Overturned Tower

Chapter 46 Sunflower Lily (Thanks to the leader who feeds Tianzelu)

Chapter 46 Sunflower Lily (Thanks to the leader of Tianzelu for feeding him~)

This is not unfounded confidence.

Russell even had several solutions to this problem...

His psychic "unsurvivable weapon" can directly penetrate the surface of the iron mask, penetrate deep into it, and cut off the designated line; he can also directly cut off a small piece of skin connecting the child to the iron mask.

Russell can also use discs - he can use discs to perform traditional data intrusions, and he also has psychic hacking skills and can drill in using avatars.

...Compared with investigating "devils" and sneaking into nightclubs, bomb disposal and invasion are what Russell is best at.

Rather, he killed several people after joining the company before finally seeing the first problem within his professional field.

——The problem of modern college students’ professional work mismatch needs to be solved urgently.

Since there are still ten minutes left, let’s start with the most flexible way.

The model of Russell's left prosthetic limb is called "Aoi Lily". This is the name Russell gave him... This flower also has another name, "Astrologer's Lily".

It was an intrusion prosthetic arm with sixteen interfaces—the models usually used by psionic hackers ranged from six to eight interfaces. The special feature is that there are two more disk interfaces, and some have two more general interfaces.

For combat prostheses and camouflage prostheses that have no engineering requirements, the number of interfaces must be less than four.

A universal interface that can be used to physically connect with others or insert a chip. This is a necessary interface for all prosthetics. Sometimes there are two, one of which is used as a backup.

Coupled with the calibration link that is adapted to most long-range weapons... Some firearms in this era no longer require the use of crosshairs and sights for aiming, especially automatic weapons. They can be directly physically linked to the weapon interface using the back of the head. The chip collects information from other target capture prostheses, processes and calibrates it, and displays the aiming interface in front of your eyes for real-time calibration.

The picture in their eyes is like a shooting game - it will even prompt the "size of the crosshair" and the target distance. The more advanced software also comes with perspective, and if the arm has a prosthetic body, it can also be equipped with self-aiming.

When moving the firearm, it is like using a gyroscope to turn the handle.

Another necessary interface is used when plugging in some special plug-in interfaces. For example, when there is no prosthetic eye modification, an external sight can be attached. For example, on the airship, those bodyguards in black...the red light emitting from their heads is the auxiliary aiming plug-in called "Cyclops". Similar plug-ins also include adaptive gas masks, as well as "equipment" such as jetpacks and magnetic boots.

Using a switch to start is too slow.

Just like the battle card drawing that Russell complained about before - this device must be connected to the prosthetic interface in advance, and then activated directly when needed.

The reason why everyone in this world has prosthetics is not for aesthetics, disability, or to optimize physical performance.

The purpose is very simple, which is to at least provide a data interface for the chip.

Otherwise, you won’t be able to add friends, and you won’t be able to transfer any important data offline.

Although the chip itself does not need to be charged, if it is equipped with a prosthetic body with more complex functions, it will need to be charged occasionally. The interface itself can also be connected to a charger.

Sixteen interfaces are the theoretical maximum number of interfaces that a prosthetic body can hold. Before this year, the "theoretical maximum number" was twelve.

Although in normal use, in most cases, only one or two interfaces will be connected at the same time, and at most, more than four interfaces will not be connected simultaneously... However, in terms of design, it is absolutely not allowed to "data will be lost once too many interfaces are connected." streaming, lagging, and overheating”.

Once you exceed eight interfaces, special protocols are required to keep things running.

"Aoi Lily" is called this because it is the first batch of new engineering prostheses adapted to the "Astrologer Protocol".

Although the positioning is for intrusion, it is equipped with rare interfaces with special protocols, and can even be directly linked to the computing hub of large workstations, or to invade giant engineering robots - even the "annealing nerve center" requires special equipment to enter. , Russell can directly invade with naked connection.

Not to mention this is just a small iron mask.

This small metal device is most likely the data written using a magnetic connector.

So Russell raised his left arm, and with a thought, a magnetic connector and a data cable suddenly popped out of the prosthesis on his left arm.

"Are you okay?"

The inferior frowned, still a little worried: "You can also go in first to take a look and collect some information. Then tell me when you come out. I will talk to the Delphinium on the road first..."

"You should know it's okay when you see me carrying this unpopular access line with me."

Russell replied without hesitation.

Different from his cautious tone before, Russell's words at this moment were full of the confidence of a professional.

"Oh, by the way, what TPT is used for this intrusion protocol..."

The inferior quickly added.

"I know."

Russell responded casually.

He turned back to look at the inferior, the corners of his mouth raised slightly: "You know what?

"The company that is best at network security and artificial intelligence technology is Sogo Technology Group; the core talent training base under Sogo Group is Sogo University; the core college of Sogo University is the School of Information Security and Intelligence Control... and I have been in college since I was a student. Until I graduated from graduate school, I was always the leader of our grade.

"Although I may have less experience, technically... I don't think I'm any worse than Delphinium."

He doesn't need to use ordinary protocols at all.

The "Astrologer Protocol" directly has built-in multiple conventional protocols... This is the "Unified Protocol" that Sally Ruth is planning in recent years. It is compatible with more than 200 protocols on the market, allowing the public interface to be used only through an adapter cable. , It can directly connect external devices with rare interfaces without using engineering prosthetics.

Although Russell's mentor Sally Ruth enjoys designing prosthetics, her true expertise lies in her ability as a network security engineer.

Nowadays, almost every company and every director is equipped with "A·ICE" - an anti-intrusion electronic technology whose scientific name is "offensive defense". It was invented by Sally Ruth.

Without the underlying technology of A·ICE, today's psychic hackers can enter almost anywhere they want and control almost anyone's prosthetic body.

But now, if their avatars try to break into this invisible A·ICE, they will be instantly infected by a massive amount of spam.

It can even overheat their chips, in turn frying their brains... and at the end of the day, it can leave "frostbite marks" for reverse tracking. More advanced models can also immediately counter-track or temporarily block the opponent's ability to enter the matrix world.

Sally Ruth has successively invented seven types of defense walls, including Type A, Type B, Type D, and Type T, and has continuously carried out technical updates and maintenance on them, and these technologies are completely open source.

The biggest difference between a defense wall and a firewall is that the defense wall is specifically designed to fight against psychic hackers who can directly destroy underlying data, rather than viruses or other types of intrusions.

Today's commercial firewalls and commercial defense walls, whether they are "Black Ice", "Honey Pot" or "Deep Sea", are all extensions of Sally Ruth's underlying technology. The ice cones that can break through this level of ICE are only found in a few of the largest psychic hacker organizations. Only after the ice is broken can the virtual body be used to invade - and if one does not use the virtual body to enter, that is to say, if one does not use the unique method of psychic hacking, one must use the "golem" built into the disc.

Golems are similar to Trojan viruses from the old era.

But unlike the Trojan horse, the behavior pattern of the golem is highly automated...as long as it is released, it can complete its tasks and then self-destruct, just like a puppet that acts autonomously.

These golems are integrated into those disc boards.

However, the magic dolls built into these disks must be assisted by the hackers' cloud servers for auxiliary calculations - the most critical "ice pick" technology is not integrated into the magic dolls at all. Otherwise, the calculations that can only be performed by such a small piece of metal will not be able to penetrate the various defense walls of this era.

Yes, the highest-level psychic hacking groups rarely engage in hacking anymore.

Instead, they make a profit by selling "starter kits" and "upgrade packages" necessary for hacking operations. All the discs they sell at low prices are time-limited. If they are not renewed after the expiration date, they will immediately become invalid, or downloading the ice cone will become very slow.

But if you renew, some "optimized packages" will be bundled and recommended that are not used at all.

For example, the "God's Eye" used by Delphinium can only invade six ordinary public cameras. If you want to hack into pocket cameras, personal cameras, and prosthetic eyes, you have to pay extra. If you want to hack into speakers, you have to pay more, and to hack into screens, you have to pay again.

It can be said that they separated the functions of the disc so that it can look "more luxurious" when packaged.

All open source firewall and defense technologies developed based on Sally Ruth have fixed vulnerabilities. This is why no matter how companies update their protection systems, the disk can be effective quickly and efficiently.

And this is actually the backdoor Sally Ruth left for her to invade.

——After all, those who build firewalls cannot keep themselves out.

There are more than sixty attack programs integrated into Aoi Lily. Sally Ruth even classified Russell so that he could call the corresponding cracking program in front of any defense wall with one click.

From this point alone, it can be seen that Sally Ruth attaches great importance to and trusts Russell.

and a strong desire to support.

"Don't be afraid, kid."

Looking at the child who was still trembling slightly, Russell held his head with both hands and comforted him softly: "Remember... don't sit down or squat while standing. If your feet are sore, you can jump lightly. Don't hurt your brother." Pull off the thread... just hold on for ten more minutes and you will be saved.

"Come on, okay? I'll be with you."

This is appropriate and reasonable comfort.

To prevent the "patient" from directly pulling off the thread due to excessive tension - although there were inferior people watching for Russell, Russell still habitually gave instructions first.

Seeing the boy nodding slowly, Russell smiled with satisfaction.

"So good."

Russell said softly.

He sat on his knees and closed his eyes.

[Please select access mode]

——Invasion mode.

When Russell gently pressed the button, a harsh warning sounded in his ears.

[The accessing party sets the connection rules to - intrusion mode]

[Warning, this physical link will force unlocking of data exchange permissions! 】

[Warning, this physical connection will forcibly unlock administrator rights! 】

[Confirmed no permission, determined to be malicious intrusion]

【warn--】

Russell couldn't hear the sound after that.

Because the avatar he turned into data has flowed into the small iron mask along the physical link.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like