Jump to content

Dueling Hackers: Difference between revisions

update links
No edit summary
(update links)
Line 30:
* Part of the climax of ''[[Hackers]]''.
** Also the scene where Dade tries to take over the TV studio. In reality, it's two robot arms trading a videotape. In Hollywood it's two titans meeting on the battlefield, if the kung fu clips interspersed with the robot arms and neat visual effects surrounding Dade's head are supposed to mean anything.
* [[James Bond]], ''[[GoldeneyeGoldenEye (film)|GoldenEye]]''. Has a world map where you can see how the tracing back of the hacker works (in Hollywood!).
** The backtracing map is trivial to implement (traceroute, GeoIP, Google Maps, whatever takes your fancy), its just that fancy [[Viewer-Friendly Interface|Viewer Friendly Interfaces]] tend to get in the way of most useful network administration or abusing activities.
** Also, [[Playful Hacker|Boris]] kills time by hacking into Western computers and taunting his opponents as they try to thwart him.
Line 57:
* A legendary duel occurs early in Season 7 of ''[[24|Twenty Four]]'' between Chloe and Janis.
* During the Chairman arc of ''[[Walker, Texas Ranger]]'', at one point the hacker working for the [[Big Bad]] and the one on Walker's team (who have some prior history between them) get into a duel while trying to crash Walker's plane and trying to save it respectively.
* In "[[Chuck]] Versus the Hack-Off", Chuck has to participate in the episode's titular "hack-off" (a competition where hackers have to outduel their competition) in order to get some dirt on the villain of the week.
* Kind of the point of CSI: Cyber seeing as it focuses on an elite FBI Cyberwar team.
 
Line 76:
== [[Real Life]] ==
* ''[[wikipedia:The Cuckoochr(27)s Egg (book)|The Cuckoo's Egg]]'' is a first-hand account of real-life Dot Combat from 1986. Clifford Stoll was asked by his supervisor to find the cause of a $0.75 billing anomaly in the accounts; over ten months, he followed the trail from that, to a hacker who was breaching American military networks looking for information on the Nuclear and SDI programs and selling what he stole to the KGB.
** This story is notable for being the first properly documented case of computer hacking due to the fact that Cliff Stoll was an astronomer properly trained in documentation and with the sense of curiosity of a scientist as opposed to a computer person whose response was merely to lock out the user and forget about it(as was generally the case).
* Hackers from Taiwan and China have had actual hacking feuds going on. After all, why not try to hack your countries most likely enemy and get sympathy from your neighbors, rather then making them mad.
 
Line 83:
[[Category:Cyberpunk Tropes]]
[[Category:Magical Computer]]
[[Category:Dueling Hackers{{PAGENAME}}]]
Cookies help us deliver our services. By using our services, you agree to our use of cookies.