My Items Have an Upgrade Panel

Chapter 21: Enhanced artificial intelligence system

  Chapter 21 Strengthening AI Systems

  This parameter is mobile phone?

  Are you sure it's not a server?

  1T running memory + 256T hard disk capacity + 8T/s memory bandwidth.

  8K video recording + 7680×4320 screen resolution + 320Hz screen refresh rate.

  6500mA electromagnetic capacity + 100W wireless fast charging within 50 meters.

  CPU main frequency 12GHz+24 cores+64 threads.

   Is this a mobile phone?

   Tang Rui was shocked.

   If this is used to fight the king, it should not be stuck.

   Put your phone in your pocket.

  He took out his bracelet.

  The wristband has not changed much, but the health monitoring function has been added.

   It's functional, but nothing much has changed.

  Finally, he grabs the smart glasses and puts them on.

   Shua!

   A virtual screen appeared on the lenses in front of both eyes.

   Very clear, but does not affect the line of sight.

   Tang Rui had a thought.

  The DOS program running interface appeared on the notebook screen.

   Nice.

  Just now he was using brain waves to control the laptop.

  Transfer the command to the notebook through the sensor of the smart glasses.

   This is the function he needs most.

  In order to test the accuracy of brain wave reading, he wrote a small calculator program.

  I saw a line of code, which was quickly refreshed on the screen.

   Less than a minute.

  A small calculator program was written by him.

  This speed beats all programmers in the world.

   After all, hand speed has a limit.

  The speed of thinking always exceeds the speed of hands.

  As long as there are no problems with his thinking, and his brainwave reading and translation are correct, then his programming speed will only depend on his thinking speed.

  Close the keyboard twice and the unfolded part below, cover the laptop, and restore it to a suitcase.

   Tang Rui looked at the system panel.

  【Item: Full Defense Laptop】

  【Experience: 12/25000】

  【Enhancement: body, hardware, software, peripherals】

  【Source point: 13.6 (can be strengthened)】

  Full defense?

   This prefix is ​​a bit interesting.

  The original three-defense computer has now become a full-defense computer.

  Many people have a misunderstanding.

  Three defenses are considered to be against biological and chemical weapons, chemical weapons and nuclear weapons.

  That's the standard for underground nuclear fortifications.

a laptop.

   No matter how three defenses, it is impossible to resist the attack of nuclear weapons.

Normally.

  The three defenses of electronic products refer to anti-mold, anti-humidity, and anti-salt spray.

  The shell he originally purchased is IP65-rated, which can prevent the intrusion of foreign objects and dust, and can also prevent the intrusion of sprayed water, which is quite good.

  But now such a strengthening.

The    prefix has become full defense, which means that there have been earth-shaking changes in this regard.

   Just don't know.

   Now this laptop, can it prevent electromagnetic pulse?

   Can it defend against kinetic energy impact and shock?

  At the same time, cyber attacks can be considered as a comprehensive defense category.

  But he will not be idle, to do such an experiment.

   Taking the laptop to charge, he lay on the sofa wearing smart glasses and began to write programs.

   Within a distance of fifty meters, all peripherals can perform data transmission and wireless charging with the laptop.

  If you leave a distance of fifty meters.

  Smart glasses and smart bracelets must rely on the phone's network to connect to the laptop for data.

   But a room is only so big.

  A distance of fifty meters is enough.

that's all.

   Tang Rui lay on the sofa, programming with his mind.

   Ten minutes later.

  A network port scanning tool is written.

continue.

   After a few more minutes, a simple web information search tool was completed.

   This simple web crawler is easy to write.

   It took him a few minutes to add the image search algorithm, so that he can directly search for images.

   But the next firewall is a big project.

   Fortunately, he does not need to write directly, but to add some functions with the firewall of the operating system.

   For example, mirroring programs and honeypot systems.

  Normal firewall will not have these functions.

   It took almost two hours.

  He added various functions to the firewall, such as Trojan horse killing, virus scanning, virtual hard disk, mirroring system, anti-intrusion honeypot and so on.

  Now someone wants to invade his computer, he must break through more than a dozen firewalls outside, and then go through one trap program, and finally break through the permission protection of the operating system to get super administrator privileges.

   But he doesn't think anyone can do it.

   It's not that he's technically invincible.

  It is the operating system after the system panel is strengthened, and its permission protection is no longer something that hackers can solve.

  So he doesn't have to worry about the IP address being exposed at all.

   Various tools have been prepared.

   Tang Rui started the first invasion.

   This sneaky feeling.

   Very exciting.

  The target of his invasion is an Internet cafe.

  Why do you want to start with an Internet cafe.

  Because he needs several broilers.

   Springboard.

  Everyone understands.

  Although this method is useless for the current network technology.

