pick is not complicated.

In the case of constantly outputting a large amount of garbage information, it is impossible to compound a too sophisticated defense wall behind, otherwise in the case of this kind of data throughput, it is prone to bugs.

Explained by the illusion in the matrix space... that is, at the end of the wall of fire is the most simple wall of light.

That's an inert barrier.Equivalent to a captcha that resets every minute.

It doesn't have any technology at all, all it needs is the amount of calculation... It's like countless math problems, and it only needs to be calculated layer by layer.Those who have the key can directly obtain the synchronously generated password from the company server, while those without the key can only calculate from the outside and then rush in.

But from another perspective, perhaps no technical content is the best technical content...

If I have learned the technology and you have the same time if I have not learned the technology, and I have to rely on the disc board to calculate, then my technology is not for nothing?

Later, because there is a more useful and more threatening "honeypot" in the offensive defense wall, it is very convenient to open the box in reality, and shake a nearby mercenary to physically kill you, so the fire that outputs pain Meteor is directly deprecated.

After all, when clocking in and out of get off work every day, regardless of employees or directors, everyone will be burned equally as soon as they enter the company or as soon as they leave the company-people will complain after a long time.

There is a high probability that the delphinium will not bring a disc plate that can specifically crack the bolide.Because it's so easy...

In that case, Delphinium would have to endure the pain of being burned by the fire to maintain the state of the avatar, waiting for the disc board to perform a forced cracking calculation.

...Fortunately, it was me who came in.

Russell thought.

It's as if someone threatened that the bomb would go off if they didn't solve these math problems within a specified time--and went to great lengths to find a PhD in mathematics.It turned out that the doctor was asked to stand in a high-temperature sauna and solve a thousand junior high school math problems.

It's not that it can't be calculated, the main reason is that the body can't stand it...and there is not enough time at all.Even if you know the answer at a glance, it takes time to write.

Russell skillfully endured the pain of being burned by the fire, and quickly invoked the ice-breaking cone program to break the inertial defense wall behind the bolide.

An offensive program named "Great Mathematician".

A black illusory cone quickly condensed around Russell.

It's like a spinning pencil head, wrapping Russell in it and moving forward at high speed.

It has no protection against those flames at all.Those flames still passed through it, continuing to burn Russell inside.

But just after the vertebral body flew for less than half a second, a wall of light suddenly lit up in front of it.

It is not composed of data, nor is it an entity... but countless nested hexagonal matrices.

The black illusory cone immediately began to spin at full speed.And every time it rotates, the middlemost layer of the hexagonal matrix is ​​disintegrated—and they immediately shrink and fill up instantly.

If it is a more advanced disc with a composite ice-breaking program, it can directly break through it forcibly at the moment it "tightens".This is a violent solution specifically for the stacking algorithm.

Fortunately, the performance of "Kwai Lily" is very good, and it should be able to finish the calculation quickly without forcing a breakthrough.

At this moment, in the outside world, several breathers of Russell's prosthetic limbs opened with a snort—the steaming white hot air visible to the naked eye was continuously discharged from the inside.

Looking at his appearance at the moment, the inferior is obviously a little anxious.

He was a little restless... He wanted Russell to withdraw quickly, but he was worried that he was reaching a critical point and affecting his state.

But in the matrix space, the operations of the [Great Mathematician] quickly reached the end.

——It took a total of 46 seconds, and a total of 860 three layers of inertial defense walls were cracked.

Just seeing this time, Russell knew very well—the delphiniums are absolutely endless.

If she didn't have the "Mathematician" series of discs, it would take at least three to five times as long to force a breakthrough with other discs.

Assuming that the time for her to break through the firewall is the same as that of Russell, then after she breaks through the firewall, there will be at most half a minute left.

At that point, the delphinium has to choose - to move forward, or to back off.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like