this post was submitted on 17 Jan 2026
797 points (98.8% liked)

memes

18945 readers
2244 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] Strider@lemmy.world 8 points 17 hours ago
[–] glorkon@lemmy.world 13 points 21 hours ago
[–] Kolanaki@pawb.social 5 points 17 hours ago* (last edited 17 hours ago)

Not even that most of the time. I can think of maybe 2 movies that show actual computer stuff while everytjkng else shows entirely made up bullshit from the way a terminal looks, to visualizing a mainframe as a video game that doesn't even look like a real video game (Masterminds is so goofy).

[–] GeorgimusPrime@lemmy.world 3 points 15 hours ago

Tracker puts "whatever I want to do" in curly braces.

[–] tomiant@piefed.social 8 points 20 hours ago

Well, having a well maintained and up to date system is a cornerstone of any good hacking practice!

[–] JackbyDev@programming.dev 7 points 20 hours ago

On Windows running tree from C:\ is a good one.

[–] FreddiesLantern@leminal.space 3 points 17 hours ago

Live free or die hard 👌

[–] sirico@feddit.uk 3 points 17 hours ago* (last edited 17 hours ago)

10 PRINT "HAKZ0RZ G0 BRRRR... "; : PRINT

INT(RND(1)*999999999);" // TERMINAL SKILL +10 FBI HACKED EPSTEIN DECRYPTED"

20 GOTO 10

[–] Naevermix@lemmy.world 3 points 20 hours ago (1 children)

just go to the C-root and type "tree"

[–] thethunderwolf@lemmy.dbzer0.com 2 points 16 hours ago

or to / for civilized people

[–] AldinTheMage@ttrpg.network 3 points 20 hours ago (1 children)

I watched Jurassic Park again the other day.

"It's a Unix system, I know this!"

Nedry had a very custom window manager.

[–] JackbyDev@programming.dev 7 points 20 hours ago (1 children)

Fun fact: That weird 3d navigation thing was a real program that existed. It's called fsn. Here's some information about it. https://blog.adafruit.com/2024/02/06/fsn-the-irix-3d-file-system-tool-from-jurassic-park-arttuesday-vintagecomputing-jurassicpark-whoopsie/

[–] AldinTheMage@ttrpg.network 2 points 14 hours ago

That's awesome, I never knew that! And someone made a similar tool for Linux as well

[–] guy@piefed.social 4 points 22 hours ago

*random hackages

[–] Digit@lemmy.wtf 3 points 21 hours ago

There's a guy in one of the main irc chans I hang out in, who even after being there for a decade, still does not get it, still thinks we're "hackers" ... just because we run e.g. eix-sync -q ; emerge -DuvaNqtg world does not mean we're "hackers".

[–] hperrin@lemmy.ca 117 points 1 day ago* (last edited 1 day ago) (7 children)

I rewatched Stranger Things season 4, which takes place in 1986, and there’s a scene where code flashes on the screen while they’re “hacking”. It shows:

  • Turbo C++ - not invented until 1990
  • HTML - 1993
  • HTTPS - 1994 (it’s called htsps on the screen)
  • PHP - 1995
  • CSS - 1996
  • Iframe - 1997
  • C# - 2000
  • .NET Framework - 2002
  • CoffeeScript - 2009
  • Flexbox - 2009
[–] eah@programming.dev 3 points 16 hours ago

The Stranger Things universe has time travel confirmed.

[–] Echolynx@lemmy.zip 21 points 1 day ago (2 children)

Mr. Robot really spoiled me. How does that shit fly under the radar for such a high production show?

[–] tomiant@piefed.social 4 points 20 hours ago

He didn't use arch, btw.

[–] moonburster@lemmy.world 5 points 22 hours ago (1 children)

Been a while since I watched it. Did they actually take the time to do it right in that show?

[–] vortexsurfer@lemmy.world 8 points 18 hours ago (1 children)

Yeah. It was very realistic. Sometimes they simplified explanations a bit. They had real hackers as consultants, and Sam Esmail, the creator of the show, was into hacking and computers as a teen.

[–] moonburster@lemmy.world 2 points 16 hours ago
[–] Proprietary_Blend@lemmy.world 86 points 1 day ago

Literally unwatchable

[–] NotSteve_@piefed.ca 36 points 1 day ago (1 children)

Amateur... They should have just typed TREE and hit enter like the professionals

[–] tomiant@piefed.social 5 points 20 hours ago* (last edited 20 hours ago)

btop

All the hacking flash u need. A hacker needs to know the exact temperature of each CPU core at once at all times. In spaced out colors, for clarity.

[–] Buffy@libretechni.ca 15 points 1 day ago (1 children)

Hey, at least they used something based in reality opposed to the traditional falling Matrix text... Actually, on second thought, that might be a little bit cooler.

[–] Holytimes@sh.itjust.works 11 points 1 day ago

At least if your goanna mombo and jumbo and make stuff up.

Do it with some flare

load more comments (2 replies)
[–] CarbonatedPastaSauce@lemmy.world 61 points 1 day ago (1 children)

I seem to remember reading that what Trinity did in the opening scenes of The Matrix before the police busted in was actually doing a real exploit. So it got done properly at least once!

[–] REDACTED@infosec.pub 18 points 1 day ago

Mr. Robot: Hold my editor

[–] tropicaldingdong@piefed.world 43 points 1 day ago
[–] CyberEgg@discuss.tchncs.de 21 points 1 day ago (5 children)

I once watched some police procedural show (don't remember which copaganda it was exactly) where they were trying to track someone's location online. Couldn't stop laughing when they showed an IPv4 address starting with 624.

[–] Jesus_666@lemmy.world 20 points 1 day ago (1 children)

Mind you, that's for the same reason all American phone numbers in shows have a 555 prefix – showing a real address could lead to liability if e.g. someone tries to launch an attack on that address they saw on TV.

Unlike phone numbering schemes, the IPv4 address space has no well-known area reserved for fictitious addresses. Sure, you could use something like 192.0.2.0/24, 198.51.100.0/24, or 203.0.113.0/24 (test networks for use in documentation), but those aren't well-known outside of certain circles.

So they just go with completely invalid addresses because that's easy.

[–] python@lemmy.world 20 points 1 day ago (2 children)

Just use 127.0.0.1 as the address and let hackers try to attack it.

[–] daddycool@lemmy.world 6 points 19 hours ago* (last edited 19 hours ago)

This guy sure has a lot of porn.

[–] Tyrq@lemmy.dbzer0.com 16 points 1 day ago (1 children)
[–] Knock_Knock_Lemmy_In@lemmy.world 3 points 20 hours ago

The call is coming from inside the house.

load more comments (4 replies)
[–] FirmDistribution@lemmy.world 29 points 1 day ago
[–] squirrel@piefed.kobel.fyi 29 points 1 day ago
[–] tetris11@feddit.uk 9 points 1 day ago* (last edited 1 day ago) (2 children)

Here's a trigger for you all: Numb3rs description of IRC

"Two ships meeting in uncharted waters". Are you fucking kidding me?

[–] Digit@lemmy.wtf 6 points 21 hours ago (1 children)
[–] Illogicalbit@lemmy.world 4 points 21 hours ago

The gold standard, IMO

[–] Holytimes@sh.itjust.works 5 points 1 day ago (1 children)

You should be given 10 lashing over a barrel with the cat o nine for linking that.

WHERES THE QUATERMASTER TELL EM TO BRING THE CAT

[–] tetris11@feddit.uk 2 points 1 day ago

A loud yowling, generally irritatated cat is plonked unceremoniously on the table

what, what now

[–] Nangijala@feddit.dk 9 points 1 day ago (1 children)

I can relate whenever there are scenes in movies where characters are supposed to make art. Either the actor movies the pen or brush in a way that betrays that they have zero understanding of what they're doing or the art itself is hilariously mediocre despite being supposedly magnificent and beautiful according to other characters in the movie.

load more comments (1 replies)
[–] YiddishMcSquidish@lemmy.today 12 points 1 day ago* (last edited 1 day ago)

I left a story if almost exactly this. Had to update a six person halo shooter arcade game. It runs on Linux. Took a bunch of trouble shooting to 1 get it to update over Internet, & 2 give up and just use a flash drive. But we had opened by then and a bunch of people gathered around whispering "yo he's hacking like in the movies!". I was using a Bluetooth keyboard made to be used by two thumbs....

[–] db2@lemmy.world 17 points 1 day ago (2 children)
[–] tehBishop@sh.itjust.works 2 points 20 hours ago* (last edited 20 hours ago)

The Plague, the greatest corporate cyber-sec guy of all time. He even had Penn working for him.

load more comments (1 replies)
[–] goodboyjojo@lemmy.world 10 points 1 day ago (1 children)

Yeah most hacking scenes are ridiculous. Shows like mr.robot are more realistic.

load more comments (1 replies)
load more comments
view more: next ›