Girl, maybe if you stop pressing random keys you will stop opening random windows lol
@DigitalPhreak765Ай бұрын
Dumbest hack ever 😅😅😅😅
@I.____.....__...__Ай бұрын
The single stupidest computer scene in all of filmdom. 👏
@SoHBetaSword3 ай бұрын
Yeah, a PC-Keyboard is not a Piano, where 2 People can Coop the Problem. Also: Zoom and Enhance can't make up a face or Text from a set of 4 Pixels.
@spettacomedy66313 ай бұрын
Tim Heidecker wrote this actually.
@Frozztastic3 ай бұрын
This scene was my first introduction to this show. Right about where this clip ends, so did my watching of the show.
@michaellatsky3 ай бұрын
thanks
@Nicholas_Steel4 ай бұрын
Why do people think he unplugged the monitor? Computer power supplies use that kinda plug too. There's also the implication that the computer fans turned off as the PC goes silent from sudden loss of power.
@elderleon18444 ай бұрын
how boomers think technology works:
@chasethrockmorton1934 ай бұрын
Please turn on subtitles.
@randombutler6 ай бұрын
The sandwich was a nice touch
@mijacr6 ай бұрын
People don't appreciate the skill required to type by weaving and coordinating between 2 people. "I'll do syncopated qwert and you do yuiop on tempo"
@TheWaterdog66 ай бұрын
I love the non understanding of everything here. That two people can use the same keyboard to do different things, and that unplugging 1 computer in a shared network will turn the entire network off so people cant hack it. Or that a hackers code is revealed on the screen and it is constantly changing. NOTHING here is even believably close to right.
@gorfmaster16 ай бұрын
If you can type faster than the hacker, you will win. That is why you needed both of them on that keyboard.
@yeahyeah42446 ай бұрын
What exactly was she supposed to be typing lol
@simonprice54497 ай бұрын
Old people when a popup
@TimoIvvie8 ай бұрын
I love NCIS but god this scene lmao
@aaronmoran71959 ай бұрын
My girlfriend is really into this show and I can’t stop laughing at how stupid it is. That goth girl has the skill set of ten professionals! Most of them would’ve been fired for non professional behaviour at least.
@tostupidforname9 ай бұрын
Idk if i should laugh or throw up
@GoldenWingsLittleBirds9 ай бұрын
數學真有趣!
@xxxlonewolf4910 ай бұрын
Hahaha beyond absurd
@Maple_Extract11 ай бұрын
Dumb as this scene is, I like sandwich guy. Wander into points of interest, ask about video games, eat sandwich I mean it's a philosophy that can last you a lifetime.
@user-xc6dt2gs4x Жыл бұрын
really well chosen footage to one of my favorite Christmas songs. Going to use in a lesson, too.
@MTdaBlacking Жыл бұрын
I heard Mr. Robot has the most accurate (if slightly stylized) hacking so seeing this is like someone threw in the very opposite direction lmao
@lherfel Жыл бұрын
thanks
@abstrusemedia2312 Жыл бұрын
Unplug computer hacker still in network doing his thing. Come on director any idiot knows thats not how this works.
@emilyjohnston9674 Жыл бұрын
Naw, you'd be surprised at how dumb many "not idiot" people are about computers, cars, hell, anything that requires more than 2 parts to work.
@brettbri5694 Жыл бұрын
This is one of the greatest scenes of Television Comedy of all time.
@statelypenguin Жыл бұрын
This is honestly the most boomer depiction of hacking. Like look at these dweebs, all you needed was a wise older man who just unplugs it like it’s a wonky toaster
@QueenbeeTTV Жыл бұрын
bro what lmfao
@sharpnova2 Жыл бұрын
the people who write stuff like this are currently striking for more money. p.s. they make far more than the vast majority of you. per hour, roughly lawyer/doctor tier i hate them and hope ai replaces them all
@emilyjohnston9674 Жыл бұрын
No. They don't. The people who run them do, but not the writers or general TV actors. Only the "stars" make the big bucks.
@TheBoondoggler Жыл бұрын
pfft Isolate the node. Totes.
