Hackers are very fond of hacker confrontation, although this film is not recognized by the film critics _ hacker confrontation

Source: Internet
Author: User
Hackers are keen on hacking, though the film is not recognised by critics.

Although the film is not approved by the film critics, hackers are very fond of the hacker confrontation. However, when Parisa Tabriz, the head of Google's Chrome team, formed more than 200 calm experts to watch the premiere, these people equate that it is a good film, or even one of the best hacker films.

"These hacking actions are about the most real scene I've ever seen in a movie," said one information-calming expert, after the premiere of the question, "as a consultant who has joined this kind of film, I would say that you have done a really amazing job." ”

"In contrast to other films, this film signals the real person, not the situational image." An actual person, with a real-life title, is put into a real-world phenomenon. The technology in the film, another disaster, is real, perhaps at most feasible. "I wouldn't call it a hacking film," said calm advisor Mark Abene after watching the film. This is a collection of terrorism stories. Hackers are part of the story, but they are only part of it. ”

The Wired website's freelance editor, Kevin Poulsen, has added depth to the film's shooting. In the same way as the protagonist in the story, Kevin Pulsen has been in prison for hacking behavior. He said that the hacker scenes in the film are very funny, and Michael Mann is doing a good job in this area. "To enhance the drama, he is working on a few small details to help the audience better understand the plot," he said. But, to put it in a bit with other hacking films, you'll see that it does the best, "he said," which is the first deep sign of hacking and not a very stupid crime thriller. "Other, he thinks, this film shows the hacker's dark side," It really captures the contemporary sense of crime collection, and it is how malicious sentient beings, driven by the benefits. ”

In order to enhance the sense of reality, the film does not use the "Hollywood-style control system." Hackers use Unix to call the line interface, just as in practice. "When they're dealing with hacking, they're using boring terminals and rotating code," Tabriz, "which is on the verge of an actual collection of crime." ”

Meanwhile, in the film, hackers are not always fabricating the world. "In most TV dramas and movies, they live in a world where everything is connected to each other," he said. No matter where you are, anyone can hack into any tool, "Tabriz said," practice is, occasionally you must enter the world to steal a tool, about the social engineering method to deceive a person. ”

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.