Cyberspace is unlike reality; there aren't as many tactical commands and considerations, just simple strategies. Players just need to charge in recklessly.
If they recklessly kill the BOSS, that's it; if not, they can come back for another round.
A few hacker players teamed up to find a data vulnerability. After forcibly widening it, hundreds of players swarmed in and immediately deployed temporary solidification programs.
Without data support from a backend server room and no direct connection to the opponent's server, the computing power of a dozen hacker players could only cover a small area, barely encompassing this database.
Once someone invaded, the wandering programs inside the database immediately reacted, but they inevitably fell under the influence of the solidification program and gained physical forms.
Typical program images are very regular, usually reflecting the company's or programmers' logos or mimetic shapes.
