Search/Recent Changes
DBTropes
...it's like TV Tropes, but LINKED DATA!

Hackers

 Hackers
type
TVTItem
 Hackers
label
Hackers
 Hackers
page
Hackers
 Hackers
comment
A 1995 techno-thriller directed by Iain Softley, about a small group of underground computer hackers who discover a scheme being run by the security chief of a large corporation.In a prologue flashback, Dade Murphy, age 11, going by the hacker alias Zer0 Cool, is found guilty of crashing 1,507 computers, and single-handedly causing a drop in the New York Stock Exchange. In deference to his age, he is sentenced to seven years of probation, in which he is forbidden from owning or operating a computer or touch-tone telephone.Fast forward seven years: Dade's mother, now divorced and with full custody of Dade (Jonny Lee Miller), moves them both to New York for a fresh start. Dade struggles to make friends, but ends up falling in with a new hacking crowd, including Phantom Phreak (Renoly Santiago), Cereal Killer (Matthew Lillard), Lord Nikon (Laurence Mason)... and Joey (Jesse Bradford). Not long after, Joey, the kid of the group, breaks into a supercomputer at Ellingson, a large oil and mineral conglomerate. In a Contrived Coincidence, he downloads part of a worm program — one created by the crooked head of IT Security for Ellingson, Eugene "the Plague" Belford (Fisher Stevens), himself a hacker gone pro. Belford is using the worm to quietly embezzle many millions of dollars from Ellingson.Seeing an opportunity, the security chief creates a virus called daVinci - which threatens to infect and sink several Ellingson oil tankers, thus causing a major global ecological disaster. Having 'found' the virus, Belford presents the virus's threat as a reason to contact the Secret Service to help find the intruder. When the Secret Service investigates with Ellingson's cooperation, Belford discovers Dade (and his past as Zer0 Cool) and pressures him to get the file Joey downloaded - ultimately threatening to alter law enforcement databases so his mother gets "disappeared into the system." Dade gets Belford the file - but realizes his mistake soon after. Now, it's up to Dade, Phreak, Cereal, Nikon, and Kate (Angelina Jolie), Dade's crush, herself the hacker Acid Burn, to figure out the truth, and get the evidence they need to clear their names.Hackers is known for referencing top-of-the-line computers of the time (now horribly, horribly outdated) and unrealistic depictions of hacking, but it nevertheless remains quite entertaining. It's also notable as being one of the earliest appearances of Angelina Jolie, who plays Dade's love interest, Kate. (Miller and Jolie would end up getting married not long after the movie finished - it was the first marriage for them both, and it ended up falling apart not long after.) While real computer hackers will sneer at the movie in public (except for those who find the research failure to be funny as HELL), secretly they desperately wish that it were true: it's a world where hackers are slim and trendy, hackers save the world from evil corporations, and most importantly, Angelina Jolie ditches her jock boyfriend for a hacker.Another thing that was notable about the movie is that this also features the prototype footage for a certain anti-gravity racing game series...
 Hackers
fetched
2024-02-04T01:00:16Z
 Hackers
parsed
2024-02-04T01:00:16Z
 Hackers
processingComment
Dropped link to BoyMeetsWorld: Not a Feature - ITEM
 Hackers
processingComment
Dropped link to CaptainBlood: Not a Feature - ITEM
 Hackers
processingComment
Dropped link to Fanservice: Not a Feature - IGNORE
 Hackers
processingComment
Dropped link to Foil: Not a Feature - IGNORE
 Hackers
processingComment
Dropped link to NineteenEightyFour: Not a Feature - ITEM
 Hackers
processingComment
Dropped link to SummerSchool: Not a Feature - ITEM
 Hackers
processingComment
Dropped link to TaxiDriver: Not a Feature - ITEM
 Hackers
processingComment
Dropped link to TheMillenniumTrilogy: Not a Feature - ITEM
 Hackers
processingComment
Dropped link to TheNineties: Not a Feature - IGNORE
 Hackers
processingComment
Dropped link to TheOuterLimits1963: Not a Feature - ITEM
 Hackers
processingComment
Dropped link to Transformers: Not a Feature - ITEM
 Hackers
isPartOf
DBTropes
 Hackers / int_16178c64
type
Gratuitous Spanish
 Hackers / int_16178c64
comment
Gratuitous Spanish: LA COMPUTADORA DE MIERDA! note The phrase Phreak's mom said when his son was arrested for hacking. In the Spanish dubbing, this phrase was softened.
 Hackers / int_16178c64
featureApplicability
1.0
 Hackers / int_16178c64
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_16178c64
 Hackers / int_18d15922
type
Title Drop
 Hackers / int_18d15922
comment
Title Drop: Yeah, the word "hackers" gets tossed around a lot throughout the film. There is also a Tagline drop, too (the "Their Crime Is Curiosity" one on the poster above): it's part of Loyd Blankenship's "Hacker's Manifesto", which is read aloud by Agent Ray during a stakeout early on.
 Hackers / int_18d15922
featureApplicability
1.0
 Hackers / int_18d15922
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_18d15922
 Hackers / int_1c79ae8c
type
Those Two Guys
 Hackers / int_1c79ae8c
comment
Those Two Guys: Razor and Blade, hosts of "Hack the Planet".
 Hackers / int_1c79ae8c
featureApplicability
1.0
 Hackers / int_1c79ae8c
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_1c79ae8c
 Hackers / int_1fc325dd
type
Do Not Adjust Your Set
 Hackers / int_1fc325dd
comment
Do Not Adjust Your Set: How our hackers were cleared after being framed.
 Hackers / int_1fc325dd
featureApplicability
1.0
 Hackers / int_1fc325dd
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_1fc325dd
 Hackers / int_20989d05
type
Parents as People
 Hackers / int_20989d05
comment
Parents as People: Dade's mom gets a lot of development as her own person, rather than simply "a parent."
 Hackers / int_20989d05
featureApplicability
1.0
 Hackers / int_20989d05
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_20989d05
 Hackers / int_22cf536c
type
Chekhov's Gun
 Hackers / int_22cf536c
comment
Chekhov's Gun: The discussion of common passwords both serves as setup for a soon-to-follow scene and a Brick Joke. Even more of a Chekov's Gun when we discover that Plague's partner in crime and woman he's been sleeping with, Margo, is the one the password belongs to (and he would probably know her sleep schedule).
 Hackers / int_22cf536c
featureApplicability
1.0
 Hackers / int_22cf536c
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_22cf536c
 Hackers / int_237404cc
type
Ironic Echo
 Hackers / int_237404cc
comment
Ironic Echo: "You talkin' to me?"
 Hackers / int_237404cc
featureApplicability
1.0
 Hackers / int_237404cc
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_237404cc
 Hackers / int_2439b588
type
As the Good Book Says...
