phiresky@lemmy.world to Programmer Humor@lemmy.ml · 2 years agoHacking in 1980 vs Hacking in 2024lemmy.worldimagemessage-square114linkfedilinkarrow-up11.53Karrow-down117
arrow-up11.52Karrow-down1imageHacking in 1980 vs Hacking in 2024lemmy.worldphiresky@lemmy.world to Programmer Humor@lemmy.ml · 2 years agomessage-square114linkfedilink
minus-squarejmcs@discuss.tchncs.delinkfedilinkarrow-up14·2 years agoAnd honorable mention to the non-existing Matrix sequel that had an actual SSH vulnerability on screen.
minus-squaremaryjayjay@lemmy.worldlinkfedilinkarrow-up9·2 years agoI think Trinity was using nmap to port scan or ping sweep the subnet, also
And honorable mention to the non-existing Matrix sequel that had an actual SSH vulnerability on screen.
I think Trinity was using nmap to port scan or ping sweep the subnet, also