life play game

Chapter 124 Two Lucky Hackers

Chapter 124 Two Lucky Hackers (Part [-])
In Lu Zhixing's virtual space, two black phantoms appeared.

Just like the hackers that Lu Zhixing had seen before, the appearance of these two people seemed to be constantly changing, like a mosaic, or like countless small mirrors covering their bodies, reflecting the surrounding scenes scatteredly. .

The first time they appeared in the virtual space, they began to operate skillfully.

The slightly taller hacker on the left squatted down, opened the suitcase he was carrying, and tried to grope inside.

This suitcase looks similar to them. They all look like a pile of data between reality and virtuality. It can be regarded as a toolbox for hackers to invade virtual space, not limited to certain specific tools.

What can be produced inside depends on the underlying rules of this virtual space.

After groping around inside, the tall hacker frowned slightly: "Pavel, this virtual space seems to have the strictest underlying rules.

"In terms of force, at most this kind of primary weapon can only be used."

As he spoke, he took out a pistol from the suitcase.

The man he called Pavel had a medium build, with a high nose bridge and deep eye sockets that could be vaguely seen from the outline. He had certain Western characteristics. beard.

Pavel also took out a pistol from the suitcase, and with some disgust, he checked the magazine with one hand with a very skillful movement.

"It's been a long time since I've used this kind of antique. It's really hard to imagine why, after so many years of deep virtual reality technology, there are still people who would set such strict restrictions in the virtual space." Pavel complained.

The tall hacker from before also looked at the space around him: "It's normal, after all, it's the leftovers left by VRNO. If it's really easy to steal the virtual space, it won't be left to our ATE."

On the dark web, some virtual space information is being sold all the time.

There is more or less information, some even detail who the owner is, and some have only one location coordinate.

This is a bit similar to selling personal information online in the traditional Internet era: After using up the information, in order to extract the remaining value as much as possible, they often choose to resell the information.

The same goes for hackers who invade virtual spaces.

Organizations, large and small, if they fail to steal a virtual space for various reasons, will often leave a location coordinate to facilitate their second invasion, or simply sell the location to make money.

And some hacker organizations with weak strength will buy the coordinate information of these virtual spaces on the dark web, and eat some leftovers from big organizations.

Generally speaking, this kind of virtual space often has some problems, such as it is more troublesome to steal, or it is not worth much.

Also known as dirty work.

The hacker organization that Pavel and Bob belonged to was called ATE, and it belonged to the type of eating leftovers.

And VRNO, which sells information, is a hacker organization with a great reputation, and even has a foreign official background.

VRNO often releases similar virtual space coordinates, and there are tens or hundreds of copies.With the strength of VRNOs, generally speaking, it’s not that they can’t take down these virtual spaces, but that some virtual spaces are not worth much, they don’t make much money, and they are too lazy to do it themselves, so they are sold to small hacker organizations.

Of course, there are also very rare cases where the difficulty of conquering the virtual space is too high, and VRNO is helpless.

But Pavel and Bob feel that the probability of the latter happening is comparable to winning 500 million in lottery tickets, and it is impossible for them to fall on their heads.

Pavel checked the equipment on his body. Soon, his body flowed like ripples, and there appeared light and flexible tights, claws and special rock climbing equipment. Of course, there were still only phantoms covered with mosaics.

"Bob, check the other underlying rules again."

Tall Hacker Bob looks around the virtual space.

Many green data stream characters faintly appeared in the position of his eye sockets, and soon, he "seeed" a lot of information.

"Improved physicality in terms of movement and jumping.

"Significantly reduced the damage dealt when falling from heights.

"The vitality has been greatly enhanced, and even if you are seriously injured, you will not be kicked out of the virtual space.

"The entire virtual space seems to be a huge maze, and there are powerful hostile monsters active.

"...It's really weird. Doesn't the owner of this virtual space bother him?"

As far as hackers are concerned, it is obviously not the first time they have done this kind of intrusion into the virtual space, but it is rare to encounter such a situation.

Generally speaking, the owner of the virtual space will not set too many restrictions on his virtual space.

Because these underlying limitations will also limit himself.

Who doesn't want to fly and escape in the virtual space, omnipotent?In reality, it is tiring enough to obey the rules of reality all the time, but after finally obtaining the virtual space, one still has to abide by the rules of reality?

Isn't this proper masochism?

Even those who think of virtual spaces as online workplaces will remove restrictions and let employees play freely in virtual spaces.

And if you want to put hostile monsters in the virtual space, you will generally endow yourself with powerful weapons in the underlying rules.

On the other hand, in this virtual space, apart from greatly reducing fall damage and slightly improving athletic ability, there is no change in the limit on force value.

Of course, the more restricted the virtual space, the harder it is for hackers to tamper with and crack.

But doesn't the owner of this virtual space find it troublesome?

After all, hackers only come occasionally, but the owner of this virtual space needs to use it every day.

For security reasons, the owner of the virtual space can indeed formulate a rather strict underlying rule, and then hide the key in a deep place.

In this way, it is really troublesome for hackers to find the key, but it is also very troublesome for the owner to enter next time and want to use the secret key to modify the underlying rules.

Even if this rule is too strict, even the owner may not be able to get the key, so he has to find the official to reset the virtual space, which is very troublesome.

This is a bit of a waste of food because of choking.

Therefore, most of the spaces that these two hackers invaded were either loosely restricted by the underlying rules, or strictly restricted by the underlying rules but with backdoors in the location of the key, which can be obtained relatively easily.

And this virtual space...has a kind of evil in it.

But Pavel and Bob didn't think too much about it. After all, this is just a private virtual space, and there shouldn't be any complicated internal mechanisms.

"Get to work.

"The technology of these Easterners is still too backward, and they haven't completely cleared the coordinate positioning left by VRNO in this virtual space. Although it took us a lot of trouble to find this place, it's not a big problem.

"Be quicker and quicker."

Bob reminded: "The owner of this virtual space seems to have filled the entire space."

Pavel smiled and shook his head, very confident: "For hackers, purely copying stuff is the most meaningless thing."

They obviously didn't realize the seriousness of the problem, but searched for the location of the key according to the conventional method, and then started to crack it.

In Pavel's field of vision, various data streams flashed, and he began to quickly analyze the theoretically feasible paths around him.

Then, a huge maze formed by countless lines appeared in his field of vision, and even with his own actions, there were some stuttering effects.

"So much computation?"

Pavel was also surprised.

If it's just a simple pile of materials, then the analyzed routes should only be so simple, which can be completed at the speed of light.

But this maze is obviously quite complicated, because there are too many possible paths, and it is still changing randomly between different plates.

For this intrusion, in order not to attract the attention of the official security mechanism, they used limited computing power, so there are several theoretically optimal routes analyzed, and they are still changing in real time.

Pavel felt a little tricky.

But he doesn't really need to climb the entire route like an ordinary person. After all, this place has 27 cubic kilometers. If he really wants to climb it, he has to climb it forever.

Hackers can take advantage of loopholes and jump between blocks directly through certain rules. As long as he completes one of the blocks, the cracking speed of similar blocks should also be greatly improved.

According to normal circumstances, the speed of cracking will continue to accelerate, and the time to solve these puzzles should not be too long.

Therefore, the small problems seen so far are not enough to dissuade them.

With a light jump, Pavel and Bob climbed onto the wall next to them. At the same time, they automatically drilled holes and adjusted their physical fitness to the highest level allowed by the underlying rules of this virtual space.

Then, they quickly moved in the direction of the key along the path they "saw".

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like