Schneier on Security
A blog covering security and security technology.
« Themes from the RSA Conference |
| The Keywords the DHS Is Using to Analyze Your Social Media Posts »
March 6, 2012
Comic: Movie Hacking vs. Real Hacking
Posted on March 6, 2012 at 6:20 AM
• 16 Comments
To receive these entries once a month by e-mail, sign up for the Crypto-Gram Newsletter.
ROTFL -- Thanks for that, Bruce.
The only words missing from the movie hacking action were "send spike". Or should that be "send Spike"? (I told you I was ill.)
Agh the security chain, don't you just love that soft squidgy weak link the human.
Be it sweet words or rubber hose,
that squidgy human link just goes.
Sometimes quick sometimes slow,
most often without a blow.
With credentials fresh and live,
the hacker does a dive.
Into the systems with fingers quick,
and motive to make managment sick.
Cause SEC filings they must make,
and watch their share price quake.
I started reading the comic, expecting something about how horribly wrong movies are.
I got something about how wrong movies are, but not in the tech fashion I was expecting. I'm surprised Hollywood hasn't caught on to this yet, because it's got to be far easier to get right (that is, make it so all the nerds of the world don't point out how it makes no sense whatsoever).
Hover the mouse on the red button at the bottom of the comic for more fun.
haha good spot
And then there's TV hacking, which is just like Movie hacking, except sometimes two hackers type on the same keyboard at the same time to hack twice as fast.
So true. Social attack is always easiest.
The difference between TV hacking and Movie hacking is that TV hacking only has 60 minutes to get it done.
(or 30 minutes if you work for "Contra Security".)
That's completely unrealistic! His name wouldn't be Robert, it would be Mallory.
"War Games" got this right: find the password to the school grades computer written on the blotter in the office; find the back door password for the military computer by researching the creator's personal life.
SMBC is full of win, good stuff
He could have saved time by simply rerouting the flux capacitor to the hydroelectric wave generator. Then bypass the DHS alarms by symbiotically transposing the cryptolysojargo network and then pulling the plug before the feds sniff the network with the post nasal ventricular paranormal mi-fi RHU-5000 machine. duh.
@ Frax -- LOL!
@ Lurker: that's because nobody would believe that it's that easy. It's what they call 'reality is unrealistic' :) Technobabble seems more realistic or plausible to an average viewer.
Most FAQ's I read on any product sound a lot like movie hacking jargondjango.
Jargon: the new language from BigYellowStar Systems.
Schneier.com is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc.