Chapter 250 Network Raiders(1/2)
Turing once again showed a small Geller Sting cage and locked the fly in, carrying the pink fly into a portal.
"The Crohn Technology Exhibition is a builder capital event that is held every six months. The initiator is the Crohn United Group, but it is jointly organized by multiple forces participating in the black market. In addition to the joint group, there are also people from Jiuke and Crime Bureau, as well as some other builder capital."
The fly that temporarily reached a deal with Turing began to inform Turing of the Crohn Technology Exhibition.
"The science and technology exhibition is used to discuss the latest technology, product releases of black market capital, technical exchanges and cooperation between different companies. Some contradictions will be specially selected on this day and resolve the problem through negotiation."
The pink fly was concise and to the point, Turing's mind soon had a rough prototype:
It's like a commercial exhibition event in the dark world, but it's not just a commercial event.
Turing looked up and looked above him. A man and a fly had arrived at the center of this cyberspace - the super-large building.
The reason why he came here was a proposal from Turing after reaching a brief cooperative agreement with the fly.
"So, will there be a lot of cutting-edge technology and trial technology in the black market be released at the Crohn Exhibition?"
"That's right." Fly's answer was straightforward and short. The fly under this personality no longer had the feeling of being slightly cute before, nor did he show any reaction to Turing's "ignorance". It seemed that nothing except the goal was worth saying.
And it seems that it is because the fly promised something more important than the information at the Crohn Technology Exhibition in cooperation, and it has no intention of hiding it at all.
"Now we've reached the central building, what about?" Turing brought the topic back to his eyes.
"I can generate a bug (vulnerability) troubleshooting program, which takes us to find the vulnerabilities in this cyberspace to enter deep data, and then find the vulnerabilities in the deep data, and control the entire security system by implanting the background program. In this way, when we take the 'school bag', we will not be chased by the security system, and we can directly locate the hacker, but you need to let me out now."
"Let you come out?" Turing smiled back.
It means you don't even think about it.
"We have fulfilled part of the promise, and it is time for you to show your sincerity. We will not leave, but will teach you the source code of the vulnerability troubleshooting program according to the terms of cooperation, and the same is true for implanting Trojans."
"Now letting you go out is not in the oral terms of our cooperation. Since you are so powerful, why don't you choose to escape into the deep data first when I unblock the program?" Turing raised the cage to the same horizontal line as his head and tapped it lightly.
"It takes a certain amount of time to troubleshoot the vulnerability, otherwise we will be able to escape from the security guards before. If you don't want to, I won't say anything next."
The fly's attitude was still tough. Turing squinted his eyes and looked at the guy, then put the cage down.
The two sides have no trust basis, so it is difficult to cooperate, but fortunately, Turing has already obtained some of the information he wants.
Before the Pink Fly proposed to him the plan to enter the deep network, he told him the basic construction of the Cyberspace.
Cyberspace is a virtual reality space created with bismuth network as a programming language architecture, and is divided into two levels: surface space and deep network.
The surface space is where Turing is now, and the deep network, in the flies, is more like the feeling of Turing using molecular deciphering lines to enter the data, looking directly at the data itself. The "small schoolbag" was also stolen from the flies.
To enter the cyberspace, the fly mentioned a brain connection technology called "brain-computer interface plug-in". In the fly's mouth, this technology is the standard for every hacker, and it seems that it defaulted that Turing used this technology to enter the cyberspace and did not say much about it.
But Turing himself knew very well that he entered the cyberspace using the [Brain Wave Haunted Synapse] after climbing from the [Molecular Deciphering Line]. Compared to flies who can only fly in the air and spray tears to attack, and the young ghosts who hacked in with various concrete programs, Turing knew very well that the [Brain Wave Haunted Synapse] had unique abilities in this space.
At least it is much more powerful than the software programs of these two guys.
Turing ignored the flies and explored the bismuth network data, trying to open a portal directly to the deep space, but failed.
"The only way to enter deep space is to find vulnerabilities, and then use the software you brought in to investigate and exploit the vulnerabilities." The flies' voice came from the cage, and Gu Jing Wubo's tone was filled with a hint of mockery.
However, Turing ignored it, closed his eyes and sensed his real body, trying to further stimulate brain waves to terrify into synapses.
When Turing opened his eyes again, the scene in front of him suddenly collapsed and turned into pure green binary data arranged in front of him.
They are of different sizes and flow densely. Some are eroding like waterfalls, while others are slightly waving like a pool of stagnant water.
Turing looked at the flies on one side. The difference from other data around is that the data that constructed the flies are dense and flowing rapidly, and it seems to stand out in a world of a large number of binary data.
"I'm very curious. Since you have already obtained the 'school bag' before, why don't you write down the things inside and evacuate them directly?" Looking at the dense green data in front of you, Turing spoke his question to the fly.
"Except for the highest user group, deep data cannot be read directly by users, so it needs to be taken out of the cyberspace for data decoding. This is common sense." The fly glanced at Turing, and a hint of contempt seemed to flash in the dark big compound's eyes.
The fly is right.
Even Turing's current state cannot directly identify the meaning of these data in its own terminal. According to the basic architecture of the cyberspace revealed by Pink Fly before, hackers are equivalent to black users. When entering an unknown cyberspace, they will forge a fake user group for themselves. Although it will still trigger an alarm on the network ice wall, it will not cause the internal system to directly locate them, unless they encounter a security guard (antivirus software).
