• Margot Robbie@lemm.ee
    link
    fedilink
    arrow-up
    22
    arrow-down
    1
    ·
    1 year ago

    As an actress, that’s nonsense, if hacking scenes in movies are fake, then how do you explain this documentary I watched where this hacker man hacked a kung fu fighting cop back in time to kill Hitler (and David Hasselhoff was there for some reason, too)?

    • Weirdfish@lemmy.world
      link
      fedilink
      arrow-up
      9
      arrow-down
      1
      ·
      1 year ago

      Why? Do people behave in an unrealistic manner? Like taking precautions, social distancing, wear masks, believing that its real?

  • Sparking@lemm.ee
    link
    fedilink
    English
    arrow-up
    15
    ·
    1 year ago

    I thought the bash history in tron: legacy was kind of clever. There was stuff like vi last_will_and_testament.txt before the computer ducking command. I remember being surprised some prop designer knew enough about computers to set up that easter egg. Although I think I was reading that they contracted out the design of the OS to some team or something.

    • Treczoks@kbin.social
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      I remember a scene of such a crime movie that was at least funny for people used to computers and progrmmers.

      The (old and seasoned) detectives were brought in contact with the new “cyber unit” of the police. Stored away in an otherwise empty office floor somewhere, they were the absolute movie style hackers: cluttered desks, sloppy outfit, beards. The old detectives were quite reluctant to work with those young “computer people” and had a lot of prejudices. Then, one of the detectives found a big red button on the desk and said “I wonder what happens when I press this button” - and presses it. And the “cyber guys”: “DON’T!”. The detective mocks them, and presses the button several times before he asks what the button actually does. Cyber guy: “That is our ‘order pizza’ button! I hope you’ve got enough money to pay for this…”. Cut. Next scene: They are all eating pizza together from a desk-high stack of pizza boxes.

        • Treczoks@kbin.social
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          Back in Ye Olden Days, we probably had the first web interface to order pizza. “We” had been a long-established computer nerd meeting, and this pizza service that normally was closed on Sundays actually opened just for us on that weekend just for the occasion. We had an internal web page to order and organize orders of pizza. But of course, the order did not go out electronically - when our web app saw the need to place the order, is simply sent a fax ;-)

    • SokathHisEyesOpen@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      I love how the smug manager thinks he’s thwarted the attack on the server since he unplugged the monitor to the terminal where people were defending against the attack.

    • ram@bookwormstory.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 year ago

      You know, I’ve seen this dozens of times but I’m just realizing, at least assuming that’s not a power bar (which would be odd since it matches the plug of the monitor or PC), since the monitor shut of straight away, he actually only unplugged the monitor. The PC should still be on and getting hacked.

      • Spzi@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        Yes, my favorite comment:

        pulls out the power cord for the monitor

        Job done!

        followed by:

        Attacker must have had 5 people on the keyboard.

  • Draconic NEO@lemmy.sdf.org
    link
    fedilink
    arrow-up
    15
    arrow-down
    1
    ·
    1 year ago

    Funnily enough I have to hide terminal windows when updating while I’m around any of my less tech savy friends who think it’s scary or creepy. I really dislike them portraying this as “hacking”.

    • HughJanus@lemmy.ml
      link
      fedilink
      arrow-up
      7
      arrow-down
      2
      ·
      edit-2
      1 year ago

      I am not a programmer by any means but I know enough to know they did their research.

      Except Tyrell called it “nome” instead of “g’nome” and I’m pretty sure TOR exit nodes can only see unencrypted data and the entry node can only see who sent it.

      • archon@sh.itjust.works
        link
        fedilink
        arrow-up
        5
        ·
        edit-2
        1 year ago

        …is gnome meant to be read as ‘genome’? Never realised that was a possibility as a non-native English speaker. Always based it off the garden variety Gnome with a silent G.

        This is like sequel or ess-que-ell all over!

        • HughJanus@lemmy.ml
          link
          fedilink
          arrow-up
          4
          arrow-down
          1
          ·
          1 year ago

          is gnome meant to be read as ‘genome’?

          If we’re being pedantic, yes 🙂

          • SokathHisEyesOpen@lemmy.ml
            link
            fedilink
            English
            arrow-up
            7
            ·
            edit-2
            1 year ago

            I’ve been using Gnome for 24 years and have only ever pronounced it like the thing you’d put on your lawn if you’re an old person in Florida. But I guess that’s what happens when you only ever read about a subject and never talk about it in person.

              • SokathHisEyesOpen@lemmy.ml
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 year ago

                My son and I got into a big argument about how that’s pronounced. He said imm-gurr and I said imager. Since he’s younger I assumed he was right, but it sounded so stupid I refused to yield. 😂

              • SokathHisEyesOpen@lemmy.ml
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 year ago

                I never actually had to pronounce it, but in my mind MySQL was “my squeal” for years and years. The first time I talked to another PHP programmer about it I said “my squeal”, and he did a double take, then said “hold on, what did you just say?”. Then we had a pretty good laugh about it after he corrected me.

  • kamen@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 year ago

    I think that most of the time even if they know what it would look like in the real world, movie creators intentionally make it look silly - I guess mostly for the entertainment value, or as kind of a joke in the lines of “let’s see how absurd we can make it before your grandma notices something’s not right”.

    • ddkman@lemm.ee
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      I think also showing real attempts at cybercrime would have a real liability aspect

      • kamen@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        I doubt it, unless they show something very in depth about a fresh vulnerability on a real system - and even then there are usually months between shooting a TV show/movie and it hitting the screen.

  • Agent641@lemmy.world
    link
    fedilink
    arrow-up
    8
    ·
    1 year ago

    The hacking scene in the Command and Conquer game is unrivalled. Actually piloting worms through cyberspace, with the very real risk of death to the hacker, this is the future I knew and loved as a child

  • Azzk1kr@feddit.nl
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 year ago

    Don’t forget the ridiculous amount of beeping and other sounds when characters fly over the screen at twice the speed of light!

  • mrhh69@discuss.tchncs.de
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    I’m always so confused when I see a movie use scrolling C code in a terminal. Like where do they get it from?

    • z500@startrek.website
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      I liked how Star Trek: Discovery had a snippet of C code with a reference to Windows NT. I wonder if we’ll still be on x86 in the 23rd century.

      • dutchkimble@lemy.lol
        link
        fedilink
        arrow-up
        7
        ·
        1 year ago

        “The warp core is down!”

        “Have you tried turning the power couplings off and on again?”

        • Zacryon@feddit.de
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          1 year ago

          Having played Void Crew recently, which just launched into early access and therefore has a lot of bugs, it happens astonishingly often how turning a ship’s system off and back on again - sometimes even the whole ship - “fixes” a bug (it’s more of a workaround).