@deepthib7588 Жыл бұрын
Could not get the answer for p=23, q=19, and e=283 with the steps. Can someone try n lmk?
@sharpnova2 Жыл бұрын
most accurate hacking scene ever produced by hollywood.
@TEMP3R4NCE Жыл бұрын
"theyve already burned through the NCIS *public* firewall" what
@eiaboca1 Жыл бұрын
OMG THAT'S NOT HOW IT WORKS...that's not how any of it works.... I know you all know that. I can't help but be annoyed at the smugness. I'm weak.
@pewgarpolls Жыл бұрын
π
@r_5747 Жыл бұрын
I still refuse to believe that this was aired. Seriously, the actors did not see anything wrong with... with that?!
@eiaboca1 Жыл бұрын
Actors just read lines my man. We attribute to them a lot more than is actually there, good and bad. Also I think this aired in like 2005, the internet was only beginning to go mainstream
@drd675 Жыл бұрын
@@eiaboca1 This episode was 2004, like you said, internet was just starting to become mainstream
@kieronchick1663 Жыл бұрын
Why didn't they just type "Cookie" that worked on hackers.
@kieronchick1663 Жыл бұрын
Ha ha ha what is happening here.
@tobordv94932 жыл бұрын
that's also how they wrote this scene: à quatre main in 0:58secs
@madhabahlal-madinah43092 жыл бұрын
A simple trick to get the d as well: d = e-1 mod φ(n). Let's take the example in the video: e = 7 φ(n) = 40 7^-1 mod 40 = 23 and that's how you can get it without going through the steps of the Extended Euclidean Algorithm
@HelloWorld-tn1tl2 жыл бұрын
How to choose e, just a small prime that doesn't share a factor with φ(n) ?
@KD0MOO2 жыл бұрын
This is really well researched work that has practical value.
@stephpursglove90222 жыл бұрын
Love this so much! Used it in a Sunday School lesson. Thank you! ❤
@stevepennington55522 жыл бұрын
OMG! That is hilarious!
@dzarmindra2 жыл бұрын
HAHAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!
@rrr00bb12 жыл бұрын
3:44 ??? "n is the trap door" ??? It's not that you can't FIND n. It's that you can't FACTOR n into p and q. You are trying to hide phi, which is easy to calculate with p and q. n = p*q -- modulus for the FIELD phi = (p-1)*(q-1) -- period at which exponentiation repeats. this lets you calculate d from e. The thing that confused me when I was first implementing raw RSA was that the modulus n is when the + and * repeat. But ^ repeats at phi. You need to mod phi on exponents, and only mod n after that. I can't tell you how easily this trips you up when implementing raw RSA. BigNumber libraries do + and *, and you can often do the operations first, but the mod n later. But exponentiation creates number so huge that you need to include n as an argument; reducing it mod n is mandatory. This means that if you use a library to just generate a p,q pair for you; you can do all of the RSA yourself. If you don't use a small e, you just use gcd to check d,e to ensure that they are not bad values. (b^x)%n is the raw RSA function. Exponentiation reduced mod n; that's really all that RSA is.
@rrr00bb12 жыл бұрын
I would make a big distinction in RSA between asymmetric encryption and public-key encryption. If you use a well-known and small 'e', you have public key, but can't support 'asymmetric' key encryption. With 'asymmetric' key encryption, 'e' and 'd' have the same properties; and are equally secret. I use it to make digitally signed tokens such that you don't know the plaintext until you produce a witness that you performed verify to extract a secret to decrypt the signed claims. That way, the signer distribute the verify key to those who are allowed to VERIFY. It's not totally public, because it's (n,e), but signer has (n,d,e). This allows tokens to be passed around so that man-in-the middle can't decode the claims, and the verifier can only extract verified claims. ie: the current way of checking signatures (plaintext,Sign(H(plaintexty))=sig) has security problems. The main one being that you allow people to not verify the signatures; something that is very common in the hands of web developers. And the other is in leaking the tokens to intermediate proxies.
@kvincentm2 жыл бұрын
Le pire c'est que j'y croyais .. a 4 main sur le claviers ..