this post was submitted on 17 Jan 2026
643 points (98.5% liked)

memes

18931 readers
3088 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] Strider@lemmy.world 7 points 8 hours ago
[–] GeorgimusPrime@lemmy.world 2 points 6 hours ago

Tracker puts "whatever I want to do" in curly braces.

[–] Kolanaki@pawb.social 4 points 8 hours ago* (last edited 8 hours ago)

Not even that most of the time. I can think of maybe 2 movies that show actual computer stuff while everytjkng else shows entirely made up bullshit from the way a terminal looks, to visualizing a mainframe as a video game that doesn't even look like a real video game (Masterminds is so goofy).

[–] glorkon@lemmy.world 11 points 12 hours ago
[–] FreddiesLantern@leminal.space 2 points 8 hours ago

Live free or die hard 👌

[–] tomiant@piefed.social 7 points 11 hours ago

Well, having a well maintained and up to date system is a cornerstone of any good hacking practice!

[–] JackbyDev@programming.dev 5 points 11 hours ago

On Windows running tree from C:\ is a good one.

[–] sirico@feddit.uk 1 points 8 hours ago* (last edited 8 hours ago)

10 PRINT "HAKZ0RZ G0 BRRRR... "; : PRINT

INT(RND(1)*999999999);" // TERMINAL SKILL +10 FBI HACKED EPSTEIN DECRYPTED"

20 GOTO 10

[–] AldinTheMage@ttrpg.network 3 points 11 hours ago (1 children)

I watched Jurassic Park again the other day.

"It's a Unix system, I know this!"

Nedry had a very custom window manager.

[–] JackbyDev@programming.dev 3 points 11 hours ago (1 children)

Fun fact: That weird 3d navigation thing was a real program that existed. It's called fsn. Here's some information about it. https://blog.adafruit.com/2024/02/06/fsn-the-irix-3d-file-system-tool-from-jurassic-park-arttuesday-vintagecomputing-jurassicpark-whoopsie/

[–] AldinTheMage@ttrpg.network 2 points 5 hours ago

That's awesome, I never knew that! And someone made a similar tool for Linux as well

[–] Digit@lemmy.wtf 4 points 12 hours ago

There's a guy in one of the main irc chans I hang out in, who even after being there for a decade, still does not get it, still thinks we're "hackers" ... just because we run e.g. eix-sync -q ; emerge -DuvaNqtg world does not mean we're "hackers".

[–] guy@piefed.social 4 points 13 hours ago

*random hackages

[–] Naevermix@lemmy.world 1 points 11 hours ago (1 children)

just go to the C-root and type "tree"

[–] thethunderwolf@lemmy.dbzer0.com 1 points 6 hours ago

or to / for civilized people

[–] hperrin@lemmy.ca 87 points 1 day ago* (last edited 1 day ago) (6 children)

I rewatched Stranger Things season 4, which takes place in 1986, and there’s a scene where code flashes on the screen while they’re “hacking”. It shows:

  • Turbo C++ - not invented until 1990
  • HTML - 1993
  • HTTPS - 1994 (it’s called htsps on the screen)
  • PHP - 1995
  • CSS - 1996
  • Iframe - 1997
  • C# - 2000
  • .NET Framework - 2002
  • CoffeeScript - 2009
  • Flexbox - 2009
[–] eah@programming.dev 2 points 7 hours ago

The Stranger Things universe has time travel confirmed.

[–] Echolynx@lemmy.zip 13 points 1 day ago (2 children)

Mr. Robot really spoiled me. How does that shit fly under the radar for such a high production show?

[–] moonburster@lemmy.world 3 points 13 hours ago (1 children)

Been a while since I watched it. Did they actually take the time to do it right in that show?

[–] vortexsurfer@lemmy.world 6 points 8 hours ago (1 children)

Yeah. It was very realistic. Sometimes they simplified explanations a bit. They had real hackers as consultants, and Sam Esmail, the creator of the show, was into hacking and computers as a teen.

[–] moonburster@lemmy.world 1 points 7 hours ago
[–] tomiant@piefed.social 1 points 11 hours ago

He didn't use arch, btw.

[–] Proprietary_Blend@lemmy.world 69 points 1 day ago

Literally unwatchable

[–] Buffy@libretechni.ca 14 points 1 day ago (1 children)

Hey, at least they used something based in reality opposed to the traditional falling Matrix text... Actually, on second thought, that might be a little bit cooler.

