富二代抖音app

Chapter 21: Strengthening the Artificial Intelligence System



Chapter 21: Strengthening the Artificial Intelligence System

1T runs memory +256T hard drive capacity +8T/s memory broadband.

8K video takes +7680×4320 screen resolution +320 Hz screen refresh rate.

The electromagnetic capacity of 6,500 mAn +100 W wireless express charge within 50 m.

CPU main frequency 12 GHz + 24 core + 64 thread.

\'Is this a f*cking phone?\'

Tang Rui was stunned.

If this was used to fight a mega corporation, it shouldn\'t lag, right?

He put the phone in his pocket and took out his bracelet.

The bracelet did not change much, but it increased the monitoring function of physical health.

It was quite practical, but there were not many changes.

Finally, he picked up the smart glasses and put them on.

Swoosh!

A virtual screen appeared in front of his eyes.

It was very clear, but it did not affect his vision.

Tang Rui had an idea.

A DOS program run interface appeared on the laptop screen.

\'Nice.\'

Just now, he had used brain waves to control the laptop.

The command was passed to the notebook through the sensor of the smart glasses.

This was the function he needed the most.

To test the accuracy of brainwave reading, he wrote a small calculator program.

Lines of codes quickly refreshed on the screen.

In less than a minute, he had written a small calculator program.

At this speed, he could beat all the programmers in the world.

After all, there was a limit to hand speed. The speed of thought always exceeded the speed of hand speed.

As long as there was nothing wrong with his thoughts and his brainwave reading and translation were correct, the speed of his programming would only depend on the speed of his thoughts.

He closed the keyboard twice and closed the laptop, returning it to its suitcase form.

Tang Rui looked at the system interface.

[Item: Fully Defensive Laptop]

[Experience: 12/25000]

[Enhancement: Body, hardware, software, peripherals]

[origin points: 13.6 (Enhanceable)]

Full defense?

How interesting.

The original three-defense laptop had now become a full-defense laptop.

Many people had a misunderstanding.

They believed that the three defenses were anti-chemical, chemical, and nuclear weapons.

That was the standard for underground nuclear fortifications.

A laptop.

No matter how much defense he had, it was impossible for him to resist the attack of nuclear weapons.

Under normal circumstances,

The three protections of electronic products referred to the protection against mold, moisture, and salt.

The outer shell he had originally bought was IP65. It could prevent external objects and dust from infiltrating, and it could also prevent water from immersing in it. It was considered quite good.

But now that it had been strengthened.

The prefix had become full defense, which meant that there had been a tremendous change in this aspect.

He just didn\'t know.

Could this laptop be resistant to electromagnetic pulses?

Could it defend against kinetic energy impacts and shocks?

At the same time, did cyberattacks count as full defense?

However, he would not be so bored as to conduct such experiments.

Taking the laptop to charge, he lay on the sofa in his smart glasses and began to write a program.

At a distance of 50 meters, all peripherals can be used for data transfer and wireless charging with the laptop.

If they were 50 meters away…

The smart glasses and smart bracelet had to rely on the phone\'s network to connect to the laptop.

But how big was a room?

Fifty meters was more than enough.

Just like that.

Tang Rui lay on the sofa and programmed with his mind.

Ten minutes later.

A network port scanning tool was completed.

\'Keep going.\'

A few minutes later, a simple web information search tool was completed.

This kind of simple web crawler was very easy to write.

It took him a few minutes, but he still added the image search algorithm. He could search the images directly.

However, the next firewall was a huge project.

Fortunately, he did not need to write it directly. Instead, he added some functions with the firewall of the operating system.

For example, mirror programs and honey pot systems.

Normal firewalls would not have these functions.

It took almost two hours.

He added various functions to the firewall, such as Trojan Horse Kill, virus scan, virtual hard drive, mirror system, anti-invasion honey pot, and so on.

Now, if someone wanted to hack into his computer, they had to break through more than ten firewalls outside and break through trap programs one by one. Finally, they had to break through the authorization protection of the operating system to obtain the super administrator authority.

However, he did not think that anyone could do this.

It was not that his skills were invincible.

Instead, it was an operating system enhanced by the system interface. Its privilege protection was no longer something that hackers could resolve.

Therefore, he did not have to worry about his IP address being exposed.

All kinds of tools had been prepared.

Tang Rui started his first hack.

This feeling of sneaking around was very exciting.

His target was an internet cafe.

Why did he have to find an internet cafe?

It was because he needed a few chickens.

It was a springboard.

Everyone understood.

Although this method was no longer useful for the current Internet technology,

However, he still wanted to put on a disguise. It was a little ritualistic.

Scan the port.

Sending a disguised message.

