1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

After studying 50 hacker movies spanning over five decades, a researcher at the Dublin Institute of Technology has aid that when it comes to portraying hackers, Hollywood usually gets it right. In most Hollywood movies, as in real life, hackers aren’t teenaged whiz-kids. They’re professionals, over 30 years old, who work in IT. “Generally they’re presented as good guys, not bad guys,” he said.

So why did the image of the teenage sociopath hacker stick in the public imagination? “There were a few really seminal movies that stuck in people’s minds that were slightly different,” Gordon said. “‘War Games’ is a perfect example.”

More from PC World:

In 1983’s “War Games,” Matthew Broderick plays a teenaged hacker who inadvertently brings the world to the brink of nuclear war after hacking into a military network.

“Once ‘War Games’ took off, that was a kind of bogeyman that the media hung onto,” he said. “Even though we know that most hacking is done by people who are sacked from their jobs who have the passwords.”

Panned by the critics, “Superman III” actually contains a pretty accurate portrayal of a hacker, Gordon said. In the movie, a character played by Richard Pryor, uses what’s known as “salami slicing” to skim thousands of dollars from his employer.”Computers rule the world today, and the fellow that can fool the computer can rule the world himself,” villain Robert Vaughn tells Pryor during the film. Last year, Michael Largent, a real-life criminal from Plumas Lake, California, was sentenced to 15 months in prison for pulling off a salami slicing scam.

In the past, researchers have looked at how Hollywood has presented science in the movies and found it lacking.

Similarly, Gordon has problems with the typical hacker movie. Filmmakers always want to jazz up the way that hacking software looks, and they often make it unrealistic. And hackers usually do what they want way too easily. “They will open every computer system or they’ll hack into anything,” he said.

Of the 60 hackers portrayed in his 50 movies, 44 of them (73 percent) the hackers were good guys. They were bad 17 percent of the time, and in-between 10 percent of the time. Only 20 percent of the hackers were students; 32 percent were computer industry professionals; 20 percent full-time hackers; and 20 percent came from other professions.

Gordon, a former computer programmer, started the research because he wanted to get a better idea of whether hacking movies would work as a teaching tool. But his love of hacking flicks dates back to childhood. “I blame my parents. When I was a child, the only movies we got to see were ‘Tron’ and ‘War Games’ and things like that,” he said. They were the kinds of movies I looked at as a child, and lo and behold when I grew up I did a degree in computer science.”

In the course of his work, Gordon discovered that hacking movies are older than most people realize.

The oldest movie cited in his study is 1968’s “Hot Millions,” starring Peter Ustinov. In the film Ustinov plays a criminal who uses social engineering techniques to impersonate a computer programmer and steal money, using a variety of fake identities.

Gordon nearly included “Desk Set,” a 1957 Spencer Tracy – Katherine Hepburn movie where Hepburn’s character discusses ways that she and her staff might destroy or hack into a computer system called EMILAC. But since they don’t actually do any hacking, the film didn’t make the cut.

Gordon’s five favorite hacking films, in alphabetical order, are:

*”Hot Millions” — ” A really excellent representation of how hacking goes.”

*”Independence Day” — “A Mac hacking into an alien operating system and loading a virus. That’s Steve Jobs’ dream: The power of the Mac”

*”Sneakers” — “You have to love Robert Redford.”

*”Tron” — A sentimental favorite, it was the first hacker movie he saw as a child. “Because Tron 2 is coming soon, that’s a source of great excitement.”

*”War Games” — “A big fun one… It will always be remembered as being very important.”

Source: PC World.


iPad demand better than early iPhone demand

IBM Develops New Algorithm For Fast Data Analysis
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On February 25, 2010(6 years, 7 months ago.)

You May Also Like:

What Do You Think?

1 Response

  1. Anonymous Says:

    I have to admit this article just social engineered every hacker into reading it expecting for monkey poo throwing to commence.

    The bad part is that now you have mixture of hormonal teenagers, hormonal parents, hormonal 30 year olds with a lot of unsatisfied hatemojo.

    Imma stay off the interwebs for a few hours.

    Posted on May 14th, 2011 at 4:05 PM

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

There is a high-risk XSS Vulnerability in W3 Total Cache, and we have got the guide to the fix for you.
Check out this tutorial to know how to install Apple watchOS 3 beta certificate on your Apple Watch and start enjoying the new version.
If you are trying to jailbreak iPhone, iPad or iPod on iOS 9.2 - 9.3.3 without using a computer or Apple ID, then check this video tutorial.
Pokemon Go users are complaining about the crashing and server issues. Check out the tutorial to solve error problems and thanks us later.
Turning off Wi-Fi Assist is a great way to save mobile data since it automatically starts using cellular data when Wi-Fi signal is poor .
If you want to secure your SIM card from others using it, then check out this tutorial to know how to set up the SIM Pin code on your iPhone.
CiderTV is a great alternative to control Apple TV from the Notification Center. Check out this tutorial to set up CiderTV on your iPhone.
Are you annoyed by the split screen mode on the iPhone 6 Plus or 6s Plus? Check out this quick tutorial to turn off split screen feature.
If you could not wait to installed the iOS 10 beta version on you iPhone and now struggling for the errors, then this tutorial is for you.
Siri might not understand the question you asked. But you can use Siri by editing the text that you asked & it will give an updated answer.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook