History Main / HollywoodHacking

19th Jun '16 3:50:21 PM FlakyPorcupine
Is there an issue? Send a Message


* ''VideoGame/{{Titanfall}}: Pilots can hack stationary turrets and Spectres to automatically attack the enemy. This is accomplished by stabbing them with a "data knife."

to:

* ''VideoGame/{{Titanfall}}: ''VideoGame/{{Titanfall}}'': Pilots can hack stationary turrets and Spectres to automatically attack the enemy. This is accomplished by stabbing them with a "data knife.""
* During ''Videogame/WelcomeToTheGame'', you will often be the target of a hacker, whereupon you do a short minigame to block them from doing so.
7th Jun '16 1:59:20 PM Arachnos
Is there an issue? Send a Message


* A [[http://my.spill.com/profiles/blog/show?id=947994%3ABlogPost%3A355506 "leaked" version]] of Michael Bay's script for ''Film/TheDarkKnight'' [[spoiler: (It's fake)]] contains a hilarious version of this quite close to the Penny Arcade example.

to:

* A [[http://my.spill.com/profiles/blog/show?id=947994%3ABlogPost%3A355506 [[http://filmmakeriq.com/2012/04/michael-bays-rejected-the-dark-knight-script/ "leaked" version]] of Michael Bay's script for ''Film/TheDarkKnight'' [[spoiler: (It's fake)]] contains a hilarious version of this quite close to the Penny Arcade example.
7th Jun '16 1:39:33 PM Arachnos
Is there an issue? Send a Message

Added DiffLines:

** As silly as it is, everything in this sequence is symbolically representative of real hacking: [[spoiler:Lordgenome first breaks through the firewalls, then searches for the file, attempts to open it with a password, fails and uses a brute force decryption, succeeds and downloads the file.]]
1st Jun '16 9:00:02 AM TheOneWhoTropes
Is there an issue? Send a Message


* The old Commodore 64 classic {{Paradroid}} had you hack via a minigame.

to:

* The old Commodore 64 classic {{Paradroid}} VideoGame/{{Paradroid}} had you hack via a minigame.
14th May '16 3:35:27 PM Choombi
Is there an issue? Send a Message


* ''MrRobot'' explicitly sets out to subvert this trope. In the words of the ''veteran cyber-crime expert'' they hired as a consultant for the show: "We want that code to be accurate so that even the most sophisticated hacker or technical person out there will not roll their eyes at a scene". They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they ''actually used a honest-to-goodness real-life spyware''. They hid its name, but it's trivial for anyone with decent Google skills to find it out.

to:

* ''MrRobot'' ''Series/MrRobot'' explicitly sets out to subvert this trope. In the words of the ''veteran cyber-crime expert'' they hired as a consultant for the show: "We want that code to be accurate so that even the most sophisticated hacker or technical person out there will not roll their eyes at a scene". They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they ''actually used a honest-to-goodness real-life spyware''. They hid its name, but it's trivial for anyone with decent Google skills to find it out.
14th May '16 2:40:49 PM Choombi
Is there an issue? Send a Message


* ''MrRobot'' explicitly sets out to subvert this trope. In the words of the ''veteran cyber-crime expert'' they hired as a consultant for the show: "We want that code to be accurate so that even the most sophisticated hacker or technical person out there will not roll their eyes at a scene". They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they ''actually used a honest-to-goodness real-life spyware''. They hid its name, but it's trivial for anyone with decent Google skills to find it out.


Added DiffLines:

* ''MrRobot'' explicitly sets out to subvert this trope. In the words of the ''veteran cyber-crime expert'' they hired as a consultant for the show: "We want that code to be accurate so that even the most sophisticated hacker or technical person out there will not roll their eyes at a scene". They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they ''actually used a honest-to-goodness real-life spyware''. They hid its name, but it's trivial for anyone with decent Google skills to find it out.
14th May '16 1:25:51 AM Morgenthaler
Is there an issue? Send a Message


* In ''WesternAnimation/TheBraveLittleToaster to the Rescue'', the climax involves the old TLW-728 supercomputer, Wittgenstein, wirelessly hacking into things from security gates to personal computers, and even being able to send ''pure electricity'' to devices through power outlets; all this despite him being, as the film takes time to point out, severely outdated. Ironically, through all of this they still take time to point out that you need a modem to get on the Internet.

to:

* In ''WesternAnimation/TheBraveLittleToaster to the Rescue'', ''WesternAnimation/TheBraveLittleToasterToTheRescue'', the climax involves the old TLW-728 supercomputer, Wittgenstein, wirelessly hacking into things from security gates to personal computers, and even being able to send ''pure electricity'' to devices through power outlets; all this despite him being, as the film takes time to point out, severely outdated. Ironically, through all of this they still take time to point out that you need a modem to get on the Internet.
12th May '16 8:56:57 AM AceOfScarabs
Is there an issue? Send a Message

Added DiffLines:

** One simple little detail stands out: every game, Lan needs to acquire updated security passes to (re)gain access to his friends's protected home networks, as they probably change their passwords regularly and need to keep him updated.
15th Apr '16 3:31:33 AM AceOfScarabs
Is there an issue? Send a Message


* The [[http://techraptor.net/content/rowhammer-dram-exploit-poses-security-threat-in-many-pcs Rowhammer DRAM Exploit]] works by using the modern RAM chip's densely-packed design against it, by repeatedly accessing a particular cell of memory over and over again, which eventually causes the neighboring cells to flip. Using this exploit a program can change values stored in memory it would normally not have access too, by targeting neighboring rows of memory with the Rowhammer technique.

to:

* The [[http://techraptor.net/content/rowhammer-dram-exploit-poses-security-threat-in-many-pcs [[https://en.wikipedia.org/wiki/Row_hammer Rowhammer DRAM Exploit]] works by using the modern RAM chip's densely-packed design against it, by repeatedly accessing a particular cell of memory over and over again, which eventually causes the neighboring cells to flip. Using this exploit a program can change values stored in memory it would normally not have access too, by targeting neighboring rows of memory with the Rowhammer technique.
15th Apr '16 2:07:30 AM Eagal
Is there an issue? Send a Message

Added DiffLines:

* In ''Series/TheFlash2014'' episode "All Star Team Up" resident super-genius Cisco estimates that he can hack into the city's municipal network in about half an hour. Felicity Smoak, guest-starring from ''Series/Arrow'' sits down at a computer that happens to be sitting nearby, and proceeds to do exactly that by typing for a few seconds. She later pulls a DuelingHackers thing with the VillainOfTheWeek over remote control of a swarm of robotic bees.
This list shows the last 10 events of 482. Show all.
http://tvtropes.org/pmwiki/article_history.php?article=Main.HollywoodHacking