 Hackers / int_2439b588
comment
As the Good Book Says...: Cereal Killer quotes Corinthians to try to get Dade and Kate to set aside their differences:
 Hackers / int_2439b588
featureApplicability
1.0
 Hackers / int_2439b588
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_2439b588
 Hackers / int_26eb6287
type
Funny Background Event
 Hackers / int_26eb6287
comment
Funny Background Event: When the FBI agent is being interviewed on the news, he is going on about how hackers are dangerous criminals, while Joey, who they just arrested, can be seen in the background sucking his thumb. Although neither Kate, nor Dade, is shown doing this, during the scene in the restaurant where Gill's credit card is being cut, you can also see his car through the window. Being towed. During the montage of Dade poring through the garbage file while the others looks through a mountain of printed hardcopy, there are split second cuts of Kate and Cereal tango dancing, Nikon strangling Cereal, and Kate stabbing a sheaf of printer paper with a katana.
 Hackers / int_26eb6287
featureApplicability
1.0
 Hackers / int_26eb6287
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_26eb6287
 Hackers / int_28c1d543
type
Defrosting Ice Queen
 Hackers / int_28c1d543
comment
Of course, this reveals that at that point, Kate was essentially agreeing that she'd go on a date with him either way.
 Hackers / int_28c1d543
featureApplicability
1.0
 Hackers / int_28c1d543
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_28c1d543
 Hackers / int_2aea880
type
Dueling Hackers
 Hackers / int_2aea880
comment
Dueling Hackers: Part of the climax. Earlier, the duel between Crash and Burn.
 Hackers / int_2aea880
featureApplicability
1.0
 Hackers / int_2aea880
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_2aea880
 Hackers / int_2be271c7
type
Hollywood Hacking
 Hackers / int_2be271c7
comment
Hollywood Hacking: The Movie. Not just Rapid-Fire Typing, but in spinning phone booths with VR goggles! Albeit oddly averted for one scene where they trace through page after page of hardcopy coredump, something familiar with many people trying to figure out why the OS entered kernel panic. As Roger Ebert pointed out in his (positive!) review, what real hacking looks like, and what real hackers can actually accomplish are both pretty boring, at least for an audience to watch. That said, in the final hacking duel, Dade has to read the full file code to Joey, with roots and slashes and all. Director Iain Softley said the visuals were meant to be metaphorical rather than accurate, trying to capture an LSD-like look for the hacking scenes. It also fairly accurately depicts some of the things about hacking at the time, in that it was mostly based around social engineering, fast talking, taking advantage of the ignorance of the standard user, and dumpster diving. (Dade gets access to the TV station by literally calling in and getting a security guard to read him the information he needs to access the modem... something that would become outmoded with the standardization of caller ID, firewalls, and other defenses the early internet didn't typically have.)
 Hackers / int_2be271c7
featureApplicability
-1.0
 Hackers / int_2be271c7
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_2be271c7
 Hackers / int_2bfb1856
type
Beard of Evil
 Hackers / int_2bfb1856
comment
Beard of Evil: The Plague.
 Hackers / int_2bfb1856
featureApplicability
1.0
 Hackers / int_2bfb1856
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_2bfb1856
 Hackers / int_2c9e262
type
Catapult Nightmare
 Hackers / int_2c9e262
comment
Catapult Nightmare: After Dade Murphy has a visit from the authorities, he has a dream where his Slap-Slap-Kiss Love Interest Kate enters his room and starts kissing him, then the authorities enter and arrest them. He wakes up and sits up in bed. Kate gets one too, except it's not a nightmare - but her erotic dream about Dade.
 Hackers / int_2c9e262
featureApplicability
1.0
 Hackers / int_2c9e262
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_2c9e262
 Hackers / int_2dc0d2bf
type
Hidden Depths
 Hackers / int_2dc0d2bf
comment
Hidden Depths: Did anyone expect Cereal Killer to use a Bible quote in a motivational speech? In universe, the heroes have no idea that Dade (who they think is a talented amateur) is the Famed In-Story Zero Cool.
 Hackers / int_2dc0d2bf
featureApplicability
1.0
 Hackers / int_2dc0d2bf
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_2dc0d2bf
 Hackers / int_2fbab42f
type
Wrongful Accusation Insurance
 Hackers / int_2fbab42f
comment
Wrongful Accusation Insurance: In the course of stopping the tankers from capsizing and obtaining the evidence of the real villain's embezzlement scheme, the heroes commit several instances of network intrusion and related crimes, involving a global conspiracy to grind Ellingson's server to a halt while looking for the MacGuffin. Yet the Secret Service apparently doesn't prosecute them for it, since we see Dade and Kate living (more or less) happily ever after at the end. This is most likely because the truth (which was broadcast worldwide by other hackers) embarrassed the SS to no end - Essentially, The Plague manipulated the SS into assisting him in terrorism-for-blackmail. Also, the hackers complete destruction of the Ellingson Supercomputer actually averted a worldwide global disaster, a whole fleet of oil tankers capsizing in oceans the world over, that was actually in the process of beginning when they started the attack.
 Hackers / int_2fbab42f
featureApplicability
-1.0
 Hackers / int_2fbab42f
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_2fbab42f
 Hackers / int_309b8806
type
Cursed with Awesome
 Hackers / int_309b8806
comment
Cursed with Awesome: Lampshaded by Lord Nikon regarding his Photographic Memory, after he explains that he has memorised the addresses and phone numbers of every girl at the party they attend: Played a bit more straight later on when he's spent an entire day accumulating data to the point that he honestly isn't sure what's useful and useless.
 Hackers / int_309b8806
featureApplicability
1.0
 Hackers / int_309b8806
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_309b8806
 Hackers / int_31da1e24
type
Shipper on Deck
 Hackers / int_31da1e24
comment
Shipper on Deck: Cereal, and to a lesser extent, Phreak and Nikon, get a kick out of matchmaking Crash and Burn.
 Hackers / int_31da1e24
featureApplicability
1.0
 Hackers / int_31da1e24
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_31da1e24
 Hackers / int_33cddf79
type
Penny Shaving
 Hackers / int_33cddf79
comment
Penny Shaving: The MacGuffin is a worm that steals pennies from every transaction that the Ellingson Mineral Company conducts. A better example than most because the money isn't actually gone; it's just data being shifted around... until it completes its run, transfers the money to a numbered account in the Bahamas and makes a great big mess to cover its tracks.
 Hackers / int_33cddf79
featureApplicability
1.0
 Hackers / int_33cddf79
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_33cddf79
 Hackers / int_3aec9e5e
type
Properly Paranoid
 Hackers / int_3aec9e5e
comment
Properly Paranoid: Right after Phreak gets the garbage file disk from Joey and sees the Secret Service tail marking Joey, he books it. He makes a clean getaway, but then is shown scrubbing his bedroom of every scrap of paper that might be incriminating evidence. It doesn't help, as he gets arrested because the Service isn't much interested in playing by due process rules anyway.
