History Main / HollywoodHacking

4th Sep '16 8:00:31 PM Upgrader
Is there an issue? Send a Message


* ''Series/{{Bones}}'', specifically Pelant. The guy can do pretty much anything, and nobody can seem to design a security system capable of blocking him.

to:

* ''Series/{{Bones}}'', specifically Pelant. The guy guy's hacking skills can do pretty much anything, and nobody can seem anything. Some of the things he managed to design a do are: fool an ankle monitor, write malware on bone, corrupt/modify security system capable of blocking him.footage, take down cellphone networks and traffic lights, hijack a predator drone in Afghanistan, wipe his own identity and create a new one to get DiplomaticImpunity, and infiltrate a private army.
31st Jul '16 10:22:34 PM Gingerkitteh
Is there an issue? Send a Message


* The [[https://en.wikipedia.org/wiki/Row_hammer Rowhammer DRAM Exploit]] works by using the modern RAM chip's densely-packed design against it, by repeatedly accessing a particular cell of memory over and over again, which eventually causes the neighboring cells to flip. Using this exploit a program can change values stored in memory it would normally not have access too, by targeting neighboring rows of memory with the Rowhammer technique.

to:

* The [[https://en.wikipedia.org/wiki/Row_hammer Rowhammer DRAM Exploit]] works by using the modern RAM chip's densely-packed design against it, by repeatedly accessing a particular cell of memory over and over again, which eventually causes the neighboring cells to flip. Using this exploit a program can change values stored in memory it would normally not have access too, to, by targeting neighboring rows of memory with the Rowhammer technique.
31st Jul '16 6:05:29 AM Dinjoralo
Is there an issue? Send a Message

Added DiffLines:

* ''Hacker's Beat'' is a rhythm game based on this. All of the notes represent some general area of your keyboard, aside from firewalls where you need to hit enter, and the songs end with you getting access to... [[NoPlotNoProblem something]].
15th Jul '16 10:20:35 AM Quanyails
Is there an issue? Send a Message


* [[http://xkcd.com/378/ This]] ''Webcomic/{{xkcd}}'' webcomic takes the cake... someone flaps a buttefly's wings just once to control the air currents, causing temporary pockets of high air pressure to form. They're then used as a lens to deviate cosmic rays so he can flip the desired bit on his hard drive[[note]]When he could just have used the Emacs command M-x butterfly instead[[/note]].

to:

* [[http://xkcd.com/378/ This]] ''Webcomic/{{xkcd}}'' webcomic takes the cake... someone flaps a buttefly's butterfly's wings just once to control the air currents, causing temporary pockets of high air pressure to form. They're then used as a lens to deviate cosmic rays so he can flip the desired bit on his hard drive[[note]]When he could just have used the Emacs command M-x butterfly instead[[/note]].
15th Jul '16 10:18:28 AM Quanyails
Is there an issue? Send a Message


* ''VideoGame/{{Hydrophobia}}'' has you gain into computer systems by matching wave-lengths with the console. Particularly funny as the games protagonists are completely confused just how anybody could hack into their system!

to:

* ''VideoGame/{{Hydrophobia}}'' has you gain into computer systems by matching wave-lengths with the console. Particularly funny as the games game's protagonists are completely confused just how anybody could hack into their system!
15th Jul '16 10:11:03 AM Quanyails
Is there an issue? Send a Message


* The game ''VideoGame/{{Uplink}}'' from Introversion is intentionally designed to play like Hollywood Hacking. You have programs that can figure out a password for you and disable firewalls and so on automatically, though later on you can wipe mainframes and other computers by going to the Unix-like command prompt after hacking in and have to use realistic commands to delete everything (and not just by typing in "delete everything"). [[FollowTheLeader Several freeware clones]], like Dark Signs, have been cropping up slowly yet steadily. Quality and spot on the Hollywood to Realist scale varies somewhat among them, but a greater emphasis seems to be put on command-line interfaces.

to:

* The game ''VideoGame/{{Uplink}}'' from Introversion is intentionally designed to play like Hollywood Hacking. You have programs that can figure out a password for you and disable firewalls and so on automatically, though later on you can wipe mainframes and other computers by going to the Unix-like command prompt after hacking in and have to use realistic commands to delete everything (and not just by typing in "delete everything"). [[FollowTheLeader Several freeware clones]], like Dark Signs, ''Dark Signs'', have been cropping up slowly yet steadily. Quality and spot on the Hollywood to Realist scale varies somewhat among them, but a greater emphasis seems to be put on command-line interfaces.
15th Jul '16 10:06:10 AM Quanyails
Is there an issue? Send a Message


* ''Series/{{Apocalypse}}'': Each time Derren sends fake news about the meteor shower to the hijacked iDevice, they roll a CGI scene of the signal being sent out to a satellite and bounced back to earth. Ultimately, this is just for RuleOfCool- it should be noted that no iDevice in the market have a satellite-capable phone radio, the signal will still come through cell towers just like other phones. Subverted, however, when they were hacking Steven's phone- it can be clearly seen that they are actually jailbreaking it and then installing a VNC server among other things.

to:

* ''Series/{{Apocalypse}}'': Each time Derren sends fake news about the meteor shower to the hijacked iDevice, they roll a CGI scene of the signal being sent out to a satellite and bounced back to earth. Ultimately, this is just for RuleOfCool- it should be noted that no RuleOfCool. No iDevice in the market have a satellite-capable phone radio, radio; the signal will still come through cell towers just like other phones. Subverted, however, when they were hacking Steven's phone- phone; it can be clearly seen that they are actually jailbreaking it and then installing a VNC server among other things.
15th Jul '16 10:01:22 AM Quanyails
Is there an issue? Send a Message


* In ''TekWar'', hackers are frequently employed by the protagonist. The standard method of hacking involves an extremely detailed graphical user interface with things like waves of electrical energy to represent firewalls (and these firewalls can hurt you in real life). The hackers navigate these worlds as a real 3D landscape, including avoiding being caught by other hackers and programmes by ducking to avoid something hitting them.

to:

* In ''TekWar'', hackers are frequently employed by the protagonist. The standard method of hacking involves an extremely detailed graphical user interface with things like waves of electrical energy to represent firewalls (and these firewalls can hurt you in real life). The hackers navigate these worlds as a real 3D landscape, including avoiding being caught by other hackers and programmes programmers by ducking to avoid something hitting them.
15th Jul '16 10:01:18 AM Quanyails
Is there an issue? Send a Message


* In ''TekWar'' hackers are frequently employed by the protagonist. The standard method of hacking involves an extreme;u detailed graphical user interface with things like waves of electrical energy to represent firewalls (and these firewalls can hurt you in real life). The hackers navigate these worlds as a real 3D landscape, including avoiding being caught by other hackers and programmes by ducking to avoid something hitting them.

to:

* In ''TekWar'' ''TekWar'', hackers are frequently employed by the protagonist. The standard method of hacking involves an extreme;u extremely detailed graphical user interface with things like waves of electrical energy to represent firewalls (and these firewalls can hurt you in real life). The hackers navigate these worlds as a real 3D landscape, including avoiding being caught by other hackers and programmes by ducking to avoid something hitting them.
10th Jul '16 12:52:21 PM nombretomado
Is there an issue? Send a Message


* ''BrokenSaints'' averts this by way of having a real hacker on-board as tech advisor.

to:

* ''BrokenSaints'' ''WebAnimation/BrokenSaints'' averts this by way of having a real hacker on-board as tech advisor.
This list shows the last 10 events of 492. Show all.
http://tvtropes.org/pmwiki/article_history.php?article=Main.HollywoodHacking