...it's like TV Tropes, but LINKED DATA!
Hackers
- 529 statements
- 102 feature instances
- 69 referencing feature instances
Hackers | type |
TVTItem | |
Hackers | label |
Hackers | |
Hackers | page |
Hackers | |
Hackers | comment |
A 1995 techno-thriller directed by Iain Softley, about a small group of underground computer hackers who discover a scheme being run by the security chief of a large corporation.In a prologue flashback, Dade Murphy, age 11, going by the hacker alias Zer0 Cool, is found guilty of crashing 1,507 computers, and single-handedly causing a drop in the New York Stock Exchange. In deference to his age, he is sentenced to seven years of probation, in which he is forbidden from owning or operating a computer or touch-tone telephone.Fast forward seven years: Dade's mother, now divorced and with full custody of Dade (Jonny Lee Miller), moves them both to New York for a fresh start. Dade struggles to make friends, but ends up falling in with a new hacking crowd, including Phantom Phreak (Renoly Santiago), Cereal Killer (Matthew Lillard), Lord Nikon (Laurence Mason)... and Joey (Jesse Bradford). Not long after, Joey, the kid of the group, breaks into a supercomputer at Ellingson, a large oil and mineral conglomerate. In a Contrived Coincidence, he downloads part of a worm program — one created by the crooked head of IT Security for Ellingson, Eugene "the Plague" Belford (Fisher Stevens), himself a hacker gone pro. Belford is using the worm to quietly embezzle many millions of dollars from Ellingson.Seeing an opportunity, the security chief creates a virus called daVinci - which threatens to infect and sink several Ellingson oil tankers, thus causing a major global ecological disaster. Having 'found' the virus, Belford presents the virus's threat as a reason to contact the Secret Service to help find the intruder. When the Secret Service investigates with Ellingson's cooperation, Belford discovers Dade (and his past as Zer0 Cool) and pressures him to get the file Joey downloaded - ultimately threatening to alter law enforcement databases so his mother gets "disappeared into the system." Dade gets Belford the file - but realizes his mistake soon after. Now, it's up to Dade, Phreak, Cereal, Nikon, and Kate (Angelina Jolie), Dade's crush, herself the hacker Acid Burn, to figure out the truth, and get the evidence they need to clear their names.Hackers is known for referencing top-of-the-line computers of the time (now horribly, horribly outdated) and unrealistic depictions of hacking, but it nevertheless remains quite entertaining. It's also notable as being one of the earliest appearances of Angelina Jolie, who plays Dade's love interest, Kate. (Miller and Jolie would end up getting married not long after the movie finished - it was the first marriage for them both, and it ended up falling apart not long after.) While real computer hackers will sneer at the movie in public (except for those who find the research failure to be funny as HELL), secretly they desperately wish that it were true: it's a world where hackers are slim and trendy, hackers save the world from evil corporations, and most importantly, Angelina Jolie ditches her jock boyfriend for a hacker.Another thing that was notable about the movie is that this also features the prototype footage for a certain anti-gravity racing game series... | |
Hackers | fetched |
2024-02-04T01:00:16Z | |
Hackers | parsed |
2024-02-04T01:00:16Z | |
Hackers | processingComment |
Dropped link to BoyMeetsWorld: Not a Feature - ITEM | |
Hackers | processingComment |
Dropped link to CaptainBlood: Not a Feature - ITEM | |
Hackers | processingComment |
Dropped link to Fanservice: Not a Feature - IGNORE | |
Hackers | processingComment |
Dropped link to Foil: Not a Feature - IGNORE | |
Hackers | processingComment |
Dropped link to NineteenEightyFour: Not a Feature - ITEM | |
Hackers | processingComment |
Dropped link to SummerSchool: Not a Feature - ITEM | |
Hackers | processingComment |
Dropped link to TaxiDriver: Not a Feature - ITEM | |
Hackers | processingComment |
Dropped link to TheMillenniumTrilogy: Not a Feature - ITEM | |
Hackers | processingComment |
Dropped link to TheNineties: Not a Feature - IGNORE | |
Hackers | processingComment |
Dropped link to TheOuterLimits1963: Not a Feature - ITEM | |
Hackers | processingComment |
Dropped link to Transformers: Not a Feature - ITEM | |
Hackers | isPartOf |
DBTropes | |
Hackers / int_16178c64 | type |
Gratuitous Spanish | |
Hackers / int_16178c64 | comment |
Gratuitous Spanish: LA COMPUTADORA DE MIERDA! note The phrase Phreak's mom said when his son was arrested for hacking. In the Spanish dubbing, this phrase was softened. | |
Hackers / int_16178c64 | featureApplicability |
1.0 | |
Hackers / int_16178c64 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_16178c64 | |
Hackers / int_18d15922 | type |
Title Drop | |
Hackers / int_18d15922 | comment |
Title Drop: Yeah, the word "hackers" gets tossed around a lot throughout the film. There is also a Tagline drop, too (the "Their Crime Is Curiosity" one on the poster above): it's part of Loyd Blankenship's "Hacker's Manifesto", which is read aloud by Agent Ray during a stakeout early on. | |
Hackers / int_18d15922 | featureApplicability |
1.0 | |
Hackers / int_18d15922 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_18d15922 | |
Hackers / int_1c79ae8c | type |
Those Two Guys | |
Hackers / int_1c79ae8c | comment |
Those Two Guys: Razor and Blade, hosts of "Hack the Planet". | |
Hackers / int_1c79ae8c | featureApplicability |
1.0 | |
Hackers / int_1c79ae8c | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_1c79ae8c | |
Hackers / int_1fc325dd | type |
Do Not Adjust Your Set | |
Hackers / int_1fc325dd | comment |
Do Not Adjust Your Set: How our hackers were cleared after being framed. | |
Hackers / int_1fc325dd | featureApplicability |
1.0 | |
Hackers / int_1fc325dd | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_1fc325dd | |
Hackers / int_20989d05 | type |
Parents as People | |
Hackers / int_20989d05 | comment |
Parents as People: Dade's mom gets a lot of development as her own person, rather than simply "a parent." | |
Hackers / int_20989d05 | featureApplicability |
1.0 | |
Hackers / int_20989d05 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_20989d05 | |
Hackers / int_22cf536c | type |
Chekhov's Gun | |
Hackers / int_22cf536c | comment |
Chekhov's Gun: The discussion of common passwords both serves as setup for a soon-to-follow scene and a Brick Joke. Even more of a Chekov's Gun when we discover that Plague's partner in crime and woman he's been sleeping with, Margo, is the one the password belongs to (and he would probably know her sleep schedule). | |
Hackers / int_22cf536c | featureApplicability |
