Chapter 373 War Hackers
As early as when Gox disappeared mysteriously, Gao Gong realized that Alyssa had a sign of resurrection.
The reason is very simple. The most likely reason why anti-virus software, or virus software, as a "search engine" suddenly disappears is because the "search engine" is calling it and needs it to solve some data-level problems.
The relationship between the two is like a bird catching an insect and a crocodile.
So, Gao Gong asked Gao Yuanyuan to search for the ‘missing Ainiang’ in cyberspace.
For Gao Yuanyuan, this is not difficult, because Gao Yuanyuan and Gaokes are originally one.
As for what the senior engineer asked Desila to install, it was not a virus, but the ''default browser'' of each search engine. Once the other party wanted to take action, the data could be transferred directly through the browser.
?The other party owes me a huge favor.
You don’t have to repay the favor, but when the middle-aged rich woman sees the pretty face of ‘Rich Woman Loves the Prototype Machine’, will she not be willing to help?
Sure enough, the other party took action!
In terms of the number of ‘web crawlers’, how dare you compare with search engines with just a magnet link?
??The ocean of data in the sky is rolling and roaring, and the resurrected Cybermaiden seems to be stronger!
The next moment, data rain poured down. Unlike electronic rain, the rain did not have ever-changing colors, but when every drop of rain fell, everyone in the city was reminded of a familiar and unfamiliar memory.
?That is the softest place deep in your heart.
Many people are repeatedly torn between morality and madness, and seem to have forgotten that they are still a human being.
It is not artificial data from a mechanical mastermind, nor is it artificial data from an enterprise.
But a living person.
As soon as the expert takes action, he will know whether it is there or not.
?As soon as this move came out, the computing power of ‘Illusory Union’ was suddenly reduced by one tenth.
Ethical chips can’t even stop it.
In cyberspace, the methods of ‘saving a mother’ are completely different.
Accompanied by a burst of iconic laughter, the sky of all the network nodes where the Evernight City is located turned blood red.
?The next moment, overwhelming shark missiles fell from the sky, this time it was the virus version of the "firepower-enhanced" version.
“Wahahahahahaha—”
“If you dare to touch my little brother, go and die, die, die, die, die—”
“Look at my latest model of data bomb.”
In the midst of the explosion, a petite but tattooed girl suddenly pulled out a ‘bomb’ from behind. It was three meters in length and looked like a nuclear bomb?
“Wow hahahahaha, look at my shark type four!”
Fuck me!
The pupils of the ‘Seventh Spider Girl’ suddenly widened, as did the two hackers.
All three of them can see that this thing stores a huge number of viruses, and only the ‘Mother of Data’ can pick up so many human brain viruses, twisted personalities, system vulnerabilities, and Trojans, and then make them into virus nuclear bombs.
“Sister, it’s me—”
?The next moment, a violent explosion sounded in the ''forbidden zone'', and immediately covered the entire network nodes. The huge explosion drowned endless spiders, as well as Gao Gong''s account.
"Depend on!"
“As expected, the rich woman still looks good, and she criticizes young girls like crazy, it’s so annoying!”
?The rich woman Ai Ai’s prototype complained. Before she could react, the back of her neck tightened.
?This feeling - it''s the fingers of the rich woman.
The data horizon goes directly across the ocean of data and onto the ocean currents.
A super huge "Data Goddess" looked at the prototype with a smile. The body of this goddess was entirely composed of the underlying code of the cyber network. It was many times more advanced than the "Spider Crawler".
“You little heartless boy, little Gox thought of you immediately.”
The prototype showed a super cute smile.
“The eldest sister is still a little younger. I like women with experience, such as eldest sister Alyssa.”
“Little thing, you are really good at pleasing people,” Alyssa stretched out her huge finger and poked the other person’s little face, and smiled: “It’s a very smart idea for you to use her to inform me.”
“But two personalities cannot appear at the same time, otherwise problems will arise.”
Gao Gong raised his eyebrows, and sure enough, in his head, Gao Yuanyuan fell into a deep sleep.
Fortunately, her strength is still one with her, showing no signs of dissipating.
He knew there was something in the other person''s words, but now was obviously not a good time to ask.
“Sister Alyssa, I have a small favor and I want to ask you for help.”
“Do you want me to help you deal with that corporate will? According to the regulations of the Deep Web, we cannot participate in the evolution of emerging technologies, but if you really make this request, it is not impossible.”
Alyssa’s tone was uncertain.
