Search/Recent Changes
DBTropes
...it's like TV Tropes, but LINKED DATA!

Hollywood Hacking

 Hollywood Hacking
type
FeatureClass
 Hollywood Hacking
label
Hollywood Hacking
 Hollywood Hacking
page
HollywoodHacking
 Hollywood Hacking
comment
It is recommended that you spend several minutes practicing your own hacking skills either here or here before continuing down this page.
Real hacking is boring. Hollywood hates boring (sometimes). (But how many real-life hackers would want to be responsible for The CSI Effect?) Instead of exploiting security flaws or using "social engineering" to convince an office worker you are doing a "routine password verification", you set up four computer monitors filled with coding language in a dark Hacker Cave and guide a little 3D version of yourself through a fiery onscreen maze that somehow represents the firewall, without forgetting to leave a Skull and Crossbones image that takes the entire screen of the hacked computer. Or you run a Password Slot Machine to decrypt the password digit by digit.
It's nothing like real hacking, although either way, you may have to use Rapid-Fire Typing. That last part also means that any AI or robot that can directly interface with a computer is automatically the greatest hacker in the universe that can instantly take over any system no matter how secure because it doesn't need to type.
Hollywood Hacking is when some sort of convoluted metaphor is used not only to describe hacking but actually to put it into practice. Characters will come up with rubbish like, "Extinguish the firewall!" and "I'll use the Millennium Bug to launch an Overclocking Attack on the whole Internet!" — even hacking light switches and electric razors, which is even sillier if said electric razor is unplugged. The intent is to employ a form of Artistic License or hand waving which takes advantage of presumed technophobia among the audience. You can also expect this trope to annoy those within the audience whose occupation involves computers or the Internet.
Of course, with computers, this could also fall under much the same heading as And Some Other Stuff; one hardly wants to come under any accusations of informing the audience of how to hack computers.
In Video Games the Hacking Minigame is an Acceptable Break From Reality based on the Rule of Fun ... mainly because who wants to sit there and exploit security flaws when you could use a green tank to shoot stuff?
If the attack brings two computer-savvy users head-to-head, then you've also got Dueling Hackers. See also Hollywood Encryption.
 Hollywood Hacking
fetched
2023-10-10T18:30:50Z
 Hollywood Hacking
parsed
2023-10-10T18:30:50Z
 Hollywood Hacking
processingComment
Dropped link to BonusDungeon: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to BoringButPractical: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to BrainComputerInterface: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to BriefAccentImitation: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to Cyberspace: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to DuelingHackers: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to EverythingIsOnline: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to EvilGenius: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to EvilPlan: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to GameplayAndStorySegregation: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to PlayedForLaughs: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to PrecisionFStrike: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to RaceAgainstTheClock: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to RhythmGame: Not an Item - IGNORE
 Hollywood Hacking
processingComment
Dropped link to ShownTheirWork: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to StarWars: Not an Item - CAT
 Hollywood Hacking
processingComment
Dropped link to SuperSpeed: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to ViewerFriendlyInterface: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to YourMindMakesItReal: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to exaggeratedtrope: Not an Item - FEATURE
 Hollywood Hacking
processingComment
Dropped link to lampshadehanging: Not an Item - FEATURE
 Hollywood Hacking
isPartOf
DBTropes
 Hollywood Hacking / int_109f7814
type
Hollywood Hacking
 Hollywood Hacking / int_109f7814
comment
In the Sherlock episode "The Reichenbach Fall", Moriarty claims to have a master code that can hack any system and demonstrates it by simultaneously breaking into the Tower of London, the Bank of England, and a high-security prison. There's no such master code; Moriarty made it up. He accomplished all three break-ins with inside help.
 Hollywood Hacking / int_109f7814
featureApplicability
1.0
 Hollywood Hacking / int_109f7814
featureConfidence
1.0
 Sherlock
hasFeature
Hollywood Hacking / int_109f7814
 Hollywood Hacking / int_10b03dcf
type
Hollywood Hacking
 Hollywood Hacking / int_10b03dcf
comment
In Batman: Arkham Asylum, Batman can't hack the consoles until he can read the codes from the Warden's keycard into his hacking device.
 Hollywood Hacking / int_10b03dcf
featureApplicability
1.0
 Hollywood Hacking / int_10b03dcf
featureConfidence
1.0
 Batman: Arkham Asylum (Video Game)
hasFeature
Hollywood Hacking / int_10b03dcf
 Hollywood Hacking / int_10eefca6
type
Hollywood Hacking
 Hollywood Hacking / int_10eefca6
comment
In The Brave Little Toaster to the Rescue, the climax involves the old TLW-728 supercomputer, Wittgenstein, wirelessly hacking into things from security gates to personal computers, and even being able to send pure electricity to devices through power outlets; all this despite him being, as the film takes time to point out, severely outdated. Ironically, through all of this, they still take time to point out that you need a modem to get on the Internet.
 Hollywood Hacking / int_10eefca6
featureApplicability
1.0
 Hollywood Hacking / int_10eefca6
featureConfidence
1.0
 The Brave Little Toaster to the Rescue
hasFeature
Hollywood Hacking / int_10eefca6
 Hollywood Hacking / int_11292d9c
type
Hollywood Hacking
 Hollywood Hacking / int_11292d9c
comment
Dreamfall: The Longest Journey: Hacking is represented by a rather ludicrously simple matching-up-symbols game. This Hacking Minigame is actually given an in-universe explanation: Olivia explains to Zoë that she is using software to hack, and the software is designed so that it looks like a symbol-matching game. This way, if someone walks by and sees Zoë's phone screen, it'll just look like she's playing a game.
