willya@lemmyf.ukcake to Programmer Humor@lemmy.mlEnglish · 2 years agoAccompanied by bad acting and writingthumbsnap.comimagemessage-square5fedilinkarrow-up11.4Karrow-down131
arrow-up11.37Karrow-down1imageAccompanied by bad acting and writingthumbsnap.comwillya@lemmyf.ukcake to Programmer Humor@lemmy.mlEnglish · 2 years agomessage-square5fedilink
minus-squarequicken@aussie.zonelinkfedilinkarrow-up2·2 years agoThe best ones show a port scan. The worst just show scrolling html source code.
minus-squareDeadNinja@lemmy.worldlinkfedilinkarrow-up1·2 years agoThe legendary ones show a “BREACH” at the target systems, in Red Bold Times New Roman font size 150.
minus-squarermuk@feddit.uklinkfedilinkEnglisharrow-up1·2 years agoExtra point if they have the PowerPoint shuttle controls visible in the bottom-left corner.
minus-squarepirrrrrrrr@lemmy.dbzer0.comlinkfedilinkarrow-up1·2 years agoTrinity used NMAP and scanned for real known SSH vulnerabilities when hacking the power station in Matrix Reloaded.
The best ones show a port scan. The worst just show scrolling html source code.
The legendary ones show a “BREACH” at the target systems, in Red Bold Times New Roman font size 150.
Extra point if they have the PowerPoint shuttle controls visible in the bottom-left corner.
Trinity used NMAP and scanned for real known SSH vulnerabilities when hacking the power station in Matrix Reloaded.