"Found it, but the database is locked, and the super administrator's account cannot be used. Only the genetic code set by Morgana can be unlocked."

This is what Yan expected.

Calculation Shiyuan has the ability to hack into a master god's supercomputer silently.

But the most core database is not so easy to unlock.

These are all controlled by the master god using his own genes. The information is encoded as a secret key.

The importance of the database itself even exceeds that of the supercomputer itself. If the supercomputer is gone, you can build another one.

Even if the construction speed is slow, it can still be built.

But if the core database is lost.

Then This means that the enemy can specialize in developing weapons that target the genes of the Lord God.

If equipped with a void weapon, the void engine can be used to rewrite the original genes in an instant.

The Howl embodies this very well.

The original Howl Even with the Void Engine, it is impossible to be an opponent of dozens of second-generation angels.

The computing power of his Void Engine is simply unable to use the Void Engine to attack the large number of second-generation angels.

But just because of Karl Zhi’s failure at Death Song Academy His heart was seriously injured by a sneak attack.

Karl cracked the genetic code of angels.

Equipped the angel gene strike function on the void engine of Howling.

Only with Howling can he kill angels on Sky Blade No. 7 like killing chickens.

"I'll give it a try first."

Shi Yuan quickly typed on the keyboard, trying to invade the core database of Demon No. 1.

After a few minutes, Shi Yuan's forehead was already covered with sweat.

He couldn't crack the permissions set by Morgana.

And It's because the amount of genetic coding calculations set up by this guy is too great.

The microcomputer in Shi Yuan's hand was just improvised by Fraser using ether coding.

The computing power is only equivalent to the quantum computer on Blue Star..

It would take at least tens of thousands of years to quietly crack this genetic code.

Now there seems to be no other way except using violence to break the door.

But brute force cracking will definitely attract Morgana's attention.

Shi Yuan uses The fog enveloped the entire Kunsa Star.

It made it impossible for Kunsa Star to be observed using all known methods in the universe.

It also blocked the dark communication function.

However, Shi Yuan left a backdoor for Demon No. 1 and Morgana.

Demon No. 1 Connected to Morgana's dark plane.

If Shi Yuan used it to completely block the link between the two,

Morgana would definitely be aware of it.

"Let’s stop now. The core database of a main god is not that easy to crack, and there is also a lot of data on the periphery of the core database, which is enough for you to digest for a while."

Although he was unwilling to do it, Shi Yuan knew that what Yan said was true.

His goal had not been achieved, but he had gained something.

Yan also saw that Shi Yuan seemed a little unhappy, so he comforted him.

"You don’t have to be discouraged. If you try to crack it with force, you will definitely be noticed by Morgana. Karl has a big clock, which is the most powerful celestial computer in the known universe. With Liang Bing’s space technology, she can return to Kunsa at an extreme time."

"It would be fine if Morgana didn't find outetc.. I seem to have figured out a way."

Shi Yuan slapped his head. In fact, there is no need to use brute force. Shi Yuan only needs to change the settings of the core database.

Or just change the storage locations of the peripheral database and the core database?

If management permissions are compared to a door, Behind the door is the core database.

Shi Yuan's original idea was to dismantle the database first, take away the things behind the door, and then install them on the door. But he could directly use some method to remove the database inside the door without touching the database. Just bring things out of thin air.

This method can be done.

Use the centers of the two databases as the center point to establish coordinates.

Use the ability of ether coding to modify coordinate data to exchange the coordinate positions of the peripheral database and the core database..

This will not trigger the protection system, but also allow Shi Yuan to copy the contents of the core database.

Shi Yuan is equivalent to changing a track and not playing with Morgana.

Isn’t your genetic code rich in information?

I don’t have the computing power, so I won’t crack it.

Just use other methods to get your stuff.

"I have an idea, just wait a moment and I'll be right back."

Shi Yuan began to construct the coordinates according to his own ideas.

At the same time, he materialized the two databases.

Horizontal and vertical intersecting coordinate axes suddenly appeared on the virtual screen in front of him. The peripheral databases, core databases and protection systems all appeared accurately and without anything. into the coordinate axis.

Shi Yuan exchanged the positions of the two databases. As expected, the protection system did not respond at all.

And Yan, who witnessed all this, was so shocked that he could not describe it in words.

This is really divine power. What can he do?

Even Queen Keisha can't do it.

Directly using mathematical concepts as his own weapon is a technology that even Kamigawa doesn't have.

"What are you doing in a daze? Copy it quickly. I have to copy this data until next year?"

Shi Yuan's anxious words made Yan wake up, and he quickly copied the contents of the core database to his own database.

After another half an hour, Morgana's core database was finally copied.

Shi Yuan copied the contents of the two databases The content was changed back and all traces were erased.

After checking it to confirm that it was correct, they exited.

At this time in the illusion, A Yuan took them back to the main control room.

After confirming that it was correct, Shi Yuan lifted the illusion..The demons on Demon No. 1 were not aware of anything. They were still doing their jobs.

"Mr. Giovanni, is there anywhere else you would like to see?"

Shi Yuan shook his head

"I'm a little tired today, so I'll go back and rest first, and I'll come visit tomorrow"

"Okay, I still have some work to do? How about I send someone to take you and Ms. Jingliu back?"

Shi Yuan shook his head and refused.

"No need, I'll just go back by myself."

In this way, Shi Yuan Kazuhiko, who stole the core database of Demon No. 1, left Demon No. 1.

The demons on Demon No. 1 had no idea that their core data had been copied by a fictional historian and an angel.

Get out of Demon No. 1 After the 1st, Shi Yuan did not return to Morgana's palace, but took Yan to a deserted place.

After successfully coming out, Yan finally breathed a sigh of relief.

What happened today is called It's not thrilling, but it still gave Yan enough shock.

A core database of the Lord God's supercomputer was stolen easily by Shi Yuan.

Doesn't this mean that the protection programs of databases of other civilizations are, for Shi Yuan, Are they all in name only?

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like