 Hackers / int_3aec9e5e
featureApplicability
1.0
 Hackers / int_3aec9e5e
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_3aec9e5e
 Hackers / int_3c0a4666
type
Noodle Incident
 Hackers / int_3c0a4666
comment
Noodle Incident: That time Phreak hid that thing in that place.
 Hackers / int_3c0a4666
featureApplicability
1.0
 Hackers / int_3c0a4666
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_3c0a4666
 Hackers / int_3ec468b8
type
Online Alias
 Hackers / int_3ec468b8
comment
Online Alias: Most people use two word phrases, like Acid Burn or Crash Override. Which leads to...
 Hackers / int_3ec468b8
featureApplicability
1.0
 Hackers / int_3ec468b8
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_3ec468b8
 Hackers / int_40bb59d0
type
Blatant Lies
 Hackers / int_40bb59d0
comment
Blatant Lies: Cereal Killer fingers Joey as the fiend who finished all the french fries. Nobody falls for it, since Cereal has been munching on them for an entire scene. Cereal and Phreak deny knowing who Acid Burn is. They even share a knowing look when asked who "he" is.
 Hackers / int_40bb59d0
featureApplicability
1.0
 Hackers / int_40bb59d0
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_40bb59d0
 Hackers / int_48507284
type
Credit Card Destruction
 Hackers / int_48507284
comment
Credit Card Destruction: The main FBI agent's credit card is shredded at a restaurant after his account has been hacked.
 Hackers / int_48507284
featureApplicability
1.0
 Hackers / int_48507284
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_48507284
 Hackers / int_494885c6
type
Humiliating Wager
 Hackers / int_494885c6
comment
Humiliating Wager: Dade Murphy and Kate Libby have a contest to see who's the best hacker. If Murphy wins then Kate will go on a date with him, if Kate wins Murphy will do scut work for her. In a later round of the contest they make another bet: whoever loses will have to wear a dress during their date. Of course, this reveals that at that point, Kate was essentially agreeing that she'd go on a date with him either way.
 Hackers / int_494885c6
featureApplicability
1.0
 Hackers / int_494885c6
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_494885c6
 Hackers / int_4af55b78
type
Credits Gag
 Hackers / int_4af55b78
comment
Credits Gag: Special Agent Richard Gill is listed in the credits as "Dick Gill."
 Hackers / int_4af55b78
featureApplicability
1.0
 Hackers / int_4af55b78
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_4af55b78
 Hackers / int_4b2c373
type
Impractically Fancy Outfit
 Hackers / int_4b2c373
comment
Impractically Fancy Outfit: Given the nature of the movie and the counter-culture being represented, it's hardly surprising that quite a few of the outfits in the movie, while stylish, come off as impractical. Oddly inverted when Dade runs after Plague's limo after giving him the floppy. It's clear from the lighting that there is a strap connecting the legs of his pants near the knee but it doesn't seem to hamper his running abilities. During the club scene where Crash and Burn go to recruit Razor and Blade, one extra is prominently seen...dressed as a chandelier. Her headwear alone is this trope up to 11.
 Hackers / int_4b2c373
featureApplicability
1.0
 Hackers / int_4b2c373
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_4b2c373
 Hackers / int_4b39c18
type
Taking the Heat
 Hackers / int_4b39c18
comment
Taking the Heat: After their arrest following the climactic run on the Gibson, Dade and Kate are being interrogated together — Kate is playing silent, but Dade is copping out and claiming full responsibility, and that Kate is 'just his girlfriend.' After they get left alone for a few moments, Kate asks Dade what he's doing, because they know full well they're both equally involved. It's clear Dade knows he's screwed thanks to his record, but Kate could get out with just a warning or probation like he did as a kid if he does this. Fortunately, this gets interrupted with Cereal's Do Not Adjust Your Set moment, revealing Plague's evil plan.
 Hackers / int_4b39c18
featureApplicability
1.0
 Hackers / int_4b39c18
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_4b39c18
 Hackers / int_4f84cdef
type
Smug Snake
 Hackers / int_4f84cdef
comment
Smug Snake: The Plague. Oh goodness, The Plague.
 Hackers / int_4f84cdef
featureApplicability
1.0
 Hackers / int_4f84cdef
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_4f84cdef
 Hackers / int_5369c081
type
Invisible Parents
 Hackers / int_5369c081
comment
Invisible Parents: Although Kate's mother Ruth Libby is mentioned as being a bestselling self-help and relationship advice author (which explains why Kate has a top-of-the-line laptop), she's not ever seen, even at Kate's party. There's no mention of a dad at all - though one might explain that as a case of The Cobbler's Children Have No Shoes. Cereal Killer goes to the same high school as Dade, Kate, Phreak and Joey, but considering how often he asks to crash on other's couches - he might actually be homeless and on his own.
 Hackers / int_5369c081
featureApplicability
1.0
 Hackers / int_5369c081
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_5369c081
 Hackers / int_5535272c
type
Coolest Club Ever
 Hackers / int_5535272c
comment
Coolest Club Ever: Cyberdelia, an appropriate 'cyber-nightclub that has a full complement of skate ramps, a video game console about as large as a mid-sized room (featuring an alpha version of WipEout), and of course, techno music ("Cowgirl" by Underworld). It's also by invite only.
 Hackers / int_5535272c
featureApplicability
1.0
 Hackers / int_5535272c
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_5535272c
 Hackers / int_562abd51
type
Let's Get Dangerous!
 Hackers / int_562abd51
comment
Let's Get Dangerous!: Phreak getting arrested brings Dade, Kate, Cereal, and Nikon together into a true team to figure out the truth and how to clear their names.
 Hackers / int_562abd51
featureApplicability
1.0
 Hackers / int_562abd51
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_562abd51
 Hackers / int_5f252b8b
type
One Phone Call
 Hackers / int_5f252b8b
comment
One Phone Call: When Ramon gets arrested.
 Hackers / int_5f252b8b
featureApplicability
1.0
 Hackers / int_5f252b8b
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_5f252b8b
 Hackers / int_5fcedca
type
Big Eater
 Hackers / int_5fcedca
comment
Big Eater: Cereal Killer is constantly munching on snacks when with the group, just like another character that Matthew Lillard would go on to play. The fact that he went off to get a snack is the reason he doesn't get picked up later at Grand Central.
 Hackers / int_5fcedca
featureApplicability
1.0
 Hackers / int_5fcedca
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_5fcedca
 Hackers / int_5fdf73bc
type
Photographic Memory
 Hackers / int_5fdf73bc
comment
Photographic Memory: Lord Nikon has one. Among other things, he has memorized the addresses and phone numbers of every girl at the party they attend.
 Hackers / int_5fdf73bc
featureApplicability
1.0
 Hackers / int_5fdf73bc
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_5fdf73bc
 Hackers / int_62fd5552
type
Bavarian Fire Drill
 Hackers / int_62fd5552
comment
Dade's first hack as a teen starts with a Bavarian Fire Drill using the pseudonym Eddie Vedder.