 Hollywood Hacking / int_11292d9c
featureApplicability
1.0
 Hollywood Hacking / int_11292d9c
featureConfidence
1.0
 Dreamfall: The Longest Journey (Video Game)
hasFeature
Hollywood Hacking / int_11292d9c
 Hollywood Hacking / int_117116ef
type
Hollywood Hacking
 Hollywood Hacking / int_117116ef
comment
Once in The Penguins of Madagascar, the penguins hack into a computer by literally hacking the CPU with a chainsaw.
 Hollywood Hacking / int_117116ef
featureApplicability
1.0
 Hollywood Hacking / int_117116ef
featureConfidence
1.0
 The Penguins of Madagascar
hasFeature
Hollywood Hacking / int_117116ef
 Hollywood Hacking / int_11f588c8
type
Hollywood Hacking
 Hollywood Hacking / int_11f588c8
comment
LBX: Little Battlers eXperience has Infinity Net, where battles between digital representation of LBX (essentially functioning gunplay) take place and data can be "picked up" with said LBX. Rapid-Fire Typing also applies.
 Hollywood Hacking / int_11f588c8
featureApplicability
1.0
 Hollywood Hacking / int_11f588c8
featureConfidence
1.0
 LBX: Little Battlers eXperience (Video Game)
hasFeature
Hollywood Hacking / int_11f588c8
 Hollywood Hacking / int_1367cea0
type
Hollywood Hacking
 Hollywood Hacking / int_1367cea0
comment
In Worm, Tattletale uses her ability to simply guess passwords.
 Hollywood Hacking / int_1367cea0
featureApplicability
1.0
 Hollywood Hacking / int_1367cea0
featureConfidence
1.0
 Worm
hasFeature
Hollywood Hacking / int_1367cea0
 Hollywood Hacking / int_137ef6d5
type
Hollywood Hacking
 Hollywood Hacking / int_137ef6d5
comment
The hacking in Devastation involves using a calculator-like device to download codes from communication terminals and then using said device to bypass electronic security gates.
 Hollywood Hacking / int_137ef6d5
featureApplicability
1.0
 Hollywood Hacking / int_137ef6d5
featureConfidence
1.0
 Devastation (Video Game)
hasFeature
Hollywood Hacking / int_137ef6d5
 Hollywood Hacking / int_1ad6e2b5
type
Hollywood Hacking
 Hollywood Hacking / int_1ad6e2b5
comment
In Yu-Gi-Oh! ZEXAL, Yuma's sister Akari attempts to track down and destroy a virus, complete with an RPG-style dungeon and a boss battle.
 Hollywood Hacking / int_1ad6e2b5
featureApplicability
1.0
 Hollywood Hacking / int_1ad6e2b5
featureConfidence
1.0
 Yu-Gi-Oh! ZEXAL
hasFeature
Hollywood Hacking / int_1ad6e2b5
 Hollywood Hacking / int_1b1c2c8a
type
Hollywood Hacking
 Hollywood Hacking / int_1b1c2c8a
comment
The Social Network:
The hacking is explicitly shown to be a process of reading code and trying out strategies based on the security settings of the target, although it takes much less time than in real life.
Also, the objectives of the "hacking" scene are modest (download everybody's photo in every house, without having to manually navigate to every page and right-click on each image), and the descriptions of how to do it for each house's webpage, although brief, are 100% realistic. The easier pages have unprotected directory listings in Apache, so you can get all the images with a single run of the wget command. The harder ones require posting search terms to a page and scraping the output to find the photos; this requires custom scripting, therefore "bring out the Emacs" (a plain-text editor used by many programmers).
The hacking, and indeed all of Zuckerberg's monologue in that scene is a verbatim transcript fished from the real-life court documents. So not only is that the actual method that he used to hack it happened roughly that time, time frame as the timestamps on his posts attest to.
 Hollywood Hacking / int_1b1c2c8a
featureApplicability
1.0
 Hollywood Hacking / int_1b1c2c8a
featureConfidence
1.0
 The Social Network
hasFeature
Hollywood Hacking / int_1b1c2c8a
 Hollywood Hacking / int_1be6b920
type
Hollywood Hacking
 Hollywood Hacking / int_1be6b920
comment
Hydrophobia has you gain into computer systems by matching wavelengths with the console. Particularly funny as the game's protagonists are completely confused just how anybody could hack into their system!
 Hollywood Hacking / int_1be6b920
featureApplicability
1.0
 Hollywood Hacking / int_1be6b920
featureConfidence
1.0
 Hydrophobia (Video Game)
hasFeature
Hollywood Hacking / int_1be6b920
 Hollywood Hacking / int_22147342
type
Hollywood Hacking
 Hollywood Hacking / int_22147342
comment
Happens constantly in Arrow:
Resident hacker Felicity Smoak is able to hack virtually any form of technology. Often she does so from her handy 'magic tablet'. Many of her hacks look like a 3D computer animation on her screen which she uses to control real technology.
Clock King ups the ante, causing all sorts of chaos theory the city such as having the traffic network to make a train level crossing boomgate go up when a train was passing through. He then goes Dueling Hackers with Felicity, hacking Felicity's computer speakers to taunt her and sending viruses to short her computer out. Felicity manages to beat him by sending his own virus into his own device.
Brother Eye, a cyber-terrorist group led by Cooper Seldom (who happens to be Felicity's ex-boyfriend), manages to flip all of Starling City's technology upside down. Shutting down the power grid, then all the bank funds. This was all made possible due to an unstoppable virus they use, which was made by, surprise surprise, Felicity.
Cayden James and Helix go furthest of all. Cayden's first Evil Plan is finding the internet mainframe where he allegedly tries to destroy the internet. This turns out to be a ruse and what he actually wanted was for Felicity to lower the firewall. He avoided doing so himself because he didn't want to leave his digital fingerprints for the authorities to find. Later Cayden goes on a full-scale weapon of hack destruction, making all of Star City's technology go rampant, forcing Mayor Oliver to pay him a ransom.
 Hollywood Hacking / int_22147342
featureApplicability
1.0
 Hollywood Hacking / int_22147342
featureConfidence
1.0
 Arrow
hasFeature
Hollywood Hacking / int_22147342
 Hollywood Hacking / int_22211d68
type
Hollywood Hacking
 Hollywood Hacking / int_22211d68
comment
Bones has Angela for their typical Hollywood Hacking needs, such as acquiring security footage and decrypting computer evidence. Recurring villain Christopher Pelant manages to accomplish some truly outrageous feats with computers. He can do almost anything. Some of the things he managed to do are: fool an ankle monitor, corrupt/modify security footage, take down cellphone networks and traffic lights, hijack a predator drone in Afghanistan, wipe his own identity and create a new one (twice!), upload viruses through library books, and infiltrate a private army. Oh, and in his first appearance, he manages to carve bones in such a way that when a 3D model of them is created it infects the computer with malware that changes its fan speeds and causes it to catastrophically overheat. He's so good that Hodgins, who is admittedly a bit paranoid, worries that even if they use a system not connected to the internet Pelant will infect it with a worm by using the power grid.
 Hollywood Hacking / int_22211d68
featureApplicability
1.0
 Hollywood Hacking / int_22211d68
featureConfidence
1.0
 Bones
hasFeature
Hollywood Hacking / int_22211d68
 Hollywood Hacking / int_2221ecbd
type
Hollywood Hacking
 Hollywood Hacking / int_2221ecbd
comment
CSI: NY: "I'll create a GUI interface using Visual Basic. See if I can track an IP address." For those not tech-savvy, this is roughly the equivalent of drawing a map on a piece of paper to try and track down where you last left your car keys. It won't do anything.
 Hollywood Hacking / int_2221ecbd
featureApplicability
1.0
 Hollywood Hacking / int_2221ecbd
featureConfidence
1.0
 CSI: NY
hasFeature
Hollywood Hacking / int_2221ecbd
 Hollywood Hacking / int_229ba2b8
type
Hollywood Hacking
 Hollywood Hacking / int_229ba2b8
comment
Shadowrun works pretty much exactly like the description of the Neuromancer example above, though there are some various debuff effects and a few situational programs that can instantly bypass certain security forms.
 Hollywood Hacking / int_229ba2b8
featureApplicability
1.0
 Hollywood Hacking / int_229ba2b8
featureConfidence
1.0
 Shadowrun (Video Game)
hasFeature
Hollywood Hacking / int_229ba2b8
 Hollywood Hacking / int_263d5756
type
Hollywood Hacking
 Hollywood Hacking / int_263d5756
comment
Live Free or Die Hard is the subject of the Penny Arcade strip quoted at the top of the page.
 Hollywood Hacking / int_263d5756
featureApplicability
1.0
 Hollywood Hacking / int_263d5756
featureConfidence
1.0
 Live Free or Die Hard
hasFeature
Hollywood Hacking / int_263d5756
 Hollywood Hacking / int_26ef42e7
type
Hollywood Hacking
 Hollywood Hacking / int_26ef42e7
comment
Kevin & Kell dips into hacking every so often, although it tends to be more blatant metaphors for what they're really doing.
 Hollywood Hacking / int_26ef42e7
featureApplicability
1.0
 Hollywood Hacking / int_26ef42e7
featureConfidence
1.0
 Kevin & Kell (Webcomic)
hasFeature
Hollywood Hacking / int_26ef42e7
 Hollywood Hacking / int_28f28baf
type
Hollywood Hacking
 Hollywood Hacking / int_28f28baf
comment
In Scanners, the protagonist hacks into a computer system through a public phone booth using only his telepathic brain.
 Hollywood Hacking / int_28f28baf
featureApplicability
1.0
 Hollywood Hacking / int_28f28baf
featureConfidence
1.0
 Scanners
hasFeature
Hollywood Hacking / int_28f28baf
 Hollywood Hacking / int_2af19e5c
type
Hollywood Hacking
 Hollywood Hacking / int_2af19e5c
comment
In the Cool Kids Table game All I Want for Christmas, Chrissy is able to hack a jet ski with a nail file because it's the nineties, and anything can be hacked.
 Hollywood Hacking / int_2af19e5c
featureApplicability
1.0
 Hollywood Hacking / int_2af19e5c
featureConfidence
1.0
 Cool Kids Table (Podcast)
hasFeature
Hollywood Hacking / int_2af19e5c
 Hollywood Hacking / int_2e1df124
type
Hollywood Hacking
 Hollywood Hacking / int_2e1df124
comment
Exaggerated in Wreck-It Ralph. Turbo invades Sugar Rush and attempts to delete Vanellope Von Schweetz from the game code, but can only render her as a glitch and modifies everyone's memory of her so that they treat her as a criminal and an outcast.
 Hollywood Hacking / int_2e1df124
featureApplicability
1.0
 Hollywood Hacking / int_2e1df124
featureConfidence
1.0
 Wreck-It Ralph
hasFeature
Hollywood Hacking / int_2e1df124
 Hollywood Hacking / int_2e9ef429
type
Hollywood Hacking
 Hollywood Hacking / int_2e9ef429
comment
Despite Waynetech seemingly having made much of the security equipment in the Batman: Arkham Series, Batman usually has problems getting into secure areas until he receives the proper access codes:
In Batman: Arkham Asylum, Batman can't hack the consoles until he can read the codes from the Warden's keycard into his hacking device.
In Batman: Arkham City, Batman downloads the access codes to Gotham's public buildings after Penguin tries to trap him in the abandoned GCPD Forensics Lab building, but the stronger-encrypted TYGER consoles are off limits to him until he downloads a copy of the TYGER main control program during Protocol 10.
In Batman: Arkham Knight, Batman can't hack the Arkham Knight's drones until he obtains a part from a special drone, but even then, all he can do is turn off their targeting sensors temporarily. During Predator encounters, Batman cannot take control of drones unless he downloads the control codes directly from the drone controllers. He can also obtain a drone virus special weapon to use during Batmobile Tank encounters, but all the virus does is to overwrite the drones' IFF systems.
Similarly, in Batman: Arkham Origins, Batman needs access to the National Criminal Database in order to find out crucial information on The Joker. But the servers are offline, so Batman has to physically infiltrate the GCPD, plug a device into the servers, then perform air gap bridging in order to gain remote access to the server.
 Hollywood Hacking / int_2e9ef429
featureApplicability
1.0
 Hollywood Hacking / int_2e9ef429
featureConfidence
1.0
 BatmanArkhamSeries
hasFeature
Hollywood Hacking / int_2e9ef429
 Hollywood Hacking / int_2f97b59
type
Hollywood Hacking
 Hollywood Hacking / int_2f97b59
comment
Besides sci-fi action movie trivia, this is Naoki's specialty in World of Winx. He can hack into just about anything with his phone, from remote-control boats to the floating cameras that follow the Winx around.
 Hollywood Hacking / int_2f97b59
featureApplicability
1.0
 Hollywood Hacking / int_2f97b59
featureConfidence
1.0
 World of Winx
hasFeature
Hollywood Hacking / int_2f97b59
 Hollywood Hacking / int_2fee008d
type
Hollywood Hacking
 Hollywood Hacking / int_2fee008d
comment
Tengen Toppa Gurren Lagann has, in Lagann-hen, Lordgenome's head HAACKIIIING into the Cathedral Terra by having a virtual recreation of his body run down a virtual hallway connecting the ships, then running around virtual corridors to find a box, smashing it open with his head and eating the red sphere inside it. Nobody cared about how unrealistic it was in this case because a) it's Tengen Toppa Gurren Lagann and b) it's hilarious. As silly as it is, though, everything in this sequence is symbolically representative of real hacking: Lordgenome first breaks through the firewalls, then searches for the file, attempts to open it with a password, fails, and uses a brute force decryption, succeeds and downloads the file.
 Hollywood Hacking / int_2fee008d
featureApplicability
1.0
 Hollywood Hacking / int_2fee008d
featureConfidence
1.0
 Tengen Toppa Gurren Lagann
hasFeature
Hollywood Hacking / int_2fee008d
 Hollywood Hacking / int_306233e6
type
Hollywood Hacking
 Hollywood Hacking / int_306233e6
comment
Summer Wars features a lot of the Hollywood Hacking staples, such as Rapid-Fire Typing and virtual reality representations for hacking, but it also balances it out with a lot of parts that are grounded in reality (such as the movie's villain, a hacker AI named Love Machine, acting like a botnet program, and doing things the way an actual real-life hacker would do them). The main silly thing is the giant sequence of digits, apparently meant to be a password hash, which Kenji "solves" on paper in a few hours... then again, in a few minutes... then again, in his head. Leaving aside the nigh-impossibility of reverse-engineering a password from a hash at all, let alone by hand (that's the whole point of hashing passwords before storing them), why would Oz willingly spit the number at anyone trying to hack their way in, especially if it's solvable?
 Hollywood Hacking / int_306233e6
featureApplicability
1.0
 Hollywood Hacking / int_306233e6
featureConfidence
1.0
 Summer Wars
hasFeature
Hollywood Hacking / int_306233e6
 Hollywood Hacking / int_30ac0866
type
Hollywood Hacking
 Hollywood Hacking / int_30ac0866
comment
The Bad Guys (2022): This is Ms. Tarantula's specialty as The Cracker of the group. There's no attempt at making her hacking look realistic, given that the film takes many heist genre film conventions and plays them for laughs. This is best epitomized in the truck chase, where she manages to not only hack the navigational systems of the trucks, but manages to get them to drive themselves back to the places they were stolen from.
