Dueling Hackers: Difference between revisions

m
Mass update links
m (fix broken external links)
m (Mass update links)
Line 1:
{{trope}}
[[File:dueling_hackers_6317.png|link=Bigger Than Cheeses|rightframe|That's Hollywood. Reality is [[Cut the Juice|simpler]].]]
 
Dueling hackers, combining the excitement of people typing with the thrill of network protocol loopholes being exploited.
Line 31:
** Also the scene where Dade tries to take over the TV studio. In reality, it's two robot arms trading a videotape. In Hollywood it's two titans meeting on the battlefield, if the kung fu clips interspersed with the robot arms and neat visual effects surrounding Dade's head are supposed to mean anything.
* [[James Bond]], ''[[Goldeneye (Film)|Goldeneye]]''. Has a world map where you can see how the tracing back of the hacker works (in Hollywood!).
** The backtracing map is trivial to implement (traceroute, GeoIP, Google Maps, whatever takes your fancy), its just that fancy [[Viewer -Friendly Interface|Viewer Friendly Interfaces]] tend to get in the way of most useful network administration or abusing activities.
** Also, [[Playful Hacker|Boris]] kills time by hacking into Western computers and taunting his opponents as they try to thwart him.
*** He even thinks of unplugging his computer in the end, when he gets hacked back. He doesn't just pull the cable out though, but rips out whole racks of gear and throws them on the floor.
Line 55:
*** Subverted when Gibbs unplugs the computer just as McGee and Abby are about to lose the computer.
* Kyle and Jessi do this in a second-season episode of ''[[Kyle XY]]''.
* A legendary duel occurs early in Season 7 of ''[[Twenty Four24 (TV)|Twenty Four]]'' between Chloe and Janis.
* During the Chairman arc of ''[[Walker Texas Ranger]]'', at one point the hacker working for the [[Big Bad]] and the one on Walker's team (who have some prior history between them) get into a duel while trying to crash Walker's plane and trying to save it respectively.
* In "[[Chuck]] Versus the Hack-Off", Chuck has to participate in the episode's titular "hack-off" (a competition where hackers have to outduel their competition) in order to get some dirt on the villain of the week.
Line 74:
 
== [[Real Life]] ==
* ''[http://en.[wikipedia.org/wiki/The_Cuckoo%27s_Egg_%28book%29:The Cuckoochr(27)s Egg chr(28)bookchr(29)|The Cuckoo's Egg]]'' is a first-hand account of real-life Dot Combat from 1986. Clifford Stoll was asked by his supervisor to find the cause of a $0.75 billing anomaly in the accounts; over ten months, he followed the trail from that, to a hacker who was breaching American military networks looking for information on the Nuclear and SDI programs and selling what he stole to the KGB.
** This story is notable for being the first properly documented case of computer hacking due to the fact that Cliff Stoll was an astronomer properly trained in documentation and with the sense of curiosity of a scientist as opposed to a computer person whose response was merely to lock out the user and forget about it(as was generally the case).
* Hackers from Taiwan and China have had actual hacking feuds going on. After all, why not try to hack your countries most likely enemy and get sympathy from your neighbors, rather then making them mad.
Line 83:
[[Category:Magical Computer]]
[[Category:Dueling Hackers]]
[[Category:Trope]]