[–] Holytimes@sh.itjust.works 8 points 21 hours ago

At least if your goanna mombo and jumbo and make stuff up.

Do it with some flare

[–] NotSteve_@piefed.ca 27 points 1 day ago (1 children)

Amateur... They should have just typed TREE and hit enter like the professionals

[–] tomiant@piefed.social 5 points 11 hours ago* (last edited 11 hours ago)

btop

All the hacking flash u need. A hacker needs to know the exact temperature of each CPU core at once at all times. In spaced out colors, for clarity.

[–] valen@piefed.social 6 points 1 day ago (1 children)

Should type in

call -151

(Apple 2 assembly entrance)

load more comments (1 replies)
[–] REDACTED@infosec.pub 16 points 1 day ago

Mr. Robot: Hold my editor

[–] CarbonatedPastaSauce@lemmy.world 45 points 1 day ago (1 children)

I seem to remember reading that what Trinity did in the opening scenes of The Matrix before the police busted in was actually doing a real exploit. So it got done properly at least once!

[–] tropicaldingdong@piefed.world 30 points 1 day ago
[–] CyberEgg@discuss.tchncs.de 18 points 1 day ago (5 children)

I once watched some police procedural show (don't remember which copaganda it was exactly) where they were trying to track someone's location online. Couldn't stop laughing when they showed an IPv4 address starting with 624.

[–] Jesus_666@lemmy.world 16 points 1 day ago (1 children)

Mind you, that's for the same reason all American phone numbers in shows have a 555 prefix – showing a real address could lead to liability if e.g. someone tries to launch an attack on that address they saw on TV.

Unlike phone numbering schemes, the IPv4 address space has no well-known area reserved for fictitious addresses. Sure, you could use something like 192.0.2.0/24, 198.51.100.0/24, or 203.0.113.0/24 (test networks for use in documentation), but those aren't well-known outside of certain circles.

So they just go with completely invalid addresses because that's easy.

[–] python@lemmy.world 13 points 1 day ago (2 children)

Just use 127.0.0.1 as the address and let hackers try to attack it.

[–] daddycool@lemmy.world 5 points 10 hours ago* (last edited 10 hours ago)

This guy sure has a lot of porn.

[–] Tyrq@lemmy.dbzer0.com 13 points 1 day ago (1 children)
[–] Knock_Knock_Lemmy_In@lemmy.world 3 points 11 hours ago

The call is coming from inside the house.

load more comments (4 replies)
[–] tetris11@feddit.uk 8 points 1 day ago* (last edited 1 day ago) (2 children)

Here's a trigger for you all: Numb3rs description of IRC

"Two ships meeting in uncharted waters". Are you fucking kidding me?

[–] Digit@lemmy.wtf 3 points 12 hours ago (1 children)
[–] Illogicalbit@lemmy.world 3 points 12 hours ago

The gold standard, IMO

[–] Holytimes@sh.itjust.works 4 points 21 hours ago (1 children)

You should be given 10 lashing over a barrel with the cat o nine for linking that.

WHERES THE QUATERMASTER TELL EM TO BRING THE CAT

[–] tetris11@feddit.uk 1 points 16 hours ago

A loud yowling, generally irritatated cat is plonked unceremoniously on the table

what, what now

[–] FirmDistribution@lemmy.world 25 points 1 day ago
[–] squirrel@piefed.kobel.fyi 19 points 1 day ago
[–] YiddishMcSquidish@lemmy.today 10 points 1 day ago* (last edited 1 day ago)

I left a story if almost exactly this. Had to update a six person halo shooter arcade game. It runs on Linux. Took a bunch of trouble shooting to 1 get it to update over Internet, & 2 give up and just use a flash drive. But we had opened by then and a bunch of people gathered around whispering "to he's hacking like in the movies!". I was using a Bluetooth keyboard made to be used by two thumbs....

[–] Nangijala@feddit.dk 5 points 1 day ago (1 children)

I can relate whenever there are scenes in movies where characters are supposed to make art. Either the actor movies the pen or brush in a way that betrays that they have zero understanding of what they're doing or the art itself is hilariously mediocre despite being supposedly magnificent and beautiful according to other characters in the movie.

load more comments (1 replies)
[–] db2@lemmy.world 15 points 1 day ago (2 children)
[–] tehBishop@sh.itjust.works 1 points 11 hours ago* (last edited 11 hours ago)

The Plague, the greatest corporate cyber-sec guy of all time. He even had Penn working for him.

load more comments (1 replies)
load more comments
view more: next ›