History Main / HollywoodHacking

5th Jan '17 7:25:23 PM Game_Fan
Is there an issue? Send a Message

Added DiffLines:

A few real world hacks do in fact rise to the level of a Hollywood movie in effectiveness, if not visual spectacle.


Added DiffLines:

** The special danger of Rowhammer is that because it allows software to attack the hardware it circumvents most software based defenses entirely. In particular a program can use Rowhammer to escape from quarantined areas of the system. Fortunately most servers use ECC RAM which is effectively invulnerable to the exploit.
21st Dec '16 8:43:54 PM KingClark
Is there an issue? Send a Message


* A [[http://filmmakeriq.com/2012/04/michael-bays-rejected-the-dark-knight-script/ "leaked" version]] of Michael Bay's script for ''Film/TheDarkKnight'' [[spoiler: (It's fake)]] contains a hilarious version of this quite close to the Penny Arcade example.

to:

* A [[http://filmmakeriq.com/2012/04/michael-bays-rejected-the-dark-knight-script/ "leaked" version]] of Michael Bay's script for ''Film/TheDarkKnight'' [[spoiler: (It's fake)]] (it's fake) contains a hilarious version of this quite close to the Penny Arcade example.
21st Dec '16 8:41:36 PM KingClark
Is there an issue? Send a Message


* The episode of ''Series/{{Limitless}}'' where Brian is learning to hack has him mention that he doesn't really know what "hacking" even '''is''' yet, just the montages he's seen in the movies. When he actually starts researching and studying it, he [[NoFourthWall tells the audience how '''boring''' real hacking is and instead shows the viewers vines of explosions and stuff]].

to:

* The episode of ''Series/{{Limitless}}'' where Brian is learning to hack has him mention that he doesn't really know what "hacking" even '''is''' yet, just the montages he's seen in the movies. When he actually starts researching and studying it, he [[NoFourthWall tells the audience how '''boring''' boring real hacking is and instead shows the viewers vines of explosions and stuff]].
21st Dec '16 8:40:48 PM KingClark
Is there an issue? Send a Message


* ''Film/{{Elysium}}'' shows console text and computer code, the need for physical access, and the ease with which [[spoiler: Elysium is rebooted and its citizen registry altered is due to the use of code stolen from an insider who wrote it explicitly to mount a coup.]] Of course this still leaves the gaping plot hole of [[spoiler: why downloading the code from his head into the core would kill him when they're clearly downloading and displaying it from his head onto the monitors in the smugglers' base]]

to:

* ''Film/{{Elysium}}'' shows console text and computer code, the need for physical access, and the ease with which [[spoiler: Elysium is rebooted and its citizen registry altered is due to the use of code stolen from an insider who wrote it explicitly to mount a coup.]] Of course this still leaves the gaping plot hole of [[spoiler: why downloading the code from his head into the core would kill him when they're clearly downloading and displaying it from his head onto the monitors in the smugglers' base]]base]].
17th Dec '16 3:58:17 PM number9robotic
Is there an issue? Send a Message


* Sombra from ''VideoGame/{{Overwatch}}'' ''revels'' in this trope. She's TheCracker for resident terrorist organization Talon, and her preferred method of hacking into computer systems, emails, company websites, operation lifts and even inactive mecha by using her glove device and a HolographicTerminal. In-game, [[StandardStatusEffects her hacking ability is essentially a form of a "silence" effect]], preventing enemies from using their main active abilities, ultimates included (which range from activating rocket boosters, traveling back in time, throwing a bear trap, using a grappling hook, [[ArsonMurderAndJaywalking and sprinting.]])

to:

* Sombra from ''VideoGame/{{Overwatch}}'' ''revels'' in this trope. She's TheCracker for resident terrorist organization Talon, and her preferred method of hacking into computer systems, emails, company websites, operation lifts and even inactive mecha is by using her glove device and a HolographicTerminal. In-game, [[StandardStatusEffects her hacking ability is essentially a form of a "silence" effect]], preventing enemies from using their main active abilities, ultimates included (which range from activating rocket boosters, traveling back in time, throwing a bear trap, using a grappling hook, [[ArsonMurderAndJaywalking and sprinting.]])
12th Dec '16 7:01:59 AM RAMChYLD
Is there an issue? Send a Message

Added DiffLines:

* Series/WhiteRabbitProject: ''The Carbanak Gang'' legend in the ''Heists'' episode made gratuitous use of the old ''scrolling garbage text on the monitor'' effect, although one part that shows the effect on an ATM looked suspiciously like the [[UsefulNotes/{{Unix}} Linux]] [=SysV=] init bootscript.
15th Nov '16 3:08:13 PM mhnospa
Is there an issue? Send a Message


* ''Series/CSINewYork'': "I'll create a GUI interface using Visual Basic. See if I can track an IP address."

to:

* ''Series/CSINewYork'': "I'll "[[https://www.funnyshirts.org/design/891/GUI+Interface+Using+VB I'll create a GUI interface using Visual Basic. See if I can track an IP address.address]]."
15th Nov '16 2:50:01 PM mhnospa
Is there an issue? Send a Message

Added DiffLines:

* ''Series/CSINewYork'': "I'll create a GUI interface using Visual Basic. See if I can track an IP address."
8th Nov '16 7:22:15 PM number9robotic
Is there an issue? Send a Message

Added DiffLines:

* Sombra from ''VideoGame/{{Overwatch}}'' ''revels'' in this trope. She's TheCracker for resident terrorist organization Talon, and her preferred method of hacking into computer systems, emails, company websites, operation lifts and even inactive mecha by using her glove device and a HolographicTerminal. In-game, [[StandardStatusEffects her hacking ability is essentially a form of a "silence" effect]], preventing enemies from using their main active abilities, ultimates included (which range from activating rocket boosters, traveling back in time, throwing a bear trap, using a grappling hook, [[ArsonMurderAndJaywalking and sprinting.]])
30th Oct '16 10:06:06 AM nombretomado
Is there an issue? Send a Message


* Steve Jackson Games will probably never stop referring to {{GURPS}} Cyberpunk as "the book seized by the US Secret Service". The book does have rules for "realistic" (if almost 20 years out of date) hacking, but most of that chapter is devoted to Literature/{{Neuromancer}}-style cyberspace hacking. The core 4e books contain a skill called "Computer Hacking", precisely for Hollywood Hacking. However, the rules note that the skill should only exist in the more "cinematic" games -- in a realistic game, the would-be hacker will have to instead learn a bunch of various skills like computer programming, psychology, etc.

to:

* Steve Jackson Games will probably never stop referring to {{GURPS}} TabletopGame/{{GURPS}} Cyberpunk as "the book seized by the US Secret Service". The book does have rules for "realistic" (if almost 20 years out of date) hacking, but most of that chapter is devoted to Literature/{{Neuromancer}}-style cyberspace hacking. The core 4e books contain a skill called "Computer Hacking", precisely for Hollywood Hacking. However, the rules note that the skill should only exist in the more "cinematic" games -- in a realistic game, the would-be hacker will have to instead learn a bunch of various skills like computer programming, psychology, etc.
This list shows the last 10 events of 505. Show all.
http://tvtropes.org/pmwiki/article_history.php?article=Main.HollywoodHacking