Тёмный
Anthony Vance
Anthony Vance
Anthony Vance
Подписаться
Комментарии
@SoHBetaSword
@SoHBetaSword 6 дней назад
Yeah, a PC-Keyboard is not a Piano, where 2 People can Coop the Problem. Also: Zoom and Enhance can't make up a face or Text from a set of 4 Pixels.
@spettacomedy6631
@spettacomedy6631 6 дней назад
Tim Heidecker wrote this actually.
@Frozztastic
@Frozztastic 10 дней назад
This scene was my first introduction to this show. Right about where this clip ends, so did my watching of the show.
@michaellatsky
@michaellatsky 21 день назад
thanks
@Nicholas_Steel
@Nicholas_Steel Месяц назад
Why do people think he unplugged the monitor? Computer power supplies use that kinda plug too. There's also the implication that the computer fans turned off as the PC goes silent from sudden loss of power.
@elderjose9662
@elderjose9662 Месяц назад
how boomers think technology works:
@chasethrockmorton193
@chasethrockmorton193 Месяц назад
Please turn on subtitles.
@randombutler
@randombutler 3 месяца назад
The sandwich was a nice touch
@mijacr
@mijacr 3 месяца назад
People don't appreciate the skill required to type by weaving and coordinating between 2 people. "I'll do syncopated qwert and you do yuiop on tempo"
@TheWaterdog6
@TheWaterdog6 3 месяца назад
I love the non understanding of everything here. That two people can use the same keyboard to do different things, and that unplugging 1 computer in a shared network will turn the entire network off so people cant hack it. Or that a hackers code is revealed on the screen and it is constantly changing. NOTHING here is even believably close to right.
@gorfmaster1
@gorfmaster1 3 месяца назад
If you can type faster than the hacker, you will win. That is why you needed both of them on that keyboard.
@yeahyeah4244
@yeahyeah4244 3 месяца назад
What exactly was she supposed to be typing lol
@simonprice5449
@simonprice5449 4 месяца назад
Old people when a popup
@TimoIvvie
@TimoIvvie 5 месяцев назад
I love NCIS but god this scene lmao
@aaronmoran7195
@aaronmoran7195 6 месяцев назад
My girlfriend is really into this show and I can’t stop laughing at how stupid it is. That goth girl has the skill set of ten professionals! Most of them would’ve been fired for non professional behaviour at least.
@tostupidforname
@tostupidforname 6 месяцев назад
Idk if i should laugh or throw up
@GoldenWingsLittleBirds
@GoldenWingsLittleBirds 6 месяцев назад
數學真有趣!
@xxxlonewolf49
@xxxlonewolf49 7 месяцев назад
Hahaha beyond absurd
@AlchemicSoul
@AlchemicSoul 8 месяцев назад
Dumb as this scene is, I like sandwich guy. Wander into points of interest, ask about video games, eat sandwich I mean it's a philosophy that can last you a lifetime.
@user-xc6dt2gs4x
@user-xc6dt2gs4x 10 месяцев назад
really well chosen footage to one of my favorite Christmas songs. Going to use in a lesson, too.
@MTdaBlacking
@MTdaBlacking 10 месяцев назад
I heard Mr. Robot has the most accurate (if slightly stylized) hacking so seeing this is like someone threw in the very opposite direction lmao
@lherfel
@lherfel Год назад
thanks
@abstrusemedia2312
@abstrusemedia2312 Год назад
Unplug computer hacker still in network doing his thing. Come on director any idiot knows thats not how this works.
@emilyjohnston9674
@emilyjohnston9674 10 месяцев назад
Naw, you'd be surprised at how dumb many "not idiot" people are about computers, cars, hell, anything that requires more than 2 parts to work.
@brettbri5694
@brettbri5694 Год назад
This is one of the greatest scenes of Television Comedy of all time.
@statelypenguin
@statelypenguin Год назад
This is honestly the most boomer depiction of hacking. Like look at these dweebs, all you needed was a wise older man who just unplugs it like it’s a wonky toaster
@QueenbeeTTV
@QueenbeeTTV Год назад
bro what lmfao
@sharpnova2
@sharpnova2 Год назад
the people who write stuff like this are currently striking for more money. p.s. they make far more than the vast majority of you. per hour, roughly lawyer/doctor tier i hate them and hope ai replaces them all
@emilyjohnston9674
@emilyjohnston9674 10 месяцев назад
No. They don't. The people who run them do, but not the writers or general TV actors. Only the "stars" make the big bucks.
@TheBoondoggler
@TheBoondoggler Год назад
pfft Isolate the node. Totes.
@deepthib7588
@deepthib7588 Год назад
Could not get the answer for p=23, q=19, and e=283 with the steps. Can someone try n lmk?
@sharpnova2
@sharpnova2 Год назад
most accurate hacking scene ever produced by hollywood.
@xZeroW1ng
@xZeroW1ng Год назад
"theyve already burned through the NCIS *public* firewall" what
@eiaboca1
@eiaboca1 Год назад
OMG THAT'S NOT HOW IT WORKS...that's not how any of it works.... I know you all know that. I can't help but be annoyed at the smugness. I'm weak.
@pewgarpolls
@pewgarpolls Год назад
π
@r_5747
@r_5747 Год назад
I still refuse to believe that this was aired. Seriously, the actors did not see anything wrong with... with that?!
@eiaboca1
@eiaboca1 Год назад
Actors just read lines my man. We attribute to them a lot more than is actually there, good and bad. Also I think this aired in like 2005, the internet was only beginning to go mainstream
@drd675
@drd675 Год назад
@@eiaboca1 This episode was 2004, like you said, internet was just starting to become mainstream
@kieronchick1663
@kieronchick1663 Год назад
Why didn't they just type "Cookie" that worked on hackers.
@kieronchick1663
@kieronchick1663 Год назад
Ha ha ha what is happening here.
@tobordv9493
@tobordv9493 Год назад
that's also how they wrote this scene: à quatre main in 0:58secs
@madhabahlal-madinah4309
@madhabahlal-madinah4309 Год назад
A simple trick to get the d as well: d = e-1 mod φ(n). Let's take the example in the video: e = 7 φ(n) = 40 7^-1 mod 40 = 23 and that's how you can get it without going through the steps of the Extended Euclidean Algorithm
@HelloWorld-tn1tl
@HelloWorld-tn1tl Год назад
How to choose e, just a small prime that doesn't share a factor with φ(n) ?
@KD0MOO
@KD0MOO Год назад
This is really well researched work that has practical value.
@stephpursglove9022
@stephpursglove9022 Год назад
Love this so much! Used it in a Sunday School lesson. Thank you! ❤
@stevepennington5552
@stevepennington5552 Год назад
OMG! That is hilarious!
@dzarmindra
@dzarmindra Год назад
HAHAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!
@rrr00bb1
@rrr00bb1 Год назад
3:44 ??? "n is the trap door" ??? It's not that you can't FIND n. It's that you can't FACTOR n into p and q. You are trying to hide phi, which is easy to calculate with p and q. n = p*q -- modulus for the FIELD phi = (p-1)*(q-1) -- period at which exponentiation repeats. this lets you calculate d from e. The thing that confused me when I was first implementing raw RSA was that the modulus n is when the + and * repeat. But ^ repeats at phi. You need to mod phi on exponents, and only mod n after that. I can't tell you how easily this trips you up when implementing raw RSA. BigNumber libraries do + and *, and you can often do the operations first, but the mod n later. But exponentiation creates number so huge that you need to include n as an argument; reducing it mod n is mandatory. This means that if you use a library to just generate a p,q pair for you; you can do all of the RSA yourself. If you don't use a small e, you just use gcd to check d,e to ensure that they are not bad values. (b^x)%n is the raw RSA function. Exponentiation reduced mod n; that's really all that RSA is.
@rrr00bb1
@rrr00bb1 Год назад
I would make a big distinction in RSA between asymmetric encryption and public-key encryption. If you use a well-known and small 'e', you have public key, but can't support 'asymmetric' key encryption. With 'asymmetric' key encryption, 'e' and 'd' have the same properties; and are equally secret. I use it to make digitally signed tokens such that you don't know the plaintext until you produce a witness that you performed verify to extract a secret to decrypt the signed claims. That way, the signer distribute the verify key to those who are allowed to VERIFY. It's not totally public, because it's (n,e), but signer has (n,d,e). This allows tokens to be passed around so that man-in-the middle can't decode the claims, and the verifier can only extract verified claims. ie: the current way of checking signatures (plaintext,Sign(H(plaintexty))=sig) has security problems. The main one being that you allow people to not verify the signatures; something that is very common in the hands of web developers. And the other is in leaking the tokens to intermediate proxies.
@kvincentm
@kvincentm 2 года назад
Le pire c'est que j'y croyais .. a 4 main sur le claviers ..
@ahmedmaa4380
@ahmedmaa4380 2 года назад
They connected to the Dada base
@dorianponcela9680
@dorianponcela9680 2 года назад
Everybody knows you only need the F5 key to stop a hacking attack...😀
@Okurka.
@Okurka. Год назад
*Alt-F4
@listen4159
@listen4159 Год назад
F11 if you're on a laptop
@presw2pw123
@presw2pw123 10 месяцев назад
I thought F1 is help
@SaHaRaSquad
@SaHaRaSquad 2 года назад
All this could have been prevented if the "computer game" guy put down his sandwich and helped typing smh.
@_Splinx_
@_Splinx_ 2 года назад
Samething happened to my laptop when i was promised free robux from someone on the internet if i run a .exe they gave me.