1366
top 50 comments
sorted by: hot top controversial new old
[-] quicken@aussie.zone 114 points 1 year ago

The best ones show a port scan. The worst just show scrolling html source code.

[-] pirrrrrrrr@lemmy.dbzer0.com 85 points 1 year ago

Trinity used NMAP and scanned for real known SSH vulnerabilities when hacking the power station in Matrix Reloaded.

[-] DeadNinja@lemmy.world 71 points 1 year ago

The legendary ones show a "BREACH" at the target systems, in Red Bold Times New Roman font size 150.

[-] rmuk@feddit.uk 39 points 1 year ago

Extra point if they have the PowerPoint shuttle controls visible in the bottom-left corner.

[-] aksdb@feddit.de 24 points 1 year ago

A serif font on a computer display?! Appalling! Sacrilegious!

[-] WeirdGoesPro@lemmy.dbzer0.com 15 points 1 year ago

The Dark Side of the Force is a pathway to many abilities some consider to be…unnatural.

load more comments (1 replies)
[-] rcbrk@lemmy.ml 10 points 1 year ago
load more comments (2 replies)
[-] flauschke@kbin.flauschke.de 85 points 1 year ago* (last edited 1 year ago)

Go watch Mr Robot, it's great and does not do this

[-] willya@lemmyf.uk 16 points 1 year ago

Been meaning to!

[-] HughJanus@lemmy.ml 12 points 1 year ago* (last edited 1 year ago)

I am not a programmer by any means but I know enough to know they did their research.

Except Tyrell called it "nome" instead of "g'nome" and I'm pretty sure TOR exit nodes can only see unencrypted data and the entry node can only see who sent it.

load more comments (8 replies)
load more comments (2 replies)
[-] Poggervania@kbin.social 78 points 1 year ago
[-] Treczoks@kbin.social 40 points 1 year ago

I remember a scene of such a crime movie that was at least funny for people used to computers and progrmmers.

The (old and seasoned) detectives were brought in contact with the new "cyber unit" of the police. Stored away in an otherwise empty office floor somewhere, they were the absolute movie style hackers: cluttered desks, sloppy outfit, beards. The old detectives were quite reluctant to work with those young "computer people" and had a lot of prejudices. Then, one of the detectives found a big red button on the desk and said "I wonder what happens when I press this button" - and presses it. And the "cyber guys": "DON'T!". The detective mocks them, and presses the button several times before he asks what the button actually does. Cyber guy: "That is our 'order pizza' button! I hope you've got enough money to pay for this...". Cut. Next scene: They are all eating pizza together from a desk-high stack of pizza boxes.

[-] kaput@jlai.lu 12 points 1 year ago

I was looking for a new project. pizza button would be neat.

load more comments (2 replies)
[-] ram@bookwormstory.social 30 points 1 year ago* (last edited 1 year ago)

You know, I've seen this dozens of times but I'm just realizing, at least assuming that's not a power bar (which would be odd since it matches the plug of the monitor or PC), since the monitor shut of straight away, he actually only unplugged the monitor. The PC should still be on and getting hacked.

[-] Spzi@lemm.ee 17 points 1 year ago

Yes, my favorite comment:

pulls out the power cord for the monitor

Job done!

followed by:

Attacker must have had 5 people on the keyboard.

load more comments (1 replies)
load more comments (5 replies)
[-] Tavarin@lemmy.ca 67 points 1 year ago

If it's even that. Most of the time it's non-nonsensical gibberish.

[-] dandroid@dandroid.app 43 points 1 year ago

I was watching a show recently where someone was writing code, and it was actually C++ code. I actually did the exact pose in the meme.

Of course, he was writing it inhumanly fast, and he always seemed to be writing the start of a new file. But I liked that it was actually code and not just The Matrix-style jibberish

[-] Tavarin@lemmy.ca 24 points 1 year ago

When I made a short film about an AI I was writing C# into visual studio as my coding. It was actual video game code that was for something like AI pathfinding or something, so I tried to make it somewhat accurate.

Not sure why movies can't spend a grand on a programing consultant to actually write them some hacking-ish code for the scenes.

[-] dandroid@dandroid.app 41 points 1 year ago

My guess is that they just don't care to spend the time on it when the majority of people wouldn't even notice. But of course those of us that would notice would really appreciate it.

As a guitar player, it equally irritates me when the person "playing" the guitar has clearly never touched a guitar in their life. Similarly, when an actor is actually playing it, I really appreciate it.

Off topic, but I once walked in while my wife was watching some anime where the guitars were all extremely accurate, like down to what tuning pegs they would have had for the era the guitars were from. They must have motion captured all of the guitar playing from when they recorded the music, or at least took video of their hands, because they animated it perfectly. Down to the tapping parts and everything. It was jaw dropping. I made her start the whole show over from episode one so I could watch it.

load more comments (2 replies)
[-] ribboo@lemm.ee 14 points 1 year ago

The show Mr. Robot did that, they used real 0-day exploits for their hacking scenes!

load more comments (1 replies)
load more comments (1 replies)
[-] synae 24 points 1 year ago

Sounds like hackertyper.net

[-] dandroid@dandroid.app 14 points 1 year ago

That's likely exactly what it was.

load more comments (1 replies)
[-] SGG@lemmy.world 59 points 1 year ago

sudo apt-get install hackerman

[-] Y2K38@lemmy.one 21 points 1 year ago

You actually don't need the -get anymore

[-] Illecors@lemmy.cafe 14 points 1 year ago

It's recommended for script usage

[-] Colour_me_triggered@lemm.ee 26 points 1 year ago

What if jumping off a bridge was recommended for script usage?

[-] ram@bookwormstory.social 27 points 1 year ago

Don't test me, I'll do it.

load more comments (1 replies)

Easy, export BRIDGE_BEHAVIOR=legacy and pretend nothing changed until everything one day breaks horribly in production.

load more comments (2 replies)
[-] jetsetdorito@lemm.ee 52 points 1 year ago

sees them using Assembly

okay this probably doesn't make sense but I'm too lazy to prove it

load more comments (2 replies)
[-] Azzk1kr@feddit.nl 50 points 1 year ago

Don't forget the ridiculous amount of beeping and other sounds when characters fly over the screen at twice the speed of light!

[-] cake@lemmings.world 48 points 1 year ago

He is building Firefox from source, don't worry

[-] MargotRobbie@lemm.ee 34 points 1 year ago

As an actress, that's nonsense, if hacking scenes in movies are fake, then how do you explain this documentary I watched where this hacker man hacked a kung fu fighting cop back in time to kill Hitler (and David Hasselhoff was there for some reason, too)?

load more comments (10 replies)
[-] kratoz29@lemm.ee 24 points 1 year ago

Do we have a "itsaunixsystem" community here?

[-] Inductor@feddit.de 15 points 1 year ago

Yes, but it looks like it's been inactive for a while:

!itsaunixsystem@lemmy.federated.club

[-] Isoprenoid@programming.dev 23 points 1 year ago

Wait, you guys don't update your system and install random packages before going on a hacking spree?

What have I been doing all this time?

[-] Bobble9211@sh.itjust.works 22 points 1 year ago
load more comments (2 replies)
[-] Treczoks@kbin.social 22 points 1 year ago

Running "top" is also some common thing.

So, when I got a bunch of free serial WYSE terminals ages ago, I propped them up on the shelf, daisy-chained them, wrote a wrapper to be able to address all four screens through one UART, and had them display (and regularly update) system stats. Just because.

[-] Raze157@kbin.social 20 points 1 year ago

I recently started rewatching Gundam Wing, and one of the computer screens with fast scrolling text was just scrolling through the Readme of either old Adobe Software or old Printer software (I don't remember which).

load more comments (1 replies)
[-] Sabre363@sh.itjust.works 17 points 1 year ago

The only hacking that ever felt plausible to me was in Mr. Robot.

load more comments (2 replies)
[-] someguy3@lemmy.world 16 points 1 year ago
[-] backhdlp@lemmy.blahaj.zone 15 points 1 year ago

It's almost always just htop and/or hackertyper and/or the fancy matrix effect

load more comments (1 replies)
[-] Colour_me_triggered@lemm.ee 15 points 1 year ago

Try being a medical biologist watching outbreak/pandemic films. It's fucking painful to watch.

load more comments (2 replies)
[-] spark947@lemm.ee 15 points 1 year ago

I thought the bash history in tron: legacy was kind of clever. There was stuff like vi last_will_and_testament.txt before the computer ducking command. I remember being surprised some prop designer knew enough about computers to set up that easter egg. Although I think I was reading that they contracted out the design of the OS to some team or something.

[-] CumBroth@discuss.tchncs.de 14 points 1 year ago
load more comments (1 replies)
[-] Draconic_NEO 14 points 1 year ago

Funnily enough I have to hide terminal windows when updating while I'm around any of my less tech savy friends who think it's scary or creepy. I really dislike them portraying this as "hacking".

[-] kamen@lemmy.world 11 points 1 year ago

I think that most of the time even if they know what it would look like in the real world, movie creators intentionally make it look silly - I guess mostly for the entertainment value, or as kind of a joke in the lines of "let's see how absurd we can make it before your grandma notices something's not right".

load more comments (2 replies)
[-] elxeno@lemm.ee 10 points 1 year ago
load more comments (1 replies)
load more comments
view more: next ›
this post was submitted on 28 Sep 2023
1366 points (97.8% liked)

Programmer Humor

32706 readers
647 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS