Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 772 Lock and Net Upgrade Materials Delivered Automatically

Jiang Yan is not unfamiliar with this uninvited guest who suddenly broke in, because he had just seen it in Kamon's life-seeking mirror not long ago.

The strange spiritual body in black mist, the hideous and terrifying face like a ghost, and the strange golden and red eyes... It was the curse slave puppet that had just broken through the incarnation of Kamon's secret technique.

But the other party's way of appearing was very strange, because it did not move directly from the outside world, but suddenly appeared from the void and penetrated into Kamon's body, which was a bit elusive and unpredictable.

You should know that since the Dreamland began to use the regional defense method of locking the net, it has not only built a locking net defense line in the magic plane, but also built a layer of locking net defense line in the entire country's territory.

.

If this curse slave puppet directly invades the territory of the Dreamland from the real space, it will definitely be sensed by the locked network in advance. The countless smart brains that are almost everywhere in the Dreamland are not decorations.

Jiang Yan had just raised this doubt, and just the next second, Zos' belated report came from the network of the sub-computer.

[Master, just now, the lock network monitored a somewhat unnatural energy reaction, but this energy reaction was too slight at first, and the low-level brain whistle on the peripheral lock network monitoring layer failed to detect its traces in time, until the other party

After entering the scope of the Red Xuan Forest, the advanced brain whistle in the inner layer of the lock network finally barely noticed something strange, but our response speed was still a little late, and the brain still had no time to track it.

And send a warning signal, it has already invaded you.]

Zos took the initiative to admit his mistakes without any refusal: [I'm sorry, this is our dereliction of duty. We are willing to accept punishment for this.]

After listening to Zos' report, Jiang Yan suddenly realized.

Well, it's not that the lock net on Needles didn't notice the invasion of the Curse Slave Puppet at all, but the invasion of the Curse Slave Puppet this time was too fast, and the power system of the Curse Slave Puppet is

It happens to be an unfamiliar category that is not involved in the current lock monitoring database. The low-level locking mailer responsible for the vigilance of the Needles peripheral area was not able to discover it at the first time.

The defense intensity of the network lock warning and defense system of the Dream Country is actually different in different regions. This mainly depends on the strength of the intelligent brain that is responsible for the network lock node in the region. The higher the intelligence

The higher the defense strength of the area near the locking nodes that the brain acts as.

By efficiently raising livestock to cultivate low-level souls as a means of making smart brains, the number of low-level data-based smart brains in the dreamland is very large and grows at an extremely high rate every day. Unfortunately, this is limited to

Level 0 low-level intelligent brain.

However, intermediate and advanced intelligent brains such as level 1, level 2 or even level 3 cannot be directly made with the souls of ordinary livestock as materials. Therefore, the ratio of the number of intermediate and advanced intelligent brains and the number of low-level intelligent brains is different from that of low-level intelligent brains.

It is very different. The number of nodes in the lock network defense system is very large. It is impossible for the Dream Country to use mid- and high-level intelligent brains as nodes. The low-level intelligent brain is the mainstream of the nodes of the lock network system. This leads to the lock network

There must be some differences in the strength of defense between different nodes, including primary and secondary strengths.

Of course, this difference is not big, because the network lock system is based on the sub-machine network, and the intelligent brains in the sub-machine network have a very powerful ability, which is to make their own data-based by stating their own

The soul body moves arbitrarily on all subcomputer network nodes in the form of a 'data state' and transmits information almost without delay. This allows the nodes of the lock network defense system to be adjusted as needed at any time, with extremely strong temporary operations

Resilience.

If any low-level locking node's defense line encounters an enemy that is difficult to block, the advanced locking nodes in other locations can support the past at any time and block the enemy.

However, even if they can support each other, this response method must first discover the enemy situation and trigger the alarm signal to allow other advanced lock nodes to receive the information before proceeding smoothly.

The ability of intelligent brains who act as network lock nodes to seek enemies is based on the differences in individual strength. In order to make up for the early warning loopholes caused by this difference, Jiang Yan specially improved the network lock and designed it

A program specially designed for Lock Network Intelligent Brain to monitor enemy searches has been released.

