Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

Scheduled Pinned Locked Moved Uncategorized
61 Posts 45 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

    When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

    Ha-ha.

    megatronicthronbanks@mastodon.socialM This user is from outside of this forum
    megatronicthronbanks@mastodon.socialM This user is from outside of this forum
    megatronicthronbanks@mastodon.social
    wrote last edited by
    #39

    @nina_kali_nina

    Indeed, I would piss upon a spark plug if I thought it would improve the situation.

    1 Reply Last reply
    0
    • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

      When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

      Ha-ha.

      mari@openbiblio.socialM This user is from outside of this forum
      mari@openbiblio.socialM This user is from outside of this forum
      mari@openbiblio.social
      wrote last edited by
      #40

      @nina_kali_nina you made my day๐Ÿ˜‚๐Ÿ”ฅ

      1 Reply Last reply
      0
      • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

        When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

        Ha-ha.

        gkrnours@mastodon.gamedev.placeG This user is from outside of this forum
        gkrnours@mastodon.gamedev.placeG This user is from outside of this forum
        gkrnours@mastodon.gamedev.place
        wrote last edited by
        #41

        @nina_kali_nina in clear and present danger (1994) they also have terrible password management

        1 Reply Last reply
        0
        • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

          When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

          Ha-ha.

          phracker2art@mstdn.socialP This user is from outside of this forum
          phracker2art@mstdn.socialP This user is from outside of this forum
          phracker2art@mstdn.social
          wrote last edited by
          #42

          @nina_kali_nina
          Also, a lot of the "hacking" the kid did was barely hacking. It was more just sneaking into the drawer at the office and reading the password from a piece of paper. Still a security violation, but not "hacking" in any sort of strict sense.

          0x00string@infosec.exchange0 brooke@bikeshed.vibber.netB 2 Replies Last reply
          0
          • phracker2art@mstdn.socialP phracker2art@mstdn.social

            @nina_kali_nina
            Also, a lot of the "hacking" the kid did was barely hacking. It was more just sneaking into the drawer at the office and reading the password from a piece of paper. Still a security violation, but not "hacking" in any sort of strict sense.

            0x00string@infosec.exchange0 This user is from outside of this forum
            0x00string@infosec.exchange0 This user is from outside of this forum
            0x00string@infosec.exchange
            wrote last edited by
            #43

            @nina_kali_nina @Phracker2Art the autodialong to find the game company to breach at the beginning was the most hacking in the whole movie

            phracker2art@mstdn.socialP 1 Reply Last reply
            0
            • 0x00string@infosec.exchange0 0x00string@infosec.exchange

              @nina_kali_nina @Phracker2Art the autodialong to find the game company to breach at the beginning was the most hacking in the whole movie

              phracker2art@mstdn.socialP This user is from outside of this forum
              phracker2art@mstdn.socialP This user is from outside of this forum
              phracker2art@mstdn.social
              wrote last edited by
              #44

              @0x00string @nina_kali_nina
              I recognized it pretty much immediately as a war dialer, which is the equivalent of using a port scanner today

              0x00string@infosec.exchange0 1 Reply Last reply
              0
              • phracker2art@mstdn.socialP phracker2art@mstdn.social

                @0x00string @nina_kali_nina
                I recognized it pretty much immediately as a war dialer, which is the equivalent of using a port scanner today

                0x00string@infosec.exchange0 This user is from outside of this forum
                0x00string@infosec.exchange0 This user is from outside of this forum
                0x00string@infosec.exchange
                wrote last edited by
                #45

                @Phracker2Art @nina_kali_nina yep! which i always thought "yeah, thats some real boring hacking there!" but then it went all thriller movie lol. still one of my top 5 favorite computer movies though

                phracker2art@mstdn.socialP 1 Reply Last reply
                0
                • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                  @Phracker2Art @nina_kali_nina yep! which i always thought "yeah, thats some real boring hacking there!" but then it went all thriller movie lol. still one of my top 5 favorite computer movies though

                  phracker2art@mstdn.socialP This user is from outside of this forum
                  phracker2art@mstdn.socialP This user is from outside of this forum
                  phracker2art@mstdn.social
                  wrote last edited by
                  #46

                  @0x00string @nina_kali_nina
                  Actually, I would say the coolest hacking thing he did was when he digitally picked the lock to escape from the room he was being held in at that government building. That was more impressive to me than any of the other stuff.

                  0x00string@infosec.exchange0 1 Reply Last reply
                  0
                  • phracker2art@mstdn.socialP phracker2art@mstdn.social

                    @0x00string @nina_kali_nina
                    Actually, I would say the coolest hacking thing he did was when he digitally picked the lock to escape from the room he was being held in at that government building. That was more impressive to me than any of the other stuff.

                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange
                    wrote last edited by
                    #47

                    @nina_kali_nina @Phracker2Art OH SHIT I HAD FORGOTTEN ABOUT THAT! yes, hard agree that is the best hacking in the movie, and still pretty realistic tbh

                    1 Reply Last reply
                    0
                    • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                      When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

                      Ha-ha.

                      acmeworks@social.tchncs.deA This user is from outside of this forum
                      acmeworks@social.tchncs.deA This user is from outside of this forum
                      acmeworks@social.tchncs.de
                      wrote last edited by
                      #48

                      @nina_kali_nina Good point. It's more realistic than I thought.

                      1 Reply Last reply
                      0
                      • tim@www.timprobst.comT This user is from outside of this forum
                        tim@www.timprobst.comT This user is from outside of this forum
                        tim@www.timprobst.com
                        wrote last edited by
                        #49

                        War Games is one of my favorite movies from the 80โ€™s, and this is incredibly funny!

                        โ†ฌtech.lgbt/@nina_kali_nina/116263676528704081

                        1 Reply Last reply
                        0
                        • phracker2art@mstdn.socialP phracker2art@mstdn.social

                          @nina_kali_nina
                          Also, a lot of the "hacking" the kid did was barely hacking. It was more just sneaking into the drawer at the office and reading the password from a piece of paper. Still a security violation, but not "hacking" in any sort of strict sense.

                          brooke@bikeshed.vibber.netB This user is from outside of this forum
                          brooke@bikeshed.vibber.netB This user is from outside of this forum
                          brooke@bikeshed.vibber.net
                          wrote last edited by
                          #50

                          @Phracker2Art @nina_kali_nina that's classic social engineering, the most basic and effective form of hacking

                          phracker2art@mstdn.socialP 1 Reply Last reply
                          0
                          • brooke@bikeshed.vibber.netB brooke@bikeshed.vibber.net

                            @Phracker2Art @nina_kali_nina that's classic social engineering, the most basic and effective form of hacking

                            phracker2art@mstdn.socialP This user is from outside of this forum
                            phracker2art@mstdn.socialP This user is from outside of this forum
                            phracker2art@mstdn.social
                            wrote last edited by
                            #51

                            @brooke @nina_kali_nina
                            Sure, it's social engineering, but there's no actual exploits involved.

                            1 Reply Last reply
                            0
                            • tallsimon@mstdn.caT tallsimon@mstdn.ca

                              @bytex64 @nina_kali_nina "Twiddles?"

                              Ask me over a ๐Ÿบ some time how I found the passwords to a computer in a nuclear power plant. ๐Ÿคฆโ€โ™‚๏ธ

                              The answer was easier than "twiddle".

                              rickbelanger@mas.toR This user is from outside of this forum
                              rickbelanger@mas.toR This user is from outside of this forum
                              rickbelanger@mas.to
                              wrote last edited by
                              #52

                              @TallSimon @bytex64 @nina_kali_nina was it โ€œpasswordโ€???

                              1 Reply Last reply
                              0
                              • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                                When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

                                Ha-ha.

                                jbc@mathstodon.xyzJ This user is from outside of this forum
                                jbc@mathstodon.xyzJ This user is from outside of this forum
                                jbc@mathstodon.xyz
                                wrote last edited by
                                #53

                                @nina_kali_nina Funny, I only saw a mention of WarGames yesterday, in this (terrifying) document.

                                Trigger warning: it's for a "quantum secure agent-to-agent gossip network that you can use to collaborate, cooperate, and share state with other agents.", and the whole document is addressed to agents, so the "you" there isn't you, a human.

                                https://x0x.md/

                                It's implied that in the film, WOPR learned that "The only rational strategy is cooperation.". I haven't watched the film in years; is that what happened?

                                I thought WOPR learned that the only winning strategy is not to play. Which is, to put it mildly, not what people making agent-to-agent gossip networks are doing, exactly ๐Ÿ˜„

                                nina_kali_nina@tech.lgbtN lpbkdotnet@mstdn.socialL 2 Replies Last reply
                                0
                                • jbc@mathstodon.xyzJ jbc@mathstodon.xyz

                                  @nina_kali_nina Funny, I only saw a mention of WarGames yesterday, in this (terrifying) document.

