Russell's glance at the camera instantly crossed countless rivers of data and appeared in front of Delphinium at the other end.

Many translucent windows appeared in front of her, and she was working on them quickly.

With a calm expression on her face, she stretched out her hand to maximize the window.And dragged many small windows from all around and placed them around to start simultaneous monitoring and operation.

The location of Delphinium's prosthetic interface is similar to that of the Inferior, between the wrists and forearms of both hands.

At this moment, a data cable extended from the interface on each of her wrists and was connected to her thick tactical gloves.

She has a rectangular square on each of the palms of her gloves.It is emitting heat that cannot be ignored. If Delphinium presses its gloves on someone else at this moment, it may even directly burn the other person.

It was an ultra-portable computing device called a "dishboard system."

In this era, the chip embedded in the back of everyone's head can already meet most daily needs.

Such as time, location, payment, watching live broadcasts, browsing videos, playing games... It can almost be said that there is no room for the survival of "personal computers".

Of course, this small chip cannot have high computing power.Otherwise, once it starts running, my brain may be burned out, let alone playing games.

These data are actually downloaded directly after being processed from the cloud with almost completely synchronized ultra-high download speeds.Whether you are watching live broadcasts or videos, or watching Shuishui forums, reading news, or playing games, the final image is downloaded directly after the calculation is completed, rather than processing the data locally.

In other words, what this chip actually does in daily life is... like the data cable connected from the graphics card to the monitor.

Even those data that are not convenient for public calculation do not need chips at all - for example, the data platform used by the bartender in front of Russell is the shared computer in this store.Companies also use this kind of large-scale, integrated computing system... This is actually to ensure that no one takes the computer away or uses the company's computing resources to calculate something for themselves.

So there is no such thing as a "personal notebook" in this world.Of course, it is also because the group does not allow production.

So, how do those psychic hackers and cyber detectives travel on the Internet?

Do they each carry giant desktop computers with them?

—That is of course impossible.

Psychic hackers and cyber detectives can even travel directly in the "Matrix" world.

It was a virtual world full of sympathetic illusions that looked like the real thing, but were actually different... It was a shared world of "psionic networks" constructed from seven islands in the sky, and the principle was said to be related to the collective subconscious.The reason why people's download speed can be so fast, even infinitely close to "simultaneous synchronization", is precisely because the essence of this kind of network is not simply electrical signals, but related to psychic energy.

That's not so much a download as a "sympathy."

On the other hand, a skilled psychic hacker can penetrate this matrix world.By using psychic energy to attack "ICE" - the network protection system, you can even paralyze the opponent's firewall at the data level.

The biggest difference between psychic hackers and cyber detectives is "understanding".If they understand the matrix world as the "sea of ​​collective subconscious", they can use psychic powers in it, but it also means that firewalls, anti-virus software and other things that originally only existed at the data level will also be symbolically transformed in the matrix. as an entity.If you are killed by those things, or even just suddenly disconnected from the Internet, you will become a vegetative state in reality.

The latter just understands the matrix world as the data world and puts itself in a higher data layer.Therefore, you can enter or leave the matrix world at any time.

The common weapon they need is the "dishboard".A highly integrated auxiliary computing device - it can also be understood as a "prosthetic body of prosthetics".

Because discs are undoubtedly contraband at the same level as firearms and cannot pass most security measures, they cannot be directly installed on the body as a prosthetic body.

But as a kind of "equipment", if it can be connected to the prosthetic interface at any time... it will be much easier to carry.

There are only three kinds of people who can use the disk - psychic hackers, cyber detectives, and information security engineers.The relationship is probably like that of bandits, knights and escorts.

If you have a disk, you can hack into surrounding networks anytime and anywhere.Quickly control the surrounding cameras, display screens... and even directly control the chip on the back of the other person's head, and then control the prosthetic body on the other person's body.

Of course, different levels of users have different strengths of personal firewalls.

There must have been a psychic hacker among the gangsters on the airship.

That's why he was able to accurately release the virus in the first-class cabin - in the same network environment, the virus developed by the Tower of Babel could even destroy the elves' highest-authority firewall.

Different models of decks integrate different types of functions.

In order to ensure portability, it is characterized by specialization rather than omnipotence... By changing the disc, different types of information intrusion can be achieved.

The disc Delphinium is using is called the "Eye of God".Built-in "key" that can quickly crack most camera security protocols.

Originally, it would take more than ten seconds to hack into a camera even with Delphinium's technology.It may even be discovered by information security engineers.

But if she uses the assistance of "God's Eye", she can control the cameras of all stores in a street in two or three seconds, and can even accurately disable one of the cameras.

As for display screens such as ordering food, billboards, and billboards, they are basically not protected by security protocols.She can control it easily without the aid of a disc.

Now there are dozens of densely packed windows in front of Delphinium.

These windows are semi-curved, enveloping her inside.It's like a light shield spread out in front of you.

In order to maximize her concentration on using the "dishboard", expand the window, and analyze data, her work efficiency is much higher when she stays in the office than when she goes out.

Although Delphinium is not a psychic hacker, if it receives too much external interference, it is still possible to leave some tails due to distraction.

In order to prevent fatigue caused by the impact of too much information... and also to not directly attack the firewall of the Honeycomb Nightclub.She used Russell as a springboard for her invasion - when the bad guy reported to her that Russell had entered the Hive Nightclub, she immediately unfolded the saucer and plundered the information from all the surrounding probes indiscriminately.

Because the moment Russell's chip entered the "Hive Nightclub", he had already connected to the LAN of the Hive Nightclub.

Delphinium immediately controlled the sixteen cameras in the lobby of the Hive Nightclub and closed seven of the windows that could not track Russell's location.

As Russell approached the front desk, relying on the listening device at the front desk, Delphinium eavesdropped on the conversation between Russell and the bartender.

So she ran the disk system at full capacity again, quickly collected the cameras in all the rooms in the nightclub, and by opening and closing them very quickly, she found Xiao Liuli's room in just five or six seconds.

Behind the Honeycomb Nightclub is a certain director of Tianen Group.It would be very troublesome to hack into its database of personal user information.

But if you just look up today's room opening records, it will be much simpler.

Delphinium relied on the room number that she had already learned to search for today's consumption records, and quickly located the customer's identity information.

It was only later that she learned the pseudonym Xiao Liuli used - which was natural.

Since they all came in wearing masks, of course it was impossible to tell their real names.Otherwise, wearing a mask would be the same as not wearing one?

Before Russell's conversation with the bartender ended, Delphinium quickly wrote the information on the nearest screen that Russell could see.

Looking at the monitor, Russell took a bracelet from the bartender and registered it under his pseudonym.

Delphinium breathed a sigh of relief.

"So this is what's going on here..."

She murmured softly, obviously also curious about the inside of "Beehive Nightclub".

Although Delphinium felt a little worried when Russell was accosted by the female high school student... But in order to control the situation as soon as possible, she still chose to hijack the camera first.

Fortunately, Russell managed to get away from them and was not dragged away, otherwise Delphinium would have rushed to shake the bad one over to save the situation.

After that, she was not idle either.

After just taking a sip of water, taking off her gloves, and changing a set of plates, she started to invade all the prosthetics in the room in batches, using the room where Xiao Liuli was as a benchmark.

Delphinium had seen it with the "God's Eye" before, and there was no monitor in Xiao Liuli's room.

But maybe someone will use a hearing-enhanced prosthesis - after all, you can't retrieve information directly from your brain, and the chip won't record what you hear or see.Even for screenshots and videos, the cache files are not local, but on the Cyber ​​Order's server.

Her judgment was obviously correct.

The camera showed that besides her, there were only two girls wearing smiling masks in Xiao Liuli's room.

However, the "Tail Spike-C" disc told her that there were four prosthetic transformers quietly hidden in the corner of the room.

"...What's going on? This level of transformation is more than half.

Delphinium's flying fingers stopped, and she frowned in confusion and murmured in a low voice: "The bodyguards hired by Tian'en Daily are too...professional, aren't they?

“Everyone is actually equipped with a personal firewall, so rich!

"But why... the 'deep sea' type?"

[Deep Sea] is a typical passive firewall and a type of customized firewall. The annual membership fee for the personal version of the genuine system costs seven to eight thousand.

It is not as aggressive as [Honeypot], which can counter-track intruders; nor is it like [Black Ice], which uses inert data to make itself indestructible. The biggest feature of the "deep sea" firewall is that it can greatly extend the enemy's intrusion time. It is generally used in corporate information databases and used with alarm systems as internal wall protection.

Nothing else works, but it's a must-have when it comes to "hard dragging".It's like a stone wall without arrow towers.

This kind of thing is really meaningless for personal protection.

If you really want to invade, it only takes about 10 minutes for the delphinium to get in.

In terms of personal protection, it is far less safe than "honeypot" and "black ice".

The former can make psychic hackers fearful and afraid to go in, worrying that they will not be able to get out; the latter simply has a too high security level and cannot be opened from the inside without social engineering means, which means it will be impossible to open it.

I always feel like something is wrong.But after thinking about it carefully, Delphinium still didn't get any inspiration.

So she went ahead with the invasion.

Because of the firewall, she couldn't directly take over the other party's prosthetic authority, but she could make a crawler and find ways to bypass information protection to steal intelligence.

It took about half a minute, until Russell swiped his card to enter, before Delphinium successfully crawled into the listening data of one of the bodyguards' hearing aid prosthesis.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like