“Haha, just kidding, I can handle this little thing myself,” Rich Woman Ai Ai’s prototype laughed dryly and said, “I just want to get into the bottom layer of the network.”
“The bottom of the network?” Alyssa took a deep look at Gao Gong, “You are really not simple.”
?The next moment, the data ocean began to split, a big mouth slowly opened, and then swallowed the senior engineer in one fell swoop.
【Job transfer mission: Deeply embedded in the network】
Task content:
1, obtain the source code of a large mechanical system
2, enter the lowest level of the network, generate virtual senses that exceed the limits of virtual feelings and cross the bridge of blind ignorance.
The senior engineer has completed one of this tasks a long time ago, and now he has to complete the second one.
Similar to level 30 carbon-based fusion, players who take the information route can only complete the information transformation after level 60.
?However, as a ''cyber hacker'', he has a unique advantage. After level 10, he can carry out ''local informatization'', which is to ''cross the bridge of blindness and ignorance''.
Different from ordinary cyberspace, the underlying network is like a boundless network filled with constantly changing numbers.
In other words, the ever-changing ‘1’.
Compared to the binary system of computers, at first, the human brain was actually a binary system. The complex calculations you think the human brain is performing are actually 1111111111=10.
This is the baby''s processing system.
"Little guy, what do you want to do? You can''t stay here forever."
Alyssa’s voice sounded again.
Sure enough, within a few seconds, the body surface of Fupo Ai Ai''s prototype was mostly covered by green 1.
Once it is completely covered, it will be like a cyber killer, completely assimilated to the bottom layer of the network, and it will be difficult for gods to save it.
“Sister Alyssa, the human brain is actually polybasic. As species evolve, the human brain’s system is also evolving.”
??Following the words of the rich woman''s love prototype, the ''1'' on his chest flickered and suddenly turned into a 2.
At the next moment, all the numbers on Gao Gong''s body began to mutate, jumping from 1 to 2.
“I don’t know if computers on this planet are binary, but where we are, computers use binary.”
Soon, the number on Gao Gong''s body changed to 3 again.
??Ternary computers actually exist. The earliest Soviet computers were ternary, and in the field of AI and quantum fields, ternary is far more suitable than binary.
Binary 0 and 1 represent logical on and off respectively.
In ternary logic, 1 represents true, -1 represents false, and 0 represents unknown. Therefore, it is easier for ternary computers to give birth to AI.
Generally speaking, it is very good for cyber hackers to upgrade part of themselves to ''3-ary system''.
?This means that you have an "AI organ", which in some dimensions has the same capabilities as AI, such as the ability to read machine language without any obstacles, giving instructions to unmanned machines, etc.
However, the number on Gao Gong’s body changed to ‘4’ after countless fluctuations.
The number of bases in DNA is 4.
The next moment, the numbers on the surface of Gao Gong''s body fluctuated crazily, like garbled codes, but also seemed to conform to some kind of pattern.
It is like the code of human life.
As the ‘password’ continues to change.
? Gao Gong’s body parts have begun to be informatized. This informatization is not limited to a certain organ or a certain torso. The ‘number 4’ flashes randomly.
?Every time it flashes to a place, that place is completely digitized.
“Wonderful!” Alyssa praised.
Let this well-informed Cyberdome girl say this, Gao Gong’s methods are unique, at least on this planet.
?The next moment, the system prompt sounds—
[‘Virtual Sense’ is being generated—]
[The host adds ‘biological random variables’ and ‘virtual senses’ produce mutations]
[Mutation completed, ‘virtual sense’ evolved into ‘biological information flow organ’]
Biological information flow senses: The host can enhance the biological information of a certain part of the body and perform information transformation. Any part that has been transformed is a virtual sense.
Other people have only one "virtual sense", but as long as the senior engineer thinks about it, any part of the body can be a "virtual sense".
This is what the boss does.
Gao Gong glanced at his crotch and had an idea. He suddenly had a bold idea.
?No, no, no, this idea is too bold. He is not a charlatan. He can commit suicide and start over.
In Gao Gong’s memory, there is such a dick-killing player—literally.
?Moreover, a series of system prompts sounded.
The profession of ‘cyber hacker’ has finally completed its second transformation.
