Chapter 229 The big hand of the octopus (thanks to Silver's adoptive father Frozen)
[Liel: Bryce, I'm coming in. 】
[Bryce: Did you come in? Your access. Fuck you. 】
[Lille: This is a legal donation from citizens. 】
【Bryce: You fart, and was it you who did what happened in the Kabuki District? I asked you to investigate secretly, and you just made the headlines? ! 】
[Lear: The greater the movement in the real world, the more cover can be provided for network activities. The more secretive the cyberspace investigation is, the smaller the movement will be. 】
【Lille: So the greater the movement, the smaller the movement. 】
【Bryce: Brainless! 】
[Bryce: Forget it, let’s report the progress. 】
[Lille: The Tiger Claw Gang has made a big impact. We rescued a stall owner. He supplied illegal Mewtwo equipment to the Tiger Claw Gang. He is familiar with the black market in the market area. I will tell you the situation. File for you. 】
[Bryce: This is not bad. It is an unexpected surprise. Hacking activities are quite rampant in that place. It may be able to help us target some hackers. 】
【Lille: Where is the commission? 】
[Bryce: There are many hackers active in the Kabuki District. I have to go back and ask my colleagues to check the situation. Don’t worry, you will be indispensable in the end. 】
[Liel: OK, the second thing is, we also caught a guy from the Tiger Claw Gang. He confessed about the human trafficking situation of the Tiger Claw Gang, but he remained silent about the man behind the scenes. . 】
【Lil: It was done by a guy named Jae Hyun, but he doesn’t know more about it. 】
[Bryce: Damn, these bastards are really beasts. What are you going to do? 】
[Lille: Of course, continue to investigate. 】
[Bryce: I'm glad to see these beasts killed, but don't forget that our goal is to investigate the anomalies in Genting. 】
[Lille: I am sure this matter will be related to Genting. This industry chain also involves the top brass of NCPD. Someone came to ask for someone just now. 】
【Bryce: I still don’t see the connection with Genting. Did you hand over the person to them? 】
[Lille: No, but isn’t there someone covering Genting? Maybe together. 】
[Bryce: It is possible. 】
[Bryce: Listen, I'd love to see someone doing justice, but I'd rather you focus on our goal, which is more important. 】
[Liel: Listen, now I have something I need your help with: I want to hack into the NCPD, steal experimental equipment, sneak into the vegetative man's head, and check things. 】
[Bryce:? 】
[Bryce: Did you not listen to me? 】
[Lille: There is no time to explain. Once they finish processing the clues, we will have no excuse to rush to Genting. 】
【Lille: Just say whether you want to help or not. 】
[Bryce: You can do it yourself. I have NCPD’s data barrier and ICE architecture solutions here. 】
[Lil: Yes, trust me, I will definitely complete the task for you. 】
[File received. 】
[Bryce: Remember your mission. 】
In cyberspace, Lear just received news from River: They have arrived at the NCPD.
The network coordinates were transformed, and a towering digital wall appeared in front of Lille.
Now he wants to break through the NCPD's data barrier.
River and Anna walked into the NCPD. There were very few people in the headquarters, and most of them were on duty outside.
Especially since another major incident occurred in the Kabuki District, a lot of police force had to be allocated.
The two entered the police station as if nothing happened, and then walked all the way through the corridor towards the evidence department.
[River: Lil, we are in a situation. Which interface do you need? 】
[Liel: Wait a minute, let me take a look at the engineering instructions. 】
[River:? 】
【River: Do we need to scan for available open access ports first? This was the case when we cooperated with the Network Security Section before. 】
[Liel: It’s true, I’ve received your prosthetic eye. Let’s start scanning. 】
River swallowed and began to doubt Lear's professionalism.
He glanced at all the electronic equipment in the bureau.
【>Scanning. Open ports found: 80, 22, 443, 3306, 3389】
【Lille: Can you access the CCTV system? I need to take a look at the network wiring arrangement. 】
[Anna: I’ll do it. 】
【>Port selection: 32105, 22, 2939, 2】
【>Command reception. 】
Ports are like coordinates in a maze. Using these ports as coordinates, Lille's position in cyberspace changes repeatedly.
The changed path happened to cross the barrier built by ICE and all the way to the inside of the barrier.
The barriers are changing in front of Lille's eyes, and they may even pop up like traps——
This scene may seem soft, but in fact, if a hacker touches the data barrier when trying to bypass it, If you reach these walls, you will be overtaken by ICE, and the entire fortress will be turned into a weapon, flooding into the hacker's brain, disrupting computing equipment, and endlessly increasing computing speed.
This is caused by the underlying design of the cyberspace access protocol. Hackers can either find equipment with equal computing power for a head-on confrontation, or they can timidly risk the possibility of encountering ICE and quietly bypass these wall.
Of course, if you know the construction logic and add a little trial and error, it is completely feasible to bypass these deadly protective devices.
In cyberspace, Lear passed through the outer layer of the data barrier and reached the second layer.
It is still far away from the evidence department database - at least Lear can't scan what he wants from this layer of data.
NCPD also uses multiple subnet settings internally, which requires further physical hacking.
The data barriers in cyberspace are very different from the buildings in the real world. Lille compared a large amount of data and found the next potentially useful port and the area where it existed. [Lille: Workstation 3. 】
[River: That is the area of authority of the distance network security engineer. 】
【Lille: The camera will not record you, just avoid people. 】
【River: I'll do it. 】
River put on his police hat and swaggered across the yellow line that read "Internet Security Authority Area".
The camera scanned River's face without making any sound.
River's heart was beating fast, but he showed no emotion at all.
All the way to the door of workstation three.
[Lille: There is a hacker inside, and there may be an accomplice, please be careful. 】
【River: That's not called an accomplice, it's called a colleague. 】
River gently opened the door. A hacker was lying in the access chamber, and the other hacker was sitting at the table eating something with his back to the door.
You can clearly see that the hacker's hands are trembling: this is an occupational disease caused by long-term network security work, and there will be more or less neurological problems.
River sighed inwardly and walked up quietly.
[Lille: Use a personal link if conditions permit. 】
【River: Are you sure you can bring him down in an instant? NCPD hackers are no dabblers, and their security systems are all imported from network supervisors. 】
[Lille: I’m sure. 】
River gritted his teeth, pulled out the personal link from his palm, and inserted it into the interface on the back of the hacker's head.
The hacker reacted immediately - maybe in less than 100 milliseconds, he judged that he had been penetrated.
But Lille completed the process of bypassing ICE and launching the attack within 50 milliseconds after he reacted.
【>Port link. Tool introduced successfully】
So the hacker flopped down on the table and fell asleep.
River inserted the personal link into the back of the access warehouse hacker's head again.
The two high-level permissions gave Lear a lot of room to operate - now he has replaced the hackers lying on the table and in the network warehouse.
In addition, there are two hackers in the domain - NCPD seems to like to overlap.
But one good hacker can defeat dozens of hackers.
In cyberspace, Lear stepped forward and entered the core database of NCPD.
This is a treasure trove-like cyber image, where important data is sealed in small data fortresses with the same appearance.
[River: Don’t think about those key documents. 】
[Lille: Got it. 】
【>Connecting. Login successful, obtain high-level permissions】
【>Capturing. Data includes: evidence section data, NCPD list, NCPD work log】
【>Permission writing】
【>Cleaning. Operation completed, digital track is complete Clear】
The NCPD core database has set access time limits for everyone to ensure that no one will copy the information.
Unfortunately, Lille's computing power is much beyond that of normal people, and he still has two accounts.
When Si'an Westan started, the speed of cyberspace slowed down significantly, which was a bit unbelievable. One second in cyberspace was extended to five seconds for Lille.
For normal reading, the operator will have the relevant file number and complete the reading quickly.
But Lille wants to crack as many databases as possible and then copy the data.
At this moment, the little octopus suddenly jumped out, looked at the dazzling array of databases, looked at Lille excitedly, and pointed its octopus arm toward the database.
[xe: Can you let me grab it? 】
Lille thought for a moment.
This is a rather risky move.
AI is not necessarily better than humans in cyberspace, especially in designated job categories.
But. He really needs to understand his symbiotic AI.
[Lille: Try it. 】
With Lear's consent, the little octopus left his body and posted it on the database.
The huge computing power was transferred from Lille to the little octopus.
Then Lille saw that the octopus began to swell suddenly, the tentacles on its body became longer and larger, and the suckers became more and more delicate——
It was beyond the limit. Your imagination!
Those safes that store data, it’s more like the entire cabinet has been uprooted!
A system pop-up box that had not popped up for a long time appeared in front of Lille:
[Your symbiotic AI has absorbed enough computing power and reached the upper limit of computing power for the first time. 】
[AI tendency construction: data capture]
[Adapt to any type of data for rapid identification and copying, AI will capture data according to the terms you set, and generate raw data streams to populate the core code. 】
【AI with this characteristic will have advantages in data processing, decoding and deciphering. 】
The entire cyberspace represented by the database felt like this giant octopus was shaking -
The server could not bear such an exaggerated data exchange!
Lil hurriedly shouted:
[Lil: Grab documents related to Mewtwo! Don’t catch everything! 】
(End of this chapter)