Bryce was secretly amazed as he watched Leal construct his online presence.

Computing power is the cornerstone of activities in cyberspace.

This is a comprehensive index, which is determined by factors such as the hacker's equipment, prosthesis, brain function, etc., and then constitutes the individual image in cyberspace.

In cyberspace, hackers face fewer restrictions, and the laws of physics are still followed, but less directly.

Computing power constructs a program, which is an image. The image involves everything in cyberspace as an extension part, affecting the real world.

You can be a human being, or a djinn, a spider queen in charge of a web-like data fortress.

You can be anyone you want to be, as long as your computing power is strong enough and your skills are superb enough.

And Leal. His skills are considered by network monitors to be a good street hacker, but his computing power.

very powerful.

His image is very solid, and it is all constructed brick by brick. He does not rashly try different structures and get himself something flashy because of the feeling of mastering everything and creating everything.

The less you understand and the more aggressive you are, the easier it is to leave loopholes in the program and be invaded by sophisticated hackers.

And that's something almost all hackers suffer when they are newbies.

". Access warehouse neural chip model. Parallel line of military technology, no memory expansion components, no traces of gray matter enhancement, and no prosthetic irritation symptoms

It's almost pure calculation, and the brain power is around 12, which is too exaggerated.

Do you really not consider working as a network monitor? Network Monitoring will provide you with better resources. "

Bryce was calm on the surface, but looking at the foundation shown by Lille, he was already a little uneasy--

What is the concept of brain power of 12?

Generally speaking, the mental limit of purely physical humans is 10, and they rely solely on their hands and eyes to operate on the computer panel.

In fact, even if they are equipped with prosthetics, the brain power of most hackers will not exceed this value.

The brainpower of 12 is enough for Lear to apply for hardcore hacker positions in large companies, and the company will be happy to equip them with valuable prosthetics——

Of course, the premise is that he is willing to sign his name on the "contract".

"Not interested - why didn't you tell me the price?"

"Work is exchanged for reward. Is this considered a price?"

"I don't think it's worth it, so it's the price."

"Whatever you want, your idea is a bit retro. It sounds like the kind of brainless hacker from the old Internet era. Every day, he controls himself and kills freedom."

"Brainless? The hackers in the old network era made the company miserable and even defeated the old network. They are brainless, then you"

"stop!"

Bryce interrupted Lille's heart-wrenching remarks, just as Lille's image was completed.

A very regular human appearance, but we can only roughly tell from the appearance that it is a humanoid creature.

Leal didn't even outline his facial features, and most hackers wouldn't outline their facial features in cyberspace, but they usually wear masks or helmets to express their personality.

But Lear didn't. This image was like a person made entirely of digital streamers, with no features.

Bryce's mouth twitched: "Don't you think your image is even less distinctive?"

Lear: "If I am the only one in the entire cyberspace who has no characteristics, then that is also a characteristic."

".Okay, try loading your golem."

Golems, only in the virtual space can you intuitively see why they are called those names.

The most common and basic golem type for hackers: "ICE Breaker". After loading, the image in cyberspace is a sharp blade.

The only function of the ice pick is to break the enemy's ICE, which is a typical extreme specialization program.

Because of its characteristics, it is easy to knead and can be integrated into other software. As a pioneer, it is the basis for human-type programs.

The blade constructed by computing power flows with the brilliance of data, sharp and beautiful.

Bryce nodded in praise:

"Good choice. If you choose the prosthetic malfunction and prosthetic eye restart procedures that street hackers like most, I will have to spend more time explaining to you the procedures in cyberspace.

I guess you already understand what I'm trying to say. "

Leal nodded.

Logic and reality in cyberspace are very different, but overall there are still many logical parts.

After all, the purpose of cyberspace development is to make people "feel" those signals.

Leal tried combining the ice pick with the prosthetic malfunction, and the blade turned into a short sword.

This feeling is indeed wonderful. Hackers are like the creators of cyberspace. Data and current are coordinated through nerves and intuitively change in their hands.

This feeling cannot be brought by any virtual reality technology.

Facing this scene, Bryce was surprised again: This was Lear's first time entering cyberspace, but he had actually learned to combine different programs to produce new golems.

Lille dismissed the ice pick, and the dagger shattered into pieces, turning into light spots and returning to his body: "Is there any powerful demon that I can try?"

Bryce smiled sarcastically: "Brother, you are just a contract worker. To do this is already an exception, and you haven't even started working yet!

However, since we have a superior-subordinate relationship, I advise you to continue to improve your digital image.

In a battle in cyberspace, the one who strikes first has a huge advantage. A hacker with weak computing power, as long as he has the appropriate program and a sneak attack, can completely kill a hacker with several times his computing power.

If the opportunity is right, it is not impossible to kill hackers several times his size.

You need to learn to be in combat mode at all times and keep protective and detection/alert programs running.

Of course, it would be better to have a huge data barrier at hand——"

Bryce turned sideways and showed Lille the huge data barrier.

The data flow is like branches linked to the high wall. The mechanical digital wall is still slowly moving.

In the real world, people are afraid of tall buildings hundreds of meters high, but in cyberspace, strong data barriers can give people the illusion of being thousands of meters high.

If you use appropriate hiding methods, you can even make it invisible--

Moreover, these behemoths seem to be alive and may attack you at any time.

The uneasiness and helplessness that people feel when facing giant objects will be doubled or even infinitely amplified in cyberspace.

"Join network monitoring, and you can use this data barrier to operate in cyberspace - and, by the way, there are these high-level golems."

Saying that, Bryce stretched out his hand——

A digital image resembling a little devil swayed down from the sky, holding a flaming bow and arrow in one hand, and a chain in the other hand. The other end of the chain was

A vicious pit bull.

The bulldog came to Leal and sniffed around like a real dog, identifying outsiders.

It's astonishing how lifelike it is.

“When you have powerful enough programs, you can combine them however you want.

What integrates complex programs is another high-level program. In fact, this program is closer to the so-called golem than the junk software sold on the street.

For this type of program, we call it: demon program group (note).

They have a certain degree of autonomy. In a sense, they can be regarded as AI, but the level of intelligence is very low. Don't worry that it will burn your brain in turn.

The framework used by this program is called Imp, and just like its name, it has the appearance of a little devil.

This imp mainly manages Bulldogs and Hellbolts, specifically designed to defend against cyberspace attacks.

Once your hacking skills are as good as ours, you can try writing your own."

Before he finished speaking, Bryce suddenly saw Lear's body begin to surge and tremble.

A small octopus appeared to be an octopus, a species he had seen on the Access Science Channel.

A small octopus crawled on Lille's digital image, came to his shoulder, and moved its head to observe the surroundings.

Cyberspace suddenly fell into silence.

Lil was panicking, but he couldn't show it or even talk to Squidward.

So he acted very calmly:

"This is my demon program set, equipped with several sets of target positioning to help me perceive cyberspace."

After saying this, the little octopus raised its paws, stretched its limp arms, and touched the bulldog's head. You could even see the suction cups twitching.

Bryce couldn't calm down when he saw this--

Why is this happening!

He studied in the academy for two full years before he built the first stable demon program group!

Lear pinched the octopus's hand as if nothing had happened and pushed it back: "Well, there are still some problems with the recognition. I'll make some adjustments."

Bryce slowly said: "You"

Before he finished speaking, the octopus suddenly rushed into Lear's body in fear, and Bryce's expression suddenly changed!

The moving mechanical walls of the data barrier began to rotate as quickly as an engine started!

In the dark cyberspace, a weapon of terrifying size is being generated out of nothingness, as if it has pierced the black curtain, and a flashing red and black trident is heading towards the data barrier!

The red trident seems to have some kind of program attached to it, and the black cyberspace background is being rendered with some kind of red, as if it is about to cover this area——

"Damn it, it must have been during the short jump just now - cut off your link!"

As soon as Bryce finished speaking, Lear found himself being pushed away, completely away from the battlefield——

In the last scene, when he saw the moving mechanical wall, he was not to be outdone, revealing an ion cannon of the same exaggerated size!

boom!

Cyberspace trembles.

"ha!!!"

Lille exited the cyberspace and took a breath as if out of water!

His access compartment burst into flames, and Lille hurriedly jumped out and took out the fire extinguisher provided in the room before the fire burned his butt!

[Use a fire extinguisher: pay 10 euros. 】

[Please control the fire and contact NCPD if necessary. Any damage to the apartment will be investigated]

boom!

The paid panel has also exploded.

The circuits in the entire room exploded. If you look from outside the skyscraper, you can see that several rooms around Lille also suddenly went dark.

And if you turn your attention to Taiping Prefecture.

You will find that the few lights there have begun to flash.

Battles in cyberspace can make circuits extremely unstable, and if both sides of the battle intend to affect the participants, it will be like Lille.

People like Lille owe their landlords a lot of money.

[You have caused line damage and are expected to pay financial losses: 5669 euros. 】

[Please pay the fine within 24 hours, overdue fines will be charged.]

【Bah. 】

The sound of the circuit lights going out overlapped with the sound of the fire extinguisher spraying, and the flames were finally extinguished.

[Correspondent: V]

[V: Lil, is there a power outage in your room? I was watching TV just now! Suddenly it exploded. I don’t know what happened to this stupid property. 】

Lil sat down on the bed.

[Lille: I know. 】

[Lille: Can you borrow two thousand yuan? 】

Note: None of the content in this chapter is purely edited by the author. It comes from the setting of the "Cyberpunk 2020" board game series.

Thanks to Jiu and Magpie for their 5,000 starting coins, Clown Jr’s 200 starting coins, and Baiyi Shengxue’s scumbags for their 100 starting coins.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like