sexta-feira, 17 de outubro de 2014

10 Examples Where Movies/TV Got Hacking Wrong

Nowadays, TV shows or cinema insist on being hip and cold by throwing in a few tech tract points into a mix. However, a thing about Hollywood is that the Rule of Cool contingency always overwrite reality. Because by a Hollywood executive’s reasoning, if it doesn’t demeanour cold on screen, afterwards it won’t sell tickets. So even if it is technically wrong, it contingency demeanour like it’s copy money. Just ask Disney about that lemming incident.


When it comes to computers, one gets a clarity that Hollywood writers don’t know what they are articulate about. Every time a impression even approaches a mechanism or anything tech related, chances are they’ll get something about it wrong. This is even some-more clear in a mechanism crime that is hacking. Hollywood customarily doesn’t seem to get it. Here are 10 of a some-more laughable examples where they got hacking unequivocally wrong.



1. NCIS: Two Hands Too Many


You don’t have to be that mechanism lettered to know since this stage is full of fail. Even those who are customarily accustomed to essay on typewriters will know that 2 people handling on a same keyboard doesn’t make a lick of sense. Not to discuss a series of pop-ups that keep appearing on screen. It’s a consternation they can combine during all staring during that shade while flaying on that keyboard.



2. Unthinkable: Excel-lent Disposal Skills


So a explosve is about to raze during any moment. And a mechanism hacker is indispensable to lame a bomb. So what does a hacker use to do a trick? Why, typing purposeless characters into Microsoft Excel of course! So in further to Excel being a apparatus of an accountant, it is now a explosve ordering device. See kids? This is since we should implement unstable Excel on your ride drive.



3. Hackers: It’s Not How ANY Of This Works


Remember during a 90′s when mechanism record was starting to mangle into a mainstream? Computers were seen as this fabulous contraption that can do anything and hackers were mysterious, anti-social techno wizards that can move down a energy grid with a few keystrokes.


The film aptly called Hackers played those tropes in full force and even tops it off with 3D graphics that creates hacking demeanour like a video game. Heck, not even with a hacking, a whole record complement is in 3D. Imagine how emasculate their whole classification is customarily perplexing to find a word request in that thing.



4. Jurassic Park: Because Clicking Takes Skill


Saying “It’s Unix!” is like observant “It’s Windows!” or “It’s a Mac!”. And observant that we can use it is like observant we can use a normal, normal computer. Case in point, OS X is indeed Unix-based. As a side note, some people contend that the 3D UI is impossibly unrealistic and a box of Hollywood not meaningful computers (as usual).


However, it indeed is a real, initial record system, identical to a thought shown in Hackers. Obviously, it didn’t locate on though it’s a good hold during attempted realism for those in a know.



5. Masterminds: Hacking Is A Game Now


Another film that portrayed hacking as some arrange of video game. It’s even worse than Hackers since it indeed is a video game. The whole GUI is some arrange of ‘Dungeon and Dragons’ video game, revelation us a assembly that a aim house spent approach too many of their bill for this. They afterwards give a hacker 2 mins to ‘hack’ them instead of customarily kicking him out. They even tell him that he’s being tracked instead of, we know, not revelation him. And when he does get in, he gets to download all a files willy nilly. The cheesy stone song doesn’t assistance either.



6. Firewall: Too Distant To Connect


This is a box where they got it so tighten to being right though unsuccessful in a nitty dirty details. The “10,000 songs, 10,000 comment codes” bit is scold as a iPod is simply a storage device though a approach he rubbed it is totally wrong. For one thing, you can’t customarily block a fax scanner conduct to an iPod and design it to commend it. It’s like plugging your iPod into a 20 year aged write and awaiting it to record phone calls. It customarily doesn’t work like that. If this were to unequivocally work, he had to bond a conduct to something that can appreciate a information and afterwards bucket it to a iPod.



7. Numb3rs: Giving IRC Far Too Much Credit


Where do we consider hackers would go if they don’t wish to be caught? Why IRC of course! Ugh. For those who don’t know, IRC stands for Internet Chat Relay and is mostly a unequivocally elementary discuss protocol. Let’s mangle this down.


First, a drug vessel analogy is totally meaningless. Just some 3D graphics and purposeless jabber to make it sound harder than it unequivocally is. Second, IRC is used by millions of normal people worldwide. Not accurately a tip hacker den, is it? Next, formulating an warning to find a sold username? Better wish we don’t change it or that a thousand other people are regulating it. Finally, “I pronounce L33T”. S0 d0 1, 1t’5 n0t th4t h4rd.



8. CSI:NY : Virtual Chase Gone South


Spoiler alert: we am going to shamelessly slice detached CSI: NY for how they execute computers on a show. The initial one is the barbarous ‘Second Life’ follow scene. If a think had any volume of sense, he would have customarily logged out instead of pointlessly using around. And using to locate a man who is done adult of 1′s and 0′s. Ridiculous. And pinging a customarily tells we that a chairman is online.



9. CSI:NY : Hack Via Layout Codes


Using a penetrate to benefit advantage in a video diversion is zero new. I’m certain many gamers have used lie inclination during one time or another. They customarily engage lie codes, lie programs or lie inclination (GameShark4Life). But it takes a special kind of idiot/genius to use HTML blueprint codes to penetrate a multiplayer event of ‘Gears Of War‘. If this was a browser formed game, it would be rather distinct though this is like revelation a French man to give adult all his income by display him a agreement in English.



10. CSI:NY : Visual Basic To Track IP


There was a Reddit post from someone that claimed to be a author for TV shows such as CSI and Numb3rs. He says that they intentionally put these kind of technobabble as a arrange of in-joke among TV uncover writers, to see who can get a misfortune line on TV. And after examination this scene, I’m prone to trust him. Why worry formulating a “Graphical User Interface”, on Visual Basic no less, customarily to get an IP address? Just open adult a authority prompt. Even Uncle Google can do that if we ask him.





10 Examples Where Movies/TV Got Hacking Wrong

Nenhum comentário:

Postar um comentário