On the German sunday news, they recently showed htop at 10:30
I remember watching Mr. Robot and then learning they actually brought in a good consultant. Probably the first time I felt things seemed legit’ish.
People talked about the steps that Trinity takes to take down the energy grid in the Matrix (3?) is pretty legit as well.
Have you guys seen Jurassic Park? It ran on UNIX!
kinda /s. I mean, it took somebody young and feminine to fix what the old white guy fucked up right? (I’m an old white guy fwiw, but MY system fuckups are all natural)
I mean the co-op hacking in NCIS where McGee and Abby are typing on the same keyboard is legit, right?

I rewatched Stranger Things season 4, which takes place in 1986, and there’s a scene where code flashes on the screen while they’re “hacking”. It shows:
- Turbo C++ - not invented until 1990
- HTML - 1993
- HTTPS - 1994 (it’s called htsps on the screen)
- PHP - 1995
- CSS - 1996
- Iframe - 1997
- C# - 2000
- .NET Framework - 2002
- CoffeeScript - 2009
- Flexbox - 2009
Literally unwatchable
Mr. Robot really spoiled me. How does that shit fly under the radar for such a high production show?
Been a while since I watched it. Did they actually take the time to do it right in that show?
Yeah. It was very realistic. Sometimes they simplified explanations a bit. They had real hackers as consultants, and Sam Esmail, the creator of the show, was into hacking and computers as a teen.
Cool! TIL
He didn’t use arch, btw.
Amateur… They should have just typed
TREEand hit enter like the professionalsbtop
All the hacking flash u need. A hacker needs to know the exact temperature of each CPU core at once at all times. In spaced out colors, for clarity.
The Stranger Things universe has time travel confirmed.
Hey, at least they used something based in reality opposed to the traditional falling Matrix text… Actually, on second thought, that might be a little bit cooler.
At least if your goanna mombo and jumbo and make stuff up.
Do it with some flare
Should type in
call -151
(Apple 2 assembly entrance)
Yeahhh. Apple IIe, just turn it off, stick a disk in and turn it back on!
omg it’s not just a website but it’s in the repos?
Honestly though if i’m doing video stuff and I leave htop and nvtop running on the second screen, that gets you like half way to this.
It is indeed, I didn’t know for a long time and thought others would like to know 😁
Well, having a well maintained and up to date system is a cornerstone of any good hacking practice!
I seem to remember reading that what Trinity did in the opening scenes of The Matrix before the police busted in was actually doing a real exploit. So it got done properly at least once!

On Windows running
treefromC:\is a good one.Not even that most of the time. I can think of maybe 2 movies that show actual computer stuff while everytjkng else shows entirely made up bullshit from the way a terminal looks, to visualizing a mainframe as a video game that doesn’t even look like a real video game (Masterminds is so goofy).
Mr. Robot: Hold my editor
echo Im inI once watched some police procedural show (don’t remember which copaganda it was exactly) where they were trying to track someone’s location online. Couldn’t stop laughing when they showed an IPv4 address starting with 624.
Mind you, that’s for the same reason all American phone numbers in shows have a 555 prefix – showing a real address could lead to liability if e.g. someone tries to launch an attack on that address they saw on TV.
Unlike phone numbering schemes, the IPv4 address space has no well-known area reserved for fictitious addresses. Sure, you could use something like 192.0.2.0/24, 198.51.100.0/24, or 203.0.113.0/24 (test networks for use in documentation), but those aren’t well-known outside of certain circles.
So they just go with completely invalid addresses because that’s easy.
Just use 127.0.0.1 as the address and let hackers try to attack it.
This guy sure has a lot of porn.
I’m in
The call is coming from inside the house.
He’s too good, I can’t trace his ip!
They should’ve traced his ipv6, while 624::/16 isn’t currently allocated, it is at least usable if we need it.
Well, well, well.
If we go outside of dottted decimal notation of IPv4, we can have addresses starting with 624. They can also be in decimal, octal, and hexadecimal.
Oh, and IPv4 also supports shortening from middle right in dotted decimal. For example, 127.0.0.1 is too long, often you may be able to use 127.1.
Or you can go to Cloudflare’s https://1.1/While you can convert (or rather represent) an ipv4 as decimal, op indirectly stated that they were in dotted decimal notation and as such the leading 624 doesn’t work in that context.
Also shortening ipv4 is cursed, why must you share this knowledge?
Also also, curious to note that glibc parses 1 as ipv4 0.0.0.1 and not ipv6 ::1, probably because they predate ipv6.
The Chad move would be to have one such scene that looks normal to casual observers, but then turns out the hacker has an automated scanning tool running in the background of the screen, while they’re just typing nonsense in the command prompt.












