Chapter 466: Encountering soldiers and bandits and evading the border
"Alert, it is discovered that a target hostile to the host is approaching! Alert..." Wang Chengzhu's system vision information prompt refreshed a new message, which flashed red and yellow for a few seconds and hung at the bottom of the information display box.
Wang Chengzhu's right hand, which originally swung back and forth with his body when walking, was inserted into the lower pocket of his jacket. He simulated a mouse and checked the new messages that popped up in the system view.
Since the last time he met the unscrupulous Japanese businessman Zhang Ben who broke in to cause trouble in House's foreign company office, Wang Chengzhu asked the system to customize a prompt process. Using path analysis based on space-based scanning, the history
Secondary analysis is performed on moving targets whose path vectors may intersect with the host. For the purpose of controlling computing power, only moving targets within a radius of 2000 meters around the host, namely Wang Chengzhu, and with an infrared temperature [1] between 0°C and 50°C.