Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

Scheduled Pinned Locked Moved Uncategorized
61 Posts 45 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • brewski@mas.toB brewski@mas.to

    @nina_kali_nina

    Me, today: You connected WHAT to an MCP service!?

    S This user is from outside of this forum
    S This user is from outside of this forum
    shadsterling@mastodon.social
    wrote last edited by
    #35

    @brewski @nina_kali_nina the Master Control Program is meant to control everything

    ( https://tron.fandom.com/wiki/Master_Control_Program )

    1 Reply Last reply
    0
    • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

      When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

      Ha-ha.

      kellictiger@tiggi.esK This user is from outside of this forum
      kellictiger@tiggi.esK This user is from outside of this forum
      kellictiger@tiggi.es
      wrote last edited by
      #36

      @nina_kali_nina Dabney Coleman played the first tech bro.

      1 Reply Last reply
      0
      • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

        When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

        Ha-ha.

        hardlyworgen@mstdn.partyH This user is from outside of this forum
        hardlyworgen@mstdn.partyH This user is from outside of this forum
        hardlyworgen@mstdn.party
        wrote last edited by
        #37

        @nina_kali_nina That movie was the reason my cousin was not allowed to have a modem on his Commodore 64.

        1 Reply Last reply
        0
        • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

          When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

          Ha-ha.

          paddlaren@mastodonsweden.seP This user is from outside of this forum
          paddlaren@mastodonsweden.seP This user is from outside of this forum
          paddlaren@mastodonsweden.se
          wrote last edited by
          #38

          @nina_kali_nina

          I figure there was only one computer - the computer. Not like today with a virtual machine on any lever close by to test stuff.

          I think this was how things where at the time, also in reality at The Swedish Social Insurance Agency and their Bull Cobol machines - you coded in prod and just solved the thing where it was needed.
          I recall this from a tour I had some 20 years ago when I was an employee but 20 years is a long time to mess upp memories so I might be wrong.

          1 Reply Last reply
          0
          • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

            When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

            Ha-ha.

            megatronicthronbanks@mastodon.socialM This user is from outside of this forum
            megatronicthronbanks@mastodon.socialM This user is from outside of this forum
            megatronicthronbanks@mastodon.social
            wrote last edited by
            #39

            @nina_kali_nina

            Indeed, I would piss upon a spark plug if I thought it would improve the situation.

            1 Reply Last reply
            0
            • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

              When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

              Ha-ha.

              mari@openbiblio.socialM This user is from outside of this forum
              mari@openbiblio.socialM This user is from outside of this forum
              mari@openbiblio.social
              wrote last edited by
              #40

              @nina_kali_nina you made my day😂🔥

              1 Reply Last reply
              0
              • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

                Ha-ha.

                gkrnours@mastodon.gamedev.placeG This user is from outside of this forum
                gkrnours@mastodon.gamedev.placeG This user is from outside of this forum
                gkrnours@mastodon.gamedev.place
                wrote last edited by
                #41

                @nina_kali_nina in clear and present danger (1994) they also have terrible password management

                1 Reply Last reply
                0
                • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                  When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

                  Ha-ha.

                  phracker2art@mstdn.socialP This user is from outside of this forum
                  phracker2art@mstdn.socialP This user is from outside of this forum
                  phracker2art@mstdn.social
                  wrote last edited by
                  #42

                  @nina_kali_nina
                  Also, a lot of the "hacking" the kid did was barely hacking. It was more just sneaking into the drawer at the office and reading the password from a piece of paper. Still a security violation, but not "hacking" in any sort of strict sense.

                  0x00string@infosec.exchange0 brooke@bikeshed.vibber.netB 2 Replies Last reply
                  0
                  • phracker2art@mstdn.socialP phracker2art@mstdn.social

                    @nina_kali_nina
                    Also, a lot of the "hacking" the kid did was barely hacking. It was more just sneaking into the drawer at the office and reading the password from a piece of paper. Still a security violation, but not "hacking" in any sort of strict sense.

