View Single Post
Old 08-18-2003, 08:55 PM   #8 (permalink)
telekinetic2
Loser
 
29. All *REAL* hacker work is done on a consumer-grade slick-looking GUI (Swordfish)

These have gotten so cliche that the times when computers were ACCURATELY portrayed stand out more than the times when they were not:

A. Hackers use command lines to impliment published exploits to gain access to secure systems (Matrix II)

B. Ridiculous shut-down time/save times exist in the office environment (the apple/windows hybrid OS in Office Space)

I'm sure there are others...
telekinetic2 is offline  
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46