Follow TV Tropes

Following

History Main / HollywoodHacking

Go To

OR

Is there an issue? Send a MessageReason:
None


* ''Series/AlexRider'': Kyra was sent to a school for problem children of the super-rich after a prank involving an electronic billboard. [[spoiler:She plays a major part in the escape from the school and the later rescue by adding a secret door combination to the security system.]]

to:

* ''Series/AlexRider'': ''Series/AlexRider2020'': Kyra was sent to a school for problem children of the super-rich after a prank involving an electronic billboard. [[spoiler:She plays a major part in the escape from the school and the later rescue by adding a secret door combination to the security system.]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* ''TabletopGame/{{Lancer}}:'' Invasion attempts are essentially a mixture of this and regular electronic warfare, depending on the mechs involved. Normally, an Invasion just gives you the option to Fragment Signal, to overheat an enemy, slow them down and impair them briefly, little different from a regular DDOS. But certain mechs from the various manufacturers can have other Invasion options that mess with others more deeply. In particular, if you got hacked by something belonging to a HORUS pattern group, ''start praying'': HORUS mechs are often specialized electronic warfare platforms, and they can put massive dampeners on what you can do, mess with your positioning, [[PeoplePuppets control your actions]] and just straight-up make you [[ExplosiveOverclocking overheat until you burn everyone nearby/catch fire/explode]].
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* ''Film/Bloodshot2020'': Ray uses his nanites to instantly hack into databases worldwide and track down his target. [[spoiler:Subverted after TheReveal when it's shown that most of this information is actually being fed to him by Eric and Harting, who already know where his target is. Played straight with Wigans, however, as he's a famous coder.]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* ''{{Film/Nobody}}'': After Hutch Mansell leaves Yulian's brother braindead, Yulian hires a hacker to dig up any intel she can find on Hutch from the Pentagon. Rather than typing random keys and spouting TechnoBabble, Yulian's hacker resorts to blackmailing a Pentagon employee into giving her the information she needed. It's also worth noting that Yulian's hacker is shown using linux, what appears to be Ubuntu.
Is there an issue? Send a MessageReason:
None


* ''Series/WhiteRabbitProject'': The Carbanak Gang legend in the "Heists" episode makes gratuitous use of the old ''scrolling garbage text on the monitor'' effect, although one part that shows the effect on an ATM looks suspiciously like the [[UsefulNotes/{{Unix}} Linux]] [=SysV=] init bootscript.

to:

* ''Series/WhiteRabbitProject'': The Carbanak Gang legend in the "Heists" episode makes gratuitous use of the old ''scrolling garbage text on the monitor'' effect, although one part that shows the effect on an ATM looks suspiciously like the [[UsefulNotes/{{Unix}} [[Platform/{{Unix}} Linux]] [=SysV=] init bootscript.



* The old UsefulNotes/Commodore64 classic ''VideoGame/{{Hacker}}'' was [[WordOfGod explicitly]] based on Hollywood Hacking. The follow-up, the creatively named ''Hacker 2'', went even further.

to:

* The old UsefulNotes/Commodore64 Platform/Commodore64 classic ''VideoGame/{{Hacker}}'' was [[WordOfGod explicitly]] based on Hollywood Hacking. The follow-up, the creatively named ''Hacker 2'', went even further.



* ''Literature/ClearAndPresentDanger'' has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow to the Hollywood Computing, they even use "[[UsefulNotes/{{UNIX}} dir /w]]" to list the disk contents, even if the display is a little viewer-friendlier than normal.)

to:

* ''Literature/ClearAndPresentDanger'' has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow to the Hollywood Computing, they even use "[[UsefulNotes/{{UNIX}} "[[Platform/{{UNIX}} dir /w]]" to list the disk contents, even if the display is a little viewer-friendlier than normal.)



* Jailbreaking - the act of cracking hardware (like a smartphone) to run software it normally won't allow for, usually involves a combination of hardware and custom-tailored software exploits: for example, Sony's UsefulNotes/PlayStationPortable requires tinkering with the battery to successfully jailbreak it, and Apple's [=iPhones=] can be a browser-based exploit. Strictly speaking, it ''does'' void the warranty, but the users who do this usually don't care much about that.

to:

* Jailbreaking - the act of cracking hardware (like a smartphone) to run software it normally won't allow for, usually involves a combination of hardware and custom-tailored software exploits: for example, Sony's UsefulNotes/PlayStationPortable Platform/PlayStationPortable requires tinkering with the battery to successfully jailbreak it, and Apple's [=iPhones=] can be a browser-based exploit. Strictly speaking, it ''does'' void the warranty, but the users who do this usually don't care much about that.

Added: 3

Changed: 140

Removed: 3

Is there an issue? Send a MessageReason:
None


%% This page has been alphabetized. Please add new examples in the correct order.

to:

%% This page list of examples has been alphabetized. Please add new examples Take care to put your example in the correct order.its proper place in accordance with Administrivia/HowToAlphabetizeThings!



%%%



%%
%%%

to:

%%
%%%



* ''Literature/ClearAndPresentDanger'' has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow to the Hollywood Computing, they even use "dir /w" to list the disk contents, even if the display is a little viewer-friendlier than normal.)

to:

* ''Literature/ClearAndPresentDanger'' has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow to the Hollywood Computing, they even use "dir /w" "[[UsefulNotes/{{UNIX}} dir /w]]" to list the disk contents, even if the display is a little viewer-friendlier than normal.)

Added: 5467

Changed: 28

Is there an issue? Send a MessageReason:
None


It's nothing like real hacking, although either way, you may have to use RapidFireTyping. That last part also means that any AI or robot that can directly interface with a computer is automatically the greatest hacker in the universe that can instantly take over any system no matter how secure because it doesn't need to type.

Hollywood Hacking is when some sort of convoluted metaphor is used not only to describe hacking but actually to put it into practice. Characters will come up with [[TechnoBabble rubbish]] like, "Extinguish the firewall!" and "I'll use the Millennium Bug to launch an OverclockingAttack on the whole Internet!" -- even hacking [[EverythingIsOnline light switches and electric razors]], which is even sillier if said electric razor is unplugged. The intent is to employ a form of ArtisticLicense or [[HandWave hand waving]] which takes advantage of presumed technophobia among the audience. You can also expect this trope to annoy those within the audience whose occupation involves computers or the Internet.

to:

It's usually almost nothing like real hacking, although either way, you may have to use RapidFireTyping. That last part also means that any AI or robot that can directly interface with a computer is automatically the greatest hacker in the universe that can instantly take over any system no matter how secure because it doesn't need to type.

Hollywood Hacking is when some sort of convoluted convoluted, unrealistic metaphor is used not only to describe hacking but actually to put it into practice. Characters will come up with [[TechnoBabble rubbish]] like, "Extinguish the firewall!" and "I'll use the Millennium Bug to launch an OverclockingAttack on the whole Internet!" -- even hacking [[EverythingIsOnline light switches and electric razors]], which is even sillier if said electric razor is unplugged. The intent is to employ a form of ArtisticLicense or [[HandWave hand waving]] which takes advantage of presumed technophobia among the audience. You can also expect this trope to annoy those within the audience whose occupation involves computers or the Internet.


Added DiffLines:


[[folder:RealLife]]
A few real world hacks do in fact rise to the level of a Hollywood movie in effectiveness, if not visual spectacle.
* One of the most secure encryption algorithms, 4096-bit RSA, [[http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu was cracked using a rudimentary microphone listening to the tiny sounds of the CPU.]] These are known as [[https://en.wikipedia.org/wiki/Side_channel_attack side channel attacks]], which involves the cracker gathering information about what the hardware is doing during encryption/decryption.
** A similar, very early exploit could formerly be used on systems by analyzing how long it took them to reject "bad" passwords, essentially turning it into a PasswordSlotMachine. (Although this didn't require a fancy microphone or physical access to the computer.) The resulting hole was closed by the simple expedient of having the computer wait a random amount of time before answering.
* The [[https://en.wikipedia.org/wiki/Row_hammer Rowhammer DRAM Exploit]] works by using the modern RAM chip's densely-packed design against it, by repeatedly accessing a particular cell of memory over and over again, which eventually causes the neighboring cells to flip. Using this exploit a program can change values stored in memory it would normally not have access to, by targeting neighboring rows of memory with the Rowhammer technique. Even worse, it bypasses most software-based countermeasures.
* The era of web browsers has allowed for a variety of unusual and terrifying exploits to emerge:
** One particularly notable short-lived exploit that was patched within hours of a white-hat explaining his discovery to the Chrome devteam was a simple Flash-based exploit that could elevate code all the way up to Administrator-level permission via a vunerability in the code that talked to your graphics controller. In the demonstration, the white-hat uses a Flash plugin to show a picture while launching Calculator in the background with the Administrator account's permissions.
** One exploit, known as [[https://en.wikipedia.org/wiki/Heartbleed Heartbleed]], relies on weaknesses in a server's code to trick it into revealing more information than it rightfully should. [[https://xkcd.com/1354/ XKCD]] explains how it works.
** The 3DS web browser, which can parse QR code web addresses, had a vunerability to code injection [[https://kotaku.com/giving-yourself-hacked-pokemon-just-got-way-easier-1687482782 that was promptly exploited]] for [[https://www.reddit.com/r/pokemon/comments/2wph62/how_to_get_hoopa_volcanion_shiny_yvetal_shiny/ cheating at Pokemon]]. It was eventually patched out by a system update.
* Arbitary Code Execution, a kind of exploit that involves tricking programming into reading/writing memory addresses in such a way that you can escape a 'sandbox' to run anything you want. One of the more interesting examples comes from VideoGame/PokemonYellow (Explanation can be found [[https://bulbapedia.bulbagarden.net/wiki/Arbitrary_code_execution here]] on Bulbapedia), which has a [[http://tasvideos.org/2187M.html Tool-Assisted Speedrun]] that demonstrates that you can basically use a corrupted save to escape certain memory boundaries and rearrange "items" and "party members" to create lines of code that let you write whatever you want to execute to the RAM of your Gameboy - [[https://www.youtube.com/watch?v=SqHdpWu78XQ or your opponent's Gameboy]].
** Arbitrary code exploits have also been discovered in other Nintendo games, notably ''VideoGame/SuperMarioWorld'' where it is possible to warp to the credits screen carefully manipulating certain objects and enemies. And it gets better, as one even managed to [[https://www.polygon.com/2014/1/14/5309662/bizarre-super-mario-world-hack-turns-the-game-into-pong-snake inject]] ''VideoGame/{{Snake}}'' and ''VideoGame/{{Pong}}'' and into SMB!
* Jailbreaking - the act of cracking hardware (like a smartphone) to run software it normally won't allow for, usually involves a combination of hardware and custom-tailored software exploits: for example, Sony's UsefulNotes/PlayStationPortable requires tinkering with the battery to successfully jailbreak it, and Apple's [=iPhones=] can be a browser-based exploit. Strictly speaking, it ''does'' void the warranty, but the users who do this usually don't care much about that.
* Android phones can be similarly broken into by using a bootloader that enables Developer Mode, allowing savvy modders to replace the stock ROM provided by the manufacturer with a custom ROM. Usually modders that do this desire access to Superuser mode, which grants them total control over even the most minute settings, as Android is descended from Unix-based OS.
* The Evin prison hack in Iran demonstrates how a breached system can really look like a fantastic mess, with random [=BSODs=], screens flashing red, and messages taking up the entire screen. [[https://twitter.com/i/status/1430083273015840776 Watch it here.]]
* Certain exploits involving the computer's fan or processor can be used to [[ExplosiveOverclocking make them overheat or run to the point of breaking.]] It's how a [[https://en.wikipedia.org/wiki/Stuxnet cyberattack targeting Iran]] sabotaged a nuclear reactor: someone used a smuggled USB to force industrial hardware (in this case, centrifuges for gas and nuclear operations) to tear itself apart.
[[/folder]]
Is there an issue? Send a MessageReason:
None


* ''VideoGame/WatchDogs'' and its successors are basically this trope in game form. Hacking a train, some traffic lights, a door, anything and everything connected online by pressing only a single button? Hellz yeah.[[note]]As it turns out, such hacking is actually ''plausible'' IRL, if not anywhere near as conveniently in-game.[[/note]] Admittedly, though, a number of the tricks are only possible because the protagonists use exploits and backdoors that were built into the system.

to:

* ''VideoGame/WatchDogs'' and its successors are basically this trope in game form. Hacking a train, some traffic lights, a door, anything and everything connected online by pressing only a single button? Hellz yeah.[[note]]As it turns out, such hacking is actually ''plausible'' IRL, if not anywhere near as conveniently in-game.[[/note]] Admittedly, though, a number of the tricks are only possible because the protagonists use exploits and backdoors that were built into the system. Also partially averted that, befitting the nature of the [[WideOpenSandbox open world]] game, you have to go through and look for access points instead of hacking everything at the comfort of your characters' home.
Is there an issue? Send a MessageReason:
This portion is better used in Rapid Fire Typing


* Kassem G's "[[https://www.youtube.com/watch?v=gF_qQYrCcns Crime Cops]]" combines this with {{Technobabble}} and the EnhanceButton in a parody of crime investigation shows. When the technicians aren't randomly typing on a keyboard, they're dragging their fingers along rows of keys or even slamming the keyboard with a hackeysack.

to:

* Kassem G's "[[https://www.youtube.com/watch?v=gF_qQYrCcns Crime Cops]]" combines this with {{Technobabble}} and the EnhanceButton in a parody of crime investigation shows. When the technicians aren't randomly typing on a keyboard, they're dragging their fingers along rows of keys or even slamming the keyboard shows, with a hackeysack.the characters spouting random algorithm names and catchphrases like "jackpot," "bingo," or "liftoff."
Is there an issue? Send a MessageReason:
None


* Kassem G's "[[https://www.youtube.com/watch?v=gF_qQYrCcns Crime Cops]]" - combines this with {{Technobabble}} and the EnhanceButton in a parody of crime investigation shows. When the technicians aren't randomly typing on a keyboard, they're dragging their fingers along rows of keys or even slamming the keyboard with a hackeysack.

to:

* Kassem G's "[[https://www.youtube.com/watch?v=gF_qQYrCcns Crime Cops]]" - combines this with {{Technobabble}} and the EnhanceButton in a parody of crime investigation shows. When the technicians aren't randomly typing on a keyboard, they're dragging their fingers along rows of keys or even slamming the keyboard with a hackeysack.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* Kassem G's "[[https://www.youtube.com/watch?v=gF_qQYrCcns Crime Cops]]" - combines this with {{Technobabble}} and the EnhanceButton in a parody of crime investigation shows. When the technicians aren't randomly typing on a keyboard, they're dragging their fingers along rows of keys or even slamming the keyboard with a hackeysack.
Is there an issue? Send a MessageReason:
None


* ''Webcomic/SandraAndWoo'': Explicitly averted in [[http://www.sandraandwoo.com/2016/09/01/0817-the-divine-comedy-page-15/ this strip]].

to:

* ''Webcomic/SandraAndWoo'': Explicitly averted in The Devil [[http://www.sandraandwoo.com/2016/09/01/0817-the-divine-comedy-page-15/ this strip]].tasks]] Karl with hacking into heaven's future prediction system. However, the procedure drags on with pretty much nothing happening, and the Devil complains that "readers are getting impatient".
Is there an issue? Send a MessageReason:
Correct me if I'm wrong, but I do believe the servers in that game were air gapped

Added DiffLines:

** Similarly, in ''Videogame/BatmanArkhamOrigins'', Batman needs access to the National Criminal Database in order to find out crucial information on The Joker. But the servers are offline, so Batman has to physically infiltrate the GCPD, plug a device into the servers, then perform air gap bridging in order to gain remote access to the server.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* Mostly averted in ''Film/{{Dredd}}''. Taking control of Peachtrees's computer systems involves a combination of breaking into the server room to alter the hardware and a number of social-engineering phone calls rather than screens full of code (although when we ''do'' see Clan Techie's computer screen, he appears to be working in [[https://en.wikipedia.org/wiki/Bash_(Unix_shell) Bash]] rather than the usual eye candy).

Added: 37940

Changed: 55202

Removed: 36851

Is there an issue? Send a MessageReason:
None


%%%
%%
%% This page has been alphabetized. Please add new examples in the correct order.
%%
%% Administrivia/ZeroContextExample entries are not allowed on wiki pages. All such entries have been commented out. Add context to the entries before uncommenting them.
%%
%%%



Hollywood Hacking is when some sort of convoluted metaphor is used not only to describe hacking but actually to put it into practice. Characters will come up with [[TechnoBabble rubbish]] like, "Extinguish the firewall!" and "I'll use the Millennium Bug to launch an OverclockingAttack on the whole Internet!" - even hacking [[EverythingIsOnline light switches and electric razors]], which is even sillier if said electric razor is unplugged. The intent is to employ a form of ArtisticLicense or [[HandWave hand waving]] which takes advantage of presumed technophobia among the audience. You can also expect this trope to annoy those within the audience whose occupation involves computers or the Internet.

to:

Hollywood Hacking is when some sort of convoluted metaphor is used not only to describe hacking but actually to put it into practice. Characters will come up with [[TechnoBabble rubbish]] like, "Extinguish the firewall!" and "I'll use the Millennium Bug to launch an OverclockingAttack on the whole Internet!" - -- even hacking [[EverythingIsOnline light switches and electric razors]], which is even sillier if said electric razor is unplugged. The intent is to employ a form of ArtisticLicense or [[HandWave hand waving]] which takes advantage of presumed technophobia among the audience. You can also expect this trope to annoy those within the audience whose occupation involves computers or the Internet.



* ''Manga/NegimaMagisterNegiMagi'' (the manga, at least) has [[spoiler: Chachamaru]] attempt to hack into the school's computer system, which are represented by pixellated sharks. A student uses an artifact to transport herself into cyberspace and fight them, MagicalGirl-style. It's almost certainly a parody of this trope, as she uses legitimate hacking techniques (SYN Flood, a Denial-of-Service attack, etc.) that are simply visualized in ridiculous ways (the DOS attack is a tuna, for example), and the "spells" that she's chanting are Unix shell commands with accurate iptables syntax.
* In ''Anime/NeonGenesisEvangelion'' both an Angel and SEELE attempt to hack into the Tokyo-3 MAGI, and both are repelled by Ritsuko's l33t h@xx0r ski11z with accompanying [[ExtremeGraphicalRepresentation ridiculous graphical representation]].
* ''Manga/YuGiOh'':
** Made fun of in ''WebVideo/YuGiOhTheAbridgedSeries'' where Kaiba's computer claims to be so advanced it makes hacking look like a [[ExtremeGraphicalRepresentation boring video game]]. Said computer also points out how Kaiba seems to be pressing the same keys over and over prompting the latter to claim he learned how to hack by watching old episodes of ''Franchise/StarTrek''.
** This concept is revisited in ''Anime/YuGiOhZEXAL'' when Yuma's sister Akari attempts to track down and destroy a virus, complete with an RPG-style dungeon and a boss battle.
** ''Anime/YuGiOh5Ds'' has a different version; rather than passwords, information is hidden behind duel puzzles (a duel-in-progress is presented and you have limited chances to figure out how to win in one turn). It's an... ''interesting'' way of shoehorning duels into episodes that otherwise wouldn't have them. At one point the access to an important database is hidden inside a duel puzzle ''arcade machine'' - the person who thought it up claims that nobody would look for a database there, plus he can slack off at the arcade and claim it's for work.
** ''Anime/YuGiOhVRAINS'' gets credit for showing the viewers that the camera is skipping the long, boring hours spent staring at pages of programming language, and enough appropriately used TechnoBabble [[ShownTheirWork to show that the writers have probably skimmed a programming book.]] It loses credit for abuse of ExtremeGraphicalRepresentation and gains a bit of it back when Yusaku's use of older versions of duel disks and physical cards is an actual hacker technique.
* In ''Anime/DenNohCoil'', even the least eye-catching examples of hacking look suspiciously like HermeticMagic and InstantRunes (the more visual ones? They involved ''rockets''). In this case, though, it's because a) they're not using the internet at all, but rather AugmentedReality technology and b) the Augmented Reality subculture in the series is dominated mostly by preteen children, the exact sort of people who ''would'' try to make hacking as flashy as possible.
* ''Anime/TengenToppaGurrenLagann'' has, in ''[[TheMovie Lagann-hen]]'', Lordgenome[[spoiler:'s head [[GratuitousEnglish HAACKIIIING]] into the Cathedral Terra by having a virtual recreation of his body run down a virtual hallway connecting the ships, then running around virtual corridors to find a box, smashing it open with his head and eating the red sphere inside it.]] Nobody cared about how unrealistic it was in this case because a) it's ''[[RuleOfCool Tengen Toppa Gurren Lagann]]'' and b) it was hilarious.
** As silly as it is, everything in this sequence is symbolically representative of real hacking: [[spoiler:Lordgenome first breaks through the firewalls, then searches for the file, attempts to open it with a password, fails, and uses a brute force decryption, succeeds and downloads the file.]]

to:

* ''Manga/NegimaMagisterNegiMagi'' (the manga, at least) has [[spoiler: Chachamaru]] attempt to hack into the school's computer system, which are represented by pixellated sharks. A student uses an artifact to transport herself into cyberspace and fight them, MagicalGirl-style. It's almost certainly a parody of this trope, as she uses legitimate hacking techniques (SYN Flood, a Denial-of-Service attack, etc.) that are simply visualized in ridiculous ways (the DOS attack is a tuna, for example), and the "spells" that she's chanting are Unix shell commands with accurate iptables syntax.
* In ''Anime/NeonGenesisEvangelion'' both an Angel and SEELE attempt to hack into the Tokyo-3 MAGI, and both are repelled by Ritsuko's l33t h@xx0r ski11z with accompanying [[ExtremeGraphicalRepresentation ridiculous graphical representation]].
* ''Manga/YuGiOh'':
** Made fun of in ''WebVideo/YuGiOhTheAbridgedSeries'' where Kaiba's computer claims to be so advanced it makes hacking look like a [[ExtremeGraphicalRepresentation boring video game]]. Said computer also points out how Kaiba seems to be pressing the same keys over and over prompting the latter to claim he learned how to hack by watching old episodes of ''Franchise/StarTrek''.
** This concept is revisited in ''Anime/YuGiOhZEXAL'' when Yuma's sister Akari attempts to track down and destroy a virus, complete with an RPG-style dungeon and a boss battle.
** ''Anime/YuGiOh5Ds'' has a different version; rather than passwords, information is hidden behind duel puzzles (a duel-in-progress is presented and you have limited chances to figure out how to win in one turn). It's an... ''interesting'' way of shoehorning duels into episodes that otherwise wouldn't have them. At one point the access to an important database is hidden inside a duel puzzle ''arcade machine'' - the person who thought it up claims that nobody would look for a database there, plus he can slack off at the arcade and claim it's for work.
** ''Anime/YuGiOhVRAINS'' gets credit for showing the viewers that the camera is skipping the long, boring hours spent staring at pages of programming language, and enough appropriately used TechnoBabble [[ShownTheirWork to show that the writers have probably skimmed a programming book.]] It loses credit for abuse of ExtremeGraphicalRepresentation and gains a bit of it back when Yusaku's use of older versions of duel disks and physical cards is an actual hacker technique.
* In ''Anime/DenNohCoil'', even the least eye-catching examples of hacking look suspiciously like HermeticMagic and InstantRunes (the more visual ones? They involved ones involve ''rockets''). In this case, though, it's because a) they're not using the internet at all, but rather AugmentedReality technology technology, and b) the Augmented Reality subculture in the series is dominated mostly by preteen children, the exact sort of people who ''would'' try to make hacking as flashy as possible.
* ''Anime/TengenToppaGurrenLagann'' has, in ''[[TheMovie Lagann-hen]]'', Lordgenome[[spoiler:'s head [[GratuitousEnglish HAACKIIIING]] into the Cathedral Terra by having a virtual recreation of his body run down a virtual hallway connecting the ships, then running around virtual corridors to find a box, smashing it open with his head and eating the red sphere inside it.]] Nobody cared about how unrealistic it was in this case because a) it's ''[[RuleOfCool Tengen Toppa Gurren Lagann]]'' and b) it was hilarious.
** As silly as it is, everything in this sequence is symbolically representative of real hacking: [[spoiler:Lordgenome first breaks through the firewalls, then searches for the file, attempts to open it with a password, fails, and uses a brute force decryption, succeeds and downloads the file.]]
possible.



** Firewalls are represented by spheres with shiny, meaningless glyphs on them. But when the characters hack into them, they do it by connecting an intrusion program (which looks sort of like a welding torch) and waiting a while (though it takes only a few seconds of screen time). In one episode, such a software hack was used to distract the target from the Major breaking in and physically connecting to the local network. The creators have noted that the cyberspace doesn't ''really'' look like that at all, but it's an entertaining visual representation for the audience's benefit. Even Creator/ShirowMasamune acknowledges in the original ''Manga/GhostInTheShell'' manga that cyberspace wouldn't have a visual appearance, and he only did so for the sake of entertainment. He created the series before the modern concept of the internet and cyberspace even existed.
** There are also Defense Barriers, which are firewalls for people's cyberbrains. A firewall designed to protect your very soul (which, having a cyberbrain, means it is now digital data and therefore tangible). Each level of the barrier rotates at varying speeds and opposite directions from each other, and you can pass through them by advancing through a specific hole that shows up when they are properly aligned.
* ''Manga/HanaukyoMaidTeam'' has the maid staff trying to prevent a hacker from accessing their system by playing what appears to be a game of ''VideoGame/{{Centipede}}'' against a spider that's stealing information by walking across the screen and grabbing boxes from a warehouse. When Grace wakes up she defeats the hackers with some quick keystrokes by summoning a giant ''VideoGame/PacMan''.
* ''Anime/SummerWars'' features a lot of the Hollywood Hacking staples, such as RapidFireTyping and virtual reality representations for hacking, but it also balances it out with a lot of parts that are grounded in reality (such as the movie's villain, a hacker AI named Love Machine, acting like a [[http://en.wikipedia.org/wiki/Botnet botnet program,]] and doing things the way an actual real-life hacker would do them.) The main silly thing is the giant sequence of digits, apparently meant to be a password hash, which Kenji "solves" on paper in a few hours...then again, in a few minutes...then again, ''[[SerialEscalation in his head]]''. Leaving aside the nigh-impossibility of reverse-engineering a password from a hash ''at all'', let alone by hand (that's the whole point of hashing passwords before storing them), why would Oz willingly spit the number at anyone trying to hack their way in, especially if it's solvable?
* In ''Manga/MissionYozakuraFamily'', Shion's preferred method of hacking computers converts the entire OS into a video game for her to play and beat based on what she wants it to do.

to:

** Firewalls are represented by spheres with shiny, meaningless glyphs on them. But when When the characters hack into them, they do it by connecting an intrusion program (which looks sort of like a welding torch) and waiting a while (though it takes only a few seconds of screen time). In one episode, such a software hack was is used to distract the target from the Major breaking in and physically connecting to the local network. The creators have noted that the cyberspace {{cyberspace}} doesn't ''really'' look like that at all, but it's an entertaining visual representation for the audience's benefit. Even Creator/ShirowMasamune acknowledges in the original ''Manga/GhostInTheShell'' manga that cyberspace wouldn't have a visual appearance, and he only did so for the sake of entertainment. He created the series before the modern concept of the internet and cyberspace even existed.
** There are also Defense Barriers, which are firewalls for people's cyberbrains. A [[BrainComputerInterface cyberbrains]] -- a firewall designed to protect your very soul (which, having a cyberbrain, means it is now digital data and therefore tangible). Each level of the barrier rotates at varying speeds and opposite directions from each other, and you can pass through them by advancing through a specific hole that shows up when they are properly aligned.
aligned.
* ''Manga/HanaukyoMaidTeam'' has the maid staff trying to prevent a hacker from accessing their system by playing what appears to be a game of ''VideoGame/{{Centipede}}'' against a spider that's stealing information by walking across the screen and grabbing boxes from a warehouse. When Grace wakes up up, she defeats the hackers with some quick keystrokes by summoning a giant ''VideoGame/PacMan''.
* ''Anime/SummerWars'' features a lot of the Hollywood Hacking staples, such as RapidFireTyping and virtual reality representations for hacking, but it also balances it out with a lot of parts that are grounded in reality (such as the movie's villain, a hacker AI named Love Machine, acting like a [[http://en.wikipedia.org/wiki/Botnet botnet program,]] and doing things the way an actual real-life hacker would do them.) The main silly thing is the giant sequence of digits, apparently meant to be a password hash, which Kenji "solves" on paper in a few hours...then again, in a few minutes...then again, ''[[SerialEscalation in his head]]''. Leaving aside the nigh-impossibility of reverse-engineering a password from a hash ''at all'', let alone by hand (that's the whole point of hashing passwords before storing them), why would Oz willingly spit the number at anyone trying to hack their way in, especially if it's solvable?
* In ''Manga/MissionYozakuraFamily'', Shion's preferred method of hacking computers converts the entire OS into a video game for her to play and beat based on what she wants it to do.
VideoGame/PacMan.



* In ''Manga/MissionYozakuraFamily'', Shion's preferred method of hacking computers converts the entire OS into a video game for her to play and beat based on what she wants it to do.
* ''Manga/NegimaMagisterNegiMagi'' has [[spoiler:Chachamaru]] attempt to hack into the school's computer system, which are represented by pixelated sharks. A student uses an artifact to transport herself into cyberspace and fight them, MagicalGirl-style. It's almost certainly a parody of this trope, as she uses legitimate hacking techniques (SYN Flood, a Denial-of-Service attack, etc.) that are simply visualized in ridiculous ways (the DOS attack is a tuna, for example), and the "spells" that she's chanting are Unix shell commands with accurate iptables syntax.
* In ''Anime/NeonGenesisEvangelion'', both an Angel and SEELE attempt to hack into the Tokyo-3 MAGI, and both are repelled by Ritsuko's l33t h@xx0r ski11z with accompanying ExtremeGraphicalRepresentation.
* ''Anime/TengenToppaGurrenLagann'' has, in ''[[TheMovie Lagann-hen]]'', Lordgenome[[spoiler:'s head [[GratuitousEnglish HAACKIIIING]] into the Cathedral Terra by having a virtual recreation of his body run down a virtual hallway connecting the ships, then running around virtual corridors to find a box, smashing it open with his head and eating the red sphere inside it]]. Nobody cared about how unrealistic it was in this case because a) it's ''[[RuleOfCool Tengen Toppa Gurren Lagann]]'' and b) it's hilarious. As silly as it is, though, everything in this sequence is symbolically representative of real hacking: [[spoiler:Lordgenome first breaks through the firewalls, then searches for the file, attempts to open it with a password, fails, and uses a brute force decryption, succeeds and downloads the file]].
* ''Franchise/YuGiOh'':
** In ''Anime/YuGiOhZEXAL'', Yuma's sister Akari attempts to track down and destroy a virus, complete with an RPG-style dungeon and a boss battle.
** ''Anime/YuGiOh5Ds'' has a different version; rather than passwords, information is hidden behind duel puzzles (a duel-in-progress is presented and you have limited chances to figure out how to win in one turn). It's an... ''interesting'' way of shoehorning duels into episodes that otherwise wouldn't have them. At one point the access to an important database is hidden inside a duel puzzle ''arcade machine'' -- the person who thought it up claims that nobody would look for a database there, plus he can slack off at the arcade and claim it's for work.
** ''Anime/YuGiOhVRAINS'' gets credit for showing the viewers that the camera is skipping the long, boring hours spent staring at pages of programming language, and appropriately uses {{Technobabble}} [[ShownTheirWork to show that the writers have probably skimmed a programming book]]. It loses credit for abuse of ExtremeGraphicalRepresentation and gains a bit of it back when Yusaku's use of older versions of duel disks and physical cards is an actual hacker technique.



[[folder:Comedy]]
* Played with in one of Creator/SuzyEddieIzzard's stand-up routines.
-->"Hundred bazillion possible passwords... 'Jeff'! And I'm in."\\
"How did you know?"\\
"Well, he was born in Jeff, on the seventh day of Jeff, nineteen-Jeffty-Jeff... And they're always so swish about it, too: hacking into the Pentagon computer... double-click on 'yes'..."
[[/folder]]



* ''ComicBook/ContestOfChampions2015'': Spoofed when Night Thrasher tries to hack the Maestro's security systems keeping the heroes and villains imprisoned. Bullseye incredulously points out that you can't just declare you're going to hack something like that, as the scene shifts to Night Thrasher "inside" the system like it's an 80s video game. Before she's even done complaining, he has in fact hacked the system. Because he's Night Thrasher.



** ComicBook/{{Batgirl}} Barbara Gordon, her villain counterpart The Calculator, and his daughter/her protege Proxy, all dabble into this.

to:

** ComicBook/{{Batgirl}} Barbara Gordon, her villain counterpart The the Calculator, and his daughter/her protege Proxy, all dabble into this.



** As both ComicBook/RedRobin and ComicBook/{{Robin}}, Tim Drake displayed a remarkable hacking aptitude, occasionally working under Barbara's tutelage. He was also the first Batfamily member to incorporate a functioning connection to the Batcomputer in his suit as Robin and worked on infiltrating and taking down the Unternet as Red Robin.
* In the lead up to the ''Franchise/{{Superman}}'' storyline ''ComicBook/TheFallOfMetropolis'', ComicBook/LexLuthor is able to intercept a story ComicBook/LoisLane wrote concerning the truth about his clone body using a special computer chip he made for all of his Lexcorp-brand computers and a simple modem, alter the story to make her a laughingstock ''and'' blame her for embezzlement of the ''Daily Planet's'' funds.

to:

** As both ComicBook/RedRobin and ComicBook/{{Robin}}, Tim Drake displayed displays a remarkable hacking aptitude, occasionally working under Barbara's tutelage. He was He's also the first Batfamily member to incorporate a functioning connection to the Batcomputer in his suit as Robin Robin, and worked works on infiltrating and taking down the Unternet as Red Robin.
* ''ComicBook/ContestOfChampions2015'': Spoofed when Night Thrasher tries to hack the Maestro's security systems keeping the heroes and villains imprisoned. Bullseye incredulously points out that you can't just declare you're going to hack something like that, as the scene shifts to Night Thrasher "inside" the system like it's a 1980s video game. Before she's even done complaining, he has in fact hacked the system.
*
In the lead up lead-up to the ''Franchise/{{Superman}}'' ''ComicBook/{{Superman}}'' storyline ''ComicBook/TheFallOfMetropolis'', ComicBook/LexLuthor Lex Luthor is able to intercept a story ComicBook/LoisLane Lois Lane wrote concerning the truth about his clone body using a special computer chip he made for all of his Lexcorp-brand computers and a simple modem, alter the story to make her a laughingstock ''and'' blame her for embezzlement of the ''Daily Planet's'' Planet'''s funds.



* A [[http://filmmakeriq.com/2012/04/michael-bays-rejected-the-dark-knight-script/ "leaked" version]] of Michael Bay's script for ''Film/TheDarkKnight'' (it's fake) contains a hilarious version of this quite close to the ''Penny Arcade'' example.

to:

* A The ''Series/BuffyTheVampireSlayer'' parody fic [[http://archiveofourown.org/works/986234 "First Try Turning It On"]] asks the important question, 'What if "[[Recap/BuffyTheVampireSlayerS1E8IRobotYouJane I Robot, You Jane]]" was a Hollywood blockbuster hacker movie?'
-->'''Willow:''' I've been trying to modem the wire with a disconnect net number, but the virtual backup is too leet for the digital hackosphere of this coding wipe.
* The parody fic [[https://www.fanfiction.net/s/12907204/1/It-Could-Be-Worse "It Could Be Worse"]] mocks [[Series/{{Arrow}} Felicity Smoak]]'s tendency for this, and general status as a CreatorsPet. She rescues Oliver from being overwhelmed by Mooks and then whips out a tablet and "using movements too complicated to do so"...
-->''"I've used a Java applet to hack into the satellites above the Earth, thus redirecting the path of the sun and the Earth, therefore creating an eclipse. Therefore, your solar-powered suits are no more."''
* This
[[http://filmmakeriq.com/2012/04/michael-bays-rejected-the-dark-knight-script/ "leaked" version]] faked 'leak']] of Michael "Michael Bay's script for Rejected ''Film/TheDarkKnight'' (it's fake) Script" contains a hilarious version of this quite close to the ''Penny Arcade'' ''Webcomic/PennyArcade'' example.



* [[http://archiveofourown.org/works/986234 This]] ''Series/BuffyTheVampireSlayer'' parody fic asks the important question, "What if "I Robot, You Jane" was a Hollywood blockbuster hacker movie?"
-->'''Willow''': I’ve been trying to modem the wire with a disconnect net number, but the virtual backup is too leet for the digital hackosphere of this coding wipe.
* The parody fic ''[[https://www.fanfiction.net/s/12907204/1/It-Could-Be-Worse It Could Be Worse]]'' mocks [[Series/{{Arrow}} Felicity Smoak's]] tendency for this, and general status as a CreatorsPet. She rescues Oliver from being overwhelmed by Mooks and then whips out a tablet and "using movements to complicated to do so"...
-->"I've used a Java applet to hack into the satellites above the Earth, thus redirecting the path of the sun and the Earth, therefore creating an eclipse. Therefore, your solar-powered suits are no more."



* Exaggerated in ''WesternAnimation/WreckItRalph''. [[spoiler:Turbo invades ''Sugar Rush'' and attempts to delete Vanellope Von Schweetz from the game code, but can only render her as a glitch and modifies everyone's memory of her so they treat her as a criminal and an outcast.]]

to:

* In ''WesternAnimation/JonnyQuestVersusTheCyberInsects'', Dr. Zin's {{Mooks}} instantly upload a vague kind of virus into the Quest family's RobotBuddy just by pressing some random button, which ''instantaneously'' totally rewrites his programming and brings him under Zin's remote control. Jonny also hacks Zin's own computer with the same virus later on.
* ''Anime/SummerWars'' features a lot of the Hollywood Hacking staples, such as RapidFireTyping and virtual reality representations for hacking, but it also balances it out with a lot of parts that are grounded in reality (such as the movie's villain, a hacker AI named Love Machine, acting like a [[http://en.wikipedia.org/wiki/Botnet botnet program,]] and doing things the way an actual real-life hacker would do them). The main silly thing is the giant sequence of digits, apparently meant to be a password hash, which Kenji "solves" on paper in a few hours... then again, in a few minutes... then again, ''[[SerialEscalation in his head]]''. Leaving aside the nigh-impossibility of reverse-engineering a password from a hash ''at all'', let alone by hand (that's the whole point of hashing passwords before storing them), why would Oz willingly spit the number at anyone trying to hack their way in, especially if it's solvable?
* Exaggerated in ''WesternAnimation/WreckItRalph''. [[spoiler:Turbo invades ''Sugar Rush'' and attempts to delete Vanellope Von Schweetz from the game code, but can only render her as a glitch and modifies everyone's memory of her so that they treat her as a criminal and an outcast.]]



* Whenever Vivian hacks a system in ''Film/AsianSchoolGirls'', the audience never sees what is happening on the computer screen. There's just a shot of the back of the computer, the sound of Vivian's RapidFireTyping, and then her announcing that she is in.
* ''Film/TheCore'' has one of the characters reroute power from the US to a single location and find secret weapons files seemingly from the Internet.
* ''Film/TheFateOfTheFurious'': In the New York sequence, Cipher first hacks into [[EverythingIsOnline every security camera on Manhattan]]... then [[spoiler:remote-controls several hundred cars, including an early 2000s Prius hilariously shown with a fancy, high-fidelity "autopilot engaged" message on its low-def navigation]]. She does all of this from her [[CoolPlane cushy flying bad guy lair]], which apparently has so much computing power that it can alter reality.
* ''Film/Fortress1992'': The genius D-Day sits down at the keyboard of Zed-10, the [[AIIsACrapshoot mad]] MasterComputer. He types the password (which is "Crime does not pay", [[ThePasswordIsAlwaysSwordfish the motto Zed-10 repeats every now and then]]) and then he types... "INSTALL D-DAY'S REVENGE VIRUS".
* In ''Film/GIJoeTheRiseOfCobra'', Breaker manages to hack a dead man's ''brain''.
* ''Film/{{Hackers}}'', of course. The entire movie, basically -- and it is glorious. There are some realistic discussions about password security, which is how some of the earlier hacks get done (admin password is God...), and pretty much all of the prep work for the big hack is actually realistic. Lots of stealing passwords, going through discarded printouts, tapping the phone lines. It's like they did all the research on how hacking actually happens and then decided that would be ''boring''.
* ''Film/IndependenceDay'', with extra bonus points for [[PlugNPlayTechnology hacking into an alien computer]], and figuring out its display well enough to send [[HackedByAPirate a laughing skull and crossbones]] to the invaders. The {{novelization}} and {{deleted scene}}s imply that Apple computers (among other things) were [[ETGaveUsWiFi derived from alien technology]].
* ''Film/JohnnyMnemonic'', unsurprisingly written by Creator/WilliamGibson (both the short story and the screenplay), has a scene in which Johnny [[https://www.youtube.com/watch?v=8p0jmewhXeU uses a VR headset and gloves for hacking]], entering codes on a virtual keypad and in some places rearranging some blocks in a pyramid-shaped 3D puzzle, and another time hacking into his own brain with an avatar that dodged attacks from a security program and pulled an image out of his implant. The original short story just has Jones reading the imprint of the access code on his implant with a [[http://en.wikipedia.org/wiki/SQUID SQUID]].
* ''Film/JurassicPark1993'' has an infamous scene in which the kid hero exclaims "It's a UNIX system. I know this." over a screen of what appears to be zooming polygon nonsense. This program actually existed: it's a legitimate UNIX OS derivative from SGI called IRIX that was running a 3D file system navigator, but it never caught on due to being very slow and overly flashy. Then again, "overly flashy" describes half the equipment in the park, so that at least makes some sense why Hammond would insist on using such a system. This scene has become so iconic of all that's wrong about Hollywood depictions of technology that Website/{{Reddit}} has a whole "subreddit" (forum) dedicated to "every over-the-top, embarrassing, and downright flat-out incorrect usage of technology found in movies, TV shows, and video games"[[note]](except for wrong IP addresses; those are so frequent that they're not accepted anymore)[[/note]] called, you guessed it, [[https://www.reddit.com/r/itsaunixsystem/ r/ItsAUnixSystem]].
* ''Film/KingsmanTheSecretService'': It takes Merlin only a few seconds of frantic key-tapping to [[spoiler:remote-activate all of Valentine's explosive loyalty-chip implants worldwide]]. A little odd, considering that Valentine's other mass-murdering doom-machine uses its own private satellite network biologically keyed to Valentine's hand, which prompts Merlin to say that he can't hack something that complicated. {{Justified|Trope}} to a certain extent, as we're explicitly shown the biometric system's installation a long time after we're made aware that [[spoiler:every member of the conspiracy is already implanted]] and those are (currently) on a separate, older system, and that it requires a gruesome constant connection to Valentine's hand. As well, while Merlin only taps a few keys, the computer shows lines upon lines of code streaming past, showing that Merlin isn't manually hacking the system, he merely triggered a program to do it.
* Parodied (like everything else) in ''Film/KungFury'' with Hackerman, who specializes in this. "With the right computer algorithms, I can hack you ''[[TimeTravel back in time]]'', just like a {{time machine}}." Hacking can also heal bullet wounds, revive the dead, and turn Hackerman into a robot with a laser gun. In [[https://www.youtube.com/watch?v=KEkrWRHCDQU this video]], Hackerman shows us how to hack time.
* ''Film/LiveFreeOrDieHard'' is the subject of the ''Webcomic/PennyArcade'' strip quoted at the top of the page.
* ''Film/TheMangler 2'' features a website known as "The Hackers Mall" which appears to date from the early 1990s and displays a visual homage to the skull and crossbones from ''Film/IndependenceDay'', numerous examples of EverythingIsOnline (various "hacked" cables posing a physical threat to the protagonists), and a wired-up Creator/LanceHenriksen/computer hybrid with what looks like a bucket attached to its foot. Also, CyberpunkIsTechno.



* In the 1985 movie ''Film/WeirdScience'', Wyatt uses a computer program, "Crypto Smasher v3.10", that provides a very detailed (for that time) graphical representation of the hacking he is doing to break into a military computer system. The connections are all rendered as tunnels, with the mainframe itself appearing as a vast space with CGI versions of images from the opening sequence of ''Series/TheTwilightZone1959''.
* This is also seen in the movie ''Film/{{Swordfish}}'' to a degree when Hugh Jackman's character creates a worm to hack into a bank and steal the money for John Travolta's organization. This film features large amounts of RapidFireTyping and ViewerFriendlyInterface. Also, as he is first hired, the hacker is able to break into a government network in only 60 seconds through extreme RapidFireTyping while receiving oral sex and with a gun pointed at his head. Hugh is [[TheAce the best at what he does]]. At another point in the movie, the dialogue indicates that the writers of the movie think that a computer with multiple monitors is inherently more powerful than one that has just one.
* ''Film/WarGames'' invented the whole ''tapping-a-few-keys-and-saying-"We're-in"'' shtick, and set the general form of how every movie hacker is portrayed. At the time, the techniques presented in ''Film/WarGames'' were ''very'' realistic, from phone phreaking, [[TropeNamer wardialing]], to social engineering. Some aspects of which are still in use ''successfully'' today, especially the social engineering aspect. (Just look at the trope image.) It's just that Hollywood never got past the 1980s in terms of graphical representation. And in the real world, TechnologyMarchesOn and most of it got much, much more boring and automated since then.
** The most dramatic "hacking" scene, though, was very much straight out of Hollywood: WOPR attempts to crack the nuclear launch codes, and the characters in the password "lock in" one character at a time like some sort of bizarre slot machine. Real systems will never ([[https://en.wikipedia.org/wiki/Timing_attack intentionally]]) give you any information about an incorrect password other than the fact that it's wrong. Have you ever entered an incorrect password into a computer and been told which characters were incorrect?
* ''Film/{{Hackers}}'', of course. The entire movie basically. And it is glorious. There are some realistic discussions about password security, which is how some of the earlier hacks get done (Admin password is God...), and pretty much all of the prep work for the big hack is actually realistic. Lots of stealing passwords, going through discarded printouts, tapping the phone lines. It's like they did all the research on how hacking actually happens and then decided that would be ''boring''.
* ''Film/LiveFreeOrDieHard'' is the subject of the ''Penny Arcade'' strip quoted at the top of the page.
* Played with in one of Eddie Izzard's stand-up routines.
-->"Hundred bazillion possible passwords... "Jeff"! And I'm in."\\
"How did you know?"\\
"Well, he was born in Jeff, on the seventh day of Jeff, nineteen-Jeffty-Jeff... And they're always so swish about it, too: Hacking into the Pentagon computer... double-click on "yes"..."
* ''Film/Fortress1992'': the genius D-Day sits down at the keyboard of Zed-10, the [[AIIsACrapshoot mad]] MasterComputer. He types the password (which is "Crime does not pay", [[ThePasswordIsAlwaysSwordfish the motto Zed-10 repeats every now and then]]) and then he types... "INSTALL D-DAY'S REVENGE VIRUS".
* ''Film/IndependenceDay'', with extra bonus points for [[PlugNPlayTechnology hacking into an]] ''[[PlugNPlayTechnology alien]]'' [[PlugNPlayTechnology computer]], and figuring out its display well enough to send a visual TakeThat to the invaders.
** The novelization and deleted scenes imply that Apple computers (among other things) were derived from alien technology.
* ''Film/TheMangler2'' features a website known as "The Hackers Mall" which appears to date from the early 1990s and displays a visual homage to the TakeThat of ''Independence Day'', numerous examples of EverythingIsOnline (various "hacked" cables posing a physical threat to the protagonists) and a wired up Creator/LanceHenriksen/computer hybrid with what looks like a bucket attached to its foot. Also, CyberpunkIsTechno.
* ''Film/TheCore'' has one of the characters reroute power from the US to a single location and find secret weapons files seemingly from the Internet.
* ''Franchise/StarWars''' R2[=D2=] can hack into any Imperial or Civilian computer system with ease, so long as he can tell the difference between a computer terminal and a power socket.
* ''Film/JurassicPark1993'' has an infamous scene where the kid hero exclaims "It's a UNIX system. I know this." over a screen of what appears to be zooming polygon nonsense. This program actually existed: it's a legitimate UNIX OS derivative from SGI called IRIX that was running a 3D file system navigator, but it never caught on due to being very slow and overly flashy. Then again, "overly flashy" describes half the equipment in the park, so that at least makes some sense why Hammond would insist on using such a system.
** This scene has become so iconic of all that's wrong about Hollywood depictions of technology, that Reddit has a whole "subreddit" (forum) dedicated to "every over-the-top, embarrassing, and downright flat-out incorrect usage of technology found in movies, TV shows, and video games"[[note]](except for wrong IP addresses; those are so frequent that they're not accepted anymore)[[/note]] called, you guessed it, [[https://www.reddit.com/r/itsaunixsystem/ r/ItsAUnixSystem]]
* In ''Film/{{Skyfall}}'', Q has a hacking display resembling a wire model, whilst hacking can be used to achieve practically anything, from leaving "breadcrumbs", to causing gas explosions. It isn't, by any means, the first James Bond movie to feature hacking, but it is perhaps the most straight example of this trope.
** More intriguingly, Q claims that only roughly six people are competent enough in the world to design honeypot files which are designed to wipe system memory when the files are accessed, and then claims that he was the person who ''invented'' this. Having now established himself as a security expert, he then networks the BigBad's laptop directly into the [=MI6=] main server...
* 1995's ''Film/{{The Net|1995}}'' focuses on a mysterious secret program that is used to erase Sandra Bullock's identity from every computer in the world. The film culminates with the deletion of the program, which ''reverses the erasure'': this is comparable to deleting your personal copy of [=OpenOffice=] and thus undoing every edit you've made to every [=OpenOffice=] file, ''even those you've moved to other computers''.
* In ''Film/GIJoeTheRiseOfCobra'' Breaker manages to hack a dead man's ''brain''.
* In ''Film/{{Scanners}}'', the protagonist hacks into a computer system through a public phone booth using only his telepathic brain.
* ''Film/JohnnyMnemonic'', unsurprisingly written by Creator/WilliamGibson (both the short story and the screenplay) has a scene where Johnny uses a [[https://www.youtube.com/watch?v=8p0jmewhXeU VR headset and gloves for hacking]], entering codes on a virtual keypad and in some places rearranging some blocks in a pyramid-shaped 3D puzzle, and another time hacking into his own brain with an avatar that dodged attacks from a security program and pulled an image out of his implant. Though the original short story just had Jones reading the imprint of the access code on his implant with a [[http://en.wikipedia.org/wiki/SQUID SQUID]].
* ''{{Film/Sneakers}}'' accurately depicts a lot of the social engineering aspects and overall straight-up footwork required to get the basic information on what you need to get into and how you get into it, while the stuff you see actually on the computer screens is utterly Hollywood.
* The original ''Film/{{TRON}}'' is a bit of legitimate and much Hollywood intrusion. The ideas of physically accessing the internal network to log in with a backdoor, and injecting high CPU-use problems into the system to keep the MCP busy are reasonably legitimate, the fact that your security programs are represented as {{Anthropomorphic Personification}}s inside the Grid, well... not so much.
* Parodied (like everything else) in ''Film/KungFury'' with Hackerman, who specializes in this. "With the right computer algorithms, I can hack you ''[[TimeTravel back in time,]]'' just like a [[TimeMachine time machine.]]" Hacking can also heal bullet wounds, revive the dead, and turn Hackerman into a robot with a laser gun.
** In [[https://www.youtube.com/watch?v=KEkrWRHCDQU this video]], Hackerman shows us how to hack time.
* ''Film/KingsmanTheSecretService'': It takes Merlin only a few seconds of frantic key-tapping to [[spoiler:remote-activate all of Valentine's explosive loyalty-chip implants worldwide]]. A little odd, considering Valentine's other mass-murdering doom-machine uses its own private satellite network biologically keyed to Valentine's hand, which prompts Merlin to say that he can't hack something that complicated. {{Justified}} to a certain extent, as we're explicitly shown the biometric system's installation a long time after we're made aware that [[spoiler:every member of the conspiracy is already implanted]] and those are (currently) on a separate, older system, and that it requires a gruesome constant connection to Valentine's hand. As well, while Merlin only taps a few keys, the computer shows lines upon lines of code streaming past, showing that Merlin isn't manually hacking the system, he merely triggered a program to do it.
* ''Film/TheFateOfTheFurious'': The New York sequence where Charlize Theron's character first hacks into [[EverythingIsOnline every security camera on Manhattan]]...then [[spoiler: remote controls several hundred cars, including an early 2000s Prius hilariously shown with a fancy, high-fidelity "autopilot engaged" message on its low-def navigation]]. She does all of this from her [[CoolPlane cushy flying bad guy lair]], which apparently has so much computing power it can alter reality.
* Whenever Vivian hacks a system in ''Film/AsianSchoolGirls'', the audience never sees what is happening on the computer screen. there is just a shot of the back of the computer, the sound of Vivian's RapidFireTyping, and then her announcing that she is in.

to:

* In the 1985 movie ''Film/WeirdScience'', Wyatt uses a computer program, "Crypto Smasher v3.10", that provides a very detailed (for that time) graphical representation of the hacking he is doing to break into a military computer system. The connections are all rendered as tunnels, with the mainframe itself appearing as a vast space with CGI versions of images from the opening sequence of ''Series/TheTwilightZone1959''.
* This is also seen in the movie ''Film/{{Swordfish}}'' to a degree when Hugh Jackman's character creates a worm to hack into a bank and steal the money for John Travolta's organization. This film features large amounts of RapidFireTyping and ViewerFriendlyInterface. Also, as he is first hired, the hacker is able to break into a government network in only 60 seconds through extreme RapidFireTyping while receiving oral sex and with a gun pointed at his head. Hugh is [[TheAce the best at what he does]]. At another point in the movie, the dialogue indicates that the writers of the movie think that a computer with multiple monitors is inherently more powerful than one that has just one.
* ''Film/WarGames'' invented the whole ''tapping-a-few-keys-and-saying-"We're-in"'' shtick, and set the general form of how every movie hacker is portrayed. At the time, the techniques presented in ''Film/WarGames'' were ''very'' realistic, from phone phreaking, [[TropeNamer wardialing]], to social engineering. Some aspects of which are still in use ''successfully'' today, especially the social engineering aspect. (Just look at the trope image.) It's just that Hollywood never got past the 1980s in terms of graphical representation. And in the real world, TechnologyMarchesOn and most of it got much, much more boring and automated since then.
** The most dramatic "hacking" scene, though, was very much straight out of Hollywood: WOPR attempts to crack the nuclear launch codes, and the characters in the password "lock in" one character at a time like some sort of bizarre slot machine. Real systems will never ([[https://en.wikipedia.org/wiki/Timing_attack intentionally]]) give you any information about an incorrect password other than the fact that it's wrong. Have you ever entered an incorrect password into a computer and been told which characters were incorrect?
* ''Film/{{Hackers}}'', of course. The entire movie basically. And it is glorious. There are some realistic discussions about password security, which is how some of the earlier hacks get done (Admin password is God...), and pretty much all of the prep work for the big hack is actually realistic. Lots of stealing passwords, going through discarded printouts, tapping the phone lines. It's like they did all the research on how hacking actually happens and then decided that would be ''boring''.
* ''Film/LiveFreeOrDieHard'' is the subject of the ''Penny Arcade'' strip quoted at the top of the page.
* Played with in one of Eddie Izzard's stand-up routines.
-->"Hundred bazillion possible passwords... "Jeff"! And I'm in."\\
"How did you know?"\\
"Well, he was born in Jeff, on the seventh day of Jeff, nineteen-Jeffty-Jeff... And they're always so swish about it, too: Hacking into the Pentagon computer... double-click on "yes"..."
* ''Film/Fortress1992'': the genius D-Day sits down at the keyboard of Zed-10, the [[AIIsACrapshoot mad]] MasterComputer. He types the password (which is "Crime does not pay", [[ThePasswordIsAlwaysSwordfish the motto Zed-10 repeats every now and then]]) and then he types... "INSTALL D-DAY'S REVENGE VIRUS".
* ''Film/IndependenceDay'', with extra bonus points for [[PlugNPlayTechnology hacking into an]] ''[[PlugNPlayTechnology alien]]'' [[PlugNPlayTechnology computer]], and figuring out its display well enough to send a visual TakeThat to the invaders.
** The novelization and deleted scenes imply that Apple computers (among other things) were derived from alien technology.
* ''Film/TheMangler2'' features a website known as "The Hackers Mall" which appears to date from the early 1990s and displays a visual homage to the TakeThat of ''Independence Day'', numerous examples of EverythingIsOnline (various "hacked" cables posing a physical threat to the protagonists) and a wired up Creator/LanceHenriksen/computer hybrid with what looks like a bucket attached to its foot. Also, CyberpunkIsTechno.
* ''Film/TheCore'' has one of the characters reroute power from the US to a single location and find secret weapons files seemingly from the Internet.
* ''Franchise/StarWars''' R2[=D2=] can hack into any Imperial or Civilian computer system with ease, so long as he can tell the difference between a computer terminal and a power socket.
* ''Film/JurassicPark1993'' has an infamous scene where the kid hero exclaims "It's a UNIX system. I know this." over a screen of what appears to be zooming polygon nonsense. This program actually existed: it's a legitimate UNIX OS derivative from SGI called IRIX that was running a 3D file system navigator, but it never caught on due to being very slow and overly flashy. Then again, "overly flashy" describes half the equipment in the park, so that at least makes some sense why Hammond would insist on using such a system.
** This scene has become so iconic of all that's wrong about Hollywood depictions of technology, that Reddit has a whole "subreddit" (forum) dedicated to "every over-the-top, embarrassing, and downright flat-out incorrect usage of technology found in movies, TV shows, and video games"[[note]](except for wrong IP addresses; those are so frequent that they're not accepted anymore)[[/note]] called, you guessed it, [[https://www.reddit.com/r/itsaunixsystem/ r/ItsAUnixSystem]]
* In ''Film/{{Skyfall}}'', Q has a hacking display resembling a wire model, whilst hacking can be used to achieve practically anything, from leaving "breadcrumbs", to causing gas explosions. It isn't, by any means, the first James Bond movie to feature hacking, but it is perhaps the most straight example of this trope.
** More intriguingly, Q claims that only roughly six people are competent enough in the world to design honeypot files which are designed to wipe system memory when the files are accessed, and then claims that he was the person who ''invented'' this. Having now established himself as a security expert, he then networks the BigBad's laptop directly into the [=MI6=] main server...
* 1995's ''Film/{{The Net|1995}}''
''Film/TheNet1995'' focuses on a mysterious secret program that is used to erase Sandra Bullock's Angela's identity from every computer in the world. The film culminates with the deletion of the program, which ''reverses the erasure'': this is comparable to deleting your personal copy of [=OpenOffice=] and thus undoing every edit you've made to every [=OpenOffice=] file, ''even those you've moved to other computers''.
* In ''Film/GIJoeTheRiseOfCobra'' Breaker manages to hack a dead man's ''brain''.
* In ''Film/{{Scanners}}'', the protagonist hacks into a computer system through a public phone booth [[{{Technopath}} using only his telepathic brain.
brain]].
* ''Film/JohnnyMnemonic'', unsurprisingly written by Creator/WilliamGibson (both the short story and the screenplay) In ''Film/{{Skyfall}}'', Q has a scene where Johnny uses a [[https://www.youtube.com/watch?v=8p0jmewhXeU VR headset and gloves for hacking]], entering codes on a virtual keypad and in some places rearranging some blocks in a pyramid-shaped 3D puzzle, and another time hacking into his own brain with an avatar display resembling a wire model, whilst hacking can be used to achieve practically anything, from leaving "breadcrumbs", to causing gas explosions. It isn't, by any means, the first James Bond movie to feature hacking, but it is perhaps the straightest example of this trope. More intriguingly, Q claims that dodged attacks from only roughly six people are competent enough in the world to design honeypot files which are designed to wipe system memory when the files are accessed, and then claims that he was the person who ''invented'' this. Having now established himself as a security program and pulled an image out of his implant. Though expert, he then networks the original short story just had Jones reading BigBad's laptop directly into the imprint of the access code on his implant with a [[http://en.wikipedia.org/wiki/SQUID SQUID]].
[=MI6=] main server...
* ''{{Film/Sneakers}}'' ''Film/{{Sneakers}}'' accurately depicts a lot of the social engineering aspects and overall straight-up footwork required to get the basic information on what you need to get into and how you get into it, while the stuff you see actually on the computer screens is utterly Hollywood.
* ''Franchise/StarWars'': R2-D2 can hack into any Imperial or civilian computer system with ease, so long as he can tell the difference between a computer terminal and a power socket.
* This is seen in ''Film/{{Swordfish}}'' to a degree when Stanley creates a worm to hack into a bank and steal the money for Gabriel's organization.
The original film features large amounts of RapidFireTyping and ViewerFriendlyInterface. Also, as he is first hired, Stanley is able to break into a government network in only 60 seconds through extreme RapidFireTyping while receiving oral sex and with a gun pointed at his head. Stanley is [[TheAce the best at what he does]]. At another point in the movie, the dialogue indicates that the writers of the movie thought that a computer with multiple monitors is inherently more powerful than one that has just one.
*
''Film/{{TRON}}'' is a bit of legitimate and much Hollywood intrusion. The ideas of physically accessing the internal network to log in with a backdoor, and injecting high CPU-use problems into the system to keep the MCP busy are reasonably legitimate, the fact that your security programs are represented as {{Anthropomorphic Personification}}s inside the Grid, well... not so much.
* Parodied (like everything else) in ''Film/KungFury'' with Hackerman, who specializes in this. "With the right computer algorithms, I can hack you ''[[TimeTravel back in time,]]'' just like a [[TimeMachine time machine.]]" Hacking can also heal bullet wounds, revive the dead, and turn Hackerman into a robot with a laser gun.
** In [[https://www.youtube.com/watch?v=KEkrWRHCDQU this video]], Hackerman shows us how to hack time.
* ''Film/KingsmanTheSecretService'': It takes Merlin only a few seconds of frantic key-tapping to [[spoiler:remote-activate all of Valentine's explosive loyalty-chip implants worldwide]]. A little odd, considering Valentine's other mass-murdering doom-machine uses its own private satellite network biologically keyed to Valentine's hand, which prompts Merlin to say that he can't hack something that complicated. {{Justified}} to a certain extent, as we're explicitly shown the biometric system's installation a long time after we're made aware that [[spoiler:every member of the conspiracy is already implanted]] and those are (currently) on a separate, older system, and that it requires a gruesome constant connection to Valentine's hand. As well, while Merlin only taps a few keys, the computer shows lines upon lines of code streaming past, showing that Merlin isn't manually hacking the system, he merely triggered a program to do it.
* ''Film/TheFateOfTheFurious'': The New York sequence where Charlize Theron's character first hacks into [[EverythingIsOnline every security camera on Manhattan]]...then [[spoiler: remote controls several hundred cars, including an early 2000s Prius hilariously shown with a fancy, high-fidelity "autopilot engaged" message on its low-def navigation]]. She does all of this from her [[CoolPlane cushy flying bad guy lair]], which apparently has so much computing power it can alter reality.
* Whenever Vivian hacks a system in ''Film/AsianSchoolGirls'', the audience never sees what is happening on the computer screen. there is just a shot of the back of the computer, the sound of Vivian's RapidFireTyping, and then her announcing that she is in.
much.



* ''Film/IDontFeelAtHomeInThisWorldAnymore'': Parodied. Tony needs to find the owner of a van using its license plate number, so he initiates an epic hacking sequence on his home computer. Typing rapidly as the soundtrack thumps, Tony makes dated analogies about the internet (comparing it to a web full of spiders) as if he's spouting hacker wisdom. When we actually see his screen, he's just googling "how to look up license plate" and then borrowing a credit card to purchase the info from a website.

to:

* ''Film/IDontFeelAtHomeInThisWorldAnymore'': Parodied. Tony needs to find ''Film/WarGames'' invented the owner whole ''tapping-a-few-keys-and-saying-"We're-in"'' shtick, and set the general form of how every movie hacker is portrayed. At the time, the techniques presented in the film were ''very'' realistic, from phone phreaking, [[TropeNamers wardialing]], to social engineering. Some aspects of which are still in use ''successfully'' today, especially the social engineering aspect. (Just look at the trope image.) It's just that Hollywood never got past the 1980s in terms of graphical representation. And in the real world, TechnologyMarchesOn and most of it got much, much more boring and automated since then. The most dramatic "hacking" scene, though, is very much straight out of Hollywood: WOPR attempts to crack the nuclear launch codes, and the characters in the password "lock in" one character at a van using its license plate number, so he initiates time like some sort of bizarre slot machine. Real systems will never ([[https://en.wikipedia.org/wiki/Timing_attack intentionally]]) give you any information about an epic incorrect password other than the fact that it's wrong. Have you ever entered an incorrect password into a computer and been told which characters were incorrect?
* In ''Film/WeirdScience'', Wyatt uses a computer program, "Crypto Smasher v3.10", that provides a very detailed (for that time) graphical representation of the
hacking he is doing to break into a military computer system. The connections are all rendered as tunnels, with the mainframe itself appearing as a vast space with CGI versions of images from the opening sequence on his home computer. Typing rapidly as the soundtrack thumps, Tony makes dated analogies about the internet (comparing it to a web full of spiders) as if he's spouting hacker wisdom. When we actually see his screen, he's just googling "how to look up license plate" and then borrowing a credit card to purchase the info from a website.''Series/TheTwilightZone1959''.



* Frequently occurs in ''Literature/{{Animorphs}}'', usually by Ax, as a result of his advanced alien knowledge. Human computers are extremely primitive to him.



* In Josh Conviser's novel ''Echelon'', almost all computer usage has become Hollywood Hacking complete with an immersive VR interface that almost plays like an MMO. The layers of abstraction make computer use easy for everyone, since now EverythingIsOnline, but [[spoiler:some of the characters realize it could not possibly have grown naturally out of the Internet, and that it's a kind of "cultural terraforming" memetic weapon designed to be very easy to use and thus subvert an entire world's data management. It is, alas, [[AbortedArc never followed up on even in the sequel]]]].
* How do you hack in ''Literature/{{Idlewild}}'' IRV? Physically grab a program's avatar and wear it like TrickedOutGloves. Naturally, it's impossible to access any program that isn't visible at the time and place.
* Joked about in ''Literature/TheMachineriesOfEmpire'' when Kel Cheris and a few drones watch a cheesy drama. The love interest character is supposed to be a hacker, but when they see the drama's idea of what hacking looks like, the drones start snickering and mocking the supposed computer genius.
* In ''Literature/NetForce'', people use VR to demolish code or bypass filters, such as killing viruses by turning them in nasty rats in a city or passing firewalls by shooting them in a Wild West duel. It's a lot more fun than sitting at a command prompt and getting carpal tunnel, according to the personnel.



* In Tom Clancy's Literature/NetForce, people use VR to demolish code or bypass filters, such as killing viruses by turning them in nasty rats in a city, or passing firewalls by shooting them in a WildWest duel. It's a lot more fun than sitting at a command prompt and getting carpal tunnel, according to the personnel.
* In the ''TabletopGame/Warhammer40000'' novel ''Soul Drinker'', a mechanized tech adept connects via a mechanical implant to an ancient relic... and uses it to hack the sentient circuitry inside at the speed of thought, as the technology was so advanced that they couldn't keep up otherwise. According to the description, the relic is so amazed at having the first of four [[strike: firewalls]] gene-encoders broken through (and therefore light up on the grip) that the second one falls soon after.
* Frequently occurs in ''Literature/{{Animorphs}}'', usually by Ax, as a result of his advanced alien knowledge. Human computers are extremely primitive to him.
* The novella "Literature/TrueNames" did it three years before ''Literature/{{Neuromancer}}''. It actually went further by making the case in-universe than in the age of VR, effective hacking is ''by definition'' Hollywood Hacking; governmental security is portrayed as less effective because of their agents' insistence on straightforward analogues of programming code and terminology to sensory representation, while the underground adopts and uses magical idioms and intuitive rather than logical interfaces.
* Lampshaded in ''Literature/{{REAMDE}}'' by Creator/NealStephenson.
-->"They have convinced themselves," Csongor said, "that if the three of us get inside the building, we can determine which unit contains [[spoiler:the Troll]]."
-->"Why do they believe that?"
-->"Because we are hackers," Csongor said, "and they have seen movies."
* In Josh Conviser's novel ''Echelon'', almost all computer usage has become Hollywood Hacking complete with an immersive VR interface that almost plays like an MMO. The layers of abstraction make computer use easy for everyone, since now EverythingIsOnline, but [[spoiler:some of the characters realize it could not possibly have grown naturally out of the Internet, and that it's a kind of "cultural terraforming" memetic weapon designed to be very easy to use and thus subvert an entire world's data management. It is, alas, never followed up on even in the sequel.]]
* How do you hack in ''{{Literature/Idlewild}}'' IRV? Physically grab a program's avatar and wear it like TrickedOutGloves. Naturally it's impossible to access any program that isn't visible at the time and place.
* Joked about in ''Literature/TheMachineriesOfEmpire'', when Kel Cheris and a few drones watch a cheesy drama. The love interest character is supposed to be a hacker, but when they see the drama's idea of what hacking looks like, the drones start snickering and mocking the supposed computer genius.
* Hacking in ''Literature/{{Otherland}}'' tends to be vaguely described, but at one point a character seems to be trying to get into her boss' files by a brute force attack - that is, by having a program try every conceivable combination of characters. That approach is so basic, and so childishly simple to guard against, that any self-respecting system should be immune to it, but it still gets her at least halfway in.
* ''Literature/OldMansWar'': Averted and lampshaded. A programmer trapped in a digital prison finds a way to make the prison glitch for a second, giving him access to the code. He describes how hacking in entertainment always looks good, with lots of flashing lights and whatnot, but what he actually did was just type a few things over the course of weeks. He assures readers that [[TakeOurWordForIt it was actually very impressive]], but unless you're a programmer yourself you won't understand or care.

to:

* In Tom Clancy's Literature/NetForce, people use VR Hacking in ''Literature/{{Otherland}}'' tends to demolish code or bypass filters, such as killing viruses be vaguely described, but at one point a character seems to be trying to get into her boss' files by turning them in nasty rats in a city, or passing firewalls by shooting them in a WildWest duel. It's a lot more fun than sitting at a command prompt and getting carpal tunnel, according to the personnel.
* In the ''TabletopGame/Warhammer40000'' novel ''Soul Drinker'', a mechanized tech adept connects via a mechanical implant to an ancient relic... and uses it to hack the sentient circuitry inside at the speed of thought, as the technology was so advanced
brute force attack -- that they couldn't keep up otherwise. According to the description, the relic is so amazed at is, by having the first a program try every conceivable combination of four [[strike: firewalls]] gene-encoders broken through (and therefore light up on the grip) characters. That approach is so basic, and so childishly simple to guard against, that the second one falls soon after.
any self-respecting system should be immune to it, but it still gets her at least halfway in.
* Frequently occurs {{Lampshade|Hanging}}d in ''Literature/{{Animorphs}}'', usually by Ax, as a result of his advanced alien knowledge. Human computers are extremely primitive to him.
* The novella "Literature/TrueNames" did it three years before ''Literature/{{Neuromancer}}''. It actually went further by making the case in-universe than in the age of VR, effective hacking is ''by definition'' Hollywood Hacking; governmental security is portrayed as less effective because of their agents' insistence on straightforward analogues of programming code and terminology to sensory representation, while the underground adopts and uses magical idioms and intuitive rather than logical interfaces.
* Lampshaded in ''Literature/{{REAMDE}}'' by Creator/NealStephenson.
''Literature/{{REAMDE}}'':
-->"They have convinced themselves," Csongor said, "that if the three of us get inside the building, we can determine which unit contains [[spoiler:the Troll]]."\\
"Why do they believe that?"\\
"Because we are hackers," Csongor said, "and they have seen movies.
"
-->"Why do * In ''Literature/{{Soul Drinker|s}}'', a mechanized tech adept connects via a mechanical implant to an ancient relic... and uses it to hack the sentient circuitry inside at the speed of thought, as the technology was so advanced that they believe that?"
-->"Because we are hackers," Csongor said, "and they have seen movies."
couldn't keep up otherwise. According to the description, the relic is so amazed at having the first of four gene-encoders broken through (and therefore light up on the grip) that the second one falls soon after.
* In Josh Conviser's novel ''Echelon'', almost all computer usage has become The novella "Literature/TrueNames" did it three years before ''Literature/{{Neuromancer}}''. It actually goes further by making the case in-universe that in the age of VR, effective hacking is ''by definition'' Hollywood Hacking complete with an immersive VR interface that almost plays like an MMO. The layers Hacking; governmental security is portrayed as less effective because of abstraction make computer use easy for everyone, since now EverythingIsOnline, but [[spoiler:some their agents' insistence on straightforward analogues of programming code and terminology to sensory representation, while the characters realize it could not possibly have grown naturally out of the Internet, underground adopts and that it's a kind of "cultural terraforming" memetic weapon designed to be very easy to use uses magical idioms and thus subvert an entire world's data management. It is, alas, never followed up on even in the sequel.]]
* How do you hack in ''{{Literature/Idlewild}}'' IRV? Physically grab a program's avatar and wear it like TrickedOutGloves. Naturally it's impossible to access any program that isn't visible at the time and place.
* Joked about in ''Literature/TheMachineriesOfEmpire'', when Kel Cheris and a few drones watch a cheesy drama. The love interest character is supposed to be a hacker, but when they see the drama's idea of what hacking looks like, the drones start snickering and mocking the supposed computer genius.
* Hacking in ''Literature/{{Otherland}}'' tends to be vaguely described, but at one point a character seems to be trying to get into her boss' files by a brute force attack - that is, by having a program try every conceivable combination of characters. That approach is so basic, and so childishly simple to guard against, that any self-respecting system should be immune to it, but it still gets her at least halfway in.
* ''Literature/OldMansWar'': Averted and lampshaded. A programmer trapped in a digital prison finds a way to make the prison glitch for a second, giving him access to the code. He describes how hacking in entertainment always looks good, with lots of flashing lights and whatnot, but what he actually did was just type a few things over the course of weeks. He assures readers that [[TakeOurWordForIt it was actually very impressive]], but unless you're a programmer yourself you won't understand or care.
intuitive rather than logical interfaces.



* ''Series/AlexRider'': Kyra. Sent to a school for problem children of the super-rich after a prank involving an electronic billboard. [[spoiler: Played a major part in the escape from the school and the later rescue by adding a secret door combination to the security system.]]

to:

* ''Series/AlexRider'': Kyra. Sent Kyra was sent to a school for problem children of the super-rich after a prank involving an electronic billboard. [[spoiler: Played [[spoiler:She plays a major part in the escape from the school and the later rescue by adding a secret door combination to the security system.]]



* Happens constantly on ''Series/{{Arrow}}'':

to:

* Happens constantly on in ''Series/{{Arrow}}'':



** [[VillainOfTheWeek Clock King]] ups the ante, causing all sorts of chaos theory the city such as having the traffic network to make a train level crossing boomgate go up when a train was passing through. He then goes DuelingHackers with Felicity, hacking Felicity's computer speakers [[EvilGloating to taunt her]] and sending viruses to short her computer out. Felicity manages to beat him by [[HoistByHisOwnPetard sending his own virus into his own device]].
** Brother Eye, a cyber-terrorist group led by Cooper Seldom (who happens to be Felicity's ex-boyfriend) manages to flip all of Starling City's technology upside down. Shutting down the power grid, then all the bank funds. This was all made possible due to an unstoppable virus they use, which was made by, surprise surprise, Felicity.
** Cayden James and Helix go furtherest of all. Cayden's first EvilPlan is finding the internet mainframe where he allegedly tries to ''destroy the internet''. This turns out to be a ruse and what he actually wanted was for Felicity to lower the firewall. He avoided doing so himself because he didn't want to leave his digital fingerprints for the authorities to find. Later Cayden goes on a full-scale weapon of hack destruction, making all of Star City's technology go rampant, forcing Mayor Oliver to pay him a ransom.
* ''Series/{{Bones}}'' has Angela for their typical Hollywood Hacking needs, such as acquiring security footage and decrypting computer evidence. Recurring villain Christopher Pelant manages to accomplish some truly outrageous feats with computers. He can do almost anything. Some of the things he managed to do are: fool an ankle monitor, corrupt/modify security footage, take down cellphone networks and traffic lights, hijack a predator drone in Afghanistan, wipe his own identity and create a new one (twice!), upload viruses through library books, and infiltrate a private army. Oh, and in his first appearance, he manages to '''''carve bones''''' in such a way that when a 3D model of them is created it infects the computer with malware that changes its fan speeds and causes it to catastrophically overheat.
** He's so good that Hodgins, who is admittedly a bit paranoid, worries that even if they use a system not connected to the internet Pelant will infect it with a worm by using the power grid.
* Played with in the ''Series/BrooklynNineNine'' episode "Ticking Clocks". Initially, it seems to be played straight, with an IT nerd spouting nonsense about how the precinct is in danger of being hacked, conveniently providing an [[ExactTimeToFailure exact timer until the hack is complete]] and jamming as much technobabble into his explanations as he can. In the end, [[spoiler:it turns out that the "IT guy" is really a suspect in an ongoing case, and he was attempting to use social engineering to trick Captain Holt into wiping the Nine-Nine's servers, deleting all the evidence against him in the investigation. His plan is foiled when Amy recognizes him.]]
* Prior to becoming a witch, Willow Rosenberg from ''Series/BuffyTheVampireSlayer'' often used her skill in computers to help out the team, including hacking into school records, secret government files, and even city power grids. Much later in the series, she could even amplify her hacking skills using her magic somehow, turning her into a more literal TechnoWizard.
* In ''Series/{{Constantine}}'', one of John's former Newcastle mates, Ritchie Simpson, remotely hacks and shuts down UsefulNotes/{{Atlanta}}'s power grid to weaken Furcifer in the series' pilot episode, "Non Est Asylum".
* ''Series/CrashZone'': The episode "The Shadow" features Hollywood-style hacker tracking--a program which, in a ViewerFriendlyInterface, slowly homes in on (and loudly announces) the hacker's home city, street address, and finally (somehow) their name. There is a race against time as the hackers try to log out of the system before the program finishes spelling out the computer owner's name.
* {{Lampshaded}} in ''Series/CriminalMinds'':

to:

** [[VillainOfTheWeek Clock King]] King ups the ante, causing all sorts of chaos theory the city such as having the traffic network to make a train level crossing boomgate go up when a train was passing through. He then goes DuelingHackers with Felicity, hacking Felicity's computer speakers [[EvilGloating to taunt her]] and sending viruses to short her computer out. Felicity manages to beat him by [[HoistByHisOwnPetard sending his own virus into his own device]].
** Brother Eye, a cyber-terrorist group led by Cooper Seldom (who happens to be Felicity's ex-boyfriend) ex-boyfriend), manages to flip all of Starling City's technology upside down. Shutting down the power grid, then all the bank funds. This was all made possible due to an unstoppable virus they use, which was made by, surprise surprise, Felicity.
** Cayden James and Helix go furtherest furthest of all. Cayden's first EvilPlan is finding the internet mainframe where he allegedly tries to ''destroy the internet''. This turns out to be a ruse and what he actually wanted was for Felicity to lower the firewall. He avoided doing so himself because he didn't want to leave his digital fingerprints for the authorities to find. Later Cayden goes on a full-scale weapon of hack destruction, making all of Star City's technology go rampant, forcing Mayor Oliver to pay him a ransom.
* ''Series/{{Bones}}'' has Angela for their typical Hollywood Hacking needs, such as acquiring security footage and decrypting computer evidence. Recurring villain Christopher Pelant manages to accomplish some truly outrageous feats with computers. He can do almost anything. Some of the things he managed to do are: fool an ankle monitor, corrupt/modify security footage, take down cellphone networks and traffic lights, hijack a predator drone in Afghanistan, wipe his own identity and create a new one (twice!), upload viruses through library books, and infiltrate a private army. Oh, and in his first appearance, he manages to '''''carve bones''''' in such a way that when a 3D model of them is created it infects the computer with malware that changes its fan speeds and causes it to catastrophically overheat.
**
overheat. He's so good that Hodgins, who is admittedly a bit paranoid, worries that even if they use a system not connected to the internet Pelant will infect it with a worm by using the power grid.
* Played with in the ''Series/BrooklynNineNine'' episode "Ticking Clocks"."[[Recap/BrooklynNineNineS6E14TickingClocks Ticking Clocks]]". Initially, it seems to be played straight, with an IT nerd spouting nonsense about how the precinct is in danger of being hacked, conveniently providing an [[ExactTimeToFailure exact timer until the hack is complete]] and jamming as much technobabble into his explanations as he can. In the end, [[spoiler:it turns out that the "IT guy" is really a suspect in an ongoing case, and he was attempting to use social engineering to trick Captain Holt into wiping the Nine-Nine's servers, deleting all the evidence against him in the investigation. His plan is foiled when Amy recognizes him.]]
* Prior to becoming a witch, Willow Rosenberg from ''Series/BuffyTheVampireSlayer'' often used uses her skill in computers to help out the team, including hacking into school records, secret government files, and even city power grids. Much later in the series, she could can even amplify her hacking skills using her magic somehow, turning her into a more literal TechnoWizard.
* In ''Series/{{Constantine}}'', ''Series/Constantine2014'', one of John's former Newcastle mates, Ritchie Simpson, remotely hacks and shuts down UsefulNotes/{{Atlanta}}'s power grid to weaken Furcifer in the series' pilot episode, "Non "[[Recap/ConstantineS1E1NonEstAsylum Non Est Asylum".Asylum]]".
* ''Series/CrashZone'': The episode "The Shadow" features Hollywood-style hacker tracking--a tracking -- a program which, in a ViewerFriendlyInterface, slowly homes in on (and loudly announces) the hacker's home city, street address, and finally (somehow) their name. There is a race against time as the hackers try to log out of the system before the program finishes spelling out the computer owner's name.
* {{Lampshaded}} {{Lampshade|Hanging}}d in ''Series/CriminalMinds'':



* ''Series/{{CSINY}}'': "[[https://www.funnyshirts.org/design/891/GUI+Interface+Using+VB I'll create a GUI interface using Visual Basic. See if I can track an IP address]]."
** For those not tech-savvy, this is roughly the equivalent of drawing a map on a piece of paper to try and track down where you last left your car keys. It won't do anything.

to:

* ''Series/{{CSINY}}'': "[[https://www.[[https://www.funnyshirts.org/design/891/GUI+Interface+Using+VB I'll "I'll create a GUI interface using Visual Basic. See if I can track an IP address]]."
**
address."]] For those not tech-savvy, this is roughly the equivalent of drawing a map on a piece of paper to try and track down where you last left your car keys. It won't do anything.



** [[Recap/DoctorWhoS27E5WorldWarThree "World War Three"]]: Mickey launches a missile into 10 Downing Street by using a password (buffalo) provided by the Doctor to hack into first UNIT and then the Royal Navy. Obviously there's no way that a military organization would use a single common word as the one thing stopping civilians launching missiles. However, he ''is'' using a backdoor the Doctor installed that almost nobody else knows about.
** [[Recap/DoctorWhoS28E6TheAgeOfSteel "The Age of Steel"]]: This is how the new Cybermen were first defeated, once Mickey finished typing the same five characters over and over the password to their internal systems had appeared on-screen one letter at a time.
** Subverted in [[Recap/DoctorWhoS33E1AsylumOfTheDaleks "Asylum of the Daleks"]]. Oswin Oswald apparently uses a standard keyboard to rapidly type her way into the computers of a Dalek asylum. Daleks, being the mutant alien cyborgs they are, don't exactly use technology readily compatible with human keyboards, and the Doctor himself isn't terribly convinced when Oswin tells him that Dalek technology is "easy to hack." [[spoiler:The whole keyboard hacking thing turns out to be one of many illusions Oswin has unknowingly put in her mind to keep herself from grasping the AwfulTruth: she currently ''[[TomatoInTheMirror is]]'' a Dalek, and she was chosen to maintain the asylum planet's network due to her genius intellect from when she was still human.]]
** Used straight a few episodes later in [[Recap/DoctorWhoS33E6TheBellsOfSaintJohn "The Bells of Saint John"]]. The Doctor, Clara, and the villains all use copious amounts of RapidFireTyping to hack and counter-hack each other.
* In ''Series/TheFlash2014'' episode "All Star Team Up" resident super-genius Cisco estimates that he can hack into the city's municipal network in about half an hour. Felicity Smoak, guest-starring from ''Series/{{Arrow}}'' sits down at a computer that happens to be sitting nearby, and proceeds to do exactly that by typing for a few seconds. She later pulls a DuelingHackers thing with the VillainOfTheWeek over remote control of a swarm of robotic bees.
** Another episode has Barry get past a combination lock by entering every possible combination at SuperSpeed until he hits on the right one.
** A bit of ArtisticLicense here, as most (but not all) systems that require you to enter a code for access have an anti-hacking feature where if the wrong code is entered more than a set number of times, the system disables and won't let anyone in for either a certain length of time or until a lengthy identity verification and password reset sequence is accomplished.

to:

** [[Recap/DoctorWhoS27E5WorldWarThree "World In "[[Recap/DoctorWhoS27E5WorldWarThree World War Three"]]: Three]]", Mickey launches a missile into 10 Downing Street by using a password (buffalo) provided by the Doctor to hack into first UNIT and then the Royal Navy. Obviously Obviously, there's no way that a military organization would use a single common word as the one thing stopping civilians launching missiles. However, he ''is'' using a backdoor the Doctor installed that almost nobody else knows about.
** [[Recap/DoctorWhoS28E6TheAgeOfSteel "The In "[[Recap/DoctorWhoS28E6TheAgeOfSteel The Age of Steel"]]: This Steel]]", this is how the new Cybermen were are first defeated, defeated; once Mickey finished finishes typing the same five characters over and over over, the password to their internal systems had appeared appears on-screen one letter at a time.
** Subverted in [[Recap/DoctorWhoS33E1AsylumOfTheDaleks "Asylum "[[Recap/DoctorWhoS33E1AsylumOfTheDaleks Asylum of the Daleks"]].Daleks]]". Oswin Oswald apparently uses a standard keyboard to rapidly type her way into the computers of a Dalek asylum. Daleks, being the mutant alien cyborgs they are, don't exactly use technology readily compatible with human keyboards, and the Doctor himself isn't terribly convinced when Oswin tells him that Dalek technology is "easy to hack." hack". [[spoiler:The whole keyboard hacking thing turns out to be one of many illusions Oswin has unknowingly put in her mind to keep herself from grasping the AwfulTruth: she currently ''[[TomatoInTheMirror is]]'' a Dalek, and she was chosen to maintain the asylum planet's network due to her genius intellect from when she was still human.]]
** Used straight a few episodes later in [[Recap/DoctorWhoS33E6TheBellsOfSaintJohn "The "[[Recap/DoctorWhoS33E6TheBellsOfSaintJohn The Bells of Saint John"]].John]]". The Doctor, Clara, and the villains all use copious amounts of RapidFireTyping to hack and counter-hack each other.
* ''Series/TheFlash2014'':
**
In ''Series/TheFlash2014'' episode "All Star "[[Recap/TheFlash2014S1E18AllStarTeamUp All-Star Team Up" Up]]", resident super-genius Cisco estimates that he can hack into the city's municipal network in about half an hour. Felicity Smoak, guest-starring from ''Series/{{Arrow}}'' sits down at a computer that happens to be sitting nearby, nearby and proceeds to do exactly that by typing for a few seconds. She later pulls a DuelingHackers thing with the VillainOfTheWeek [[MonsterOfTheWeek Villain of the Week]] over remote control of a swarm of robotic bees.
** Another episode has Barry get past a combination lock by entering every possible combination at SuperSpeed until he hits on the right one. \n** A bit of ArtisticLicense here, as most (but not all) systems that require you to enter a code for access have an anti-hacking feature where if the wrong code is entered more than a set number of times, the system disables and won't let anyone in for either a certain length of time or until a lengthy identity verification and password reset sequence is accomplished.



** Hardison is able to basically hack anything electronic. Oftentimes from a cell phone. It is also notable that the difficulty of a hack is inversely proportional to its importance to the plot. He is able to hack into London's camera system effortlessly but he often requires physical access for the target company's computer. While physical access is often necessary in reality, it would logically be necessary for police-controlled surveillance cameras as well.

to:

** Hardison is able to basically hack anything electronic. Oftentimes electronic, oftentimes from a cell phone. It is also notable that the difficulty of a hack is inversely proportional to its importance to the plot. He is able to hack into London's camera system effortlessly effortlessly, but he often requires physical access for the target company's computer. While physical access is often necessary in reality, it would logically be necessary for police-controlled surveillance cameras as well.



* ''Series/{{Limitless}}'' nicely subverts this. As Brian explains during a TrainingMontage where he's learning how to hack, the reason Hollywood tends to use montages for hacking is that real hacking is ''boring''.
* ''[[Series/LoisAndClark Lois and Clark: The New Adventures of Superman]]'':
** Happened more than once, but the most infamous example was in "The Ides of Metropolis", which gave us two malicious hackers spewing jargon the writers clearly didn't understand at each other while Superman stopped their supervirus with a 3.5" floppy disk:
--->"My LAN isn't talking to me. Should I reboot?"\\
"It's collapsing into a subdirectory!"
** In another episode, Clark uses brute-force on a keyboard, so fast the keys start smoking. Apparently no one heard the extremely loud clacking sounds.

to:

* ''Series/{{Limitless}}'' nicely subverts this. As Brian explains during a TrainingMontage where he's learning how to hack, the reason Hollywood tends to use montages for hacking is that real hacking is ''boring''.
* ''[[Series/LoisAndClark Lois and Clark: The New Adventures of Superman]]'':
''Series/LoisAndClark'':
** Happened This happens more than once, but the most infamous example was is in "The Ides of Metropolis", which gave gives us two malicious hackers spewing jargon the writers clearly didn't understand at each other while Superman stopped stops their supervirus with a 3.5" floppy disk:
--->"My --->''"My LAN isn't talking to me. Should I reboot?"\\
"It's collapsing into a subdirectory!"
subdirectory!"''
** In another episode, Clark uses brute-force on a keyboard, so fast the keys start smoking. Apparently Apparently, no one heard the extremely loud clacking sounds.



** The episode "Driven" had a sabotaged car-driving AI, and they hacked into the SUV through sensor feed transmissions. Yes, there was a manual-adjustment feed, ''for slight adjustments of a specific system'', but they used it to hack into root control within seconds. And then [[ViewerFriendlyInterface they have a fancy GUI menu]] on their own system to interface with it.
** The episode "Kill Screen" had a semi-plausible cyberattack scheme where a hacker inserted a sophisticated subroutine into an online video game that he was lead programmer on. He could then use this to hijack the player's computers to use as a distributed network that would act as an encryption-breaking supercomputer. However, the computing power he gets from this is massively exaggerated and the setup is seemingly able to crack the Pentagon's network within half an hour (with convenient timer and graphical progress representation). Once discovered such an attack should be easy to stop but the NCIS team instead has to race against the clock to shut down the main server.

to:

** The episode "Driven" had has a sabotaged car-driving AI, and they hacked the team hacks into the SUV through sensor feed transmissions. Yes, there was is a manual-adjustment feed, ''for slight adjustments of a specific system'', but they used use it to hack into root control within seconds. And then Then [[ViewerFriendlyInterface they have a fancy GUI menu]] on their own system to interface with it.
** The episode "Kill Screen" had has a semi-plausible cyberattack scheme where in which a hacker inserted inserts a sophisticated subroutine into an online video game that he was he's lead programmer on. He could can then use this to hijack the player's computers to use as a distributed network that would act acts as an encryption-breaking supercomputer. However, the computing power he gets from this is massively exaggerated exaggerated, and the setup is seemingly able to crack the Pentagon's network within half an hour (with convenient timer and graphical progress representation). Once discovered discovered, such an attack should be easy to stop stop, but the NCIS team instead has to race against the clock RaceAgainstTheClock to shut down the main server.



* This was handwaved (lampshaded?) in ''Series/{{Nikita}}'' with the explanation of, "I even made it look like a video game so your little tween brains can handle it."
* The ''Series/{{Sherlock}}'' episode "[[Recap/SherlockS02E03TheReichenbachFall The Reichenbach Fall]]", Moriarty wows everyone with a tiny application he claims has the power to hack basically anything on the planet. He demonstrates this app by simultaneously hacking the Tower of London, the Bank of England, and a major prison. [[spoiler:At the end, it's revealed he found people beforehand who had master privs to the locks at those locations and paid them gobs of money to help with his demonstration; all the app did was call them and tell them it was time.]]
-->[[spoiler:"This is too easy, this is too ''easy''. There is no "key", DOOFUS! Those digits are meaningless. They're utterly meaningless. [[DidYouActuallyBelieve You don't really think]] a couple of lines of computer code are going to crash the world around our eyes? I'm disappointed, I'm ''disappointed'' in you, Ordinary Sherlock!"]]
** Later, Mary manages to hack the [=MI6=] mainframe...from a smartphone. In about ''half a minute.'' It's not nearly as egregious as other examples of this trope, but it's definitely on the edge.
--->'''Mycroft:''' What do you think of [=MI6=] security?
--->'''Mary:''' I think it would be a good idea.

to:

* This was is handwaved (lampshaded?) in ''Series/{{Nikita}}'' with the explanation of, "I even made it look like a video game so your little tween brains can handle it."
* The ''Series/{{Sherlock}}'' episode ''Series/{{Sherlock}}'':
** In
"[[Recap/SherlockS02E03TheReichenbachFall The Reichenbach Fall]]", Moriarty wows everyone with a tiny application he claims has the power to hack basically anything on the planet. He demonstrates this app by simultaneously hacking the Tower of London, the Bank of England, and a major prison. [[spoiler:At the end, it's revealed he found people beforehand who had master privs to the locks at those locations and paid them gobs of money to help with his demonstration; all the app did was call them and tell them it was time.]]
-->[[spoiler:"This --->[[spoiler:''"This is too easy, this is too ''easy''. There is no "key", 'key', DOOFUS! Those digits are meaningless. They're utterly meaningless. [[DidYouActuallyBelieve You don't really think]] a couple of lines of computer code are going to crash the world around our eyes? I'm disappointed, I'm ''disappointed'' in you, Ordinary Sherlock!"]]
''ordinary'' Sherlock!"'']]
** Later, Mary manages to hack the [=MI6=] mainframe... from a smartphone. In about ''half a minute.'' It's not nearly as egregious as other examples of this trope, but it's definitely on the edge.
--->'''Mycroft:''' What do you think of [=MI6=] security?
--->'''Mary:'''
security?\\
'''Mary:'''
I think it would be a good idea.



* In the ''Series/StarTrekVoyager'' episode "[[Recap/StarTrekVoyagerS3E8FuturesEnd Future's End]]", the ship is transported back to the 1990s, and the villain manages to hack ''Voyager'', the 24th-century OrganicTechnology ''spaceship'' and the Doctor, a sentient, evolving AI hologram so advanced that even in Voyager's present they still don't fully understand him, by typing really fast on his computer. And for a follow-up, someone will hack an iPhone by vigorously waving around semaphore flags. He's using technology from the [=29th=] Century to assist him, [[ETGaveUsWiFi retrieved from a crashed timeship]], but that's a strike ''against'' him; [=29th=] century technology should have scrambled his brain.

to:

* In the ''Series/StarTrekVoyager'' episode "[[Recap/StarTrekVoyagerS3E8FuturesEnd Future's End]]", the ship is transported back to the 1990s, and the villain manages to hack ''Voyager'', the 24th-century OrganicTechnology ''spaceship'' and the Doctor, a sentient, evolving AI hologram so advanced that even in Voyager's present they still don't fully understand him, by typing really fast on his computer. And for a follow-up, someone will hack an iPhone by vigorously waving around semaphore flags. He's using technology from the [=29th=] 29th Century to assist him, [[ETGaveUsWiFi retrieved from a crashed timeship]], but that's a strike ''against'' him; [=29th=] 29th century technology should have scrambled his brain.



* ''Series/WhiteRabbitProject'': ''The Carbanak Gang'' legend in the ''Heists'' episode made gratuitous use of the old ''scrolling garbage text on the monitor'' effect, although one part that shows the effect on an ATM looked suspiciously like the [[UsefulNotes/{{Unix}} Linux]] [=SysV=] init bootscript.
* ''Series/WonderWoman1975'': In "IRAC is Missing", Bernard Havitol steals IRAC by connecting a briefcase to the machine. Once complete, IRAC is in the briefcase and no longer in the massive tape machines, terminal, et al and there was no way to retrieve IRAC from backups or piece it back together. That Havitol had IRAC completely and utterly was the main plot of the episode.

to:

* ''Series/WhiteRabbitProject'': ''The The Carbanak Gang'' Gang legend in the ''Heists'' "Heists" episode made makes gratuitous use of the old ''scrolling garbage text on the monitor'' effect, although one part that shows the effect on an ATM looked looks suspiciously like the [[UsefulNotes/{{Unix}} Linux]] [=SysV=] init bootscript.
* ''Series/WonderWoman1975'': In "IRAC is Missing", Bernard Havitol steals IRAC by connecting a briefcase to the machine. Once complete, IRAC is in the briefcase and no longer in the massive tape machines, terminal, et al al, and there was is no way to retrieve IRAC from backups or piece it back together. That Havitol had has IRAC completely and utterly was is the main plot of the episode.



* Steve Jackson Games will probably never stop referring to ''TabletopGame/{{GURPS}} Cyberpunk'' as "the book seized by the US Secret Service". The book does have rules for "realistic" (if almost 20 years out of date) hacking, but most of that chapter is devoted to ''Literature/{{Neuromancer}}''-style cyberspace hacking. The core 4e books contain a skill called "Computer Hacking", precisely for Hollywood Hacking. However, the rules note that the skill should only exist in the more "cinematic" games -- in a realistic game, the would-be hacker will have to instead learn a bunch of various skills like computer programming, psychology, etc.
%%* ''TabletopGame/{{Netrunner}}'' is this trope in CCG form.



* Steve Jackson Games will probably never stop referring to TabletopGame/{{GURPS}} Cyberpunk as "the book seized by the US Secret Service". The book does have rules for "realistic" (if almost 20 years out of date) hacking, but most of that chapter is devoted to Literature/{{Neuromancer}}-style cyberspace hacking. The core 4e books contain a skill called "Computer Hacking", precisely for Hollywood Hacking. However, the rules note that the skill should only exist in the more "cinematic" games -- in a realistic game, the would-be hacker will have to instead learn a bunch of various skills like computer programming, psychology, etc.
%%* TabletopGame/{{Netrunner}} is this trope in CCG form.
* Present via GameplayAndStorySegregation in ''TabletopGame/SentinelsOfTheMultiverse''. Evil AI Omnitron has a card called "Technological Singularity", which depicts him taking control of the PoweredArmour worn by Absolute Zero and Bunker, and has the game effect of destroying all equipment. Other equipment in the game includes throwing knives (the Wraith), traditional Maori war clubs (Haka), and ''magical musical instruments'' (Argent Adept), all of which are affected just as readily by Technological Singularity. There’s also Tachyon who is able to figure out the password to Baron Blade’s computer by virtue of being fast enough to try every possible password.

to:

* Steve Jackson Games will probably never stop referring to TabletopGame/{{GURPS}} Cyberpunk as "the book seized by the US Secret Service". The book does have rules for "realistic" (if almost 20 years out of date) hacking, but most of that chapter is devoted to Literature/{{Neuromancer}}-style cyberspace hacking. The core 4e books contain a skill called "Computer Hacking", precisely for Hollywood Hacking. However, the rules note that the skill should only exist in the more "cinematic" games -- in a realistic game, the would-be hacker will have to instead learn a bunch of various skills like computer programming, psychology, etc.
%%* TabletopGame/{{Netrunner}} is this trope in CCG form.
* Present via GameplayAndStorySegregation in ''TabletopGame/SentinelsOfTheMultiverse''. Evil AI A.I. Omnitron has a card called "Technological Singularity", which depicts him taking control of the PoweredArmour PoweredArmor worn by Absolute Zero and Bunker, and has the game effect of destroying all equipment. Other equipment in the game includes throwing knives (the Wraith), traditional Maori war clubs (Haka), and ''magical musical instruments'' (Argent Adept), all of which are affected just as readily by Technological Singularity. There’s There's also Tachyon Tachyon, who is able to figure out the password to Baron Blade’s Blade's computer by virtue of being fast enough to try every possible password.



* ''VideoGame/{{BioShock|1}}'': Do you want to hack into a robot, a computer or even a vending machine? Play "Pipe Dream"! This is actually an artifact of an old plot idea where all of Rapture's tech was Bio-mechanical and run by tiny men inside the machine. The pipes were increasing the ADAM flow to the man inside which would make him grateful to you.
** [[VideoGame/BioShock2 The sequel]] replaces this with a "hack tool" that presumably works like an electronic lock pick that requires split-second input a few times.
** [[VideoGame/BioShockInfinite The third game]] gets rid of the hacking altogether by employing a Vigor called ''Possession'', which turns machines and enemies into allies for the most part by shooting a "ghost" into them. The vending machines might reduce their prices for items, but every time they're "possessed" they spew a pile of coins. It doesn't work in every machine or enemy, however.
* In ''Film/TheAmazingSpiderMan2'' video game, Spider-Man tries to hack Kingpin's computer. Kingpin openly denounces this "Hollywood film" trope with a ThisIsReality speech, only to panic when he sees that the trope is actually working.
* The hacking in ''Videogame/{{Devastation}}'' involves using a calculator-like device to download codes from communication terminals and then using said device to bypass electronic security gates.
* ''VideoGame/DreamfallTheLongestJourney'': Hacking is represented by a rather ludicrously simple matching-up-symbols game. This HackingMinigame is actually given an in-universe explanation: Olivia explains to Zoë that she is using software to hack, and the software is designed so that it looks like a symbol-matching game. This way, if someone walks by and sees Zoë's phone screen, it'll just look like she's playing a game.

to:

* ''VideoGame/{{BioShock|1}}'': In ''VideoGame/TheAmazingSpiderMan2'', Spider-Man tries to hack Kingpin's computer. Kingpin openly denounces this "Hollywood film" trope with a ThisIsReality speech, only to panic when he sees that the trope is actually working.
* ''VideoGame/BioShock'':
** ''VideoGame/BioShock1'':
Do you want to hack into a robot, a computer or even a vending machine? Play "Pipe Dream"! This is actually an artifact of an old plot idea where all of Rapture's tech was Bio-mechanical bio-mechanical and run by tiny men inside the machine. The pipes were increasing the ADAM flow to the man inside which would make him grateful to you.
** [[VideoGame/BioShock2 The sequel]] ''VideoGame/BioShock2'' replaces this with a "hack tool" that presumably works like an electronic lock pick that requires split-second input a few times.
** [[VideoGame/BioShockInfinite The third game]] ''VideoGame/BioShockInfinite'' gets rid of the hacking altogether by employing a Vigor called ''Possession'', which turns machines and enemies into allies for the most part by shooting a "ghost" into them. The vending machines might reduce their prices for items, but every time they're "possessed" they spew a pile of coins. It doesn't work in every machine or enemy, however.
* In ''Film/TheAmazingSpiderMan2'' video game, Spider-Man tries to hack Kingpin's computer. Kingpin openly denounces this "Hollywood film" trope with the Brotherhood of Nod ending of ''VideoGame/CommandAndConquerTiberianDawn'', Nod hacks into GDI's KillSat via a ThisIsReality speech, only to panic when he sees virtual reality interface. Within the virtual world, a successful hacking requires dodging laser fire from a forest of turrets, then moving through a small hole that constantly changes shape. Two of the hackers are [[ExplosiveInstrumentation electrocuted]] by GDI's defenses.
* ''VideoGame/DeepRockGalactic:''
** Hacking disabled Patrol Bots is as simple as taking out your special hacking pad
that the trope is actually working.
company gave you and solving a reaction puzzle.
--->'''Miner:''' All this time playing video games has finally paid off!
** Exaggerated and parodied with the Hacking Pods deployed during the Rival Incursion event. Rather than anything ultra-sophisticated, they're basically regular computers with too many monitors and a keyboard, with a hacking robot grafted into it (complete with white hat and RGB fans) that needs to ''physically use'' the keyboard, and does it so obnoxiously loudly it attracts every bug in the caverns.
* The Creator/{{Bethesda}} game ''Delta-V'' features "hacking" as a glorified recreation of [[Film/ANewHope the Death Star run]] (and a bloody ''hard'' one at that).
* The hacking in ''Videogame/{{Devastation}}'' ''VideoGame/{{Devastation}}'' involves using a calculator-like device to download codes from communication terminals and then using said device to bypass electronic security gates.
* ''VideoGame/DreamfallTheLongestJourney'': Hacking is represented by a rather ludicrously simple matching-up-symbols game. This HackingMinigame is actually given an in-universe explanation: Olivia explains to Zoë that she is using software to hack, and the software is designed so that it looks like a symbol-matching game. This way, if someone walks by and sees Zoë's phone screen, it'll just look like she's playing a game. game.
* In ''VideoGame/Fallout3'', hacking computers is done by opening up a key-log of recent entries and picking out complete words. The game then responds with the number of correct letters in that word- you get five guesses, hopefully getting closer each time, then the computer locks you out and usually sets off an alarm. In other words, it's a game of ''Mastermind''. This style of hacking returns in ''VideoGame/Fallout4'', but with one change: failing to hack into the computer will only temporarily lock the computer down, so you can try again after a few moments.
* The old UsefulNotes/Commodore64 classic ''VideoGame/{{Hacker}}'' was [[WordOfGod explicitly]] based on Hollywood Hacking. The follow-up, the creatively named ''Hacker 2'', went even further.
* ''VideoGame/HackerEvolution'' looks like it takes a more realistic route since all hacking is done through command prompt... except passwords are broken by typing "crack [server] [port]", there is no need to hide oneself after breaking in, files can be uploaded and downloaded freely and player can hide from authorities by paying 500$ for new IP...
* ''Hacker's Beat'' is a RhythmGame based on this. All of the notes represent some general area of your keyboard, aside from firewalls where you need to hit enter, and the songs end with you getting access to... [[NoPlotNoProblem something]].
* ''VideoGame/{{Hacknet}}'', if the name didn't give it away. While the developer has done his research and the methods used to open individual vulnerabilities in certain protocols are actually based on sound theory, there's still a PasswordSlotMachine variation to get past firewalls, and [=PortHack=] to finally exploit all the openings you've created. [[spoiler:The game's central premise is actually playing with this trope to hell and back. Specifically, it's '''averted'''. The game is a borderline-ARG set in the present day, and the tools you use aren't just there for effect, they're ''really that powerful''. The last act of the game is ultimately a mission to destroy the Hacknet software before it leaks and everyone can break into everything so easily.]]
* ''VideoGame/{{Hydrophobia}}'' has you gain into computer systems by matching wavelengths with the console. Particularly funny as the game's protagonists are completely confused just how anybody could hack into their system!
* Cracking a nanofield in ''VideoGame/{{Iji}}'' is accomplished by maneuvering a little square on a grid of flashing squares to reach the opposite corner. Maybe the nanobots are just giving Iji an ExtremeGraphicalRepresentation or something.
* ''VideoGame/LBXLittleBattlersExperience'' has Infinity Net, where battles between digital representation of LBX (essentially functioning gunplay) take place and data can be "picked up" with said LBX. RapidFireTyping also applies.



* ''VideoGame/MassEffect1'' is even worse: Just see [[http://www.penny-arcade.com/comic/2007/11/14 This Penny Arcade Strip]]. The PC version, for the record, has a ''slightly'' better version which at least mimics the interface of the player's "omni-tool". It still falls under this trope.

to:

* ''VideoGame/MassEffect1'' is even worse: ''Franchise/MassEffect'':
**
Just see [[http://www.penny-arcade.com/comic/2007/11/14 This Penny Arcade Strip]].this]] ''Webcomic/PennyArcade'' strip for a description of ''VideoGame/MassEffect1'''s hacking. The PC version, for the record, has a ''slightly'' better version which at least mimics the interface of the player's "omni-tool". It still falls under this trope.



* The Internet and network levels in ''VideoGame/ShadowTheHedgehog''. Firewalls are represented as actual fiery walls.
* In ''[[VideoGame/SystemShock System Shock 1]]'', hacking is performed by flying around a neon CyberSpace shooting down countermeasures. Somewhat [[JustifiedTrope justified]] by the fact that it's an extreme graphical representation brought on by the use of the [[PlayerCharacter Hacker's]] military-grade neural interface: the beginning [[spoiler: and ending]] of the game show more reasonable hacking methods.
* ''VideoGame/SlyCooper'' does this whenever Bentley is hacking a system. This is probably one of the more reasonable stunts in the game. Of course, the games are pretty {{Troperrific}} already...
%%* The eclectic rhythm game[=/=]ShootEmUp ''VideoGame/{{Rez}}''.
* ''VideoGame/TronTwoPointOh'' features a level where the protagonist must reconfigure a firewall. From the inside. Of the computer[[note]]ItMakesSenseInContext: the player is a human that has been digitized into a computer, and already has access to the computer that he's configuring. He's trying to reconfigure the firewall to allow access to a normally restricted port so that another digitized human can move from another computer to his computer and join him. The firewall is also explicitly stated to be a software firewall, so it makes sense that it can be reconfigured by what amounts to a super-program[[/note]].
* The game ''VideoGame/{{Uplink}}'' from Introversion is intentionally designed to play like Hollywood Hacking. You have programs that can figure out a password for you and disable firewalls and so on automatically, though later on you can wipe mainframes and other computers by going to the Unix-like command prompt after hacking in and have to use realistic commands to delete everything (and not just by typing in "delete everything"). [[FollowTheLeader Several freeware clones]], like ''Dark Signs'', have been cropping up slowly yet steadily. Quality and spot on the Hollywood to Realist scale varies somewhat among them, but a greater emphasis seems to be put on command-line interfaces.



* ''VideoGame/SpybotTheNightfallIncident'' depicts hacking as a turn-based strategy game, with different programs representing both your own units and enemy units. No longer hosted on the Lego site, but can be found [[http://jayisgames.com/games/spybot-the-nightfall-incident/ here]] among other places.
* The old Commodore 64 classic VideoGame/{{Paradroid}} had you hack via a minigame.
* Another C64 classic, ''VideoGame/{{Hacker}}'' was [[WordOfGod explicitly]] based on Hollywood Hacking. The follow-up, the creatively named ''Hacker 2'', went even further.
* In ''VideoGame/Fallout3'', hacking computers is done by opening up a key-log of recent entries and picking out complete words. The game then responds with the number of correct letters in that word- you get five guesses, hopefully getting closer each time, then the computer locks you out and usually sets off an alarm. In other words, it's a game of ''Mastermind''. This style of hacking returns in ''VideoGame/Fallout4'', but with one change: failing to hack into the computer will only temporarily lock the computer down, so you can try again after a few moments.

to:

* ''VideoGame/SpybotTheNightfallIncident'' depicts In ''VideoGame/MySimsAgents'', you can hack certain devices to get information. How? Simple, you use the remote to guide an icon through a scrolling maze under a time limit. Deviate from the light path, and your time runs out faster. Also, if you run into an icon at an intersection, it changes the route the path takes, which may be a longer way.
* The little-known ''VideoGame/{{Neuromancer}}'' video game portrays
hacking as a turn-based strategy game, with different tossing programs representing both at a polyhedron until its HP is reduced to zero before its own ICE flatlines you.
* In ''VideoGame/NierAutomata'', hacking is often portrayed as controlling a tiny ''VideoGame/{{Asteroids}}''-style spaceship and shooting at defense systems in a manner akin to old-school twin-stick shooters (a la ''VideoGame/Robotron2040'') until the core is exposed, then destroying the core. Most of the time, this results in the hacked machine lifeform self-destructing, although the player can occasionally either reprogram them to fight on their side or take remote control of the machine. Conversely, failing a hack -- either by having
your own units ship destroyed or running out of time -- causes feedback that will cause damage to your character. The process is depicted as nigh instantaneous, as the fighting in the game is paused during the hacking process. [[spoiler:At the end of the game, if the player chooses to fight [=A2=] as [=9S=], the final hack performed on [=A2=] will depict the player hacking into [=A2=]'s pause menu, essentially attacking her operating system directly. Succeeding in this hack will [[InstantWinCondition instantly defeat her]].]]
* Sombra from ''VideoGame/{{Overwatch}}'' '''revels''' in this trope. She's TheCracker for resident terrorist organization Talon,
and enemy units. No longer hosted on the Lego site, but can be found [[http://jayisgames.com/games/spybot-the-nightfall-incident/ here]] among other places.
her preferred method of hacking into computer systems, emails, company websites, operation lifts, and even inactive mecha is by using her glove device and a HolographicTerminal. In-game, [[StatusEffects her hacking ability is essentially a form of a "silence" effect]], preventing enemies from using their main active abilities, ultimates included (which range from activating rocket boosters, traveling back in time, throwing a bear trap, using a grappling hook, [[ArsonMurderAndJaywalking and sprinting]]).
* The old Commodore 64 classic VideoGame/{{Paradroid}} had ''VideoGame/{{Paradroid}}'' has you [[HackingMinigame hack via a minigame.
minigame]].
* Another C64 classic, ''VideoGame/{{Hacker}}'' was [[WordOfGod explicitly]] based on Hollywood Hacking. The follow-up, the creatively named ''Hacker 2'', went even further.
* In ''VideoGame/Fallout3'', hacking computers is done by opening up
''VideoGame/Persona5'' has Futaba Sakura, a key-log of recent entries and picking out complete words. The game then responds with the number of correct letters in that word- you get five guesses, hopefully getting closer each time, then the fifteen-year-old self-taught programming prodigy. Her computer locks you out and usually sets off an alarm. In other words, it's a game of ''Mastermind''. This style of hacking returns in ''VideoGame/Fallout4'', but screens are constantly filled with one change: failing reams of code, and she can crack into virtually any database in existence in an afternoon by tapping away at her keyboard. [[spoiler:She was a one-girl hacktivist group under the name Medjed in the past, and goes so far as to hack every single television broadcast in Japan to send the Phantom Thieves' final calling card.]] However, even ''she'' admits that there is information she can't grab, because some information simply isn't stored on the internet.
* ''VideoGame/Portal2'':
** Hilariously sent up in [[https://youtu.be/7GXanBcXnso?t=2m38s this]] scene. Wheatley tries to hack a password by trying each password in alphabetical order... slowly. He still manages to screw the order up. Later on in the game, he tries this tactic again, and again screws up the order. Surprisingly enough, by missing a letter, he actually ''gets the password right!''
** About halfway through the game, he tries
to hack into the computer will only temporarily lock neurotoxin control centre, which mostly involves [[BriefAccentImitation putting on an accent]] and pretending to be a neurotoxin inspector. Performing a "manual override" on a wall or "hacking" a door, meanwhile, is [[CuttingTheKnot much more violent]] than [[PercussiveMaintenance the computer down, so you can try again after a few moments.name suggests]].



* The mostly-forgettable Bethesda game ''Delta-V'' features "hacking" as a glorified recreation of the [[Franchise/StarWars Death Star run]] (and a bloody ''hard'' one at that).
* In the Brotherhood of Nod ending of ''VideoGame/CommandAndConquerTiberianDawn'', Nod hacks into GDI's KillSat via a virtual reality interface. Within the virtual world, a successful hacking requires dodging laser fire from a forest of turrets, then moving through a small hole that constantly changes shape. Two of the hackers are [[ExplosiveInstrumentation electrocuted]] by GDI's defenses.
* Franchise/SamAndMax, to get past a firewall in Reality 2.0, change the color of their [=DeSoto=]. Seriously. After they're past it, they engage in some mild hacking as a means of laundering money into Bosco's bank account to pay for that episode's uber-expensive item.
* In ''VideoGame/MySims Agents'', you can hack certain devices to get information. How? Simple, you use the remote to guide an icon through a scrolling maze under a time limit. Deviate from the light path, and your time runs out faster. Also, if you run into an icon at an intersection, it changes the route the path takes, which may be a longer way.
* Cracking a nanofield in ''VideoGame/{{Iji}}'' is accomplished by maneuvering a little square on a grid of flashing squares to reach the opposite corner. Maybe the nanobots are just giving Iji an ExtremeGraphicalRepresentation or something.
* ''VideoGame/Portal2'':
** Hilariously sent up in [[https://youtu.be/7GXanBcXnso?t=2m38s this]] scene. Wheatley tries to hack a password by trying each password in alphabetical order. Slowly. And he still manages to screw the order up.
*** Later on in the game, he tries this tactic again, and again screws up the order. Surprisingly enough, by missing a letter, he actually ''gets the password right!''
** About halfway through the game, he tries to hack into the neurotoxin control centre. Which mostly involves [[BriefAccentImitation putting on an accent]] and pretending to be a neurotoxin inspector. Performing a "manual override" on a wall or "hacking" a door meanwhile is [[CuttingTheKnot much more violent]] [[PercussiveMaintenance than the name suggests]].
* ''VideoGame/{{Hydrophobia}}'' has you gain into computer systems by matching wave-lengths with the console. Particularly funny as the game's protagonists are completely confused just how anybody could hack into their system!
* ''VideoGame/HackerEvolution'' looks like it takes a more realistic route since all hacking is done through command prompt... except passwords are broken by typing "crack [server] [port]", there is no need to hide oneself after breaking in, files can be uploaded and downloaded freely and player can hide from authorities by paying 500$ for new IP...
* ''VideoGame/SaintsRowTheThird'': In one level the Saints hack into a rival gang's usernet. This involves you running around a Tron-like environment shooting their avatars, while the BigBad tries to stop you by reversing your controls, giving you lag and [[ArsonMurderAndJaywalking making you play a command prompt game which unfairly victimizes unicorns]].
* ''VideoGame/LBXLittleBattlersExperience'' has Infinity Net where battles between digital representation of LBX (essentially functioning gunplay) take place and data can be "picked up" with said LBX. RapidFireTyping also applies.
* The Ubisoft game ''VideoGame/WatchDogs'', and its successors, is basically this trope as a game. Hacking a train, some traffic lights, a door, anything and everything connected online by pressing only a single button? Hellz yeah.[[note]]As it turns out, such hacking is actually ''plausible'' IRL, if not anywhere near as conveniently in-game.[[/note]] Admittedly though, a number of the tricks are only possible because the protagonists use exploits and backdoors that were built into the system.
* The little-known ''VideoGame/{{Neuromancer}}'' video game portrays hacking as tossing programs at a polyhedron until its HP is reduced to zero before its own ICE flatlines you.
* The Sega Genesis ''VideoGame/{{Shadowrun}}'' game works pretty much exactly like the description of the Neuromancer example above, though there are some various debuff effects and a few situational programs that can instantly bypass certain security forms.
* In ''VideoGame/NierAutomata'', hacking is often portrayed as controlling a tiny ''VideoGame/{{Asteroids}}''-style spaceship and shooting at defense systems in a manner akin to old-school twin-stick shooters (ala ''VideoGame/Robotron2040'') until the core is exposed, then destroying the core. Most of the time, this results in the hacked machine lifeform self-destructing, although the player can occasionally either reprogram them to fight on their side or take remote control of the machine. Conversely, failing a hack -- either by having your ship destroyed or running out of time -- causes feedback that will cause damage to your character. The process is depicted as nigh-instantaneous, as the fighting in the game is paused during the hacking process. [[spoiler:At the end of the game, if the player chooses to fight [=A2=] as [=9S=], the final hack performed on [=A2=] will depict the player hacking into [=A2=]'s pause menu, essentially attacking her operating system directly. Succeeding in this hack will [[InstantWinCondition instantly defeat her.]]]]
* The only way to obtain computer passwords in ''VideoGame/VampireTheMasqueradeBloodlines'' seems to be to brute-force them (essentially, to try out all possible combinations until a match is found), never mind that no humanoid being can type that fast, no consumer-grade keyboard can survive it, and any [=DoS=]-aware security system would go into a complete lockdown after the 1000th failed password attempt within a second. Even more fascinatingly, if your computer skill is sufficient, you always find the password in linear time, regardless of its length, complexity theory be damned. Must be one of the perks of being an undead bloodsucker...
* ''VideoGame/{{Hacknet}}'', if the name didn't give it away. While the developer has done his research and the methods used to open individual vulnerabilities in certain protocols are actually based on sound theory, there's still a PasswordSlotMachine variation to get past firewalls, and [=PortHack=] to finally exploit all the openings you've created. [[spoiler:The game's central premise is actually playing with this trope to hell and back. Specifically, it's '''averted'''. The game is a borderline-ARG set in the present day, and the tools you use aren't just there for effect, they're ''really that powerful''. The last act of the game is ultimately a mission to destroy the Hacknet software before it leaks and everyone can break into everything so easily.]]

to:

* %%* The mostly-forgettable Bethesda game ''Delta-V'' features "hacking" as a glorified recreation of the [[Franchise/StarWars Death Star run]] (and a bloody ''hard'' one at that).
* In the Brotherhood of Nod ending of ''VideoGame/CommandAndConquerTiberianDawn'', Nod hacks into GDI's KillSat via a virtual reality interface. Within the virtual world, a successful hacking requires dodging laser fire from a forest of turrets, then moving through a small hole that constantly changes shape. Two of the hackers are [[ExplosiveInstrumentation electrocuted]] by GDI's defenses.
* Franchise/SamAndMax, to get past a firewall in Reality 2.0, change the color of their [=DeSoto=]. Seriously. After they're past it, they engage in some mild hacking as a means of laundering money into Bosco's bank account to pay for that episode's uber-expensive item.
* In ''VideoGame/MySims Agents'', you can hack certain devices to get information. How? Simple, you use the remote to guide an icon through a scrolling maze under a time limit. Deviate from the light path, and your time runs out faster. Also, if you run into an icon at an intersection, it changes the route the path takes, which may be a longer way.
* Cracking a nanofield in ''VideoGame/{{Iji}}'' is accomplished by maneuvering a little square on a grid of flashing squares to reach the opposite corner. Maybe the nanobots are just giving Iji an ExtremeGraphicalRepresentation or something.
* ''VideoGame/Portal2'':
** Hilariously sent up in [[https://youtu.be/7GXanBcXnso?t=2m38s this]] scene. Wheatley tries to hack a password by trying each password in alphabetical order. Slowly. And he still manages to screw the order up.
*** Later on in the game, he tries this tactic again, and again screws up the order. Surprisingly enough, by missing a letter, he actually ''gets the password right!''
** About halfway through the game, he tries to hack into the neurotoxin control centre. Which mostly involves [[BriefAccentImitation putting on an accent]] and pretending to be a neurotoxin inspector. Performing a "manual override" on a wall or "hacking" a door meanwhile is [[CuttingTheKnot much more violent]] [[PercussiveMaintenance than the name suggests]].
* ''VideoGame/{{Hydrophobia}}'' has you gain into computer systems by matching wave-lengths with the console. Particularly funny as the game's protagonists are completely confused just how anybody could hack into their system!
* ''VideoGame/HackerEvolution'' looks like it takes a more realistic route since all hacking is done through command prompt... except passwords are broken by typing "crack [server] [port]", there is no need to hide oneself after breaking in, files can be uploaded and downloaded freely and player can hide from authorities by paying 500$ for new IP...
eclectic rhythm game/ShootEmUp ''VideoGame/{{Rez}}''.
* ''VideoGame/SaintsRowTheThird'': In one level level, the Saints hack into a rival gang's usernet. This involves you running around a Tron-like environment shooting their avatars, while the BigBad tries to stop you by reversing your controls, giving you lag and [[ArsonMurderAndJaywalking making you play a command prompt game which unfairly victimizes unicorns]].
* ''VideoGame/LBXLittleBattlersExperience'' has Infinity Net where battles between digital representation of LBX (essentially functioning gunplay) take place ''VideoGame/SamAndMaxFreelancePolice'': Sam and data can be "picked up" with said LBX. RapidFireTyping also applies.
* The Ubisoft game ''VideoGame/WatchDogs'', and its successors, is basically this trope as
Max, to get past a game. Hacking a train, firewall in "Reality 2.0", change the color of their [=DeSoto=]. Seriously. After they're past it, they engage in some traffic lights, a door, anything and everything connected online by pressing only a single button? Hellz yeah.[[note]]As it turns out, such hacking is actually ''plausible'' IRL, if not anywhere near as conveniently in-game.[[/note]] Admittedly though, a number of the tricks are only possible because the protagonists use exploits and backdoors that were built into the system.
* The little-known ''VideoGame/{{Neuromancer}}'' video game portrays
mild hacking as tossing programs at a polyhedron until its HP is reduced means of laundering money into Bosco's bank account to zero before its own ICE flatlines you.
pay for that episode's uber-expensive item.
* The Sega Genesis ''VideoGame/{{Shadowrun}}'' game works pretty much exactly like the description of the Neuromancer ''Neuromancer'' example above, though there are some various debuff effects and a few situational programs that can instantly bypass certain security forms.
* In ''VideoGame/NierAutomata'', The Internet and network levels in ''VideoGame/ShadowTheHedgehog''. Firewalls are represented as actual fiery walls.
* ''VideoGame/SlyCooper'' does this whenever Bentley is
hacking a system. This is often portrayed as controlling a tiny ''VideoGame/{{Asteroids}}''-style spaceship and shooting at defense systems in a manner akin to old-school twin-stick shooters (ala ''VideoGame/Robotron2040'') until the core is exposed, then destroying the core. Most of the time, this results in the hacked machine lifeform self-destructing, although the player can occasionally either reprogram them to fight on their side or take remote control of the machine. Conversely, failing a hack -- either by having your ship destroyed or running out of time -- causes feedback that will cause damage to your character. The process is depicted as nigh-instantaneous, as the fighting in the game is paused during the hacking process. [[spoiler:At the end of the game, if the player chooses to fight [=A2=] as [=9S=], the final hack performed on [=A2=] will depict the player hacking into [=A2=]'s pause menu, essentially attacking her operating system directly. Succeeding in this hack will [[InstantWinCondition instantly defeat her.]]]]
* The only way to obtain computer passwords in ''VideoGame/VampireTheMasqueradeBloodlines'' seems to be to brute-force them (essentially, to try out all possible combinations until a match is found), never mind that no humanoid being can type that fast, no consumer-grade keyboard can survive it, and any [=DoS=]-aware security system would go into a complete lockdown after the 1000th failed password attempt within a second. Even more fascinatingly, if your computer skill is sufficient, you always find the password in linear time, regardless of its length, complexity theory be damned. Must be
probably one of the perks of being an undead bloodsucker...
* ''VideoGame/{{Hacknet}}'', if
more reasonable stunts in the name didn't give it away. While game. Of course, the developer has done games are pretty {{Troperrific}} already...
* ''VideoGame/SpybotTheNightfallIncident'' depicts hacking as a turn-based strategy game, with different programs representing both your own units and enemy units. No longer hosted on the Lego site, but can be found [[http://jayisgames.com/games/spybot-the-nightfall-incident/ here]] among other places.
* The hacker from ''VideoGame/StreetsOfRogue'' does this as
his research standard shtick; with a bit of typing on his keyboard, he can (remotely) make turrets target their owners, unlock safes, changes prices, and even flood buildings with poison gas. Other classes can get in on this to an extent, but without a hacking tool they have to access a building's server in person, and they have fewer options when they do.
* In Stage 13 of ''VideoGame/SuperRobotWarsW'', some members of the team, including Kazuma, try to earn some extra cash by helping [[Anime/MartianSuccessorNadesico Aqua Crimson]] debug a video game that her company is developing. They do this by piloting simulated versions of their robots against simulated versions of Aestivalis
and the methods used to open individual vulnerabilities in certain protocols Nadesico, which are actually based on sound theory, there's still a PasswordSlotMachine variation to get past firewalls, and [=PortHack=] to finally exploit all apparently the openings you've created. [[spoiler:The game's central premise is actually playing with this trope representation of bugs according to hell and back. Specifically, it's '''averted'''. The game is a borderline-ARG set in Aqua. [[spoiler:It later turns out that she's lying: the present day, Aestivalis represent the Nadesico's defense programs, and the tools you use aren't just there for effect, they're ''really that powerful''. Nadesico is the representation of Omoikane, the Nadesico's AI. The last act of the game entire job is ultimately a mission scheme to destroy the Hacknet Nadesico's computer system.]]
* In ''VideoGame/SystemShock'', hacking is performed by flying around a neon {{Cyberspace}} shooting down countermeasures. Somewhat {{justified|Trope}} by the fact that it's an ExtremeGraphicalRepresentation brought on by the use of [[PlayerCharacter the Hacker]]'s military-grade neural interface: the beginning [[spoiler:and ending]] of the game show more reasonable hacking methods.
* ''VideoGame/{{Titanfall}}'': Pilots can hack stationary turrets and Spectres to automatically attack the enemy. This is accomplished by stabbing them with a "data knife".
* ''VideoGame/TronTwoPointOh'' features a level where the protagonist must reconfigure a firewall... from the inside of the computer. ItMakesSenseInContext: the player is a human that has been digitized into a computer, and already has access to the computer that he's configuring. He's trying to reconfigure the firewall to allow access to a normally restricted port so that another digitized human can move from another computer to his computer and join him. The firewall is also explicitly stated to be a
software before firewall, so it leaks and everyone makes sense that it can break into everything so easily.]]be reconfigured by what amounts to a super-program.



* ''VideoGame/{{Titanfall}}'': Pilots can hack stationary turrets and Spectres to automatically attack the enemy. This is accomplished by stabbing them with a "data knife."

to:

* ''VideoGame/{{Titanfall}}'': Pilots ''VideoGame/{{Uplink}}'' is intentionally designed to play like Hollywood Hacking. You have programs that can hack stationary turrets figure out a password for you and Spectres disable firewalls and so on automatically, though later on you can wipe mainframes and other computers by going to automatically attack the enemy. This is accomplished Unix-like command prompt after hacking in and have to use realistic commands to delete everything (and not just by stabbing typing in "delete everything"). [[FollowTheLeader Several freeware clones]], like ''Dark Signs'', have been cropping up slowly yet steadily. Quality and spot on the Hollywood to Realist scale varies somewhat among them, but a greater emphasis seems to be put on command-line interfaces.
* The only way to obtain computer passwords in ''VideoGame/VampireTheMasqueradeBloodlines'' seems to be to brute-force
them with (essentially, to try out all possible combinations until a "data knife."match is found), never mind that no humanoid being can type that fast, no consumer-grade keyboard can survive it, and any [=DoS=]-aware security system would go into a complete lockdown after the 1000th failed password attempt within a second. Even more fascinatingly, if your computer skill is sufficient, you always find the password in linear time, regardless of its length, complexity theory be damned. Must be one of the perks of being an undead bloodsucker...
* ''VideoGame/WatchDogs'' and its successors are basically this trope in game form. Hacking a train, some traffic lights, a door, anything and everything connected online by pressing only a single button? Hellz yeah.[[note]]As it turns out, such hacking is actually ''plausible'' IRL, if not anywhere near as conveniently in-game.[[/note]] Admittedly, though, a number of the tricks are only possible because the protagonists use exploits and backdoors that were built into the system.



** In the sequel, you ''are'' the hacker, but your methods are ridiculous from the get-go (though grounded in reality, at least). WEP-encrypted wifi networks can apparently be cracked by identifying a vulnerable port and then running a password cracker program to find the password. WPA and [=WPA2=]-encrypted wifi networks require injecting a vulnerability into the router, which can be stopped if the router detects that the vulnerability is being injected (by trying to do too much too quickly), which then makes a port vulnerable to the password cracker. About the only actually real aspect is that unprotected wifi networks (that is, unencrypted networks with no passwords) are a security hellhole: hacks are more likely, speed is terrible, and if the police are looking for you, they'll be able to trace your IP ''much'' faster than on a protected network.
* ''Hacker's Beat'' is a rhythm game based on this. All of the notes represent some general area of your keyboard, aside from firewalls where you need to hit enter, and the songs end with you getting access to... [[NoPlotNoProblem something]].
* Sombra from ''VideoGame/{{Overwatch}}'' ''revels'' in this trope. She's TheCracker for resident terrorist organization Talon, and her preferred method of hacking into computer systems, emails, company websites, operation lifts, and even inactive mecha is by using her glove device and a HolographicTerminal. In-game, [[StatusEffects her hacking ability is essentially a form of a "silence" effect]], preventing enemies from using their main active abilities, ultimates included (which range from activating rocket boosters, traveling back in time, throwing a bear trap, using a grappling hook, [[ArsonMurderAndJaywalking and sprinting.]])
* The hacker from ''VideoGame/StreetsOfRogue'' does this as his standard shtick; with a bit of typing on his keyboard, he can (remotely) make turrets target their owners, unlock safes, changes prices, and even flood buildings with poison gas. Other classes can get in on this to an extent, but without a hacking tool they have to access a building's server in person, and they have fewer options when they do.
* In Stage 13 of ''VideoGame/SuperRobotWarsW'', some members of the team, including Kazuma, try to earn some extra cash by helping [[Anime/MartianSuccessorNadesico Aqua Crimson]] debug a video game that her company is developing. They do this by piloting simulated versions of their robots against simulated versions of Aestivalis and the Nadesico, which are apparently the representation of bugs according to Aqua. [[spoiler: It later turned out that she was lying: the Aestivalis represent the Nadesico's defense programs, and the Nadesico is the representation of Omoikane, the Nadesico's AI. The entire job was a scheme to destroy the Nadesico's computer system.]]
* ''VideoGame/Persona5'' has Futaba Sakura, a fifteen-year-old self-taught programming prodigy. Her computer screens are constantly filled with reams of code and she can crack into virtually any database in existence in an afternoon by tapping away at her keyboard. [[spoiler:She was a one-girl hacktivist group under the name Medjed in the past and goes so far as to hack every single television broadcast in Japan to send the Phantom Thieves' final calling card.]] But even ''she'' admits that there is information she can't grab because some information simply isn't stored on the internet.
* ''VideoGame/DeepRockGalactic:''
** Hacking disabled Patrol Bots is as simple as taking out your special hacking pad that the company gave you and solving a reaction puzzle.
--->'''Miner:''' All this time playing video games has finally paid off!
** Exaggerated and parodied with the Hacking Pods deployed during the Rival Incursion event. Rather than anything ultra-sophisticated, they're basically regular computers with too many monitors and a keyboard, with a hacking robot grafted into it (complete with white hat and RGB fans) that needs to ''physically use'' the keyboard, and does it so obnoxiously loudly it attracts every bug in the caverns.

to:

** * In the sequel, ''VideoGame/WelcomeToTheGameII'', you ''are'' the hacker, but your methods are ridiculous from the get-go (though grounded in reality, at least). WEP-encrypted wifi Wi-Fi networks can apparently be cracked by identifying a vulnerable port and then running a password cracker program to find the password. WPA and [=WPA2=]-encrypted wifi Wi-Fi networks require injecting a vulnerability into the router, which can be stopped if the router detects that the vulnerability is being injected (by trying to do too much too quickly), which then makes a port vulnerable to the password cracker. About the only actually real aspect is that unprotected wifi Wi-Fi networks (that is, unencrypted networks with no passwords) are a security hellhole: hacks are more likely, speed is terrible, and if the police are looking for you, they'll be able to trace your IP ''much'' faster than on a protected network.
* ''Hacker's Beat'' is a rhythm game based on this. All of the notes represent some general area of your keyboard, aside from firewalls where you need to hit enter, and the songs end with you getting access to... [[NoPlotNoProblem something]].
* Sombra from ''VideoGame/{{Overwatch}}'' ''revels'' in this trope. She's TheCracker for resident terrorist organization Talon, and her preferred method of hacking into computer systems, emails, company websites, operation lifts, and even inactive mecha is by using her glove device and a HolographicTerminal. In-game, [[StatusEffects her hacking ability is essentially a form of a "silence" effect]], preventing enemies from using their main active abilities, ultimates included (which range from activating rocket boosters, traveling back in time, throwing a bear trap, using a grappling hook, [[ArsonMurderAndJaywalking and sprinting.]])
* The hacker from ''VideoGame/StreetsOfRogue'' does this as his standard shtick; with a bit of typing on his keyboard, he can (remotely) make turrets target their owners, unlock safes, changes prices, and even flood buildings with poison gas. Other classes can get in on this to an extent, but without a hacking tool they have to access a building's server in person, and they have fewer options when they do.
* In Stage 13 of ''VideoGame/SuperRobotWarsW'', some members of the team, including Kazuma, try to earn some extra cash by helping [[Anime/MartianSuccessorNadesico Aqua Crimson]] debug a video game that her company is developing. They do this by piloting simulated versions of their robots against simulated versions of Aestivalis and the Nadesico, which are apparently the representation of bugs according to Aqua. [[spoiler: It later turned out that she was lying: the Aestivalis represent the Nadesico's defense programs, and the Nadesico is the representation of Omoikane, the Nadesico's AI. The entire job was a scheme to destroy the Nadesico's computer system.]]
* ''VideoGame/Persona5'' has Futaba Sakura, a fifteen-year-old self-taught programming prodigy. Her computer screens are constantly filled with reams of code and she can crack into virtually any database in existence in an afternoon by tapping away at her keyboard. [[spoiler:She was a one-girl hacktivist group under the name Medjed in the past and goes so far as to hack every single television broadcast in Japan to send the Phantom Thieves' final calling card.]] But even ''she'' admits that there is information she can't grab because some information simply isn't stored on the internet.
* ''VideoGame/DeepRockGalactic:''
** Hacking disabled Patrol Bots is as simple as taking out your special hacking pad that the company gave you and solving a reaction puzzle.
--->'''Miner:''' All this time playing video games has finally paid off!
** Exaggerated and parodied with the Hacking Pods deployed during the Rival Incursion event. Rather than anything ultra-sophisticated, they're basically regular computers with too many monitors and a keyboard, with a hacking robot grafted into it (complete with white hat and RGB fans) that needs to ''physically use'' the keyboard, and does it so obnoxiously loudly it attracts every bug in the caverns.
network.



* ''VisualNovel/ShaleHillSecrets'': The [=MC=] discovers a mysterious program called RECENTLY that lets him hack into computers and phones connected to the university's internet network, and access the last five minutes of the users' activities.

to:

* ''VisualNovel/ShaleHillSecrets'': The [=MC=] MC discovers a mysterious program called RECENTLY that lets him hack into computers and phones connected to the university's internet network, network and access the last five minutes of the users' activities.



* ''Webcomic/{{Megatokyo}}:'' Hackers use MagicalGirl representations of themselves to hack into a nebulously defined security network. This may or may not be a reference to the ''Negima'' example above or something it was parodying. It's also unclear if this was actually happening, or just representational.
* ''Webcomic/KevinAndKell'' dips into hacking every so often, although it tends to be more blatant metaphors for what they're really doing.
* [[http://xkcd.com/378/ This]] ''Webcomic/{{xkcd}}'' webcomic takes the cake... someone flaps a butterfly's wings just once to control the air currents, causing temporary pockets of high air pressure to form. They're then used as a lens to deviate cosmic rays so he can flip the desired bit on his hard drive[[note]]When he could just have used the Emacs command M-x butterfly instead[[/note]].
* ''Webcomic/SaturdayMorningBreakfastCereal'' shows the need for ''some'' artistic license [[http://www.smbc-comics.com/index.php?db=comics&id=1898 here]].



* ''Webcomic/{{Sinfest}}'' features Sisterhood-member Clio and her highly-successful string of attacks on [=DevilTech's=] fembot-production facilities. The fact that her target has a policy of installing unguarded data-ports on the [[IdiotBall exterior of its buildings]] makes things somewhat easier for her.
* Parodied in ''Webcomic/CaseyAndAndy'', when Casey [[http://www.galactanet.com/comic/view.php?strip=163 downloads the "operating system shown in movies"]] that lets the user hack into any device or program via a ridiculously easy password.

to:

* ''Webcomic/{{Sinfest}}'' features Sisterhood-member Clio and her highly-successful string of attacks on [=DevilTech's=] fembot-production facilities. The fact that her target has a policy of installing unguarded data-ports on the [[IdiotBall exterior of its buildings]] makes things somewhat easier for her.
* Parodied in ''Webcomic/CaseyAndAndy'', ''Webcomic/CaseyAndAndy'' when Casey [[http://www.galactanet.com/comic/view.php?strip=163 downloads the "operating system shown in movies"]] that lets the user hack into any device or program via a ridiculously easy password.



* ''Webcomic/SandraAndWoo'': explicitly averted in [[http://www.sandraandwoo.com/2016/09/01/0817-the-divine-comedy-page-15/ this strip]].
* Discussed and averted in ''Webcomic/TheSunjackers''. According to Candy Chip, she does very little actual manual hacking. Instead, she uses a program called [=GUMBaLL=] to keep the security AI occupied while she does whatever she needs to do.

to:

* ''Webcomic/SandraAndWoo'': explicitly averted in ''Webcomic/KevinAndKell'' dips into hacking every so often, although it tends to be more blatant metaphors for what they're really doing.
* ''Webcomic/{{Megatokyo}}'': Hackers use MagicalGirl representations of themselves to hack into a nebulously defined security network. This may or may not be a reference to the ''Manga/NegimaMagisterNegiMagi'' example above or something it was parodying. It's also unclear if this was actually happening, or just representational.
* ''Webcomic/SaturdayMorningBreakfastCereal'' shows the need for ''some'' artistic license
[[http://www.sandraandwoo.com/2016/09/01/0817-the-divine-comedy-page-15/ this strip]].
smbc-comics.com/index.php?db=comics&id=1898 here]].
* Discussed ''Webcomic/{{Sinfest}}'' features Sisterhood member Clio and averted in ''Webcomic/TheSunjackers''. According to Candy Chip, she does very little actual manual hacking. Instead, she uses her highly successful string of attacks on [=DevilTech's=] fembot-production facilities. The fact that her target has a program called [=GUMBaLL=] to keep policy of installing unguarded data-ports on the security AI occupied while she does whatever she needs [[IdiotBall exterior of its buildings]] makes things somewhat easier for her.
* [[http://xkcd.com/378/ This]] ''Webcomic/{{xkcd}}'' strip takes the cake... someone flaps a butterfly's wings just once
to do.control the air currents, causing temporary pockets of high air pressure to form. They're then used as a lens to deviate cosmic rays so he can flip the desired bit on his hard drive (when he could just have used the Emacs command M-x butterfly instead).



* Website/{{Cracked}} completely {{deconstruct|edTrope}}s this entire trope with [[http://www.cracked.com/personal-experiences-1262-5-hacking-myths-you-probably-believe-thanks-to-movies.html "5 Hacking Myths You Probably Believe Thanks to Movies"]].



* Website/{{Cracked}} completely {{Deconstruct|edTrope}}s this entire trope with [[http://www.cracked.com/personal-experiences-1262-5-hacking-myths-you-probably-believe-thanks-to-movies.html 5 Hacking Myths You Probably Believe Thanks to Movies.]]



* Parodied by ''WebVideo/SMBCTheater'' in [[https://www.youtube.com/watch?v=Hlip7jZX9m0 "Hackers!"]] The hackers are all spouting technical-sounding gibberish but it turns out they are actually all agents from different agencies (FBI, CIA, DHS, and NSA) who have no clue how hacking works and are trying to run [[RightHandVersusLeftHand conflicting sting operations]].
* Similarly spoofed by WebVideo/DoorMonster in "[[https://youtu.be/ZTwCtQIEswM Hacker Fight]]", as each side employs more and more of this trope to gain the upper hand. Specific tactics used are: [[SunglassesAtNight weird sunglasses]], [[BadassLongcoat black trench coats]], rad {{codename}}s ("Enigma"), multiple monitors and keyboards, vague hacking metaphors, [[BondOneLiner computer puns]] ("Byte me"), outdated leet speech ("This NOOB's about to get PWNED"), unreasonably convoluted user interfaces and skull gifs. [[CoupDeGrace Finished off by pressing the enter button as hard as possible]].
* Several advertising skits ([[https://youtu.be/X8bEdDrXGYQ some of which had been compiled here]]) from WebVideo/CriticalRole star Sam Riegel, er [=BlackWillow73=], as he attempts to 'Hack the mainframe' by furiously typing and wearing ridiculous sunglasses.

to:

* Parodied by ''WebVideo/SMBCTheater'' in [[https://www.youtube.com/watch?v=Hlip7jZX9m0 "Hackers!"]] The hackers are all spouting technical-sounding gibberish but it turns out they are actually all agents Several advertising skits ([[https://youtu.be/X8bEdDrXGYQ some of which had been compiled here]]) from different agencies (FBI, CIA, DHS, ''WebVideo/CriticalRole'' star Sam Riegel -- er, [=BlackWillow73=], as he attempts to 'Hack the mainframe' by furiously typing and NSA) who have no clue how hacking works and are trying to run [[RightHandVersusLeftHand conflicting sting operations]].
wearing ridiculous sunglasses.
* Similarly spoofed by WebVideo/DoorMonster ''WebVideo/DoorMonster'' in "[[https://youtu.be/ZTwCtQIEswM Hacker Fight]]", as each side employs more and more of this trope to gain the upper hand. Specific tactics used are: [[SunglassesAtNight weird sunglasses]], [[BadassLongcoat black trench coats]], rad {{codename}}s {{code name}}s ("Enigma"), multiple monitors and keyboards, vague hacking metaphors, [[BondOneLiner computer puns]] ("Byte me"), outdated leet speech ("This NOOB's about to get PWNED"), unreasonably convoluted user interfaces and skull gifs. gifs, [[CoupDeGrace Finished finished off by pressing the enter button as hard as possible]].
* Several advertising skits ([[https://youtu.be/X8bEdDrXGYQ some of which had been compiled here]]) Parodied by ''WebVideo/SMBCTheater'' in [[https://www.youtube.com/watch?v=Hlip7jZX9m0 "Hackers!"]] The hackers are all spouting technical-sounding gibberish, but it turns out they are actually all agents from WebVideo/CriticalRole star Sam Riegel, er [=BlackWillow73=], as he attempts different agencies (FBI, CIA, DHS, and NSA) who have no clue how hacking works and are trying to 'Hack run [[RightHandVersusLeftHand conflicting sting operations]].
* Made fun of in ''WebVideo/YuGiOhTheAbridgedSeries'' when Kaiba's computer claims to be so advanced that it makes hacking look like a [[ExtremeGraphicalRepresentation boring video game]]. Said computer also points out how Kaiba seems to be pressing
the mainframe' by furiously typing same keys over and wearing ridiculous sunglasses. over prompting the latter to claim he learned how to hack by watching old episodes of ''Franchise/StarTrek''.



* Once on ''WesternAnimation/ThePenguinsOfMadagascar'', the penguins hacked into a computer by ''literally'' hacking the [=CPU=] with a chainsaw.

to:

* Once on ''WesternAnimation/ThePenguinsOfMadagascar'', All over the penguins hacked into a computer by ''literally'' hacking the [=CPU=] map in ''WesternAnimation/AdventuresOfTheGalaxyRangers''. Computer interfaces are primarily A.I. units with their own personalities and quirks; overpower or trick the AI, and you get full access. The team's PlayfulHacker is as much a chainsaw.ConMan as he is a programmer.



* All over the map in ''WesternAnimation/AdventuresOfTheGalaxyRangers''. Computer interfaces are primarily AI units with their own personalities and quirks; overpower or trick the AI, and you get full access. The team's PlayfulHacker is as much a ConMan as he is a programmer.

to:

* All over In ''WesternAnimation/KimPossible'', Wade can do this, mostly in regard to hacking speed. Most of it is explained away as him being a super-genius capable of inventing things like a holodeck and a love-ray. A typical moment for him is describing how tight security is before casually announcing that yeah, he's past it by now.
* Once in ''WesternAnimation/ThePenguinsOfMadagascar'',
the map in ''WesternAnimation/AdventuresOfTheGalaxyRangers''. Computer interfaces are primarily AI units penguins hack into a computer by ''literally'' hacking the CPU with their own personalities and quirks; overpower or trick the AI, and you get full access. The team's PlayfulHacker is as much a ConMan as he is a programmer.chainsaw.



* In the seventh season of ''WesternAnimation/TheVentureBrothers'', Billy and Pete attempt to hack the Venture building's computer to find its flaws, quickly {{lampshad|eHanging}}ing how hacking isn't as cool as it appears in films.
* Besides sci-fi action movie trivia, this is Naoki's specialty in ''WesternAnimation/WorldOfWinx''. He can hack into just about anything with his phone, from remote-control boats to the floating cameras that follow the Winx around.



-->'''Kimiko:''' I cross-referenced the username with a [[TechnoBabble double-helix tracer decoding worm]]! (Somehow this produces an image of [[BigBad Wuya]].)
* In ''WesternAnimation/JonnyQuestVersusTheCyberInsects'', Dr. Zin's {{Mooks}} instantly upload a vague kind of virus into the Quest family's RobotBuddy just by pressing some random button, which ''instantaneously'' totally rewrites his programming and brings him under Zin's remote control. Jonny also hacks Zin's own computer with the same virus later on.
* In ''WesternAnimation/KimPossible'', Wade can do this, mostly in regards to hacking speed. Most of it is explained away as him being a super-genius capable of inventing things like a holodeck and a love-ray. A typical moment for him is describing how tight security is before casually announcing that yeah, he's past it by now.
* In the seventh season of ''WesternAnimation/TheVentureBrothers'' Billy and Pete attempt to hack the Venture building's computer to find its flaws, quickly {{lampshading}} how hacking isn't as cool as it appears in films.
* ''WesternAnimation/YoungJustice2010'''s incarnation of ComicBook/{{Robin}} plays up his [[PlayfulHacker hacking abilities]] since he's more of a smart guy here, especially in the first season. He uses a wrist-mounted holographic computer which allows him to hack into any secret computer database, usually with the help of a USB cable or typing a few commands. At one point, he's even able to bypass some locked doors with a little smiley face of Robin on his computer screen appearing over each one.
* Besides sci-fi action movie trivia, this is Naoki's specialty in ''WesternAnimation/WorldOfWinx''. He can hack into just about anything with his phone, from remote-control boats to the floating cameras that follow the Winx around.

to:

-->'''Kimiko:''' I cross-referenced the username with a [[TechnoBabble [[{{Technobabble}} double-helix tracer decoding worm]]! (Somehow ''[Somehow, this produces an image of [[BigBad Wuya]].)
]''
* In ''WesternAnimation/JonnyQuestVersusTheCyberInsects'', Dr. Zin's {{Mooks}} instantly upload a vague kind of virus into the Quest family's RobotBuddy just by pressing some random button, which ''instantaneously'' totally rewrites his programming and brings him under Zin's remote control. Jonny also hacks Zin's own computer with the same virus later on.
* In ''WesternAnimation/KimPossible'', Wade can do this, mostly in regards to hacking speed. Most of it is explained away as him being a super-genius capable of inventing things like a holodeck and a love-ray. A typical moment for him is describing how tight security is before casually announcing that yeah, he's past it by now.
* In the seventh season of ''WesternAnimation/TheVentureBrothers'' Billy and Pete attempt to hack the Venture building's computer to find its flaws, quickly {{lampshading}} how hacking isn't as cool as it appears in films.
* ''WesternAnimation/YoungJustice2010'''s incarnation of ComicBook/{{Robin}}
''WesternAnimation/YoungJustice2010'', Robin plays up his [[PlayfulHacker hacking abilities]] abilities]], since he's more of a smart guy here, especially in the first season. He uses a wrist-mounted holographic computer which allows him to hack into any secret computer database, usually with the help of a USB cable or typing a few commands. At one point, he's even able to bypass some locked doors with a little smiley face of Robin on his computer screen appearing over each one.
* Besides sci-fi action movie trivia, this is Naoki's specialty in ''WesternAnimation/WorldOfWinx''. He can hack into just about anything with his phone, from remote-control boats to the floating cameras that follow the Winx around.
one.



[[folder:Exceptions]]
* In ''VideoGame/ScienceGirls'', Jennifer tries to get Missy to hack into the alien's wormhole device. Missy makes it very clear she can't hack into something that may not even be a computer, much less one she has no clue what the security is or even how it works. She even lampshades it by quipping "Hacking isn't magic, you know."
* ''Literature/ClearAndPresentDanger'' has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow to the Hollywood Computing, they even use "dir /w" to list the disk contents, even if the display is a little viewer-friendlier than normal.)
* ''Series/MrRobot'' explicitly sets out to avert this trope. In the words of the ''veteran cyber-crime expert'', they hired as a consultant for the show: "We want that code to be accurate so that even the most sophisticated hacker or technical person out there will not roll their eyes at a scene". They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they ''actually used an honest-to-goodness real-life spyware''. They hid its name, but it's trivial for anyone with decent Google skills to find it out.
** This trope is even discussed in a certain episode of the first season, which Romero (one of the hackers) complains about a film portraying hacking in an unrealistic way.
** All the hacks depicted are painstakingly researched, and in many cases, ''actually performed'' by the [[https://medium.com/@ryankazanciyan consultants for the show]]. Whenever actual code, or other hacking tools, are shown being used on-screen, they will have actually been written and used, then recorded and played back for the camera. The most common ArtisticLicense taken in the show is the ''time'' that the various hacks would take - actions that would take hours or even ''days'' to complete will be compressed down into far shorter timespans.
*** One "sped-up" example is Elliot hacking his neighbor's wifi. While the software used is accruate, the process happens in minutes opposed to the hours that it would take ''at best''.
* ''Film/TheSocialNetwork'':
** The hacking is explicitly shown to be a process of reading code and trying out strategies based on the security settings of the target, although it takes much less time than in real life.
** Also, the objectives of the "hacking" scene are modest (download everybody's photo in every house, without having to manually navigate to every page and right-click on each image), and the descriptions of how to do it for each house's webpage, although brief, are 100% realistic. The easier pages have unprotected directory listings in Apache, so you can get all the images with a single run of the wget command. The harder ones require posting search terms to a page and scraping the output to find the photos; this requires custom scripting, therefore "bring out the Emacs" (a plain-text editor used by many programmers).
** The hacking, and indeed all of Zuckerberg's monologue in that scene is a verbatim transcript fished from the real-life court documents. So not only is that the actual method that he used to hack it happened roughly that time, time frame as the timestamps on his posts attest to.

to:

[[folder:Exceptions]]
!!Exceptions:

[[folder:Anime & Manga]]
* Averted with Nagato Yuki's hacking skills in the anime of ''Literature/HaruhiSuzumiya'' when she hacks the backdoor which the computer society uses to cheat the Day of Sagittarius with [[ShownTheirWork real code]] -- lots of it. Although we don't see the original lines of code she used to hack their backdoor, we do get glimpses of the code she uses to rewrite the game.
[[/folder]]

[[folder:Comic Books]]
* Parodied in the ''ComicBook/AdventureTime'' comic. Whenever {{Idiot Hero}}es Finn and Jake [[http://i.imgur.com/EWKbLXl.gif try hacking,]] they just shout random {{technobabble}} while flailing away at the keyboard; they admit to having learned this from movies. Marceline, on the other hand, seems to know actual hacking techniques.
[[/folder]]

[[folder:Films -- Live-Action]]
* In ''VideoGame/ScienceGirls'', Jennifer tries ''Film/{{Antitrust}}'', the BigBad's most dangerous weapon is his access to get Missy medical databases, and the protagonist is able to easily hack into the alien's wormhole device. Missy makes it very clear she can't hack into something that may not even be a computer, much less computer system because no one she has no clue what bothered with securing a terminal in a children's play area.
* ''Film/{{Elysium}}'' shows console text and computer code,
the security need for physical access, and the ease with which [[spoiler:Elysium is or even how it works. She even lampshades it by quipping "Hacking isn't magic, you know."
* ''Literature/ClearAndPresentDanger'' has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow
rebooted and its citizen registry altered is due to the Hollywood Computing, they even use "dir /w" to list the disk contents, even if the display is a little viewer-friendlier than normal.)
* ''Series/MrRobot''
of code stolen from an insider who wrote it explicitly sets out to avert mount a coup]]. Of course, this trope. In still leaves the words gaping plot hole of [[spoiler:why downloading the ''veteran cyber-crime expert'', they hired as a consultant for the show: "We want that code to be accurate so that even from his head into the most sophisticated hacker or technical person out there will not roll their eyes at a scene". They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they ''actually used an honest-to-goodness real-life spyware''. They hid its name, but it's trivial for anyone with decent Google skills to find core would kill him when they're clearly downloading and displaying it out.
** This trope is even discussed in a certain episode of
from his head onto the first season, which Romero (one of the hackers) complains about a film portraying hacking in an unrealistic way.
** All the hacks depicted are painstakingly researched, and in many cases, ''actually performed'' by the [[https://medium.com/@ryankazanciyan consultants for the show]]. Whenever actual code, or other hacking tools, are shown being used on-screen, they will have actually been written and used, then recorded and played back for the camera. The most common ArtisticLicense taken
monitors in the show is the ''time'' that the various hacks would take - actions that would take hours or even ''days'' to complete will be compressed down into far shorter timespans.
*** One "sped-up" example is Elliot hacking his neighbor's wifi. While the software used is accruate, the process happens in minutes opposed to the hours that it would take ''at best''.
smugglers' base]].
* ''Film/TheSocialNetwork'':
** The hacking is explicitly shown to be a process of reading code and trying out strategies based on the security settings of the target, although it takes much less time than in real life.
** Also, the objectives of the "hacking" scene are modest (download everybody's photo in every house, without having to manually navigate to every page and right-click on each image), and the descriptions of how to do it for each house's webpage, although brief, are 100% realistic. The easier pages have unprotected directory listings in Apache, so you can get all the images with a single run of the wget command. The harder ones require posting search terms to a page and scraping the output
''Film/IDontFeelAtHomeInThisWorldAnymore'': Parodied. Tony needs to find the photos; this requires custom scripting, therefore "bring out the Emacs" (a plain-text editor used by many programmers).
** The hacking, and indeed all
owner of Zuckerberg's monologue in that scene is a verbatim transcript fished from the real-life court documents. So not only is that the actual method that van using its license plate number, so he used to hack it happened roughly that time, time frame initiates an epic hacking sequence on his home computer. Typing rapidly as the timestamps on soundtrack thumps, Tony makes dated analogies about the internet (comparing it to a web full of spiders) as if he's spouting hacker wisdom. When we actually see his posts attest to.screen, he's just googling "how to look up license plate" and then borrowing a credit card to purchase the info from a website.



** Appears in a minor form near the beginning. While he did this all from an impossibly thin smartphone, when Tony hacked the display screens being used at the Senate hearing, if you look closely at the device as he handily holds it up for an instant, you can see that it is connected to several Microsoft SQL servers (did Oracle sponsor this movie?), and is running the "Stark Industries Terminal Hijack System". You can even see the images of the movies he shows later on in the scene in the corner, queued up. When you see the displays a split second later, it showed what appears to be an exploit involving using a built-in user, a common entry-point for hackers, to reboot the system to Stark's own operating system (complete with "Welcome Mr. Stark" printed in asterisks across the screen). While they did take a bit of artistic license, showing things you would never see and listing directories for cool scrolling text effect, at the very least the hack was depicted realistically. And since the mobile device was apparently a piece of Stark Industries equipment (which has been shown to be ridiculously advanced already, especially in the form of the Iron Man armor) this also makes sense.
*** Entering a system in this manner doesn't take any particular processing power on behalf of the intruder. It's using far more on just loading up the videos! Imagine if you will a giant, well-barred gate -- which is useless because Stark discreetly had a copy of the key made. It hardly takes any effort if you know where to hit.
** It's a blink-and-you'll-miss-it subtle touch, but Ivan breaks into the Hammer Industries computer terminal by using a default or commonly-used administrator username and password combination, a very simple thing that highlights one of Hammer's weaknesses. He says that their "software is shit," but what he might have meant was that their security was lacking... or was just saying it as one of his many {{Stealth Insult}}s that all end up soaring over Hammer's bone head.
** Later in the movie [[spoiler:when Ivan takes control of the Hammer Drones and War Machine, what sort of techno-lingo-made-up hacking tool did they use to free Rhodes from the suit's control? [[BoringButPractical Reboot it.]]]]
* In ''Film/{{Antitrust}}'', the BigBad's most dangerous weapon is his access to medical databases, and the protagonist is able to easily hack into the computer system because no one bothered with securing a terminal in a children's play area.

to:

** Appears in a minor form near the beginning. While he did does this all from an impossibly thin smartphone, when Tony hacked hacks the display screens being used at the Senate hearing, if you look closely at the device as he handily holds it up for an instant, you can see that it is connected to several Microsoft SQL servers (did Oracle sponsor this movie?), movie?) and is running the "Stark Industries Terminal Hijack System". You can even see the images of the movies he shows later on in the scene in the corner, queued up. When you see the displays a split second later, it showed shows what appears to be an exploit involving using a built-in user, a common entry-point for hackers, to reboot the system to Stark's own operating system (complete with "Welcome Mr. Stark" printed in asterisks across the screen). While they did take a bit of artistic license, showing things you would never see and listing directories for cool scrolling text effect, at the very least the hack was depicted realistically. And since the mobile device was apparently a piece of Stark Industries equipment (which has been shown to be ridiculously advanced already, especially in the form of the Iron Man armor) this also makes sense.
***
Entering a system in this manner doesn't take any particular processing power on behalf of the intruder. It's using far more on just loading up the videos! Imagine Imagine, if you will will, a giant, well-barred gate -- which is useless useless, because Stark discreetly had a copy of the key made. It hardly takes any effort if you know where to hit.
hit. While they do take a bit of artistic license, showing things you would never see and listing directories for cool scrolling text effect, at the very least the hack is depicted realistically.
** It's a blink-and-you'll-miss-it subtle touch, but Ivan breaks into the Hammer Industries computer terminal by using a default or commonly-used commonly used administrator username and password combination, a very simple thing that highlights one of Hammer's weaknesses. He says that their "software is shit," shit", but what he might have meant was that their security was is lacking... or was just saying it as one of his many {{Stealth Insult}}s that all end up soaring over Hammer's bone head.
** Later in the movie movie, [[spoiler:when Ivan takes control of the Hammer Drones and War Machine, what sort of techno-lingo-made-up hacking tool did do they use to free Rhodes from the suit's control? [[BoringButPractical Reboot it.]]]]
it]]]].
* In ''Film/{{Antitrust}}'', Averted in ''Film/TheMatrixReloaded'' when Trinity uses a genuine hacking program called "nmap" to identify a viable target from a command line (with plenty of RapidFireTyping, but in short bursts), and then uses a (fictional) "[=SSHnuke=]" program to attack a secure connection. This is actually pretty well done, and while the BigBad's most dangerous weapon is his access program she uses to medical databases, make the actual attack does not exist, it's a similar idea to a "real" attack on a remote computer, and highly skilled hackers often have a personal library of programs/exploits they've written themselves. Not only that but in the protagonist timeframe of the simulated reality (the turn of the century earth) [=SSHv1=] really had an exploitable remote vulnerability. Of course, the less said about the rest of the Matrix's relation to real computers, the better, but at least [[ShapedLikeItself their hacking of simulated computers inside a giant simulation is able a realistic simulation]].
* ''Film/RealGenius'': The climactic moment of sabotage is ultimately accomplished by [[spoiler:tricking Kent into telling them where and when the test is being done, trying
to easily hack into the (1980s) military computer by brute-forcing a password (which is expected to take 6 hours, including temporary lockouts due to too many wrong passwords, ''and'' ultimately doesn't work), then using fake ids and social engineering to [[TheGuardsMustBeCrazy trick a guard]] into letting them onto the military base, and physically replacing a computer chip in the prototype with one the kids made that contains different targeting data]]. Also, since the people doing the hack had built the system themselves, they could be assumed to know enough about the hardware they're dealing with to make a replacement part that would work.
* ''Film/TheSocialNetwork'':
** The hacking is explicitly shown to be a process of reading code and trying out strategies based on the security settings of the target, although it takes much less time than in real life.
** Also, the objectives of the "hacking" scene are modest (download everybody's photo in every house, without having to manually navigate to every page and right-click on each image), and the descriptions of how to do it for each house's webpage, although brief, are 100% realistic. The easier pages have unprotected directory listings in Apache, so you can get all the images with a single run of the wget command. The harder ones require posting search terms to a page and scraping the output to find the photos; this requires custom scripting, therefore "bring out the Emacs" (a plain-text editor used by many programmers).
** The hacking, and indeed all of Zuckerberg's monologue in that scene is a verbatim transcript fished from the real-life court documents. So not only is that the actual method that he used to hack it happened roughly that time, time frame as the timestamps on his posts attest to.
* The ''Film/TransformersFilmSeries'', believe it or not. The Decepticons' hacking essentially boils down to them going up to the big computer hard-lines, plugging themselves in, and copying the information. There is some techno talk about them having a special frequency to identify them, but the actual hacking averts many clichés. The human hacker, meanwhile, has to have a copy of the intrusion (basically the web history stating what file names were copied, without anything else shown) onto a memory stick, taken to him manually, and unlock some encrypted/embedded information. Still fairly Hollywoodish, but the way it works is entirely possible. Considering the many other liberties taken (the spider bug virus being notable, and all systems being shut down by said virus), they're [[HandWave handwaved]] by the fact that it's aliens interacting with [[ETGaveUsWiFi technology based on a reverse-engineered Megatron]].
[[/folder]]

[[folder:Literature]]
* ''Literature/TheCasualVacancy'' has scandalous posts written anonymously on a town message board by means of SQL injection, which is an entirely plausible method in real life (especially since the culprit behind an SQL injection can be nigh impossible to trace if done correctly).
* ''Literature/ClearAndPresentDanger'' has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow to the Hollywood Computing, they even use "dir /w" to list the disk contents, even if the display is a little viewer-friendlier than normal.)
* Handled realistically in Daniel Suarez's ''Literature/{{Daemon}}'' and its sequel, which shouldn't be surprising, since Suarez is JustForFun/OneOfUs and worked in computer security before becoming a novelist.
* ''Literature/{{Dopamine}}'' was basically written for the express purpose of subverting this trope. There are over a dozen instances of some form of hacking or another, and they're depicted with exact concordance with reality.
** When Danny's team cracks Tungsten's WEP key in Act I, the text describes the exact tool used -- "Cain and Abel" -- and the exact method Danny employs to use it.
** In Act III, when Danny breaks into Rock Box Security Co, we're given the exact console command required to open a reverse shell on Mac OS X.
** The author has literally ShownTheirWork on this one. The book's official website has [[http://dopaminenovel.com/#/hacking an entire section]] detailing the exact technical details of every hacking technique used in the book, along with an intro about the STRIDE computer security model. The website's documentation can be used as a layman's primer on computer hacking in and of itself.
** In the commentary on [[http://dopaminenovel.com/#/story?chapter=14 Chapter 14,]] the author describes trying out the cellphone hack himself several times with real equipment. This is evidently the case for all of the hacks depicted in the novel, but the cellphone one was noteworthy
because no one bothered of the fluidity of the cellphone market; the most appropriate burner phone available for sale kept changing as he was writing the manuscript, requiring him to repeatedly update the scene with securing a terminal in a children's play area.revisions to the hacking technique.