[Large mechanical system source code (1/1)]
[Virtual Senses (1/1)]
[Online traitor is promoted to lv10, completes the job transfer task, and is rewarded with agility +4, intelligence +4, and perception +4]
[Please choose your career direction from the following three advanced professions, intrusion hacker (system intruder)/death hacker (life intruder)/war hacker (war intruder)]—Appendix-Advanced Career Features P22~ P42
??The three types of hackers have completely different fields. Intrusion hackers invade enterprise servers, advanced databases, and even cyber networks. This requires a lot of preliminary preparations, which has a bonus effect on the creation of various virus software.
Death hackers are standard ''cyber mobs'' and ''cyber killers''. They can kill people everywhere along the Internet. Their killing methods are unpredictable and difficult to detect. Whether they are native people, bionic people, or AI, they can be their targets. They are among the hackers. The killer is good at random changes.
War hackers enhance the performance of various chips, such as overheating of prosthetics, electromagnetic short circuits, self-ignition of artillery shells, and intrusion probes. When they are trained to the extreme, they can control enemy weapons on a large scale to serve themselves, thus determining the outcome of a war.
?Every military contractor is bound to serve war hackers, ranging from a few to dozens.
There is no other way. No matter how advanced the weapons are, if they are used against oneself, it will be very bad.
Generally speaking, the one that is most consistent with high engineering compatibility is undoubtedly the ‘intrusion hacker’.
However, the senior engineer’s final choice was ‘war hacking’.
[Selection completed, you choose to change your job to ‘war hacker’, character -10, corporate reputation +1000, battlefield reputation +200, obtain the title, Pioneer of Information Warfare]
Information Warfare Pioneer - Changes in the form of war are inevitable, but no matter how the change occurs, what always changes is the way of obtaining information, and you, by changing the information, will completely transform the battlefield form.
[You gain professional expertise, ‘Secret War’, unit suitability +10%, invasion success rate +15%, firepower enhancement +30%. As a shadow of war, your presence will increase the probability of winning a war]
[You understand advanced knowledge [Electronic Information Engineering]]
[You understand advanced knowledge [Military AI Manufacturing]]
[You understand advanced knowledge [encryption technology]]
“It’s time to put an end to the trouble.”
…
?In the sky, a figure shot towards the city that never sleeps.
"boss."
"kindness?"
“If I break your body again, you won’t be angry, right?”
“Why do you think I implanted memory metal on purpose?” On the handle of the knife, a mechanical head spoke human words.
“So, girl, make it as much as you like!”
Battle Angel took a deep breath, and the next moment, hundreds of energy jet holes lit up at the same time.
?Then pull it back sharply.
The next moment, three pairs of wings of light exploded from the back!
Mechanical energy began to advance rapidly, and there seemed to be no upper limit.
?When Xiao Yu’s three battle templates, plus Gao Gong’s two boss templates, merged into one, a monster was born.
The figure disappeared in a flash.
A full ten seconds passed.
A huge explosion sound appeared at the place.
…
The masters of the Illusory Union seemed not to have appeared in this war.
The reason is simple, they are invading the core of the mastermind - in a physical sense.
In addition to wars at the network level and enterprise level, the battlefield in the popular sense is in the main brain area.
After the first two battlefields reached a stalemate, the last battlefield became particularly important.
Under the overwhelming rain of missiles, countless mechanical eyeliners exploded directly.
?With the machine generation in decline, the mechanical legions also began to disobey, and some even turned against them.
Leading the team with the Third Generation Steel Claw, all the masters came out to besiege the core of the main brain area.
“Boss, are we really not going to play?”
On Old Pava''s shoulder, Thumb Killer Dorn touched the pocket pistol and said with some itching.
?Old Pava pinched his nose and smiled: "Who said we can''t go up? The second and ninth sons have all gone up, right?"
?On the battlefield, there is a special biological army. The members of this army are like skinned flesh and blood bats. Wherever they pass, even steel can be penetrated.
?That is the security force of Hongshi Biological Group.
The No. 2 Qiangbang, Chairman of Hongshi Biological Group, Hong Bing.
Number 9 of the Qiang Gang, an unknown boy.
?These two ignored Lao Pava''s order and took the initiative to join the battlefield.
“It seems that Hong Bing has long thought about changing jobs,” Naga said coldly.
“Those two idiots,” Dorn curled his lips.
“And that one.”
?Following the direction of Old Pava, Pirate G was manipulating three military aircraft to kill everyone.
“That idiot!”
?Several people rolled their eyes at the same time. This guy was not helping anyone. Whether it was mechanical eyeliners, large robots, or the mechanical claw men of the Steel Claw Gang, or even Hong Bing''s men, he beat them all!
(End of this chapter)