29. All *REAL* hacker work is done on a consumer-grade slick-looking GUI (Swordfish)
These have gotten so cliche that the times when computers were ACCURATELY portrayed stand out more than the times when they were not:
A. Hackers use command lines to impliment published exploits to gain access to secure systems (Matrix II)
B. Ridiculous shut-down time/save times exist in the office environment (the apple/windows hybrid OS in Office Space)
I'm sure there are others...
|