Home Categories science fiction Doll software 1 Soul upload

Chapter 13 Dark Tracking

Doll software 1 Soul upload 谭剑 1010Words 2018-03-14
Shadow has long since left the Network Causeway. He wouldn't just stand there.Many hackers think they are very capable, but they still don’t leave immediately after completing the task, as if they were waiting for reporters to take pictures or fans to ask for autographs, only to be caught without a fight. No matter how skilled hackers are, they are no match for crowd tactics. It's not that they are afraid of some kind of crouching tiger, hidden dragon, but because of the large number of hackers who hit them with many tricks, even if some of them are not very lethal. It takes more time to get rid of, not easy to get rid of.

So, as soon as he got rid of the police, he left immediately without stopping. Now he stops at a place in the Blackpool area. This place is the so-called “Three No Matters” zone of the Internet. It is more Mong Kok than Mong Kok, and newer than Shinjuku. In the online world, there is not much rule of law, and only the industry and users are self-disciplined.In the three-way zone, there is not even the most basic self-discipline.Websites with this three-way structure are not located in any developed regions such as Europe, North America, or Asia. They are likely to be in Central Africa or other developing countries, or even micronations of that kind.

This is a hotbed of all viruses and a place where international criminal organizations exchange information. You can find various types of contraband, such as, or such as professional killer's book, etc., all things that cannot be found outside, or items that become "public domain" (public domain) if no one is willing to claim them, All are likely to be found here. This is also a good place to test a new program of mass destruction, which is an area similar to a sandbox (sandbox), and it is also very large. Therefore, the crisis is everywhere. Within a mile radius, there were no other people at all.

Just as the frightening AIDS came from Africa, several extremely destructive computer viruses a few years ago are said to have originated from servers in Africa. Shadow recalled what happened just now, and projected the "heavy case" on the open space in front of him. Fortunately, the gang of mobs played back the video of the incident, which gave him the opportunity to watch in detail what happened during the explosion from other angles. 0.01 seconds before the explosion, his target just slipped into the grating, going nowhere. It doesn't matter, the film is three-dimensional, he changes the angle and direction to see the destination indicated on the display board of the grating.

However, after changing several angles, I still can't see it. It turned out that the destructive power of the explosion was so strong that it just blew up the network space in front of the display board, blocking the direction of the network light.Therefore, no matter how he changes the angle, he still cannot see the display board. It didn't matter—he had a thought—think of a workaround. He then checked for mirrors nearby that might reflect the data on the display board. search-- 23 pieces of mirrors were found at the scene, half of which are Bagua mirrors in Chinese Feng Shui!

——In the real world, the gossip mirror is said to be able to block evil spirits in Feng Shui.Regardless of how effective it is, what is the use of it in the digitally focused online world?Moreover, after careful observation, it was confirmed that none of the twenty-three mirrors directly or indirectly reflected the display board. In other words, helpless to him. He couldn't help yelling. Fortunately, he had just received intelligence and knew the whereabouts of the target. He rushed over immediately, never neglecting.
Notes:
Press "Left Key ←" to return to the previous chapter; Press "Right Key →" to enter the next chapter; Press "Space Bar" to scroll down.
Chapters
Chapters
Setting
Setting
Add
Return
Book