Ask Hackaday: What movies have the best/worst hacking scenes


It’s time to do your best impression of [Comic Book Guy] as you make your case for trash or triumph in big screen hacking scenes. We watch a lot of movies, and it’s hard not to groan when the filmmakers cut corners by doing zero research into what using a computer actually looks like. But then once in a great while you have a team that does its due diligence and puts up a scene that makes sense to those of us in the know. So we’re wondering, what movies do you think have the best hacking scenes, and which ones are the worst offenders? Leave your opinion on the topic in the comments section.

We realize that you can come up with tons of poorly done ones, what we would really like to hear about is who did it right. We’ll get you started with a couple of examples. The image on the upper left is a scene from Tron: Legacy which we think did a fantastic job of portraying actual computer usage. You can read more about the huge amount of work that went into it in this article (via Reddit).

In the lower right is one of the most shady movies scenes that comes to mind. [Hugh Jackman] is compelled to do some ‘hacking’ by [John Travolta] in the movie Swordfish. The caption at the top of the screen is “COMPILER”, and who the heck knows what the rest of that is supposed to be?

On the hardware hacking side, it gets a little more difficult, we would LOVE some examples of hardware hacks or mods done right.


  1. dALE says:

    not Hackers.

  2. swirlycurly says:

    Jurassic Park, the words don’t even match up to what he is typing.

  3. Zerocool says:

    but i liked hackers, lol

  4. I’m gonna be hated for this, but I love the way the hacking is done in “The social Network”. Every detail seems right to me. At a certain point you see “Mark” writing FaceMash and you see him working on a KDE desktop and hear him talking about wget, grep, perl webscraper…

    Also the part in the basement where they are “beerhacking” a server and first one to get in gets a job at FB is pretty darn close to how a real security would be set up..

    But that’s just my 2 cents..

    • Iván says:

      Thats right

    • ken says:

      I’ll second this. I’m pretty sure I saw a bash script with wget in there (or they mentioned it), the hacking description was boring as hell, and pretty much right on the money.

      • Blue Footed Booby says:

        i laughed out loud when he was setting up that face comparison site and got to the one server that actually had some kind of security measures and said “uhhh…I’ll come back to that one.”

    • Yeah, “The Social Network” was indeed great in this aspect. Older versions of KDE, no Compiz, No MacBook but greyish Dell and Vaio… One of my favorite scene in the movie is when Mark logs out of a thin client in university library. He apparently force-closed the session with keystrokes, Ctrl-Alt-Bksp-Bksp or something, but that sounded so like the real thing. The exact, natural sound and motion anyone would make… That struck me so much better than seeing a random tough guy reloading scavenged handgun in super-smooth motion :)

    • cyphar says:

      Yeah. Actually, the entire text of that scene was taken from Mark’s own blog posts. Also, mark uses KDE during the film. The only thing I protest is that mark wanted an Apache and SQL “box”. Knowing how money was tight(er), why he get an nginx or lighttpd box?

  5. Pete says:

    The girl with the dragon tattoo had a reasonable hacking scene. Not sure if that was the 2009 or 2011 version.

  6. Gdogg says:

    In the second (or third?) Matrix movie Trinity uses a real exploit.

  7. woutervddn says:

    I’m gonna be hated for this, but I love the way the hacking is done in “The social Network”. Every detail seems right to me. At a certain point you see “Mark” writing FaceMash and you see him working on a KDE desktop and hear him talking about wget, grep, perl webscraper…

    Also the part in the basement where they are “beerhacking” a server and first one to get in gets a job at FB is pretty darn close to how a real security would be set up..

    But that’s just my 2 cents..

  8. jpristel says:

    Not the virus creation scene from swordfish:

    • Swordfish sucked pretty much all around. I would even go as far as to say it was Travolting.

      • jagmills says:

        Hahaha, brilliant.

      • zingbat says:

        Even the part that shows Halle Berry’s boobs?

        • Mike says:

          Yeah, because setting aside for a second the fact that a pair of boobs shown for 2.5 seconds do not make for a riveting film, the boobs in question weren’t even that great. Rumor is that she was paid several million dollars for that scene alone; they could have spent that on more 3d virus effects instead of that scene and the movie would still be improved.

          So the answer to your question is: yes, all parts of that movie sucked.

