Chapter 124 Two Lucky Crisis (One more)

In the virtual space of Lu Zhixing, the two black imaginary shadows appeared.

Just like those hackers I have seen before, the appearance of these two people seems to be changing, like playing mosaic, but also like the body surface covers countless small mirrors, reflecting the surrounding scenes scattered. Essence

The first time in the virtual space, they started to operate skillfully.

The taller hacker on the left crouched, opened the box that was carried, and tried to explore inside.

This handbox looks similar to them, all like a bunch of data between reality and virtual. It can be seen as a toolbox for hackers to invade virtual spaces, not at some specific tools.

What can be taken out depends on what the underlying rules of this virtual space are.

After the tall hacker firmed in it, he frowned slightly: “Pavil, this virtual space seems to have the strictest underlying rules.

“In terms of force, you can only come up with this primary weapon.”

While saying, he took a pistol from the box.

The person who is called Pavil is moderate in size and can be seen from the contour that he can vaguely see the bridge of the nose and deep eye sockets. It has certain Westerners’ characteristics. Beard.

Pavil also took out a pistol from the box. Some disgustedly checked the magazine with a very skilled movement.

“I haven’t used this kind of old antique for a long time. It is really hard to imagine why the deep virtual reality technology has developed for so many years, and some people will set up such strict restrictions in the virtual space.” Paville said.

The tall hacker also looked at the surrounding space: “This is normal, after all, VRNO eats the remaining residual cooler. If it is really a particularly easy virtual space, it will not leave us ATE.”

On the dark network, it is selling some virtual space information every time.

There are less information, and some are even to who the owner is, and some have only one positioning coordinate.

This is a bit similar to selling personal information on the Internet in the traditional Internet era: After using this information itself, in order to maximize the surplus value, it will often choose to resold this information.

The same is true of hackers invading the virtual space.

Large -sized organizations, if they fail to successfully steal a virtual space for various reasons, they will often leave a positioning coordinate to facilitate their secondary invasion, or simply sell the positioning to make money.

And some of the weak hackers will buy the coordinate information of these virtual spaces on the dark online, and eat a little organization to eat the remaining residual cooler.

Generally speaking, there are often some problems in this virtual space, such as stealing more troubles, or that it is not valuable.

That is commonly known as dirty work.

The hacker organization of Paville and Bob is called ATE, which is a type of cold and cold.

The VRNO selling information is a very famous hacker organization, and even the official background of foreign countries.

VRNO often releases similar virtual space coordinates, and it is hundreds of hundreds. With the strength of VRNO, it is generally not that you can’t get these virtual spaces, but that some virtual space value is not high, there is nothing to earn, and he is too lazy to do it in person, so sell it to a small hacker organization.

Of course, there are also a lot of other situations. It is difficult to overcome the virtual space, and VRNO is helpless.

But Pavil and Bob felt that the probability of the latter was comparable to five million in the lottery, and it was impossible to fall on his own head.

Paeville checked the equipment. Soon, he flowed like a ripple, and there was a light and flexible tights, hook claws, and specialized rock climbing equipment. Of course, there was still only the shadow of mosaic.

“Bob, check the other underlying rules again.”

The tall hacker Bob looked around this virtual space.

Many green data stream characters appeared vaguely in his eyes. Soon, he “see” a lot of information.

“Enhanced physical fitness in mobile and jumping.

“Greatly reduced the damage caused by falling from high altitude.

“Significantly enhanced vitality, and serious injuries will not be kicked out of the virtual space.

“The entire virtual space seems to be a huge maze, and there are powerful hostile monsters.

“… it really is a bit strange, isn’t the owner of this virtual space be troublesome?”

As a hacker, they are obviously not the first time they have done this invasion of virtual space, but they rarely encounter this situation.

Generally speaking, the owner of the virtual space will not set too many restrictions on his virtual space.

Because these underlying restrictions will also limit himself.

Who doesn’t want to fly the sky in the virtual space, omnipotent? In reality, it is already tired to abide by the reality rules at all times. As a result, it is easy to obtain virtual space but still adhere to the reality rules?

Isn’t this a proper abuse?

Even those who use virtual space as an online office place will cancel various restrictions and let employees play casually in the virtual space.

And if you want to put hostile monsters in the virtual space, you will generally give yourself a powerful weapon in the underlying rules.

In contrast, this virtual space, in addition to significantly reduced falling damage and a small amount of exercise ability, has no changes in limitation of force value.

Of course, the more virtual spaces that limit the more, the harder the hackers tamper and crack.

But don’t you feel trouble in the owner of this virtual space?

After all, hackers are only occasionally coming, but the owner of this virtual space must be used every day.

For safety reasons, the owner of the virtual space can indeed form a quite strict underlying rule, and then hide the key to a deep place.

In this way, it is really troublesome to find a key to find a key, but the owner will enter the next time and want to modify the underlying rules with the secret key.

Even if this rule is too harsh, even if the owner cannot get the key, then you have to find an official to reset this virtual space, which is very troublesome.

This is a bit of scrap.

Therefore, most of these two hackers invading are either the underlying rules are limited to looseness, or the underlying rules are limited to strict but the key position has the back door. This can be easier.

And this virtual space … it is faintly revealing a kind of evil door.

But Pavil and Bob did not think too much. After all, this is just a private virtual space, and there should be no too complicated internal mechanisms.

“Start work.

“The technologies of these Oriental people are still too backward, and they cannot completely remove the coordinate positioning of VRNO staying in this virtual space. Although we find it here, it takes a bit to discount, but the problem is not big.

“Hands and feet are a little bit lily, and the quick decision.”

Bob reminded: “The owner of this virtual space seems to fill the whole space.”

Pavil smiled and shook his head, very confident: “For hackers, pure replication and filling are the least meaningful things.”

They obviously did not realize the seriousness of the problem. They just searched the position of the key according to the conventional method, and then began to crack.

In Pavil’s field of vision, various data flashed, and began to quickly analyze the feasible path of the surrounding theory.

Then, in his field of vision, a huge maze was constituted in his vision. Even with his own actions, some stuttering effects appeared.

“Is the calculation so large?”

Pavier was also surprised.

If it is just a simple material stacking, then the analyzed route should only be so simple, which can be completed at the speed of light.

But this maze is obviously complicated, because there are too many possible paths, and it is still changing between different sectors.

In order not to attract the attention of the official security mechanism, the computing power they called was limited, so there were several theoretical optimal routes analyzed, and they were still changing in real time.

Paville felt a little tricky.

However, he doesn’t need to climb the entire route like an ordinary person. After all, there are 27 cubic kilometers in this place. If you really climb, you have to climb to the ground.

Hackers can drill vulnerabilities and can jump between the plate directly through certain rules. As long as he completes one of the sections, the cracking speed of a similar sector will also increase significantly.

According to normal, the speed of cracking will continue to accelerate, and the time to solve these puzzles should not be too long.

So this small problem at present is not enough to persuade them.

Pavil and Bob gently jumped, climbed to the side of the wall, and at the same time automatically drilled vulnerabilities, adjusted physical fitness to the highest level allowed by the bottom layer of this virtual space.

Then, they quickly moved along the “seeing” path to the direction of the key.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like