K
K
kuzubov2012-01-25 23:32:27
Burglary protection
kuzubov, 2012-01-25 23:32:27

Hackers in movies - how much is true?

Every day, films and series are released on the screens where hackers, smart to disgrace and usually cowardly in life, break other people's computers. They're invading the Pentagon and the CIA. They break the security systems of banks and stop elevators on demand in any buildings. They are the heroes of the digital front, cloning phones without even touching them and deciphering codes of any complexity ... Phew, I’m already sweating, imagining what such people can do to me right now - steal my money from my account and steal my identity. And in the end they will add me to the list of the most wanted criminals of Interpol ...

Tell me, smart people, but how true is all this? ) Of course, I don’t understand much about security systems - but I think the shields with wires for connecting computers are not locked with a lock from the mailbox and are not left on the roof or even the wall of the house from the outside. Yes, and sites, as far as I understand, are even difficult to break - only if the owners forgot to close all the holes that have already been published and patched.

In short - what is possible and what is impossible from what is shown in movies?

Answer the question

In order to leave comments, you need to log in

12 answer(s)
E
Eternalko, 2012-01-26
@Eternalko

Why so difficult? Someone needs to hack a site like mail.ru. Do you think someone will bother and spend a lot of money to break the server? It's easier to find an admin. And he's also human. He wants to live and he wants to eat too.
The simpler the more effective.
For example, how much torture do you know? Everyone can probably come up with a million and I don't even want to know them.
And the most effective is a simple deprivation of air. Lower into the water or shut off the oxygen by wearing a gas mask.
The simpler the more efficient.

E
Evengard, 2012-01-26
@Evengard

habrahabr.ru/blogs/humour/136610/
I think everything is clear after that)

A
aristotle, 2012-01-26
@aristotle

www.pcweek.ru/security/article/detail.php?ID=131241
Not a bad interview, in my opinion, about the realities of today's hackers.

O
Ocelot, 2012-01-26
@Ocelot

In films, burglary scenes are required to be spectacular, not authentic. The most plausible thing I've seen is the use of nmap in the second "Matrix", the rest is pure fiction and props. But this is not surprising. Often there is a scene where a hacker hacked into the system (the network of a bank, the Pentagon, a galactic starship), and the admins run around and shout “Ahh! There's nothing we can do, he's blocked everything!" This is where it gets funny.

G
gro, 2012-03-30
@gro

FBI agents in films - how much is true?
Crazy scientists in movies - how much is true?
A simple Brazilian family in the series - how much is true?

J
javax, 2012-01-26
@javax

Read about Mitnick on Wikipedia :)
The simplest thing is social engineering - guess the password (if it is simple), find a piece of paper with the password near the computer, phishing, etc.

K
Kirill Mamaev, 2012-01-26
@r00tGER

And I also like it when a bomb (absolutely any) can be neutralized by cutting the wire of the desired color.
I understand that somewhere there is a manual according to which all bombs on earth are assembled, and all manufacturers must adhere to it. And even malicious bandits and terrorists.
And I also like CSI forensic equipment, it can really do amazing things. For example, you can take a very bad photo, increase the reflection in the pupil, increase the reflection on the bumper of the car in this reflection, and already somewhere there you can see the fingerprint of the suspect, and even conduct a DNA analysis.

I
Ivan Tikhonov, 2012-01-26
@polym0rph

So, point by point:
You’ll break our horseradish elevators, you need a crowbar here, not a laptop)
It’s impossible to invade someone else’s life and rewrite everything in our realities, it’s all there in computers, and we are guarded by specially trained aunts in paper form in the passport table , o / m, tax, etc. Have you talked to these ladies? Voooot, they are specially trained in this way, the enemy will not pass)
And so on, you will steal our secrets (I remembered - Our domestic secret microprocessor has 16 legs. And two handles - for carrying.)
There is almost only props in the films, recently in the habrahumor there was a post about an excerpt from the series Mukhtar, or whatever it is, very revealing. Sometimes there are moments in films that are possible under certain circumstances, but most often they break the pentagon there with the ping 127.0.0.1 command, so filter well what is shown to you. In real life, no one will connect the server that controls the nuclear reactor at a nuclear power plant (already a slight smile) to the Internet and make a website on it, hacking which a hacker in real time gets all control in a graphical interface (here it is already allowed to laugh out loud)

V
Vladimir Chernyshev, 2012-04-01
@VolCh

Most of all I like the selection of passwords character by character. Moreover, as a rule, a sequential selection, and all the characters are sort of sorted out in parallel, but the last one is still a few minutes.
Although I remember I once met a BIOS in which I picked up the password character by character. He wrote Invalid password as soon as he pressed the wrong key :)

E
EndUser, 2012-01-26
@EndUser

mc.com.ua/article/hitech/894

L
Leonid, 2012-01-26
@volhovec

The fact that in the cinema and the thin liter is mostly fantasy.
There was a good book series - the Encyclopedia of Crimes and Disasters, and it included one volume - Computer Crimes. Very informative about real cases.
I advise you to read - if you are interested in the question.

I
Ivan Zhuravlev, 2012-04-01
@InteractiveTechnology

C'mon, if you wish, you can ruin a person's life in other ways, the question is that everything shown in the cinema was deliberately created for effects - the people should haw, even if there is no point at all.
And to substitute a person via the Internet is as easy as shelling pears, all life now depends on money so much that it is enough to change only this variable and drive a person into fantastic debts, after that you definitely won’t want to live. And by the way, take the same credit cards out, it’s for you that someone just stole her number, and more than a dozen people will work to get money from the card, and some of them even with a computer be at the user level, and some may be top bank managers. So there are two conclusions here, in a movie show, but you can't trust anyone, not even yourself;)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question