357
58 facts from the movies about hackers
That's what (according to the film) should do real hatskery:
1) To put the last thug.
2) OBYAZATELHO be able to ride on skates or board
3) hatskery has problems with his head
4) hatskery has lamersky nickname ala Sirious Killer or Zero Cool
5) Must be able to play games komputerny. Moreover, the more points he gets, the higher his skill haTskerskoe
6) In the process of hacking is not seen a single console, but something vysokograficheskoe and terribly beautiful.
7) The Director of the company has a password of 3 characters.
8) Ha breaking any machine leaves Neboli 10 minutes.
9) Passwords ugadyvayutsya almost always the first attempt.
10) If hatskersha having sex, ask her about the new komputere, it throws everything what is going to take and rushes to explain that:
11) Stone P6 in the 3 times faster than the Pentium.
12) bus ISA - that's cool.
13) Tyt worth sypepskopostnoy modem - as much as 28,800!
... Already wanted to add, "the military system»
14) calls on the modem, you can simply typing the serial number of the modem on the cover!
15) leads the Board in the era of P6 was not yet ...
16) The mice at the time of the P6 also existed!
17) But if zalest in the trash, you can find the access codes.
18) Rules "competition hatskerov" specifically poradlovali, namely:
19) Everyone can use only their own passwords. Which, apparently, are universal and suitable for any system.
20) The more you take multi-colored diskettes on a "competition", the steeper you
21) If other prettier paint your PC, you do hero
22) hatskery can crack the ATM out of his house and then spit out the money on the street!
23) But ending this wretched film is even better:
24) Heap hatskerov entered into the system and it has infected the virus each his own!
25) Computer viruses - it vysokograficheskoe application ispolzueschee 3D-accelerator
26) A light blinked in the hotel for this hatskery a piece of cake!
27) and traffic lights also
28) data storage systems dolgovremnnogo able to light up when the infection of the virus ...
29) Treatment of viruses is a real time strategy.
30), a server can not be disconnected from the outside world during the attack hatskery, so you have to watch.
31) All that gives the database is obviously true. (Director: You're dead.)
32) A search-ovtsev FBI seems to consist of going-over room. (Floppy disk hidden ventilation)
33) The tanker has no manual controls and lock komputerny.
34) Hastoyaschego hacker can finish (restore) the program with Kotz Hex
35) In every OSes when entering your password there parolepodbiralka!
36) The network is working with universal and comprehensive rules!
37) And when working with a computer key "ppobEl" no pazy not pressed
38) Every hacker must be able to determine the color of the book what it is and who the author is.
39) In America in '95 everything from fire protection systems and to the lighting in each (! Cm. After. Footage) apartment is managed through tyrnet.
40) The institutions do not have any documents on hendkopi, everything in computers, and for some reason, from the office of computer science can be accessed in the principal's office.
41) The Internet is more like Descent, and search for files - on a flight between skyscrapers.
42) Each program is at least talking a voice and a GUI.
43) "Kommandny interpreter" can burn and is a transparent box with lightning (see. Stage with a password GOD).
44) The deleted file is no longer file nipped by the first letter, and the application of the formulas and graphics nehily.
45) File Manager is a simulator to drop dead resolution and detail, fulnoskrinovym antialiasing, anisotropic filtering and trilinear, Z-buffer, and it does not even braking on a laptop early nineties.
46) Catalogs are home files - windows in these houses, with all the names and any signs otsutsvuyut completely.
47) The log file is a video recording of flight between directories.
48) virus, destroying files overwrites them - in the literal sense: different colors and designs.
49) the penetration of your network, you learn of the howling of sirens and flashing red lights.
50) Server is a room the size of a hall of a good hotel.
51) Servers are dimensioned and glow as if they were not built on chips, and lamps.
52) Hastoyaschego attacker is able to read and understand that the hex codes at a rate of about 3-5 pages per second, as well as programs for the scraps of what some few minutes to calculate in his mind that it further.
53) If the cord is plugged into the computer network telephone, so it is possible to climb into any other computer; concepts such as access control, virtual private networks, domains, at worst - not having any at all.
54) Of course, the computer is the most important and top secret data is also connected to an Internet channel in the arm thickness and it share the all that is possible.
55) Gluing 2 handsets with tape and where to call, you get a sickly Connect
56) All hatskerov necessarily have notebuk and cell phone.
57) To perform a simple operation (copy the file to a floppy disk) should be two hundred times ponazhimat different buttons on the keyboard.
