You have a new Amazon product recommendation

Chapter Thirty-Eight: RT System, Breaking the Network!


"Character Mode On, Commander Select" In an instant, three character modes refreshed on the computer screen. otbnkotgt Officers, medics, nurses Yang Xie didn't want to use military mode Because the RT system is a military system, the stored program data is also military data.

Therefore, the character mode is relatively simple.

"System, remove the intranet mode," Yang Xie said.

"The intranet mode deactivation system receives the earth satellite signal and is cracking the source code parameters of the satellite system, A, CHA, DE, UK" Yang Xie stared at the data parameters that kept being refreshed on the computer screen, and found the national abbreviations of each country, all of which were refreshed in the network data For a time, the satellite systems of various countries were all breached.

However, in the end, the RT intelligent system, selected the source code parameters of system A, and locked it.

"System Locking A Military Satellite System" "Oh, YGOD damn it, there's hacking" the U.S.

Military Cyber Information Security Center.

"RT system, lock the strongest military country A military satellite system, enemy military data parameters, scanning" “” "Minister, the National Military Security Network, has breached military data parameters and is being quickly scanned" "It is impossible that no country in the world can break through the cyber defense system of our military security center."

"Hacked data, unable to defend against interception" This data parameter, which was breached by the network of the Center for Military Security of the United States, was quickly received and analyzed by the satellite data of the major military powers.

Russian Military Security Center R Security Center "Oh my God, this must be another hacker from China, attacking the network of the U.S.

Military Security Center."

"Country R, it must be this island country that is not willing to be a dog leg of the United States, secretly attacking" the Russian military security department with a calm analysis.

The Russian side doesn't think that this is something that Chinese hackers can do.

Only country R, a group of countries that are hostile to China, would attack China so irrationally.

"What the U.S. military network has been attacked in an all-out way," said the Chinese Information Security Defense Agency.

"Hurry up, carry out information security defense measures" Next, the personnel of the Information Security Bureau of various matters were all busy.

Crisis awareness At this moment, there was a collective eruption.

America's military network has been breached.

The people of the Ministry of Security in various matters collectively could not sit still.

Huaguo In a hotel in Su City, Yang Xie completely stormed out after hearing the system's reply.

The RT system actually broke through the network of the American Military Security Center, and it is still unscrupulously scanning people's military data parameters Intelligent military systems This Nima doesn't want Lao Tzu's life.

Just when Yang Xie was about to give an order to let the RT system cancel the scanning of the military data parameters of the United States, the RT system suddenly prompted and said: "The data parameter scanning of the RT system is about to interrupt the military data parameters of the United States, which belongs to the secondary data parameters, and the system chooses to give up the military data parameter scanning." ” "Secondary data parameters" Yang Xie understands that the RT system of others actually looks down on the military data parameters of the United States.

Center for American Security "Minister, hacking data, suddenly disappeared from the security center network, restored normal operation" a Ministry of Security.

Subsequently, the security ministries of various countries also breathed a sigh of relief However, in the process of worrying about the hacker attack on the security center of A, the heads of the security centers of various countries inevitably gloated over A.

The hackers have breached the security network of the world's largest military power, which is absolutely a humiliating challenge for the United States.

"The system, has it been tracked by the enemy's network and locked the source of I," Yang Xie hurriedly asked.

Nima, this is a major event that challenges the entire security defense of the United States.

"Please rest assured, Your Excellency, a military network system, cannot lock the I source of the RT system.

System Channel.

Yang Xie breathed a sigh of relief and ordered: "System, restrict the military attack mode and turn on the defense mode" "Military Attack Mode Limits Successful Defense Mode, Always On" RT System Channel.

Yang Xie asked: "System, can it be converted to military mode?"

"In the system database, there is no non-military mode setting, the data system is scanning, the global network data system is being collected, the system is running, the data is loading, the system is virtually compressed, and the system is turned on the mode," the RT system said.

Yang Xie waited for a while, and a set of mode background screens began to flash on the computer screen.

Military mode, civilian mode, business model, entertainment model, education model, virtual mode, biochemical model, scientific research mode, science and technology mode Nine major models It's self-explanatory "Explain, virtual mode," Yang Xie asked.

"The commander virtual mode combines the system's own two-dimensional virtual technology.

System Channel.

"Virtual software development" Yang Xie was excited.

Nowadays, virtual software is being developed all over the world.

Virtual reality technology is being developed by major high-tech companies.

However, the world's virtual reality technology is not mature enough.

The nine major modes of RT system development are a system module.

It makes it easier for system users to use the functions of the RT system.

"What about the education model," Yang Xie asked.

RT system said: "The education model is a multimedia education model program that the system has opened after collecting the data parameters of the global education software, combined with the parameters of the military system armed training system. ” "System, explain the functions of all system modes," Yang Xie ordered.

The pattern background on the desktop of the computer began to refresh.

Free novels bring you joy and joy ---> storyskyline.net

Civilian mode: normal search function Business model: business management software development, business data processing function Entertainment mode: multimedia software development function Biochemical mode: biochemical technology research and development, software development function Scientific research mode: scientific research data processing function Technology mode: high-tech software development, data processing functions "This pattern is good," Yang Xie sighed, the intelligent system is convenient and concise to operate.

Next Yang Xie ordered: "System, turn on civilian mode" "The civilian mode is turned on, and the commander is asked to turn on the civilian mode intelligent virtual service character image in the transformation of the character model.

After the system reply is completed, a group of three-dimensional characters appear on the computer desktop.

"This is Mr.

Cang, Mr.

Hatata, Mr.

Takizawa, Mr.

Matsushima, Mr.

Yoshizawa" Yang Xie stared at the three-dimensional image on the computer screen, and his brain suddenly became messy.

The RT system is worthy of the Resident Evil world, the military system of the island nation The characters selected from the Internet are all action education actresses from the island country

.

: