6

*intense hacker vs hacker situation in a movie
One of them: "Let's see how you like Hyper Text Transfer Protocol"
*Continues intensively hacking

Comments
  • 1
    in the meantime we have Matrix 2, and Trinity using an actual nmap that finds open ssh and using ssh crc32 exploit, which was legit exploit at the time movie was released
Add Comment