The full name of this program is [Self-regulated Data Scanning and Feedback System], and is simply called [Data Radar].

In fact, it is a skill that uses data signal waves to scan radar. However, Jiang Yan made special adjustments to it so that even the lowest-level intelligent brain can use the [Data Radar] program to explore various information.

Capabilities are incorporated into simple data signal waves.

How to ‘incorporate’ method?

In fact, it is Jiang Yan who specially wrote a corresponding trigger data signal for a target based on the data nature of a target, so that this data signal can contact and sense the target after being released, and send the special feedback signal back to the intelligent brain.

.For example, for foreign enemies sneaking in the 'shadow dimension', a certain special data signal corresponding to the 'shadow dimension' can be contacted in the data detection wave released by the intelligent brain, thereby causing feedback to allow the intelligent brain to perceive it.

to the 'shadow dimension' situation.

Simplifying this process into automated processes even the lowest-level intelligent brain and improving efficiency is the purpose of Jiang Yan writing the [Data Radar] program.

After that, when Jiang Yan discovers new power or ability, he writes the corresponding radar-specific data signal, updates it to the [Data Radar] program, and then lets the sub-machine network share it.

All intelligent brains that have upgraded [Data Radar] will have the ability to scan and discover the type of target corresponding to the data signal.

Therefore, when facing the lurking invasion of some extraordinary enemies, if the corresponding data signals are lacked in the [Data Radar] program, this convenient radar scanning will naturally not work. It is easy to say that advanced intelligent brains

, but low-level intelligent brains will find it difficult for them to discover each other because of their lack of strength.

The curse slave puppet that invaded this time was unfortunately in a special force form that can be called the "Curse Power", which directly broke through the monitoring defense line of the weak areas of the Lock Network Intelligent Brain.

After understanding what the problem was, Jiang Yan did not intend to pursue the mistakes of Zos and other intelligent brains. The personalities of these intelligent brain machines under his command were basically very rational, almost eliminating unnecessary self-privacy.

It is impossible for them to lie to Jiang Yan, nor do they deliberately make excuses to excuse themselves after making mistakes.

So Jiang Yan is sure that Zoth basically reported to him according to the facts. Therefore, strictly speaking, their mistakes this time are still an objective reason that is understandable and there is nothing to be asked about.

.

But... Jiang Yan felt that the loophole accident in the locking network line this time seemed to be nothing bad, especially when the "cursed slave puppet" happened to appear in front of him, and the other party actually did

He just happened to select the target he was preparing to attack on Kamon, who was being shrouded by Jiang Yan with the power of data.

In other cases, if other members of the country faced this kind of "cursive power" attack, it might be a bit difficult, but the other party actually dared to take action under Jiang Yan's nose. If Jiang Yan could not do anything about it

, you can find a piece of tofu and kill it.

"Since you're here, don't leave."

The silver light in his eyes lit up slightly. Jiang Yan looked at the curse slave puppet in Kamon's body with a smile, trying to break through the blockade of data power to attack Kamon's soul, and instantly increased without any hesitation.

With the output of the data power, the data streams were weaved into airtight chain cages, and the other party was tied up tightly.

Then, with a move, he raised his hand and restrained the curse slave puppet tied into a silver cocoon, compressed it into a small silver transparent ball like glass beads, and played with it in the palm of his hand for a few random times.

"Master, what happened just now..." Kamon, who was almost instigated to the point of a conspiracy, woke up as if he was dreaming, turned his head with lingering fear, and then his eyes were suddenly attracted by the curse slave puppet in Jiang Yan's hand.

Before Kamon could continue to talk, he heard Jiang Yan's thoughts in his mind.

Don't worry, I know you care a little about it, but this is a precious sample. Let me analyze it first and then talk about other things after writing the corresponding lock network data radar upgrade information! I don't want the lock network in the country to be the second time

Similar things penetrated in at will.

...

...
Chapter completed!
Prev Index    Favorite Next