Chapter 617 Demon Program Group "Muramasa"


Chapter 617 Demon Program Group "Muramasa"

The cyberspace of Dog Town is a small space, but the density is quite high and complex.

Hackers operating here will see many distorted data barriers, which keep flashing like buggy programs, and the data structure is almost unreadable, looking as disordered as ordinary data tumors.

In a relatively safe and normal cyberspace, hackers may be keen to tinker with these data spores and try their luck, there may be valuable data inside.

But in Dog Town, except for the Voodoo Gang, almost no hackers will tinker with these things——

The data here is very complex, and some hackers try to find this data with that idea. Most of them will encounter military-level ICE counterattacks.

Because even Hansen, who occupied this place, was not sure how many secrets there were.

These hackers avoided the data spores of Dog Town and used their relatively poor technology and inferior equipment to build their own networks and servers. When one day they felt that their wings were strong, they began to try to contact them. They are slowly honing their skills, hoping that one day they can Going to the next level

But today, hackers saw a scene they will never forget:

The data that can be demodulated by the cyber demodulator is biased towards bright blue, and the logical program and software present a certain appearance, which is basically in line with human thinking and imagination.

The data in Dog Town is more dark, like a lifeless ancient ruin.

In large places like the Luxor Sports Academy, signals are transmitted wired through transcontinental cables, which themselves will not appear in cyberspace: However, as hackers use wireless means to attack, the escaping wireless The signal will appear in cyberspace and, upon contact with it, expose the data barriers of the entire Luxor Sports Academy to the public space.

A huge data barrier appears in cyberspace. This data barrier looks extremely delicate. Just from the outside, you can see its dense, complex but obviously logical outer firewall. It also maintains a high frequency of changes with specific program and server support, typical of corporate firewalls.

They may not see this kind of program structure once in their lifetime. After all, the first layer of security measures for the company's data barriers is confidentiality. If it is not necessary, it will first remain secretive to reduce the escape of electromagnetic signals as much as possible. Disperse to prevent being supplied.

However, now, this data barrier has been dug out: a black and red chain suddenly appeared in the cyberspace. I don’t know how the attacker did it, directly from the cyberspace where there was nothing. Locked in this huge data barrier!

Red ground chains are scattered in the background noise of cyberspace. Following the electromagnetic signals exposed by the data barrier and almost impossible to detect, this thing is completely revealed!

The violent electromagnetic oscillation caused the entire cyberspace to tremble. Some hackers using the Dog Town power grid immediately detected that the temperature of their hardware rose sharply. However, when they were about to disconnect and go offline in panic, they discovered that I have been locked in cyberspace!

The electric current instantly penetrated their safety devices, completely making them part of this mighty attack!

As more and more hackers on the line are controlled, the chain continues to infect the data barrier, completely pulling it out of the void:

The first to be exposed is the firewall, which was caught After being trapped, it could no longer move or transform. It trembled repeatedly like a stuck machine and finally collapsed.

Even the Voodoo Gang ran away after seeing this scene

This kind of crushing attack and control is simply irresistible, and you don’t even know where the attack is coming from, it’s like it came out of thin air. produce!

And the black and red chain quickly locked an external line connected to the data barrier -

attacking V's brain-computer interface all the way.

The electrode in Lille's hand was quickly connected, completely cutting off the circuits that might be overclocked by hackers and damaging the brain, and immediately started brain overclocking, and a black and red data chain appeared in front of him.

Si'an Westan started at full power, and even in cyberspace where measured time was far smaller than reality, everything still slowed down.

The black and red data lines are obviously an AI-level attack.

He could see the problem with the mysterious and powerful attack in the eyes of ordinary people: precisely because of the use of AI-style distributed computing power scheduling, it was possible to use the almost completely concealed electromagnetic attack from Luxor Villa. Capture that little bit of signal in the escape.

But AI cannot solve all problems, and it cannot invade the company's confidential facilities so easily, otherwise the world would have been dominated by AI.

[Muramasa: The opponent knows the communication protocols used by those facilities, otherwise even AI would not be able to invade so smoothly. 】

[Muramasa: But this guy looks like a ruthless character, but in fact he has obvious redundancy in computing power. He is more like a hacker equipped with AI than an AI. You may not have seen this kind of hacker, but I Saw a lot. 】

[Muramasa: Among the hackers who use AI, this person can only be considered a beginner: her AI is very intrusive, but her cooperation is not very good, and she drags down the AI. 】

[Muramasa: However, the opponent's actions are very hidden. If you want to counter-intrusion, you must first convert the communication tower into signal collection mode and implement data sweeping according to the software I provided. 】

【Lille: Network monitoring taught me a wide-area search procedure. 】

That kind of program was used by Lear on the Internet in the Marvel world, and burned down Hydra's network, directly burning Dr. Zola offline.

However, Muramasa immediately stopped his behavior.

[Muramasa: That kind of program will completely expose you to cyberspace, and it can easily cause unnecessary counterattacks or unnecessary attacks:

You have to know that the Internet The programs entrusted to you by supervision are old technologies from decades ago. If you use them now, signal towers that are not equipped with blackwalls will most likely be captured and invaded by some cunning and dangerous critical entities. Network supervision prohibits uninstalled blackwalls. It makes sense for the wall to be enabled for civilian access. 】

[Lille: Give me a plan and move quickly. 】【Muramasa: I am giving you a plan, I will give you a set of commonly used detection procedures】

[Hacker Program: Demon Mirror]

[Description: Detect "invisible" images]

[Hacker Program: Hidden Virtues]

[Description: Detect in virtual reality "Reality"]

[Hacker Program: Speed ​​Limit Trap]

[Description: Detecting hidden programs in wide-area space, taking up a lot of computing power]

[Muramasa: I have improved this set of programs. I am not good at network attacks, but I am very good at covert operations. Now I will use the program Loaded on me, I can act as a "demon" program group to run these detection AIs. ]

[Muramasa: Alternatively, you can try to load and run these software——]

[Muramasa: After all, you are already.]

[Liel : I'll run the detection program group, and you'll be in charge of the attack program group. 】

[Muramasa: Writing. 】

In cyberspace, Lear's new data form turned into a human body wearing some kind of strange cloak, without any facial features on his face.

He grabbed the data stream and connected it to the signal tower. As the program group was written, the signal tower began to deform, and it seemed to have turned into a scepter in his hand——

Muramasa did not choose to transform into a samurai image that was closer to the human form, but instead transformed into a samurai sword.

The discussion was completed in an instant. The katana was held in Lear's hand. As one program after another was written into the memory and opened permissions to Muramasa, the sword became brighter and brighter as if it was being charged. , everything is transparent——

[Attack program group loading: Arsonist (Muramasa)]

[Description: Causes a surge in power supply, causing equipment to heat up or even burn down. The unique craftsman AI will cause more serious fires]

[Attack program group load: Hellhound (Muramasa)]

[Description: Track hackers and implement continuous attacks against special sources. The unique craftsman AI will permanently lock the enemy device, even if the hacker immediately cuts off the connection. , will also trigger a variant hellhound attack, and simultaneously track all related devices to implement the attack]

[Attack program group loading: Stirring]

[Description: Attacking the nervous system, directly causing the hacker's short-term reaction to decrease]

[Attack program group loading]

All programs have been loaded.

Buzz——

Hidden fluctuations echoed in the data space, and all tremors stopped.

The hackers who were unable to escape felt that time had stopped.

Their memory is completely blocked, their thinking and calculation speed are as slow as a turtle crawling, and their brains have changed from violent oscillations and panic to a state of dementia in which even thinking has become slow.

In fact, they themselves are not aware that their thinking has slowed down. They can I realized that it was because those huge chains suddenly began to tremble at a crazy high speed. The originally natural and harmonious fluctuations seemed to be pressed into fast forward -

trembling, trembling, and then completely exposed

A giant mechanical bird with wings made of chains is revealed!

A samurai sword pierced the bird's chest along the line. When it hit the chain, it made a sharp noise that could pierce the eardrum. Countless flaming hell hounds stepped on the chain and roared up. The entire cyberspace was heating up!

(End of this chapter)

Previous Details Next