Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 2, Hacking Systems

The iron gate opened and two strong men walked into, one with her eyes tucked and the other with her big lips twitched.

Since Jiang Yan always wanted to run away before, he narrowed his eyes and said to his big lips: "It's still like before, let's go with it!"

Jiang Yan was helpless: "Stop!"

"I was infected with the virus yesterday, where would I run?"

Blood Spider is worried that his subordinates will be disobedient. Many people have blood spider viruses in their bodies. Whoever edits this virus will listen to whom. No matter where you are, the editor can make you live worse than death, or even die if you explode, and it cannot be removed. There is no device to detect it. If you have this thing in your body, run.

The editorial room of No. 12 is about 200 square meters, with a super-large space capsule-like system software importer in the middle, with more than a dozen holographic transparent displays floating around, and at least one staff member in front of each display.

As soon as I walked into the door, I heard a squeaking voice: "I'm ready for everything I need to prepare, just go to the importer to upgrade the system!"

The person who spoke was a girl sitting on the chair at the door, crossing her legs with her fair legs and raising her front legs, all of which were so arrogant.

The girl is named Xu Xi, who is 20 years old like him, with long red hair and a black tights wearing rose jewelry. Her little face looks as good as the girl in the comics. She is a task assistant assigned to him by the organization and is responsible for arranging all his work.

His assistant is amazing.

It is said that before coming here, the people who slaughtered the Blood Spider in the city were faster than the machines in the chicken farm. The Blood Spider wanted to sanction Xu Xi, but could not beat him.

Can't you beat you and leave?

Xu Ma actually had amnesia. She might forget what she had done tomorrow, she might not forget it for a month, or she might not forget it for a lifetime. She would be happy to forget the murder, and she couldn't remember it the next day, but Xu Ma would remember it firmly and could not even drive it away.

The people who are the blood spider are worried. Not only do they kill the blood spider, they have to provide food and drink. Even the mayor's house is given out, you can just be honest.

Normally, this mission is nothing wrong with Mama Xu, but it was just such a coincidence.

Hasn't he failed to install the system twice?

The female assistant who was in charge of his work was angry and gave up on him. The organization had no hope for him and no one paid attention to him. He was just waiting to deal with it.

I happened to meet this Xu Mai when I ran away. Maybe I felt sorry for him. Xu Mai took him to install the third hacking system. No one expected that it would be successful.

From then on, Mama Xu finally found something to do and came to arrange work for him every day. The organization had no choice but to accept Mama Xu as his assistant.

According to Xu Xi's arrangement, Jiang Yan walked into the hatch of the inlet.

"Please do not bring any metal items to turn your system on."

Hearing the electronic prompt sound of the importer, Jiang Yan's thoughts moved and a large amount of codes emanated from his body, forming a blue shield patterned badge hanging on his chest, with the obvious word "4" on it.

This badge is the logo of a hacker. The '4' on it means that his system is level 4. The systems normally installed in the Blood Spider are all red spider patterns. In order to facilitate their tasks, it was replaced by the Blue Shield Peugeot hacker badge.

The transmitter then began to analyze his system and presented it on the display screen on the wall.

software

System software: Level 4 frameless, damage 8, speed 9, reaction 15, defense 10, physical fitness 7.

Application software: Fighting.

Super software: None

hardware

Main program: First generation.

Processor: third generation.42-bit read, 2G2HZ frequency.

Memory program: First generation. Capacity 8G2B.

Hard disk program: first generation. Capacity 32G2B, speed 7202rpm.

These data, which are very similar to Earth computer equipment, are configurations of hacker systems edited by code.

But their functions are still very different.

The system software controls five major attributes, namely damage, speed, defense, reaction, and physical fitness. These attributes are the core abilities of hackers in combat. It can also be said that they are the standards for measuring hackers' strength. The higher the attribute value, the stronger the person is.

There are many ways to increase the attribute value, the most comprehensive one is to improve the system level.

Every level of improvement in the system is 1 point in all attributes. Every level of 10, the badge border changes once, and every time the system changes, the total attributes are increased by 1 times. For example, level 10 is normal for all attributes 10 points, but because of the badge changes, the total attributes are 20 points; level 20 is 60 points; level 30 is 120 points, and so on.

The order of changes in the badge border is borderless, bright moon border, golden sun border, star glory border, angel wing border, blue rock black turtle border, red flame phoenix border, dark white tiger border, purple lightning dragon border, and dazzling four beast border.

These level improvements are not like the martial arts of the earth, but require the programmer to edit them at level one by one. This is not only the system software, but also any other device.

The application software has a wide range of functions and is divided into many types.

There are life categories, which are used in life [Sichuan Cuisine Software], [Beauty Software], etc.

Entertainment categories include [Smoke Scream Software], [Chat Software], etc.

The most important of these categories are equipment and skills.

Equipment categories include [Lucky Necklace Software], [Zanpakura Software], [Machine gun Software], etc., mainly to increase basic attributes and generate special abilities.

As for skills, there are [Dragon and Tiger Fist]; [Three-Stage Slash]; [Free Fighting], etc., which mainly release moves and special functions, and are very explosive.

When the hard disk capacity of the application software is sufficient, many of them can be installed in any category. [Fighting] is the basic combat skills provided by the hacker system and is a passive skill.

Whether it is powerful or not depends on the number of bits, including 42-bit, 82-bit, 162-bit, 322-bit, etc. The higher the number of bits, the stronger the software functions.

Application software does not need to be improved in order. You can install any application software you have, whichever software you have, the premise depends on whether your hardware device meets the conditions.

The super software is more thorough, which allows you to obtain a certain super power that can be used in any situation.

If you have [Fire Burning Super Power Software], you can control the Fire Burning. Even an ordinary punch will wrap around the Fire Burning effect, causing greater damage.

It still has seven qualities, namely low-end, mid-end, high-end, sharp, super-end, extreme, and ultimate. The difference is that when encountering enemies of the same flame system, the low-end flame will be swallowed by the mid-end flame. In other words, when water and fire meet, water can extinguish the fire, but your fire quality is higher than the other party's water, and the water will evaporate.

As for the origin of the super hacker name, it is precisely because of the existence of this software system.

The function of the main program is to link hardware, software, and human body together to achieve the effect, and it can also be understood as a base that carries the entire hacking system.

This base requires generations of updates, and its updates are like expanding the base.

When the base becomes larger, other hardware can be expanded to carry more software code. Therefore, if other programs want to improve, they must first update the main program.

However, the main system does not mean that it can be updated just by updating, but also depends on whether your physical fitness can support it. Physical energy is like how large the land you have. If you don’t have that large land, where can you expand the base?

The main function of the handler is to interpret the code, process the code, and finally issue commands.

Each generation of updates mainly improves the reading function in the program.

The improvement of the reading function is to improve how many bits of application software it can read?

When you install an 82-bit application software and it can only interpret 42-bit programs, the read data will be missing, causing the software to fail to start.

However, it determines how many applications you can use.

The processing capability is improved by the processing frequency. The processing frequency is in units of Hertz. The letters of Hertz are HZ, which represents the measurement of the number of processing codes per second. The lowest is 2G2HZ, and 1G2HZ is equal to 1 trillion HZ. The larger the HZ value, the faster the processing code will be.

As the software continues to improve, the code will continue to increase. If it is not upgraded in time, the processor will not be able to handle a large amount of code, and there will be lag, so that you, who originally had the advantage, will instantly give the enemy a chance to fight back.

The memory program acts to temporarily store the operation data to be processed.

Each generation of updates mainly improves memory capacity.

The memory capacity limits the size of the software started, and the size of the software depends on how much code the software is composed of, in units of B.

Take the first generation memory as an analogy. Its capacity is only 8G2B. If all the software you start up reaches 8.1G2B, the system will crash. The consequence is like a computer crashing, and your hacking ability will disappear while you hit the game. When you play games, the computer crashes, it is just a loss. At worst, it can start over. But when this planet dies when it fights against your opponent, it means the end of life.

Hard disk belongs to the entire system's repository.

Its update is to increase the hard disk capacity and speed.

Hard disk capacity means that all software that is not used should be stored here. When not used, it will be thrown here. When used, copy a temporary copy for you to use. As for the original, keep it for next time.

It definitely stores more things than memory, so the capacity is larger than memory. The capacity of the first generation of hard disks is 32G2B.

Moreover, it is not like memory capacity, which can't accommodate the next software and can't be started. When it can't accommodate the next software, it won't talk nonsense to you at all, just get out of it, and you won't let a single code be put into the library.

The speed is the speed of copying temporary copies, in rpm, with a minimum of 7202rpm. Some software has strong explosiveness, large code volume, and the speed cannot be copied so quickly, which will form a cooling time. How long can it be cooled depends on the rpm value.
Chapter completed!
Prev Index    Favorite Next