Start with Mechanical Hunter

Chapter 518: Merging the Underlying Protocol Puzzle (Part 1)

There is an old saying that goes well——

With great ability comes great responsibility.

Ahem, I went to the wrong set.

To be precise, the larger the life form, whether it is a mechanical body or a carbon-based species, the greater the consumption.

For the planet host, it may have to process hundreds of billions of data interactions every second. This level of data processing is a powerful consumption even for it.

Therefore, sleeping every once in a while has become inevitable.

But no one expected that this time of hibernation happened to be at the stage of replacement of the underlying logic of 'Fortress' and 'Deep Web'.

Then, Gao Gong came up with a good idea.

If this thing can be done, not only can you hack into the old man's head, but you can also sneak into Cybertron and get some good stuff for free.

"On my side, the big data interface has been opened."

Not far away, Hitomi opened his mouth to report.

"It's also open here," a neural modeler from the fortress said in the same way.

Due to the particularity of cyberspace, the big data interface is not just a processing page, but an existence similar to a 'different-dimensional space'.

It can be embodied in reality, and what is displayed is a complex 'golden door' full of cracks.

It's a bit like the 'void cavity' in a certain comic, and it's also a bit like the lair of some Cthulhu monsters.

As soon as the 'interface' is opened, all kinds of strange emotional data, personality fragment data, and sensory data spurt out from the 'door' like a torrent.

Thanks to the satellite-level energy field suppression, 95% of the human senses of everyone present were sealed. Otherwise, at least a few people present would go crazy.

At the same time, waves of terrifying and indescribable aura overflowed from the 'interface'. The big data interface was originally prepared for the concept of big data.

The replacement of the underlying network protocol, or in other words, the golden rule, requires the participation of all big data concepts.

In other words, the integration of all big data concepts is the complete underlying protocol.

With his blurred vision, the senior engineer could see that endless black pipes spurted out from a door, directly squeezing and cracking the edges of the door, and then inserted into the planet's host.

It was as if the sea of ​​data appeared in reality. Even if most of his senses were reduced, Gao Gong still had a strong feeling of melting.

The apparition of an old man in black disappeared.

‘Old acquaintance! ’

Pipeline dominance!

The traffic king in hardware, in reality, the fusion of all cables and base stations.

With the arrival of the Pipe Master, the other nine soon appeared one by one.

Some are just like the 'pipeline'. As soon as Fang appears, the huge form seems to fill the entire space. It is the 'Prosthetic Giant', the 'King of Information', and the 'Data Shelter'.

Some are relatively mild, and their appearance is more manifested into concrete images in reality, such as a bridge and rows of cameras, which are the 'bridge of the deep web' and the 'peeping eye'.

Others appear very hidden, and if it weren't for the positioning on the screen, you wouldn't even know they exist.

They are ‘artificial intelligence ghosts’ and ‘hidden ones’.

The former is an existence similar to the 'inner demon', just like people are afraid of ghosts. For artificial intelligence, the 'ghost' is that ghost.

Even if the most advanced artificial intelligence is haunted by a 'ghost', it is only a matter of time before the personality template disappears and the intelligent data is stolen.

But in the AI ​​world, it has always been an urban legend, and no one knows whether it is true or not, and whether it actually exists.

The latter is the collection of all 'hidden files'. Those small cloud disk movies you watch, or the hidden folders hidden in various places, including company confidential files, are its essence.

It is also the big data concept most closely related to 'cyber hackers'. The more secrets it has, the more powerful it is. Even in the later stages, it will issue tasks to players and let them search for things that are not under its control. 'Secret File', and the reward it gives is also a rare second-level information skill.

There are also some rather peculiar big data concepts.

For example, as soon as Fang appeared, the data of everyone present was stripped away, the concept of big data, cyber girl, search engine incarnation, and the mother of data - Alyssa.

‘Why are you here? Who gave you the qualification, oh, old man Aramaki, this old man is indeed not dead. ’

Alyssa's curious words suddenly sounded in Gao Gong's mind.

At the same time, a series of prompts sounded on Gao Gong's system panel.

[Infected by the simulated hormones of the 'Queen of Mimics', your reproductive system modification rate +1%]

[Infected by the simulated hormones of the 'Queen of Mimics', your reproductive system modification rate +1%]

[Infected by the simulated hormones of the 'Queen of Mimics', your reproductive system modification rate +1%]

Almost at the same time, Gao Gong's mind suddenly heard a lazy, heart-racing voice of Sister Yu. At the same time, Gao Gong's sight was suddenly filled with colorful figures of Sister Yu in various forms. Fill up.

'Little handsome boy, I have a feeling that you will become a great person in the future. Become my disciple and I will teach you the three thousand skills of becoming a female/male! ’

[Are you a believer in the level 75 big data concept body, the ‘Queen of Simulations’? ]

At the same time, Gao Gong could feel that every part of his body was being gently touched by a soft little hand.

Hormones are being secreted crazily——

The Queen of Simulation, the youngest big data concept, and she ascended to the throne with only one piece of hardware.

That piece of hardware is called a virtual machine, which is a must-have for both men and women, with healthy uses and not suitable for children.

Good guy, you actually preached to me, a former virtual master, who do you think I am!

You have to pay more!

Gao Gong resolutely chose "no".

A cold snort came from the air, and the next moment, all the little hands disappeared, and Gao Gong suddenly felt a sense of emptiness and loneliness in his heart.

It hurts, you just left like this, and you won't persuade me anymore, maybe if you persuade me again, I will obey.

The ten major concept bodies gathered together, and the last piece of the underlying protocol puzzle was complete. The next moment, the planetary host, that is, the huge grid metal ball, began to shine, and from it, the entire Cybertron satellite lit up, and the heavy energy shield rose layer by layer, wrapping the entire satellite with an "energy atmosphere".

The replacement time of the underlying protocol is also the weakest time of cyberspace. This level of weakness is fatal. I don’t know how many super hackers and network departments of large enterprises are thinking about this moment.

Gaining the dominance of cyberspace, in a sense, means gaining the dominance of this cyber test site.

And the method adopted by Cybertron is also very simple. It directly shuts down your network and cuts off all signals. Not to mention hacking, you can’t even hack.

Generally speaking, this level of defense is used for interstellar wars. The interstellar fortresses, galaxy fortresses, and super battleships of advanced civilizations are all protected in this way. Unless you kill its main body, any hacking methods are useless.

At least in this galaxy, no civilization dares to attack the cyber test site controlled by advanced civilization head-on.

But there is a small problem. The protection of cyberspace is invincible.

But the protection of Cybertron itself is not so strict.

Chapter 518/1212
42.74%
Start with Mechanical HunterCh.518/1212 [42.74%]