this post was submitted on 17 Jan 2026
683 points (98.6% liked)

memes

20176 readers
1233 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] hperrin@lemmy.ca 94 points 1 month ago* (last edited 1 month ago) (6 children)

I rewatched Stranger Things season 4, which takes place in 1986, and there’s a scene where code flashes on the screen while they’re “hacking”. It shows:

  • Turbo C++ - not invented until 1990
  • HTML - 1993
  • HTTPS - 1994 (it’s called htsps on the screen)
  • PHP - 1995
  • CSS - 1996
  • Iframe - 1997
  • C# - 2000
  • .NET Framework - 2002
  • CoffeeScript - 2009
  • Flexbox - 2009
[–] Proprietary_Blend@lemmy.world 72 points 1 month ago

Literally unwatchable

[–] NotSteve_@piefed.ca 29 points 1 month ago (1 children)

Amateur... They should have just typed TREE and hit enter like the professionals

[–] tomiant@piefed.social 6 points 1 month ago* (last edited 1 month ago)

btop

All the hacking flash u need. A hacker needs to know the exact temperature of each CPU core at once at all times. In spaced out colors, for clarity.

[–] Echolynx@lemmy.zip 14 points 1 month ago (2 children)

Mr. Robot really spoiled me. How does that shit fly under the radar for such a high production show?

[–] moonburster@lemmy.world 4 points 1 month ago (1 children)

Been a while since I watched it. Did they actually take the time to do it right in that show?

[–] vortexsurfer@lemmy.world 8 points 1 month ago (1 children)

Yeah. It was very realistic. Sometimes they simplified explanations a bit. They had real hackers as consultants, and Sam Esmail, the creator of the show, was into hacking and computers as a teen.

load more comments (1 replies)
load more comments (1 replies)
[–] Buffy@libretechni.ca 14 points 1 month ago (1 children)

Hey, at least they used something based in reality opposed to the traditional falling Matrix text... Actually, on second thought, that might be a little bit cooler.

[–] Holytimes@sh.itjust.works 8 points 1 month ago

At least if your goanna mombo and jumbo and make stuff up.

Do it with some flare

[–] valen@piefed.social 6 points 1 month ago (1 children)

Should type in

call -151

(Apple 2 assembly entrance)

[–] anomnom@sh.itjust.works 4 points 1 month ago

Yeahhh. Apple IIe, just turn it off, stick a disk in and turn it back on!

[–] eah@programming.dev 3 points 1 month ago

The Stranger Things universe has time travel confirmed.

[–] CarbonatedPastaSauce@lemmy.world 47 points 1 month ago (1 children)

I seem to remember reading that what Trinity did in the opening scenes of The Matrix before the police busted in was actually doing a real exploit. So it got done properly at least once!

[–] tropicaldingdong@piefed.world 32 points 1 month ago
[–] FirmDistribution@lemmy.world 26 points 1 month ago
[–] CyberEgg@discuss.tchncs.de 20 points 1 month ago (3 children)

I once watched some police procedural show (don't remember which copaganda it was exactly) where they were trying to track someone's location online. Couldn't stop laughing when they showed an IPv4 address starting with 624.

[–] Jesus_666@lemmy.world 16 points 1 month ago (1 children)

Mind you, that's for the same reason all American phone numbers in shows have a 555 prefix – showing a real address could lead to liability if e.g. someone tries to launch an attack on that address they saw on TV.

Unlike phone numbering schemes, the IPv4 address space has no well-known area reserved for fictitious addresses. Sure, you could use something like 192.0.2.0/24, 198.51.100.0/24, or 203.0.113.0/24 (test networks for use in documentation), but those aren't well-known outside of certain circles.

So they just go with completely invalid addresses because that's easy.

[–] python@lemmy.world 14 points 1 month ago (2 children)

Just use 127.0.0.1 as the address and let hackers try to attack it.

[–] Tyrq@lemmy.dbzer0.com 13 points 1 month ago (1 children)
load more comments (1 replies)
[–] daddycool@lemmy.world 5 points 1 month ago* (last edited 1 month ago)

This guy sure has a lot of porn.

[–] InnerScientist@lemmy.world 3 points 1 month ago (1 children)

He's too good, I can't trace his ip!

They should've traced his ipv6, while 624::/16 isn't currently allocated, it is at least usable if we need it.

[–] user224@lemmy.sdf.org 6 points 1 month ago* (last edited 1 month ago) (1 children)

Well, well, well.

If we go outside of dottted decimal notation of IPv4, we can have addresses starting with 624. They can also be in decimal, octal, and hexadecimal.
Oh, and IPv4 also supports shortening from middle right in dotted decimal. For example, 127.0.0.1 is too long, often you may be able to use 127.1.
Or you can go to Cloudflare's https://1.1/

[–] InnerScientist@lemmy.world 3 points 1 month ago

While you can convert (or rather represent) an ipv4 as decimal, op indirectly stated that they were in dotted decimal notation and as such the leading 624 doesn't work in that context.

