After he finished speaking, Rednos looked around carefully again. However, the machine that attacked him at the beginning refused to give up. After struggling for a while, it once again sent signals to its companions around it in mechanical language.

Zizi, beep! Click!

Rednos was stunned for a moment. At that moment, a blinding red light flashed from all the machines. With the creaking of machinery, all of them, led by that one machine, suddenly activated self-destruct mode.

His pupils widened slightly, and he quickly dove into the shadows to avoid the range of the mechanical explosion. He emerged from the shadows again, and the machine before him had broken free from the shadows and reassembled into a new individual after self-destruction.

"Oh? You used the self-destruct sequence to break free?" Rednos tilted his head. "Interesting! It seems even with your commands tampered with, you still retain your intelligence. Let's see how many times you can reassemble yourself."

He gathered the elemental power in his palm, then slammed it towards the ground. In an instant, invisible shadows transformed into spikes, emerging from the ground like clusters of suddenly growing black thorns, precisely piercing the joints of the machine.

The spikes did not penetrate the metal shell, but instead bound the machine itself again with its own shadow.

At this time, the leading machine used the same trick again and sent a signal again. With a burst of rapid "beeping" sounds, the red light on the surface of all the machines bound by the shadows suddenly increased at the same time.

boom!

There were more explosions, and when the smoke cleared, the self-destructive machines reassembled and became even larger.

Rednos sneered and bound them with shadows again.

"The machinery of the Abyss is our ingenuity, and the damaged reassembly system is the product of our advanced technology. It appears to be able to continuously reassemble and regenerate, but in reality, after each reassembly, the number is reduced by more than half. And the shadow is your opposite; you can neither escape nor break free. When only one remains, how can you self-destruct?"

As soon as the words fell, the machines activated the self-destruct program again.

"Stubborn." Rednos's eyes darkened. "Of course, I don't expect to reason with a cold machine!"

The shadows were boiling again. As expected, after three consecutive self-explosions and reorganizations, the number of machines was less than a quarter of the original number.

However, just when everyone was feeling that it was about to end, several batches of unmarked brand new machines came from all directions.

"Hey, hey, hey, what the hell is going on? If this goes on, there will be no end to it!" Karen almost collapsed.

On the other hand, Rednos remained unaffected and said nonchalantly, "It doesn't matter how many come."

He folded his arms, but Karen looked at him coldly.

"Hey, be careful if you get into trouble, I won't be able to save you then." She said with her hands on her hips.

……

At this time in the Academy of Sciences, Rex was typing on the keyboard in front of the operating table.

From the beginning till now, he has lost count of how many methods he has tried, but the system's pop-up screen never disappears, and the red warning light flashes madly, as if mocking his futility.

"Damn it!" He pounded his hands on the table. "I've tried everything, why is it not working?"

The mechanical door of the laboratory suddenly opened, and at this moment, Dr. Buddy walked in holding an older computer.

"Because both our system data and the core chips of these machines are uniformly produced by the Abyss, the Fallen Angel Troupe's virus is nothing special. It simply exploits this homology to make all devices treat it as a 'mother program.' Therefore, even a small instruction will cause our main program to automatically block our operation."

He put the computer on the ground, then disassembled the main system's lines, fiddled with them, and connected several of the system's lines to the old computer.

"Then we are helpless?" Rex said anxiously.

"It's not completely hopeless," Buddy said, standing up. "This computer is from the old days of the Abyss. Its chips are completely different from the current system. I've checked, and the data contained within contains all the key information from the old days. The technology we're using now is also refined based on its results. So, even though the configuration is a bit inferior, it's enough to decipher the program and retake the system."

He turned on the computer and then made room for it.

Rex looked at the computer on the ground without hesitation.

He immediately squatted down, his fingertips dancing rapidly across the scratched keyboard. The old computer emitted a mournful humming sound, and the code on the screen scrolled much slower than the main system, but with a stubborn stability.

"Connection started, parsing system data..."

A line of characters popped up on the screen, and as the screen turned blue, the system data appeared normally on the old computer.

"It really works. You are worthy of being Dr. Buddy. Your method is really useful!" He was overjoyed.

At this moment, Budi stood aside and smiled softly. "Don't get excited yet. What's next is the most difficult part. The other party has exploited a vulnerability and controlled the main system, turning the once indestructible firewall into a barrier that hinders us. Only by deciphering all the firewalls and finding the tampered core command nodes can we completely eliminate all hidden dangers."

After hearing this, Rex sighed, "Really? I never thought that one day we would have to crack our own firewall. How ironic."

"Yes, but we can't consider it now. At worst, we can rewrite the firewall later." Buddy shook his head calmly.

Rex nodded, his fingertips returning to the keyboard. With his mastery of the system, he cracked the first firewall in less than three minutes.

However, while he was deciphering the data, the deciphered data was unknowingly displayed on It's computer.

Looking at the data that finally arrived, he smiled triumphantly.

"Is it finally starting? I've been waiting for so long."

He took out a USB flash drive, and as more and more data was deciphered, the data was eventually copied to his storage device.

"Strange, there is no trace of intrusion found in the database, but why..." Rex wondered, because he clearly felt that the so-called "virus" had been leading him by the nose, as if deliberately guiding him to decipher deeper permissions, but for the sake of the overall situation, he could only ignore this feeling and devote himself to the task of deciphering the firewall.

As the fourth and fifth codes were successfully deciphered, beads of sweat began to form on Rex's forehead. Finally, in less than half an hour, all 15 independent core program firewalls were deciphered, and the interference data also appeared on the screen.

"Found it!" Rex's fingertips suddenly accelerated, and in just a moment, he eliminated the "culprit".

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like