MillionNovel

Font: Big Medium Small
Dark Eye-protection
MillionNovel > Start with a Mechanical Hunter > Chapter 518 Merging the underlying protocol puzzle (Part 1)

Chapter 518 Merging the underlying protocol puzzle (Part 1)

    Chapter 518: Merging the underlying protocol puzzle (Part 1)


    There is an old saying that says—


    The greater the ability, the greater the responsibility.


    Ahem, I went to the wrong set.


    To be precise, the larger the life form, whether it is a mechanical body or a carbon-based species, the greater the consumption.


    For the planet host, it may have to process hundreds of billions of data interactions every second. This level of data processing is a powerful consumption even for it.


    So, sleeping every once in a while has become inevitable.


    But no one expected that this time of hibernation happened to be in the stage of replacement of the underlying logic of "Fortress" and "Deep Web".


    So, Gao Gong came up with a good idea.


    ??If this thing can be done, not only can you hack into the old man''s head, but you can also sneak into Cybertron and get some good things for free.


    “At my side, the big data interface has been opened.”


    Not far away, Hitomi opened his mouth to report.


    “It’s also open here,” a neural modeler from the fortress said in the same way.


    ?Due to the particularity of cyberspace, the big data interface is not just a processing page, but an existence similar to a ‘different-dimensional space’.


    ?It can be embodied in reality, and what it shows is a complex ‘golden door’ full of cracks.


    ?It is a bit like the ‘hollow cavity’ in a certain comic, and it is also a bit like the lair of some Cthulhu monsters.


    As soon as the ''interface'' is opened, all kinds of strange emotional data, personality fragment data, and sensory data spurt out from the ''door'' like a torrent.


    It was also thanks to the satellite-level energy field suppression that sealed 95% of the human senses of everyone present. Otherwise, at least a few people present would go crazy.


    ?At the same time, waves of terrifying and indescribable aura overflowed from the ‘interface’. The big data interface was originally prepared for the concept of big data.


    The replacement of the underlying network protocol, or in other words, the golden rule, requires the participation of all big data concepts.


    In other words, the integration of all big data concepts is the complete underlying protocol.


    With his blurry vision, the senior engineer could see that endless black pipes spurted out from a door, directly squeezing and cracking the edges of the door, and then inserted into the planet''s mainframe.


    As if the sea of ??data appeared in reality, even if most of the senses were reduced, Gao Gong still had a strong feeling of melting.


    The apparition of an old man in black disappeared in a flash.


    ‘Old acquaintance! ’


    ?Pipeline Master!


    The traffic king in hardware, in reality, the combination of all cables and base stations.


    ?With the arrival of the Pipe Master, the other nine soon appeared one by one.


    ?Some are like ''pipes''. As soon as Fang appears, the huge shape seems to fill the entire space. It is the ''Prosthetic Giant'', the ''King of Information'', and the ''Data Shelter''.


    Some are relatively mild, and their appearance is more manifested into concrete images in reality, such as a bridge or rows of cameras, which are the ‘bridge of the deep web’ and the ‘peeping eye’.


    Also, they appear very hidden. If it were not for the positioning on the screen, you would not know their existence at all.


    They are ‘artificial intelligence ghosts’ and ‘hidden ones’. The former is an existence similar to the ‘inner demon’, just like people are afraid of ghosts. For artificial intelligence, the ‘ghost’ is that ghost.


    Even the most advanced artificial intelligence, once it is haunted by a "ghost", it is only a matter of time before the personality template disappears and the intelligent data is stolen.


    But in the AI ??world, it has always been an urban legend, and no one knows whether it is true or false, and whether it really exists.


    The latter is the collection of all ‘hidden files’. Those short cloud disk movies you watch, or the hidden folders hidden in various places, including company confidential files, are its essence.


    It is also the big data concept most closely related to ''cyber hackers''. The more secrets it has, the more powerful it is. Even in the later stages, it will issue tasks to players and let them search for things that are not under its control. ''Secret File'', and the reward it gives is also a rare second-level information skill.


    There are also some rather peculiar big data concepts.


    ?For example, as soon as Fang appeared, the big data concept of everyone present was stripped of their information, Cyberdome, search engine incarnation, and the mother of data—Alyssa.


    ‘Why are you here? Who gave you the qualification, oh, old man Aramaki, this old man is indeed not dead. ’


    Gao Gong''s mind suddenly rang with Alyssa''s curious words.


    At the same time, a series of prompts sounded on Gao Gong''s system panel.


    [Infected by the simulated hormones of the ‘Queen of Mimics’, your reproductive system modification rate +1%]


    [Infected by the simulated hormones of the ‘Queen of Mimics’, your reproductive system modification rate +1%]


    [Infected by the simulated hormones of the ‘Queen of Mimics’, your reproductive system modification rate +1%]


    …


    Almost at the same time, Gao Gong''s mind suddenly heard a lazy and heart-racing voice of Sister Yu. At the same time, Gao Gong''s sight was suddenly filled with colorful figures of Sister Yu in various forms. Fill up.


    ‘Little handsome boy, I have a feeling that you will become a great person in the future. Become my disciple and I will teach you the three thousand skills of becoming a female/male! ’


    [Are you a believer in the level 75 big data concept body, the ‘Queen of Mimetic’? ]


    At the same time, Gao Gong could feel that every part of his body was being gently touched by a soft little hand.


    ?Hormones are being secreted crazily—


    ?Queen of quasi-sensation, the youngest big data concept entity, and she rose to the throne with just one piece of hardware.


    ?That piece of hardware is called a virtual machine. It is a must-have for men and women, has healthy uses and is not suitable for children.


    What a guy, you actually preached to me, a former virtual master, who do you think I am!


    Got to pay more!


    ?Gao Gong resolutely chose ‘no’.


    ?There was a cold snort in the air, and the next moment, all the little hands disappeared, and Gao Gong suddenly felt a sense of emptiness and loneliness in his heart.


    ?It hurts, why don’t you just leave like this without giving me any more advice? Maybe if you give me some more advice, I’ll obey.


    The ten major concepts gathered together, and the last piece of the underlying protocol puzzle was completed. The next moment, the planet host, that is, the huge lattice metal ball began to shine, and starting from it, the entire Cybertron satellite lit up with thick energy. The shields were raised layer after layer, covering the entire satellite with an ''energy atmosphere''.


    The time when the underlying protocol is replaced is also when cyberspace is at its weakest. This level of weakness is fatal. I don’t know how many super hackers and network departments of large companies are thinking about this moment.


    Obtaining the dominance of cyberspace, in a sense, means gaining the dominance of this cyber testing ground.


    ?The method adopted by Cybertron is also very simple. It directly shuts down your network and cuts off all signals. Not to mention hacking, it prevents you from even hacking.


    Generally speaking, this level of defense is used for interstellar wars. Interstellar fortresses, galaxy fortresses, and super battleships of advanced civilizations are all protected in this way. Unless you kill its body, any hacking methods will be useless. use.


    At least in this galaxy, no civilization dares to directly attack the cyber testing ground controlled by advanced civilizations.


    ??But there is a small problem. The protection of cyberspace is invincible.


    But the protection of Cybertron''s body is not so strict.


    (End of this chapter)
『Add To Library for easy reading』
Popular recommendations
A Ruthless Proposition Wired (Buchanan-Renard #13) Mine Till Midnight (The Hathaways #1) The Wandering Calamity Married By Morning (The Hathaways #4) A Kingdom of Dreams (Westmoreland Saga #1)