• Weirdfish@lemmy.world
      link
      fedilink
      arrow-up
      8
      arrow-down
      1
      ·
      1 year ago

      Why? Do people behave in an unrealistic manner? Like taking precautions, social distancing, wear masks, believing that its real?

  • kamen@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 year ago

    I think that most of the time even if they know what it would look like in the real world, movie creators intentionally make it look silly - I guess mostly for the entertainment value, or as kind of a joke in the lines of “let’s see how absurd we can make it before your grandma notices something’s not right”.

    • ddkman@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      I think also showing real attempts at cybercrime would have a real liability aspect

      • kamen@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        I doubt it, unless they show something very in depth about a fresh vulnerability on a real system - and even then there are usually months between shooting a TV show/movie and it hitting the screen.

  • Margot Robbie@lemm.ee
    link
    fedilink
    arrow-up
    8
    arrow-down
    1
    ·
    1 year ago

    As an actress, that’s nonsense, if hacking scenes in movies are fake, then how do you explain this documentary I watched where this hacker man hacked a kung fu fighting cop back in time to kill Hitler (and David Hasselhoff was there for some reason, too)?

    • SokathHisEyesOpen@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      I love how the smug manager thinks he’s thwarted the attack on the server since he unplugged the monitor to the terminal where people were defending against the attack.

    • Treczoks@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      I remember a scene of such a crime movie that was at least funny for people used to computers and progrmmers.

      The (old and seasoned) detectives were brought in contact with the new “cyber unit” of the police. Stored away in an otherwise empty office floor somewhere, they were the absolute movie style hackers: cluttered desks, sloppy outfit, beards. The old detectives were quite reluctant to work with those young “computer people” and had a lot of prejudices. Then, one of the detectives found a big red button on the desk and said “I wonder what happens when I press this button” - and presses it. And the “cyber guys”: “DON’T!”. The detective mocks them, and presses the button several times before he asks what the button actually does. Cyber guy: “That is our ‘order pizza’ button! I hope you’ve got enough money to pay for this…”. Cut. Next scene: They are all eating pizza together from a desk-high stack of pizza boxes.

    • ram@bookwormstory.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 year ago

      You know, I’ve seen this dozens of times but I’m just realizing, at least assuming that’s not a power bar (which would be odd since it matches the plug of the monitor or PC), since the monitor shut of straight away, he actually only unplugged the monitor. The PC should still be on and getting hacked.

      • Spzi@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        Yes, my favorite comment:

        pulls out the power cord for the monitor

        Job done!

        followed by:

        Attacker must have had 5 people on the keyboard.

    • HughJanus@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      1 year ago

      I am not a programmer by any means but I know enough to know they did their research.

      Except Tyrell called it “nome” instead of “g’nome” and I’m pretty sure TOR exit nodes can only see unencrypted data and the entry node can only see who sent it.

      • archon@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        1 year ago

        …is gnome meant to be read as ‘genome’? Never realised that was a possibility as a non-native English speaker. Always based it off the garden variety Gnome with a silent G.

        This is like sequel or ess-que-ell all over!

        • HughJanus@lemmy.ml
          link
          fedilink
          arrow-up
          3
          arrow-down
          1
          ·
          1 year ago

          is gnome meant to be read as ‘genome’?

          If we’re being pedantic, yes 🙂

          • SokathHisEyesOpen@lemmy.ml
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            1 year ago

            I’ve been using Gnome for 24 years and have only ever pronounced it like the thing you’d put on your lawn if you’re an old person in Florida. But I guess that’s what happens when you only ever read about a subject and never talk about it in person.

              • SokathHisEyesOpen@lemmy.ml
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 year ago

                I never actually had to pronounce it, but in my mind MySQL was “my squeal” for years and years. The first time I talked to another PHP programmer about it I said “my squeal”, and he did a double take, then said “hold on, what did you just say?”. Then we had a pretty good laugh about it after he corrected me.

  • Draconic NEO@lemmy.sdf.org
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    1 year ago

    Funnily enough I have to hide terminal windows when updating while I’m around any of my less tech savy friends who think it’s scary or creepy. I really dislike them portraying this as “hacking”.

  • chickenfish@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    1 year ago

    Ncis episode Tim traced ThE mOsT dAnGeRoUs HaCkEr iN tHe WoRlD to an internal 192.168.something. I do not remember how it was resolved because I was laughing too hard.
    (the whole two person keyboard thi g early in the series was an intentional gag, so it doesn’t count)

  • mrhh69@discuss.tchncs.de
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    I’m always so confused when I see a movie use scrolling C code in a terminal. Like where do they get it from?

  • Azzk1kr@feddit.nl
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    Don’t forget the ridiculous amount of beeping and other sounds when characters fly over the screen at twice the speed of light!

  • jetsetdorito@lemm.ee
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    sees them using Assembly

    okay this probably doesn’t make sense but I’m too lazy to prove it

    • gronjo45@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      I’d love it if they made a movie on Mel. The guy who coded a magnetic drum completely by hand.

      He’d memorized a gazillion opcodes and tuned the drum to do better even before compilers had been implemented. He just didn’t trust them so he refused to use the compiler lol

  • Sparking@lemm.ee
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    I thought the bash history in tron: legacy was kind of clever. There was stuff like vi last_will_and_testament.txt before the computer ducking command. I remember being surprised some prop designer knew enough about computers to set up that easter egg. Although I think I was reading that they contracted out the design of the OS to some team or something.