Пікірлер
@Lord_zeel
@Lord_zeel 8 күн бұрын
I need the cleanse my soul of this cringe.
@theonefrancis696
@theonefrancis696 19 күн бұрын
Girl, maybe if you stop pressing random keys you will stop opening random windows lol
@DigitalPhreak765
@DigitalPhreak765 Ай бұрын
Dumbest hack ever 😅😅😅😅
@I.____.....__...__
@I.____.....__...__ Ай бұрын
The single stupidest computer scene in all of filmdom. 👏
@SoHBetaSword
@SoHBetaSword 3 ай бұрын
Yeah, a PC-Keyboard is not a Piano, where 2 People can Coop the Problem. Also: Zoom and Enhance can't make up a face or Text from a set of 4 Pixels.
@spettacomedy6631
@spettacomedy6631 3 ай бұрын
Tim Heidecker wrote this actually.
@Frozztastic
@Frozztastic 3 ай бұрын
This scene was my first introduction to this show. Right about where this clip ends, so did my watching of the show.
@michaellatsky
@michaellatsky 3 ай бұрын
thanks
@Nicholas_Steel
@Nicholas_Steel 4 ай бұрын
Why do people think he unplugged the monitor? Computer power supplies use that kinda plug too. There's also the implication that the computer fans turned off as the PC goes silent from sudden loss of power.
@elderleon1844
@elderleon1844 4 ай бұрын
how boomers think technology works:
@chasethrockmorton193
@chasethrockmorton193 4 ай бұрын
Please turn on subtitles.
@randombutler
@randombutler 6 ай бұрын
The sandwich was a nice touch
@mijacr
@mijacr 6 ай бұрын
People don't appreciate the skill required to type by weaving and coordinating between 2 people. "I'll do syncopated qwert and you do yuiop on tempo"
@TheWaterdog6
@TheWaterdog6 6 ай бұрын
I love the non understanding of everything here. That two people can use the same keyboard to do different things, and that unplugging 1 computer in a shared network will turn the entire network off so people cant hack it. Or that a hackers code is revealed on the screen and it is constantly changing. NOTHING here is even believably close to right.
@gorfmaster1
@gorfmaster1 6 ай бұрын
If you can type faster than the hacker, you will win. That is why you needed both of them on that keyboard.
@yeahyeah4244
@yeahyeah4244 6 ай бұрын
What exactly was she supposed to be typing lol
@simonprice5449
@simonprice5449 7 ай бұрын
Old people when a popup
@TimoIvvie
@TimoIvvie 8 ай бұрын
I love NCIS but god this scene lmao
@aaronmoran7195
@aaronmoran7195 9 ай бұрын
My girlfriend is really into this show and I can’t stop laughing at how stupid it is. That goth girl has the skill set of ten professionals! Most of them would’ve been fired for non professional behaviour at least.
@tostupidforname
@tostupidforname 9 ай бұрын
Idk if i should laugh or throw up
@GoldenWingsLittleBirds
@GoldenWingsLittleBirds 9 ай бұрын
數學真有趣!
@xxxlonewolf49
@xxxlonewolf49 10 ай бұрын
Hahaha beyond absurd
@Maple_Extract
@Maple_Extract 11 ай бұрын
Dumb as this scene is, I like sandwich guy. Wander into points of interest, ask about video games, eat sandwich I mean it's a philosophy that can last you a lifetime.
@user-xc6dt2gs4x
@user-xc6dt2gs4x Жыл бұрын
really well chosen footage to one of my favorite Christmas songs. Going to use in a lesson, too.
@MTdaBlacking
@MTdaBlacking Жыл бұрын
I heard Mr. Robot has the most accurate (if slightly stylized) hacking so seeing this is like someone threw in the very opposite direction lmao
@lherfel
@lherfel Жыл бұрын
thanks
@abstrusemedia2312
@abstrusemedia2312 Жыл бұрын
Unplug computer hacker still in network doing his thing. Come on director any idiot knows thats not how this works.
@emilyjohnston9674
@emilyjohnston9674 Жыл бұрын
Naw, you'd be surprised at how dumb many "not idiot" people are about computers, cars, hell, anything that requires more than 2 parts to work.
@brettbri5694
@brettbri5694 Жыл бұрын
This is one of the greatest scenes of Television Comedy of all time.
@statelypenguin
@statelypenguin Жыл бұрын
This is honestly the most boomer depiction of hacking. Like look at these dweebs, all you needed was a wise older man who just unplugs it like it’s a wonky toaster
@QueenbeeTTV
@QueenbeeTTV Жыл бұрын
bro what lmfao
@sharpnova2
@sharpnova2 Жыл бұрын
the people who write stuff like this are currently striking for more money. p.s. they make far more than the vast majority of you. per hour, roughly lawyer/doctor tier i hate them and hope ai replaces them all
@emilyjohnston9674
@emilyjohnston9674 Жыл бұрын
No. They don't. The people who run them do, but not the writers or general TV actors. Only the "stars" make the big bucks.