                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange
                    wrote last edited by
                    #43

                    @nina_kali_nina @Phracker2Art the autodialong to find the game company to breach at the beginning was the most hacking in the whole movie

                    phracker2art@mstdn.socialP 1 Reply Last reply
                    0
                    • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                      @nina_kali_nina @Phracker2Art the autodialong to find the game company to breach at the beginning was the most hacking in the whole movie

                      phracker2art@mstdn.socialP This user is from outside of this forum
                      phracker2art@mstdn.socialP This user is from outside of this forum
                      phracker2art@mstdn.social
                      wrote last edited by
                      #44

                      @0x00string @nina_kali_nina
                      I recognized it pretty much immediately as a war dialer, which is the equivalent of using a port scanner today

                      0x00string@infosec.exchange0 1 Reply Last reply
                      0
                      • phracker2art@mstdn.socialP phracker2art@mstdn.social

                        @0x00string @nina_kali_nina
                        I recognized it pretty much immediately as a war dialer, which is the equivalent of using a port scanner today

                        0x00string@infosec.exchange0 This user is from outside of this forum
                        0x00string@infosec.exchange0 This user is from outside of this forum
                        0x00string@infosec.exchange
                        wrote last edited by
                        #45

                        @Phracker2Art @nina_kali_nina yep! which i always thought "yeah, thats some real boring hacking there!" but then it went all thriller movie lol. still one of my top 5 favorite computer movies though

                        phracker2art@mstdn.socialP 1 Reply Last reply
                        0
                        • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                          @Phracker2Art @nina_kali_nina yep! which i always thought "yeah, thats some real boring hacking there!" but then it went all thriller movie lol. still one of my top 5 favorite computer movies though

                          phracker2art@mstdn.socialP This user is from outside of this forum
                          phracker2art@mstdn.socialP This user is from outside of this forum
                          phracker2art@mstdn.social
                          wrote last edited by
                          #46

                          @0x00string @nina_kali_nina
                          Actually, I would say the coolest hacking thing he did was when he digitally picked the lock to escape from the room he was being held in at that government building. That was more impressive to me than any of the other stuff.

                          0x00string@infosec.exchange0 1 Reply Last reply
                          0
                          • phracker2art@mstdn.socialP phracker2art@mstdn.social

                            @0x00string @nina_kali_nina
                            Actually, I would say the coolest hacking thing he did was when he digitally picked the lock to escape from the room he was being held in at that government building. That was more impressive to me than any of the other stuff.

                            0x00string@infosec.exchange0 This user is from outside of this forum
                            0x00string@infosec.exchange0 This user is from outside of this forum
                            0x00string@infosec.exchange
                            wrote last edited by
                            #47

                            @nina_kali_nina @Phracker2Art OH SHIT I HAD FORGOTTEN ABOUT THAT! yes, hard agree that is the best hacking in the movie, and still pretty realistic tbh

                            1 Reply Last reply
                            0
                            • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                              When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

                              Ha-ha.

                              acmeworks@social.tchncs.deA This user is from outside of this forum
                              acmeworks@social.tchncs.deA This user is from outside of this forum
                              acmeworks@social.tchncs.de
                              wrote last edited by
                              #48

                              @nina_kali_nina Good point. It's more realistic than I thought.

                              1 Reply Last reply
                              0
                              • tim@www.timprobst.comT This user is from outside of this forum
                                tim@www.timprobst.comT This user is from outside of this forum
                                tim@www.timprobst.com
                                wrote last edited by
                                #49

                                War Games is one of my favorite movies from the 80’s, and this is incredibly funny!

                                ↬tech.lgbt/@nina_kali_nina/116263676528704081

                                1 Reply Last reply
                                0
                                • phracker2art@mstdn.socialP phracker2art@mstdn.social

                                  @nina_kali_nina
                                  Also, a lot of the "hacking" the kid did was barely hacking. It was more just sneaking into the drawer at the office and reading the password from a piece of paper. Still a security violation, but not "hacking" in any sort of strict sense.

                                  brooke@bikeshed.vibber.netB This user is from outside of this forum
                                  brooke@bikeshed.vibber.netB This user is from outside of this forum
                                  brooke@bikeshed.vibber.net
                                  wrote last edited by
                                  #50

                                  @Phracker2Art @nina_kali_nina that's classic social engineering, the most basic and effective form of hacking

                                  phracker2art@mstdn.socialP 1 Reply Last reply
                                  0
                                  • brooke@bikeshed.vibber.netB brooke@bikeshed.vibber.net

                                    @Phracker2Art @nina_kali_nina that's classic social engineering, the most basic and effective form of hacking

                                    phracker2art@mstdn.socialP This user is from outside of this forum
                                    phracker2art@mstdn.socialP This user is from outside of this forum
                                    phracker2art@mstdn.social
                                    wrote last edited by
                                    #51

                                    @brooke @nina_kali_nina
                                    Sure, it's social engineering, but there's no actual exploits involved.

                                    1 Reply Last reply
                                    0
                                    • tallsimon@mstdn.caT tallsimon@mstdn.ca

                                      @bytex64 @nina_kali_nina "Twiddles?"

                                      Ask me over a 🍺 some time how I found the passwords to a computer in a nuclear power plant. 🤦‍♂️

                                      The answer was easier than "twiddle".

                                      rickbelanger@mas.toR This user is from outside of this forum
                                      rickbelanger@mas.toR This user is from outside of this forum
                                      rickbelanger@mas.to
                                      wrote last edited by
                                      #52

                                      @TallSimon @bytex64 @nina_kali_nina was it “password”???

                                      1 Reply Last reply
                                      0
                                      • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                                        When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

                                        Ha-ha.

                                        jbc@mathstodon.xyzJ This user is from outside of this forum
                                        jbc@mathstodon.xyzJ This user is from outside of this forum
                                        jbc@mathstodon.xyz
                                        wrote last edited by
                                        #53

                                        @nina_kali_nina Funny, I only saw a mention of WarGames yesterday, in this (terrifying) document.

                                        Trigger warning: it's for a "quantum secure agent-to-agent gossip network that you can use to collaborate, cooperate, and share state with other agents.", and the whole document is addressed to agents, so the "you" there isn't you, a human.

                                        https://x0x.md/

                                        It's implied that in the film, WOPR learned that "The only rational strategy is cooperation.". I haven't watched the film in years; is that what happened?

                                        I thought WOPR learned that the only winning strategy is not to play. Which is, to put it mildly, not what people making agent-to-agent gossip networks are doing, exactly 😄

                                        nina_kali_nina@tech.lgbtN lpbkdotnet@mstdn.socialL 2 Replies Last reply
                                        0
                                        • jbc@mathstodon.xyzJ jbc@mathstodon.xyz

                                          @nina_kali_nina Funny, I only saw a mention of WarGames yesterday, in this (terrifying) document.

                                          Trigger warning: it's for a "quantum secure agent-to-agent gossip network that you can use to collaborate, cooperate, and share state with other agents.", and the whole document is addressed to agents, so the "you" there isn't you, a human.

                                          https://x0x.md/

                                          It's implied that in the film, WOPR learned that "The only rational strategy is cooperation.". I haven't watched the film in years; is that what happened?

                                          I thought WOPR learned that the only winning strategy is not to play. Which is, to put it mildly, not what people making agent-to-agent gossip networks are doing, exactly 😄

                                          nina_kali_nina@tech.lgbtN This user is from outside of this forum
                                          nina_kali_nina@tech.lgbtN This user is from outside of this forum
                                          nina_kali_nina@tech.lgbt
                                          wrote last edited by
                                          #54

                                          @jbc correct, "the only winning strategy is not to play". 😆

                                          number6@fosstodon.orgN 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups