Category Archives: Images

Zero Hour – S01E11 – The Hand

Yay, more code! If you split the view four ways and scroll each a little differently, it looks a lot more impressive. Source is: http://www.csee.wvu.edu/~cukic/CS350/Spring98/C_Ch10.txt

They C++-ified the code (ie, cout instead of printf). See leftmost pane in screenshot:

main()
{
   unsigned number1 = 960;

   printf("\nThe result of left shifting\n");
   displayBits(number1);
   printf("8 bit positions using the ");
   printf("left shift operator << is\n");
   displayBits(number1 << 8);

   printf("\nThe result of right shifting\n");
   displayBits(number1);
   printf("8 bit positions using the ");
   printf("right shift operator >> is\n");
   displayBits(number1 >> 8);
   return 0;
}

Screen Shot 2013-08-01 at 22.40.43

Mystery doc used as background in America’s Book of Secrets

I was watching America’s Book of Secrets – S02E10 – Presidential Assassins, and @18:57, I spotted hexdump output scrolling behind the images.  Unfortunately, the beginning frames had no obviously unique text:

Screen Shot 2013-06-18 at 23.10.13

But a few frames later, I spotted probably searchable text “rafrht Alwera”:

Screen Shot 2013-06-18 at 23.10.41

Here is where it becomes strange.  Googling for “rafrht alwera” returns just 1 hit, a PDF file that looks like it also contains hexdump output:

Screen Shot 2013-06-18 at 23.44.15

Opening the file in Acrobat and searching for the text “rafrht” returns one match but not the hexdump Google found.

Screen Shot 2013-06-18 at 23.02.20

 

Oddly, hexdump on the PDF does not show any “rafrht”. So what did Google and Acrobat find?

Castle – S05E24 – Watershed

Screen Shot 2013-05-15 at 00.15.03

I have never seen a security/firewall system like this.  On the left, I see emacs or some variant of, the status line says “edit code: mySysScan.c“.  And the middle bottom window says “*shell*“.  The lower right is some code that I cannot make out.  The rest looks familiar but I cannot identify it.

But the bigger question is, if they were looking into how somebody broke into a system, wouldn’t either/both the Security Scan or Firewall Protection Scan have alerted when the incursion occurred?  And if they did not, why would a post mortem scan produce a different result?