          • spike says:

            not to mention that the scene was the very definition of gratuitous; it had no bearing on the plot, or even the characters in it, IIRC she drops her book and no one in the scene even acknowledges it; other than the audience missed a few lines of dialog.

            the opening scene of swordfish was great, too bad it had to be wasted on such a shitty film,

          • Ren says:

            IIRC, she said in an interview she was paid 1/2 million to do that scene.
            Which in today’s dollars is probably equal to “several million” B^)
            Full Disclosure: I haven’t seen the scene, nor have I seen anything except a trailer of the movie.

    • sc0rch3d says:

      This is actually the scene I use to explain what viruses are to non-techies. It represents a core product (of sorts) with layers of products / activities / services that make the virus have legs and run. As we all know…sometimes the hack is easy, but just getting it to run in the right place at the right time on the right environment is a challenge all on its own.

    • Bitflusher says:

      Yea the hacking and gui sucked! However the frustration of the thing just not compiling while it should (obviously not because you made an error) and the exitement when the stupit trivial error had been found are things I recognize.

      When I watch these movies I dial my brains to level -2 and look at the pretty pictures.

    • storyMan says:

      No wait, maybe Wolverine designed his own GUI specialized for his hacking needs? He so many monitors, and it’s just a little one that has the cute polyhydra, in some of the shots you see the other screens have data strings, and really that trippy stuff in the beginning is just camerawork, the computer is not displaying any sort of fly-through, it’s cinematic technique to activate the animation for a scene which would otherwise not seem quite as interesting.


  9. Not entirely accurate, but I loved the way the reeves did it in the first matrix movie. Weird optical disc/memory card hybrids, terminals with only one blinking line etc. Thats how real hackers work- the terminal console is cleaned after every line and runs fullscreen.

  10. ys0 says:
  11. Dave says:

    I liked Seth Green’s “phreaker” scene in The Italian Job.

  12. noghiri says:

    For hardware hacking, it’s kinda hard to beat the original A-Team. Many of their designs would actually work in real life.

  13. GameboyRMH says:

    Everything in Skyfall was “Hackers”-grade terrible. Can’t the writers even ask the IT guy around the corner “Hey man, could you give this a quick look and tell us if it’s total bullshit, maybe suggest some fixes? Thanks!”

  14. freax says:

    It’s a TV series, not a movie, but it is so bad it has to be mentioned: NCIS. Really everything computer related on there is painfully cringe-worthy wrong.

  15. jh says:

    +1 The Matrix for Trinity hacking for best
    +1 Hackers for everything wrong with Hollywood and technical details

  16. WubWub says:

    Every single movie with “A C C E S S D E N I E D” in large blinking red letters when a password is incorrectly entered. I kinda wish ssh would do this every time I mistype mine.

    • naviathan says:

      I turned on the “offensive” use flag in Gentoo and now when I screw up my passwords on the command line it gives me random quips. Some of them are dumb, some of them are insults and others are just plain funny.

  17. Pete says:

    Wargames: War dialing.

  18. acemilo says:

    One of the worst things I’ve ever seen in a movie was in X-Men Origins Wolverine. The movie was horrible to begin with, but at the end when Deadpool is all of a sudden a Unix controlled robot, he gets issues the command “./decapitate/”. I literally rolled on the floor and started crying I was laughing so hard.

  19. muriani says:

    I have two problems with the Tron: Legacy scene.
    1) The terminal running top shows that Xorg is running. Xorg didn’t exist in the 1980s or early 1990s, which is when that machine would have been set up.
    2) It’s running Xorg, which means THAT WINDOWMANAGER EXISTS AND I WANT IT.

  20. SimplEEngineering says:

    Iron Man 2 has one of the worst. They don’t show the screen, but Ivan Vanko hacks a computer in 2 seconds by jamming the keyboard.

    Apparently in Russia physicists know electrical engineer, advanced control theory, AND hacking. (insert Yakov joke here)

    • Jake says:

      I disagree on that. The scene was meant to show what an asshat Hammer is, more than what a genius Vanko is. I kind of assumed he did something stupidly simple that Hammer did’t protect against like alt-F4 out of the security program or something.

    • Chris C. says:

      I’ve seen a cat bring down a whole POS (point of sale, not piece of ….) network by simply jumping on the keyboard. No idea how it did it.

      • drk421 says:

      • Slave Cat Master says:

        Cat vs computer. Yep I’ve had that problem. Finally fixed a clients PC, after hours of frustration. Had left a windows7 boot disk in the machine (BAD move) got up to get some air. Came back to cat on keyboard and newly installed copy of win7 WTF! Glad I backup BEFORE I fix. Meow!

        • naviathan says:

          Seriously? It took you 45 minutes to get some air? 30 if it’s an SSD machine. Not to mention, you backup what? No technician with any amount of skill or clientele has time to backup every machine they work on. Not to mention the legal implications of copying every customers data and the amount of space required. Even with compression you’d chew up a 1/2TB drive in no time.

          • nfg says:

            I hope you realize not every computer belongs to a person. Try working in the automation field some time. I have to backup every computer I work on. Yes I do have TB worth of data but that’s cheap compared to loosing data and causing massive downtime for multimillion dollar automated systems. People tend to get mad when you have to spend hours recalibrating equipment because someone loaded the wrong config file into a machine.

          • asheets says:

            I’ve been on the wrong end of the ” legal implications” of NOT backing up before working on a computer. Losing someone’s wedding pictures does not equal a good day at the office.

            I create a backup on a cheap external drive, turn the drive over to the customer when I’m done, and charge for the drive.

          • eldorel says:

            Really? Then the 6TB backup array sitting on the bench across from me must be my imagination.

            We back up EVERY drive that comes in before we do anything else unless the customer specifically declined the backup and signed the extra waiver.

            Every backup is encrypted with the private key of the technician who is working on the system, and all backups are wiped after the system is returned unless the customer pays for archival. ( at which point a separate backup is made after the system is repaired ) The entire backup is automated, and the backups are tested immediately.

            We literally just plug set the system on the shelf, plug it in, and trigger a PXE boot from a usb key.
            ( instead of it sitting idle on the “in” shelf for a few hours waiting to hit a bench )
            Total additional labor: 2 minutes.

            The expense of setting up and maintaining the backup system is less than the cost of having the lawyer draft a response letter twice a year, and the archival services actually came out to a profit. That’s not even accounting for the expense of a lost customer when a tech makes a mistake.

      • Morofry says:

        Point-of-sale, Piece-of-s**t; both terms define the same thing.

    • akian_aray says:

      >Apparently in Russia physicists know electrical engineer, advanced control theory, AND hacking.

      Well, they actually might know it. Russian (post-Soviet) educational system is a bit overboard on stuff. I am nuclear engineer myself, and they did taught me programming and electrical engineering. Well, it was basic but more than enough to get you started. And a lot of us did get into it.

    • Artic Hacking says:

      > Apparently in Russia physicists know electrical engineer, advanced control theory,
      > AND hacking. (insert Yakov joke here)
      Yes, but everyone knows people in colder climates tend to hack more than
      people in warmer climates. :)

  21. Anne Nonymous says:

    the 3D “UNIX” Scene from Jurrasic Park: “This is UNIX, I know this!”

    • Casey says:
    • FDP says:

      @Anne Nonymous, I agree that Jurassic Park is definitely not a realistic portrayal of hacking, but the 3D scene was actually a real file system explorer called FSN ( Now what they were doing using IRIX to run their industrial automation is anyone’s guess, I’m sure it had something to do with the Thinking Machine CM-5 blinking away in the background.

    • muriani says:

      We tried to replicate this at our office on the big SGI box.
      Got fsn built, but the machine was a headless compute box, had no graphics card, and no modern non-SGI Xserver supports remote DGL.

    • Slurm McKenzie says:

      Jurassic Park:
      A custom system with millions of lines of code
      controlling a multimillion dollar theme park can be operated by a 13 year
      old who has seen a Unix system before. Seeing an operating system means you
      know how to run any application on that system, even custom apps.

      Note: What OS was it really running?
      (1) “These are super computers”. A CrayOS?
      (2) “Quicktime movie, Apple logo, trash can.” MacOS?
      (3) “Reboot. System ready. C:\” DOS?
      (4) “Hey, this is Unix. I know this” Unix?

      The computers in Jurassic Park were Cray supercomputers running the MacOS as a graphical shell of DOS all layered on top of a Unix base.

      • Tenocticatl says:

        These people patched fossilized dino DNA with that of a frog. Clearly they like to make things difficult for themselves.

      • @ 2,130,706,433 says:

        1) In the book they were Cray X-MP. In the movie that is a Thinking Machines CM-5 blinking in the background. In reality they were empty frames with just the blinking lights, according to Google.

        2) The Macs were merely Xservers into the frontend processor in the same way we use our Windows PCs today merely as web clients or terminals into much larger systems. Although someone else has posted that the Macs were just playing quicktime videos of what we were supposed to think were terminal sessions.

        3) Back in the day, I used to do silly things like set my OpenVMS and DEC UNIX/OSF/Tru64 shell prompts to C:\> . People watching over my shoulder would be like “WTH?!?!” and I’d be all “LOL”.

        4) Yeah, I cringe at that point as well.

      • imroy264 says:

        Actually, the supercomputer in Jurassic Park was a Thinking Machines CM 5.

  22. DainBramage1991 says:

    I nominate Wargames, definitely one of the most inaccurate portrayals of computer hacking ever.

    • chango says:

      How old are you? Because war dialing, unsecured modem terminal ports, and phreaking as portrayed in WarGames was almost exactly what the hacking scene was like in the early ’80s. Hell, this movie is where the name “war dialer” came from.

      They got the line short payphone trick right such that by the early ’90s it was impossible to find a payphone with a mouthpiece that wasn’t glued in. Of course you could always drive a sharpened nail through the diaphragm…

      • DainBramage1991 says:

        The moment they published the BASIC program they used to simulate key strokes was the moment I was put off of that movie forever. Not to mention the fact that the AI was totally unrealistic for the time period.

        As for my age, I am old enough to have had my first computing experience with a then-current Altair 8800. I saw Wargames in the theater.

        • MasftoD says:

          “AI totally unrealistic for the time period” … It sounds like you actually expected the movie to be about hacking into a speak-and-spell. You apparently haven’t figured out that Wargames was not intended to be a documentary.

          I nominate your nomination for the worst nomination in this thread.

        • chango says:

          What, were you expecting WOPR to be Eliza, and for all the actors to accurately hit 80WPM?

          • DainBramage1991 says:

            I was expecting a modicum of realism given 1983 technology limitations (both civilian and military).

            Apparently I can only nominate movies that you people agree with?

          • MikrySoft says:

            Yes, because all secret goverment computers are at or below public levels of technology. Currently NSA doesn’t have anything you couldn’t buy given infinite resources. Sure.

    • S says:

      The war dialing was exactly as we did it then. The payphone hack completely accurate. I was even still able to do a similar hack payphone hack until the mid 90s with a paperclip and the coinbox keyslot.

      The conversations with Joshua were of course unrealistic but then again this was supposed to be an advanced military AI created by a world genius…. so suspension of disbelief is required.

  23. FDP says:

    Hacking in movies/TV is almost always asinine. It is much easier for screenwriters to try to write the emotions (or imagined emotions) of hacking than to write the mechanics of something they don’t understand. Thus hacking scenes often devolve into a fancy screensaver, or “cool” fast moving hex code scroll (sometimes even sideways).

    The funny thing is that livecoding interfaces have started to copy some of the cheesy “hacking” text effects from movies, so perhaps some day people really will just hack by squinting intensely at pretty pictures on a 10 foot screen in front of them and spouting cliched lines like “almost there”, “I’m in” and “got you”.

    • Okay, as a screenwriter who happens to have a MS in Network Security, I need to come to all those screenwriters’ defense:

      The script of a movie is mainly just the dialog, with some very rough outlines of what’s going on. A hacker scene in the script looks something like this:

      INT. Dark Basement Room

      L33T HACKER, is sitting in front of computer typing away furiously. He switches rapidly between windows, until suddenly

      I’m in!

      There really isn’t much room beyond that in the script. It’s mostly what people are saying. What shows up on the screens is the graphic designer’s job, and ultimately the director’s. Writers really don’t have much to say unless someone directly talks about how they hacked (not very likely, as it is boring to non-techies). There can be a very realistic script, but it fall very flat in the final product.

      I would recommend re-watching Hackers without watching what they’re doing. It’s surprisingly closer to accurate, at least in the first part of the movie before all that DaVinci nonsense.

      • Kris Lee says:

        Now really. I’ll recommend you to watch The Matrix Revisited about the level of screen writing of Wachowski (still then) brothers.

        • The Matrix Revisited was also written AND directed by the Wachowski starship. Having control over the entire process, they knew/did their research when writing the script, and were in the fairly uncommon position to be able to enforce that level of minute detail in the final product.

          Unfortunately, that’s rare that a writer has that level of control over the process. Most of the time, a writer writes a script on spec (prior to being paid), and tries to option it off to the studios (sell it). A lot of times, once the script is sold, the writer doesn’t have much say in what the director does, often times they’re booted out and a second writer is hired to tweak things to the director’s liking and the first writer has no part in the process until they see their name on the big screen.

          • Johan G says:

            How many movie executives does it take to change a lightbulb?
            Movie executive: “Does it *have* to be a light bulb?”

            (Heard John Cleese tell it.)

      • Truth says:

        I have to agree with you on hackers if you ignore ALL of the 3D graphics, and focus solely on the dialogue. For it’s day the dialogue is pretty accurate.

  24. kstillin says:

    keycheck -o “keychecks off”, safety -o “he’s turning the safety systems off, he doesn’t want anyone to see what he’s about to do”

  25. Raystorm says:

    I’ll just leave this here:

  26. kstillin says:

    You’re in. Order it to disarm the missiles.

  27. Camerin says:

    Burn notice. It is about 40 % how to hack together spy equipment. Most is pretty odvious, But much of their hardware is placed in the relm of plausable,

  28. Chris C. says:

    In movieland, a 6502 provides enough processing power to run a Terminator.

  29. FrankenPC says:

    I know the intent of this article is about hacking the software security systems. But, if you will allow me some latitude…The only real computer hacking scene in movies is the Apollo 13 computer power up hack.

  30. HelToupee says:

    Everyone’s picking on Hackers. I think it’s a great movie, and here’s why – it’s not meant to be serious. The whole thing is a farcical joke about how bad Hollywood is at portraying technology. It was just not done obviously, and the joke was a little ahead of it’s time, so it’s hard to tell if they’re trying to be serious. Watch it again with that in mind. Well, that and Angelina Jolie…

  31. Austringer says:

    For hardware hacking nothing beats the scene in Apollo 13 – “We gotta find a way to make this fit into the hole for this using nothing but that.”

  32. d15ea5e says:

    The most dumbest is this one:

    • prattbot says:

      ^ agreed. Do you even computer?

    • Wolf says:


    • Cloud10 says:


      I totally forgot about that one! I saw that episode when it aired and I cracked up for a good while when I heard it…

      “I’ll create a GUI interface using Visual Basic… see if I can track an IP address”.

      It’s as if the writers knew that an IP address would be helpful for tracking the killer (and this is the only thing they got right), but they had no idea what that meant and threw some random computer jargon in there to achieve the goal. Sounds like a lot of work to track and IP address!

  33. Bill says:

    The movie “Sneakers” irritated me the least; does that count for anything?

    • RDAS says:

      Sneakers is awesome! It doesn’t try to be overtly technical with its scenes, but it covers phreaking, social engineering and physical penetration testing. Beyond the silly plot about a magical black box, it’s a solid movie.

  34. theTwiz says:

    Been a while since I saw it, so I could be wrong but I seem to remember Firewall (2006) with Harrison Ford having some impressively accurate portrayals of hacking and network security in general.

  35. DJCalarco says:

    Sneakers was awesome, its a little dated, but still great. Dan Akroyd, hell yea!

  36. Ken says:

    Best: WarGames
    Worst: NCIS (Original)… NCIS LA is ok.

  37. TommyTheSav says:

    The hacking scene in goldeneye looks okay. The terminal screen seems weird to me but it could be an old version of a Unix terminal I have not seen.

    What I like in this movie is that he actually disconnects the OS disk drives to make it fail, he doesn’t just punch the screen like it has been seen in so many other movies.

  38. Steve says:

    Not strictly a hacking scene, but the best computer/IT scene is probably from Breach (yes, the one about Robert Hanssen).
    Robert Hanssen is at the IT department, talking with the guys there, and the jargon is all correct, used correctly, and as far as I can tell, the advice given is actually good advice for the time.

  39. DJCalarco says:

    Holy crap, MacGuyver????? Regardless of the audacity of some of his…well….”MacGuyvers”, his name has become somewhat synonymous with hardware hacks. Also, some of it was actually feasible.

    • Lex says:

      The early seasons, yes. But as the series aged (and the mullet grew out) they got lazy. Picking a lock became inserting the Swiss army knife blade into any lock and turning, or taking a bunch of torn fabric and metal bars and in less than 15-minutes have a fully functional hang glider.
      “MacGuyverisms” started to become a Deus Ex Machina.
      It was pure magic while I was growing up, but going back and watching them as an adult was disillusioning.
      Having said that, I still think he’s awesome.

  40. Chad says:

    The movie untraceable wasn’t horrible. Some things were put in place to keep the story alive but the hax weren’t too bad.

    • Chad says:

      I mean, the movie itself was a crapfest but they did ip tracing and what not. However the FBI did completely fail at shutting down his website which was rather far fetched.

    • unhappyelf says:

      Trust me when I say, I have no idea how the writer got any of that right. I have personally met Dr. Brinker(Look it up if you don’t believe me), the man can not even use an iPhone without help. So honestly I have no idea how he got any of those details even that close.

  41. chowarmaan says:

    Independence Day. Aliens travel across the galaxy with shields and laser weapons, but forget a firewall/anti virus program to protect the mother ship from being blown up by a virus. Really, what are they running, Windows 95?

  42. zygomatic says:

    Real Genius FTW!

  43. joelfinkle says:
    • Ren says:

      We had a programmer leave a 2 pixel gap between some Xwindows in a full screen display, Otherwise filling the screen. A client quickly found it and was able to open other Xterms.

  44. joelfinkle says:

    Oh, god, how about Sandra Bullock in “The Net” — nobody’s going to find that >a> tag on that web page that’s the key to the whole secret network, are they?

    And I have to nominate every hollywood movie where some teenager sticks a card with a bunch of wires hanging off of it into an ATM and twenties start pouring out.

  45. Greger says:

    The series 24 has a lot of really bad computer stuff. Also, the movie Antitrust. Where the compiler keeps telling them how many percent complete a module is in coding. And HTML is the language of choice.

    • roboman2444 says:

      They did use java and overall the message from the movie was great.
      Many of the terminology they used was pretty good.

    • Erik Johnson says:

      The one thing that has always bothered me about 24 was the goddamned digital counter font they used between scenes and intro/outtros. 7-seg digits do not bounce around, having variable spacing between, say, a 1 and 0, the digits should be fixed in place! Also the 1 had a serif that didn’t fill the entire top segment on an obviously-not-alpha display.

  46. For hardware hacking I must say I am fond of the CCTV gadget in NATIONAL TREASURE. Still very fictional, but it looked just like something you’d find on HaD. Riley was a great character, and it made me so happy to see a hacked-up WRT :)

    Though not perfect, I also approve of the soldering, sand casting, and wheel-grinding in IRON MAN 1 & 2, and BATMAN BEGINS. Downey and Rourke actually look like they’ve soldered before…

  47. Kyle says:

    Hackers of course is bad but in a funny way. There is also Office Space, Control-Alt-Delete and Live Free or Die Hard just to name a few. It not really intended to be taken seriously, but its still funny to watch. I have to agree that Wargames was actually pretty realistic for the 80’s. On the hacking side, I’m going to have to say MacGyver is the greatest. That is one name that always comes to mind when someone hacks together hardware (or at least a rubber band, paper clip and a drinking straw) lol.

    • Slurm McKenzie says:

      over 250 comments and just one mention of Die Hard 4 (Live Free or Die Hard). ?
      a cool movie in my opinion, with some flaws. but i won’t list them all ;-)

      and another movie, which hasn’t been mentioned, is eagle eye.

  48. CraigBurden says:

    AntiTrust has a scene where he Hacks a PC and manages to get it to play live feeds from a ton of sources just with %showall. I found the whole movie’s code wasn’t too bad. HTML in relevant places and syntax that looks like something you would use in CMD etc.

    • Yeah, that scene in AntiTrust where he’s viewing the security feeds immediately came to mind when I saw this. I wonder if that’s available in HD… I haven’t seen it in forever.

      Only thing I didn’t like about it was the very end, it seemed painfully so forced… Especially how, if I remember correctly, it ended like “WELL SHUCKS, one of our friends got horribly murdered and we were involved in a dangerous conspiracy and whatnot, but hey, WE’RE ON TEEVEE! AWESOME!”

      But it gets points for actually keeping me in suspense at a couple points, not many movies can do that.

  49. lolminator says:

    Nobody mentioned Antitrust yet? Sure, the end where they type in the ip addresses was amusing, but the part about the protagonist hacking in was quite realistic. He used real unix commands. But that’s about it. Other than that, The Social Network throws some words around, which are in some connection with hacking.

  50. Wolf says:

    I enjoyed Hackers. Sure it was not realistic, but laughing at all of the pathetic mistakes, weather they are serious or not, was the fun part for me.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


Get every new post delivered to your Inbox.

Join 96,408 other followers