Quote:
Originally posted by telekinetic
A. Hackers use command lines to impliment published exploits to gain access to secure systems (Matrix II)
|
When I took my dad and brother to see that movie, my dad (who has a PhD in geek-related stuff) and I stood up and cheered. We got so many weird looks from the random... users.
*sudders in distaste*