willya@lemmyf.uk to Programmer Humor@lemmy.mlEnglish · 2 年前Accompanied by bad acting and writingthumbsnap.comimagemessage-square32linkfedilinkarrow-up144arrow-down12
arrow-up142arrow-down1imageAccompanied by bad acting and writingthumbsnap.comwillya@lemmyf.uk to Programmer Humor@lemmy.mlEnglish · 2 年前message-square32linkfedilink
minus-squarequicken@aussie.zonelinkfedilinkarrow-up7·2 年前The best ones show a port scan. The worst just show scrolling html source code.
minus-squarepirrrrrrrr@lemmy.dbzer0.comlinkfedilinkarrow-up2·2 年前Trinity used NMAP and scanned for real known SSH vulnerabilities when hacking the power station in Matrix Reloaded.
minus-squareDeadNinja@lemmy.worldlinkfedilinkarrow-up1·2 年前The legendary ones show a “BREACH” at the target systems, in Red Bold Times New Roman font size 150.
minus-squarermuk@feddit.uklinkfedilinkEnglisharrow-up1·2 年前Extra point if they have the PowerPoint shuttle controls visible in the bottom-left corner.
The best ones show a port scan. The worst just show scrolling html source code.
Trinity used NMAP and scanned for real known SSH vulnerabilities when hacking the power station in Matrix Reloaded.
The legendary ones show a “BREACH” at the target systems, in Red Bold Times New Roman font size 150.
Extra point if they have the PowerPoint shuttle controls visible in the bottom-left corner.