Chapter 217 Little Octopus


Chapter 217 Little Octopus

Watching Lear construct his online image, Bryce was secretly surprised.

Computing power is the cornerstone of activities in cyberspace.

This is a comprehensive index, which is determined by factors such as the hacker's equipment, prosthesis, brain function, etc., and then constitutes the individual image in cyberspace.

In cyberspace, hackers are subject to fewer restrictions. Of course, the laws of physics are still followed here, but they are not so direct.

Computing power constructs a program, which is an image. The image involves everything in cyberspace as an extension part, affecting the real world.

You can be a person, or a djinn, a spider queen in charge of a cobweb-like data fortress

You can be anyone you want to be, as long as you have enough computing power Powerful enough and skilled enough.

And Leal. His technology is considered by network surveillance to be a good street hacker, but his computing power is very powerful.

His image is very solid, and it is all constructed brick by brick. He does not rashly try different structures and get himself something flashy because of the feeling of mastering everything and creating everything.

The less you understand and the more aggressive you are, the easier it is to leave loopholes in the program and be invaded by sophisticated hackers.

And that's something almost all hackers suffer when they are newbies.

". Access warehouse neural chip model. Parallel line of military technology, no memory expansion components, no traces of brain gray matter enhancement, no prosthetic stimulation symptoms

Almost pure computing, brain power at 12 This is too exaggerated

Do you really not consider working as a network monitor? Network Monitoring will provide you with better resources. ”

Bryce is calm on the surface, but looking at the foundation shown by Lille, he is already a little uneasy——

What is the concept of 12 brainpower?

Usually For example, the brain power limit of purely physical humans is 10, and they rely purely on hands and eyes to operate on the computer panel.

In fact, even if they are equipped with prosthetics, most hackers have no brain power. Break through this value.

The brainpower of 12 is enough for Lear to apply for hardcore hacker positions in large companies, and the company will be happy to equip them with valuable prosthetics -

Of course, the premise is that he is willing to sign the "contract" Make your own name.

"Not interested - why didn't you mention the price?"

"Work is exchanged for reward, is this a price?"

"I don't think it's worth it, so it's a price. .”

"Whatever, your idea is a bit retro. It sounds like the kind of brainless hacker from the old Internet era. Every day, he controls himself and kills freedom."

"Brainless? Hackers from the old Internet era do this. The company was so distressed that they even destroyed the old network. They are stupid, so you"

"Stop!"

Bryce interrupted Lear's heart-wrenching remarks, just as Lear's The image is also constructed.

A very regular human appearance, but we can only roughly tell from the appearance that it is a humanoid creature.

Leal didn't even outline his facial features, and most hackers wouldn't outline their facial features in cyberspace, but they usually wear masks or helmets to express their personality.

But Lille didn’t. This image was like a person made entirely of digital streamers, with no features.

Bryce's mouth twitched: "Don't you think your image is even less distinctive?"

Lille: "If I am the only one in the entire cyberspace who has no characteristics, then that's okay. Features."

".Okay, try loading your golem."

Golems, only in the virtual space can you intuitively see why they are called those names.

The most common and most basic type of puppet for hackers: "ICEBreaker". After loading, the image in cyberspace is a sharp blade.

The only function of the ice pick is to break the enemy's ICE, which is a typical extreme specialization program.

Because of its characteristics, it is easy to knead and can be integrated into other software. As a pioneer, it is the basis of human-type programs.

The blade constructed by computing power flows with the brilliance of data, sharp and beautiful.

Bryce nodded in praise:

"Good choice. If you choose the prosthetic body failure and prosthetic eye restart procedures that street hackers like most, I will have to spend more time explaining cyberspace to you.

I guess you understand what I want to say.”

Liel nodded.

Logic and reality in cyberspace are very different, but overall there are still many logical parts.

After all, the purpose of cyberspace development is to make people "feel" those signals.

Liel tried to combine the ice pick with the prosthetic malfunction, and the blade turned into a dagger.

This feeling is indeed wonderful. Hackers are like the creators of cyberspace. Data and current are coordinated through nerves and intuitively change in their hands.

This feeling is incomparable to any virtual reality technology. brought.

Facing this scene, Bryce was surprised again: This was Lear's first time entering cyberspace, but he had actually learned to combine different programs to produce new golems.

Lille dismissed the ice pick, and the dagger shattered into pieces, turning into light spots and returning to his body: "Is there any powerful demon that I can try?"

Bryce smiled sarcastically: "Little brother, you You're just a contractor, and you're already breaking the rules. You haven't even started working yet!

But since we have a superior-subordinate relationship, I advise you. Continue to improve your digital image.

In the battle in cyberspace, the first mover has a huge advantage. A hacker with weak computing power can definitely be killed as long as he has the appropriate procedures and a sneak attack. Hackers whose computing power is several times his.

If the opportunity is right, it is not impossible to kill hackers several times his.

You need to learn to be in combat mode at all times and keep protective and detection/alert programs running.

Of course, it would be better to have a huge data barrier at hand——"

Bryce turned sideways and showed Lille the huge data barrier.

The data stream is like a branch linking to a high wall. , the digital high wall with a mechanical feel is still slowly running in, moving

In the real world, people will be afraid of tall buildings hundreds of meters high, but in cyberspace, powerful data barriers It can give people the illusion of being thousands of meters high.

If you use the right concealment method, you can even be invisible - and these behemoths seem to be alive and may attack you at any time.

The uneasiness and helplessness that people feel when facing giant objects will be doubled or even infinitely amplified in cyberspace.

"Join network monitoring, you can use this data barrier to operate in cyberspace - by the way, there are also these high-level golems."

Speaking, Bryce stretched out his hand Got it——

A digital image that resembled a little devil swayed down from the sky, holding a flaming bow and arrow in one hand, and a chain in the other hand. At the other end of the chain was

a vicious bulldog.

The bulldog came to Lille and sniffed around, just like a real dog, identifying outsiders.

It is astonishing how lifelike it is.

“When you master powerful enough programs, you can combine them how you want.

What integrates complex programs is another high-level program. In fact, this program is closer to the so-called golem than the junk software sold on the street.

For this type of program, we call it: Devil Program Group (Note).

They have a certain degree of autonomy. In a sense, they can be regarded as AI, but their intelligence is very low. Don’t worry that it will burn your brain in turn.

The framework used by this program is called Imp, just like its name, it has the appearance of a little devil.

This imp mainly manages Bulldog and Hell Arrow, which are specially used to defend against cyberspace attacks.

When your hacking skills are as good as ours, you can also try to write your own.”

Before he finished speaking, Bryce suddenly saw Lear’s body begin to surge and tremble

A small octopus seems to be an octopus, he is approaching This species has been seen on the Science Channel.

A small octopus climbed on Lear's digital image and came to his shoulder, moving its head and observing the surroundings.

Cyber. The space suddenly fell into silence.

Lil was panicking, but he couldn't show it, or even talk to Squidward.

So he acted very calmly:

“This is my demon program group, equipped with several sets of target positioning to help me perceive cyberspace.”

After saying that, the little octopus raised its paws, stretched its limp arms, and touched the bulldog's head. You could even see the suction cup twitching.

Bryce was not calm when he saw this. ——

Why is this happening!

He studied in the academy for two full years before he built the first stable demon program group!

Liel pinched the octopus's hand as if nothing had happened and pressed it back: "Well, there are still some problems with the recognition. I will adjust it again."

Bryce slowly said: "You "

Before he finished speaking, the octopus suddenly rushed into Lear's body in fear, and Bryce's expression suddenly changed!

The moving mechanical walls of the data barrier began to rotate as quickly as an engine started!

In the dark cyberspace, a weapon of terrifying size is being generated out of nothingness, as if it has pierced the black curtain, and a flashing red and black trident is heading towards the data barrier!

The red trident seems to be equipped with some kind of program, and the black cyberspace background is being rendered with some kind of red, as if it is about to cover this area——

“Damn, it must be It was during the short jump just now - cut off your link!"

As soon as Bryce finished speaking, Lear found himself being pushed away, completely away from the battlefield——
< br>

In the last scene, when he saw the moving mechanical wall, he was not to be outdone, revealing an ion cannon of the same exaggerated size!

Boom!

Cyberspace Tremors.

“Ha!!!”

Liel exited the cyberspace and took a breath as if out of water!

His access compartment burst into flames, and Leal jumped out in a hurry, taking out the fire extinguisher provided in the room before the fire burned his butt!

【Use fire extinguisher: pay 10 euros. 】

【Please control the fire and contact NCPD if necessary. Any damage to the apartment will be your fault】

Bang!

The paid panel has also exploded.

The circuits in the entire room exploded. If you look from outside the skyscraper, you can see that several rooms around Lille also suddenly went dark.

And if you move your eyes to Taiping Prefecture.

You will find that the few lights there have begun to flash.

Battles in cyberspace will make circuits extremely unstable. If both sides of the battle intend to affect the participants, it will be like Lille.

People like Lille owe a lot of money to their landlords.

[You have caused line damage and are expected to pay financial losses: 5669 euros. 】

【Please pay the fine within 24 hours, overdue fines will be charged.】

【呲. 】

The sound of the circuit light going out overlapped with the sound of the fire extinguisher spraying, and the flame was finally extinguished.

[Correspondent: V]

[V: Lil, is there a power outage in your room? I was watching TV just now! Suddenly it exploded. I don’t know what happened to this stupid property. 】

Lil sat down on the bed.

[Lille: I know. 】

【Lille: Can you borrow two thousand yuan? 】

Note: The contents of this chapter are not purely compiled by the author, but come from the "Cyberpunk 2020" board game series setting

Thanks to Jiu and Magpie for their 5,000 starting coins, Clown Jr’s 200 starting coins, and Baiyi Shengxue’s scumbag’s 100 starting coins reward

 

(End of this chapter)

Previous Details Next