58) Do not you know that you can hack a computer that is currently off?
1) To put the last thug.
2) OBYAZATELHO be able to ride on skates or board
3) hatskery has problems with his head
4) hatskery has lamersky nickname ala Sirious Killer or Zero Cool
5) Must be able to play games komputerny. Moreover, the more points he gets, the higher his skill haTskerskoe
6) In the process of hacking is not seen a single console, but something vysokograficheskoe and terribly beautiful.
7) The Director of the company has a password of 3 characters.
8) Ha breaking any machine leaves Neboli 10 minutes.
9) Passwords ugadyvayutsya almost always the first attempt.
10) If hatskersha having sex, ask her about the new komputere, it throws everything what is going to take and rushes to explain that:
11) Stone P6 in the 3 times faster than the Pentium.
12) bus ISA - that's cool.
13) Tyt worth sypepskopostnoy modem - as much as 28,800!
... Already wanted to add, "the military system»
14) calls on the modem, you can simply typing the serial number of the modem on the cover!
15) leads the Board in the era of P6 was not yet ...
16) The mice at the time of the P6 also existed!
17) But if zalest in the trash, you can find the access codes.
18) Rules "competition hatskerov" specifically poradlovali, namely:
19) Everyone can use only their own passwords. Which, apparently, are universal and suitable for any system.
20) The more you take multi-colored diskettes on a "competition", the steeper you
21) If other prettier paint your PC, you do hero
22) hatskery can crack the ATM out of his house and then spit out the money on the street!
23) But ending this wretched film is even better:
24) Heap hatskerov entered into the system and it has infected the virus each his own!
25) Computer viruses - it vysokograficheskoe application ispolzueschee 3D-accelerator
26) A light blinked in the hotel for this hatskery a piece of cake!
27) and traffic lights also
28) data storage systems dolgovremnnogo able to light up when the infection of the virus ...
29) Treatment of viruses is a real time strategy.
30), a server can not be disconnected from the outside world during the attack hatskery, so you have to watch.
31) All that gives the database is obviously true. (Director: You're dead.)
32) A search-ovtsev FBI seems to consist of going-over room. (Floppy disk hidden ventilation)
33) The tanker has no manual controls and lock komputerny.
34) Hastoyaschego hacker can finish (restore) the program with Kotz Hex
35) In every OSes when entering your password there parolepodbiralka!
36) The network is working with universal and comprehensive rules!
37) And when working with a computer key "ppobEl" no pazy not pressed
38) Every hacker must be able to determine the color of the book what it is and who the author is.
39) In America in '95 everything from fire protection systems and to the lighting in each (! Cm. After. Footage) apartment is managed through tyrnet.
40) The institutions do not have any documents on hendkopi, everything in computers, and for some reason, from the office of computer science can be accessed in the principal's office.
41) The Internet is more like Descent, and search for files - on a flight between skyscrapers.
42) Each program is at least talking a voice and a GUI.
43) "Kommandny interpreter" can burn and is a transparent box with lightning (see. Stage with a password GOD).
44) The deleted file is no longer file nipped by the first letter, and the application of the formulas and graphics nehily.
45) File Manager is a simulator to drop dead resolution and detail, fulnoskrinovym antialiasing, anisotropic filtering and trilinear, Z-buffer, and it does not even braking on a laptop early nineties.
46) Catalogs are home files - windows in these houses, with all the names and any signs otsutsvuyut completely.
47) The log file is a video recording of flight between directories.
48) virus, destroying files overwrites them - in the literal sense: different colors and designs.
49) the penetration of your network, you learn of the howling of sirens and flashing red lights.
50) Server is a room the size of a hall of a good hotel.
51) Servers are dimensioned and glow as if they were not built on chips, and lamps.
52) Hastoyaschego attacker is able to read and understand that the hex codes at a rate of about 3-5 pages per second, as well as programs for the scraps of what some few minutes to calculate in his mind that it further.
53) If the cord is plugged into the computer network telephone, so it is possible to climb into any other computer; concepts such as access control, virtual private networks, domains, at worst - not having any at all.
54) Of course, the computer is the most important and top secret data is also connected to an Internet channel in the arm thickness and it share the all that is possible.
55) Gluing 2 handsets with tape and where to call, you get a sickly Connect
56) All hatskerov necessarily have notebuk and cell phone.
57) To perform a simple operation (copy the file to a floppy disk) should be two hundred times ponazhimat different buttons on the keyboard.
58) Do not you know that you can hack a computer that is currently off?