But the problem arose again. Turing did not do so. He came in directly through the crack of the ghost's ice wall.
And compared with these hackers who play software, Turing relies on hardware (brain waves hit into synapses).
Therefore, in Turing's eyes, although these data are still unreadable, the changes in these data can be clearly observed.
Where exceptions occur, that is, the location of data conflicts and system vulnerabilities.
Holding the fly in his hand, Turing opened the portal and walked into the building. In the eyes of the fly, the two came to the inside of the building, but in Turing's eyes, he stood directly in a position with abnormal data, and then reached his hand directly in to generate a new portal.
In the flies' astonished eyes, the two fell into a completely dark space, which was a dark space composed of a large amount of crawling underlying data. In the eyes of the big compound that looked at Turing, it was full of incredible:
"How did you...how did you do it?"
It seems that Turing's approach is too shocking. In this state, the flies' tone of originally having no emotional fluctuations, which fluctuate abnormally obvious tremors.
"I observed the loophole, and then I came in, it was that simple."
"This is impossible! You don't have any deciphering software!!"
But I have "plug-in" hardware.
Turing replied to the fly in his heart.
"So, how to take over the safety protection system?" Turing lifted the cage, but the flies fell into silence again.
Turing smiled and began to find a way for himself.
The brain waves terror into synapses come from the central "cylindrical brain" device of carbon-based destroyers, and is a hardware device used to connect the human brain inside the cylinder brain to the entire mechanical body.
After being used by Turing for hacking, he believed that there were still many functions of this thing that had not been developed by him. Compared with the "technical support" of this fly, Turing trusted his technology tree more. Regarding the data of Waner, Turing believed that this fly hacker must be more skilled than himself, and would be cheated if he was not careful.
And if I had been consuming it here, the fly could not find its "little schoolbag" and would probably not sit back and wait for death. But for me, all this was just an unexpected gain in the process of testing new technologies.
It will compromise.
After entering the deep network, Turing quickly found the location of the data abnormality, and then heard the flies' vicious soft and soft voice coming from the cage:
"I will teach you how to write backend software and continue to cooperate."
The focus of hacking systems is to find vulnerabilities, not create them.
In its opinion, this fat man with first-class bug-finding ability will soon find vulnerabilities in the deep data. Even if he does not use the background program and does damage it casually, the security guards outside will sooner or later be eliminated. In this action, he will definitely not have a good ending, which does not provide value in this action.
The flies can only compromise.
...
On the street built by Cyberspace, ghosts ran away quickly while trying to open the pink schoolbag in their hands.
"...This thing was indeed stolen directly from deep data. It must be returned to reality and decoded and decoded. It seems that the fly is not a hacker to mess with... I have to hurry back to the port position entering this space and run out."
The ghost muttered, barely hung his pink schoolbag on his shoulders, and tracked down his program path when he came through the goggles that looked like night vision devices on his head.
At this moment, a security guard rushed out of the alley in front of him and raised the muzzle in his hand. The ghost trembled all over, but there was no pause at all. With a flash of noise, the old-fashioned small pistol appeared in his hand.
But just as he raised his pistol and pointed it at the security guard, the security guard suddenly trembled all over, and dense blue arcs flashed across his body, and the red light on his entire face suddenly turned yellow.
Then, the security guard put away his guns and entered a warning posture and wandered around the ghost, but had no intention of attacking him at all.
"It's a malfunction?"
The ghost said subconsciously, then shook his head violently.
The robots here are all manifestations of safety systems, so how can individual failures occur?
Then the answer is about to come out:
The safety system has failed.
The fly was trapped by the security system. The fat man who had made trouble before was hit by his attack program. Even if he did not turn into cerebral palsy, his penis should have burned out.
So the only conclusion is that either the fly has escaped or there are other hackers here.
As for the exceptions of security programs, it will take a long time to hack deep data, so the conclusion must be the latter.
"Although I don't know what this cyber black market is, someone actually entered the deep network to hack the entire security system..."
Ghost ignored the faulty antivirus program before, and also discovered that the antivirus program that had chased him had now entered a warning state that would not trigger alarms or chases, and he was even more sure of his guess.
All the security guards went down, and his escape route was completely out of control.
"All hackers who can hack the security system have appeared... Although I can do it for a few more months, this place is indeed not simple. The data I have now must have something interesting hidden!"
The unobstructed ghosts soon arrived on an empty street.
He threw away his pistol casually, pulled out a drill from the air in a flash of noise, aiming at the space in front of him to "sir" spiral. Soon, a large piece of debris fell into the air, revealing the white blank cyberspace behind him.
The ghost jumped out and immediately rolled into the cyberspace outside. As soon as he stood up halfway, he saw a familiar pistol pressing against his forehead.
He was stunned on the spot.
It was not only because of this sudden incident, but also because of the familiar fat man and the gun held by the other party.
The ghost opened his mouth and before he could say anything, he heard a gunshot, a bullet hole appeared on his forehead, and his figure fell heavily to the ground.
Looking at the ghostly shadows gradually dissipating, Turing blew at the realistic program small broken gun, threw it away in a illusory variegated color, and then picked up the pink small schoolbag on the ground.
"You should let me out." The fly stared at Turing.
"But there is only one portion of this thing."
"Don't make excuses, copy and paste."
To be continued...