1.0 | |
Hackers / int_22cf536c | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_22cf536c | |
Hackers / int_237404cc | type |
Ironic Echo | |
Hackers / int_237404cc | comment |
Ironic Echo: "You talkin' to me?" | |
Hackers / int_237404cc | featureApplicability |
1.0 | |
Hackers / int_237404cc | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_237404cc | |
Hackers / int_2439b588 | type |
As the Good Book Says... | |
Hackers / int_2439b588 | comment |
As the Good Book Says...: Cereal Killer quotes Corinthians to try to get Dade and Kate to set aside their differences: | |
Hackers / int_2439b588 | featureApplicability |
1.0 | |
Hackers / int_2439b588 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_2439b588 | |
Hackers / int_26eb6287 | type |
Funny Background Event | |
Hackers / int_26eb6287 | comment |
Funny Background Event: When the FBI agent is being interviewed on the news, he is going on about how hackers are dangerous criminals, while Joey, who they just arrested, can be seen in the background sucking his thumb. Although neither Kate, nor Dade, is shown doing this, during the scene in the restaurant where Gill's credit card is being cut, you can also see his car through the window. Being towed. During the montage of Dade poring through the garbage file while the others looks through a mountain of printed hardcopy, there are split second cuts of Kate and Cereal tango dancing, Nikon strangling Cereal, and Kate stabbing a sheaf of printer paper with a katana. | |
Hackers / int_26eb6287 | featureApplicability |
1.0 | |
Hackers / int_26eb6287 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_26eb6287 | |
Hackers / int_28c1d543 | type |
Defrosting Ice Queen | |
Hackers / int_28c1d543 | comment |
Of course, this reveals that at that point, Kate was essentially agreeing that she'd go on a date with him either way. | |
Hackers / int_28c1d543 | featureApplicability |
1.0 | |
Hackers / int_28c1d543 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_28c1d543 | |
Hackers / int_2aea880 | type |
Dueling Hackers | |
Hackers / int_2aea880 | comment |
Dueling Hackers: Part of the climax. Earlier, the duel between Crash and Burn. | |
Hackers / int_2aea880 | featureApplicability |
1.0 | |
Hackers / int_2aea880 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_2aea880 | |
Hackers / int_2be271c7 | type |
Hollywood Hacking | |
Hackers / int_2be271c7 | comment |
Hollywood Hacking: The Movie. Not just Rapid-Fire Typing, but in spinning phone booths with VR goggles! Albeit oddly averted for one scene where they trace through page after page of hardcopy coredump, something familiar with many people trying to figure out why the OS entered kernel panic. As Roger Ebert pointed out in his (positive!) review, what real hacking looks like, and what real hackers can actually accomplish are both pretty boring, at least for an audience to watch. That said, in the final hacking duel, Dade has to read the full file code to Joey, with roots and slashes and all. Director Iain Softley said the visuals were meant to be metaphorical rather than accurate, trying to capture an LSD-like look for the hacking scenes. It also fairly accurately depicts some of the things about hacking at the time, in that it was mostly based around social engineering, fast talking, taking advantage of the ignorance of the standard user, and dumpster diving. (Dade gets access to the TV station by literally calling in and getting a security guard to read him the information he needs to access the modem... something that would become outmoded with the standardization of caller ID, firewalls, and other defenses the early internet didn't typically have.) | |
Hackers / int_2be271c7 | featureApplicability |
-1.0 | |
Hackers / int_2be271c7 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_2be271c7 | |
Hackers / int_2bfb1856 | type |
Beard of Evil | |
Hackers / int_2bfb1856 | comment |
Beard of Evil: The Plague. | |
Hackers / int_2bfb1856 | featureApplicability |
1.0 | |
Hackers / int_2bfb1856 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_2bfb1856 | |
Hackers / int_2c9e262 | type |
Catapult Nightmare | |
Hackers / int_2c9e262 | comment |
Catapult Nightmare: After Dade Murphy has a visit from the authorities, he has a dream where his Slap-Slap-Kiss Love Interest Kate enters his room and starts kissing him, then the authorities enter and arrest them. He wakes up and sits up in bed. Kate gets one too, except it's not a nightmare - but her erotic dream about Dade. | |
Hackers / int_2c9e262 | featureApplicability |
1.0 | |
Hackers / int_2c9e262 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_2c9e262 | |
Hackers / int_2dc0d2bf | type |
Hidden Depths | |
Hackers / int_2dc0d2bf | comment |
Hidden Depths: Did anyone expect Cereal Killer to use a Bible quote in a motivational speech? In universe, the heroes have no idea that Dade (who they think is a talented amateur) is the Famed In-Story Zero Cool. | |
Hackers / int_2dc0d2bf | featureApplicability |
1.0 | |
Hackers / int_2dc0d2bf | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_2dc0d2bf | |
Hackers / int_2fbab42f | type |
Wrongful Accusation Insurance | |
Hackers / int_2fbab42f | comment |
Wrongful Accusation Insurance: In the course of stopping the tankers from capsizing and obtaining the evidence of the real villain's embezzlement scheme, the heroes commit several instances of network intrusion and related crimes, involving a global conspiracy to grind Ellingson's server to a halt while looking for the MacGuffin. Yet the Secret Service apparently doesn't prosecute them for it, since we see Dade and Kate living (more or less) happily ever after at the end. This is most likely because the truth (which was broadcast worldwide by other hackers) embarrassed the SS to no end - Essentially, The Plague manipulated the SS into assisting him in terrorism-for-blackmail. Also, the hackers complete destruction of the Ellingson Supercomputer actually averted a worldwide global disaster, a whole fleet of oil tankers capsizing in oceans the world over, that was actually in the process of beginning when they started the attack. | |
Hackers / int_2fbab42f | featureApplicability |
-1.0 | |
Hackers / int_2fbab42f | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_2fbab42f | |
Hackers / int_309b8806 | type |
Cursed with Awesome | |
Hackers / int_309b8806 | comment |
Cursed with Awesome: Lampshaded by Lord Nikon regarding his Photographic Memory, after he explains that he has memorised the addresses and phone numbers of every girl at the party they attend: Played a bit more straight later on when he's spent an entire day accumulating data to the point that he honestly isn't sure what's useful and useless. | |
