"I found it, but the database is locked, and the super administrator's account is not easy to use, and only the genetic code set by Morgana can be unlocked. "

This was to be expected by Hiko.

Computing Shi Yuan has the ability to quietly hack into the supercomputing of a main god.

But the core database is not so easy to unravel.

These are all codes set by the main god with his own genetic information as the secret key.

The database itself is even more important than the supercomputing itself.

The supercomputer is gone, and another one can be created.

Even if the speed of construction is slow, it can still be made.

But if the core database is missing.

That means that the enemy can specialize in developing weapons that target the main god's genes.

If equipped with the Void Weapon, you can use the Void Engine to rewrite the original gene in an instant.

Howl is a good example of this.

Even with the Void Engine, the original Howl could not be the opponent of dozens of second-generation angels.

The computing power of his Void Engine simply can't use the Void Engine to do anything to a large number of second-generation angels.

But it was because of Carl's heartbreak that he was seriously injured by a sneak attack when he was at the Academy of Death Songs.

Carl cracked the angel's genetic code.

Equipped the Angel Gene Strike function on the Howling Void Engine.

Howling can kill angels on the Sky Blade Seven like killing chickens.

"I'll give it a try. "

Shi Yuan quickly tapped on the keyboard, trying to hack into the core database of Demon One.

After a few minutes, Shi Yuan's forehead was already covered with sweat.

It's not like he can't crack Morgana's permissions.

It's that the amount of genetic coding calculations set up by this guy is too large.

The microcomputer in Shi Yuan's hand was just a makeshift hand-rub made by Fraser using the ether code.

The computing power is only comparable to that of a quantum computer on the Blue Star.

It would take tens of thousands of years to decipher this genetic code quietly.

There seems to be no other way than to use violence to break down the door.

But brute-force hacking must have caught Morgana's attention.

Shi Yuan used the mist to envelop the entire Kun Sa Star.

This makes it impossible to observe the planet using all known means of the universe.

It also blocks dark communications.

However, Shi Yuan left a back door for Demon One and Morgana.

Demon One is connected to Morgana's Dark Plane.

If Shi Yuan uses it, the link between the two will be completely blocked.

Morgana must have noticed something.

"Let's stop first, the core database of a main god is not so easy to crack, and there is a lot of data on the periphery of the core database, which is enough for you to digest for a while. "

Although he didn't have a heart, Shi Yuan knew that what Yan said was the truth.

His goal has not yet been achieved, but it has been rewarded.

Yan also saw that Shi Yuan seemed to be a little unhappy, so he comforted

him

"You don't have to be discouraged, if you brute force it, it will definitely be detected by Morgana, Carl has a big clock, which is the most powerful celestial computer in the known universe, and with the cold space technology, she can return to Kunsa at an extreme time. "

"If only Morgana found out... Wait a minute.. I seem to have figured out a solution. "

Shi Yuan patted his head, in fact, he didn't need to brute force, Shi Yuan only needed to change the settings of the core database.

Or just swap the storage locations of the peripheral database and the core database?

If you think of administrative privileges as a door, behind the door is the core database.

Shi Yuan's original idea was to dismantle them first.

Take the things behind the door and put them in at the door.

But he could just use some method to bring out the contents of the door out of thin air without touching them.

This method can be done.

Use the center of the two databases as the center point to establish the coordinates.

The ability of Ethernet encoding to modify coordinate data is used to swap the coordinate positions of the peripheral database and the core database.

This does not trigger the protection system

At the same time, it can also allow Shi Yuan to copy the content in the core database.

Shi Yuan is equivalent to changing the track and not playing with Morgana.

Isn't your genetic code informative?

I don't have this computing power, so I don't crack it.

Just take your stuff in other ways.

"I have an idea, you wait a minute, I'll be right away. "

Shi Yuan began to construct the coordinates according to his own ideas.

Visualize both databases at the same time.

On the virtual screen in front of him, a horizontal and vertical coordinate axis suddenly appeared.

The peripheral and core databases, as well as the protection system, appear in the coordinate axes accurately.

Shi Yuan reversed the positions of the two databases.

Sure enough, nothing happened from the protection system.

And Hiko, who witnessed all this on the side, was already shocked beyond words.

Is this really something God can do?

Not even Queen Keisha can do that.

Using mathematical concepts as your own weapon is a technique that even Kamigawa doesn't have.

"What are you doing in a daze, copy it quickly, I have to copy this data to the next year?"

Shi Yuan's anxious words made Yan sober up, and he hurriedly copied the contents of the core database to his own database.

After another half hour, Morgana's core database was finally replicated.

Shi Yuan swapped the contents of the two databases back and erased all traces.

After checking that it was correct, I walked out.

And at this time, in the illusion, Ah Yuan took them back to the main control room.

After confirming that it was correct, Shi Yuan lifted the illusion.

The entire demon on Demon One was unaware.

Still doing their job.

"Mr. Giovanni, is there anything else you'd like to see?".

Shi Yuan shook his head.

"I'm a little tired today, so I'll go back and rest first, and I'll be visiting tomorrow. "

"Okay, I still have some work to do? Why don't I send someone to take you and Ms. Jingliu back?"

Shi Yuan shook his head and refused.

"No, I'll just go back by myself. "

In this way, Shiyuan Kazuhiko, who stole the core database of Demon One, left Demon One.

And the demons on Demon One had no idea that their core data had been copied by a fictional historian and angel.

After walking out of Demon One, Shi Yuan did not return to Morgana's palace, but dragged Yan to some deserted place.

After the success came out, Hiko was finally relieved.

What happened today was not thrilling, but it also gave Hiko a big enough shock.

The core database of a main god supercomputer was easily stolen by Shi Yuan.

Doesn't this mean that the database protection procedures of other civilizations are useless to Shi Yuan?

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like