* In Creator/JohnSandford's Thomas Kidd novels. Kidd uses his programming skills to take down his targets, but to get access to the systems, he uses social engineering and the help of a burglar friend.
* Handled realistically in Daniel Suarez's ''Literature/{{Daemon}}'' and its sequel, which shouldn't be surprising since Suarez is JustForFun/OneOfUs and worked in computer security before becoming a novelist.
* Japanese live-action ''Manga/BloodyMonday'' featured a teen hacker using real UNIX applications, GNOME Desktop components, and lot of Python, while the fancy 3D graphs were limited to the government agents' computers.
* ''VisualNovel/NineHoursNinePersonsNineDoors'' averts this and ItsUpToYou at the same time in one scene. [[spoiler: Lotus creates a program to brute-force a password, while Junpei watches - or, if the right choices are made up to that point, he could go looking for a hint - but Lotus still manages to finish her program and find the password first.]]
* ''WebAnimation/BrokenSaints'' averts this by way of having a real hacker on-board as tech advisor.
* Averted by Nagato Yuki's hacking skills in ''Literature/HaruhiSuzumiya'' where she's hacking the back door the computer society uses to cheat the Day of Sagittarius with [[ShownTheirWork real code]]; lots of it. Although we don't see the original lines of code she used to hack their backdoor we do get glimpses of the code she uses to rewrite the game.

to:

* In Creator/JohnSandford's Thomas ''The Kidd novels. Series'' by Creator/JohnSandford, Kidd uses his programming skills to take down his targets, but to get access to the systems, he uses social engineering and the help of a burglar friend.
* Handled realistically in Daniel Suarez's ''Literature/{{Daemon}}'' ''Literature/TheManyLivesOfStephenLeeds'': Stephen performs some hacking by lying to a few people over the phone and its sequel, which shouldn't be surprising since Suarez using a simple phone app. It's explicitly noted that this is JustForFun/OneOfUs what real hacking tends to look like.
-->'''Audrey:''' Rule number one of decryption: if you don't have to break the code, don't. People are usually far less secure than the encryption strategies they employ.
* ''Literature/OldMansWar'': Averted
and worked lampshaded. A programmer trapped in computer security before becoming a novelist.
digital prison finds a way to make the prison glitch for a second, giving him access to the code. He describes how hacking in entertainment always looks good, with lots of flashing lights and whatnot, but what he actually did was just type a few things over the course of weeks. He assures readers that [[TakeOurWordForIt it was actually very impressive]], but unless you're a programmer yourself, you won't understand or care.
[[/folder]]

[[folder:Live-Action TV]]
* Japanese The live-action adaptation of ''Manga/BloodyMonday'' featured features a teen hacker using real UNIX applications, GNOME Desktop components, and lot of Python, while the fancy 3D graphs were are limited to the government agents' computers.
* ''VisualNovel/NineHoursNinePersonsNineDoors'' averts this In the ''Series/{{Firefly}}'' episode "[[Recap/FireflyE11Trash Trash]]", how do the tech-savvy crew hack the garbage disposal drones? They literally fly up underneath it, yank out the low-end computer slotted into the side of the garbage container, and ItsUpToYou at upload a new destination. Since it's a) on the same time in one scene. [[spoiler: Lotus creates underside of a program to brute-force a password, while Junpei watches - or, if floating city miles from shore and b)... well, ''garbage'', the right choices are made up to that point, he could go looking for a hint - but Lotus still manages to finish her program and find the password first.]]
* ''WebAnimation/BrokenSaints'' averts this by way of having a real hacker on-board as tech advisor.
* Averted by Nagato Yuki's hacking skills in ''Literature/HaruhiSuzumiya'' where she's hacking the back door
security on the computer society uses to cheat the Day is nonexistent anyway.
* The episode
of Sagittarius with [[ShownTheirWork real code]]; lots of it. Although we don't see the original lines of code she used ''Series/{{Limitless}}'' in which Brian learns to hack their backdoor we do get glimpses has him mention that he doesn't really know what "hacking" even ''is'' yet, just the montages he's seen in the movies. When he actually starts researching and studying it during a TrainingMontage, he [[NoFourthWall tells the audience that Hollywood tends to use montages for hacking because real hacking is boring, and instead shows the viewers vines of explosions and stuff]].
* ''Series/MrRobot'':
** The show explicitly sets out to avert this trope. In the words
of the ''veteran cyber-crime expert'', they hired as a consultant for the show: "We want that code she uses to rewrite be accurate so that even the game.most sophisticated hacker or technical person out there will not roll their eyes at a scene." They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they ''actually used an honest-to-goodness real-life spyware''. They hid its name, but it's trivial for anyone with decent Google skills to find it out.
** This trope is even discussed in a certain episode of the first season, which Romero (one of the hackers) complains about a film portraying hacking in an unrealistic way.
** All the hacks depicted are painstakingly researched, and in many cases, ''actually performed'' by the [[https://medium.com/@ryankazanciyan consultants for the show]]. Whenever actual code, or other hacking tools, are shown being used on-screen, they will have actually been written and used, then recorded and played back for the camera. The most common ArtisticLicense taken in the show is the ''time'' that the various hacks would take -- actions that would take hours or even ''days'' to complete will be compressed down into far shorter timespans. One such "sped-up" example is Elliot hacking his neighbor's Wi-Fi. While the software used is accurate, the process happens in minutes opposed to the hours that it would take ''at best''.



* Averted in ''Film/TheMatrixReloaded'', when Trinity uses a genuine hacking program called "nmap" to identify a viable target from a command line (with plenty of RapidFireTyping, but in short bursts), and then uses a (fictional) "[=SSHnuke=]" program to attack a secure connection. This is actually pretty well done, and while the program she uses to make the actual attack does not exist, it's a similar idea to a "real" attack on a remote computer, and highly skilled hackers often have a personal library of programs/exploits they've written themselves. Not only that but in the timeframe of the simulated reality (the turn of the century earth) [=SSHv1=] really had an exploitable remote vulnerability. Of course, the less said about the rest of the Matrix's relation to real computers, the better, but at least [[ShapedLikeItself their hacking of simulated computers inside a giant simulation is a realistic simulation.]]
* ''Film/{{Transformers|FilmSeries}}'', believe it or not. The Decepticons hacking essentially boiled down to them going up to the big computer hard-lines, plugging themselves in, and copying the information. There was some techno talk about them having a special frequency to identify them, but the actual hacking was averting many clichés. The human hacker, meanwhile, had to have a copy of the intrusion (basically the web history stating what file names were copied, without anything else shown) onto a memory stick and taken to him manually, and unlock some encrypted/embedded information. Still fairly Hollywoodish, but the way it worked is entirely possible. Considering the many other liberties taken (the spider bug virus being notable and all systems being shut down by said virus) they're handwaved by the fact it's aliens interacting with technology based on a reverse-engineered Megatron.
* In ''Webcomic/SchlockMercenary'' hacking is usually done by AIs with high amounts of processing power or via physical access. When they give specifics it's usually brute force using quantum computers or [[http://www.schlockmercenary.com/2006-03-29 "rubber hose" cryptography]].
* How does Florence of ''Webcomic/{{Freefall}}'' sneak an unauthorized "update" to the [[DeathOfPersonality Gardener in the Dark program]] into the servers? [[http://freefall.purrsia.com/ff2300/fc02235.htm Physical access.]]
* ''Literature/TheCasualVacancy'' has scandalous posts written anonymously on a town message board by means of SQL injection- which is an entirely plausible method in real life (especially since the culprit behind an SQL injection can be nigh impossible to trace if done correctly).
* In ''Literature/{{Worm}}'', Tattletale uses [[AwesomenessByAnalysis her ability]] to simply guess passwords.
* ''Film/{{Elysium}}'' shows console text and computer code, the need for physical access, and the ease with which [[spoiler: Elysium is rebooted and its citizen registry altered is due to the use of code stolen from an insider who wrote it explicitly to mount a coup.]] Of course this still leaves the gaping plot hole of [[spoiler: why downloading the code from his head into the core would kill him when they're clearly downloading and displaying it from his head onto the monitors in the smugglers' base]].
* ''Webcomic/GrrlPower'' not only has their [[http://www.grrlpowercomic.com/archives/327 tech geek mock Hollywood Hacking]] ("are you asking if I routed it through the traffic light system and bounced it off a dozen satellites?"), but his main jobs thus far have been getting the social media sites in a tizzy over a specific event and breaking into a bank's security system (that he notes was poorly designed) so he could upload their video footage onto [=YouTube=].
* ''Literature/TheLastAngel'': Red One and Echo are both able to punch through software-based defenses like they weren't there on account of being military seed AI's, but simple hardware countermeasures like system isolation and keeping ships far enough away to impose light-lag issues stop both cold. Assuming, of course, that they haven't rigged the game by putting a time-delayed virus into your system ahead of time or acquired backdoors, which is NOT a safe assumption.
* Parodied in the ''ComicBook/AdventureTime'' comic. Whenever [[IdiotHero Finn and Jake]] [[http://i.imgur.com/EWKbLXl.gif try hacking,]] they just shout random {{technobabble}} while flailing away at the keyboard; they admit to having learned this from movies. Marceline, on the other hand, seems to know actual hacking techniques.
* ''Literature/FloatingPoint'' takes place InsideAComputerSystem, but generally subverts this trope with extensive explanations for why two digital lifeforms need to stab each other with knives. (The knives are actually malware Apps that require a physics exploit to lock onto their targets and identify security weaknesses.)
* ''Literature/{{Dopamine}}'' was basically written for the express purpose of subverting this trope. There are over a dozen instances of some form of hacking or another, and they're depicted with exact concordance with reality.
** When Danny's team cracks Tungsten's WEP key in Act I, the text describes the exact tool used -- "Cain and Abel" -- and the exact method Danny employs to use it.
** In Act III, when Danny breaks into Rock Box Security Co, we're given the exact console command required to open a reverse shell on Mac OS X.
** The author has literally ShownTheirWork on this one. The book's official website has [[http://dopaminenovel.com/#/hacking an entire section]] detailing the exact technical details of every hacking technique used in the book, along with an intro about the STRIDE computer security model. The website's documentation can be used as a layman's primer on computer hacking in and of itself.
** In the commentary on [[http://dopaminenovel.com/#/story?chapter=14 Chapter 14,]] the author describes trying out the cellphone hack himself several times with real equipment. This is evidently the case for all of the hacks depicted in the novel, but the cellphone one was noteworthy because of the fluidity of the cellphone market; the most appropriate burner phone available for sale kept changing as he was writing the manuscript, requiring him to repeatedly update the scene with revisions to the hacking technique.
* In ''Series/{{Firefly}}'' episode "[[Recap/FireflyE11Trash Trash]]", how do the tech-savvy crew hack the garbage disposal drones? They literally fly up underneath it, yank out the low-end computer slotted into the side of the garbage container, and upload a new destination. Since it's a) on the underside of a floating city miles from shore and b)... well, ''garbage'', the security on the computer is nonexistent anyway.
* In season 2 of [[Series/SiliconValley Silicon Valley]], resident cyber security expert Gilfoyle manages to log into Endframe's server because the CEO left a post it note with his login credentials in plain view, this is surprisingly common and often how people get hacked.
** This comes up again in the episode ''White Hat/Black Hat'' where Endframe fires the head of their IT department, Seth, because of Gilfoyle's actions. When Richard goes to Seth to apologize, he only ends up making things worse, leading to Seth threatening to [[PrecisionFStrike "skullf***k"]] their system. Later it appears Seth did hack their network and started deleting all their client's files at a fast rate that none of the protagonists could stop. Turns out, Seth never hacked their network and the files were being deleted because Russ accidentally placed a bottle of tequila over the "delete" key.
* Interestingly, one point that ''VideoGame/MegaManBattleNetwork'' shows correctly is that once in a while, Lan will encounter some kind of blockade or security gate that cannot be opened or bypassed by his side of the Internet, which will require him to jack out/log off and find an entry point that is situated ''behind'' the blockade. He also often has to directly connect to embedded systems that are not connected directly to the Internet by finding a way to get to a direct access port in the real world. The few times Lan connects wirelessly, he has access to either a wireless adapter kit made for his Navi or is in a room with a working wireless connection.
** One simple little detail stands out: every game, Lan needs to acquire updated security passes to (re)gain access to his friends' protected home networks, as they probably change their passwords regularly and need to keep him updated.

to:

* Averted in ''Film/TheMatrixReloaded'', when Trinity uses a genuine hacking program called "nmap" to identify a viable target from a command line (with plenty of RapidFireTyping, but in short bursts), and then uses a (fictional) "[=SSHnuke=]" program to attack a secure connection. This is actually pretty well done, and while the program she uses to make the actual attack does not exist, it's a similar idea to a "real" attack on a remote computer, and highly skilled hackers often have a personal library of programs/exploits they've written themselves. Not only that but in the timeframe of the simulated reality (the turn of the century earth) [=SSHv1=] really had an exploitable remote vulnerability. Of course, the less said about the rest of the Matrix's relation to real computers, the better, but at least [[ShapedLikeItself their hacking of simulated computers inside a giant simulation is a realistic simulation.]]
* ''Film/{{Transformers|FilmSeries}}'', believe it or not. The Decepticons hacking essentially boiled down to them going up to the big computer hard-lines, plugging themselves in, and copying the information. There was some techno talk about them having a special frequency to identify them, but the actual hacking was averting many clichés. The human hacker, meanwhile, had to have a copy of the intrusion (basically the web history stating what file names were copied, without anything else shown) onto a memory stick and taken to him manually, and unlock some encrypted/embedded information. Still fairly Hollywoodish, but the way it worked is entirely possible. Considering the many other liberties taken (the spider bug virus being notable and all systems being shut down by said virus) they're handwaved by the fact it's aliens interacting with technology based on a reverse-engineered Megatron.
* In ''Webcomic/SchlockMercenary'' hacking is usually done by AIs with high amounts of processing power or via physical access. When they give specifics it's usually brute force using quantum computers or [[http://www.schlockmercenary.com/2006-03-29 "rubber hose" cryptography]].
* How does Florence of ''Webcomic/{{Freefall}}'' sneak an unauthorized "update" to the [[DeathOfPersonality Gardener in the Dark program]] into the servers? [[http://freefall.purrsia.com/ff2300/fc02235.htm Physical access.]]
* ''Literature/TheCasualVacancy'' has scandalous posts written anonymously on a town message board by means of SQL injection- which is an entirely plausible method in real life (especially since the culprit behind an SQL injection can be nigh impossible to trace if done correctly).
* In ''Literature/{{Worm}}'', Tattletale uses [[AwesomenessByAnalysis her ability]] to simply guess passwords.
* ''Film/{{Elysium}}'' shows console text and computer code, the need for physical access, and the ease with which [[spoiler: Elysium is rebooted and its citizen registry altered is due to the use of code stolen from an insider who wrote it explicitly to mount a coup.]] Of course this still leaves the gaping plot hole of [[spoiler: why downloading the code from his head into the core would kill him when they're clearly downloading and displaying it from his head onto the monitors in the smugglers' base]].
* ''Webcomic/GrrlPower'' not only has their [[http://www.grrlpowercomic.com/archives/327 tech geek mock Hollywood Hacking]] ("are you asking if I routed it through the traffic light system and bounced it off a dozen satellites?"), but his main jobs thus far have been getting the social media sites in a tizzy over a specific event and breaking into a bank's security system (that he notes was poorly designed) so he could upload their video footage onto [=YouTube=].
* ''Literature/TheLastAngel'': Red One and Echo are both able to punch through software-based defenses like they weren't there on account of being military seed AI's, but simple hardware countermeasures like system isolation and keeping ships far enough away to impose light-lag issues stop both cold. Assuming, of course, that they haven't rigged the game by putting a time-delayed virus into your system ahead of time or acquired backdoors, which is NOT a safe assumption.
* Parodied in the ''ComicBook/AdventureTime'' comic. Whenever [[IdiotHero Finn and Jake]] [[http://i.imgur.com/EWKbLXl.gif try hacking,]] they just shout random {{technobabble}} while flailing away at the keyboard; they admit to having learned this from movies. Marceline, on the other hand, seems to know actual hacking techniques.
* ''Literature/FloatingPoint'' takes place InsideAComputerSystem, but generally subverts this trope with extensive explanations for why two digital lifeforms need to stab each other with knives. (The knives are actually malware Apps that require a physics exploit to lock onto their targets and identify security weaknesses.)
* ''Literature/{{Dopamine}}'' was basically written for the express purpose of subverting this trope. There are over a dozen instances of some form of hacking or another, and they're depicted with exact concordance with reality.
''Series/SiliconValley'':
** When Danny's team cracks Tungsten's WEP key in Act I, the text describes the exact tool used -- "Cain and Abel" -- and the exact method Danny employs to use it.
** In Act III, when Danny breaks into Rock Box Security Co, we're given the exact console command required to open a reverse shell on Mac OS X.
** The author has literally ShownTheirWork on this one. The book's official website has [[http://dopaminenovel.com/#/hacking an entire section]] detailing the exact technical details of every hacking technique used in the book, along with an intro about the STRIDE computer security model. The website's documentation can be used as a layman's primer on computer hacking in and of itself.
** In the commentary on [[http://dopaminenovel.com/#/story?chapter=14 Chapter 14,]] the author describes trying out the cellphone hack himself several times with real equipment. This is evidently the case for all of the hacks depicted in the novel, but the cellphone one was noteworthy because of the fluidity of the cellphone market; the most appropriate burner phone available for sale kept changing as he was writing the manuscript, requiring him to repeatedly update the scene with revisions to the hacking technique.
* In ''Series/{{Firefly}}'' episode "[[Recap/FireflyE11Trash Trash]]", how do the tech-savvy crew hack the garbage disposal drones? They literally fly up underneath it, yank out the low-end computer slotted into the side of the garbage container, and upload a new destination. Since it's a) on the underside of a floating city miles from shore and b)... well, ''garbage'', the security on the computer is nonexistent anyway.
*
In season 2 of [[Series/SiliconValley Silicon Valley]], 2, resident cyber security cyber-security expert Gilfoyle manages to log into Endframe's server because the CEO left a post it post-it note with his login credentials in plain view, this view. This is surprisingly common common, and often how people get hacked.
** This comes up again in the episode ''White "White Hat/Black Hat'' where Hat", in which Endframe fires the head of their IT department, Seth, because of Gilfoyle's actions. When Richard goes to Seth to apologize, he only ends up making things worse, leading to Seth threatening to [[PrecisionFStrike "skullf***k"]] "skullfuck"]] their system. Later Later, it appears that Seth did hack has hacked their network and started deleting all of their client's clients' files at a fast rate that none of the protagonists could can stop. Turns out, However, it turns out that Seth never hacked their network network, and the files were being deleted because Russ accidentally placed a bottle of tequila over the "delete" key.
[[/folder]]

[[folder:Video Games]]
* Despite Waynetech seemingly having made much of the security equipment in the ''VideoGame/BatmanArkhamSeries'', Batman usually has problems getting into secure areas until he receives the proper access codes:
** In ''VideoGame/BatmanArkhamAsylum'', Batman can't hack the consoles until he can read the codes from the Warden's keycard into his hacking device.
** In ''VideoGame/BatmanArkhamCity'', Batman downloads the access codes to Gotham's public buildings after [[spoiler:Penguin tries to trap him in the abandoned GCPD Forensics Lab building]], but the stronger-encrypted TYGER consoles are off limits to him until [[spoiler:he downloads a copy of the TYGER main control program during Protocol 10]].
** In ''Videogame/BatmanArkhamKnight'', Batman can't hack the Arkham Knight's drones until [[spoiler:he obtains a part from a special drone]], but even then, all he can do is turn off their targeting sensors temporarily. During Predator encounters, Batman cannot take control of drones unless he downloads the control codes directly from the drone controllers. He can also obtain a drone virus special weapon to use during Batmobile Tank encounters, but all the virus does is to overwrite the drones' IFF systems.
* ''VideoGame/MegaManBattleNetwork'':
**
Interestingly, one point that ''VideoGame/MegaManBattleNetwork'' shows the games show correctly is that once in a while, Lan will encounter some kind of blockade or security gate that cannot be opened or bypassed by his side of the Internet, which will require him to jack out/log off and find an entry point that is situated ''behind'' the blockade. He also often has to directly connect to embedded systems that are not connected directly to the Internet by finding a way to get to a direct access port in the real world. The few times Lan connects wirelessly, he has access to either a wireless adapter kit made for his Navi or is in a room with a working wireless connection.
** One simple little detail stands out: in every game, Lan needs to acquire updated security passes to (re)gain access to his friends' protected home networks, as they probably change their passwords regularly and need to keep him updated.



* The episode of ''Series/{{Limitless}}'' where Brian is learning to hack has him mention that he doesn't really know what "hacking" even '''is''' yet, just the montages he's seen in the movies. When he actually starts researching and studying it, he [[NoFourthWall tells the audience how boring real hacking is and instead shows the viewers vines of explosions and stuff]].
* ''WebAnimation/{{RWBY}}''
** In Volumes 2 and 3, both times where the villains hack the good guys' security systems, they have to physically fight their way to the administrator control terminals and then upload the viruses from their own machines. In the first case, the virus has administrator access and doesn't do anything obvious, so without anything to actually observe and trace (all it does is spread itself to other systems connected to the network, giving Cinder remote access to their machines), the good guys are left scratching their heads as to what the villains did. In the second case, no one has time to dig out the virus, because it turns their entire robot army against them.
** In Volume 7, [[EvilGenius Arthur Watts]] is able to hack into Mantle's security systems because he ''wrote'' the security code and thus knows all of its exploits and backdoors. He can't access the more recently-updated security for Atlas because he didn't write that security code. In addition, in order to get access to Mantle's much more secure utility grid to shut off the heating systems, he has to get access codes from someone on the Atlas Council, so he [[spoiler:rigs an election to get a corrupt businessman elected to the Council in exchange for the access codes.]]
** In Volume 8, even Arthur Watts is unable to hack Penny because she has no wireless access that he can find. [[spoiler:He only manages to do so by stealing one of her swords, installing malicious hardware into it, and then waiting for her to be connected to the CCT so she can reconnect with the sword. She manages to reboot herself and sever the connection, but her systems have already uploaded the virus and its basic commands.]] Lampshaded when Cinder asks him to bring Penny to her and he mocks her for thinking that he could telekinetically make Penny do whatever he wanted. There's also at least two cases of characters getting into the Atlesian military system by breaking into the administration room to access the terminals, first when Team Remnant needs some authorizations to launch Amity and later when [[spoiler:Watts takes control of the systems to fulfill Cinder's plan]].

to:

* The episode of ''Series/{{Limitless}}'' where Brian is learning to hack has him mention that he doesn't really know what "hacking" even '''is''' yet, just the montages he's seen in the movies. When he actually starts researching and studying it, he [[NoFourthWall tells the audience how boring real ''VideoGame/TheNamelessMod'': While most hacking is just like the original ''VideoGame/DeusEx'', which is a "hack" button that appears on terminals whose usefulness depends on how developed the player's hacking skills are, there is one section where the player needs to gain access to an admin account that cannot be brute forced. Luckily, a user account on the same computer which the player does have access to has left the admin credentials for all to see in their email.
* PlayedForLaughs in ''VideoGame/Portal2'' with Wheatley's attempts at "hacking", one where he systematically tries every character of a password (AAAAAA, AAAAAB, etc.),
and instead shows one where he hacks a door... by ''smashing the viewers vines of explosions window''. As dumb as Wheatley is, and stuff]].as pitiful his attempts at hacking are, these are ''real tactics'': trying every character of a password systematically is known as a [[https://en.wikipedia.org/wiki/Brute-force_attack Brute-Force Attack]] while bypassing the locking mechanism of a door is a [[https://en.wikipedia.org/wiki/Backdoor_(computing) Backdoor Exploit]].
* ''WebAnimation/{{RWBY}}''
**
In Volumes 2 and 3, both times where the villains ''VideoGame/ScienceGirls'', Jennifer tries to get Missy to hack into the good guys' alien's wormhole device. Missy makes it very clear she can't hack into something that may not even be a computer, much less one she has no clue what the security is or even how it works. She even lampshades it by quipping "Hacking isn't magic, you know."
* In ''VideoGame/SplinterCellBlacklist'', when the Engineers hack into [[CoolPlane the Paladin]], they do so by injecting a Stuxnet-like worm into the plane's systems by letting Sam get his hands on an infected tablet which Charlie has to connect to the Paladin's systems to access. This is ''absolutely'' how most people's computers get infected by viruses in real life, via connecting to malicious sites, servers, or downloads. In order to fight it, Charlie does a factory reset to purge the virus. Again, this is a real (if desperate) means of getting rid of a virus from an infected machine. Bonus points in that the infected tablet probably ''wouldn't'' have been a threat had Charlie not bypassed some of their security protocols to speed up the data transfer, which again is pretty accurate to what makes some machines in real-life vulnerable to viruses.
* In ''VideoGame/StarCrawlers'', the Hacker's "viruses" are actually {{Nanomachines}} being programmed and deployed to attack enemies and support allies. In order to hack enemy
systems, they have to physically fight their way to the administrator control Hacker needs physical access to terminals and then upload the viruses from their own machines. In the first case, the virus has administrator access and doesn't do anything obvious, so without anything to actually observe and trace (all it does is spread itself to other systems connected to the network, giving Cinder remote access to their machines), the good guys are left scratching their heads as to what the villains did. In the second case, no one has time to dig out the virus, because it turns their entire robot army against them.
** In Volume 7, [[EvilGenius Arthur Watts]] is able to hack into Mantle's
security systems because he ''wrote'' ports, and those only let them disable local security. Partway through the security code story missions, you will have an opportunity to repair a malfunctioning A.I., and thus knows all of its exploits and backdoors. He can't access the more recently-updated security for Atlas because he didn't write that security code. In addition, in order to get access to Mantle's much more secure utility grid to shut off the heating systems, he has to get access codes from someone on the Atlas Council, so he [[spoiler:rigs an election to get a corrupt businessman elected to the Council in exchange for the access codes.]]
** In Volume 8, even Arthur Watts is unable to hack Penny because she has no wireless access that he can find. [[spoiler:He only manages to
do so by stealing one of her swords, installing malicious hardware into it, and then waiting for her to be connected to the CCT so she can reconnect with the sword. She manages to reboot herself and sever the connection, but her systems so, [[ShownTheirWork you have already uploaded to identify errors in the virus and its code using real-world knowledge of basic commands.]] Lampshaded when Cinder asks him to bring Penny to her and he mocks her for thinking that he could telekinetically make Penny do whatever he wanted. There's also at least two cases of characters getting into the Atlesian military system by breaking into the administration room to access the terminals, first when Team Remnant needs some authorizations to launch Amity and later when [[spoiler:Watts takes control of the systems to fulfill Cinder's plan]]. programming languages]].