Hackers / int_309b8806 | featureApplicability |
1.0 | |
Hackers / int_309b8806 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_309b8806 | |
Hackers / int_31da1e24 | type |
Shipper on Deck | |
Hackers / int_31da1e24 | comment |
Shipper on Deck: Cereal, and to a lesser extent, Phreak and Nikon, get a kick out of matchmaking Crash and Burn. | |
Hackers / int_31da1e24 | featureApplicability |
1.0 | |
Hackers / int_31da1e24 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_31da1e24 | |
Hackers / int_33cddf79 | type |
Penny Shaving | |
Hackers / int_33cddf79 | comment |
Penny Shaving: The MacGuffin is a worm that steals pennies from every transaction that the Ellingson Mineral Company conducts. A better example than most because the money isn't actually gone; it's just data being shifted around... until it completes its run, transfers the money to a numbered account in the Bahamas and makes a great big mess to cover its tracks. | |
Hackers / int_33cddf79 | featureApplicability |
1.0 | |
Hackers / int_33cddf79 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_33cddf79 | |
Hackers / int_3aec9e5e | type |
Properly Paranoid | |
Hackers / int_3aec9e5e | comment |
Properly Paranoid: Right after Phreak gets the garbage file disk from Joey and sees the Secret Service tail marking Joey, he books it. He makes a clean getaway, but then is shown scrubbing his bedroom of every scrap of paper that might be incriminating evidence. It doesn't help, as he gets arrested because the Service isn't much interested in playing by due process rules anyway. | |
Hackers / int_3aec9e5e | featureApplicability |
1.0 | |
Hackers / int_3aec9e5e | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_3aec9e5e | |
Hackers / int_3c0a4666 | type |
Noodle Incident | |
Hackers / int_3c0a4666 | comment |
Noodle Incident: That time Phreak hid that thing in that place. | |
Hackers / int_3c0a4666 | featureApplicability |
1.0 | |
Hackers / int_3c0a4666 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_3c0a4666 | |
Hackers / int_3ec468b8 | type |
Online Alias | |
Hackers / int_3ec468b8 | comment |
Online Alias: Most people use two word phrases, like Acid Burn or Crash Override. Which leads to... | |
Hackers / int_3ec468b8 | featureApplicability |
1.0 | |
Hackers / int_3ec468b8 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_3ec468b8 | |
Hackers / int_40bb59d0 | type |
Blatant Lies | |
Hackers / int_40bb59d0 | comment |
Blatant Lies: Cereal Killer fingers Joey as the fiend who finished all the french fries. Nobody falls for it, since Cereal has been munching on them for an entire scene. Cereal and Phreak deny knowing who Acid Burn is. They even share a knowing look when asked who "he" is. | |
Hackers / int_40bb59d0 | featureApplicability |
1.0 | |
Hackers / int_40bb59d0 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_40bb59d0 | |
Hackers / int_48507284 | type |
Credit Card Destruction | |
Hackers / int_48507284 | comment |
Credit Card Destruction: The main FBI agent's credit card is shredded at a restaurant after his account has been hacked. | |
Hackers / int_48507284 | featureApplicability |
1.0 | |
Hackers / int_48507284 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_48507284 | |
Hackers / int_494885c6 | type |
Humiliating Wager | |
Hackers / int_494885c6 | comment |
Humiliating Wager: Dade Murphy and Kate Libby have a contest to see who's the best hacker. If Murphy wins then Kate will go on a date with him, if Kate wins Murphy will do scut work for her. In a later round of the contest they make another bet: whoever loses will have to wear a dress during their date. Of course, this reveals that at that point, Kate was essentially agreeing that she'd go on a date with him either way. | |
Hackers / int_494885c6 | featureApplicability |
1.0 | |
Hackers / int_494885c6 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_494885c6 | |
Hackers / int_4af55b78 | type |
Credits Gag | |
Hackers / int_4af55b78 | comment |
Credits Gag: Special Agent Richard Gill is listed in the credits as "Dick Gill." | |
Hackers / int_4af55b78 | featureApplicability |
1.0 | |
Hackers / int_4af55b78 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_4af55b78 | |
Hackers / int_4b2c373 | type |
Impractically Fancy Outfit | |
Hackers / int_4b2c373 | comment |
Impractically Fancy Outfit: Given the nature of the movie and the counter-culture being represented, it's hardly surprising that quite a few of the outfits in the movie, while stylish, come off as impractical. Oddly inverted when Dade runs after Plague's limo after giving him the floppy. It's clear from the lighting that there is a strap connecting the legs of his pants near the knee but it doesn't seem to hamper his running abilities. During the club scene where Crash and Burn go to recruit Razor and Blade, one extra is prominently seen...dressed as a chandelier. Her headwear alone is this trope up to 11. | |
Hackers / int_4b2c373 | featureApplicability |
1.0 | |
Hackers / int_4b2c373 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_4b2c373 | |
Hackers / int_4b39c18 | type |
Taking the Heat | |
Hackers / int_4b39c18 | comment |
Taking the Heat: After their arrest following the climactic run on the Gibson, Dade and Kate are being interrogated together — Kate is playing silent, but Dade is copping out and claiming full responsibility, and that Kate is 'just his girlfriend.' After they get left alone for a few moments, Kate asks Dade what he's doing, because they know full well they're both equally involved. It's clear Dade knows he's screwed thanks to his record, but Kate could get out with just a warning or probation like he did as a kid if he does this. Fortunately, this gets interrupted with Cereal's Do Not Adjust Your Set moment, revealing Plague's evil plan. | |
Hackers / int_4b39c18 | featureApplicability |
1.0 | |
Hackers / int_4b39c18 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_4b39c18 | |
Hackers / int_4f84cdef | type |
Smug Snake | |
Hackers / int_4f84cdef | comment |
Smug Snake: The Plague. Oh goodness, The Plague. | |
Hackers / int_4f84cdef | featureApplicability |
1.0 | |
Hackers / int_4f84cdef | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_4f84cdef | |
Hackers / int_5369c081 | type |
Invisible Parents | |
Hackers / int_5369c081 | comment |
Invisible Parents: Although Kate's mother Ruth Libby is mentioned as being a bestselling self-help and relationship advice author (which explains why Kate has a top-of-the-line laptop), she's not ever seen, even at Kate's party. There's no mention of a dad at all - though one might explain that as a case of The Cobbler's Children Have No Shoes. Cereal Killer goes to the same high school as Dade, Kate, Phreak and Joey, but considering how often he asks to crash on other's couches - he might actually be homeless and on his own. | |