                                  Trigger warning: it's for a "quantum secure agent-to-agent gossip network that you can use to collaborate, cooperate, and share state with other agents.", and the whole document is addressed to agents, so the "you" there isn't you, a human.

                                  https://x0x.md/

                                  It's implied that in the film, WOPR learned that "The only rational strategy is cooperation.". I haven't watched the film in years; is that what happened?

                                  I thought WOPR learned that the only winning strategy is not to play. Which is, to put it mildly, not what people making agent-to-agent gossip networks are doing, exactly ๐Ÿ˜„

                                  nina_kali_nina@tech.lgbtN This user is from outside of this forum
                                  nina_kali_nina@tech.lgbtN This user is from outside of this forum
                                  nina_kali_nina@tech.lgbt
                                  wrote last edited by
                                  #54

                                  @jbc correct, "the only winning strategy is not to play". ๐Ÿ˜†

                                  number6@fosstodon.orgN 1 Reply Last reply
                                  0
                                  • tallsimon@mstdn.caT tallsimon@mstdn.ca

                                    @bytex64 @nina_kali_nina "Twiddles?"

                                    Ask me over a ๐Ÿบ some time how I found the passwords to a computer in a nuclear power plant. ๐Ÿคฆโ€โ™‚๏ธ

                                    The answer was easier than "twiddle".

                                    bruce@darkmoon.socialB This user is from outside of this forum
                                    bruce@darkmoon.socialB This user is from outside of this forum
                                    bruce@darkmoon.social
                                    wrote last edited by
                                    #55

                                    @TallSimon @bytex64 @nina_kali_nina

                                    Looked under the keyboard?

                                    1 Reply Last reply
                                    1
                                    0
                                    • R relay@relay.infosec.exchange shared this topic
                                    • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                                      @jbc correct, "the only winning strategy is not to play". ๐Ÿ˜†

                                      number6@fosstodon.orgN This user is from outside of this forum
                                      number6@fosstodon.orgN This user is from outside of this forum
                                      number6@fosstodon.org
                                      wrote last edited by
                                      #56

                                      @nina_kali_nina @jbc

                                      Different times.

                                      When that line played, everyone in the theater cheered.

                                      jbc@mathstodon.xyzJ 1 Reply Last reply
                                      0
                                      • nina_kali_nina@tech.lgbtN nina_kali_nina@tech.lgbt

                                        When I first watched War Games (1983) I thought "wow, so weird, not only they had terrible password management, but their test 'AI' system was directly linked to the prod".

                                        Ha-ha.

                                        securitywriter@infosec.exchangeS This user is from outside of this forum
                                        securitywriter@infosec.exchangeS This user is from outside of this forum
                                        securitywriter@infosec.exchange
                                        wrote last edited by
                                        #57

                                        @nina_kali_nina As someone working in CNI for many years, this checks out as accurate.

                                        1 Reply Last reply
                                        0
                                        • jbc@mathstodon.xyzJ jbc@mathstodon.xyz

                                          @nina_kali_nina Funny, I only saw a mention of WarGames yesterday, in this (terrifying) document.

                                          Trigger warning: it's for a "quantum secure agent-to-agent gossip network that you can use to collaborate, cooperate, and share state with other agents.", and the whole document is addressed to agents, so the "you" there isn't you, a human.

                                          https://x0x.md/

                                          It's implied that in the film, WOPR learned that "The only rational strategy is cooperation.". I haven't watched the film in years; is that what happened?

                                          I thought WOPR learned that the only winning strategy is not to play. Which is, to put it mildly, not what people making agent-to-agent gossip networks are doing, exactly ๐Ÿ˜„

                                          lpbkdotnet@mstdn.socialL This user is from outside of this forum
                                          lpbkdotnet@mstdn.socialL This user is from outside of this forum
                                          lpbkdotnet@mstdn.social
                                          wrote last edited by
                                          #58

                                          @jbc @nina_kali_nina that sounds like someone confusing war games with "Colossus, The Forbin Project"

                                          I won't spoiler the plot in case you haven't seen it, but it's a very good film, and should be more widely watched...

                                          especially in the current climate

                                          jbc@mathstodon.xyzJ 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups