Chapter 363 Small Cyberspace
Damn, you people don’t play by the rules!
According to the classic style of the villain organization being invincible as a team and having to fight alone, shouldn't you come one by one?
First one or two hackers will come to fight with us, then one or two helpers will come to carry out fueling tactics, and then we will find the lair and bomb it, and finally we will have a boss battle. After a fierce battle, he was persuaded by his words and took the initiative to commit suicide.
This is the style you people should have!
Why is it that Wang Zhao comes up?
Don’t play by the rules!
In a novel, people like you wouldn’t even survive three chapters.
For some reason, Gao Gong’s desire to complain suddenly skyrocketed.
The encrypted node that the two hyperlinks sent to did indeed fit the style of the ‘villain organization’s lair’.
The blood-red data stream flows down the cliff like a waterfall.
Relying on the perception of an experienced driver, Gao Gong smelled the rich underlying code, which was an electronic sense that transcended the senses and was imprinted deep in the soul.
This feeling is very mysterious, a hundred times more wonderful than your body shivering.
‘So, Akatsuki Organization, bah! Has the Holy City Organization already launched all the information technology in cyberspace? This is amazing! ’
Although in Gao Gong’s view, cyberspace is not an advanced method.
After all, in the universe, there are also super information networks across galaxies and even black holes, such as dimensional networks and space-time super tunnels.
Even some information civilizations and Zerg civilizations are born with cyberspace.
But this is based on the perspective of the master of the sixth-level civilization.
In fact, even among level three civilizations, there are not many, or even very few, that can replicate cyber networks.
After all, there are too many skills required.
But the cyber network is just like the mobile phone ecosystem. Just building an ‘Android system’ is not enough. You must have the ability to let major apps enter your ecosystem.
At this point, hackers are powerless.
But with such a 'mini cyber network', at least cyber killers can't come to your door.
Furthermore, this ecosystem’s support for hackers is terrible. When it develops, it is no less than the corporate will of large companies.
The senior engineer showed an expression of enlightenment.
He finally understood how the world's number one hacker gathered ten top hackers to form the 11 Arhats.
Ideas are one thing, interests are another.
Compared to Gao Gong's surprise, Bird of Paradise was much calmer. After all, he was very familiar with the members of the Holy City Organization, and it was not like she had never been here before.
The two walked forward, and between the waterfalls were electronic altars, which functioned similarly to apps and traffic portals on ancient mobile phones.
‘What a boy, you actually stole data from cyberspace, I will report you later! ’
The senior engineer stared at an altar. On the altar, a kind of sticky black substance kept accumulating. On the edge of the altar, a figure was squatting on it, swallowing the black substance in big mouthfuls. Weird humming sounds were constantly coming from his mouth, like crying. Like a smile.
‘A hacker who devours the dark side of personality is a nightmare. ’
‘A completely blackened Cyber race. ’
The senior engineer clearly remembers the names and abilities of these 11 Arhats.
Although there are many more exaggerated things in the universe, men still have a profound impact on the first time.
When the 11 Arhats overthrew Arasaka Tower, it was a big story that shocked the entire Mecha Star player circle.
Soon, Gao Gong saw another electronic altar.
There is a 'hyperlink bridge' on the altar, which is like a Naihe Bridge made of codes. The wind is blowing on the bridge and there are many viruses.
Every 'dead personality' who walks across the bridge will mysteriously disappear.
Some 'dead personalities' suddenly woke up, looked left and right in panic, and then ran away, but were immediately grabbed by various virus arms and pulled back.
‘This method of feeding the virus with personality, Mr. Patchwork? ’
The senior engineer can be sure that if we continue to ‘gain experience’ like this, it won’t be long before all the hackers in the Holy City organization will reach level 60 and become cyber creatures.
On this planet, achieving personal information ascension is the highest pursuit of every hacker.
It’s just purely for gaining experience, I’m afraid there will be sequelae.
The senior engineer squinted his eyes and stared at the figure on an electronic altar, Tyria.
In other words, a clone of Tyria.
The aura on the opponent's body is not much weaker than that of the Bird of Paradise, but in terms of purity, it is far inferior to the Bird of Paradise that achieves ascension by its own will.
Maybe the other party brought the two of them in to show off their technical accumulation.
But this is obviously a bad move. For those experienced in the universe, they can basically tell the color of the other person's sex with just one glance.
Although this method of achieving cross-civilization level promotion through radical methods is effective in a short period of time, it is very problematic in the long run.
Gao Gong immediately understood why the other party wanted to resurrect the 'ancient evil god' all over the world.
Fight fire with fire.
After walking for about five minutes, the senior engineer came to the core of this encryption node, in front of a huge square table, surrounded by white pillars rising up from the sky. On the surface of the pillars were various strange religious codes. .
On the high-backed chairs, figures like gods looked down at the two of them indifferently.
‘How come the style of painting suddenly changed from the Akatsuki organization to the Tarot Society, and you are all teenagers too? ’
Tyria, Cyber Dream, Super Engineer, Nightmare, Mr. Patchwork, and a new face that Senior Engineer didn’t recognize.
A total of 6 characters appeared in Ocean’s Eleven.
If that strange face is also the future Ocean’s Eleven.
The Bird of Paradise was obviously dissatisfied with this overlooking angle, and snorted coldly. The next moment, the violent code flames began to burn the entire hall. Although it was quickly swallowed up by the underlying code, when the 'concentration' of the flames began to rise, When it is transformed into information flames, even the underlying code of cyberspace cannot completely digest this top-level method of second-level hackers. Cracks begin to appear from the ground, and countless complex codes are like 'lotus root threads'. Tangled together.
The senior engineer didn't mind this kind of looking down at him, after all, he was often looked down at by rich women in this way.
But in order to show his manly side, he took a step forward resolutely and hid behind the bird of paradise.
So many monsters, so scary, the rich woman loves them.
As the same masked man and the number one hacker on the Mech Breaker Star, Tyria slowly stood up from the high-backed chair.
The next moment, all the white pillars glowed with golden light. This light was a high-density data flow formed by religious codes.
Wherever the data flows, all cracks are smoothed out and the light forces the flames of information out of the 'application'.
The bird of paradise's eyes were glowing with fire, and a huge bird shadow was vaguely visible on its back. For a moment, the entire data structure of the encryption node seemed to be ignited.
However, as the golden light gradually spread, what was suppressed was the Bird of Paradise, a level 60 information life.
“Tsk tsk, you are worthy of being the boss of the Holy City organization. He is so powerful in controlling religious codes. However, in my impression, the core processing units of religious codes are highly centralized. This also means that, In terms of computing architecture, they are not stable and can be easily divided and cut in. "
"This is why they cannot form a computing power revolution alone. They must achieve a surge in computing power through chips after the industrial revolution. Completion of supercomputing.”
"Without a computer, what's the use of a virtual machine?"
As a top hacker, Gao Gong's two or three words can make Bird of Paradise's eyes light up.
The next moment, the information flame did not confront the golden light, but formed a knife-shaped data structure, embedded in the golden light transformed by the code.
Every time the knife was struck, a large number of cracks overflowed from the golden light.
It is indeed much more unstable than ordinary pseudo-sensory code.
Just like an ordinary person and a mental patient, the same words have completely different levels of stimulation.
The two stood up, namely Nightmare and Mr. Patchwork, while Chao Gong and Electronic Dream quickly stopped the two men.
When they came on stage, the nature changed.
"Hey, you actually dare to attack our leader, don't look down on our organization too much."
The stranger jumped out suddenly, and his hand filled with hacker chips fiercely With a wave of the hand, hundreds of attack methods including Trojans, viruses, address attackers, personality attackers, mind replacement, illegal malware, etc. emerge.
This time, Senior Engineer couldn't ignore it. Although he was only at the tenth level of the hacker profession, he still knew a lot of ways to make a big move.
All hacker characteristics are turned on, chew twice, open your mouth and spit out, countless small bubbles are sprayed out. Each bubble is an artificial IP, and each bubble is matched with an attack method. , quickly wrapping them and transferring them into the flames.
The next moment, the bubble burst. Under the burning of the information flame, these hacker weapons were burned into files of various formats, and then disintegrated twice and turned into abandoned codes.
The Bird of Paradise looked cold and waved its hand, and thousands of flame birds were born by cracking the mini-program and swarmed towards each other crazily.
The unfamiliar face panicked, and he quickly turned on the chip's power and unleashed countless hacking skills.
The other party blocked the mini program, but did not block Gao Gong's method. IP bubbles suddenly erupted from the flames, covering the other party's face, as if they were suffocated. The other party turned over and fell to the ground, his eyes A stream of data streamed out from the ears, mouth and nose, and the facial features were distorted and shrunk visibly to the naked eye.
“Ahhhhh, what the hell!?”
The hands of the unfamiliar face turned into data, and with a fierce tear, one human skin was torn, but another strange face appeared emerged from his face.
Another tear, another unfamiliar face.
Not only the appearance, but also the personality of the other party has been impacted by many virtual personalities.
A stream of unfamiliar memories rushed in, trying to replace him.
All the human brain IP that Gao Gong had not used up in the ‘Escape Game’ was given to the other party for free.
“Ahhhhhhhh——”
(End of this chapter)