 Hackers / int_62fd5552
featureApplicability
1.0
 Hackers / int_62fd5552
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_62fd5552
 Hackers / int_66b98472
type
Erotic Dream
 Hackers / int_66b98472
comment
Erotic Dream: Dade has one about Kate - that turns into a nightmare. Kate has an especially erotic dream about Dade.
 Hackers / int_66b98472
featureApplicability
1.0
 Hackers / int_66b98472
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_66b98472
 Hackers / int_6ca5a8c2
type
Master Computer
 Hackers / int_6ca5a8c2
comment
The elite supercomputers of the movie are called "Gibsons" which is a nod to William Gibson. This also counts as artistic license, as such machines are more typically called "Big Iron" (a term also used in the film).
 Hackers / int_6ca5a8c2
featureApplicability
1.0
 Hackers / int_6ca5a8c2
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_6ca5a8c2
 Hackers / int_6d5fb1e0
type
Waistcoat of Style
 Hackers / int_6d5fb1e0
comment
Waistcoat of Style: Part of The Plague's standard attire.
 Hackers / int_6d5fb1e0
featureApplicability
1.0
 Hackers / int_6d5fb1e0
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_6d5fb1e0
 Hackers / int_71384f0e
type
Two-Person Pool Party
 Hackers / int_71384f0e
comment
Two-Person Pool Party: How Dade and Kate celebrate their victory. In a pool on a roof.
 Hackers / int_71384f0e
featureApplicability
1.0
 Hackers / int_71384f0e
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_71384f0e
 Hackers / int_7bd44eb9
type
Smart People Play Chess
 Hackers / int_7bd44eb9
comment
Smart People Play Chess: With only a few hours until everyone's plans go into effect, Nikon and Cereal spent their free time playing chess in the park. And winning.
 Hackers / int_7bd44eb9
featureApplicability
1.0
 Hackers / int_7bd44eb9
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_7bd44eb9
 Hackers / int_80ebdcb2
type
Mobstacle Course
 Hackers / int_80ebdcb2
comment
Mobstacle Course: The heroes use the crowds at Grand Central Station to their advantage against the Secret Service who are coming to arrest them.
 Hackers / int_80ebdcb2
featureApplicability
1.0
 Hackers / int_80ebdcb2
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_80ebdcb2
 Hackers / int_829b958e
type
Embarrassing First Name
 Hackers / int_829b958e
comment
Embarrassing First Name: It's "The Plague." Definitely not his real name of Eugene.
 Hackers / int_829b958e
featureApplicability
1.0
 Hackers / int_829b958e
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_829b958e
 Hackers / int_85bcc5a8
type
Lampshaded Double Entendre
 Hackers / int_85bcc5a8
comment
Incidentally, "that place" is behind a condom dispenser in the boys' bathroom. What exactly was he hiding?
 Hackers / int_85bcc5a8
featureApplicability
1.0
 Hackers / int_85bcc5a8
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_85bcc5a8
 Hackers / int_863fa679
type
What Happened to the Mouse?
 Hackers / int_863fa679
comment
What Happened to the Mouse?: Phreak's last appearance was his phone call to Acid Burn, and he's never mentioned directly again.
 Hackers / int_863fa679
featureApplicability
1.0
 Hackers / int_863fa679
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_863fa679
 Hackers / int_86b21114
type
Badass Boast
 Hackers / int_86b21114
comment
Dade's first and last on-screen hacks use the Badass Boast, "Mess With The Best, Die Like The Rest."
 Hackers / int_86b21114
featureApplicability
1.0
 Hackers / int_86b21114
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_86b21114
 Hackers / int_875615dd
type
Truth in Television
 Hackers / int_875615dd
comment
Truth in Television: The Secret Service actually did engage in widespread raids and arrests of computer hackers in the years before this movie came out. Hackers were mostly harassed in similar ways as those shown in the movie. At least one of these cases led to the creation of the Electronic Frontier Foundation. It is perhaps helpful to know that while the Secret Service is known for protecting The President, the vast majority of their time (and their original mission) is investigating financial crimes such as counterfeiting, or attacks on interstate trade systems — which is where they would cross paths with hackers, both benign and malignant. When the movie was made, the Secret Service was part of the Treasury Department.
 Hackers / int_875615dd
featureApplicability
1.0
 Hackers / int_875615dd
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_875615dd
 Hackers / int_8797239c
type
Bait-and-Switch
 Hackers / int_8797239c
comment
Bait-and-Switch: Dade has an erotic dream with Kate breaking into his room, then opening her jacket (revealing nothing underneath) - that turns into a Catapult Nightmare of Secret Service agents pulling Kate away and arresting Dade. Later, we see another erotic dream in progress, of someone in a sexy vinyl catsuit - who turns out to be Dade, not Kate. Cue Kate waking up from her dream.
 Hackers / int_8797239c
featureApplicability
1.0
 Hackers / int_8797239c
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_8797239c
 Hackers / int_87dccc00
type
Living a Double Life
 Hackers / int_87dccc00
comment
Agent Ray thinks it's "cool".
 Hackers / int_87dccc00
featureApplicability
1.0
 Hackers / int_87dccc00
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_87dccc00
 Hackers / int_8b4f491c
type
Villainy-Free Villain
 Hackers / int_8b4f491c
comment
Villainy-Free Villain: Richard Gill is a Jerkass, but he's not doing anything wrong; he's a Secret Service agent tracking down computer criminals, who happen to be the protagonists.
 Hackers / int_8b4f491c
featureApplicability
1.0
 Hackers / int_8b4f491c
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_8b4f491c
 Hackers / int_8ca89acb
type
I Need to Go Iron My Dog
 Hackers / int_8ca89acb
comment
I Need to Go Iron My Dog: Cereal leaves the room to let Kate try to convince Dade to help. He goes straight for the Muphy's fridge.
 Hackers / int_8ca89acb
featureApplicability
1.0
 Hackers / int_8ca89acb
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_8ca89acb
 Hackers / int_8ed5c6e4
type
Asshole Victim
 Hackers / int_8ed5c6e4
comment
Asshole Victim: A non-lethal kind. When Dade hacks a TV network he does it to interrupt a show where an obnoxious host is spouting a racist rant on the inferiority of Africans and Native Americans.
 Hackers / int_8ed5c6e4
featureApplicability
1.0
 Hackers / int_8ed5c6e4
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_8ed5c6e4
 Hackers / int_8f882b0e
type
Skyscraper Messages
 Hackers / int_8f882b0e
comment
Skyscraper Messages: The finale has Crash having rigged windows visible from their Rooftop Swimming Pool to read "Crash + Burn", which really impresses Burn that much more.
