Chapter 229: The Big Hand of the Octopus (Thanks to Silver Father, Frozen)

[Lille: Bryce, I'm in. 】

Bryce: You got in?] Your access permission. I don't care about you. 】

[Lille: This is a legal donation from the citizens. 】

[Bryce: Fart, did you do the Kabuki area?] I asked you to investigate secretly, and you went straight to the headlines?! 】

[Lille: The larger the movement in the real world, the more it can provide cover for online activities, and the more subtle the cyberspace investigation is, and the smaller the relative movement. 】

[Lille: So the greater the movement, the smaller the movement.] 】

[Bryce: Brain-dead!] 】

[Bryce: Forget it, let's report on the progress.] 】

[Lille: The Tiger Claw Gang has made a big mess, we saved a stall owner, he supplied the Tiger Claw Gang with illegal Mewtwo equipment, and is familiar with the black market in the market area, I will send you a document on the situation. 】

Bryce: This. It's not bad, it's a bonus, but hacking is rampant in that place, and maybe it can help us lock down some hackers. 】

[Lille: What about commissions?] 】

[Bryce: There are a lot of hackers in the Kabuki area, so I'm going to go back and ask my colleagues to check the situation, don't worry, you're indispensable in the end.] 】

[Lille: Okay, second thing, we also caught a guy from the Tiger Claw Gang, who confessed about the human trafficking of the Tiger Claw Gang, but kept silent about the people behind it. 】

[Lille: It was done by a guy named Jae Hyun, but he doesn't know much more. 】

[Bryce: Shit, these bastards are really brutes, what are you going to do?] 】

[Lille: Of course, keep looking.] 】

Bryce: It's great to see these brutes killed, but don't forget that our goal is to investigate the Genting anomaly. 】

[Lille: I'm sure this matter will be related to Genting, this industry chain also involves the top level of NCPD, and someone came to ask for someone just now. 】

[Bryce: I still don't see the relationship with Genting, you handed them over? 】

[Lille: No, but isn't there someone in the top of the clouds?] Maybe together. 】

Bryce: It's possible. 】

Bryce: Listen, I'd love to see someone do the good thing, but I want you to focus on our goals, which is more important. 】

[Lille: Listen, I need your help right now: I'm going to hack into the NCPD, steal lab gear, sneak into that vegetative person's head, and check something. 】

Bryce: ? 】

[Bryce: Did you not listen to me?] 】

[Lille: There's no time to explain, and when they're done with the clues, we'll have no excuse to rush to the top of the clouds.] 】

[Lille: You can just say whether you can help or not. 】

Bryce: You do it yourself, I have NCPD's data barriers and ICE architecture solutions here. 】

[Lille: Yes, trust me, I'll give you the task.] 】

[Document receiving.] 】

Bryce: Remember your mission. 】

In Cyberspace, Lille receives a message from River: they have arrived at the NCPD.

The coordinates of the network shifted, and a towering digital wall appeared in front of Lille.

Now he's going to break through the NCPD's data barriers.

River and Anna walked into the NCPD, and there were very few people in the headquarters, and most of them were on duty outside.

In particular, there is another major incident in the Kabuki area, and a lot of police forces have to be allocated.

The two entered the police station as if nothing had happened, and then walked all the way through the hallway towards the Evidence Section.

[River: Lille, we're in the game, which interface do you need?] 】

[Lille: Wait a minute, I'll take a look at the engineering specifications.] 】

[River: ?] 】

[River: I said do we need to scan the open and available access points first?] This was the case when I cooperated with Cyber Security before. 】

[Learl: Really, I got your prosthetic eye, so let's start scanning it.] 】

River swallowed and began to doubt Lille's professionalism.

He scanned all the electronics in the bureau.

【> Scanning. Open ports found: 80, 22, 443, 3306, 3389]

[Lille: Can it be connected to the CCTV system?] I need to look at the network layout. 】

[Anna: I'll do it.] 】

[> port selection: 32105, 22, 2939, 2]

[> Command receiving. 】

Ports are like coordinates in a labyrinth, and through these ports as coordinates, Lille's position in cyberspace also changes again and again.

The path of change is exactly past the barrier built by ICE and all the way to the inside of the barrier.

The ramparts staggered before Lille's eyes, and even popped up like trapsβ€”

This may seem like a floppy scene, but in reality, if a hacker tries to bypass the data barrier and touches these walls, ICE will catch up, and the entire fortress will be turned into a weapon, flooding the hacker's brain, disrupting computing equipment and endlessly increasing computing speed.

This is due to the underlying design of the cyberspace access protocol, where hackers can either find devices with equal computing power to go head-to-head, or cringe and risk the possibility of running into ICE and quietly bypass these walls.

