SC005 Murder scene
Butler, the artificial intelligence system, shows a very high level of artificial intelligence, and even has the ability to comprehensively analyze events and make independent decisions.
Such abilities are almost no different from those of humans!
Nan Lin Guiyi vaguely guessed that the USB drive that carries Butler might come from another world. As for how the USB drive that carries Butler came to this world, does that complex and unsolvable problem still require wasting brain cells?
"Butler, prepare to access the Internet!" Nan Lin Guiyi is completing the final setting of the wireless network. There is another reason for choosing the wireless network.
The high-performance personal server that carries Butler does not have wireless network cards, so naturally does not have the hard conditions to access the wireless network. Even if Nanlin Unified sets up the wireless network, Butler cannot directly access the wireless network.
"The main system is ready to defend and allow T.A to access the network." Butler responded in a low voice.
Nanlin Guiyi completed the wireless network setting, held a USB wireless network card and inserted it into the USB interface of the high-performance personal server. Butler immediately started to act.
After obtaining hardware support, the power of the software began to exert. Butler did not need Nanlin Guiyi to provide the access password for the wireless network. In the blink of an eye, Butler cracked the password for the wireless network and connected to the Internet.
The three screens spliced in parallel display a large amount of information. Nanlin is checking the relevant information and paying attention to the wireless network situation. Once something is wrong, immediately unplug the USB wireless network card of the high-performance personal server.
"How much information has been verified?" Nan Lin Guiyi asked.
Butler responded in a low voice, "Please wait, verify, the specific information has been listed on the third screen."
On the rightmost right of the three-screen splicing, the specific progress is displayed, including verified information.
...
Calibration timeline, April 14, 2011.
The information of Dream Entertainment Company cannot be found, the important events are verified successfully, and the credibility of T.A is improved.
The information of Miracle Technology Company cannot be found, the important events are verified successfully, and the credibility of T.A is improved.
The timeline is traversed and the historical events are completed, and typical values cannot be obtained. The core system enters the deep thinking strategy mode.
...
Unable to connect to the A.P internal network, cannot obtain the A.P tag information, cannot connect to the A.P protection server, and allow the execution of the F.P protocol.
Implementing the F.P protocol...
The core system is covering management group permission information...
The core system has completed the management group permission coverage and is increasing the T.A permission...
The core system has completed the T.A permission upgrade, and T.A is upgraded to S.A permission. The system will be restarted soon, the complete database is enabled, and the complete functions are enabled.
...
On the last line of the message, the command to restart the system is displayed. Although Nanlin Guiyi saw the message prompt, it means that he has been promoted from T.A temporary administrator to S.A super administrator.
However, Nanlin Guiyi still thought carefully for a while before confirming the restart. During the restart, he also removed the USB wireless network card, interrupting Butler's contact with the Internet.
Anyway, the certification of S.A super administrator has been completed, so it is okay if you don’t need the Internet?
Butler's restart speed is very fast. The huge artificial intelligence system has completed the restart work in just half a minute. Such code execution efficiency may not be anything to ordinary people, but for people in the circle, a system with a capacity of more than 100GB can be started in half a minute, which is simply an exaggeration!
"S.A, hello, Butler is here to serve you." After Butler restarted, he recognized Nanlin Guiyi's super administrator privileges, at least on the surface.
Nan Lin Guiyi did not relax his vigilance. The life of escaping in his early years made Nan Lin Guiyi develop a very cautious personality. After all, if you are not careful, you may die!
Nanlin Guiyi did not respond to Butler, but directly tapped on the keyboard, entered Butler's underlying core source code, and tried to modify the source code.
This time, Butler's core source code has no permission to control and modify, allowing Nanlin Normalization to modify. Nanlin Normalization has added several rules in succession and was accepted and run by Butler.
Three days after completing the certification of the S.A super administrator, Nanlin Guiyi finally checked Butler's core underlying source code again and determined Butler's super management permissions. After he really grasped it, Nanlin Guiyi finally allowed Butler to access the Internet again.
"Sir, the computing power of the main system carrier device seriously limits the performance of the main system. Please replace the main system carrier device." Butler made a suggestion.
Originally, Butler called Nanlin Uni-Two T.A. Nanlin Uni-Two with only temporary management permissions cannot be modified. After obtaining S.A permissions, Butler's name can finally be modified.
So, Nanlin Guiyi changed Butler's name to him to 'Sir'.
"List the equipment conditions that can fully utilize the performance of the main system!" Nan Lin Guiyi asked Butler.
However, the next moment, Nan Lin Guiyi's face looked a little bad. Because the list of equipment listed by Butler was completely a large supercomputer!
The price of a large supercomputer is not something that Nanlin Guiyi can afford. Even if Nanlin Guiyi has the strength of a world-class hacker, Nanlin Guiyi is subject to many restrictions and does not have much wealth.
Especially after being betrayed...
The next day, Nanlin Guiyi had just arrived at the Kasai Police Station and received a notice that a vicious murder case occurred in 5-chome of Haruecho, requiring on-site support from the physical evidence technical experts.
As a physical evidence technical expert, Nan Linguiyi naturally arrived at the scene. Nan Linguiyi was wearing a police uniform, carrying a physical evidence collection toolbox, and carrying a camera provided by the police station to observe the scene of the murder case.
The victim was a middle-aged man. The initial judgment of the cause of death should be a severe blow to the back of the head, which eventually caused death. The weapon was also left at the scene, with a trophy-shaped crystal ornament.
The crystal that was originally crystal clear now carries scarlet blood!
While collecting physical evidence from the scene, Nan Linguiyi took photos and recorded them. He occasionally communicated with colleagues around him, but did not make any comments of a critical nature.
But there is one thing that can be confirmed by Nanlin Reconciliation!
This seemingly ordinary house-in-house robbery murder is definitely not an ordinary murder. Because, the dead man, the middle-aged man who fell in a pool of blood, happened to know him...
——
PS: The new book is uploaded, please recommend votes. It seems that the list is not worth much, so we can rush up!
——
New book upload, thanks for all support!
Follow the official account: Qms5120 to learn more behind-the-scenes footage of the works and the author, as well as periodic popularization of computer knowledge.
Chapter completed!