|
Their monitors are always see-through glass!
|
|
|
|
|
Movie : The programming interface show a 3D plans of the code that move and flow geographically on a map.
Reality : VIM and Notepad
(Source : last james bond, don't remember the name)
By the way, the most popular hacking done by guessing password is not so far from reality.
|
|
|
|
|
|
ALL THE FREAKING ABOVE!!!!
|
|
|
|
|
This list needed a "All of the above" button.
|
|
|
|
|
Their Code Always Runs On Very First Attempt (without Compilation warning or error)....
Pratik Bhuva
---------------
The night is darkest just before the dawn. And I promise you, the dawn is coming
|
|
|
|
|
So does mine...you mean yours doesn't?
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
I am afraid I cannot let you do that Dave !!!
Zen and the art of software maintenance : rm -rf *
Math is like love : a simple idea but it can get complicated.
|
|
|
|
|
Once worked for a company whose tv advert showed an "expert" typing commands into a 'dos box'...it was obvious that the "bad command or filename" was the only message returned. They just didn't get that it was the wrong image to portray
|
|
|
|
|
As per the title.
What do you get when you cross a joke with a rhetorical question?
|
|
|
|
|
Surely the best quote in any film has to be “I know this, it’s Unix”, as young 14 year old girl hacked her way into the systems managing Jurassic Park.
If at first you don't succeed, destroy all evidence that you tried.
Andy
|
|
|
|
|
... and it looked *nothing* like any Unix system I've ever seen or imagined
|
|
|
|
|
When beautiful woman have time to do makeup or go to fitness between hacking Chinese military? Don't know? Maybe they do not sleep? Or learn by osmosis?
No more Mister Nice Guy... >: |
|
|
|
|
|
Remember Bullock Angela Bennett
|
|
|
|
|
|
In my country we have this saying:
"Exception confirms principle".
Good for that she likes to program besides modeling.
But going to work you can be sure that most, if not all of IT staff, are men.
No more Mister Nice Guy... >: |
|
|
|
|
|
it takes 3 seconds to output h e l l o w o r l d
|
|
|
|
|
|
That was cool!
What was cooler was the hydra cubes when building the worm and deploying it. Or the instant map that shows the money jumping with curved lines that plot the path.
I just remember the bash commands flickering across the screen during the first interview hack.
I think the only real thing was that tape drive at the university.
|
|
|
|
|
I think only use for "tapes" are (1) Backup and (2) Sentimental reasons?!
|
|
|
|
|
I feel disgusted when they show a powerpoint slide with a large progress bar and text when the hacker transfers all the 100 millions dollars to his account.
|
|
|
|
|
Myth
Login prompts give you unlimited attempts.
Passwords can be hacked in minutes without hashtables or dictionary attacks.
Truth
The password is far too often the user's child's name, childhood pet, "password", or "secret".
You can actually launch nukes with the password 00000000[^] (sort of).
|
|
|
|
|
Hacker dudes can impress the chicks by hacking the (bowling alley|cathedral bells|lights|power system|sprinklers|sun).
|
|
|
|
|
|
No.
I observed some whose saying aloud every line of code they write. Heck! Even the ';'! I think that's some kind of a ridiculous behavior.
Or maybe, I'm not just that geeky like those people I observed.
Don't mind those people who say you're not HOT. At least you know you're COOL.
I'm not afraid of falling, I'm afraid of the sudden stop at the end of the fall! - Richard Andrew x64
|
|
|
|