 Hollywood Hacking / int_30ac0866
featureApplicability
1.0
 Hollywood Hacking / int_30ac0866
featureConfidence
1.0
 The Bad Guys (2022)
hasFeature
Hollywood Hacking / int_30ac0866
 Hollywood Hacking / int_33fd91eb
type
Hollywood Hacking
 Hollywood Hacking / int_33fd91eb
comment
Hackers, of course. The entire movie, basically — and it is glorious. There are some realistic discussions about password security, which is how some of the earlier hacks get done (admin password is God...), and pretty much all of the prep work for the big hack is actually realistic. Lots of stealing passwords, going through discarded printouts, tapping the phone lines. It's like they did all the research on how hacking actually happens and then decided that would be boring.
 Hollywood Hacking / int_33fd91eb
featureApplicability
1.0
 Hollywood Hacking / int_33fd91eb
featureConfidence
1.0
 Hackers
hasFeature
Hollywood Hacking / int_33fd91eb
 Hollywood Hacking / int_34d050c6
type
Hollywood Hacking
 Hollywood Hacking / int_34d050c6
comment
In the Darkwing Duck episode "Aduckyphobia", Professor Moliarty hacks an electronic safe lock by first measuring it with a caliper, then entering a few numbers on a pocket calculator, then finally, striking it firmly with a wooden mallet so that it disintegrates.
 Hollywood Hacking / int_34d050c6
featureApplicability
1.0
 Hollywood Hacking / int_34d050c6
featureConfidence
1.0
 Darkwing Duck
hasFeature
Hollywood Hacking / int_34d050c6
 Hollywood Hacking / int_35e05f2a
type
Hollywood Hacking
 Hollywood Hacking / int_35e05f2a
comment
RWBY
In Volumes 2 and 3, both times when the villains hack the good guys' security systems, they have to physically fight their way to the administrator control terminals and then upload the viruses from their own machines. In the first case, the virus has administrator access and doesn't do anything obvious, so without anything to actually observe and trace (all it does is spread itself to other systems connected to the network, giving Cinder remote access to their machines), the good guys are left scratching their heads as to what the villains did. In the second case, no one has time to dig out the virus, because it turns their entire robot army against them.
In Volume 7, Arthur Watts is able to hack into Mantle's security systems because he wrote the security code and thus knows all of its exploits and backdoors. He can't access the more recently updated security for Atlas because he didn't write that security code. In addition, in order to get access to Mantle's much more secure utility grid to shut off the heating systems, he has to get access codes from someone on the Atlas Council, so he rigs an election to get a corrupt businessman elected to the Council in exchange for the access codes.
In Volume 8, even Arthur Watts is unable to hack Penny because she has no wireless access that he can find. He only manages to do so by stealing one of her swords, installing malicious hardware into it, and then waiting for her to be connected to the CCT so she can reconnect with the sword. She manages to reboot herself and sever the connection, but her systems have already uploaded the virus and its basic commands. Lampshaded when Cinder asks him to bring Penny to her and he mocks her for thinking that he could telekinetically make Penny do whatever he wanted. There are also at least two cases of characters getting into the Atlesian military system by breaking into the administration room to access the terminals, first when Team Remnant needs some authorizations to launch Amity and later when Watts takes control of the systems to fulfill Cinder's plan.
 Hollywood Hacking / int_35e05f2a
featureApplicability
1.0
 Hollywood Hacking / int_35e05f2a
featureConfidence
1.0
 RWBY (Web Animation)
hasFeature
Hollywood Hacking / int_35e05f2a
 Hollywood Hacking / int_3626dc6d
type
Hollywood Hacking
 Hollywood Hacking / int_3626dc6d
comment
This is handwaved (lampshaded?) in Nikita with the explanation of, "I even made it look like a video game so your little tween brains can handle it."
 Hollywood Hacking / int_3626dc6d
featureApplicability
1.0
 Hollywood Hacking / int_3626dc6d
featureConfidence
1.0
 Nikita
hasFeature
Hollywood Hacking / int_3626dc6d
 Hollywood Hacking / int_378ea496
type
Hollywood Hacking
 Hollywood Hacking / int_378ea496
comment
In Constantine (2014), one of John's former Newcastle mates, Ritchie Simpson, remotely hacks and shuts down Atlanta's power grid to weaken Furcifer in the series' pilot episode, "Non Est Asylum".
 Hollywood Hacking / int_378ea496
featureApplicability
1.0
 Hollywood Hacking / int_378ea496
featureConfidence
1.0
 Constantine (2014)
hasFeature
Hollywood Hacking / int_378ea496
 Hollywood Hacking / int_3790ae45
type
Hollywood Hacking
 Hollywood Hacking / int_3790ae45
comment
In Double Homework, Dennis blackmails the protagonist into hacking into Dr. Mosely’s computer for him, using nothing but spyware on a thumb drive. Dennis includes detailed instructions for every step needed to complete the job in his program, but without knowing the model and operating system used on the computer, this would be impossible.
 Hollywood Hacking / int_3790ae45
featureApplicability
1.0
 Hollywood Hacking / int_3790ae45
featureConfidence
1.0
 Double Homework (Visual Novel)
hasFeature
Hollywood Hacking / int_3790ae45
 Hollywood Hacking / int_38c87187
type
Hollywood Hacking
 Hollywood Hacking / int_38c87187
comment
Saturday Morning Breakfast Cereal shows the need for some artistic license here.
