Since the hacker setting in "Cyberpunk 2077" is too complex and too cumbersome to include in the plot, it is better to list it separately.
Of course, readers who have played the game probably don’t need to read it, and readers who have read the related works probably don’t need to read it either.
The following content is divided into noun explanations and remaining settings. If you want to save time, just read the noun explanations.
Of course, the following may not be comprehensive, and there will definitely be some omissions. If necessary in the future, the author will make up for it, and it will also be posted to relevant websites in the future. (Sigh, if only these things could be treated as daily updates.)
First is the explanation of terms.
RAM: Temporary data storage medium (main memory), which is the same as the wizard's spell slot and blue bar. The amount of RAM generally depends on the [network access warehouse] used by network hackers and their intelligence.
[ICE]: Network firewall in the cyber world
[Quick Crack]: A hacker's attack method, an instant hacking method, which can be regarded as an instant spellcasting by a mage.
[Invasion Protocol]: The strategies and methods of hacking are different for every hacker. Just like the problem-solving ideas during exams, the more skillful the hacker, the stronger the intrusion protocol will be.
[Magic Doll]: Just think of it as a network virus, but it is much stronger than a network virus. To hackers, this is a spell.
[Quick Crack Component]: A very tiny chip that can be installed into the network access warehouse. It is a [golem] attack method coded and produced in advance by hackers using the network access warehouse.
They are generally super-large monsters that require consuming RAM to be released. They have significant effects and can directly affect the human body.
It can be simply regarded as a skill in the skill bar in the game. You must drag the skill to the skill bar before you can press it with the shortcut key (equivalent to putting the component into the network access bin) to cast this spell (golem).
[Network Access Warehouse]: An indispensable equipment for becoming a network hacker. It allows network hackers (network runners) to access the huge network data flow at any time.
It can be regarded as the mage's wand, but for hackers, the network access warehouse is more important than the mage's wand. Without it, quick cracking is impossible.
Among them, network access warehouses with different technical specifications can load different numbers of quick cracking components.
The network access bay is also similar to a graphics card. It is a weapon in the hands of network hackers. Using a higher model access bay is like holding a sniper rifle, but you are holding a small dagger to snipe at someone's door. Of course it’s hard to compare.
Of course, if you have high intelligence and can have an intelligence of 20 like Butmos, then it is not impossible to use a low-end network access warehouse. You can cut your butt with a knife and kill the enemy to death.
Remaining settings:
1. Facing different enemies, due to the different ICE protection capabilities of the processor in the opponent's brain, the RAM consumed by the hacker is different.
2. The hacker’s own ability will make the upload speed different.
3. If you are a trustworthy person such as a teammate, if they give you authorization, it will be equivalent to someone letting you play with the computer as much as you want. You can ignore any of the above restrictions in the hacking process and do whatever you want, such as in anime. Qiwei uses [System Reset] on Rebecca
4.Type of golem:
Similar to [Electromagnetic Short Circuit:], [System Reset], [Prosthetic Body Failure] and other magic dolls that act on the human body, they are collectively referred to as super large dolls. This type of magic doll is large and complex, and almost no network hacker can Made up on the spot during battle, so [Quick Hack Component] is needed
5. When a hacker invades, it is just like a virus invading your computer. It is done secretly. Of course, the possibility of being discovered by the enemy does not rule out (in the game, there will be a prompt when V is hacked by the enemy, but in the plot, the Voodoo Gang When the "Light Chaser" golem was implanted, V didn't notice it at all)
6. I haven’t thought about it yet. I will add more if possible in the future.
Here's what a hacker does when attacking an enemy.
First of all, hackers generally have two options when hacking an enemy.
First, first break through the current local area network ICE. After that, all machines and equipment connected to the local area network, human brain processors (brain computers), protection systems, etc. will be affected to a certain extent.
As for what this impact is, it depends on what devils and methods the hackers have.
Afterwards, due to breaking through the LAN ICE in advance, network hackers will inevitably gain certain gains. After that, hacking will be much easier, and the subsequent operations will be the same as [Part 2].
Secondly, if you are brave and skilled, or if there is no local area network in the current area, then there is no other way. You can only hack directly without any "foreplay".
The intrusion methods of network hackers are divided into physical and remote.
Physical intrusion is integrated into the network through data lines. Ordinary small-scale data transmission can use personal cables, but if it is an act that requires huge data stream transmission into cyberspace, it requires neural intubation in the back of the head, which is a hacker. With the assistance of equipment such as chairs, hacker chairs can improve brain computing capabilities
Remote access:
The first function is to remotely access other people's brain processors, forcibly generate a data link in cyberspace to connect the two parties, and use data transmission to quickly crack. Because it is a single data link, the traffic it can transmit is limited, and it cannot be connected to other devices. It needs to be connected to each target, and the methods that can be used are limited. Only some simple instructions can be used, such as quick cracking and implanting magic dolls.