History Main / EverythingIsOnline

2nd May '17 9:52:26 AM Ferot_Dreadnaught
Is there an issue? Send a Message


** ''Torch Of Freedom'': Jack [=McBryde=] is able to [[spoiler: [[CrowningMomentOfAwesome sabotage, rewrite, or destroy much of the Mesan Alignment's computer network]], including all of their intel on [[LaResistance The Audubon Ballroom and Torch]]. The Mesan Space Navy and Mesan Alignment Navy, however, are GenreSavvy enough not to have their systems directly connected to the larger network.]]

to:

** ''Torch Of Freedom'': Jack [=McBryde=] is able to [[spoiler: [[CrowningMomentOfAwesome sabotage, rewrite, or destroy much of the Mesan Alignment's computer network]], including all of their intel on [[LaResistance The Audubon Ballroom and Torch]]. The Mesan Space Navy and Mesan Alignment Navy, however, are GenreSavvy savvy enough not to have their systems directly connected to the larger network.]]



** The First Cylon War forced the Colonials to take Everything Offline to combat the Cylons. Indeed, the Colonials became GenreSavvy enough to make it so that Nothing Is Online, at least for a time. If you look closely, you realize that indeed, almost nothing seems to be networked together on the TheBattlestar, up to and including the main guns, each of which have a cockpit with the gunnery crew inside aiming it.

to:

** The First Cylon War forced the Colonials to take Everything Offline to combat the Cylons. Indeed, the Colonials became GenreSavvy enough learn to make it so that Nothing Is Online, at least for a time. If you look closely, you realize that indeed, almost nothing seems to be networked together on the TheBattlestar, up to and including the main guns, each of which have a cockpit with the gunnery crew inside aiming it.
8th Mar '17 3:24:00 PM JoeMerl
Is there an issue? Send a Message


* Played straight and averted in the ''same'' episode of ''WesternAnimation/TheSpectacularSpiderMan'', "Shear Strength". Dr. Octopus hacks into and controls satellites, cell phone GPS locators, street lights, even a coffee shop cash register all because they have computers. However, he later needs the help of someone else to get some Homeland Security codes, as they are on a closed network.

to:

* Played straight and averted ZigZagging in the ''same'' ''WesternAnimation/TheSpectacularSpiderMan'' episode of ''WesternAnimation/TheSpectacularSpiderMan'', "Shear Strength". Dr. Octopus hacks into and controls satellites, cell phone GPS locators, street lights, even a coffee shop cash register all because they have computers. However, he later needs the help of someone else his big plan is to get some Homeland Security codes, as they which are on a closed network.network; to get those, he has to [[IHaveYourWife kidnap Gwen so that he can blackmail Captain Stacy]].
20th Feb '17 5:02:20 PM nombretomado
Is there an issue? Send a Message


* Even your phone conversations aren't safe these days, and not just from the NSA: as the [[http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal News International phone hacking scandal]] demonstrated. [[BritishNewspapers Certain newspapers (including the defunct News of the World)]] had been hacking into the voicemail accounts of everyone from missing schoolgirl Milly Dowler to the victims of the 7/7 London bombings to the [[UsefulNotes/TheBritishRoyalFamily Royal Family]].

to:

* Even your phone conversations aren't safe these days, and not just from the NSA: as the [[http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal News International phone hacking scandal]] demonstrated. [[BritishNewspapers [[UsefulNotes/BritishNewspapers Certain newspapers (including the defunct News of the World)]] had been hacking into the voicemail accounts of everyone from missing schoolgirl Milly Dowler to the victims of the 7/7 London bombings to the [[UsefulNotes/TheBritishRoyalFamily Royal Family]].
19th Jan '17 5:49:59 AM __Vano
Is there an issue? Send a Message