 Hollywood Hacking / int_38c87187
featureApplicability
1.0
 Hollywood Hacking / int_38c87187
featureConfidence
1.0
 Saturday Morning Breakfast Cereal (Webcomic)
hasFeature
Hollywood Hacking / int_38c87187
 Hollywood Hacking / int_38cb92a7
type
Hollywood Hacking
 Hollywood Hacking / int_38cb92a7
comment
Clear and Present Danger has a reasonably realistic social/exhaustive attack, trying various permutations of birthdates (although they type each manually). It isn't even quite swordfish: they get down to having to mash together digits from different family members. (In a final blow to the Hollywood Computing, they even use "dir /w" to list the disk contents, even if the display is a little viewer-friendlier than normal.)
 Hollywood Hacking / int_38cb92a7
featureApplicability
1.0
 Hollywood Hacking / int_38cb92a7
featureConfidence
1.0
 Clear and Present Danger
hasFeature
Hollywood Hacking / int_38cb92a7
 Hollywood Hacking / int_39deed0c
type
Hollywood Hacking
 Hollywood Hacking / int_39deed0c
comment
Yu-Gi-Oh! VRAINS gets credit for showing the viewers that the camera is skipping the long, boring hours spent staring at pages of programming language, and appropriately uses Technobabble to show that the writers have probably skimmed a programming book. It loses credit for abuse of Extreme Graphical Representation and gains a bit of it back when Yusaku's use of older versions of duel disks and physical cards is an actual hacker technique.
 Hollywood Hacking / int_39deed0c
featureApplicability
1.0
 Hollywood Hacking / int_39deed0c
featureConfidence
1.0
 Yu-Gi-Oh! VRAINS
hasFeature
Hollywood Hacking / int_39deed0c
 Hollywood Hacking / int_3ddddb25
type
Hollywood Hacking
 Hollywood Hacking / int_3ddddb25
comment
In Xiaolin Showdown, Kimiko frequently engages in this.
 Hollywood Hacking / int_3ddddb25
featureApplicability
1.0
 Hollywood Hacking / int_3ddddb25
featureConfidence
1.0
 Xiaolin Showdown
hasFeature
Hollywood Hacking / int_3ddddb25
 Hollywood Hacking / int_3e6269af
type
Hollywood Hacking
 Hollywood Hacking / int_3e6269af
comment
Real Genius: The climactic moment of sabotage is ultimately accomplished by tricking Kent into telling them where and when the test is being done, trying to hack the (1980s) military computer by brute-forcing a password (which is expected to take 6 hours, including temporary lockouts due to too many wrong passwords, and ultimately doesn't work), then using fake ids and social engineering to trick a guard into letting them onto the military base, and physically replacing a computer chip in the prototype with one the kids made that contains different targeting data. Also, since the people doing the hack had built the system themselves, they could be assumed to know enough about the hardware they're dealing with to make a replacement part that would work.
 Hollywood Hacking / int_3e6269af
featureApplicability
1.0
 Hollywood Hacking / int_3e6269af
featureConfidence
1.0
 Real Genius
hasFeature
Hollywood Hacking / int_3e6269af
 Hollywood Hacking / int_3ed069b5
type
Hollywood Hacking
 Hollywood Hacking / int_3ed069b5
comment
Alex Rider: Kyra was sent to a school for problem children of the super-rich after a prank involving an electronic billboard. She plays a major part in the escape from the school and the later rescue by adding a secret door combination to the security system.
 Hollywood Hacking / int_3ed069b5
featureApplicability
1.0
 Hollywood Hacking / int_3ed069b5
featureConfidence
1.0
 Alex Rider
hasFeature
Hollywood Hacking / int_3ed069b5
 Hollywood Hacking / int_3f633fb4
type
Hollywood Hacking
 Hollywood Hacking / int_3f633fb4
comment
Cracked completely deconstructs this entire trope with "5 Hacking Myths You Probably Believe Thanks to Movies".
 Hollywood Hacking / int_3f633fb4
featureApplicability
1.0
 Hollywood Hacking / int_3f633fb4
featureConfidence
1.0
 Cracked (Website)
hasFeature
Hollywood Hacking / int_3f633fb4
 Hollywood Hacking / int_3fbd173e
type
Hollywood Hacking
 Hollywood Hacking / int_3fbd173e
comment
How does Florence of Freefall sneak an unauthorized "update" to the Gardener in the Dark program into the servers? Physical access.
 Hollywood Hacking / int_3fbd173e
featureApplicability
1.0
 Hollywood Hacking / int_3fbd173e
featureConfidence
1.0
 Freefall (Webcomic)
hasFeature
Hollywood Hacking / int_3fbd173e
 Hollywood Hacking / int_402b4c55
type
Hollywood Hacking
 Hollywood Hacking / int_402b4c55
comment
In TekWar, hackers are frequently employed by the protagonist. The standard method of hacking involves an extremely detailed graphical user interface with things like waves of electrical energy to represent firewalls (and these firewalls can hurt you in real life). The hackers navigate these worlds as a real 3D landscape, including avoiding being caught by other hackers and programmers by ducking to avoid something hitting them.
 Hollywood Hacking / int_402b4c55
featureApplicability
1.0
 Hollywood Hacking / int_402b4c55
featureConfidence
1.0
 TekWar
hasFeature
Hollywood Hacking / int_402b4c55
 Hollywood Hacking / int_4125564b
type
Hollywood Hacking
 Hollywood Hacking / int_4125564b
comment
In Masterminds (1997), computer hacking consists of playing a literal computer game, consisting of hunting for a "valid entrance" in a 3-D animated dungeon (with hostile skeletons!), while the system itself proclaims full awareness of your activities and their illegality. It's a good enough sport to let you proceed without a fuss if you win.
 Hollywood Hacking / int_4125564b
featureApplicability
1.0
 Hollywood Hacking / int_4125564b
featureConfidence
1.0
 Masterminds (1997)
hasFeature
Hollywood Hacking / int_4125564b
 Hollywood Hacking / int_43339c8b
type
Hollywood Hacking
 Hollywood Hacking / int_43339c8b
comment
In Birds of Prey #126, The Calculator adds an eighth layer to the TCP/IP protocol to set up and access the hidden Internet, the Unternet.
 Hollywood Hacking / int_43339c8b
featureApplicability
1.0
 Hollywood Hacking / int_43339c8b
featureConfidence
1.0
 Birds of Prey (Comic Book)
hasFeature
Hollywood Hacking / int_43339c8b
 Hollywood Hacking / int_43576f5
type
Hollywood Hacking
 Hollywood Hacking / int_43576f5
comment
In Supernatural, Sam and Kevin can hack into almost any system when the plot demands it. In the episode "Devil May Care", Kevin hacks the military server obtaining private photos and personal information on a Sergeant with a couple of keystrokes.
 Hollywood Hacking / int_43576f5
featureApplicability
1.0
 Hollywood Hacking / int_43576f5
featureConfidence
1.0
 Supernatural
hasFeature
Hollywood Hacking / int_43576f5
 Hollywood Hacking / int_43a9c333
type
Hollywood Hacking
 Hollywood Hacking / int_43a9c333
comment
In Cowboy Bebop, Ed hacks via a school of cute, tiny fish nibbling on screenshots of web pages.
 Hollywood Hacking / int_43a9c333
featureApplicability
1.0
 Hollywood Hacking / int_43a9c333
featureConfidence
1.0
 Cowboy Bebop
hasFeature
Hollywood Hacking / int_43a9c333
 Hollywood Hacking / int_44fe781e
type
Hollywood Hacking
 Hollywood Hacking / int_44fe781e
comment
In Neon Genesis Evangelion, both an Angel and SEELE attempt to hack into the Tokyo-3 MAGI, and both are repelled by Ritsuko's l33t h@xx0r ski11z with accompanying Extreme Graphical Representation.
 Hollywood Hacking / int_44fe781e
featureApplicability
1.0
 Hollywood Hacking / int_44fe781e
featureConfidence
1.0
 Neon Genesis Evangelion
hasFeature
Hollywood Hacking / int_44fe781e
 Hollywood Hacking / int_474c18c1
type
Hollywood Hacking
 Hollywood Hacking / int_474c18c1
comment
BioShock Infinite gets rid of the hacking altogether by employing a Vigor called Possession, which turns machines and enemies into allies for the most part by shooting a "ghost" into them. The vending machines might reduce their prices for items, but every time they're "possessed" they spew a pile of coins. It doesn't work in every machine or enemy, however.
 Hollywood Hacking / int_474c18c1
featureApplicability
1.0
 Hollywood Hacking / int_474c18c1
featureConfidence
1.0
 BioShock Infinite (Video Game)
hasFeature
Hollywood Hacking / int_474c18c1
 Hollywood Hacking / int_483fcdf5
type
Hollywood Hacking
 Hollywood Hacking / int_483fcdf5
comment
The Mangler 2 features a website known as "The Hackers Mall" which appears to date from the early 1990s and displays a visual homage to the skull and crossbones from Independence Day, numerous examples of Everything Is Online (various "hacked" cables posing a physical threat to the protagonists), and a wired-up Lance Henriksen/computer hybrid with what looks like a bucket attached to its foot. Also, Cyberpunk Is Techno.
 Hollywood Hacking / int_483fcdf5
featureApplicability
1.0
 Hollywood Hacking / int_483fcdf5
featureConfidence
1.0
 The Mangler
hasFeature
Hollywood Hacking / int_483fcdf5
 Hollywood Hacking / int_49340431
type
Hollywood Hacking
 Hollywood Hacking / int_49340431
comment
Played with in the Brooklyn Nine-Nine episode "Ticking Clocks". Initially, it seems to be played straight, with an IT nerd spouting nonsense about how the precinct is in danger of being hacked, conveniently providing an exact timer until the hack is complete and jamming as much technobabble into his explanations as he can. In the end, it turns out that the "IT guy" is really a suspect in an ongoing case, and he was attempting to use social engineering to trick Captain Holt into wiping the Nine-Nine's servers, deleting all the evidence against him in the investigation. His plan is foiled when Amy recognizes him.
 Hollywood Hacking / int_49340431
featureApplicability
1.0
 Hollywood Hacking / int_49340431
featureConfidence
1.0
 Brooklyn Nine-Nine
hasFeature
Hollywood Hacking / int_49340431
 Hollywood Hacking / int_4b790c7a
type
Hollywood Hacking
 Hollywood Hacking / int_4b790c7a
comment
Iron Man 2:
Appears in a minor form near the beginning. While he does this all from an impossibly thin smartphone, when Tony hacks the display screens being used at the Senate hearing, if you look closely at the device as he handily holds it up for an instant, you can see that it is connected to several Microsoft SQL servers (did Oracle sponsor this movie?) and is running the "Stark Industries Terminal Hijack System". You can even see the images of the movies he shows later on in the scene in the corner, queued up. When you see the displays a split second later, it shows what appears to be an exploit involving using a built-in user, a common entry-point for hackers, to reboot the system to Stark's own operating system (complete with "Welcome Mr. Stark" printed in asterisks across the screen). Entering a system in this manner doesn't take any particular processing power on behalf of the intruder. It's using far more on just loading up the videos! Imagine, if you will, a giant, well-barred gate — which is useless, because Stark discreetly had a copy of the key made. It hardly takes any effort if you know where to hit. While they do take a bit of artistic license, showing things you would never see and listing directories for cool scrolling text effect, at the very least the hack is depicted realistically.