 Hackers / int_8f882b0e
featureApplicability
1.0
 Hackers / int_8f882b0e
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_8f882b0e
 Hackers / int_902f19e
type
Hacked by a Pirate
 Hackers / int_902f19e
comment
Hacked by a Pirate: All over the place. The viruses launched by the hackers all have some malicious and/or cute animation that's displayed while they're mucking about in the system.
 Hackers / int_902f19e
featureApplicability
1.0
 Hackers / int_902f19e
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_902f19e
 Hackers / int_99dce181
type
Hacker Collective
 Hackers / int_99dce181
comment
Hacker Collective: The movie is about this, if well The Protagonist is loosely based on the real life hacker codenamed "Zero Cool", he's part of a hackers collective which attack together to make some kind of "social justice".
 Hackers / int_99dce181
featureApplicability
1.0
 Hackers / int_99dce181
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_99dce181
 Hackers / int_9a573352
type
Wager Slave
 Hackers / int_9a573352
comment
Wager Slave: If Kate Libby wins the contest to see who's the best hacker, Murphy will do scut work for her: "Scan, crack copyrights, whatever I want."
 Hackers / int_9a573352
featureApplicability
1.0
 Hackers / int_9a573352
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_9a573352
 Hackers / int_9ab240e4
type
Rapid-Fire Typing
 Hackers / int_9ab240e4
comment
Rapid-Fire Typing: every main character in the movie does this, but one particular scene is notable: when Dade uses Kate's new computer and the camera shows us that he's operating several Viewer-Friendly Interface programs at blinding speeds. Amusingly enough, it's painfully clear (especially in the TV station scene) that Jonny Lee Miller is a very slow typer.
 Hackers / int_9ab240e4
featureApplicability
1.0
 Hackers / int_9ab240e4
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_9ab240e4
 Hackers / int_9d0f2549
type
Public Secret Message
 Hackers / int_9d0f2549
comment
Public Secret Message: After being arrested, Dade slips the floppy disk with the evidence into a trash bin. Taken outside, he sees Cereal Killer in the crowd and goes off on a rant, "They're TRASHING our rights, man! They're TRASHING the flow of data! They're TRASHING!...." Cereal gets the message, and is next seen rummaging through the trash bin.
 Hackers / int_9d0f2549
featureApplicability
1.0
 Hackers / int_9d0f2549
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_9d0f2549
 Hackers / int_9d12bbc1
type
Foreshadowing
 Hackers / int_9d12bbc1
comment
Foreshadowing: A poster for Razor and Blade's show can be seen behind Dade when he enters Cyberdelia.
 Hackers / int_9d12bbc1
featureApplicability
1.0
 Hackers / int_9d12bbc1
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_9d12bbc1
 Hackers / int_9dd2cbc2
type
CloudCuckooLander
 Hackers / int_9dd2cbc2
comment
Cloud Cuckoo Lander: Cereal Killer, partially crossed over with Bunny-Ears Lawyer.
 Hackers / int_9dd2cbc2
featureApplicability
1.0
 Hackers / int_9dd2cbc2
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_9dd2cbc2
 Hackers / int_a036d3df
type
Sarcastic Confession
 Hackers / int_a036d3df
comment
Sarcastic Confession:
 Hackers / int_a036d3df
featureApplicability
1.0
 Hackers / int_a036d3df
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a036d3df
 Hackers / int_a0db7803
type
It's Personal
 Hackers / int_a0db7803
comment
It's Personal: Dade, having an existing criminal record, avoided getting involved... until The Plague threatened his mother. Subverted since in the final hacking duel, the Plague targets Dade specifically and cuts him off, but Joey is the one who manages to download the garbage file. And then it's Cereal (with the help of Razor and Blade) who expose the Plague's crimes.
 Hackers / int_a0db7803
featureApplicability
-0.3
 Hackers / int_a0db7803
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a0db7803
 Hackers / int_a18d407b
type
Samus Is a Girl
 Hackers / int_a18d407b
comment
Samus Is a Girl: For the first half of the film, neither Dade nor the audience know that Acid Burn is actually Kate Libby.
 Hackers / int_a18d407b
featureApplicability
1.0
 Hackers / int_a18d407b
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a18d407b
 Hackers / int_a1d48853
type
Stupid Crooks
 Hackers / int_a1d48853
comment
Stupid Crooks: When Joey mentions he hacked a bank in Idaho, the gang points out how stupid he is for hacking across state lines from home.
 Hackers / int_a1d48853
featureApplicability
1.0
 Hackers / int_a1d48853
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a1d48853
 Hackers / int_a3509d95
type
The Password Is Always "Swordfish"
 Hackers / int_a3509d95
comment
The Password Is Always "Swordfish": Or at least it is when whoever chose the password didn't think things throughnote Another nice bit of Truth in Television for the film. At the time, a lot of systems didn't have any way to enforce password complexity, or prevent the use of certain words as a password, allowing lazy/ignorant/uncaring users to compromise security.
 Hackers / int_a3509d95
featureApplicability
1.0
 Hackers / int_a3509d95
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a3509d95
 Hackers / int_a655d21c
type
Calling the Cops on the FBI
 Hackers / int_a655d21c
comment
Calling the Cops on the FBI: The title computer criminals harass their arch enemy, Secret Service agent Richard Gill, by creating a fake criminal record for him that causes the police to arrest him.
 Hackers / int_a655d21c
featureApplicability
1.0
 Hackers / int_a655d21c
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a655d21c
 Hackers / int_a7850fbf
type
Only Known by Their Nickname
 Hackers / int_a7850fbf
comment
Only Known by Their Nickname: ...the hackers mostly refer to each other by their handles. In fact, while each of the main characters' real names are used at least twice, Nikon's real name (Paul Cook) is said only once in passing, so he really is only known by his nickname. Averted with Dade. He doesn't really want to advertise that he's Zero Cool, but beyond Kate saying his new handle once in a dismissive fashion, and Cereal once when he points out the "Crash and Burn" coincidence, no one calls him Crash Override. He's just "Dade" to everyone else.
 Hackers / int_a7850fbf
featureApplicability
-1.0
 Hackers / int_a7850fbf
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a7850fbf
 Hackers / int_a9de87d2
type
Crouching Moron, Hidden Badass
 Hackers / int_a9de87d2
comment
Crouching Moron, Hidden Badass: Joey is portrayed as the consummate dumbass wannabe hacker... except all it takes is a few vague hints from Dade to let him hack into a high security supercomputer, and in the final hacking duel it's implied he was outdoing virtually everyone. ("Yo, Joey's gettin' stupid over here!")
 Hackers / int_a9de87d2
featureApplicability
1.0
 Hackers / int_a9de87d2
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_a9de87d2
 Hackers / int_aa8d0ef0
type
Spell My Name with a "The"
 Hackers / int_aa8d0ef0
comment
Spell My Name with a "The": He's "The Plague", not "Mister Plague". (At which point, Penn follows up with "Mister The Plague".)
