Hack the movie-pure technical interpretation of the film

Dangelo 2022-02-11 08:03:05

This film is a long time ago, and it was accidentally turned over when renting the disc. Every time I think about it, I have endless aftertastes. This is a film worthy of fun. Although the theme itself does not have any depth at all, it is only a commercial entertainment film. But some of the technical things involved in it show that the director is serious about making the film. Unlike some domestic hacker films, the technical details are all silly. Of course most people don't like this film, but as someone always said: If you feel boring, it's because you don't know enough.


The book that the protagonist discussed when they met in the bar:
Green Book--International UNIX Environment;
this name itself has problems, it is estimated to be "X/Open Compatibility Guide", this book is also called Green Book, and it is based on the book POSIX defines an international standard UNIX environment (an international standard Unix environment)

Orange Book--Computer Security Criteria;
it should refer to the "Trusted Computer System Evaluation Criteria", which is commonly referred to as the "Orange Book", which is the U.S. government Developed computer security standards.

Pink Book--IBM PC Guide;
This is explained in the film, it is the Pink Shirt Book (because there is a guy on the cover wearing a pink shirt). "Pink Shirt Book" is "Programmer's Guide to the IBM PC" written by Peter Norton. This book should be relatively classic. Although it is rare in China, many materials refer to this book. The book introduced the hardware of the PC architecture and BIOS programming in detail. In those days, you could only rely on reading the source code to understand these aspects, and the birth of this book solved the problems of most people.

Devil Book--UNIX Bible;
originally refers to a book that explains the usage of UNIX commands in detail, and now many books use this name...

Dragon Book--Compiler Design;
um~Long book seems to be well-known at any time and any corner, Even the director knows that Long Shu talks about compilers. If this is all wrong, then this film will not be shot.

Red Book--A NASA Trusted Network. -_-b Have never heard of this book, either from internal information or fabricated.

Regarding the most commonly used passwords mentioned in the film: LOVE, SECRET, and SEX are
actually taken from the 10 most commonly used passwords:
"* (the asterisk), god, love, lust, money, private, qwerty (this is so cool, You can lose the password with a light wave of your hand. If you don’t believe me, try it), secret, sex, snoopy, & (I didn’t expect this), password (-_-b...)
As for the favorite password of male programmers "GOD" "On the one hand, it is the director’s plot arrangement needs. On the other hand, it may also insinuate that most male programmers regard themselves as the gods

in the computer world. In the film, there is a dialogue in which a guy brags that he attacked the bank server the night before. , The next day the terminal came out and the money came out, so someone told him that your little technology is a bunch of shit, and to be a real hacker, you must at least attack Gibson... so attacking Gibson became the main line of the story.
What's interesting is that the phrase "Hack the Gibson" is used to attack others in American language. For example, if someone is very good and says that he attacked NASA's server yesterday, he can use hack the gibson to ridicule him, which is used by hackers. Phrase. Example: Brian thought he was totally hacking the Gibson but ended up formatting his hard drive instead. The
so-called Gibson is a fantasy supercomputer. The name "Gibson" is named after the father of science fiction, William Gibson.

Note that when the protagonist is talking about how to attack the Gibson supercomputer in the bar, the camera suddenly switches to Angelina Jolie's attack (of course she didn't release her face at this time), we found that she was attacking ARCNET. But there was a scene before that showed a lot of files such as .exe, .doc, .386, which may make some viewers wonder-what is ARCNET? If Julie is attacking a web server, how can you use windows?
In fact, ARCnet (Attached Resource Computer NETwork) is not a website, but a LAN protocol, which is really unfamiliar to users in our country, because the LAN protocol we generally use now is the Ethernet Protocol (Ethernet Protocol) . ARCnet is a microcomputer local area network protocol used mainly in the United States in the 1980s. It was originally used for cluster computing. This echoes the previous discussion of attacking Gibson by the protagonist, because the Gibson supercomputer uses clusters for physical and oil survey calculations (explained in the film, of course it is fabricated). This shows that Julie also intends to "Hack the Gibson"~^_^
Now back to the question just now, why is the file name of windows displayed in Gibson? Actually, I didn’t understand this problem. In the end, when the protagonist cracked Gibson, the display was exactly like Microsoft's debug...-_-b, I can only say that the director was mocking windows...

when the protagonist attacked. After the supercomputer was discovered by the administrator, the administrator called Daniel. When Daniel answered the phone, he was sleeping, and a blanket covered his whole body. This is probably a spoof shot. I programmed all night and was exhausted. A blanket covering his whole body and sleeping on a rocking chair is a classic anecdote of Gates back then~

the guy who covered his face with a wizard hat at first made him look like a KKK. First of all, he is definitely not a KKK, because he It's a black ^_^, I don't know if the KKK was secretly spoofed here. In fact, he imitated Saint Nikon (note that it is not a Nikon camera!). Saint Nikon is a preacher of the Greek Orthodox Church. One of his favorite words when preaching is "repentance." Adding such a role to their Hacker squad for the protagonist may also be some kind of kind advice from the director for the naughty talented teenagers ~ The

protagonist’s favorite TV show: Hack the Planet, the host opens with a well-known drink Made an advertisement: Jolt Cola. In fact, I think this is definitely not because of the sponsorship of this drink. The key problem is that this is a metaphor-the Jolt award is called the Oscar of the software industry. Regarding the Jolt Award, it only takes one sentence to explain: “A technical product can only become the mainstream of the industry after it has won the Jolt Award, and a technical book can only truly establish its classic status after it has won the Jolt Award.” The show hosted by these two crazy hosts is similar to an underground Hacker assessment of the Jolt Awards. By the way, the next free phone device they promoted alludes to the free phone system created by Apple founder Jobs and his brother Wozniak in 1975-Blue Box. Of course, Kevin Mitnick, the king of hackers, is said to have done something similar, but compared to the fact that he used a modified radio to connect to the Internet in prison, this little gadget is really not a problem.

The computer guy in the villain likes to eat chocolate, this... I don’t know who to insinuate specifically, Stallman? ? Jobs? ? God of Gamblers advances? !

Daniel used the protagonists to invade Gibson and forged a virus to blame them. The virus is a metaphor for Leonardo’s Trinity. In fact, Leonardo da Vinci was the first person who could be called Hacker. He went deep into all the fields he was interested in and explored the essence. This is the most basic quality of Hacker. If a person's research in the field only stays at the surface things of attacking, cracking, and sabotaging, he can't become a real Hacker. If someone is confused on this issue, they might as well learn from Leonardo. Perhaps this is also the purpose of the director who arranged this metaphor for the protagonist.


Julie's computer is very high-end, 28.8kbps modem (this is estimated to be able to feel the power of players in the mid to late 90s), and the so-called Active Matrix Driven Color LCD (essentially the TFT screen that has just begun to be fully popular now). Based on the long history of the filming and the narrative period of the late 80s and early 90s, the ultra-small notebooks configured in this way should be very valuable back then. But I have to point out a technical flaw here. The film says that the notebook uses a P6 processor, which is 3 times faster than the Pentium. In fact, the speed of the processor should at least increase exponentially, and it is unlikely that the speed difference between the 6th generation processors is only 3 times. Afterwards, the protagonist said that this is not only because it also uses the PCI bus. Well, before 1995, the PCI bus is really good, but if you follow the above lines, it will be too bad with P6... Julie Then, the RISC framework will change everything. Is this a satire of X86? ? "RISC's good." Hmm~ I think so too...

The FBI NCIC (National Crime Information Center) mentioned in the film is said to have recorded all the information of 20 million American citizens. The evil Daniel invaded the server and modified the information of the protagonists to turn them into wanted criminals. . I heard that Lao Mei is wanted for criminals based on the criminal record in NCIC. If there is a criminal record in NCIC, the computer will automatically issue a wanted warrant to all relevant departments. Indeed...it is very efficient to catch criminals this way, but if it is hacked or the machine malfunctions...it will be a big trouble. Of course, this is a movie. Generally speaking, this possibility is extremely small. Even if there is a mistake, it will not cause a lot of trouble (in terms of probability). But in the other way, the protagonists can also use this method to fight back against the evil side.

Fhreak dreamed that the police came to arrest him, and then the black man from the FBI appeared on the TV screen saying: I'm watching you... Is it to imitate "Big Brother is watching you" in "1984"? Many Hacker works like to borrow the scenes described in "1984"... Phreak was arrested immediately, and then the police told him that he could make one call, but only one. Let's take a look at how Phreak did it: He went directly to the outside line after tapping the hookswitch several times. At this time, he would not be eavesdropped by the police. This method can be said to be Hacker’s most common way to make calls. First, the phone must be in pulse mode, and then the hookswitch should be tapped rhythmically with the hand to simulate the effect of pulse dialing on the phone. If the rhythm is right, you can make a call. Switches have relatively loose requirements for pulse speed (frequency), so the effect of pulse dialing can be simulated with human hands. Of course, it may need to be practiced~^_^ But seriously, we really should not use this method. Leaving aside the ethical and legal issues, since the current intranet switches may not support pulse dialing, those who want to use this trick may lose face...

The poster at Julie’s house is Metropolis, which is also a hacker’s favorite like 1984. Nirvana is on the wall of Zero Cool, but it’s not obvious that Nirvana is related to hacker preferences.

All the intrusive behaviors in this film are displayed with fantasy animations. Although this is completely untrue, it can at least allow ordinary viewers who do not understand the extremely boring hacking behavior 99% of the time to have a little fun, even if it does not It is a kind of torture for people who understand hacking to watch this film.

At the end of the film, Blade and Razor (the two perverts must be Japanese, the reason is very simple, because they are perverts) gather the best hackers in the world to help the protagonists. First of all, the first guy to represent the United States is to imitate Kevin Mitnick. Yes, this is really interesting. Next is Japan, Russia... To be honest, this order does reflect the current world hacking power rankings. If you want to ask why there is no China, then a more satisfying explanation is: The film was shot in 1995. At that time, Chinese people generally didn't know what the Internet was. And a less comfortable but more valuable answer is that even when the Internet is now developed, Chinese hackers will not appear in it. The reason is that most of the so-called Chinese hackers are still obsessed with intrusion and destruction. In happiness, I don't know the beauty of "you want to be a poem, and the kung fu is outside the poem". Once you reach the state where you can write poems, you will find that poems are actually shit, so more interesting things will be discovered. Of course, even at this stage, we will be surprised to find that we have just reached the starting level. In any case, it is better than not even reaching the start...

View more about Hackers reviews

Extended Reading
  • Austin 2022-03-27 09:01:10

    jesse bradford is so tender and oily

  • Ernestina 2022-03-27 09:01:10

    When I saw the disk, I was speechless. A country always imagined, and a country always remembered...

Hackers quotes

  • Dade Murphy: I don't play well with others.

  • The Plague: Kid, don't threaten me. There are worse things than death, and uh, I can do all of them.