Lazy God Possession

Chapter 217: : Skyeye Cloud Service

Under the clear lake, in the computer room, the super-calculated "Large Lazy God" buzzed, and the "lazy bug" iteration was already the seventeenth.

Two days ago, after finding Tie Niu, Nanming ran out without any control. After returning, they were completely frightened.

The "slacker" has almost filled up the entire storage space of the "green lazy god". Everyone, every car, every building that has appeared on the camera has been marked with various information.

Subconsciously, Iron Egg wanted to use code to close the "slacker" iteration, but in a flash, he stopped again.

For Iron Egg, "Slacker" is the complete program that he completed independently for the first time, and also his most proud work.

Iron Egg asks himself that he has no talent for things like code, and the existence of "slacker" is actually because of the disappearance of Iron Girl, he squeezed his own limits, perhaps, this is the pinnacle of his life.

He was curious as to how far the slacker could develop if it continued to iterate.

Because at the beginning of the design, the "lazy bug" only had the function of information search and identification, and Iron Egg slowly extended some functions, and then added it to the iteration.

Strictly speaking, a "slacker" is a program with artificial intelligence characteristics. If it continues to iterate, it will be more widely used.

As for the concerns in the novel, such a program produces a cloud of self-awareness. Without talking about supercomputing such as "Qingda Lazy God", it simply cannot support a program that will have self-awareness. It can only be created if it is so easy It is too exaggerated to produce artificial intelligence that surpasses human beings.

Tiedan told Nanming his hope, and Nanming agreed. Anyway, the police have closed the permission of the camera open to the "green lazy god". Even if something goes wrong, it will not affect the police's surveillance. system.

Such a powerful artificial intelligence. Both in terms of knowledge reserve and strategic significance, it is important to Lazy Technology.

Not to mention, Nanming has his own ideas. He still remembered the last time he was taken by Lu Lingrong's cheating child to a car. Almost in danger, fortunately, Xiao Bai rushed down to save him from a **** disaster.

What if the identification function of the lazy worm can identify the danger in advance? Even if the lazy worm and Xiaobai are only connected through cloud computing in the future, for Nanming, it is tantamount to bringing a bodyguard.

For Nanming, Zhao Fengfeng now protects him personally, but it is only an expedient measure. Nanming creates a lazy **** security. It was to give Zhao Gaofeng a place to settle down, but not to tie him to himself.

In order to allow Qingda Lazy God to have more storage space to continue to iterate, Nanming temporarily applied for a batch of storage cabinets to Jixin Institute. These cabinets were temporarily allocated from the Qingda University server. After formatting and redeploying , To join the array of Qingda lazy god.

At this time, more than a dozen workers in white coats were busy installing storage cabinets. One of them raised his wrist and looked at his watch, and said to one person: "Hurry up, the cafeteria will be open soon. If you go late I won't be able to get my favorite dishes. "

"I see!" The other person quickly installed the remaining hard disks and started to connect various cables.

Wait until everything is ready. The two ran away and ran halfway. One of them turned his head and asked the other: "Well, did you format the hard disk just now?"

"It should be formatted ... Hurry and go!"

Several other people shook their heads and came over to connect the storage cabinet to Qingda Lazy God.

Qingda Lazy God has extended functions that do not need to be shut down, when the cabinet is connected to Qingda Lazy God. The lazy worm started to continue to iterate. In the corner of the hard drive, a previously implanted virus started to work.

The other side of the earth. It was midnight, and a black girl with a teddy-like hair was beating fast in front of the computer. Just a few hours ago. She sneaked into a fbi server and was caught by fbi's white-hat hackers and followed along.

I don't know how many times, a female hacker named td has regretted her strong curiosity. If she was caught, she would be barred from accessing networked devices in the future, and her life would be unimaginable.

So td cannot be caught anyway.

In the online world, the chase battle that you chased me has been going on for several hours. At this time, td has been forced to the end of the mountain. She flinched all the way, covering her ip address all the way. The broiler that was previously controlled, but one by one Occupied until she had almost no broilers on hand.

At this point, she retrieved a backdoor that had been deemed invalid before it was running, and the IP pointed to the address in China.

Td didn't care if this was a trap, and broke into it directly. The other party obviously did not expect that td, who had been forced to the end of the mountain, had a second hand and wanted to follow, but found that the broiler and the previous program were completely different.

Suddenly, the chasing parties widened their distance, td, with the cover of the back door, safely retreated, and the next day, news came that the United States condemned the Chinese hacker for attacking fbi Yunyun ...

Td finally got out and lay down on the sofa exhausted, with the notebook on her knee, tossed aside by her.

The night was dark, and there was a bark of dogs not far away, and the purr of his father in the next room sounded like a bark, and the palm trees outside the window were shaking, making a rustling sound.

td suddenly remembered the peculiar system that had just broken into it, suddenly a spirit, and picked up the notebook again.

She reconnected to "Ling Da Lao Shen", studied it carefully, and froze.

It was a completely different system from the one she knew.

It's not linux, it's not windows, it's not macos, it's not an older version.

It is an independent blood system.

Compatible with some Linux rules, but more like a virtual machine.

td tried various hacking methods he learned, and found that it was completely invalid for this system at all.

In fact, td doesn't know that, unless the "slacker" has been traversing all the files in the entire "green big lazy god" storage cabinet, the latent backdoor program will not be activated, and the backdoor program is actually Running in a virtual machine.

This feeling is like applying for an own account in the cloud computing center, "Qingda Lazy God" operating system, mistakenly thought she was a user, so gave her a username and assigned her a Virtual space and some permissions

At this time td realized that she was not lucky enough to escape the hunt, but a master who helped her open a door and saved her life.

who is it? She counted the hacker masters she knew in her mind, but no one had such technology.

Hackers are only better at finding vulnerabilities and cracking programs, and building a brand new system, which is beyond the capabilities of most people, even everyone.

After all, this is not the era when computers first appeared in the last century. The current system is much more complicated than before.

This person saved her, but did not interact with her. She was able to enter the "green lazy god", but was locked in the sandbox of the virtual machine, as if in a cage.

Part of her authority is like a gap in a cage, allowing her to see the outside world but not see it clearly.

She tried to "communicate" with the master, and created a document directly in the small space to which she was assigned, and typed a line: "hello?"

No one responded.

"Hello? Here?"

Still no one responded.

It doesn't seem that the person intends to contact her more.

As a matter of common sense, she should leave with interest at this time.

But td is a very curious person ~ www.wuxiaspot.com ~ Since no one responded, she went to see it by herself.

She found several available interfaces, retrieved some code, and then froze.

this is……

A super efficient image recognition system? No, it's not just an image recognition system, it's like Tianyan, but now Tianyan is actually locked in a cage and has not been unblocked.

Thinking of everything this thing can do, she got excited and wrote a small program to connect to a surveillance network she had previously cracked, the Los Angeles Traffic Monitoring Network, through the interface left by the lazy worm.

At that moment, she saw countless images appearing on her screen.

For a moment, she saw the image shrink to her position, and a distant traffic camera quietly turned and aimed at her window.

Then her shadow was shown on the screen. (To be continued)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like