Hackers / int_5369c081 | featureApplicability |
1.0 | |
Hackers / int_5369c081 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_5369c081 | |
Hackers / int_5535272c | type |
Coolest Club Ever | |
Hackers / int_5535272c | comment |
Coolest Club Ever: Cyberdelia, an appropriate 'cyber-nightclub that has a full complement of skate ramps, a video game console about as large as a mid-sized room (featuring an alpha version of WipEout), and of course, techno music ("Cowgirl" by Underworld). It's also by invite only. | |
Hackers / int_5535272c | featureApplicability |
1.0 | |
Hackers / int_5535272c | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_5535272c | |
Hackers / int_562abd51 | type |
Let's Get Dangerous! | |
Hackers / int_562abd51 | comment |
Let's Get Dangerous!: Phreak getting arrested brings Dade, Kate, Cereal, and Nikon together into a true team to figure out the truth and how to clear their names. | |
Hackers / int_562abd51 | featureApplicability |
1.0 | |
Hackers / int_562abd51 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_562abd51 | |
Hackers / int_5f252b8b | type |
One Phone Call | |
Hackers / int_5f252b8b | comment |
One Phone Call: When Ramon gets arrested. | |
Hackers / int_5f252b8b | featureApplicability |
1.0 | |
Hackers / int_5f252b8b | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_5f252b8b | |
Hackers / int_5fcedca | type |
Big Eater | |
Hackers / int_5fcedca | comment |
Big Eater: Cereal Killer is constantly munching on snacks when with the group, just like another character that Matthew Lillard would go on to play. The fact that he went off to get a snack is the reason he doesn't get picked up later at Grand Central. | |
Hackers / int_5fcedca | featureApplicability |
1.0 | |
Hackers / int_5fcedca | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_5fcedca | |
Hackers / int_5fdf73bc | type |
Photographic Memory | |
Hackers / int_5fdf73bc | comment |
Photographic Memory: Lord Nikon has one. Among other things, he has memorized the addresses and phone numbers of every girl at the party they attend. | |
Hackers / int_5fdf73bc | featureApplicability |
1.0 | |
Hackers / int_5fdf73bc | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_5fdf73bc | |
Hackers / int_62fd5552 | type |
Bavarian Fire Drill | |
Hackers / int_62fd5552 | comment |
Dade's first hack as a teen starts with a Bavarian Fire Drill using the pseudonym Eddie Vedder. | |
Hackers / int_62fd5552 | featureApplicability |
1.0 | |
Hackers / int_62fd5552 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_62fd5552 | |
Hackers / int_66b98472 | type |
Erotic Dream | |
Hackers / int_66b98472 | comment |
Erotic Dream: Dade has one about Kate - that turns into a nightmare. Kate has an especially erotic dream about Dade. | |
Hackers / int_66b98472 | featureApplicability |
1.0 | |
Hackers / int_66b98472 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_66b98472 | |
Hackers / int_6ca5a8c2 | type |
Master Computer | |
Hackers / int_6ca5a8c2 | comment |
The elite supercomputers of the movie are called "Gibsons" which is a nod to William Gibson. This also counts as artistic license, as such machines are more typically called "Big Iron" (a term also used in the film). | |
Hackers / int_6ca5a8c2 | featureApplicability |
1.0 | |
Hackers / int_6ca5a8c2 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_6ca5a8c2 | |
Hackers / int_6d5fb1e0 | type |
Waistcoat of Style | |
Hackers / int_6d5fb1e0 | comment |
Waistcoat of Style: Part of The Plague's standard attire. | |
Hackers / int_6d5fb1e0 | featureApplicability |
1.0 | |
Hackers / int_6d5fb1e0 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_6d5fb1e0 | |
Hackers / int_71384f0e | type |
Two-Person Pool Party | |
Hackers / int_71384f0e | comment |
Two-Person Pool Party: How Dade and Kate celebrate their victory. In a pool on a roof. | |
Hackers / int_71384f0e | featureApplicability |
1.0 | |
Hackers / int_71384f0e | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_71384f0e | |
Hackers / int_7bd44eb9 | type |
Smart People Play Chess | |
Hackers / int_7bd44eb9 | comment |
Smart People Play Chess: With only a few hours until everyone's plans go into effect, Nikon and Cereal spent their free time playing chess in the park. And winning. | |
Hackers / int_7bd44eb9 | featureApplicability |
1.0 | |
Hackers / int_7bd44eb9 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_7bd44eb9 | |
Hackers / int_80ebdcb2 | type |
Mobstacle Course | |
Hackers / int_80ebdcb2 | comment |
Mobstacle Course: The heroes use the crowds at Grand Central Station to their advantage against the Secret Service who are coming to arrest them. | |
Hackers / int_80ebdcb2 | featureApplicability |
1.0 | |
Hackers / int_80ebdcb2 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_80ebdcb2 | |
Hackers / int_829b958e | type |
Embarrassing First Name | |
Hackers / int_829b958e | comment |
Embarrassing First Name: It's "The Plague." Definitely not his real name of Eugene. | |
Hackers / int_829b958e | featureApplicability |
1.0 | |
Hackers / int_829b958e | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_829b958e | |
Hackers / int_85bcc5a8 | type |
Lampshaded Double Entendre | |
Hackers / int_85bcc5a8 | comment |
Incidentally, "that place" is behind a condom dispenser in the boys' bathroom. What exactly was he hiding? | |
Hackers / int_85bcc5a8 | featureApplicability |
1.0 | |
Hackers / int_85bcc5a8 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_85bcc5a8 | |
Hackers / int_863fa679 | type |
What Happened to the Mouse? | |
Hackers / int_863fa679 | comment |
What Happened to the Mouse?: Phreak's last appearance was his phone call to Acid Burn, and he's never mentioned directly again. | |
Hackers / int_863fa679 | featureApplicability |
1.0 | |
Hackers / int_863fa679 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_863fa679 | |
Hackers / int_86b21114 | type |
Badass Boast | |
Hackers / int_86b21114 | comment |
Dade's first and last on-screen hacks use the Badass Boast, "Mess With The Best, Die Like The Rest." | |
Hackers / int_86b21114 | featureApplicability |
1.0 | |
Hackers / int_86b21114 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_86b21114 | |
Hackers / int_875615dd | type |
Truth in Television | |
Hackers / int_875615dd | comment |
Truth in Television: The Secret Service actually did engage in widespread raids and arrests of computer hackers in the years before this movie came out. Hackers were mostly harassed in similar ways as those shown in the movie. At least one of these cases led to the creation of the Electronic Frontier Foundation. It is perhaps helpful to know that while the Secret Service is known for protecting The President, the vast majority of their time (and their original mission) is investigating financial crimes such as counterfeiting, or attacks on interstate trade systems — which is where they would cross paths with hackers, both benign and malignant. When the movie was made, the Secret Service was part of the Treasury Department. | |
Hackers / int_875615dd | featureApplicability |
1.0 | |
Hackers / int_875615dd | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_875615dd | |
Hackers / int_8797239c | type |
Bait-and-Switch | |
Hackers / int_8797239c | comment |
Bait-and-Switch: Dade has an erotic dream with Kate breaking into his room, then opening her jacket (revealing nothing underneath) - that turns into a Catapult Nightmare of Secret Service agents pulling Kate away and arresting Dade. Later, we see another erotic dream in progress, of someone in a sexy vinyl catsuit - who turns out to be Dade, not Kate. Cue Kate waking up from her dream. | |
Hackers / int_8797239c | featureApplicability |
1.0 | |
Hackers / int_8797239c | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_8797239c | |
Hackers / int_87dccc00 | type |
Living a Double Life | |
Hackers / int_87dccc00 | comment |
Agent Ray thinks it's "cool". | |
Hackers / int_87dccc00 | featureApplicability |
1.0 | |
Hackers / int_87dccc00 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_87dccc00 | |
Hackers / int_8b4f491c | type |
Villainy-Free Villain | |
Hackers / int_8b4f491c | comment |
Villainy-Free Villain: Richard Gill is a Jerkass, but he's not doing anything wrong; he's a Secret Service agent tracking down computer criminals, who happen to be the protagonists. | |
Hackers / int_8b4f491c | featureApplicability |
1.0 | |
Hackers / int_8b4f491c | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_8b4f491c | |
Hackers / int_8ca89acb | type |
I Need to Go Iron My Dog | |
Hackers / int_8ca89acb | comment |
I Need to Go Iron My Dog: Cereal leaves the room to let Kate try to convince Dade to help. He goes straight for the Muphy's fridge. | |
Hackers / int_8ca89acb | featureApplicability |
1.0 | |
Hackers / int_8ca89acb | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_8ca89acb | |
Hackers / int_8ed5c6e4 | type |
Asshole Victim | |
Hackers / int_8ed5c6e4 | comment |
Asshole Victim: A non-lethal kind. When Dade hacks a TV network he does it to interrupt a show where an obnoxious host is spouting a racist rant on the inferiority of Africans and Native Americans. | |
Hackers / int_8ed5c6e4 | featureApplicability |
1.0 | |
Hackers / int_8ed5c6e4 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_8ed5c6e4 | |
Hackers / int_8f882b0e | type |
Skyscraper Messages | |
Hackers / int_8f882b0e | comment |
Skyscraper Messages: The finale has Crash having rigged windows visible from their Rooftop Swimming Pool to read "Crash + Burn", which really impresses Burn that much more. | |
Hackers / int_8f882b0e | featureApplicability |
1.0 | |
Hackers / int_8f882b0e | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_8f882b0e | |
Hackers / int_902f19e | type |
Hacked by a Pirate | |
Hackers / int_902f19e | comment |
Hacked by a Pirate: All over the place. The viruses launched by the hackers all have some malicious and/or cute animation that's displayed while they're mucking about in the system. | |
Hackers / int_902f19e | featureApplicability |
1.0 | |
Hackers / int_902f19e | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_902f19e | |
Hackers / int_99dce181 | type |
Hacker Collective | |
Hackers / int_99dce181 | comment |
Hacker Collective: The movie is about this, if well The Protagonist is loosely based on the real life hacker codenamed "Zero Cool", he's part of a hackers collective which attack together to make some kind of "social justice". | |
Hackers / int_99dce181 | featureApplicability |
1.0 | |
Hackers / int_99dce181 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_99dce181 | |
Hackers / int_9a573352 | type |
Wager Slave | |
Hackers / int_9a573352 | comment |
Wager Slave: If Kate Libby wins the contest to see who's the best hacker, Murphy will do scut work for her: "Scan, crack copyrights, whatever I want." | |
Hackers / int_9a573352 | featureApplicability |
1.0 | |
Hackers / int_9a573352 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_9a573352 | |
Hackers / int_9ab240e4 | type |
Rapid-Fire Typing | |
Hackers / int_9ab240e4 | comment |
Rapid-Fire Typing: every main character in the movie does this, but one particular scene is notable: when Dade uses Kate's new computer and the camera shows us that he's operating several Viewer-Friendly Interface programs at blinding speeds. Amusingly enough, it's painfully clear (especially in the TV station scene) that Jonny Lee Miller is a very slow typer. | |
Hackers / int_9ab240e4 | featureApplicability |
1.0 | |
Hackers / int_9ab240e4 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_9ab240e4 | |
Hackers / int_9d0f2549 | type |
Public Secret Message | |
Hackers / int_9d0f2549 | comment |
Public Secret Message: After being arrested, Dade slips the floppy disk with the evidence into a trash bin. Taken outside, he sees Cereal Killer in the crowd and goes off on a rant, "They're TRASHING our rights, man! They're TRASHING the flow of data! They're TRASHING!...." Cereal gets the message, and is next seen rummaging through the trash bin. | |
Hackers / int_9d0f2549 | featureApplicability |
1.0 | |
Hackers / int_9d0f2549 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_9d0f2549 | |
Hackers / int_9d12bbc1 | type |
Foreshadowing | |
Hackers / int_9d12bbc1 | comment |
Foreshadowing: A poster for Razor and Blade's show can be seen behind Dade when he enters Cyberdelia. | |
Hackers / int_9d12bbc1 | featureApplicability |
1.0 | |
Hackers / int_9d12bbc1 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_9d12bbc1 | |
Hackers / int_9dd2cbc2 | type |
CloudCuckooLander | |
Hackers / int_9dd2cbc2 | comment |
Cloud Cuckoo Lander: Cereal Killer, partially crossed over with Bunny-Ears Lawyer. | |
Hackers / int_9dd2cbc2 | featureApplicability |
1.0 | |
Hackers / int_9dd2cbc2 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_9dd2cbc2 | |
Hackers / int_a036d3df | type |
Sarcastic Confession | |
Hackers / int_a036d3df | comment |
Sarcastic Confession: | |
Hackers / int_a036d3df | featureApplicability |
1.0 | |
Hackers / int_a036d3df | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a036d3df | |
Hackers / int_a0db7803 | type |
It's Personal | |
Hackers / int_a0db7803 | comment |
It's Personal: Dade, having an existing criminal record, avoided getting involved... until The Plague threatened his mother. Subverted since in the final hacking duel, the Plague targets Dade specifically and cuts him off, but Joey is the one who manages to download the garbage file. And then it's Cereal (with the help of Razor and Blade) who expose the Plague's crimes. | |
