<Ul> <Li> The Blue Pill rootkit ("malware")--named in reference to the pill as are the Red Pill techniques used to combat it--is a special type of software that utilizes the virtualization techniques of modern central processing units (CPUs) to execute as a hypervisor; as a virtual platform on which the entire operating system runs, it is capable of examining the entire state of the machine and to cause any behavior with full privilege, while the operating system "believes" itself to be running directly on physical hardware, creating a parallel to the illusory Matrix . Blue Pill describes the concept of infecting a machine while Red Pill techniques help the operating system to detect the presence of such a hypervisor . These concepts were described by Joanna Rutkowska in 2006 . </Li> <Li> In cybersecurity, a red pill is any means of detecting hooking or virtualization . It is frequently used by anti-cheat, antirootkit software, malware, and digital rights management, etc . Red pills usually make use of real - time clocks to measure the time it takes for critical operations and interactions with peripheral hardware to occur, and compare the length of them with the expected length of such operations as they occur without virtualization . If the clock is compromised, the hypervisor can hide its presence by slowing the clock down in a controlled way, to hide the extra time imposed by virtualization . </Li> <Li> Until they were removed from the Maemo operating system application installer in January 2010, certain advanced features were unlocked by a "Red Pill Mode" Easter egg to prevent accidental use by novice users but make them readily available to experienced users . This was activated by starting to add a catalog whose URL was "matrix" and then choosing to cancel . A dialog box would appear asking "Which pill?" with the choices "Red" or "Blue", allowing the user to enter red pill mode . In "Red Pill" mode, the installer allows the user to view and reconfigure system packages whose existence it normally does not acknowledge . In Blue Pill mode the installer displays only software installed by a user, creating the illusion that system software does not exist on the system . </Li> <Li> The choice between taking a blue or red pill is a central metaphor in the 2011 Arte documentary film Marx Reloaded, in which philosophers including Slavoj Žižek and Nina Power explore solutions to the global economic and financial crisis of 2008--09 . The film also contains an animated parody of the red / blue pill scene in The Matrix, with Leon Trotsky as Morpheus and Karl Marx as Neo . </Li> <Li> In some parts of the men's rights movement, the term "red pill" has been used as a metaphor for the specific moment when they come to the belief that certain gender roles they are expected to conform to, such as marriage and monogamy, are intended to benefit women, not themselves . In 2016, a documentary titled The Red Pill was released, which deals with the men's rights movement . </Li> </Ul> <Li> The Blue Pill rootkit ("malware")--named in reference to the pill as are the Red Pill techniques used to combat it--is a special type of software that utilizes the virtualization techniques of modern central processing units (CPUs) to execute as a hypervisor; as a virtual platform on which the entire operating system runs, it is capable of examining the entire state of the machine and to cause any behavior with full privilege, while the operating system "believes" itself to be running directly on physical hardware, creating a parallel to the illusory Matrix . Blue Pill describes the concept of infecting a machine while Red Pill techniques help the operating system to detect the presence of such a hypervisor . These concepts were described by Joanna Rutkowska in 2006 . </Li> <Li> In cybersecurity, a red pill is any means of detecting hooking or virtualization . It is frequently used by anti-cheat, antirootkit software, malware, and digital rights management, etc . Red pills usually make use of real - time clocks to measure the time it takes for critical operations and interactions with peripheral hardware to occur, and compare the length of them with the expected length of such operations as they occur without virtualization . If the clock is compromised, the hypervisor can hide its presence by slowing the clock down in a controlled way, to hide the extra time imposed by virtualization . </Li> <Li> Until they were removed from the Maemo operating system application installer in January 2010, certain advanced features were unlocked by a "Red Pill Mode" Easter egg to prevent accidental use by novice users but make them readily available to experienced users . This was activated by starting to add a catalog whose URL was "matrix" and then choosing to cancel . A dialog box would appear asking "Which pill?" with the choices "Red" or "Blue", allowing the user to enter red pill mode . In "Red Pill" mode, the installer allows the user to view and reconfigure system packages whose existence it normally does not acknowledge . In Blue Pill mode the installer displays only software installed by a user, creating the illusion that system software does not exist on the system . </Li>

I took two red pills to take the blues away