Hah! Yes... Trinity actually was hacking. None of this lame the net/swordfish hacking. She actually was shown using actual hacking and security analysis tools, and exploiting a real life security vulnerability.
One of the tools she used is a secuity analysis one called "nmap" which is useful for many many things, not all of them illegal either.. the author of it has some more information on his webpage -> http://www.insecure.org/
no subject
One of the tools she used is a secuity analysis one called "nmap" which is useful for many many things, not all of them illegal either.. the author of it has some more information on his webpage -> http://www.insecure.org/