Of course, with a knowing the build logic, and a little heury, it is perfectly feasible to bypass these lethal protective devices.

In Cyberspace, Lille passes through the outer layer of the data barrier and arrives on the second level.

It's still a long way from the Forensics Section's databaseβ€”at least Lille can't scan what he's looking for from this layer of data.

NCPD also uses multiple subnets internally, which requires further physical hacking.

The data barriers of cyberspace are very different from those of real-world buildings, and Lille compares a lot of data to find the next potentially useful port, and the area where it exists.

[Lille: Workstation 3.] 】

[River: That's the area of access to the network security engineer. 】

[Lille: The cameras won't record you, just hide from people.] 】

[River: I'll do it.] 】

River put on his police hat and swaggered across the yellow line that read "Cyber Security Permission Zone".

The camera swept over River's face without making a sound.

River's heart was beating fast, but there was no emotion at all.

All the way to the door of Workstation 3.

[Lille: There's a hacker in there, and possibly an accomplice, so it's a little smaller. 】

[River: That's not an accomplice, it's a colleague.] 】

River gently pushed the door open, and one hacker lay in the access bay, the other with his back to the door, sitting at the table eating.

It can be clearly seen that this hacker's hand is a little trembling: this is an occupational disease brought about by long-term network security work, and there will be more or less problems with nerves.

River sighed inwardly and quietly walked up.

[Lille: If possible, use a personal link.] 】

[River: Are you sure you can take him down in an instant?] NCPD's hackers are not half-, and the security systems are imported from the network supervisor. 】

[Lille: I'm sure.] 】

River gritted his teeth, pulled the personal link out of his palm, and thrust it into the back of the hacker's head.

The hacker reacted immediately β€” perhaps in less than 100 milliseconds, and he knew he had been plugged in.

But Lille was able to bypass ICE and launch an attack within 50 milliseconds of his reaction.

【> port link. Successful introduction of the tool】

So the hacker slammed down on the table and fell asleep.

River inserted the personal link into the back of the hacker's head.

Two high-level privileges have given Lille a lot of room to maneuver - now he replaces the hackers lying on their stomachs on the table and in the network warehouse.

On top of that, there are two hackers in the domain – NCPD seems to love stacking.

However, a good hacker can top dozens of hackers.

In Cyberspace, Lille stepped into the core database of the NCPD.

It's a treasure trove of cyber images, with important data sealed away in small, coherent-looking data fortresses.

[River: Don't mess with those key documents. 】

[Lille: Got it.] 】

【> Connecting. Login successfully to obtain high-level permissions]

【> Grabbing. Data includes: Forensic data, NCPD list, NCPD work log]

[> permission write]

[> Cleaning up. After the operation is completed, the digital trajectory is completely cleared]

The NCPD core database is time-limited for everyone to ensure that no one copies the information.

It's a pity that Lille's computing power is much more than normal, and he still has two accounts.

Sianwestein activated, and the speed of Cyberspace slowed down significantly, a little strangely slow, and one second of Cyberspace was extended to five seconds for Lille.

For normal reading, the operator will have the relevant file number to complete the reading quickly.

But Lille had to hack as many databases as possible and then copy the material.

At this moment, the little octopus suddenly sprang out, looked at the dazzling database, and looked at Lille excitedly, and the octopus arm pointed towards the database.

[XE: Can I grab it?] 】

Lille thought for a moment.

This is a risky move.

AI is not necessarily better than humans in cyberspace, especially in a given job category.

But. He really needs to know about this symbiotic AI of his own.

[Lille: Try it.] 】

With Lille's consent, the baby octopus leaves his body and sticks to the database.

The huge computing power was transferred from Lille's body to the side of the little octopus.

Then Lille saw that the octopus began to swell violently, and the tentacles on its body became longer and larger, and the suction cups became more and more refinedβ€”

More than Lille could have imagined!

Those safes where the data is stored are more like the entire cabinet has been uprooted!

The system pop-up box that hadn't popped up for a long time appeared in front of Lille's eyes:

[Your symbiotic AI has absorbed enough computing power to reach the upper limit of computing power for the first time.] 】

[AI Tendency Construction: Data Scraping]

[Adapt to any type of data for fast identification and replication, AI will capture data according to the entries you set, and generate raw data streams to fill in the core code.] 】

[AI with this feature will have advantages for data processing, decoding, and deciphering work.] 】

The entire cyberspace represented by the database thought that the giant octopus was trembling-

The server can't stand such an exaggerated data exchange!

Lille hurriedly shouted:

[Lille: Grab Mewtwo-related documents!] Don't catch everything! 】

(End of chapter)