One would assume that any security-sensitive computer system would avoid being connected to anything. It is so, and [[https://en.wikipedia.org/wiki/Category:Wide_area_networks there do exist a number of regional and even global networks that are completely separate from the Internet and are often built with different technologies]]. Yet, every such barrier means tons of wasted work time (which equals wasted money for the company) for users and sysadmins alike, and it costs an obscene amount of money to build and maintain such networks for only a few parties to use. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Same goes for different technologies: ''every'' piece of software logic ever created for TCP/IP needs to be reimplemented if one needs it for a service built on a differect technology, making the latter severely lack in features and maintainability. Then, as the technologies behind the Internet pass the test of time, scrunity and the resulting security fixes over the years -- having had far more exposure to threats than any in-house tech ever could -- physically separating communication channels for a system to stay secure becomes less and less of a requirement. Finally, even if a private network is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government. So nowadays, even control units for critical infrastructure only come with an RJ-45 connector and a hard-coded ability to speak IP.

to:

One would assume that any security-sensitive computer system would avoid being connected to anything. It is so, and [[https://en.wikipedia.org/wiki/Category:Wide_area_networks there do exist a number of regional and even global networks that are completely separate from the Internet and are often built with different technologies]]. Yet, every such barrier means tons of wasted work time (which equals wasted money for the company) for users and sysadmins alike, and it costs an obscene amount of money to build and maintain such networks for only a few parties to use. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Same goes for different technologies: ''every'' piece of software logic ever created for TCP/IP TCP/IP, WWW, or any of the many related protocols and standards needs to be reimplemented if one needs it for a service built on a differect technology, making the latter severely lack in features and maintainability.in comparison. Then, as the technologies behind the Internet pass the test of time, scrunity and the resulting security fixes over the years -- having had far more exposure to threats than any in-house tech ever could -- physically separating communication channels for a system to stay secure becomes less and less of a requirement. Finally, even if a private network is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government. So nowadays, even control units for critical infrastructure only come with an RJ-45 connector and a hard-coded ability to speak IP.
19th Jan '17 5:33:21 AM __Vano
Is there an issue? Send a Message


While one would assume that any security sensitive computer system would avoid being connected to anything, most users and Sys-Admins will fight to the death to avoid complicating their [[MicrosoftWindows Windows updates]] and Gmail access so most computer systems end up attached to the internet. Even control units for critical infrastructure now only come with an RJ-45 connector and a hard-coded ability to speak IP. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Finally, even if a system is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government.

to:

While one One would assume that any security sensitive security-sensitive computer system would avoid being connected to anything, most anything. It is so, and [[https://en.wikipedia.org/wiki/Category:Wide_area_networks there do exist a number of regional and even global networks that are completely separate from the Internet and are often built with different technologies]]. Yet, every such barrier means tons of wasted work time (which equals wasted money for the company) for users and Sys-Admins will fight to the death to avoid complicating their [[MicrosoftWindows Windows updates]] sysadmins alike, and Gmail access so most computer systems end up attached it costs an obscene amount of money to the internet. Even control units build and maintain such networks for critical infrastructure now only come with an RJ-45 connector and a hard-coded ability few parties to speak IP.use. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Same goes for different technologies: ''every'' piece of software logic ever created for TCP/IP needs to be reimplemented if one needs it for a service built on a differect technology, making the latter severely lack in features and maintainability. Then, as the technologies behind the Internet pass the test of time, scrunity and the resulting security fixes over the years -- having had far more exposure to threats than any in-house tech ever could -- physically separating communication channels for a system to stay secure becomes less and less of a requirement. Finally, even if a system private network is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government.
government. So nowadays, even control units for critical infrastructure only come with an RJ-45 connector and a hard-coded ability to speak IP.
10th Dec '16 10:44:56 PM Premonition45
Is there an issue? Send a Message


* ''Film/WarGames'', probably [[UrExample one of the earlier instances of this trope]], relies on the idea that the computer that controls the launching of nuclear missiles is accessible to anyone with a 300 baud modem. Of course, the creator of the [[AIIsACrapshoot not-so evil A.I.]] put in a [[AppliedPhlebotinum backdoor password]]; [[ThePasswordIsAlwaysSwordfish his son's name]]. In this case, [=WOPR=] was not supposed to be accessible from outside. It was a grave switching error at a phone company that made it possible.

to:

* ''Film/WarGames'', probably [[UrExample one of the earlier instances of this trope]], relies on the idea that the computer that controls the launching of nuclear missiles is accessible to anyone with a 300 baud modem. Of course, the creator of the [[AIIsACrapshoot not-so evil A.I.]] put in a [[AppliedPhlebotinum backdoor password]]; [[ThePasswordIsAlwaysSwordfish his son's name]]. In this case, [=WOPR=] [[UnbuiltTrope WOPR was not supposed to be accessible from outside. It was a grave switching error at a phone company that made it possible.]]
22nd Nov '16 11:14:10 PM mk097
Is there an issue? Send a Message

Added DiffLines:

* In ''WesternAnimation/TheAmazingWorldOfGumball'' episode "The Internet," Gumball and Darwin attempt to reach their destination, but the titular Internet hacks into pedestrian crossing signals, police databases, and even a fire hydrant to impede their progress. There's so much technology everywhere that they resort to [[MundaneSolution going through the technology-free park instead]].
12th Nov '16 4:02:36 PM zarpaulus
Is there an issue? Send a Message


* In ''Film/EagleEye'', the VoiceWithAnInternetConnection who guides the protagonists, (ab)uses the fact that Everything Is Online to control every bit of electric machinery to aid the protagonists in their tasks. Traffic lights, security cameras, metros, mobile phones, electronic billboards, everything can be manipulated. Even construction cranes. And the movie, via timestamps on computers, shows it takes place in the distant future of January 2009.

to:

* In the 2008 film ''Film/EagleEye'', the VoiceWithAnInternetConnection who guides the protagonists, (ab)uses the fact that Everything Is Online to control every bit of electric machinery to aid the protagonists in their tasks. Traffic lights, security cameras, metros, mobile phones, electronic billboards, everything can be manipulated. Even construction cranes. And the movie, via timestamps on computers, shows it takes place in the distant future of January 2009.
31st Oct '16 5:08:03 PM CumbersomeTercel
Is there an issue? Send a Message


* In the first-season ''Series/{{Buffy|the Vampire Slayer}}'' episode "I Robot, You Jane", a demon is scanned out of the pages of an ancient book and into a file on a school computer. For the rest of the episode, he's considered "on the web," and bad things happen around the world because of "computer error." Giles and Buffy worry that the demon's presence on the web will give him the opportunity to meddle with traffic signals, destabilize the world's economies, and launch nuclear missiles.

to:

* In the first-season ''Series/{{Buffy|the Vampire Slayer}}'' episode "I "[[{{Recap/BuffyTheVampireSlayerS1E8IRobotYouJane}} I Robot, You Jane", Jane]]", a demon is scanned out of the pages of an ancient book and into a file on a school computer. For the rest of the episode, he's considered "on the web," and bad things happen around the world because of "computer error." Giles and Buffy worry that the demon's presence on the web will give him the opportunity to meddle with traffic signals, destabilize the world's economies, and launch nuclear missiles.



** One of the systems connected was comunication (or it was a miss-translation, havent seen the episode in english) so getting a virus in is not that silly.

to:

** One of the systems connected was comunication communication (or it was a miss-translation, havent haven't seen the episode in english) English) so getting a virus in is not that silly.
22nd Oct '16 6:46:18 PM Nerrin
Is there an issue? Send a Message

Added DiffLines:

* That "Internet of Things" mentioned further up in this section? Yeah, that [[https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/ was responsible for a late-October 2016 massive Denial of Service attack]]. A major internet infrastructure company servicing numerous large sites was attacked by a massive botnet made up not of infected computers, but by ''remote-access cameras and [=DVRs=]''. The future is now and your toaster may soon be plotting against you.
This list shows the last 10 events of 129. Show all.
http://tvtropes.org/pmwiki/article_history.php?article=Main.EverythingIsOnline