 Hackers / int_aa8d0ef0
featureApplicability
1.0
 Hackers / int_aa8d0ef0
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_aa8d0ef0
 Hackers / int_b032e4ed
type
Ms. Fanservice
 Hackers / int_b032e4ed
comment
Ms. Fanservice: Kate. Then again, she's an Angelina Jolie character, so it shouldn't really be surprising.
 Hackers / int_b032e4ed
featureApplicability
1.0
 Hackers / int_b032e4ed
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_b032e4ed
 Hackers / int_b0cd3349
type
Fridge Brilliance
 Hackers / int_b0cd3349
comment
Phreak was using his one prison phone call to tell Acid Burn where he hid the disk. Probably being deliberately vague, since he has no idea who's listening in on his call.
 Hackers / int_b0cd3349
featureApplicability
1.0
 Hackers / int_b0cd3349
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_b0cd3349
 Hackers / int_b58c51d8
type
My Beloved Smother
 Hackers / int_b58c51d8
comment
My Beloved Smother: Joey's and Ramon's mothers. Joey's babies him, orders him to go to bed and shuts down the computer when he's hacking the Gibson (the Plague and Pen Jillette's character both assume that it was him logging out to try to avoid a trace) and when the FBI barges into Ramon's room, Ramon's mother starts dope-slapping him and haranguing him in Gratuitous Spanish so Ramon actually begs the FBI agents to take him away.
 Hackers / int_b58c51d8
featureApplicability
1.0
 Hackers / int_b58c51d8
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_b58c51d8
 Hackers / int_bb18a227
type
It's All About Me
 Hackers / int_bb18a227
comment
It's All About Me: Gill really doesn't know anything about computers, but he loves giving TV interviews where he can puff himself up.
 Hackers / int_bb18a227
featureApplicability
1.0
 Hackers / int_bb18a227
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_bb18a227
 Hackers / int_c3478f1d
type
Badass Bookworm
 Hackers / int_c3478f1d
comment
Badass Bookworm: The hackers. They're not action heroes, but are active, smart, skilled, and ready to fight evil. Kate's even set on going to MIT.
 Hackers / int_c3478f1d
featureApplicability
1.0
 Hackers / int_c3478f1d
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_c3478f1d
 Hackers / int_c420a553
type
We Can Rule Together
 Hackers / int_c420a553
comment
We Can Rule Together: Plague tries to recruit Dade to his side on multiple occasions, though it's ambiguous just how much he meant his offer and how much he was just trying to get the information off of Dade.
 Hackers / int_c420a553
featureApplicability
1.0
 Hackers / int_c420a553
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_c420a553
 Hackers / int_c75df49a
type
Shout-Out
 Hackers / int_c75df49a
comment
Shout-Out: Dade's first hack as a teen starts with a Bavarian Fire Drill using the pseudonym Eddie Vedder. Kate's boyfriend refers to Dade and his friends as 'Leopard Boy and the Decepticons.' Cereal Killer's real name is "Emmanuel Goldstein", likely a reference to 2600 founder and editor Eric Corley (a consultant on the film), who himself uses the name as a reference to the figurehead enemy of Big Brother in George Orwell's Nineteen Eighty-Four." Cereal himself namedrops 1984 in an early scene. Plague's alias in the aircraft was "Mr. Babbage". Charles Babbage was credited as the originator of the concept for the programmable computer. The elite supercomputers of the movie are called "Gibsons" which is a nod to William Gibson. This also counts as artistic license, as such machines are more typically called "Big Iron" (a term also used in the film). You talkin' to me? Right before the assault on the Gibson, Cereal lets out a shriek, calling it a "tension breaker". This mirrors a scene before the final exam in the 1987 Mark Harmon comedy Summer School. Crash Override's TV show of choice is The Outer Limits. One film from the montage of fight scenes in the first Crash and Burn duel is the climactic sword fight from Captain Blood. Phreak to Joey: "Hey, Boy Meets World, let's go."
 Hackers / int_c75df49a
featureApplicability
1.0
 Hackers / int_c75df49a
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_c75df49a
 Hackers / int_c8146364
type
Portmanteau Couple Name
 Hackers / int_c8146364
comment
Portmanteau Couple Name: invoked Played with, as parts of Dade's ("Crash Override") and Kate's ("Acid Burn") handles come together to make an amusing title. ("Crash and Burn"). Dade even gets the lights of the buildings across from the pool to spell out "Crash and Burn."
 Hackers / int_c8146364
featureApplicability
1.0
 Hackers / int_c8146364
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_c8146364
 Hackers / int_c89824f7
type
Cyberpunk Is Techno
 Hackers / int_c89824f7
comment
Cyber Punk Is Techno: The soundtrack (released over three volumes) was pretty much a pantheon of 90's electronic music.
 Hackers / int_c89824f7
featureApplicability
1.0
 Hackers / int_c89824f7
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_c89824f7
 Hackers / int_cc4b45f6
type
Word of God
 Hackers / int_cc4b45f6
comment
Director Iain Softley said the visuals were meant to be metaphorical rather than accurate, trying to capture an LSD-like look for the hacking scenes.
 Hackers / int_cc4b45f6
featureApplicability
1.0
 Hackers / int_cc4b45f6
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_cc4b45f6
 Hackers / int_d01cffbc
type
Badass Longcoat
 Hackers / int_d01cffbc
comment
Badass Longcoat: The Plague works longcoats into his wardrobe constantly, although they're a bit more flamboyant than the usual example.
 Hackers / int_d01cffbc
featureApplicability
1.0
 Hackers / int_d01cffbc
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_d01cffbc
 Hackers / int_d1cedb73
type
Slap-Slap-Kiss
 Hackers / int_d1cedb73
comment
Slap-Slap-Kiss: Due to Dade's nervousness over his crush on Kate, their relationship ends up like this.
 Hackers / int_d1cedb73
featureApplicability
1.0
 Hackers / int_d1cedb73
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_d1cedb73
 Hackers / int_d2c0e2ed
type
Schmuck Bait
 Hackers / int_d2c0e2ed
comment
Schmuck Bait: Dade falls for the classic high school prank of the nonexistent rooftop pool.
 Hackers / int_d2c0e2ed
featureApplicability
1.0
 Hackers / int_d2c0e2ed
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_d2c0e2ed
 Hackers / int_db9940c4
type
Famed In-Story
 Hackers / int_db9940c4
comment
In universe, the heroes have no idea that Dade (who they think is a talented amateur) is the Famed In-Story Zero Cool.
 Hackers / int_db9940c4
featureApplicability
1.0
 Hackers / int_db9940c4
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_db9940c4
 Hackers / int_dc579c91
type
Contrived Coincidence
 Hackers / int_dc579c91
comment
Contrived Coincidence: Looking for something to take to prove he managed to get inside Ellingson's Gibson, Joey decides to download a seemingly unimportant garbage file - that just happens to be the worm that Plague's using to embezzle from the company. Slightly justified by A. Hiding a file by making it look like a garbage file is a good move, and B. A garbage file being the only thing you copy while hacking into a big mainframe is also a good idea - it's not proprietary information that the company will spend lots of time and effort going after.
