|
I wonder if this is deliberate, like every phone number in movies is 555 . . .
|
|
|
|
|
I'll let that one go as a 555 issue. Could you imagine what would happen if they put a resolvable ip address on the screen? It would get destroyed.
|
|
|
|
|
RFC5737 specifies address ranges "for use solely in documentation and example source code".
There is also bigger range for testing - 198.18.0.0/15. This would do no harm.
And it is actually smarter than 555 because 555 is US-centric (for example 55 is a valid area code in Poland).
|
|
|
|
|
Well okay, sure. But how many producers do you think even know RFCs exist?
|
|
|
|
|
One phone number in the 555 exchange used to be valid until AT&T withdrew the service.
800-555-1212 was the number you called for long distance directory assistance.
|
|
|
|
|
I've voted for cracking passwords in seconds, but also there are three or four choices which annoy me equally.
Mislim, dakle jeo sam.
|
|
|
|
|
Agreed! This should be a multiple select poll.
My Favorite Quote is:
"Failure is the beginning of Success"
|
|
|
|
|
Or order them by how annoying you find them.
You'll never get very far if all you do is follow instructions.
|
|
|
|
|
All security systems can be cracked in under a minute. Usually by guessing a password.
most common occurance
|
|
|
|
|
Aarti Meswania wrote: Usually by guessing a password. ...from the title of a book near the terminal (see The Watchmen).
Psychosis at 10
Film at 11
Those who do not remember the past, are doomed to repeat it.
Those who do not remember the past, cannot build upon it.
|
|
|
|
|
|
*Software developers with eyeglass
*Downloading Progress-bars
*Command window
thatrajaCode converters | Education Needed
No thanks, I am all stocked up. - Luc Pattyn
When you're wrestling a gorilla, you don't stop when you're tired, you stop when the gorilla is - Henry Minute
|
|
|
|
|
Where is 'All of above' when we need it.
|
|
|
|
|
I kept reading and reading and wondering which one is worse than the other?? they are all just as bad the others and was surprised to not see an 'All of the above'.
guess I will just vote for them all.
|
|
|
|
|
great movie!
|
|
|
|
|
That would be the "Every computer can interface with every other computer seamlessly." option then, and I do mean every computer!
|
|
|
|
|
PedroMC wrote: and I do mean every computer! Of course, they all use binary, the universal computer language!
Psychosis at 10
Film at 11
Those who do not remember the past, are doomed to repeat it.
Those who do not remember the past, cannot build upon it.
|
|
|
|
|
Luckily the aliens had a Hayes compatible Modem.
|
|
|
|
|
The fact that you can do anything with a computer, access any data in any system. All you have to do is to sit down at the keyboard and type commands at a command prompt with the speed of light (without EVER making a speeling mistake)???
Anything that is unrelated to elephants is irrelephant Anonymous ----- The problem with quotes on the internet is that you can never tell if they're genuine Winston Churchill, 1944 ----- I'd just like a chance to prove that money can't make me happy. Me, all the time
|
|
|
|
|
The good guys need some data stored on some bad guys computer.
So they go in and hijack the computer like that can only be done in movies.
Then the data comes up... Stored in what seem to be tiny blocks on screen. Copying a piece of data makes a block disappear or appear empty. Of course all the datablocks together create the logo of the bad guys company.
Data depicted as tiny blocks? Come on...
|
|
|
|
|
Whoever can enter an alien ship and hack it using a laptop without WiFi is a DUDE!
http://www.imdb.com/title/tt0116629/[^]
(Saw this in a meme sometime back. But can't find it now.)
EDIT: BTW I think this vote should have been multiple options.
|
|
|
|
|
Some evil guy created some sort of system that needs to be cracked...
The good guy arrives and starts typing like mad.
Half a second after long lists of... whatever... start scrolling on the screen.
Two Seconds after he's being prompt for some sort of security
Another two seconds pass by (maybe 10 secs and a few head scratches tops!) he's in.
Now here's when 3D rotating things without any meaning appear
Still the guy keeps typing and manages to know exactly what to do, although in 99% of the cases he have never seen it before.
To end it all, and if the objective is to get some data out, the most secured server has always an usb port or a freaking fast way to bump the whole system out.
|
|
|
|
|
Quote: Everybody always know exactly what to do... ... even if they are 8 year olds in mortal danger (Velociraptors, for example).
It's a Unix system[^]
|
|
|
|
|
Well, maybe it's an inside job! And they choose not to make it appear on the movie so that that guy will be one of the good guys after.
Don't mind those people who say you're not HOT. At least you know you're COOL.
I'm not afraid of falling, I'm afraid of the sudden stop at the end of the fall! - Richard Andrew x64
|
|
|
|
|
Security systems are protected by multiple firewalls. There’s always an animation available showing the hacker how far he is. And there is always an exact countdown with the prediction when each protection will fail.
|
|
|
|