Secret access
"I'm going to connect to the main network." A deep voice is commanding the computer to execute commands that allow him to connect to the mainnet.
The system immediately replied, "Your request has been processed and is being connected to you." ”
The system completes the requirements in an instant, and the person connects to the main network, and the network connection prompt appears instantly. And at the same time, voice inquiries appear. "Verify the identity of the visitor and enter the setting code left during the last visit."
The input cursor immediately appears on the screen, waiting for the person to type.
The interviewer did not slack off and carefully submitted each verification. This is for safety and to prevent others from using this link to enter his own independent space. The computer is detecting the person, and one verification is in progress.
Only at the last point he stopped, he needed to think about it. What is the password reserved for the last access, I thought about it for a long time, and the input cursor kept flashing. This cannot be wrong, and once the error system is opened, it locks up. The accessor will also be controlled within the access area. It's an effective way to prevent others from entering, and although it seems primitive, it's effective. Because no one knows the password left behind in the departure.
He thought about it for a long time before he entered a long password. Be cautious in your input, for fear of making a mistake when typing. The password is about 70 digits, and there must be no errors in a long password.
When the input is over, the person solemnly clicks to confirm. This time there is no voice prompt, and the green prompt that appears indicates that the verification has passed.
After entering the setting code, the system starts to check the status. Checks are carried out one by one, which is a necessary security measure for entry.
"Passed the physical characteristics test, passed the fingerprint iris test, and passed the DNA test."
Safety testing is a long job, and the wait makes the Venerable Master feel anxious. Fingers keep tapping on the control interface, which is a subconscious impatience. It is also urging the system to complete all safety inspections faster, and this long detection is like killing people.
It turned out that every time he underwent these safety inspections, he always ignored this part. He believes that these tests are either slow or redundant.
Because of these settings, there is basically no defensive role. If someone wants to steal your information and get into the console, these detections really won't be too difficult. People leak their information all the time, and the inclusion of these projects is just an additional comfort.
It is also an encryption method that is usually added at the beginning of the design.
However, today, unlike in the past, he did not ignore these steps when entering the safety test. The person was walking towards the final core, and the computer kept beeping.
The prompt sound is all through the test, because this link has not been used for too long, more full safety detection needs to be operated through the prompt sound.
"Verify your identity to pass, you've been connected to the main network."
"Enhance security measures, all security systems are not neglected, and this command must not be changed."
"The computer has confirmed the change."
"The main network is working for you with connectivity."
"I need database information."
"Calling up the database for you, loading all the data for you."
At this time, the computer constantly emits a prompt sound, which is particularly harsh in a quiet environment.
"Do you want to update your data because you have some information left in your previous login?"
"Update! I want all the data. An impatient voice answered the computer's inquiry.
"Thought you were updating the data, the data went into loading mode. Don't leave, and don't disconnect. Loading, the data has been updated by one percent. ”
The sound is constantly indicating the loading status of the data, from one percent to one hundred percent. The data load time is very short, and all data loading is completed almost instantaneously.
"The data has been loaded." The system prompt sounds again.
The system voice prompt is very primitive, and no emotional color can be heard here, and it is impossible to get any emotional interaction in this system prompt sound.
The voice prompts that rang again and again were very verbose. Because of the age of the system, this voice reminder does not have any intelligent flexibility.
With just one data load, the voice reminder went from one percent to one hundred. Because the data is loaded very quickly, in order to synchronize the voice prompt with the loading speed, the voice reminder is completed at a very fast speaking speed. The system is complete with voice reminders, which makes people sound very uncomfortable.
The loading is complete, and the person is too lazy to fight with the system prompt. He needed to complete the next step as soon as possible, and he was in a very dangerous state at this point. It's in a semi-protected state now, which is a kind of omission in design. It's also a quick way to get out of self-preservation.
If there is an unforeseen danger at this time, the person can immediately disengage. If a person is enclosed, his protection system is provided by another system.
"In fully enclosed mode, I want to be protected. Upgrade the surrounding defense system, and no one will be allowed to enter. ”
"Receiving instructions, we are preparing to enter fully enclosed mode. Upgrade your defense system and you'll be in a very safe environment. ”
Before the computer enters the fully enclosed mode, the operating state reaches a peak, and the hum of the machine can be heard all around. Already in order to enter the fully enclosed mode, the person again took command.
"Turn on full state mode." The order was issued again.
"Starting."
"Activated."
"Start the host and brain connection."
"Received instructions and is connecting for you. It takes 10 minutes to connect, so please stay calm and keep your heart rate in the current state for 10 minutes. Breathe steadily, as this is not conducive to the connection between your brain and the data. Interruptions are not allowed during the connection process, and it is not allowed to forcibly push out ......"
"Needless to say, how many times. I understand all of this, so I don't want to say a word. This kind of inconsequential prompt, say it a few times. "He's already dizzy with this voice prompt, which is why he overlooks a lot of steps every time he enters the system.
The voice prompt is not repeated in a verbose way I don't know how many times I have been recalled, and there is no noise in the environment except for the sound of the machine running.
The connection becomes very slow here because the environment is particularly quiet. When there is no distraction, ten minutes is really boring. Waiting makes some people anxious, and the data is constantly being updated. As the number of connections increases, people's impatience becomes much calmer.
The system prompt sounded again, "The connection is complete, and the brain has been connected to the main brain." ”
(End of chapter)