 Hackers / int_dc579c91
featureApplicability
1.0
 Hackers / int_dc579c91
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_dc579c91
 Hackers / int_dcbe8a6e
type
Chekhov's Gunman
 Hackers / int_dcbe8a6e
comment
Chekhov's Gunman: "Welcome to Hack the Planet..."
 Hackers / int_dcbe8a6e
featureApplicability
1.0
 Hackers / int_dcbe8a6e
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_dcbe8a6e
 Hackers / int_dded28f2
type
Playful Hacker
 Hackers / int_dded28f2
comment
Playful Hacker: There's even a quote from Loyd Blankenship's famous "Hacker's Manifesto". Agent Ray thinks it's "cool".
 Hackers / int_dded28f2
featureApplicability
1.0
 Hackers / int_dded28f2
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_dded28f2
 Hackers / int_e022585
type
Television Geography
 Hackers / int_e022585
comment
Television Geography: On their way to Grand Central, Cereal and Nikon run down MacDougal St (just off Washington Square Park, where they were playing chess) and turn the corner directly onto... what looks like South Broadway at 23rd St. Impressive. For non-New Yorkers, that's a distance of about a mile depending on where they started and stopped.
 Hackers / int_e022585
featureApplicability
1.0
 Hackers / int_e022585
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_e022585
 Hackers / int_e624f0e8
type
Suspiciously Specific Denial
 Hackers / int_e624f0e8
comment
Cereal and Phreak deny knowing who Acid Burn is. They even share a knowing look when asked who "he" is.
 Hackers / int_e624f0e8
featureApplicability
1.0
 Hackers / int_e624f0e8
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_e624f0e8
 Hackers / int_e6a901a3
type
Meaningful Rename
 Hackers / int_e6a901a3
comment
Meaningful Rename: The whole point to hacker handles. Dade got arrested ("crashed") but now he's back ("override"). Also, 'Lord Nikon', to reference the hacker's photographic memory'. Given his affinity for hacker and counter-cultural lore, Cereal Killer's handle may be an obtuse reference to John "Cap'n Crunch" Draper.
 Hackers / int_e6a901a3
featureApplicability
1.0
 Hackers / int_e6a901a3
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_e6a901a3
 Hackers / int_eb81c601
type
Big Damn Heroes
 Hackers / int_eb81c601
comment
Big Damn Heroes: Razor and Blade get their moment, leading an army of hackers from around the world.
 Hackers / int_eb81c601
featureApplicability
1.0
 Hackers / int_eb81c601
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_eb81c601
 Hackers / int_eb8ec7c8
type
Jerkass
 Hackers / int_eb8ec7c8
comment
Jerkass: The Plague certainly is one. All the Secret Service agents, save Agent Ray. Agent Richard Gill is a Jerkass Boss.
 Hackers / int_eb8ec7c8
featureApplicability
1.0
 Hackers / int_eb8ec7c8
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_eb8ec7c8
 Hackers / int_f5c505db
type
The Cracker
 Hackers / int_f5c505db
comment
The Cracker: The Plague.
 Hackers / int_f5c505db
featureApplicability
1.0
 Hackers / int_f5c505db
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_f5c505db
 Hackers / int_f6507695
type
Everything Is Online
 Hackers / int_f6507695
comment
Everything Is Online: Including school sprinkler systems and tankers.
 Hackers / int_f6507695
featureApplicability
1.0
 Hackers / int_f6507695
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_f6507695
 Hackers / int_f88f2449
type
Downer Beginning
 Hackers / int_f88f2449
comment
Downer Beginning: The film starts with the 1988 arrest and trial of then-11 year old Dade Murphy, then known as "Zero Cool", for crashing 1,507 computers with his computer virus. Dade would be sentenced to probation, where he is forbidden from owning or operating a computer or phone until he turns 18 years old.
 Hackers / int_f88f2449
featureApplicability
1.0
 Hackers / int_f88f2449
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_f88f2449
 Hackers / int_faece9aa
type
The Power of Friendship
 Hackers / int_faece9aa
comment
The Power of Friendship: Or the power of community, anyway.
 Hackers / int_faece9aa
featureApplicability
1.0
 Hackers / int_faece9aa
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_faece9aa
 Hackers / int_fbb7e624
type
Tech Bro
 Hackers / int_fbb7e624
comment
Tech Bro: A prototypical example, as this film was made decades before the stereotype fully emerged in The New '10s. Despite being hardcore computer geeks who gush over Kate's top-of-the-line laptop, the hackers are all hip, rowdy and in-shape teenagers that hang out in the Coolest Club Ever. The Big Bad is a corporate security consultant with an equally irreverent attitude, and is introduced riding through his employer's data center on a skateboard.
 Hackers / int_fbb7e624
featureApplicability
1.0
 Hackers / int_fbb7e624
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_fbb7e624
 Hackers / int_fc1d7df0
type
Cyberbullying
 Hackers / int_fc1d7df0
comment
Cyberbullying: The clique at Dade Murphy's new school learn that Federal agent Dick Gill has sworn to track, identify and nullify "internet terrorists." This is the clique's Berserk Button, whereupon they amass as much personal data on Agent Gill as they can, then monkey-wrench his life. Most notably, while dining in an expensive restaurant with his wife and some friends, his credit card gets snipped in two on the spot as though he were some deadbeat.
 Hackers / int_fc1d7df0
featureApplicability
1.0
 Hackers / int_fc1d7df0
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_fc1d7df0
 Hackers / int_fe0330fb
type
Brick Joke
 Hackers / int_fe0330fb
comment
Brick Joke: The pool on the roof is used as a gag twice, then as a romantic locale in the final scene. Phreak uses a tone recording in Cyberdelia to avoid paying for a payphone. Later, Razor and Blade's Hack the Planet show has them explaining how it works. Dade's first and last on-screen hacks use the Badass Boast, "Mess With The Best, Die Like The Rest." The major situation starts due to Joey finding and partially download the garbage file, which leads him and his friends into trouble. The second time he participates in a hack against the Plague, he is the one who downloads the file completely, which leads to getting him and his friends out of trouble.
 Hackers / int_fe0330fb
featureApplicability
1.0
 Hackers / int_fe0330fb
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_fe0330fb
 Hackers / int_fe5e40e2
type
Gondor Calls for Aid
 Hackers / int_fe5e40e2
comment
Gondor Calls for Aid: During the climatic last battle of the movie, Razor and Blade (who suggested this plan in the first place), along with hackers from England, Japan, Russia, and Italy (and presumably other countries as well) digitally join in with the crew in New York to hammer the Gibson under Plague's — by this point almost manic — control.