Obtain admin permissions.

Make a nest out of a patch and set up a springboard program.

This series of methods sounded very fast, but it was even faster to operate.

Tang Rui did not even get up.

The data on the smart glasses kept refreshing. Soon, everything was done.

After doing all this, it was only then that he started hacking into telco servers.

In the end.

As soon as he went up, he was discovered by the cybersecurity department of the telco.

The other party followed the data and began to hack in the opposite direction.

This made Tang Rui\'s balls hurt.

Was he that lousy?

That shouldn\'t be the case.

Then how did the other party discover him immediately and lock onto him?

He was very puzzled.

However, this was not a big deal.

However, the traces of his invasion had been discovered. It would not be easy for the other party to find him.

The data on the smart glasses began to refresh.

Lines of code were quickly written.

The two sides began to fight through the Internet.

In the cybersecurity office next to the telecommunications room, someone suddenly started typing on the keyboard.

Moreover, he was laughing as he knocked.

His smile was very wretched.

"What are you laughing at? Did you take the wrong medicine?"

"Boss, I found a rookie. His skills are not bad, but his experience is too poor.

"He scanned the fishing port we left behind and even sent a message over. I\'m dying of laughter."

"Did you trace the address?"

"Not yet. The other party\'s foundation is very solid and his adaptability is very strong. If not for his poor experience, I might not have been able to suppress him."

"That\'s amazing. Do you need help?"

"No, let me play with him."

Half an hour later.

"Boss, hurry up and help. I can\'t hold on much longer."

"Here we go."

Another hour passed.

The dozen or so people in the office all attacked.

The smiles on their faces had disappeared, and their expressions had become serious.

He had no choice.

The other party was growing too quickly. If not for the fact that they had the advantage in the team, they would not have been able to withstand it.

Even so.

It was very difficult for them to resist now. They were completely suppressed by the other party.

Another half an hour passed.

"We\'ve been tricked. The other party is also fishing. They\'re not alone, but a team.

"Stop playing around. Immediately mobilize your computing power, connect to the cloud platform, and directly defeat the other party."

The head of the security department gave the order directly.

If they continued playing, something bad would happen.

Therefore, they directly disregarded morals and activated the big data cloud network.

In an instant, Tang Rui\'s attack was suppressed. Then, before he could react, the chicken and the gangplank were directly crippled.

The other party\'s data flow crashed into the firewall with a destructive force.

"F*ck!"

Tang Rui jumped up from the sofa and was dumbfounded.

Originally, he was still in a deadlock with the other party. This allowed him to familiarize himself with online attack and defense at an extremely fast speed, and his skills were constantly improving.

In the end, at that moment.

The other party\'s calculation ability multiplied exponentially, instantly breaking the stalemate.

Even if he programmed it with his mind, no matter how fast his thoughts were, they could not be faster than supercomputers.

Thank goodness.

The operating system that had been strengthened by the system panel had its own firewall that completely withstood the other party\'s attack.

No matter how complicated and varied the other party\'s data flow was, it was still blocked outside.

This made Tang Rui sigh in relief, but at the same time, he was also a little speechless.

What should he do now?

The other party had cheated.

It was even a f*cking physical cheat.

Tang Rui walked to the laptop and looked at the system panel.

\'I want to cheat too.

\'Let\'s see who\'s the better hacker.\'

Strengthening.

He clicked Enhance again.

However, the enhancement this time was no longer the overall enhancement of the hardware system. Instead, it was divided into separate parts.

For example, hardware systems.

It was divided into CPU, motherboard, memory, graphics card, sound card, base station/satellite network card, power supply, LCD screen, logic components, high-frequency tuner, keyboard…

Enhancement of these equipment required one origin point, and some require two origin points.

If he strengthened them all, the origin points would not be enough at all.

It did not seem feasible to strengthen one or two pieces of equipment alone.

Tang Rui pondered for a while.

Abandon the enhanced hardware and choose the enhanced software.

The software was not enhanced as a whole.

They were also separated.

Storage Management, Processor Management, File Management, Device Management, Job Management, Image System, Sound System, Drive System, Artificial Intelligence System, UAV Control System, Thought Read System…

The first thing Tang Rui saw in the large number of systems was the artificial intelligence system.

"Holy shit!"

When he chose to strengthen the artificial intelligence system, five origin points were deducted.

What kind of concept was this?

Previously, he had only spent seven origin points to level up.

In the end, a single system required five origin points.

The next second, the virtual screen on the smart glasses refreshed.

Celia\'s icon appeared on the screen.

Celia?

Wasn\'t this the smart assistant of his phone?


Tip: You can use left, right, A and D keyboard keys to browse between chapters.