phiresky to Programmer Humor@lemmy.ml • 9 months agoHacking in 1980 vs Hacking in 2024lemmy.worldimagemessage-square115fedilinkarrow-up11.53Karrow-down117
arrow-up11.52Karrow-down1imageHacking in 1980 vs Hacking in 2024lemmy.worldphiresky to Programmer Humor@lemmy.ml • 9 months agomessage-square115fedilink
minus-square@jmcs@discuss.tchncs.delinkfedilink14•9 months agoAnd honorable mention to the non-existing Matrix sequel that had an actual SSH vulnerability on screen.
minus-square@maryjayjay@lemmy.worldlinkfedilink9•9 months agoI think Trinity was using nmap to port scan or ping sweep the subnet, also
And honorable mention to the non-existing Matrix sequel that had an actual SSH vulnerability on screen.
I think Trinity was using nmap to port scan or ping sweep the subnet, also