A brief description of hacking knowledge

Given that the hacker settings in "Cyberpunk 2077" are too complex and too cumbersome to be involved in the plot, let's list them separately.

Of course, readers who have played the game can not read it, and readers who have read the work can also not read it.

The following content is divided into noun explanation and remaining settings, if you want to save time, just look at the noun explanation.

Of course, the following things may not be comprehensive, and there will definitely be some gaps, and if there is a need in the future, the author will make up for it, and then it will also be sent to the work. (Alas, if only these things could be used as daily updates.) )

The first is the noun explanation.

RAM: Temporary data storage medium (main memory), which is the same as the mage's spell slot and blue bar. The amount of RAM generally depends on the [network access warehouse] and intelligence used by network hackers.

[ICE]: Cyber World's network firewall

[Quick Crack]: A hacker's attack method, an instant hacking method, can be regarded as an instantaneous spell cast by a mage.

[Intrusion protocol]: The hacker hacking strategy and method are different for each hacker, just like the solution idea during the exam, the more sophisticated the hacker, the stronger the intrusion protocol.

[Puppet]: It's okay to treat it as a network virus, but it's much stronger than a network virus, and for hackers, it's a spell.

[Quick Cracking Component]: A very tiny chip that can be loaded into the network access warehouse, and the [puppet] attack method encoded and made in advance by hackers with the network access warehouse.

Generally, it is a super-large puppet that needs to consume RAM to release, and the effect is remarkable, and it can directly act on the human body.

It can be simply regarded as a skill in the skill bar in the game, and the skill must be dragged onto the skill bar before you can use the shortcut key to press it out (equivalent to putting the component into the network access bin) to cast this spell (puppet)

[Network Access Warehouse]: An indispensable piece of equipment for becoming a network hacker, which can enable network hackers (network walkers) to access the huge network data stream at any time.

It can be seen as a mage's wand, but for hackers, the network access bay is more important than the mage's wand, without it, there is no need to crack it quickly.

Among them, the number of fast cracking components that can be loaded into network access bins with different technical specifications is different.

The network access bin is also similar to the graphics card, which is a weapon in the hands of network hackers, and people use a higher model of the access bin like holding a sniper rifle, but you are holding a small dagger to snipe at the door of others, which is naturally difficult to compare.

Of course, if you have a high level of intelligence and can have an intelligence of 20 like Bartmoss, then it is not impossible to use a low-end network access warehouse, a knife to cut the butt and kill the enemy.

Remaining settings:

1. In the face of different enemies, the RAM consumed by hackers is different due to the different ICE protection capabilities of the processors in the opponent's brain

2. The hacker's own ability will make the upload speed different

3. If you are a trustworthy person like a teammate, if they give you authorization, it will be equivalent to someone else fiddling with the computer for you, you can ignore any of the above restrictions in the hacking process, and you can get it however you want, for example, in the anime, Qiwei used [System Reset] on Rebecca

4. Puppet Type:

Puppets similar to [Electromagnetic Short Circuit:], [System Reset], [Prosthetic Failure] and other puppets that act on the human body, collectively known as super-large puppets, are large and complex, and almost no cyber hackers can make them up on the spot during the battle, so they need to [quickly crack the components]

5. When hacking, just like a virus invading your computer, it is carried out secretly, and of course the possibility of being discovered by the enemy is not ruled out (in the game, there will be a prompt when V is hacked by the enemy, but when the voodoo gang implants the "Light Chaser" puppet in the plot, V is not aware at all)

6. I haven't thought about it yet, but I'll add it later if possible.

Here's how a hacker works when attacking an enemy.

First of all, hackers generally have two options when hacking an enemy.

First, first break through the local area network ICE of the current boundary, after the breach, all the machines and equipment connected to the local area network, human brain processors (brain computers), protection systems, etc., will be affected to a certain extent.

As for what the impact is, it depends on what tricks and tricks the hacker has.

After that, due to the early breach of the LAN ICE, the network hacker will inevitably get a certain gain, and then the hacking will be much simpler, and the subsequent operations will be no different from [the second].

Second, if you are a master of art and bold, or if there is no LAN in the current territory, then there is no way, you can only hack directly without doing "foreplay".

Cyber hackers can use physical and remote hacking methods.

Physical intrusion is to merge into the network through data cables, and ordinary small data transmission can use personal connection cables, but if it is to enter the cyberspace, which requires huge data stream transmission, it needs to be intubated in the back of the brain, that is, the assistance of equipment such as hacker chairs, which can improve the computing power of the brain

Remote Access:

The first function is to remotely access other people's brain processors, forcibly generate a data link in cyberspace to connect the two sides, and use data transmission to quickly crack it. Because it is a single data link, the traffic that can be transmitted is limited, and it cannot be connected to other devices, so it needs to be connected to one target by one, and the means that can be used are limited, and only some simple instructions can be used, such as quick cracking and implanting puppets.