 Hackers / int_fe5e40e2
featureApplicability
1.0
 Hackers / int_fe5e40e2
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_fe5e40e2
 Hackers / int_fea27091
type
Buffy Speak
 Hackers / int_fea27091
comment
Buffy Speak: "It's in that place where I put that thing that time." Phreak was using his one prison phone call to tell Acid Burn where he hid the disk. Probably being deliberately vague, since he has no idea who's listening in on his call. Incidentally, "that place" is behind a condom dispenser in the boys' bathroom. What exactly was he hiding? A hacker named Plague? THE Plague. Mr The Plague is also acceptable.
 Hackers / int_fea27091
featureApplicability
1.0
 Hackers / int_fea27091
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_fea27091
 Hackers / int_ff7f34c5
type
Pet the Dog
 Hackers / int_ff7f34c5
comment
Pet the Dog: After being at her wits' end with Dade for the last seven years due to his hacking addiction and the massive amounts of legal and financial trouble it's caused their family, Dade's mother calmly tells the FBI that her son is a genius, and on the cutting edge of a new global paradigm that none of them can understand. As the intercom is on at the time, both Dade and Kate overhear this and are incredibly touched.
 Hackers / int_ff7f34c5
featureApplicability
1.0
 Hackers / int_ff7f34c5
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_ff7f34c5
 Hackers / int_name
type
ItemName
 Hackers / int_name
comment
 Hackers / int_name
featureApplicability
1.0
 Hackers / int_name
featureConfidence
1.0
 Hackers
hasFeature
Hackers / int_name
 Hackers / int_name
itemName
Hackers

The following is a list of statements referring to the current page from other pages.

 Hackers
hasFeature
Addiction Displacement / int_33fd91eb
 Hackers
hasFeature
Bavarian Fire Drill / int_33fd91eb
 Hackers
hasFeature
Black and Nerdy / int_33fd91eb
 Hackers
hasFeature
Calling the Cops on the FBI / int_33fd91eb
 Hackers
hasFeature
Catapult Nightmare / int_33fd91eb
 Hackers
hasFeature
Chaotic Neutral / int_33fd91eb
 Hackers
hasFeature
Class Clown / int_33fd91eb
 Hackers
hasFeature
Computer Virus / int_33fd91eb
 Hackers
hasFeature
Coolest Club Ever / int_33fd91eb
 Hackers
hasFeature
Credit Card Destruction / int_33fd91eb
 Hackers
hasFeature
Cult Soundtrack / int_33fd91eb
 Hackers
hasFeature
Cyberpunk / int_33fd91eb
 Hackers
hasFeature
Cyberpunk Is Techno / int_33fd91eb
 Hackers
hasFeature
Cyberbullying / int_33fd91eb
 Hackers
hasFeature
Dead Drop / int_33fd91eb
 Hackers
hasFeature
Do Not Adjust Your Set / int_33fd91eb
 Hackers
hasFeature
Dueling Hackers / int_33fd91eb
 Hackers
hasFeature
Dumpster Dive / int_33fd91eb
 Hackers
hasFeature
Earth Is a Battlefield / int_33fd91eb
 Hackers
hasFeature
Erotic Dream / int_33fd91eb
 Hackers
hasFeature
Everything Is Online / int_33fd91eb
 Hackers
hasFeature
Extreme Graphical Representation / int_33fd91eb
 Hackers
hasFeature
Films of 1995–1999 / int_33fd91eb
 Hackers
hasFeature
Good Is Boring / int_33fd91eb
 Hackers
hasFeature
Gratuitous Spanish / int_33fd91eb
 Hackers
hasFeature
Hacked by a Pirate / int_33fd91eb
 Hackers
hasFeature
Hacker Cave / int_33fd91eb
 Hackers
hasFeature
Hacker Collective / int_33fd91eb
 Hackers
hasFeature
Hackette / int_33fd91eb
 Hackers
hasFeature
Hard-Work Montage / int_33fd91eb
 Hackers
hasFeature
Hollywood Hacking / int_33fd91eb
 Hackers
hasFeature
Humiliating Wager / int_33fd91eb
 Hackers
hasFeature
I Call It "Vera" / int_33fd91eb
 Hackers
hasFeature
Job Title / int_33fd91eb
 Hackers
hasFeature
Last Chance to Quit / int_33fd91eb
 Hackers
hasFeature
Legally Dead / int_33fd91eb
 Hackers
hasFeature
Master Computer / int_33fd91eb
 Hackers
hasFeature
Mexicans Love Speedy Gonzales / int_33fd91eb
 Hackers
hasFeature
Mobstacle Course / int_33fd91eb
 Hackers
hasFeature
My Hero, Zero / int_33fd91eb
 Hackers
hasFeature
Names Given to Computers / int_33fd91eb
 Hackers
hasFeature
/ int_33fd91eb
 Hackers
hasFeature
Neutral Evil / int_33fd91eb
 Hackers
hasFeature
New Media Are Evil / int_33fd91eb
 Hackers
hasFeature
One Phone Call / int_33fd91eb
 Hackers
hasFeature
Online Alias / int_33fd91eb
 Hackers
hasFeature
Penny Shaving / int_33fd91eb
 Hackers
hasFeature
Phone-Trace Race / int_33fd91eb
 Hackers
hasFeature
Photographic Memory / int_33fd91eb
 Hackers
hasFeature
Playful Hacker / int_33fd91eb
 Hackers
hasFeature
Public Secret Message / int_33fd91eb
 Hackers
hasFeature
Realpolitik / int_33fd91eb
 Hackers
hasFeature
Rollerblade Good / int_33fd91eb
 Hackers
hasFeature
Skyscraper Messages / int_33fd91eb
 Hackers
hasFeature
Smart People Play Chess / int_33fd91eb
 Hackers
hasFeature
Spell My Name with a "The" / int_33fd91eb
 Hackers
hasFeature
Surveillance Station Slacker / int_33fd91eb
 Hackers
hasFeature
Tactical Reminiscence / int_33fd91eb
 Hackers
hasFeature
Tech Bro / int_33fd91eb
 Hackers
hasFeature
Telepathic Sprinklers / int_33fd91eb
 Hackers
hasFeature
The Foreign Subtitle / int_33fd91eb
 Hackers
hasFeature
The Password Is Always "Swordfish" / int_33fd91eb
 Hackers
hasFeature
There Are No Girls on the Internet / int_33fd91eb
 Hackers
hasFeature
Tropaholics Anonymous / int_33fd91eb
 Hackers
hasFeature
Two-Person Pool Party / int_33fd91eb
 Hackers
hasFeature
Typeset in the Future / int_33fd91eb
 Hackers
hasFeature
Viewer-Friendly Interface / int_33fd91eb
 Hackers
hasFeature
Wager Slave / int_33fd91eb
 Hackers
hasFeature
Wrongful Accusation Insurance / int_33fd91eb