* ''Literature/TheManyLivesOfStephenLeeds'': Stephen performs some hacking by lying to a few people over the phone and using a simple phone app. It's explicitly noted that this is what real hacking tends to look like.
-->'''Audrey:''' Rule number one of decryption: if you don't have to break the code, don't. People are usually far less secure than the encryption strategies they employ.
* In ''VideoGame/SplinterCellBlacklist'' when The Engineers hack into [[CoolPlane The Paladin]], they do so by injecting a Stuxnet-like worm into the plane's systems by letting Sam get his hands on an infected tablet which Charlie has to connect to the Paladin's systems to access. This is ''absolutely'' how most people's computers get infected by viruses in real life, via connecting to malicious sites, servers, or downloads. In order to fight it, Charlie does a factory reset to purge the virus. Again, this is a real (if desperate) means of getting rid of a virus from an infected machine. Bonus points in that the infected tablet probably ''wouldn't'' have been a threat had Charlie not bypassed some of their security protocols to speed up the data transfer, which again is pretty accurate to what makes some machines in real-life vulnerable to viruses.
* Troy Hunt, of haveibeenpwned.com fame, once wrote [[https://www.troyhunt.com/making-light-of-the-dark-web-and-debunking-the-fud/ a rather lengthy blog article]] poking fun at mainstream media's propensity to use FUD when dealing with literally anything pertaining to UsefulNotes/TheDeepWeb, including using ''the'' stereotypical Hollywood Hacker as a header image (a guy in a black hoodie, CoolCodeOfSource somewhere in the image and/or typing a whole lotta nothing on a computer). He also notes on the tail end of the article that an unsettling number of "database breaches" are really just unencrypted sensitive info on, ironically, "light web" [=URLs=] (that is, public-facing websites that aren't on Tor or other hidden networks).
* In ''VideoGame/StarCrawlers'', the Hacker's "viruses" are actually {{Nanomachines}} being programmed and deployed to attack enemies and support allies. In order to hack enemy systems, the Hacker needs physical access to terminals and security ports, and those only let them disable local security. Partway through the story missions, you will have an opportunity to repair a malfunctioning AI and in order to do so, [[ShownTheirWork you have to identify errors in the code using real-world knowledge of basic programming languages]].
* ''VideoGame/TheNamelessMod'': While most hacking is just like the original ''Deus Ex'', which is a "hack" button that appears on terminals whose usefulness depends on how developed the player's hacking skills are, there is one section where the player needs to gain access to an admin account that cannot be brute forced. Luckily, a user account on the same computer which the player does have access to has left the admin credentials for all to see in their email.
* ''Film/RealGenius'' The climactic moment of sabotage is ultimately accomplished by [[spoiler: Tricking Kent into telling them where and when the test is being done, trying to hack the (1980's) military computer by brute forcing a password (which is expected to take 6 hours, including temporary lockouts due to too many wrong passwords, AND ultimately doesn't work), then using fake ids and social engineering to [[TheGuardsMustBeCrazy trick a guard]] into letting them onto the military base, and physically replacing a computer chip in the prototype with one the kids made that contains different targeting data]]. Also, since the people doing the hack had built the system themselves they could be assumed to know enough about the hardware they were dealing with to make a replacement part that would work.
* PlayedForLaughs in ''VideoGame/{{Portal 2}}'' with Wheatley's attempts at "hacking", one where he systematically tries every character of a password (AAAAAA, AAAAAB, etc), and one where he hacks a door... by ''smashing the window''. As dumb as Wheatley is, and as pitiful his attempts at hacking are, these are ''real tactics'': trying every character of a password systematically is known as a [[https://en.wikipedia.org/wiki/Brute-force_attack Brute-Force Attack]] while bypassing the locking mechanism of a door is a [[https://en.wikipedia.org/wiki/Backdoor_(computing) Backdoor Exploit]].
* Despite Waynetech seemingly having made much of the security equipment in the ''VideoGame/BatmanArkhamSeries'', Batman usually has problems getting into secure areas until he receives the proper access codes:
** In ''VideoGame/BatmanArkhamAsylum'', Batman can't hack the consoles until he can read the codes from the Warden's keycard into his hacking device.
** In ''VideoGame/BatmanArkhamCity'', Batman downloads the access codes to Gotham's public buildings after [[spoiler:Penguin tries to trap him in the abandoned GCPD Forensics Lab building]], but the stronger-encrypted TYGER consoles are off limits to him until [[spoiler:he downloads a copy of the TYGER main control program during Protocol 10.]]
** In ''Videogame/BatmanArkhamKnight'', Batman can't hack the Arkham Knight's drones until [[spoiler:he obtains a part from a special drone]], but even then, all he can do is turn off their targeting sensors temporarily. And during Predator encounters, Batman cannot take control of drones unless he downloads the control codes directly from the drone controllers. He can also obtain a drone virus special weapon to use during Batmobile Tank encounters, but all the virus does is to overwrite the drones' IFF systems.


Added DiffLines:


[[folder:Visual Novels]]
* ''VisualNovel/NineHoursNinePersonsNineDoors'' averts this and ItsUpToYou at the same time in one scene. [[spoiler:Lotus creates a program to brute-force a password, while Junpei watches. If the right choices are made up to that point, he could go looking for a hint, but Lotus still manages to finish her program and find the password first.]]
[[/folder]]

[[folder:Web Animation]]
* ''WebAnimation/BrokenSaints'' averts this by way of having a real hacker on-board as tech advisor.
* ''WebAnimation/{{RWBY}}''
** In Volumes 2 and 3, both times when the villains hack the good guys' security systems, they have to physically fight their way to the administrator control terminals and then upload the viruses from their own machines. In the first case, the virus has administrator access and doesn't do anything obvious, so without anything to actually observe and trace (all it does is spread itself to other systems connected to the network, giving Cinder remote access to their machines), the good guys are left scratching their heads as to what the villains did. In the second case, no one has time to dig out the virus, because it turns their entire robot army against them.
** In Volume 7, [[EvilGenius Arthur Watts]] is able to hack into Mantle's security systems because he ''wrote'' the security code and thus knows all of its exploits and backdoors. He can't access the more recently updated security for Atlas because he didn't write that security code. In addition, in order to get access to Mantle's much more secure utility grid to shut off the heating systems, he has to get access codes from someone on the Atlas Council, so he [[spoiler:rigs an election to get a corrupt businessman elected to the Council in exchange for the access codes]].
** In Volume 8, even Arthur Watts is unable to hack Penny because she has no wireless access that he can find. [[spoiler:He only manages to do so by stealing one of her swords, installing malicious hardware into it, and then waiting for her to be connected to the CCT so she can reconnect with the sword. She manages to reboot herself and sever the connection, but her systems have already uploaded the virus and its basic commands.]] {{Lampshade|Hanging}}d when Cinder asks him to bring Penny to her and he mocks her for thinking that he could telekinetically make Penny do whatever he wanted. There are also at least two cases of characters getting into the Atlesian military system by breaking into the administration room to access the terminals, first when Team Remnant needs some authorizations to launch Amity and later when [[spoiler:Watts takes control of the systems to fulfill Cinder's plan]].
[[/folder]]

[[folder:Webcomics]]
* How does Florence of ''Webcomic/{{Freefall}}'' sneak an unauthorized "update" to the [[DeathOfPersonality Gardener in the Dark program]] into the servers? [[http://freefall.purrsia.com/ff2300/fc02235.htm Physical access.]]
* ''Webcomic/GrrlPower'' not only has [[http://www.grrlpowercomic.com/archives/327 the resident tech geek mock Hollywood Hacking]] ("are you asking if I routed it through the traffic light system and bounced it off a dozen satellites?"), but his main jobs thus far have been getting the social media sites in a tizzy over a specific event and breaking into a bank's security system (that he notes was poorly designed) so that he can upload their video footage onto [=YouTube=].
* ''Webcomic/SandraAndWoo'': Explicitly averted in [[http://www.sandraandwoo.com/2016/09/01/0817-the-divine-comedy-page-15/ this strip]].
* In ''Webcomic/SchlockMercenary'', hacking is usually done by A.I.s with high amounts of processing power or via physical access. When they give specifics, it's usually brute force using quantum computers or [[http://www.schlockmercenary.com/2006-03-29 "rubber hose" cryptography]].
* Discussed and averted in ''Webcomic/TheSunjackers''. According to Candy Chip, she does very little actual manual hacking. Instead, she uses a program called [=GUMBaLL=] to keep the security A.I. occupied while she does whatever she needs to do.
[[/folder]]

[[folder:Web Originals]]
* ''Literature/FloatingPoint'' takes place InsideAComputerSystem, but generally subverts this trope with extensive explanations for why two digital lifeforms need to stab each other with knives. (The knives are actually malware apps that require a physics exploit to lock onto their targets and identify security weaknesses.)
* Troy Hunt, of haveibeenpwned.com fame, once wrote [[https://www.troyhunt.com/making-light-of-the-dark-web-and-debunking-the-fud/ a rather lengthy blog article]] poking fun at mainstream media's propensity to use FUD when dealing with literally anything pertaining to UsefulNotes/TheDeepWeb, including using ''the'' stereotypical Hollywood Hacker as a header image (a guy in a black hoodie, CoolCodeOfSource somewhere in the image and/or typing a whole lotta nothing on a computer). He also notes at the tail end of the article that an unsettling number of "database breaches" are really just unencrypted sensitive info on, ironically, "light web" [=URLs=] (that is, public-facing websites that aren't on Tor or other hidden networks).
* ''Literature/TheLastAngel'': Red One and Echo are both able to punch through software-based defenses like they weren't there on account of being military seed A.I.s, but simple hardware countermeasures like system isolation and keeping ships far enough away to impose light-lag issues stop both cold. Assuming, of course, that they haven't rigged the game by putting a time-delayed virus into your system ahead of time or acquired backdoors, which is ''not'' a safe assumption.
* In ''Literature/{{Worm}}'', Tattletale uses [[AwesomenessByAnalysis her ability]] to simply guess passwords.
[[/folder]]
Is there an issue? Send a MessageReason:


* ''Film/OceansEight'': Averted. The method by which Nine Ball hacks into the Met's security network is plausible. She sends one of the security system managers an email that contains a link to a website that installs spyware on their computer.
* Averted in ''Film/PokemonDetectivePikachu''. Lucy Stevens gets information from a computer she's not allowed to use by [[CuteClumsyGirl spilling coffee on the authorized user]] and using it while they're washing up.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* ''Film/IDontFeelAtHomeInThisWorldAnymore'': Parodied. Tony needs to find the owner of a van using its license plate number, so he initiates an epic hacking sequence on his home computer. Typing rapidly as the soundtrack thumps, Tony makes dated analogies about the internet (comparing it to a web full of spiders) as if he's spouting hacker wisdom. When we actually see his screen, he's just googling "how to look up license plate" and then borrowing a credit card to purchase the info from a website.
Is there an issue? Send a MessageReason:
None


* In ''Series/StarTrekVoyager'' the ship is transported back to the 90s, and the villain manages to hack ''Voyager'', the 24th-century OrganicTechnology ''spaceship'' and the Doctor, a sentient, evolving AI hologram so advanced that even in Voyager's present they still don't fully understand him, by typing really fast on his computer. And for a follow-up, someone will hack an iPhone by vigorously waving around semaphore flags. He's using technology from the [=29th=] Century to assist him, [[ETGaveUsWiFi retrieved from a crashed timeship]], but that's a strike ''against'' him; [=29th=] century technology should have scrambled his brain.
* In ''Series/{{Supernatural}}'', Sam and Kevin can hack into almost any system when the plot demands it. In the episode [[Recap/SupernaturalS09E02DevilMayCare "Devil May Care" (S09, Ep02)]], Kevin hacks the military server obtaining private photos and personal information on a Sergeant with a couple of keystrokes.

to:

* In the ''Series/StarTrekVoyager'' episode "[[Recap/StarTrekVoyagerS3E8FuturesEnd Future's End]]", the ship is transported back to the 90s, 1990s, and the villain manages to hack ''Voyager'', the 24th-century OrganicTechnology ''spaceship'' and the Doctor, a sentient, evolving AI hologram so advanced that even in Voyager's present they still don't fully understand him, by typing really fast on his computer. And for a follow-up, someone will hack an iPhone by vigorously waving around semaphore flags. He's using technology from the [=29th=] Century to assist him, [[ETGaveUsWiFi retrieved from a crashed timeship]], but that's a strike ''against'' him; [=29th=] century technology should have scrambled his brain.
* In ''Series/{{Supernatural}}'', Sam and Kevin can hack into almost any system when the plot demands it. In the episode [[Recap/SupernaturalS09E02DevilMayCare "Devil "[[Recap/SupernaturalS09E02DevilMayCare Devil May Care" (S09, Ep02)]], Care]]", Kevin hacks the military server obtaining private photos and personal information on a Sergeant with a couple of keystrokes.



* ''[[Series/WonderWoman1975 Wonder Woman]]'': In "IRAC is Missing", Bernard Havitol steals IRAC by connecting a briefcase to the machine. Once complete, IRAC is in the briefcase and no longer in the massive tape machines, terminal, et al and there was no way to retrieve IRAC from backups or piece it back together. That Havitol had IRAC completely and utterly was the main plot of the episode.

to:

* ''[[Series/WonderWoman1975 Wonder Woman]]'': ''Series/WonderWoman1975'': In "IRAC is Missing", Bernard Havitol steals IRAC by connecting a briefcase to the machine. Once complete, IRAC is in the briefcase and no longer in the massive tape machines, terminal, et al and there was no way to retrieve IRAC from backups or piece it back together. That Havitol had IRAC completely and utterly was the main plot of the episode.



* In ''Series/{{Firefly}}'' episode "Trash," how do the tech-savvy crew hack the garbage disposal drones? They literally fly up underneath it, yank out the low-end computer slotted into the side of the garbage container, and upload a new destination. Since it's a) on the underside of a floating city miles from shore and b)... well, ''garbage'', the security on the computer is nonexistent anyway.

to:

* In ''Series/{{Firefly}}'' episode "Trash," "[[Recap/FireflyE11Trash Trash]]", how do the tech-savvy crew hack the garbage disposal drones? They literally fly up underneath it, yank out the low-end computer slotted into the side of the garbage container, and upload a new destination. Since it's a) on the underside of a floating city miles from shore and b)... well, ''garbage'', the security on the computer is nonexistent anyway.
Is there an issue? Send a MessageReason:
None


* ''Film/JurassicPark'' has an infamous scene where the kid hero exclaims "It's a UNIX system. I know this." over a screen of what appears to be zooming polygon nonsense. This program actually existed: it's a legitimate UNIX OS derivative from SGI called IRIX that was running a 3D file system navigator, but it never caught on due to being very slow and overly flashy. Then again, "overly flashy" describes half the equipment in the park, so that at least makes some sense why Hammond would insist on using such a system.

to:

* ''Film/JurassicPark'' ''Film/JurassicPark1993'' has an infamous scene where the kid hero exclaims "It's a UNIX system. I know this." over a screen of what appears to be zooming polygon nonsense. This program actually existed: it's a legitimate UNIX OS derivative from SGI called IRIX that was running a 3D file system navigator, but it never caught on due to being very slow and overly flashy. Then again, "overly flashy" describes half the equipment in the park, so that at least makes some sense why Hammond would insist on using such a system.
Is there an issue? Send a MessageReason:
Fix


Real hacking is boring. Hollywood ''hates'' boring ([[BoringButPractical sometimes]]). (But how many real-life hackers would want to be responsible for TheCSIEffect?) Instead of exploiting security flaws or using "social engineering" to [[TheCon convince an office worker you are doing a "routine password verification, you set up four computer monitors filled with coding language in a dark HackerCave and guide a little 3D version of yourself through a fiery onscreen maze that somehow represents the firewall, without forgetting to [[HackedByAPirate leave a Skull and Crossbones image that takes the entire screen of the hacked computer]]. Or you run a PasswordSlotMachine to decrypt the password digit by digit.

to:

Real hacking is boring. Hollywood ''hates'' boring ([[BoringButPractical sometimes]]). (But how many real-life hackers would want to be responsible for TheCSIEffect?) Instead of exploiting security flaws or using "social engineering" to [[TheCon convince an office worker you are doing a "routine password verification, verification"]], you set up four computer monitors filled with coding language in a dark HackerCave and guide a little 3D version of yourself through a fiery onscreen maze that somehow represents the firewall, without forgetting to [[HackedByAPirate leave a Skull and Crossbones image that takes the entire screen of the hacked computer]]. Or you run a PasswordSlotMachine to decrypt the password digit by digit.

Added: 327

Changed: 537

Is there an issue? Send a MessageReason:
Add trope


Real hacking is boring. Hollywood ''hates'' boring ([[BoringButPractical sometimes]]). (But how many real-life hackers would want to be responsible for TheCSIEffect?) Instead of exploiting security flaws, you guide a little 3D version of yourself through a fiery maze that somehow represents the firewall, without forgetting to [[HackedByAPirate leave a Skull and Crossbones image that takes the entire screen of the hacked computer]]. Or you run a PasswordSlotMachine to decrypt the password digit by digit. It's nothing like real hacking, although either way, you may have to use RapidFireTyping. That last part also means that any AI or robot that can directly interface with a computer is automatically the greatest hacker in the universe that can instantly take over any system no matter how secure because it doesn't need to type.

to:

Real hacking is boring. Hollywood ''hates'' boring ([[BoringButPractical sometimes]]). (But how many real-life hackers would want to be responsible for TheCSIEffect?) Instead of exploiting security flaws, flaws or using "social engineering" to [[TheCon convince an office worker you are doing a "routine password verification, you set up four computer monitors filled with coding language in a dark HackerCave and guide a little 3D version of yourself through a fiery onscreen maze that somehow represents the firewall, without forgetting to [[HackedByAPirate leave a Skull and Crossbones image that takes the entire screen of the hacked computer]]. Or you run a PasswordSlotMachine to decrypt the password digit by digit.

It's nothing like real hacking, although either way, you may have to use RapidFireTyping. That last part also means that any AI or robot that can directly interface with a computer is automatically the greatest hacker in the universe that can instantly take over any system no matter how secure because it doesn't need to type.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* In ''Manga/JoJosBizarreAdventureGoldenWind'', a mysterious assistant (who turns out to be [[spoiler:Jean-Pierre Polnareff]]) apparently put a tracker in the police's computer database, letting him access the computers of anyone who looks through criminal records. When the heroes do this in an attempt to find the Boss' identity, he dramatically takes over the laptop they were using, causing the windows to dramatically fly off the and images to pop up while his voice comes out through the speakers; this also lets him hear what the heroes are saying.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* In season 2 of [[Series/SiliconValley Silicon Valley]], resident cyber security expert Gilfoyle manages to log into Endframe's server because the CEO left a post it note with his login credentials in plain view, this is surprisingly common and often how people get hacked.
** This comes up again in the episode ''White Hat/Black Hat'' where Endframe fires the head of their IT department, Seth, because of Gilfoyle's actions. When Richard goes to Seth to apologize, he only ends up making things worse, leading to Seth threatening to [[PrecisionFStrike "skullf***k"]] their system. Later it appears Seth did hack their network and started deleting all their client's files at a fast rate that none of the protagonists could stop. Turns out, Seth never hacked their network and the files were being deleted because Russ accidentally placed a bottle of tequila over the "delete" key.
Is there an issue? Send a MessageReason:
None


* The ''Series/{{Sherlock}}'' episode, "The Reichenbach Fall": Moriarty wows everyone with a tiny application he claims has the power to hack basically anything on the planet. He demonstrates this app by simultaneously hacking the Tower of London, the Bank of England, and a major prison. [[spoiler:At the end, it's revealed he found people beforehand who had master privs to the locks at those locations and paid them gobs of money to help with his demonstration; all the app did was call them and tell them it was time.]]

to:

* The ''Series/{{Sherlock}}'' episode, "The episode "[[Recap/SherlockS02E03TheReichenbachFall The Reichenbach Fall": Fall]]", Moriarty wows everyone with a tiny application he claims has the power to hack basically anything on the planet. He demonstrates this app by simultaneously hacking the Tower of London, the Bank of England, and a major prison. [[spoiler:At the end, it's revealed he found people beforehand who had master privs to the locks at those locations and paid them gobs of money to help with his demonstration; all the app did was call them and tell them it was time.]]



* In ''Series/{{Sherlock}}''. Moriarty claims to have a master code that can hack any system and demonstrates it by simultaneously breaking in to the Tower of London, the Bank of England, and a high-security prison. [[spoiler: There's no such master code; Moriarty made it up. He accomplished all three break-ins with inside help.]]

to:

* In ''Series/{{Sherlock}}''. the ''Series/{{Sherlock}}'' episode "[[Recap/SherlockS02E03TheReichenbachFall The Reichenbach Fall]]", Moriarty claims to have a master code that can hack any system and demonstrates it by simultaneously breaking in to into the Tower of London, the Bank of England, and a high-security prison. [[spoiler: There's [[spoiler:There's no such master code; Moriarty made it up. He accomplished all three break-ins with inside help.]]

Changed: 181

Removed: 188

Is there an issue? Send a MessageReason:
None


* ''VideoGame/DreamfallTheLongestJourney'': Hacking is represented by a rather ludicrously simple matching-up-symbols game. This HackingMinigame is actually given an in-universe explanation: Olivia explains to Zoë that she is using software to
hack, and the software is designed so that it looks like a symbol-matching up game. This way, if someone walks by and sees Zoë's phone screen, it'll instead look like she's playing a game.

to:

* ''VideoGame/DreamfallTheLongestJourney'': Hacking is represented by a rather ludicrously simple matching-up-symbols game. This HackingMinigame is actually given an in-universe explanation: Olivia explains to Zoë that she is using software to
to hack, and the software is designed so that it looks like a symbol-matching up game. This way, if someone walks by and sees Zoë's phone screen, it'll instead just look like she's playing a game.
Is there an issue? Send a MessageReason:
None


* ''WesternAnimation/TheBadGuys'': This is Ms. Tarantula's specialty as TheCracker of the group. There's no attempt at making her hacking look realistic, given that the film takes many heist genre film conventions and [[PlayedForLaughs plays them for laughs]]. This is best epitomized in the truck chase, where she manages to not only hack the navigational systems of the trucks, but manages to get them to drive themselves back to the places they were stolen from.

to:

* ''WesternAnimation/TheBadGuys'': ''WesternAnimation/TheBadGuys2022'': This is Ms. Tarantula's specialty as TheCracker of the group. There's no attempt at making her hacking look realistic, given that the film takes many heist genre film conventions and [[PlayedForLaughs plays them for laughs]]. This is best epitomized in the truck chase, where she manages to not only hack the navigational systems of the trucks, but manages to get them to drive themselves back to the places they were stolen from.



* Averted by Nagato Yuki's hacking skills in ''LightNovel/HaruhiSuzumiya'' where she's hacking the back door the computer society uses to cheat the Day of Sagittarius with [[ShownTheirWork real code]]; lots of it. Although we don't see the original lines of code she used to hack their backdoor we do get glimpses of the code she uses to rewrite the game.

to:

* Averted by Nagato Yuki's hacking skills in ''LightNovel/HaruhiSuzumiya'' ''Literature/HaruhiSuzumiya'' where she's hacking the back door the computer society uses to cheat the Day of Sagittarius with [[ShownTheirWork real code]]; lots of it. Although we don't see the original lines of code she used to hack their backdoor we do get glimpses of the code she uses to rewrite the game.
Is there an issue? Send a MessageReason:
Rewrote my example of an exception.


* As Waynetech seems to have made much of the security equipment in the ''VideoGame/BatmanArkhamSeries'', Batman usually has little problem getting into secure areas, but there are exceptions to this:

to:

* As Despite Waynetech seems to have seemingly having made much of the security equipment in the ''VideoGame/BatmanArkhamSeries'', Batman usually has little problem problems getting into secure areas, but there are exceptions to this:areas until he receives the proper access codes:
Is there an issue? Send a MessageReason:
None

Added DiffLines:

* As Waynetech seems to have made much of the security equipment in the ''VideoGame/BatmanArkhamSeries'', Batman usually has little problem getting into secure areas, but there are exceptions to this:
** In ''VideoGame/BatmanArkhamAsylum'', Batman can't hack the consoles until he can read the codes from the Warden's keycard into his hacking device.
** In ''VideoGame/BatmanArkhamCity'', Batman downloads the access codes to Gotham's public buildings after [[spoiler:Penguin tries to trap him in the abandoned GCPD Forensics Lab building]], but the stronger-encrypted TYGER consoles are off limits to him until [[spoiler:he downloads a copy of the TYGER main control program during Protocol 10.]]
** In ''Videogame/BatmanArkhamKnight'', Batman can't hack the Arkham Knight's drones until [[spoiler:he obtains a part from a special drone]], but even then, all he can do is turn off their targeting sensors temporarily. And during Predator encounters, Batman cannot take control of drones unless he downloads the control codes directly from the drone controllers. He can also obtain a drone virus special weapon to use during Batmobile Tank encounters, but all the virus does is to overwrite the drones' IFF systems.
Is there an issue? Send a MessageReason:
Trope is NRLEP. If you want to dispute, take it to the real life section maintenance thread.



[[folder:Real Life]]
* The Evin prison hack in Iran demonstrates how a breached system can really look like a fantastic mess, with random [=BSODs=], screens flashing red, and messages taking up the entire screen. [[https://twitter.com/i/status/1430083273015840776 Watch it here.]]
* Another [[https://en.wikipedia.org/wiki/Stuxnet cyberattack targeting Iran]] used a smuggled USB to force industrial hardware (in this case, centrifuges for gas and nuclear operations) to tear itself apart.
[[/folder]]

Top