• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

anyone see s1m0ne? *rant*

DJFuji

Diamond Member
...and laugh at the computer-related atrocities they try to pull? in a few months Al Pacino goes from a self proclaimed "but i don't know anything about computers" to a "i can program complex 3d models with artificial intelligence."

**warning: spoilers below






Then, when he tries to destroy the program, he puts a 5.25" disk in his "state of the art computer" with the label "plague 8.0". Jesus christ, Plague 8.0?? why didn't he just put in "computer virus 2.05"???

So then, of course, the "virus" infects the machine automatically and magically disolves the pixels of simone's face. How nice. Sort of reminds me of Blade II's ending.

And then when his daughter "recovers" his files. She must know something we don't because i've never seen someone hit three keys on the keyboard that automatically retrieve data from formatted hard drives, reassmeble all the partition information, and magically reassemble the pixels of the last program you were working with. I need to learn that trick. And I thought it was bad when they hacked using 3d models in swordfish.

Ugh.
 
I thought it was pretty cool.

But gimme a friggin' break; if you're looking for realism you should have known you wouldn't find it.
 
I thought it was fun, but you're absolutely right. There are some pretty cheesy parts. The girl is hot though. Even eating out of the trough.:camera:
 
Originally posted by: brigden
I thought it was pretty cool.

But gimme a friggin' break; if you're looking for realism you should have known you wouldn't find it.

it was a cool movie, and no i wasn't looking for realism. But cmon now. Even computer illiterate people know that you don't go from "what's a mouse" to "i like to program 3d models with AI in my spare time" in a couple of months. I'm not asking for much but they could have tried to make it a LITTLE realistic.
 
I thogutt this movie rocked! Even though it sucked technology wise, ( did you see the 5.5 inch floppy on the PC? 😀 )

The reason I loved it was becasue it made the point that people/society and hollywood is fake and superficial. I hate it when young people look in those magazines ( like my sister ) and see some photoshopped pic of some hot actress and then they have to buy that product. Ugh, drives me nuts. I can't tell you how many times my sister has just had to have that one product.
rolleye.gif
 
Have you seen any movies with realistic hackers? The answer is probably "no". Hacking has to be made interesting for the general public, because in real life most people wouldn't understand what is going on.

Ryan
 
all movies suck, its all been done

gotta love the superficial movies done by superficial people about how superficial society has become.:light:
 
Originally posted by: rgwalt
Have you seen any movies with realistic hackers? The answer is probably "no". Hacking has to be made interesting for the general public, because in real life most people wouldn't understand what is going on.

Ryan

? who said anything about hackers?

anyone else notice something weird about that hard drive-looking thingee "hank" gave al pacino at the beginning of the movie? Didn't it look exactly like an exposed hdd that he inserted into some tray on the front of the computer? Is that some real hardware device i'm not aware of, or is it BS?
 
You people don't know the first thing about hacking.

Rule #1 is that you ALWAYS store your nasties on antiquated equipment. It's the last place anyone would look for chrissake.

And what do you mean no data recovery in 3 keystrokes? The new Linux kernel adds that feature.

3d models are integral to all hacking. They allow you to completely bypass any security locally on the computer by signal jumping from the PCI bus to the AGP bus by way of EMI (Or even without jumping if they have PCI video) and carrying out all your malicious operations from VRAM using the VPU to feed false data back to the CPU. This is also why sometimes when a machine is being hacked, you'll see things happen like the monitor shut off or turn to static. It's an unfortunate side effect of your software taking up residence in the wrong portion of the VRAM.
 
The best part is when the little girl ejects the virus 5.24" and it pops out from the crack between drive bay covers
 
Originally posted by: Gunbuster
The best part is when the little girl ejects the virus 5.24" and it pops out from the crack between drive bay covers

lol i didn't pick that up.
 
Originally posted by: EyeMWing
You people don't know the first thing about hacking.

Rule #1 is that you ALWAYS store your nasties on antiquated equipment. It's the last place anyone would look for chrissake.

And what do you mean no data recovery in 3 keystrokes? The new Linux kernel adds that feature.

3d models are integral to all hacking. They allow you to completely bypass any security locally on the computer by signal jumping from the PCI bus to the AGP bus by way of EMI (Or even without jumping if they have PCI video) and carrying out all your malicious operations from VRAM using the VPU to feed false data back to the CPU. This is also why sometimes when a machine is being hacked, you'll see things happen like the monitor shut off or turn to static. It's an unfortunate side effect of your software taking up residence in the wrong portion of the VRAM.

lol...you almost made that sound legit.
 
Originally posted by: rgwalt
Have you seen any movies with realistic hackers? The answer is probably "no". Hacking has to be made interesting for the general public, because in real life most people wouldn't understand what is going on.

Ryan

The Matrix. 😀
 
Originally posted by: DJ Fuji
Originally posted by: EyeMWing
You people don't know the first thing about hacking.

Rule #1 is that you ALWAYS store your nasties on antiquated equipment. It's the last place anyone would look for chrissake.

And what do you mean no data recovery in 3 keystrokes? The new Linux kernel adds that feature.

3d models are integral to all hacking. They allow you to completely bypass any security locally on the computer by signal jumping from the PCI bus to the AGP bus by way of EMI (Or even without jumping if they have PCI video) and carrying out all your malicious operations from VRAM using the VPU to feed false data back to the CPU. This is also why sometimes when a machine is being hacked, you'll see things happen like the monitor shut off or turn to static. It's an unfortunate side effect of your software taking up residence in the wrong portion of the VRAM.

lol...you almost made that sound legit.

Then you are who these movie are made for. 😉
 
Back
Top