Chapter 222 Virus City
??The huge tide of data began to surge back. Waves made of 0s and 1s repeatedly hit the beach. The binary values ????remaining in the sand kept flashing. Finally, two figures sat up from the beach.
“This is my virtual machine in cyberspace. It can track the IP addresses of most data nodes. You—fuck you!!”
Hiro turned around and saw a peerless **** looking lazily at the sun on the beach, with thin lips, a high bridge of nose, apple muscles that looked like he wanted to take a bite, and eyes as pure as spring water.
Hiro''s heart beat hard twice.
‘You already have a family, and the other person is a man! ’
Hong forcefully turned his eyes away and said with a slightly red face: "Your appearance has changed too much!"
When a normal person logs into the cyber network, due to the decomposition and reorganization of consciousness, his appearance and personality will undergo a huge change. However, this is the first time that Hiro has seen someone suddenly change from a macho man to a shot.
?The senior engineer ignored the other party and said: "If you find the data concept, you can take your pink-haired little girl far away, so don''t ask so many questions and get to work quickly."
?Hong rolled his eyes and gave a virtual command. The next moment, the beach disappeared and was replaced by an ''Internet cafe''.
Hong sits in front of every computer in the Internet cafe, his fingers tapping the keyboard frantically.
“You actually created a backdoor account. I haven’t seen such an ancient hacker method for a long time. Your master must be an old-fashioned hacker.”
? Today’s hackers prefer to hack directly into the brain.
“If you are bored, you can find a computer and turn it on. My master has stored at least 100TB of ancient games and tens of thousands of ancient short movies.”
“Where is your master now?”
"have no idea."
"have no idea?"
"The old man has never appeared again since he kept talking about the ''electronic ascension''. My senior sister, senior brother, and I all agreed that either the old man''s personality was ruined by the virtual virus, or he failed to build a local area network. , caught in the data turmoil.”
“Do electrons soar?”
?Electronic ascension is definitely not a serious civilization ascension, it is probably some kind of method of mastering big data.
“Do you still have brothers and sisters?”
“Senior Sister, Second Senior Brother, plus me, there are three people.”
“It’s really special.”
Generally, hackers are single-handedly, and few have three apprentices. Many veteran hackers even directly copy part of their personality to create an artificial intelligence.
‘Where are your senior brother and senior sister? ’
“Senior brother went to the mother city, and senior sister—” Hong hesitated, “senior sister went to join the rebel army.”
“Tsk, we are mortal enemies of each other, what a **** plot,” the senior engineer said lazily, and suddenly let out a light sigh.
“Your senior sister’s hacker codename is Bird of Paradise, right?”
?This time it was Hiro''s turn to be shocked. Hundreds of Hiro''s in the entire Internet cafe raised their heads at the same time.
“How do you know!?”
“I won’t tell you.”
?Gao Gong shrugged. One of the 11 most famous hackers in the future, he fell into the Arasaka Tower and severely damaged the Deep Web. How could he not have heard of it?
??The fall of Arasaka Tower is a landmark event in the middle of the Mecha Star, which means that the Mother City has lost control of cyberspace.
To be honest, a large part of the reason why he decided to change his career as a cyberhacker was to participate in this part of the plot.
?The Mother City and the Cyber ??Tide are like two behemoths about to collide.
Only by jumping on every wave accurately can you avoid being crushed to pieces by the huge waves.
‘I didn’t expect that there would be an unexpected surprise. ’
?The peerless **** smiled, looking super cute and cute.
"Introduce your senior sister to me some other time." A Hong rolled his eyes: "That''s a good idea. Senior sister hasn''t contacted me for almost ten years."
The passage of time in the virtual machine can be adjusted, which is related to the technical level of the cyber hacker and is also limited by the nervous system.
?According to Ah Hong, the ratio of the time of his virtual machine to the real time is 10 to 1. In other words, after 10 hours of virtual machine time, the real time is only one hour.
?Having watched a full 10 ancient short films, Gao Gong didn''t even fast-forward before Hiro''s voice came up, his tone a little hesitant.
“Found one, but it is not a secure data node.”
“It’s not safe, how do you say it?”
“That’s a virus town.”
?In the cyber network, data nodes are like islands in the sea, used to house AI, hackers, and cyber people.
But not every data node is safe.
The safest place is naturally the data haven of large enterprises.
?However, most of the territory of large companies is not open to the outside world.
As for the data nodes open to the outside world, some are cloud servers, some are real-world local area networks, and some are virtual network communities.
None of them are particularly safe.
After all, even a truly safe place cannot be hacked by cyber hackers.
But the truly dangerous data nodes are ones that even hackers dare not set foot on easily.
Because there are all kinds of Internet viruses out there.
??Some of these viruses are ancient computer viruses, some are error codes in human brain servers, some are AI with broken personality, and even some destructive neural signals.
In short, ghosts, ghosts, and snakes are dancing wildly.
??And this type of red data node has another nickname - Virus City
“Are you sure there’s a big data monster out there?”
“It has been confirmed that the underlying framework of the data node has changed.”
“That’s almost it.”
The concept of data and the monster of big data are actually something that is difficult for people to understand.
To put it more vividly, this thing is Du Niang, Gu Ge, and Penguin Chengjing.
Since the cyber network does not use binary data, but quasi-sensory data, huge data flows in and out of network portals over the years, which naturally makes such search engines and chat tools anthropomorphic, becoming a kind of thing between AI and viruses. Super monster.
Why big data monsters can achieve "data enlightenment"? Because they themselves are the existence of countless big data enlightenments.
“Let’s go.”
“Are you sure?”
"certainly."
Hiro shrugged without saying anything.
In the group of cyber hackers, there are autistic children, lunatics, freaks, and anti-humanists, but there are absolutely no cowards.
?Hundreds of Ah Hong merged into one, the Internet cafe began to disappear, and a white door appeared.
?The door opens, a large amount of data flow covers the virtual machine, the page switches, and the virtual machine disappears.
The two of them were in the air and fell directly from the atmosphere. Rolling data clouds surrounded the two of them, and the data redundancy created a fierce wind.
“Holy shit, the system virus has destroyed the underlying structure of this data node!” Hong exclaimed.
“I knew you were unreliable!”
Gao Gong grabbed it with both hands, and a large number of 0s and 1s emerged from where his fingers were.
[Loss of user data]
[Loss of user data]
[Loss of user data]
[Loss of user data]
(End of this chapter)