Also shortening ipv4 is cursed, why must you share this knowledge?

Also also, curious to note that glibc parses 1 as ipv4 0.0.0.1 and not ipv6 ::1, probably because they predate ipv6.

load more comments (1 replies)
[–] squirrel@piefed.kobel.fyi 19 points 1 month ago
[–] REDACTED@infosec.pub 16 points 1 month ago

Mr. Robot: Hold my editor

[–] Samsy@lemmy.ml 15 points 1 month ago (1 children)

Normies: "shut up, he is doing magic stuff"

[–] db2@lemmy.world 15 points 1 month ago (2 children)
load more comments (2 replies)
[–] glorkon@lemmy.world 13 points 1 month ago
[–] YiddishMcSquidish@lemmy.today 11 points 1 month ago* (last edited 1 month ago)

I left a story if almost exactly this. Had to update a six person halo shooter arcade game. It runs on Linux. Took a bunch of trouble shooting to 1 get it to update over Internet, & 2 give up and just use a flash drive. But we had opened by then and a bunch of people gathered around whispering "to he's hacking like in the movies!". I was using a Bluetooth keyboard made to be used by two thumbs....

[–] Strider@lemmy.world 9 points 1 month ago (2 children)
load more comments (2 replies)
[–] tomiant@piefed.social 8 points 1 month ago

Well, having a well maintained and up to date system is a cornerstone of any good hacking practice!

[–] goodboyjojo@lemmy.world 8 points 1 month ago (1 children)

Yeah most hacking scenes are ridiculous. Shows like mr.robot are more realistic.

[–] TheEighthDoctor@lemmy.zip 6 points 1 month ago

The problem is that now they are outdated as fuck

[–] tetris11@feddit.uk 8 points 1 month ago* (last edited 1 month ago) (2 children)

Here's a trigger for you all: Numb3rs description of IRC

"Two ships meeting in uncharted waters". Are you fucking kidding me?

[–] Digit@lemmy.wtf 4 points 1 month ago (1 children)
[–] Illogicalbit@lemmy.world 4 points 1 month ago

The gold standard, IMO

[–] Holytimes@sh.itjust.works 4 points 1 month ago (1 children)

You should be given 10 lashing over a barrel with the cat o nine for linking that.

WHERES THE QUATERMASTER TELL EM TO BRING THE CAT

load more comments (1 replies)
[–] Fmstrat@lemmy.world 6 points 1 month ago (1 children)

I remember watching Mr. Robot and then learning they actually brought in a good consultant. Probably the first time I felt things seemed legit'ish.

[–] Nugscree@lemmy.world 5 points 1 month ago (1 children)

People talked about the steps that Trinity takes to take down the energy grid in the Matrix (3?) is pretty legit as well.

load more comments (1 replies)
[–] Nangijala@feddit.dk 5 points 1 month ago (1 children)

I can relate whenever there are scenes in movies where characters are supposed to make art. Either the actor movies the pen or brush in a way that betrays that they have zero understanding of what they're doing or the art itself is hilariously mediocre despite being supposedly magnificent and beautiful according to other characters in the movie.

[–] tetris11@feddit.uk 4 points 1 month ago

Same with violins. Like, do they just not understand where the bow is supposed to rest? Have they never seen a violin in their lives?

[–] RoidingOldMan@lemmy.world 5 points 1 month ago
[–] JackbyDev@programming.dev 5 points 1 month ago

On Windows running tree from C:\ is a good one.

[–] Digit@lemmy.wtf 4 points 1 month ago

There's a guy in one of the main irc chans I hang out in, who even after being there for a decade, still does not get it, still thinks we're "hackers" ... just because we run e.g. eix-sync -q ; emerge -DuvaNqtg world does not mean we're "hackers".

[–] guy@piefed.social 4 points 1 month ago

*random hackages

[–] Kolanaki@pawb.social 4 points 1 month ago* (last edited 1 month ago)

Not even that most of the time. I can think of maybe 2 movies that show actual computer stuff while everytjkng else shows entirely made up bullshit from the way a terminal looks, to visualizing a mainframe as a video game that doesn't even look like a real video game (Masterminds is so goofy).

[–] jason@discuss.online 4 points 1 month ago* (last edited 1 month ago)

I vaguely remember a movie or show that was compiling something with cmake which has some pretty clean output.

[–] AldinTheMage@ttrpg.network 3 points 1 month ago (2 children)

I watched Jurassic Park again the other day.

"It's a Unix system, I know this!"

Nedry had a very custom window manager.

load more comments (2 replies)
load more comments
view more: next ›