Civilloquy
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Sjmarf@sh.itjust.works to Programmer Humor@programming.dev · 1 year ago

Every goddamn time

sh.itjust.works

message-square
28
fedilink
779

Every goddamn time

sh.itjust.works

Sjmarf@sh.itjust.works to Programmer Humor@programming.dev · 1 year ago
message-square
28
fedilink
alert-triangle
You must log in or register to comment.
  • myster0n@feddit.nl
    link
    fedilink
    arrow-up
    51
    ·
    edit-2
    1 year ago

    THIS ACTION IS NOT ALLOWED

    > OVERRIDE

    ACCESS GRANTED

    • rtxn@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      ·
      edit-2
      1 year ago

      No, no, first you need to reroute, to be able to patch it through, and THEN you can override the command sequence in order to exploit parallelisms at the core root interface.

    • Alawami@lemmy.ml
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      1 year ago

      deleted by creator

  • LoremIpsumGenerator@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    ·
    1 year ago

    sudo apt-get update

    *im in!

    • deaf_fish@lemm.ee
      link
      fedilink
      arrow-up
      28
      arrow-down
      1
      ·
      1 year ago

      vim

      How do I get out?!

      • Sneezycat@sopuli.xyz
        link
        fedilink
        arrow-up
        8
        ·
        edit-2
        1 year ago

        -Esc twice

        -:wq

        -:q!

        -kill the process

        -fuck it pull the plug

        -put a bomb in the power station that powers your house

        -have a cosmic ray randomly bitflip vim’s internal logic making it quit

        • bluemellophone@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          ZZ

      • WindowsEnjoyer@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        1 year ago

        journalctl

        I’m in!

  • snrkl@lemmy.sdf.org
    link
    fedilink
    arrow-up
    15
    ·
    1 year ago

    FWIW, Little known fact: Matrix 2 used real vuln (SSH CRC32) for trinity power grid hacking scene.

    Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln…

    • moonpiedumplings@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln…

      Source? After some googling, I can only find that this is a 0day in the matrix universe, but not in the real world at the time the scene was made (matrix reloaded is a 2003 movie, vuln was discovered and patched around 2001.)

      https://www.reddit.com/r/hacking/comments/3dx72y/actual_crc32_exploit_used_in_matrix_reloaded/

      https://insecure.org/stf/neiljk.html

      https://www.exploit-db.com/exploits/20617

  • M500@lemmy.ml
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 year ago

    Maybe we took it out of context, maybe they mean that they are logged into their own computer 😂

    • ANON@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      1 year ago

      Removed by mod

      • funkless_eck@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        I’m the guy who designs those. They pay me the big bucks to make sure a hacker feels at home when violating our Gibson, after all. We’re one big family here.

  • Kecessa@sh.itjust.works
    link
    fedilink
    arrow-up
    12
    ·
    1 year ago

    At least in Mr Robot they talk about real stuff

    • merc@sh.itjust.works
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      1 year ago

      Mr. Robot was the best depiction of hacking I can think of. It was fairly realistic while being entertaining too. It shows that anybody who actually wanted to be realistic in a hacking movie could do it, they just choose not to.

      • pearsaltchocolatebar@discuss.online
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        That’s because actual hacking is actually pretty boring, from an external viewpoint at least.

  • Flying Squid@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    1 year ago

    • Classy@sh.itjust.works
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      For how much fun NCIS was to watch it also was such a groan whenever the “code” sequences came up

      • Mongostein@lemmy.ca
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Need to look busy at work? Ping -i.2 <your IP address> will repeatedly ping your own router. Tell your boss it’s running a diagnostic or something.

      • Captain Aggravated@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        One man’s Linux is another man’s OS/2!

  • Samsy@lemmy.ml
    link
    fedilink
    arrow-up
    7
    ·
    1 year ago

    Hackers Porn-Actors

  • grue@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 year ago

    One of the reasons I love WarGames is that it shows the hacker character actually doing his homework to figure out the correct credentials to get into the system.

    • Anticorp@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      1 year ago

      Sneakers is really good about this too. The majority of the movie shows them doing real world research and social engineering.

      • swordsmanluke@programming.dev
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Yup. The fakest thing in that movie is the MacGuffin that can z break RSA encryption.

        …Also maybe a bunch of hackers stealing a ton of govt funds, donating it to greenpeace and the NSA not immediately busting heads.

        • Anticorp@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          Hey man, the dude just wanted a Winnebago. Is that really too much to ask for handing such power over to the government?

      • merc@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        1 year ago

        Yeah, the “magic device” they discover that makes encryption obsolete is unrealistic, as is the way it “decrypts” what shows up on their screens. But, the rest of it is really realistic, down to probing individual leads of a chip to see what kinds of signals they emit.

  • KSP Atlas@sopuli.xyz
    link
    fedilink
    arrow-up
    4
    ·
    1 year ago

    me when i connect to an ssh server

  • Zuberi 👀@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    9 months ago

    deleted by creator

  • sunbeam60@lemmy.one
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    The main reason I never got into Slow Horses was its utterly ridiculous stereotype of the “computer boffin”. It was so cack-handed it was almost hard to believe.

  • niktemadur@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    What about DJ Qualls in “The Core”?

    While being interrogated in his introduction sequence, he casually folds an aluminum chewing gum wrapper, puts it to his lips and kinda whistles with it for a second, while holding a cell phone in front of his mouth. After this little public display of phreaking, he hands the cell phone over to the hero and says “Here… now you can call anywhere free for life with it”.

  • CCF_100@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    https://github.com/dustinkirkland/hollywood

Programmer Humor@programming.dev

programmer_humor@programming.dev

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !programmer_humor@programming.dev

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

  • Keep content in english
  • No advertisements
  • Posts must be related to programming or programmer topics
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 40 users / day
  • 2.69K users / week
  • 7.28K users / month
  • 16.4K users / 6 months
  • 1 local subscriber
  • 24.7K subscribers
  • 1.36K Posts
  • 33.1K Comments
  • Modlog
  • mods:
  • Feyter@programming.dev
  • adr1an@programming.dev
  • BurningTurtle@programming.dev
  • Pierre-Yves Lapersonne@programming.dev
  • BE: 0.19.5
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org