@TheBoondoggler
@TheBoondoggler Жыл бұрын
pfft Isolate the node. Totes.
@deepthib7588
@deepthib7588 Жыл бұрын
Could not get the answer for p=23, q=19, and e=283 with the steps. Can someone try n lmk?
@sharpnova2
@sharpnova2 Жыл бұрын
most accurate hacking scene ever produced by hollywood.
@TEMP3R4NCE
@TEMP3R4NCE Жыл бұрын
"theyve already burned through the NCIS *public* firewall" what
@eiaboca1
@eiaboca1 Жыл бұрын
OMG THAT'S NOT HOW IT WORKS...that's not how any of it works.... I know you all know that. I can't help but be annoyed at the smugness. I'm weak.
@pewgarpolls
@pewgarpolls Жыл бұрын
π
@r_5747
@r_5747 Жыл бұрын
I still refuse to believe that this was aired. Seriously, the actors did not see anything wrong with... with that?!
@eiaboca1
@eiaboca1 Жыл бұрын
Actors just read lines my man. We attribute to them a lot more than is actually there, good and bad. Also I think this aired in like 2005, the internet was only beginning to go mainstream
@drd675
@drd675 Жыл бұрын
@@eiaboca1 This episode was 2004, like you said, internet was just starting to become mainstream
@kieronchick1663
@kieronchick1663 Жыл бұрын
Why didn't they just type "Cookie" that worked on hackers.
@kieronchick1663
@kieronchick1663 Жыл бұрын
Ha ha ha what is happening here.
@tobordv9493
@tobordv9493 2 жыл бұрын
that's also how they wrote this scene: à quatre main in 0:58secs
@madhabahlal-madinah4309
@madhabahlal-madinah4309 2 жыл бұрын
A simple trick to get the d as well: d = e-1 mod φ(n). Let's take the example in the video: e = 7 φ(n) = 40 7^-1 mod 40 = 23 and that's how you can get it without going through the steps of the Extended Euclidean Algorithm
@HelloWorld-tn1tl
@HelloWorld-tn1tl 2 жыл бұрын
How to choose e, just a small prime that doesn't share a factor with φ(n) ?
@KD0MOO
@KD0MOO 2 жыл бұрын
This is really well researched work that has practical value.
@stephpursglove9022
@stephpursglove9022 2 жыл бұрын
Love this so much! Used it in a Sunday School lesson. Thank you! ❤
@stevepennington5552
@stevepennington5552 2 жыл бұрын
OMG! That is hilarious!
@dzarmindra
@dzarmindra 2 жыл бұрын
HAHAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!
@rrr00bb1
@rrr00bb1 2 жыл бұрын
3:44 ??? "n is the trap door" ??? It's not that you can't FIND n. It's that you can't FACTOR n into p and q. You are trying to hide phi, which is easy to calculate with p and q. n = p*q -- modulus for the FIELD phi = (p-1)*(q-1) -- period at which exponentiation repeats. this lets you calculate d from e. The thing that confused me when I was first implementing raw RSA was that the modulus n is when the + and * repeat. But ^ repeats at phi. You need to mod phi on exponents, and only mod n after that. I can't tell you how easily this trips you up when implementing raw RSA. BigNumber libraries do + and *, and you can often do the operations first, but the mod n later. But exponentiation creates number so huge that you need to include n as an argument; reducing it mod n is mandatory. This means that if you use a library to just generate a p,q pair for you; you can do all of the RSA yourself. If you don't use a small e, you just use gcd to check d,e to ensure that they are not bad values. (b^x)%n is the raw RSA function. Exponentiation reduced mod n; that's really all that RSA is.
@rrr00bb1
@rrr00bb1 2 жыл бұрын
I would make a big distinction in RSA between asymmetric encryption and public-key encryption. If you use a well-known and small 'e', you have public key, but can't support 'asymmetric' key encryption. With 'asymmetric' key encryption, 'e' and 'd' have the same properties; and are equally secret. I use it to make digitally signed tokens such that you don't know the plaintext until you produce a witness that you performed verify to extract a secret to decrypt the signed claims. That way, the signer distribute the verify key to those who are allowed to VERIFY. It's not totally public, because it's (n,e), but signer has (n,d,e). This allows tokens to be passed around so that man-in-the middle can't decode the claims, and the verifier can only extract verified claims. ie: the current way of checking signatures (plaintext,Sign(H(plaintexty))=sig) has security problems. The main one being that you allow people to not verify the signatures; something that is very common in the hands of web developers. And the other is in leaking the tokens to intermediate proxies.
@kvincentm
@kvincentm 2 жыл бұрын
Le pire c'est que j'y croyais .. a 4 main sur le claviers ..