My item has an upgrade panel

Chapter 21 Strengthening Artificial Intelligence Systems

Chapter 21 Strengthening Artificial Intelligence Systems
This parameter is a mobile phone?
Are you sure it's not the server?
1T running memory + 256T hard disk capacity + 8T/s memory bandwidth.

8K video shooting + 7680×4320 screen resolution + 320Hz screen refresh rate.

6500mA electromagnetic capacity + 50W wireless fast charging within 100 meters.

The main frequency of the CPU is 12GHz+24 cores+64 threads.

What the hell is a cell phone?

Tang Rui was stunned.

If this is used to fight the king, it should not be stuck.

Put your phone in your pocket.

He took out his bracelet.

The bracelet has not changed much, but it has added a health monitoring function.

It's useful, but nothing much has changed.

Finally, he picked up the smart glasses and put them on.

Swish!
A virtual screen appeared on the lenses in front of the eyes.

Very clear, but does not affect the line of sight.

Tang Rui had a thought.

A DOS program running interface appeared on the notebook screen.

Nice.

Just now he used brain waves to control the laptop.

Through the sensor of the smart glasses, the command is transmitted to the notebook.

This is what he needs most.

In order to test the accuracy of brain wave readings, he wrote a small calculator program.

I saw a line of code, which was quickly refreshed on the screen.

Less than 1 minutes.

A small calculator program was written by him.

This speed beats all programmers in the world.

After all, hand speed has a limit.

The speed of thinking always exceeds the speed of hands.

As long as there are no problems with his thinking and no mistakes in reading and translating brain waves, the speed of his programming will only depend on his thinking speed.

Close the keyboard twice and the unfolded part below, cover the laptop, and restore it to a suitcase.

Tang Rui looked at the system panel.

[Item: Full Defense Laptop]

【Experience: 12/25000】

[Enhancement: body, hardware, software, peripherals]

[Source point: 13.6 (can be strengthened)]

Full defense?
This prefix is ​​a bit interesting.

The original three-proof computer has now become a full-proof computer.

Many people have a misunderstanding.

It is believed that the three defenses are protection against biological and chemical weapons, chemical weapons and nuclear weapons.

That's pretty standard for underground nuclear fortifications.

a laptop.

No matter how the three defenses are, it is impossible to resist the attack of nuclear weapons.

Normally.

The three defenses of electronic products refer to anti-mold, anti-humidity, and anti-salt spray.

The shell he originally purchased is IP65-rated, which can prevent the intrusion of foreign objects and dust, and can also prevent the intrusion of sprayed water, which is quite good.

But now such a strengthening.

The prefix has become full defense, which means that there have been earth-shaking changes in this regard.

Just don't know.

Now this laptop, can it prevent electromagnetic pulse?

Can it defend against kinetic energy impact and shock.

At the same time, cyber attacks are not considered a comprehensive defense category.

However, he will not be idle to do such an experiment.

Putting his laptop to charge, he lay down on the couch wearing his smart glasses and started programming.

Within a distance of 50 meters, all peripherals can perform data transmission and wireless charging with the laptop.

If you leave a distance of 50 meters.

Smart glasses and smart bracelets must rely on the phone's network to connect to the laptop for data.

But a room is only so big.

A distance of 50 meters is enough.

that's it.

Tang Rui lay on the sofa, programming with his mind.

ten minutes later.

A network port scanning tool is written.

carry on.

After a few more minutes, a simple web information search tool was completed.

This simple web crawler is easy to write.

It took him a few minutes to add the image search algorithm, which allows him to search for images directly.

But the next firewall is a big project.

Fortunately, he does not need to write directly, but to add some functions with the firewall of the operating system.

Examples include mirroring programs and honeypot systems.

A normal firewall will not have these functions.

It took almost two hours.

He added various functions to the firewall, such as Trojan horse killing, virus scanning, virtual hard disk, mirroring system, anti-intrusion honeypot and so on.

Now if someone wants to hack into his computer, he must break through more than a dozen firewalls outside, and then break through one trap program, and finally break through the permission protection of the operating system, in order to obtain super administrator permissions.

But he doesn't think anyone can do it.

It's not that he's technically invincible.

It is the operating system after the system panel is strengthened, and its permission protection is no longer something that hackers can solve.

So he doesn't have to worry about the IP address being exposed at all.

Various tools have been prepared.

Tang Rui started the first invasion.

This sneaky feeling.

Very exciting.

The target of his invasion was an Internet cafe.

Why do you want to start with an Internet cafe.

It's because he needs several broilers.

Springboard Well.

Everyone understands.

Although this method is useless for the current network technology.

But he still wants to put on a vest, which has a sense of ceremony.

Scan ports.

Send fake messages.

Get administrator privileges.

Make a patch to make a nest, and arrange the springboard program.

This series of means is quick to say and even faster to operate.

Tang Rui didn't even get up.

The data on the smart glasses is constantly refreshed, and everything is done quickly.

After doing this.

He just started hacking into Telecom's servers.

result.

As soon as he went up, he was discovered by the network security department of China Telecom.

The other party followed the data and began to intrude in reverse.

This made Tang Rui very painful.

Is that how you cook?
Should not be ah.

Then how did the other party discover and lock him in the first place.

He was very puzzled.

But that's not a big deal either.

It's just that the traces of his intrusion were discovered, and it was not that simple for the other party to find him.

The data on the smart glasses began to be refreshed continuously.

Lines of code, written quickly.

The two sides began to fight across the network.

……

In the network security office next to the telecommunications room, a person suddenly tapped on the keyboard.

And while knocking, laughing.

His smile is very wretched.

"What are you laughing at? Did you take the wrong medicine?"

"Boss, I found a rookie, his skills are good, but his experience is too poor.

When I came up, I scanned the phishing port we left behind, and sent a message, I laughed so hard. "

"Did you track down the address?"

"Not yet, the opponent's foundation is very solid, and his adaptability is also very strong. If it weren't for his poor experience, I might not be able to suppress him."

"It's so powerful, do you need help?"

"No, let me play with him."

After half an hour.

"Boss, hurry up and help, I can't stand it anymore."

"coming."

Another hour passed.

All of the dozen or so people in an office shot.

The smiles on their faces have disappeared, and their expressions have become serious.

no way.

The opponent's growth rate is too fast, if they do not have the advantage of the team, they will almost be unable to bear it.

Even so.

It is also very difficult for them to resist now, and they are completely suppressed and beaten by the opponent.

Another half hour passed.

"I was fooled, the other party was also fishing, they were not alone, but a team.

Stop playing, immediately mobilize computing power, connect to the cloud platform, and directly defeat the opponent. "

The head of the security department gave the order directly.

If you keep playing, something will happen.

Therefore, they didn't talk about martial arts directly, and started the big data cloud network.

moment.

Tang Rui's attack was suppressed, and before he could react, the broiler and the springboard were directly destroyed.

The other party's data flow directly hit the firewall with a destructive force.

"Grass!"

Tang Rui jumped up from the sofa, he was dumbfounded.

Originally, he was still in a stalemate with the opponent, which made him familiar with network attack and defense at an extremely fast speed, and his technology was constantly improving.

The result was just at that moment.

The opponent's computing power multiplied geometrically, breaking the deadlock instantly.

Even if he uses his mind to program, no matter how fast his thinking speed is, it cannot be faster than a supercomputer.

Fortunately.

The enhanced operating system on the system panel, and its built-in firewall, completely resisted the opponent's attack.

No matter how complicated and changeable the other party's data flow is, it is still blocked outside.

This made Tang Rui heave a sigh of relief, but also a little speechless.

What are you doing now?
The other party hung up.

It's also a physical plug-in.

Tang Rui walked to the laptop and looked at the system panel.

I want to hang up too.

See who drove whom.

strengthen.

Click Strengthen again.

However, this time the strengthening is no longer an overall strengthening of the hardware system, but has been separated into individual components.

For example, the hardware system.

It is divided into CPU, motherboard, memory, graphics card, sound card, base station/satellite network card, power supply, LCD screen, logic components, high-frequency tuner, keyboard...

Some of these devices require 1 source point, and some require 2 source points.

If all are strengthened, the source points are simply not enough.

Strengthening one or two devices alone doesn't seem to work.

Tang Rui pondered for a while.

Give up hardening hardware and choose hardening software.

Software isn't overall hardened, either.

Also separate.

Memory management, processor management, file management, equipment management, job management, image system, sound system, drive system, artificial intelligence system, drone control system, thinking reading system...

Among a large number of systems, Tang Rui saw the beauty of the artificial intelligence system at first sight.

"Fuck!"

When he chooses to strengthen the artificial intelligence system, the source point will be directly reduced by 5 points.

What is this concept?
The previous overall upgrade only cost 7 source points.

As a result, a single system requires 5 source points.

next second.

The virtual screen on the smart glasses refreshes.

Xiaoyi's icon appeared on the screen.

Xiaoyi?

Isn't this the smart assistant for his phone?

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like