Comic: Movie Hacking vs. Real Hacking

Funny.

Posted on March 6, 2012 at 6:20 AM • 16 Comments

Comments

Brent LongboroughMarch 6, 2012 6:37 AM

ROTFL -- Thanks for that, Bruce.

The only words missing from the movie hacking action were "send spike". Or should that be "send Spike"? (I told you I was ill.)

Clive RobinsonMarch 6, 2012 7:58 AM

Agh the security chain, don't you just love that soft squidgy weak link the human.

Be it sweet words or rubber hose,
that squidgy human link just goes.

Sometimes quick sometimes slow,
most often without a blow.

With credentials fresh and live,
the hacker does a dive.

Into the systems with fingers quick,
and motive to make managment sick.

Cause SEC filings they must make,
and watch their share price quake.

LurkerMarch 6, 2012 8:06 AM

I started reading the comic, expecting something about how horribly wrong movies are.

I got something about how wrong movies are, but not in the tech fashion I was expecting. I'm surprised Hollywood hasn't caught on to this yet, because it's got to be far easier to get right (that is, make it so all the nerds of the world don't point out how it makes no sense whatsoever).

FraxMarch 6, 2012 8:45 AM

And then there's TV hacking, which is just like Movie hacking, except sometimes two hackers type on the same keyboard at the same time to hack twice as fast.

ADMarch 6, 2012 9:43 AM

The difference between TV hacking and Movie hacking is that TV hacking only has 60 minutes to get it done.

(or 30 minutes if you work for "Contra Security".)

Mike BMarch 6, 2012 9:48 AM

That's completely unrealistic! His name wouldn't be Robert, it would be Mallory.

Jordan BrownMarch 6, 2012 9:50 AM

"War Games" got this right: find the password to the school grades computer written on the blotter in the office; find the back door password for the military computer by researching the creator's personal life.

onearmedspartanMarch 6, 2012 11:46 PM

He could have saved time by simply rerouting the flux capacitor to the hydroelectric wave generator. Then bypass the DHS alarms by symbiotically transposing the cryptolysojargo network and then pulling the plug before the feds sniff the network with the post nasal ventricular paranormal mi-fi RHU-5000 machine. duh.

@ Frax -- LOL!

SejanusMarch 7, 2012 1:36 AM

@ Lurker: that's because nobody would believe that it's that easy. It's what they call 'reality is unrealistic' :) Technobabble seems more realistic or plausible to an average viewer.

meMarch 7, 2012 5:52 AM

Most FAQ's I read on any product sound a lot like movie hacking jargondjango.

Jargon: the new language from BigYellowStar Systems.

Leave a comment

Allowed HTML: <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre>

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..