  But he still wants to put on a vest, which has a sense of ceremony.

   Scan ports.

   Send fake messages.

   Obtain administrator privileges.

   Make a patch to make a nest, and arrange the springboard program.

   This series of means is quick to say and faster to operate.

  Tang Rui didn't even get up.

  The data on the smart glasses is constantly refreshed, and everything is done quickly.

  After doing this.

  He just started hacking into Telecom's servers.

result.

   As soon as he went up, he was discovered by the network security department of China Telecom.

  The other party follows the data and starts to intrude in reverse.

   This made Tang Rui very painful.

  Is this how you cook?

   It shouldn't be.

  Then how did the other party discover and lock him in the first place.

  He was very puzzled.

   But it's not a big deal.

   It's just that the traces of his invasion have been discovered, and the other party wants to find him, which is not that simple.

  The data on the smart glasses began to be refreshed continuously.

   Lines of code, written quickly.

  The two sides began to fight across the network.

  …

  In the network security office next to the telecommunications room, a person suddenly tapped on the keyboard.

   And while knocking, laughing.

  His smile is very wretched.

   "Why are you laughing? Did you take the wrong medicine?"

   "Boss, I found a rookie, his skills are good, but his experience is too poor.

   When I came up, I scanned the phishing port we left behind, and sent a message, I laughed so hard. "

   "Did you track down the address?"

   "Not yet, the opponent's foundation is very solid, and his adaptability is also very strong. If it weren't for his poor experience, I might not be able to suppress him."

   "So powerful, do you need help?"

   "No, let me play with him."

   Half an hour later.

   "Boss, hurry up and help, I can't stand it anymore."

"coming."

   Another hour passed.

   A dozen people in an office all shot.

  The smiles on their faces have disappeared, and their expressions have become very serious.

no way.

  The opponent's growth rate is too fast. If they hadn't taken advantage of the team, they would almost be unable to handle it.

   Even so.

  They are also very difficult to resist now, and they are completely suppressed and beaten by the opponent.

   Another half hour passed.

   "I was fooled, the other party was also fishing, they were not alone, but a team.

   Stop playing, immediately mobilize computing power, connect to the cloud platform, and directly defeat the opponent. "

  The head of the security department issued the order directly.

   If you continue to play, something will happen.

  So, they didn't talk about martial arts directly, and started the big data cloud network.

   Instantly.

   Tang Rui's attack was suppressed, and before he could react, the broiler and the springboard were directly destroyed.

  The other party's data flow directly hit the firewall with a destructive force.

"Grass!"

  Tang Rui jumped up from the sofa, he was dumbfounded.

   Originally, he was still in a stalemate with the opponent, which made him familiar with network attack and defense at an extremely fast speed, and his technology was constantly improving.

  The result was at that moment just now.

  The computing power of the opponent multiplies geometrically, breaking the deadlock instantly.

  Even if he uses his mind to program, no matter how fast his thinking is, it cannot be faster than a supercomputer.

fine.

  The enhanced operating system of the system panel, and its built-in firewall, completely resisted the opponent's attack.

   No matter how complicated and changeable the data flow of the other party is, it is still blocked outside.

  While Tang Rui heaved a sigh of relief, he was also a little speechless.

  What to do now?

  The other party hung up.

   It’s also a physical cheat.

   Tang Rui walked to the laptop and looked at the system panel.

  I want to hang up too.

   See who has driven who.

   Strengthen.

   Click Strengthen again.

  However, the strengthening this time is no longer an overall strengthening of the hardware system, but has been separated into individual components.

   For example, the hardware system.

  It is divided into CPU, motherboard, memory, graphics card, sound card, base station/satellite network card, power supply, LCD screen, logic components, high-frequency tuner, keyboard...

  The enhancement of these devices, some need 1 source point, and some need 2 source points.

  If all of them are strengthened, the source points are simply not enough.

   Strengthening one or two devices alone does not seem to work.

   Tang Rui pondered for a while.

   Give up strengthening hardware and choose to strengthen software.

  Software is not overall hardening either.

   is also separate.

  Memory management, processor management, file management, equipment management, job management, image system, sound system, drive system, artificial intelligence system, drone control system, thinking reading system...

  Among a large number of systems, Tang Rui saw the beauty of the artificial intelligence system at first sight.

   "Fuck!"

  When he chooses to strengthen the artificial intelligence system, he will directly reduce the source of 5 points.

  What is this concept?

  The previous overall upgrade only cost 7 source points.

  As a result, a single system requires 5 source points.

   Next second.

   The virtual screen on the smart glasses refreshes.

  Xiaoyi's icon appears on the screen.

  Xiao Yi?

   Isn’t this his phone’s smart assistant?

  (end of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like