The Strongest Hacker

Chapter 275 Mutant Infestation (Part 2)

Chapter 275 Mutant Infestation (Part 2)

Chapter 275 Mutant Infestation (Part 2)

Zhang Yang himself didn't know what kind of state the infected insects were in. After a few mutations, the infected insects already had preliminary logical analysis capabilities. Afterwards, Zhang Yang added this to the infected insect system according to the simulation function of the brood nest. The simulation function, this function and the initial logic analysis ability of the Infector once almost caused Zhang Yang's server to crash, and then the Infector adjusted itself, so that the server system did not completely collapse.

Looking at the log in the infected worm, Zhang Yang's face is quite weird, should he say he is lucky, or nubi is unlucky? The so-called Adam is a semi-finished product of Chapter 275 Mutated Infection Worm (middle), all its subsystems have been completed, and when nubi designed Adam, it was built according to the neuron allocation structure of humans and animals made.

The whole system is divided into many subsystems. The end of the subsystem is equivalent to the neurons of the animal or human nervous system. These subsystems can be analyzed and integrated together, just like the brain manages neurons. The whole system The utilization rate and the reflection speed are surprisingly high.

But this brain is not so easy to program, even if Nubi has concentrated so many experts, there is no way to program this brain in a short time, and then m’s laptop was sent to this secret research base, when connected to the base Immediately after the internal network, the infection worm infects the entire network.

However, although the entire system has not been completely completed, this system with preliminary logical analysis is still different from the normal operating system, and then the simulation function of the infection has produced a huge effect. Then there is the mutation of the infected worm, and how it mutated can't be seen from the log.

The only thing that can be seen from Chapter 275 Mutated Infector (middle) is that the mutation process has gone through at least tens of thousands of mutations, and the last log that made Zhang Yang almost laugh out loud is that when the Infected Worm After connecting to the external network and transferring the data, all the programs of the Adam system, which took more than ten years to write, were completely transferred by the infected bug, and all the computers in the secret research institute collapsed and went on strike directly because of the system transfer.

Such a large data transfer, if nubi can't find it, it will be a ghost, and the reason why nubi broke out in the United States is because the most peripheral of publicity is in the United States, when the infected worm transfers data, it is transferred from i in the United States , That's why nubi frantically searched for these data in the whole of the United States, but the people in nubi didn't expect that Zhang Yang's action was so fast that he directly cut off the connection in the middle, causing them to lose the connection of these data.

After more than ten years of research, I spent countless manpower and material resources in the middle, and finally made a wedding dress for Zhang Yang.

Even more serious than Nubi going crazy. You must know that the entire system has been written for more than ten years, and the infected bug is ruthless when transferring data, directly including the underlying data. The research institute has no other information except the system structure information. All have been cleaned, in other words, nubi now has nothing, even if reprogramming an Adam, I am afraid there is no way to do it.

Haha! mlgbd, this is called evil comes with evil, haha! Zhang Yang couldn't help laughing wildly in the dormitory after he understood the whole process. Stealing research materials from other companies, and finally, something that I have been researching for more than ten years was stolen by an infected bug in such an unintentional mistake.

Zhang Yang didn't know what the manager of nubi's organization was feeling at the moment, if it was Zhang Yang, he might cry to death. It's just that Zhang Yang is probably even more at a loss as to what the infection worm has mutated into now. Infection, are you an operating system or a virus?

The database is insufficient, so I can't answer. Are you allowed to search online? The voice of the infested machine rang again, and Zhang Yang shrugged his shoulders. It seemed that he was thinking too well. He really thought that the infested machine had become a supercomputer. Yes, it is not much different from before, except that a voice command function has been added.

What is the information in the database? It will be displayed on the screen. Zhang Yang asked again tentatively.

This time, the infected worm quickly listed the data and displayed it directly on the computer screen. First, the system structure composition database of infectious insects.

Second, sound collection and distribution, conversion database.

Third, the subsystem fuzzy judgment analysis retrieves the database.

Fourth, hardware matching, retrieval, and calling the database.

Fifth, analysis and calculation formulas, data simulation formulas, data analysis formula framework, no content.

Sixth, chat room structure components and chat record backup.

These are six major items, and there are numerous small options under the six major items. After reading it roughly, Zhang Yang understood that, except for the sixth item, all the others are the core structural data of the entire system. In other words, the size of the entire system is almost a hundred g.

As for the sixth item of publicity, I am a little curious. It is probably the chat records of the secret research room of nubi. Read the sixth item. Zhang Yang tried to speak.

The review is complete. Following the words of the infected bug, a text document immediately appeared on Zhang Yang's screen. Zhang Yang immediately came over curiously to check.

At the top are some useless chats and some discussions about artificial intelligence programming. Zhang Yang is not interested in these. What he wants to know now is where the nubi organization is and what kind of organization nubi is. I don't know if there are related records in this chat room.

After flipping through a few pages, Zhang Yang didn't find what he needed, and the beep from the bug-infested machine sounded abruptly: Would you like to record user habits and generate a relevant matching database?

After being stunned for a moment, Zhang Yang immediately understood what this meant. In fact, it is like the theme of your personal computer. Everyone has their own usage habits, and this database should be used to record user habits. Nubi is really crazy, even these details have been considered, no wonder the whole system has been written for more than ten years and has not been written yet.