Hackers / int_a0db7803 | featureApplicability |
-0.3 | |
Hackers / int_a0db7803 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a0db7803 | |
Hackers / int_a18d407b | type |
Samus Is a Girl | |
Hackers / int_a18d407b | comment |
Samus Is a Girl: For the first half of the film, neither Dade nor the audience know that Acid Burn is actually Kate Libby. | |
Hackers / int_a18d407b | featureApplicability |
1.0 | |
Hackers / int_a18d407b | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a18d407b | |
Hackers / int_a1d48853 | type |
Stupid Crooks | |
Hackers / int_a1d48853 | comment |
Stupid Crooks: When Joey mentions he hacked a bank in Idaho, the gang points out how stupid he is for hacking across state lines from home. | |
Hackers / int_a1d48853 | featureApplicability |
1.0 | |
Hackers / int_a1d48853 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a1d48853 | |
Hackers / int_a3509d95 | type |
The Password Is Always "Swordfish" | |
Hackers / int_a3509d95 | comment |
The Password Is Always "Swordfish": Or at least it is when whoever chose the password didn't think things throughnote Another nice bit of Truth in Television for the film. At the time, a lot of systems didn't have any way to enforce password complexity, or prevent the use of certain words as a password, allowing lazy/ignorant/uncaring users to compromise security. | |
Hackers / int_a3509d95 | featureApplicability |
1.0 | |
Hackers / int_a3509d95 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a3509d95 | |
Hackers / int_a655d21c | type |
Calling the Cops on the FBI | |
Hackers / int_a655d21c | comment |
Calling the Cops on the FBI: The title computer criminals harass their arch enemy, Secret Service agent Richard Gill, by creating a fake criminal record for him that causes the police to arrest him. | |
Hackers / int_a655d21c | featureApplicability |
1.0 | |
Hackers / int_a655d21c | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a655d21c | |
Hackers / int_a7850fbf | type |
Only Known by Their Nickname | |
Hackers / int_a7850fbf | comment |
Only Known by Their Nickname: ...the hackers mostly refer to each other by their handles. In fact, while each of the main characters' real names are used at least twice, Nikon's real name (Paul Cook) is said only once in passing, so he really is only known by his nickname. Averted with Dade. He doesn't really want to advertise that he's Zero Cool, but beyond Kate saying his new handle once in a dismissive fashion, and Cereal once when he points out the "Crash and Burn" coincidence, no one calls him Crash Override. He's just "Dade" to everyone else. | |
Hackers / int_a7850fbf | featureApplicability |
-1.0 | |
Hackers / int_a7850fbf | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a7850fbf | |
Hackers / int_a9de87d2 | type |
Crouching Moron, Hidden Badass | |
Hackers / int_a9de87d2 | comment |
Crouching Moron, Hidden Badass: Joey is portrayed as the consummate dumbass wannabe hacker... except all it takes is a few vague hints from Dade to let him hack into a high security supercomputer, and in the final hacking duel it's implied he was outdoing virtually everyone. ("Yo, Joey's gettin' stupid over here!") | |
Hackers / int_a9de87d2 | featureApplicability |
1.0 | |
Hackers / int_a9de87d2 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_a9de87d2 | |
Hackers / int_aa8d0ef0 | type |
Spell My Name with a "The" | |
Hackers / int_aa8d0ef0 | comment |
Spell My Name with a "The": He's "The Plague", not "Mister Plague". (At which point, Penn follows up with "Mister The Plague".) | |
Hackers / int_aa8d0ef0 | featureApplicability |
1.0 | |
Hackers / int_aa8d0ef0 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_aa8d0ef0 | |
Hackers / int_b032e4ed | type |
Ms. Fanservice | |
Hackers / int_b032e4ed | comment |
Ms. Fanservice: Kate. Then again, she's an Angelina Jolie character, so it shouldn't really be surprising. | |
Hackers / int_b032e4ed | featureApplicability |
1.0 | |
Hackers / int_b032e4ed | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_b032e4ed | |
Hackers / int_b0cd3349 | type |
Fridge Brilliance | |
Hackers / int_b0cd3349 | comment |
Phreak was using his one prison phone call to tell Acid Burn where he hid the disk. Probably being deliberately vague, since he has no idea who's listening in on his call. | |
Hackers / int_b0cd3349 | featureApplicability |
1.0 | |
Hackers / int_b0cd3349 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_b0cd3349 | |
Hackers / int_b58c51d8 | type |
My Beloved Smother | |
Hackers / int_b58c51d8 | comment |
My Beloved Smother: Joey's and Ramon's mothers. Joey's babies him, orders him to go to bed and shuts down the computer when he's hacking the Gibson (the Plague and Pen Jillette's character both assume that it was him logging out to try to avoid a trace) and when the FBI barges into Ramon's room, Ramon's mother starts dope-slapping him and haranguing him in Gratuitous Spanish so Ramon actually begs the FBI agents to take him away. | |
Hackers / int_b58c51d8 | featureApplicability |
1.0 | |
Hackers / int_b58c51d8 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_b58c51d8 | |
Hackers / int_bb18a227 | type |
It's All About Me | |
Hackers / int_bb18a227 | comment |
It's All About Me: Gill really doesn't know anything about computers, but he loves giving TV interviews where he can puff himself up. | |
Hackers / int_bb18a227 | featureApplicability |
1.0 | |
Hackers / int_bb18a227 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_bb18a227 | |
Hackers / int_c3478f1d | type |
Badass Bookworm | |
Hackers / int_c3478f1d | comment |
Badass Bookworm: The hackers. They're not action heroes, but are active, smart, skilled, and ready to fight evil. Kate's even set on going to MIT. | |
Hackers / int_c3478f1d | featureApplicability |
1.0 | |
Hackers / int_c3478f1d | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_c3478f1d | |
Hackers / int_c420a553 | type |
We Can Rule Together | |
Hackers / int_c420a553 | comment |
We Can Rule Together: Plague tries to recruit Dade to his side on multiple occasions, though it's ambiguous just how much he meant his offer and how much he was just trying to get the information off of Dade. | |
Hackers / int_c420a553 | featureApplicability |
1.0 | |
Hackers / int_c420a553 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_c420a553 | |
Hackers / int_c75df49a | type |
Shout-Out | |
Hackers / int_c75df49a | comment |
Shout-Out: Dade's first hack as a teen starts with a Bavarian Fire Drill using the pseudonym Eddie Vedder. Kate's boyfriend refers to Dade and his friends as 'Leopard Boy and the Decepticons.' Cereal Killer's real name is "Emmanuel Goldstein", likely a reference to 2600 founder and editor Eric Corley (a consultant on the film), who himself uses the name as a reference to the figurehead enemy of Big Brother in George Orwell's Nineteen Eighty-Four." Cereal himself namedrops 1984 in an early scene. Plague's alias in the aircraft was "Mr. Babbage". Charles Babbage was credited as the originator of the concept for the programmable computer. The elite supercomputers of the movie are called "Gibsons" which is a nod to William Gibson. This also counts as artistic license, as such machines are more typically called "Big Iron" (a term also used in the film). You talkin' to me? Right before the assault on the Gibson, Cereal lets out a shriek, calling it a "tension breaker". This mirrors a scene before the final exam in the 1987 Mark Harmon comedy Summer School. Crash Override's TV show of choice is The Outer Limits. One film from the montage of fight scenes in the first Crash and Burn duel is the climactic sword fight from Captain Blood. Phreak to Joey: "Hey, Boy Meets World, let's go." | |
Hackers / int_c75df49a | featureApplicability |
1.0 | |
Hackers / int_c75df49a | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_c75df49a | |
Hackers / int_c8146364 | type |
Portmanteau Couple Name | |
Hackers / int_c8146364 | comment |
Portmanteau Couple Name: invoked Played with, as parts of Dade's ("Crash Override") and Kate's ("Acid Burn") handles come together to make an amusing title. ("Crash and Burn"). Dade even gets the lights of the buildings across from the pool to spell out "Crash and Burn." | |
Hackers / int_c8146364 | featureApplicability |
1.0 | |
Hackers / int_c8146364 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_c8146364 | |
Hackers / int_c89824f7 | type |
Cyberpunk Is Techno | |
Hackers / int_c89824f7 | comment |
Cyber Punk Is Techno: The soundtrack (released over three volumes) was pretty much a pantheon of 90's electronic music. | |
Hackers / int_c89824f7 | featureApplicability |
1.0 | |
Hackers / int_c89824f7 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_c89824f7 | |
Hackers / int_cc4b45f6 | type |
Word of God | |
Hackers / int_cc4b45f6 | comment |
Director Iain Softley said the visuals were meant to be metaphorical rather than accurate, trying to capture an LSD-like look for the hacking scenes. | |
Hackers / int_cc4b45f6 | featureApplicability |
1.0 | |
Hackers / int_cc4b45f6 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_cc4b45f6 | |
Hackers / int_d01cffbc | type |
Badass Longcoat | |
Hackers / int_d01cffbc | comment |
Badass Longcoat: The Plague works longcoats into his wardrobe constantly, although they're a bit more flamboyant than the usual example. | |
Hackers / int_d01cffbc | featureApplicability |
1.0 | |
Hackers / int_d01cffbc | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_d01cffbc | |
Hackers / int_d1cedb73 | type |
Slap-Slap-Kiss | |
Hackers / int_d1cedb73 | comment |
Slap-Slap-Kiss: Due to Dade's nervousness over his crush on Kate, their relationship ends up like this. | |
Hackers / int_d1cedb73 | featureApplicability |
1.0 | |
Hackers / int_d1cedb73 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_d1cedb73 | |
Hackers / int_d2c0e2ed | type |
Schmuck Bait | |
Hackers / int_d2c0e2ed | comment |
Schmuck Bait: Dade falls for the classic high school prank of the nonexistent rooftop pool. | |
Hackers / int_d2c0e2ed | featureApplicability |
1.0 | |
Hackers / int_d2c0e2ed | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_d2c0e2ed | |
Hackers / int_db9940c4 | type |
Famed In-Story | |
Hackers / int_db9940c4 | comment |
In universe, the heroes have no idea that Dade (who they think is a talented amateur) is the Famed In-Story Zero Cool. | |
Hackers / int_db9940c4 | featureApplicability |
1.0 | |
Hackers / int_db9940c4 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_db9940c4 | |
Hackers / int_dc579c91 | type |
Contrived Coincidence | |
Hackers / int_dc579c91 | comment |
Contrived Coincidence: Looking for something to take to prove he managed to get inside Ellingson's Gibson, Joey decides to download a seemingly unimportant garbage file - that just happens to be the worm that Plague's using to embezzle from the company. Slightly justified by A. Hiding a file by making it look like a garbage file is a good move, and B. A garbage file being the only thing you copy while hacking into a big mainframe is also a good idea - it's not proprietary information that the company will spend lots of time and effort going after. | |
Hackers / int_dc579c91 | featureApplicability |
1.0 | |
Hackers / int_dc579c91 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_dc579c91 | |
Hackers / int_dcbe8a6e | type |
Chekhov's Gunman | |
Hackers / int_dcbe8a6e | comment |
Chekhov's Gunman: "Welcome to Hack the Planet..." | |
Hackers / int_dcbe8a6e | featureApplicability |
1.0 | |
Hackers / int_dcbe8a6e | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_dcbe8a6e | |
Hackers / int_dded28f2 | type |
Playful Hacker | |
Hackers / int_dded28f2 | comment |
Playful Hacker: There's even a quote from Loyd Blankenship's famous "Hacker's Manifesto". Agent Ray thinks it's "cool". | |
Hackers / int_dded28f2 | featureApplicability |
1.0 | |
Hackers / int_dded28f2 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_dded28f2 | |
Hackers / int_e022585 | type |
Television Geography | |
Hackers / int_e022585 | comment |
Television Geography: On their way to Grand Central, Cereal and Nikon run down MacDougal St (just off Washington Square Park, where they were playing chess) and turn the corner directly onto... what looks like South Broadway at 23rd St. Impressive. For non-New Yorkers, that's a distance of about a mile depending on where they started and stopped. | |
Hackers / int_e022585 | featureApplicability |
1.0 | |
Hackers / int_e022585 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_e022585 | |
Hackers / int_e624f0e8 | type |
Suspiciously Specific Denial | |
Hackers / int_e624f0e8 | comment |
Cereal and Phreak deny knowing who Acid Burn is. They even share a knowing look when asked who "he" is. | |
Hackers / int_e624f0e8 | featureApplicability |
1.0 | |
Hackers / int_e624f0e8 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_e624f0e8 | |
Hackers / int_e6a901a3 | type |
Meaningful Rename | |
Hackers / int_e6a901a3 | comment |
Meaningful Rename: The whole point to hacker handles. Dade got arrested ("crashed") but now he's back ("override"). Also, 'Lord Nikon', to reference the hacker's photographic memory'. Given his affinity for hacker and counter-cultural lore, Cereal Killer's handle may be an obtuse reference to John "Cap'n Crunch" Draper. | |
Hackers / int_e6a901a3 | featureApplicability |
1.0 | |
Hackers / int_e6a901a3 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_e6a901a3 | |
Hackers / int_eb81c601 | type |
Big Damn Heroes | |
Hackers / int_eb81c601 | comment |
Big Damn Heroes: Razor and Blade get their moment, leading an army of hackers from around the world. | |
Hackers / int_eb81c601 | featureApplicability |
1.0 | |
Hackers / int_eb81c601 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_eb81c601 | |
Hackers / int_eb8ec7c8 | type |
Jerkass | |
Hackers / int_eb8ec7c8 | comment |
Jerkass: The Plague certainly is one. All the Secret Service agents, save Agent Ray. Agent Richard Gill is a Jerkass Boss. | |
Hackers / int_eb8ec7c8 | featureApplicability |
1.0 | |
Hackers / int_eb8ec7c8 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_eb8ec7c8 | |
Hackers / int_f5c505db | type |
The Cracker | |
Hackers / int_f5c505db | comment |
The Cracker: The Plague. | |
Hackers / int_f5c505db | featureApplicability |
1.0 | |
Hackers / int_f5c505db | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_f5c505db | |
Hackers / int_f6507695 | type |
Everything Is Online | |
Hackers / int_f6507695 | comment |
Everything Is Online: Including school sprinkler systems and tankers. | |
Hackers / int_f6507695 | featureApplicability |
1.0 | |
Hackers / int_f6507695 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_f6507695 | |
Hackers / int_f88f2449 | type |
Downer Beginning | |
Hackers / int_f88f2449 | comment |
Downer Beginning: The film starts with the 1988 arrest and trial of then-11 year old Dade Murphy, then known as "Zero Cool", for crashing 1,507 computers with his computer virus. Dade would be sentenced to probation, where he is forbidden from owning or operating a computer or phone until he turns 18 years old. | |
Hackers / int_f88f2449 | featureApplicability |
1.0 | |
Hackers / int_f88f2449 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_f88f2449 | |
Hackers / int_faece9aa | type |
The Power of Friendship | |
Hackers / int_faece9aa | comment |
The Power of Friendship: Or the power of community, anyway. | |
Hackers / int_faece9aa | featureApplicability |
1.0 | |
Hackers / int_faece9aa | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_faece9aa | |
Hackers / int_fbb7e624 | type |
Tech Bro | |
Hackers / int_fbb7e624 | comment |
Tech Bro: A prototypical example, as this film was made decades before the stereotype fully emerged in The New '10s. Despite being hardcore computer geeks who gush over Kate's top-of-the-line laptop, the hackers are all hip, rowdy and in-shape teenagers that hang out in the Coolest Club Ever. The Big Bad is a corporate security consultant with an equally irreverent attitude, and is introduced riding through his employer's data center on a skateboard. | |
Hackers / int_fbb7e624 | featureApplicability |
1.0 | |
Hackers / int_fbb7e624 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_fbb7e624 | |
Hackers / int_fc1d7df0 | type |
Cyberbullying | |
Hackers / int_fc1d7df0 | comment |
Cyberbullying: The clique at Dade Murphy's new school learn that Federal agent Dick Gill has sworn to track, identify and nullify "internet terrorists." This is the clique's Berserk Button, whereupon they amass as much personal data on Agent Gill as they can, then monkey-wrench his life. Most notably, while dining in an expensive restaurant with his wife and some friends, his credit card gets snipped in two on the spot as though he were some deadbeat. | |
Hackers / int_fc1d7df0 | featureApplicability |
1.0 | |
Hackers / int_fc1d7df0 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_fc1d7df0 | |
Hackers / int_fe0330fb | type |
Brick Joke | |
Hackers / int_fe0330fb | comment |
Brick Joke: The pool on the roof is used as a gag twice, then as a romantic locale in the final scene. Phreak uses a tone recording in Cyberdelia to avoid paying for a payphone. Later, Razor and Blade's Hack the Planet show has them explaining how it works. Dade's first and last on-screen hacks use the Badass Boast, "Mess With The Best, Die Like The Rest." The major situation starts due to Joey finding and partially download the garbage file, which leads him and his friends into trouble. The second time he participates in a hack against the Plague, he is the one who downloads the file completely, which leads to getting him and his friends out of trouble. | |
Hackers / int_fe0330fb | featureApplicability |
1.0 | |
Hackers / int_fe0330fb | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_fe0330fb | |
Hackers / int_fe5e40e2 | type |
Gondor Calls for Aid | |
Hackers / int_fe5e40e2 | comment |
Gondor Calls for Aid: During the climatic last battle of the movie, Razor and Blade (who suggested this plan in the first place), along with hackers from England, Japan, Russia, and Italy (and presumably other countries as well) digitally join in with the crew in New York to hammer the Gibson under Plague's — by this point almost manic — control. | |
Hackers / int_fe5e40e2 | featureApplicability |
1.0 | |
Hackers / int_fe5e40e2 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_fe5e40e2 | |
Hackers / int_fea27091 | type |
Buffy Speak | |
Hackers / int_fea27091 | comment |
Buffy Speak: "It's in that place where I put that thing that time." Phreak was using his one prison phone call to tell Acid Burn where he hid the disk. Probably being deliberately vague, since he has no idea who's listening in on his call. Incidentally, "that place" is behind a condom dispenser in the boys' bathroom. What exactly was he hiding? A hacker named Plague? THE Plague. Mr The Plague is also acceptable. | |
Hackers / int_fea27091 | featureApplicability |
1.0 | |
Hackers / int_fea27091 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_fea27091 | |
Hackers / int_ff7f34c5 | type |
Pet the Dog | |
Hackers / int_ff7f34c5 | comment |
Pet the Dog: After being at her wits' end with Dade for the last seven years due to his hacking addiction and the massive amounts of legal and financial trouble it's caused their family, Dade's mother calmly tells the FBI that her son is a genius, and on the cutting edge of a new global paradigm that none of them can understand. As the intercom is on at the time, both Dade and Kate overhear this and are incredibly touched. | |
Hackers / int_ff7f34c5 | featureApplicability |
1.0 | |
Hackers / int_ff7f34c5 | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_ff7f34c5 | |
Hackers / int_name | type |
ItemName | |
Hackers / int_name | comment |
||
Hackers / int_name | featureApplicability |
1.0 | |
Hackers / int_name | featureConfidence |
1.0 | |
Hackers | hasFeature |
Hackers / int_name | |
Hackers / int_name | itemName |
Hackers |
The following is a list of statements referring to the current page from other pages.
Copyright of DBTropes.org wrapper 2009-2013 DFKI Knowledge Management. Imprint. - Thanks to Bakken&Baeck for hosting. Contact.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.