• We should now be fully online following an overnight outage. Apologies for any inconvenience, we do not expect there to be any further issues.

Unrealistic portrayals of the IT world that make you laugh

Page 4 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
Aug 23, 2000
15,509
1
81
Originally posted by: irishScott
Originally posted by: ISAslot
Shooting the computer to 'destroy' the data.

Well, bullets to hard-drives would make any data a b!tch to recover (assuming they emptied a mag into the right area), so it's not entirely off-base...

We proved this weekend that hand guns can not penetrate a hard drive. A Western Digital 40GB IDE drive stopped a .357mag. It didn't stop a 7.62x39 or a .223
 

Platypus

Lifer
Apr 26, 2001
31,046
321
136
Originally posted by: SoulAssassin
Originally posted by: Platypus
She didn't use nmap to shut it down, she used a known exploit in that version of nmap to gain a root shell.

that's what I was implying...I wasn't trying to say she used nmap itself to shut it down..sorry for the confusion/bad wording

gotcha, np
 

OutHouse

Lifer
Jun 5, 2000
36,410
616
126
Originally posted by: JeffreyLebowski
Originally posted by: irishScott
Originally posted by: ISAslot
Shooting the computer to 'destroy' the data.

Well, bullets to hard-drives would make any data a b!tch to recover (assuming they emptied a mag into the right area), so it's not entirely off-base...

We proved this weekend that hand guns can not penetrate a hard drive. A Western Digital 40GB IDE drive stopped a .357mag. It didn't stop a 7.62x39 or a .223

http://youtube.com/watch?v=Fa9rtBhlBC0 :D

im shooting the 7.7 jap my dad brought back from WWII, and the guy with the snubnose 38 was the other sys admin. we did this a few months ago.

enjoy
 

Savij

Diamond Member
Nov 12, 2001
4,233
0
71
Originally posted by: sdifox
Originally posted by: Nocturnal
For some reason if someone is portraying a hacker, the computer they're using always has 1s and 0s running in the background as though that actually happens in real life. I know it does under the hood but we never see that actually happening in the forefront.

That's because you didn't buy the l33t model.

That's what you guys say, but I did have have a metric asston of ones and zeros shitting up the screen when I was trying to debug our network stack.
 

Kelvrick

Lifer
Feb 14, 2001
18,422
5
81
Originally posted by: Citrix
Originally posted by: JeffreyLebowski
Originally posted by: irishScott
Originally posted by: ISAslot
Shooting the computer to 'destroy' the data.

Well, bullets to hard-drives would make any data a b!tch to recover (assuming they emptied a mag into the right area), so it's not entirely off-base...

We proved this weekend that hand guns can not penetrate a hard drive. A Western Digital 40GB IDE drive stopped a .357mag. It didn't stop a 7.62x39 or a .223

http://youtube.com/watch?v=Fa9rtBhlBC0 :D

im shooting the 7.7 jap my dad brought back from WWII, and the guy with the snubnose 38 was the other sys admin. we did this a few months ago.

enjoy


I'm.... going to have to test this with my own drive that doesn't work. It'll be going up against a 115gr 9mm fmj, 145gr .40 fmj, 180gr fmj and hp, .45 fmj and hp, 40gr .22lr solid point at 1135fps, 30gr copper coated solid point at 1750fps. If its still around, #4 buckshot 2 3/4.
 

Injury

Lifer
Jul 19, 2004
13,066
2
81
Originally posted by: randay
I couldnt stand the stuff they spewed in transformers.

Yeah, but it was still a lot more realistic than transforming robots from outer-space, so I can let it slide for movies like that.
 

arrfep

Platinum Member
Sep 7, 2006
2,314
16
81
Originally posted by: JeepinEd
Did everyone forget Independence Day?
Connecting a Mac to an alien network? Creating a virus that is compatible with said network's operating system?
It's hard enough getting a Mac to talk to a PC...

This seems like one of the biggest nitpicks with Independence Day. Yet the perfectly simple answer to this is that all of the technology they were using was stolen or adapted from the Alien tech that Area 51 had been studying for 50 years. A USB cable could connect to the alien ship because that's where USB technology came from. Perfectly logical explanation.
 
Aug 23, 2000
15,509
1
81
Originally posted by: arrfep
Originally posted by: JeepinEd
Did everyone forget Independence Day?
Connecting a Mac to an alien network? Creating a virus that is compatible with said network's operating system?
It's hard enough getting a Mac to talk to a PC...

This seems like one of the biggest nitpicks with Independence Day. Yet the perfectly simple answer to this is that all of the technology they were using was stolen or adapted from the Alien tech that Area 51 had been studying for 50 years. A USB cable could connect to the alien ship because that's where USB technology came from. Perfectly logical explanation.

Does that explain how a Dell laptop can connect to any computer system in the universe in Stargate?
 

waggy

No Lifer
Dec 14, 2000
68,143
10
81
Originally posted by: JeffreyLebowski
Originally posted by: arrfep
Originally posted by: JeepinEd
Did everyone forget Independence Day?
Connecting a Mac to an alien network? Creating a virus that is compatible with said network's operating system?
It's hard enough getting a Mac to talk to a PC...

This seems like one of the biggest nitpicks with Independence Day. Yet the perfectly simple answer to this is that all of the technology they were using was stolen or adapted from the Alien tech that Area 51 had been studying for 50 years. A USB cable could connect to the alien ship because that's where USB technology came from. Perfectly logical explanation.

Does that explain how a Dell laptop can connect to any computer system in the universe in Stargate?


DUH! they connect with a Universe Serial Bus!
 

sdifox

No Lifer
Sep 30, 2005
100,371
17,931
126
Originally posted by: Savij
Originally posted by: sdifox
Originally posted by: Nocturnal
For some reason if someone is portraying a hacker, the computer they're using always has 1s and 0s running in the background as though that actually happens in real life. I know it does under the hood but we never see that actually happening in the forefront.

That's because you didn't buy the l33t model.

That's what you guys say, but I did have have a metric asston of ones and zeros shitting up the screen when I was trying to debug our network stack.

perhaps you had to choose the right background?
 

ItsOnlyMe

Junior Member
May 24, 2007
11
0
0
25 interesting things that you learn about computers in the
movies...

1. Word processors never display a cursor.

2. You never have to use the spacebar when typing long sentences.

3. All monitors display 2 inch high letters.

4. High-tech computers, such as those used by NASA, the CIA, or
some such governmental institution, have easy-to-understand graphical
interfaces.

5. Those that don't will have incredibly powerful text-based command
shells that can correctly understand and execute commands typed in
plain English.

6. Corollary: You can gain access to any information you want by
simply typing "ACCESS ALL OF THE SECRET FILES" on any keyboard.

7. Likewise, you can infect a computer with a destructive virus by
simply typing "UPLOAD VIRUS." Viruses cause temperatures in
computers, just like they do in humans. After a while, smoke
billows out of disk drives and monitors.

8. All computers are connected. You can access the information on
the villain's desktop computer, even if it's turned off.

9. Powerful computers beep whenever you press a key or whenever the
screen changes. Some computers also slow down the output on the
screen so that it doesn't go faster than you can read. The *really*
advanced ones also emulate the sound of a dot-matrix printer as the
characters come across the screen.

10. All computer panels have thousands of volts and flash pots just
underneath the surface. Malfunctions are indicated by a bright
flash, a puff of smoke, a shower of sparks, and an explosion that
forces you backward. See _7, above)

11. People typing away on a computer will turn it off without saving
the data.

12. A hacker can get into the most sensitive computer in the world
before intermission and guess the secret password in two tries.

13. Any PERMISSION DENIED has an OVERRIDE function.

14. Complex calculations and loading of huge amounts of data will be
accomplished in under three seconds. In the movies, modems transmit
data at ten gigabytes per second.

15. When the power plant/missile site/whatever overheats, all the
control panels will explode, as will the entire building.

16. If you display a file on the screen and someone deletes the
file, it also disappears from the screen. There are no ways to copy a
backup file-and there are no undelete utilities.

17. If a disk has got encrypted files, you are automatically asked
for a password when you try to access it.

18. No matter what kind of computer disk it is, it'll be readable
by any system you put it into. All application software is usable by
all computer platforms.

19. The more high-tech the equipment, the more buttons it has.
However, everyone must have been highly trained, because the buttons
aren't labelled.

20. Most computers, no matter how small, have reality-defying
three-dimensional, real-time, photo-realistic animated graphics
capability.

21. Laptops, for some strange reason, always seem to have amazing
real-time video phone capabilities and the performance of a CRAY- MP.

22. Whenever a character looks at a VDU, the image is so bright
that it projects itself onto his/her face.

23. Computers never crash during key, high-intensity activities.
Humans operating computers never make mistakes under stress.

24. Programs are fiendishly perfect and never have bugs that slow
down users.

25. Any photograph can have minute details pulled out of it. You can
zoom into any picture as far as you want to. For example: "What's
that fuzzy thing in the corner? I don't know, let's check. Ok, I
just need to do a little enhancement. Yes, wow! The clue we needed!
(yadda yadda)"
 
Jun 14, 2003
10,442
0
0
ncis, csi those types of shows where its just blatant BS with pretty graphics



oh an in transformers where government techs using an already "yeah right" piece of computer software who obviously cant crack the code with it being alien and never seen before yet the blonde girl takes it to her fat friend who still lives in his moms house playing DDR,(on a memory stick as well) and he can magically read into the file, bring up lots of 3d transformer icon wingdings and pull out a file name in about 3 seconds.

man and computer > US governmnet, highly educated computer techs and millions in computer hardware and software. what a joke.
 
Jun 14, 2003
10,442
0
0
Originally posted by: jandrews
or when someone is opening an image or doing anything with a computer they are typing on the keyboard like the keyboard is going out of style, they are clicking and typing like the boat is going down lmao

:laugh:

hahah for some reason that last bit about the boat going down really made me laugh