this post was submitted on 17 Jan 2024
927 points (98.0% liked)

Programmer Humor

22322 readers
3075 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
all 45 comments
sorted by: hot top controversial new old
[–] [email protected] 66 points 1 year ago* (last edited 1 year ago) (3 children)

THIS ACTION IS NOT ALLOWED

> OVERRIDE

ACCESS GRANTED

[–] [email protected] 34 points 1 year ago* (last edited 1 year ago) (1 children)

No, no, first you need to reroute, to be able to patch it through, and THEN you can override the command sequence in order to exploit parallelisms at the core root interface.

[–] [email protected] 6 points 1 year ago (2 children)
[–] [email protected] 6 points 1 year ago

IDE, Sata, NVMe HDD, with an adequate PSU for the GPU. Stat!

[–] [email protected] 23 points 1 year ago (2 children)

Be sure to wear a hoodie in a dark room so that you can hack faster.

[–] [email protected] 9 points 1 year ago* (last edited 1 year ago) (2 children)

Don't forget the green font.

[–] [email protected] 6 points 1 year ago

With blue lettering projected onto your face, even though it doesn't match what is on the monitor in front of you.

[–] [email protected] 5 points 1 year ago (1 children)

and it has to scroll so fast that nobody can read it.

[–] [email protected] 3 points 1 year ago

But, make sure that if you pause it, it's part of the Linux kernel source -- the most hacker-seeming stuff out there.

[–] [email protected] 22 points 1 year ago (1 children)

sudo apt-get update

*im in!

[–] [email protected] 33 points 1 year ago (3 children)
[–] [email protected] 8 points 1 year ago* (last edited 1 year ago) (2 children)

-Esc twice

-:wq

-:q!

-kill the process

-fuck it pull the plug

-put a bomb in the power station that powers your house

-have a cosmic ray randomly bitflip vim's internal logic making it quit

[–] [email protected] 2 points 1 year ago

-Good ol' C-x M-c M-butterfly

[–] [email protected] 2 points 1 year ago

Our most formidable defense is aliasing ls into vim! No one is getting out of that!

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

journalctl

I'm in!

[–] [email protected] 20 points 1 year ago (2 children)

Maybe we took it out of context, maybe they mean that they are logged into their own computer 😂

[–] [email protected] 7 points 1 year ago* (last edited 1 year ago) (1 children)

No didnt you see the black and green text and a big acess granted display they hacked everyone even people without computers.

[–] [email protected] 3 points 1 year ago

I'm the guy who designs those. They pay me the big bucks to make sure a hacker feels at home when violating our Gibson, after all. We're one big family here.

[–] [email protected] 3 points 1 year ago

Look, it's got full disk encryption and I'm very forgetful.

[–] [email protected] 17 points 1 year ago (1 children)

FWIW, Little known fact: Matrix 2 used real vuln (SSH CRC32) for trinity power grid hacking scene.

Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln...

[–] [email protected] 1 points 1 year ago

Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln...

Source? After some googling, I can only find that this is a 0day in the matrix universe, but not in the real world at the time the scene was made (matrix reloaded is a 2003 movie, vuln was discovered and patched around 2001.)

https://www.reddit.com/r/hacking/comments/3dx72y/actual_crc32_exploit_used_in_matrix_reloaded/

https://insecure.org/stf/neiljk.html

https://www.exploit-db.com/exploits/20617

[–] [email protected] 12 points 1 year ago (1 children)

One of the reasons I love WarGames is that it shows the hacker character actually doing his homework to figure out the correct credentials to get into the system.

[–] [email protected] 6 points 1 year ago (2 children)

Sneakers is really good about this too. The majority of the movie shows them doing real world research and social engineering.

[–] [email protected] 2 points 1 year ago (1 children)

Yup. The fakest thing in that movie is the MacGuffin that can z break RSA encryption.

...Also maybe a bunch of hackers stealing a ton of govt funds, donating it to greenpeace and the NSA not immediately busting heads.

[–] [email protected] 2 points 1 year ago

Hey man, the dude just wanted a Winnebago. Is that really too much to ask for handing such power over to the government?

[–] [email protected] 1 points 1 year ago

Yeah, the "magic device" they discover that makes encryption obsolete is unrealistic, as is the way it "decrypts" what shows up on their screens. But, the rest of it is really realistic, down to probing individual leads of a chip to see what kinds of signals they emit.

[–] [email protected] 11 points 1 year ago (1 children)
[–] [email protected] 4 points 1 year ago (2 children)

For how much fun NCIS was to watch it also was such a groan whenever the "code" sequences came up

[–] [email protected] 2 points 1 year ago

Need to look busy at work? Ping -i.2 will repeatedly ping your own router. Tell your boss it’s running a diagnostic or something.

[–] [email protected] 1 points 1 year ago

One man's Linux is another man's OS/2!

[–] [email protected] 10 points 1 year ago

~~Hackers~~ Porn-Actors

[–] [email protected] 4 points 1 year ago

me when i connect to an ssh server

[–] [email protected] 3 points 1 year ago

What about DJ Qualls in "The Core"?

While being interrogated in his introduction sequence, he casually folds an aluminum chewing gum wrapper, puts it to his lips and kinda whistles with it for a second, while holding a cell phone in front of his mouth. After this little public display of phreaking, he hands the cell phone over to the hero and says "Here... now you can call anywhere free for life with it".

[–] [email protected] 2 points 1 year ago

except lex. she took forever to get in and reactivate the door locks.