Murder 2.0, Microsoft's poor sponsorship and the hacking myth

Dessie 2021-12-24 08:01:49

The movie is not ugly. As far as the startling film is concerned, it is obviously not enough to be very exciting, but it is definitely not suitable for minors to watch. Although the plot will be attacked by people, it is mixed with a lot of network factors, so if it is not demanding, it should be acceptable.

Web-based Murder 2.0

now talks about 2.0 on the Internet , and this story is obviously a standard murder 2.0-the death rate of a life is determined by the number of website views. No matter how you look at this proposition, there is a taste of 2.0. From this point of view, screenwriters should be well versed in Internet media. However, if we delve into the essence behind the network halo, in fact, this kind of audience participation or even-led murder is nothing new on 1.0 TV, radio, and the Internet. Similar accusations and reflections, as well as various TV works, have long been common. As far as the Wenchuan earthquake has not yet fully become the past, some media reports and some people's unconsciously formed public opinion orientation, this kind of faint onlooker pleasure can no longer be described occasionally. Therefore, in the United States, where media functions are fully developed to an excessive degree, this kind of "bystander killing" has become a real social force, which is not so surprising.
But in the process of this kind of killing, who is more guilty? First of all, I don't think that the blame should be attributed to the Internet. This is the same reason that the same guilt cannot be attributed to TV, newspapers, and books. Otherwise, mankind can only fall completely in the darkness and ignorance of the Middle Ages. And all attempts to demonstrate the necessity and rationality of public opinion control based on this theory can also be completely ignored. People who believe in this kind of argument are either mentally disabled or have ulterior motives. Secondly, although all bystanders must bear the moral judgment, they should not bear the main culpability. Because one of the foundations of human existence lies in the widespread and persistent existence of curiosity. Therefore, in my opinion, those who want to make, post, and broadcast on newspapers, TV and the Internet, and let others watch the killing without responsibility, are the ones who should be blamed.
In the movie, when the FBI's Internet police were locked in a sulfuric acid pool, the head of Killwithme.com said to him innocently that if no one came to see the site, you would just sit in a pool of water. The implication is that all the responsibilities belong to those bystanders. But who designed all these traps, provided opportunities for all those who desire to watch, and connected the behavior of bystanders to the killing itself? These questions don't really need answers. Excluding the factor of extremes, in all the 1.0 and 2.0 media killings, the media itself is just a tool. Tools have no good and evil, and good and evil only lie in the person who uses the tools. Therefore, when more and more people begin to care about the impact of the new generation of network technology on human life, in fact, the real impact is still the struggle of people's hearts and desires. In this regard, there will be no changes in the past, present and future.

Microsoft's sponsorship is really bad. In

previous similar movies, the symbol of high-tech is generally Apple. This time, you can finally see Microsoft. Although a long time ago, in "True Lies", "Blue Sky and White Clouds" also showed a small face next to Schwarzenegger's figure, but compared with the sponsorship this time, the public relations department of Microsoft at that time was obviously too stingy. too much. However, the Windows Vista logo that flashes almost every ten minutes, coupled with the plot of the whole story, feels so weird. It seems that Vista is specifically designed to be used as a "broiler" for hackers-not only is the victim's computer killed by the hacker, but in the end even the FBI network police cannot escape the hacker's clutches. In a word, after watching a movie, you will absolutely believe that there is no safe computer in this world, especially the "damn" Vista. Perhaps this really confirms the "review" in some technical magazines. But I would rather believe that this is a mistake by Microsoft's public relations department. Just like the Chinese marketing department of BMW, Andy Lau was driving a BMW in "A World Without Thieves" while shouting loudly: "You think it is a good person who drives a good car!", and the audience below is still full. Cheers and applauds, it's the same.

The mythical hacker

To say that the things that make me laugh the most in the movie are the plots and descriptions of hackers. In fact, the director and screenwriter of this film can not be blamed. Basically, in all Hollywood movies, when it comes to the Internet, there must be a hacker who is the boss and the second. This time, the hacker can not only make a website that cannot be shut down, but also hack any device he wants to hack at will, from computers to cars to mobile phones. You don't even need to touch these devices, because they are said to be connected to the Internet.
This kind of sci-fi description is actually nothing great when the movie comes to entertainment. But if you really think that there is such a possibility of hackers and hacking certain computer equipment in this world, it is a bit outrageous. Basically, what a real hacker can do is actually very limited. Because even if you are connected to the Internet, if you want to hack into a specific computer, you need all kinds of prerequisites, saying it will make everyone completely confused. Not to mention how many networks are not interconnected at all. No matter how great a hacker is, it is impossible to hack a computer that is not connected to the Internet. Otherwise, he is not a hacker, but a fairy. Even now, every computer is online. As long as you pay attention when using it, most hackers can't help you. Of course, there is still a bit of knowledge about how to pay attention to it. However, don't go to those messy places, don't believe in any temptation information from the Internet, and take care of your personal information. If you don't talk and write everywhere, you can basically be regarded as paying attention to this point. If hackers come to hack you like this, you can only quickly review whether you really know something you shouldn't know.

View more about Untraceable reviews

Extended Reading

Untraceable quotes

  • Agent Jennifer Marsh: Listen to this, I'm running the logs from that mirror we took down, he's blocking all the foreign IPs, only Americans can gain access to the site.

    Agent Griffin Dowd: Oh, how patriotic.

  • Agent Jennifer Marsh: Username and password please?

    Agent Griffin Dowd: Coming to you... now. Chang's restaurant?

    Agent Jennifer Marsh: He hacked into their site?

    Agent Griffin Dowd: No. Half the office eats there. He's messing with us. He wanted us to find this. Who the hell is this guy?