phiresky to Programmer [email protected] • 1 year agoHacking in 1980 vs Hacking in 2024imagemessage-square108arrow-up11.57Karrow-down118
arrow-up11.55Karrow-down1imageHacking in 1980 vs Hacking in 2024phiresky to Programmer [email protected] • 1 year agomessage-square108
minus-square@[email protected]linkfedilink14•1 year agoAnd honorable mention to the non-existing Matrix sequel that had an actual SSH vulnerability on screen.
minus-square@maryjayjaylink9•1 year agoI think Trinity was using nmap to port scan or ping sweep the subnet, also
And honorable mention to the non-existing Matrix sequel that had an actual SSH vulnerability on screen.
I think Trinity was using nmap to port scan or ping sweep the subnet, also