Font
Large
Medium
Small
Night
PrevPage Index    Favorite Next

Chapter 34 Virtual Invasion(2/2)

Shaking his head, he switched the panel directly and upgraded the cyber hacker profession, three professional knowledge, and professional skill [Simulation Data Programming] to level 5 at the same time.

The job transfer mission pops up directly.

[Job transfer mission: Hacking]

Task content:

1. Hack into the data center of a medium-sized enterprise, obtain enough pseudosensory codes, and build your own database.

2. Build your own artificial intelligence

'Oh, this job transfer task is easy to handle.'

It’s hard to say anything else, but if you take the virtual route, senior engineers are definitely experienced.

He glanced at the three professional knowledge. Unlike other professions, the professional knowledge of cyber hackers can actually be used as skills.

For example, the introduction of lv1 virtual invasion is as follows.

Virtual invasion lv1: Threaten, interfere with, and destroy the execution program through intracranial programming of pseudo-sensory data.

To put it simply, even without electronic defense walls, he can use programming to fight against attacks from other hackers and AI.

The virtual invasion of lv5 is different.

Level 5: Neural hacking of various human body parts, ordinary corporate hardware, unprotected prosthetics, and low-level artificial intelligence operating systems

The former is protection, the latter is hacking.

The latter is the most powerful ability of cyber hackers.

The PP leader finally came out of the toilet, with two rolls of paper stuffed in his nose, and lay down on the operating table with a determined look on his face.

"bring it on!"

"..."

The senior engineer walked over and activated the virtual invasion. Countless pseudosensory data immediately flashed in his eyes. These were his own emotions, his own thoughts, and his own body signals.

The intensity of virtual invasion is generally proportional to perception, and the senior engineer's perception is the only terrifying number that breaks through three digits, reaching 104 points.

The other party's perception is 4.

Therefore, the intensity of his virtual invasion is far beyond what the weak player in front of him can resist or even detect.

Sure enough, the other party's brain was functioning normally, except for a little bit of redundant data. If this data was not cleaned up, it would completely disintegrate in more than ten days, which also meant that yesterday's memory would completely disappear.

As soon as the senior engineer had an idea, the data was decomposed into hundreds of 0s and 1s, reprogrammed, patched, and re-embedded in the brain system.

The whole process takes less than 3 seconds.

"alright."

"It's over?" The leader of pp was stunned for a moment. I just lay down, and you're going to end it now? I have made so many mental preparations in vain.

But as soon as she recalled it, the memories of yesterday slipped down like a tide.

"So that's what happened!" the pp leader muttered to himself.

[Your nerve repair surgery completed, experience 800]

Gao Gong didn't pay much attention to this minor operation.

In ancient times, memory loss was a terrible thing.

But in the mechanical age, memory loss is like a cold. Unless it is a large-scale flu, no one will take it seriously.

In the cyber wave two years from now, a global memory loss event will occur.

There is not a single person on the entire planet who has complete memory.

And this is just the first wave of the cyber tide.

Followed closely by 'Personality Reset', 'Neural Theft', 'Concept Parasitism', 'Pheromone Virus', 'Paleowarfare', 'Turing's Eastern Expedition', 'Electronic Brain Cemetery','

The android revolution'.

Each of these major events is more severe than the last.
Chapter completed!
PrevPage Index    Favorite Next