Hah! Yes... Trinity actually was hacking. None of this lame the net/swordfish hacking. She actually was shown using actual hacking and security analysis tools, and exploiting a real life security vulnerability.
One of the tools she used is a secuity analysis one called "nmap" which is useful for many many things, not all of them illegal either.. the author of it has some more information on his webpage -> http://www.insecure.org/
(no subject)
Date: 2003-05-18 03:49 pm (UTC)One of the tools she used is a secuity analysis one called "nmap" which is useful for many many things, not all of them illegal either.. the author of it has some more information on his webpage -> http://www.insecure.org/