Chapter 518: Merging of the underlying protocol puzzle (Part 1)
There is an old saying -
The greater the ability, the greater the responsibility.
Ahem, I went to the wrong set.
To be precise, the larger the life form, whether it is a mechanical body or a carbon-based species, the greater the consumption.
For the planet host, it may have to process hundreds of billions of data interactions every second. This level of data processing is a powerful consumption even for it.
So, sleeping every once in a while has become inevitable.
But no one expected that this time of hibernation happened to be at the stage of replacing the underlying logic of 'Fortress' and 'Deep Web'.
So, Gao Gong thought of a good idea.
If this thing can be done, not only can you hack into the old man's head, but you can also sneak into Cybertron and get some good things for free.
"The big data interface has been opened on my side."
Not far away, Hitomi opened his mouth to report.
“It’s open here too,” a neural modeler from the fortress said the same way.
Due to the particularity of cyberspace, the big data interface is not just a processing page, but an existence similar to a 'different-dimensional space'.
It can be embodied in reality, and what it shows is a complex 'golden door' full of cracks.
It's a bit like the 'void cavity' in a certain comic, and it's also a bit like the lair of some Cthulhu monsters.
As soon as the 'interface' is opened, all kinds of strange emotional data, personality fragment data, and sensory data spurt out from the 'door' like a torrent.
Thanks to the satellite-level energy field suppression, 95% of the human senses of everyone present were sealed. Otherwise, at least a few people present would go crazy.
At the same time, waves of terrifying and indescribable aura overflowed from the 'interface'. The big data interface was originally prepared for the concept of big data.
The replacement of the underlying network protocol, or in other words, the golden rule, requires the participation of all big data concepts.
In other words, the integration of all big data concepts is the complete underlying protocol.
With his blurred vision, Gao Gong could see that endless black pipes spurted out from a door, directly squeezing and cracking the edges of the door, and then inserted into the planet's host.
As if the sea of data appeared in reality, even if most of the senses were reduced, Gao Gong still had a strong feeling of melting.
The phantom of an old man in black flashed away.
‘Old acquaintance! ’
Pipeline dominance!
The traffic king in hardware, in reality, the combination of all cables and base stations.
With the arrival of the Pipe Master, the other nine soon appeared one by one.
Some are just like the 'pipeline'. As soon as Fang appeared, the huge shape seemed to fill the entire space. It was the 'Prosthetic Giant', the 'King of Information', and the 'Data Shelter'.
Some are relatively mild, and their appearance is more manifested into concrete images in reality, such as a bridge and rows of cameras, which are the 'Bridge of the Deep Web' and 'Peeping Eyes' '.
Others appear very hidden, and if it weren’t for the positioning on the screen, you wouldn’t even know they exist.
They are ‘artificial intelligence ghosts’ and ‘hidden ones’. The former is an existence similar to the 'inner demon', just like people are afraid of ghosts. For artificial intelligence, the 'ghost' is that ghost.
Even if the most advanced artificial intelligence is haunted by a ‘ghost’, it is only a matter of time before the personality template disappears and the intelligent data is stolen.
But in the AI world, it has always been an urban legend, and no one knows whether it is true or false, and whether it really exists.
The latter is the collection of all 'hidden files'. Those small cloud disk movies you watch, or the hidden folders hidden in various places, including company confidential files, are its essence.
It is also the big data concept most closely related to 'cyber hackers'. The more secrets it has, the more powerful it will be. Even in the later stages, it will issue tasks to players and let them go. Search for 'secret files' that are not under its control, and the rewards it gives are rare second-level information skills.
There are also some strange big data concepts.
For example, as soon as Fang appeared, the data of everyone present was stripped away, the concept of big data, cyber girl, search engine incarnation, and the mother of data - Alyssa.
‘Why are you here? Who gave you the qualification, oh, old man Aramaki, this old man is indeed not dead. ’
Alyssa's curious words suddenly sounded in Gao Gong's mind.
At the same time, a series of prompts sounded on Gao Gong's system panel.
[Being infected by the simulated hormones of the 'Queen of Mimics', your reproductive system modification rate +1%]
[Being infected by the simulated hormones of the 'Queen of Mimics', your reproductive system Transformation rate +1%]
[Infected by the simulated hormones of the 'Queen of Mimics', your reproductive system transformation rate +1%]
...
Almost at the same time, Gao Gong’s mind suddenly heard a lazy, heart-racing voice from Sister Yu. At the same time, Gao Gong’s sight was suddenly filled with colorful, The room is filled with various forms of royal sisters.
‘Little handsome boy, I have a feeling that you will become a great person in the future. Become my disciple and I will teach you the three thousand skills of becoming a female/male! ’
[Are you a believer in the level 75 big data concept, the ‘Queen of Simulations’? ]
At the same time, Gao Gong could feel that every part of his body was being gently touched by a soft little hand.
Hormones are being secreted crazily——
Queen of Mimetic, the youngest big data conceptual entity, and she rose to the throne with just one piece of hardware.
That piece of hardware is called a virtual machine, a must-have for men and women, healthy for use, and not suitable for children.
Good guy, you actually preached to me, a former virtual master, who do you think I am!
You have to pay more!
Gao Gong resolutely chose ‘no’.
There was a cold snort in the air, and the next moment, all the little hands disappeared, and Gao Gong suddenly felt a sense of emptiness and loneliness.
It hurts, you just left like this, why don’t you give me any more advice? Maybe if you give me some more advice, I’ll obey.
The ten major concepts gathered together, and the last piece of the underlying protocol puzzle was completed. The next moment, the planet host, that is, the huge lattice metal ball began to shine, and starting from it, the entire Cybertron satellite When it lights up, thick energy shields rise layer by layer, covering the entire satellite with an 'energy atmosphere'.
The replacement time of the underlying protocol is also the time when cyberspace is at its weakest. This level of weakness is fatal. I don’t know how many super hackers and network departments of large companies are thinking about this moment.
Gaining dominance over cyberspace, in a sense, means gaining dominance over this cyber testing ground.
The method adopted by Cybertron is also very simple. It directly shuts down your network and cuts off all signals. Not to mention hacking, it makes you unable to hack.
Generally speaking, this level of defense is used for interstellar wars. The interstellar fortresses, galaxy fortresses, and super battleships of advanced civilizations are all protected in this way. Unless you kill its body, Otherwise, any hacking methods are useless.
At least in this galaxy, no civilization dares to directly attack the cyber testing ground controlled by advanced civilizations.
But there is a small problem. The protection of cyberspace is invincible.
But the protection of Cybertron's body is not so strict.
(End of this chapter)