Yes! Can you change the voice? Is there anyone who is more human? Zhang Yang is not in a hurry to look at the data. Now it is the most important thing to know what the infected bug can do after it has completely mutated into a system. of.

The data is established, and the authority is the first core sequence. After the sequence is generated, please create a unique control authority password. It is detected that the core password already exists. Do you want to replace it?

No change. The core control password of the infected bug is a 32-digit password, and Zhang Yang may not remember it any longer. More importantly, such a password alone cannot guarantee absolute security, but Zhang Yang has no good solution for the time being. It can only be like this first.

The generation is complete. May I ask if you want to perform the first self-test. Immediately afterwards, another prompt sounded, and Zhang Yang immediately understood that he should have touched a pre-set system startup process. Only when such a setting is completely completed, I am afraid that the function of the entire system can be fully utilized.

Yes. Zhang Yang nodded curiously. Nubi's ability is good. Although the mutation has a lot of credit for becoming the infection bug that is now like Zhang Yang, but it cannot be denied that if there is no half-finished Adam of Nubi, just Zhang Yang programmed the infection into what it is now, probably not for decades.

This time there was no notification sound, but the data on the sky blue screen began to refresh constantly. The result of the self-test was unexpectedly fast, and the self-test was completed in less than a minute. When the self-test was completed, the entire computer screen immediately turned bright red, indicating that the full screen could not fit.

Looking at the terrifying drop-down menu next to it, Zhang Yang is full of black lines. This m may not be able to finish reading it next year. Nubi group of ****, why do you write the system so perfectly when you write the system?

The system security status is zero percent. Suggestions, first, increase the system hardware. The hardware required to fully utilize the system performance is about as follows u... The mechanical notification sounded immediately, and Zhang Yang's head grew dizzy when he heard it. Zhang Yang said quickly: Skip all the prompts, and list the highest-level alerts on the screen according to the alert level.

A clear sound of ding sounded, the mechanical notification sound stopped abruptly, and then several red è warnings marked with nine stars appeared on the computer screen. Zhang Yang looked at the top one, the first sequence of passwords was too simple. There are hundreds of small lists under the second article. All in all, Zhang Yang's server is too rubbish to perform system functions. The following hardware needs to be added to fully utilize system functions.

And it's so humane that he even counted the amount of uā fees required, but just looking at the 11-digit number, and the unit is still $ (US dollars), Zhang Yang rolled his eyes, and simply chose to ignore it. With a hardware investment of more than 10 billion, sell Zhang Yang to see if it is enough.

Time passed quickly, until early in the morning, when Zhang Yang's stomach started growling, he suddenly realized that he didn't seem to have eaten yet. The ability to infect insects has been almost tested. In just one night, Zhang Yang was completely defiled by the infected insects. Oh, no, I can't say that he was defiled, but he was attracted by the infected insects.

Convenient, so m convenient! With such a system, it can only be said that if Zhang Yang wants to do something, he can just speak directly. What he said will be automatically converted into an order, and then the computer will automatically execute it. There is no need for Zhang Yang to execute it by hand. Moreover, you don't have to worry about command errors like those smartphones, the fuzzy search function written by nubi is very powerful!

More importantly, if you want to use your hardware resources, you don't have to worry about hardware resource costs. This system can maximize and optimize system resources to achieve optimal use, and when analyzing something, you don't need to do it. Just have to wait for the result.

The only fly in the ointment is that when you give an order, you have to learn to give the order in a stylized language just like the program. For example, you let him call the qq program. You can't tell me to open QQ, the system still can't understand such a humanized language, you have to say, run the QQ program. In this way, the system can understand what you mean.

And there is another problem. Although it is an intelligent program, its core settings are all in English. If it is converted to Chinese, a lot of codes will have to be rewritten. But fortunately, the internal setting page of the infecting worm was originally set in Chinese, so when the infecting worm mutated, it automatically translated the English. That's why it speaks Chinese.

There were mistakes in the automatic translation, and Zhang Yang had to use his authority to correct them one by one in many places, so that the infected bug could rewrite the system database. But what makes Zhang Yang happy is that the original virus function of the infected worm has not disappeared. It is now like a queen in the ant network, and the small virus placed is a small ant, which can contact and control all copied viruses.

The only pity is that the future is beautiful, but the reality is cruel. The server in Zhang Yang's dormitory is very awesome in the eyes of ordinary people, but the result of running this system is that it cannot run for a long time at all, and the system cannot be searched online, otherwise, the computing speed will be overclocked in an instant, and the entire server will be directly burn.

In other words, Zhang Yang now has an extra tool that can mechanically chat with him. Other than that... there is no benefit at all. More importantly, even if the system is not running, it still takes up system resources. If Zhang Yang uses the system by himself now, it will be slower than before. All in all, for Zhang Yang, this seemingly awesome system can be summed up in four words...it is useless.

Okay... I don't blame you for my computer being down because it still satisfies me. Zhang Yang said helplessly, but if anyone else saw that expression, they would see it anyway. They all looked like they were beating each other.

Opened the Heimeng forum with his laptop, Zhang Yang spent the whole night testing the system, and didn't pay attention to what was going on online, so he went to the forum to see if there was any latest news. After opening the Black League forum, the highlighted post on the top was a conversation with gd, and the following were countless guesses.

At first, Zhang Yang felt very excited when he saw the words scolding him, but now Zhang Yang felt happy watching it. The more he watched, the happier Zhang Yang became. Ah! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like