It's a blink-and-you'll-miss-it subtle touch, but Ivan breaks into the Hammer Industries computer terminal by using a default or commonly used administrator username and password combination, a very simple thing that highlights one of Hammer's weaknesses. He says that their "software is shit", but what he might have meant was that their security is lacking... or was just saying it as one of his many Stealth Insults that all end up soaring over Hammer's bone head.
Later in the movie, when Ivan takes control of the Hammer Drones and War Machine, what sort of techno-lingo-made-up hacking tool do they use to free Rhodes from the suit's control? Reboot it.
 Hollywood Hacking / int_4b790c7a
featureApplicability
1.0
 Hollywood Hacking / int_4b790c7a
featureConfidence
1.0
 Iron Man 2
hasFeature
Hollywood Hacking / int_4b790c7a
 Hollywood Hacking / int_4d1ba412
type
Hollywood Hacking
 Hollywood Hacking / int_4d1ba412
comment
The Adventures of Dr. McNinja: Page 21 of "All the King's Dirtbikes and All the King's Men" shows Dark Smoke Puncher supposedly hacking the giant robot that used to be Cumberland. The screens show the robot shooting something, a couple of windows, and a close-up of its face. The Alt Text proceeds to lampshade it by saying "IN ORDER TO HACK THE ROBOT ONE MONITOR MUST BE DEVOTED TO LOOKING AT ITS FACE".
 Hollywood Hacking / int_4d1ba412
featureApplicability
1.0
 Hollywood Hacking / int_4d1ba412
featureConfidence
1.0
 The Adventures of Dr. McNinja (Webcomic)
hasFeature
Hollywood Hacking / int_4d1ba412
 Hollywood Hacking / int_4d2d6ce4
type
Hollywood Hacking
 Hollywood Hacking / int_4d2d6ce4
comment
In the Brotherhood of Nod ending of Command & Conquer: Tiberian Dawn, Nod hacks into GDI's Kill Sat via a virtual reality interface. Within the virtual world, a successful hacking requires dodging laser fire from a forest of turrets, then moving through a small hole that constantly changes shape. Two of the hackers are electrocuted by GDI's defenses.
 Hollywood Hacking / int_4d2d6ce4
featureApplicability
1.0
 Hollywood Hacking / int_4d2d6ce4
featureConfidence
1.0
 Command & Conquer: Tiberian Dawn (Video Game)
hasFeature
Hollywood Hacking / int_4d2d6ce4
 Hollywood Hacking / int_538ba773
type
Hollywood Hacking
 Hollywood Hacking / int_538ba773
comment
Joked about in The Machineries of Empire when Kel Cheris and a few drones watch a cheesy drama. The love interest character is supposed to be a hacker, but when they see the drama's idea of what hacking looks like, the drones start snickering and mocking the supposed computer genius.
 Hollywood Hacking / int_538ba773
featureApplicability
1.0
 Hollywood Hacking / int_538ba773
featureConfidence
1.0
 The Machineries of Empire
hasFeature
Hollywood Hacking / int_538ba773
 Hollywood Hacking / int_5515d5d9
type
Hollywood Hacking
 Hollywood Hacking / int_5515d5d9
comment
During Welcome to the Game, you will often be the target of a hacker, whereupon you do a short minigame to block them from doing so, the explanation for which is basically ridiculous.
 Hollywood Hacking / int_5515d5d9
featureApplicability
1.0
 Hollywood Hacking / int_5515d5d9
featureConfidence
1.0
 Welcome to the Game (Video Game)
hasFeature
Hollywood Hacking / int_5515d5d9
 Hollywood Hacking / int_58907201
type
Hollywood Hacking
 Hollywood Hacking / int_58907201
comment
Sinfest features Sisterhood member Clio and her highly successful string of attacks on DevilTech's fembot-production facilities. The fact that her target has a policy of installing unguarded data-ports on the exterior of its buildings makes things somewhat easier for her.
 Hollywood Hacking / int_58907201
featureApplicability
1.0
 Hollywood Hacking / int_58907201
featureConfidence
1.0
 Sinfest (Webcomic)
hasFeature
Hollywood Hacking / int_58907201
 Hollywood Hacking / int_5921531c
type
Hollywood Hacking
 Hollywood Hacking / int_5921531c
comment
Persona 5 has Futaba Sakura, a fifteen-year-old self-taught programming prodigy. Her computer screens are constantly filled with reams of code, and she can crack into virtually any database in existence in an afternoon by tapping away at her keyboard. She was a one-girl hacktivist group under the name Medjed in the past, and goes so far as to hack every single television broadcast in Japan to send the Phantom Thieves' final calling card. However, even she admits that there is information she can't grab, because some information simply isn't stored on the internet.
 Hollywood Hacking / int_5921531c
featureApplicability
1.0
 Hollywood Hacking / int_5921531c
featureConfidence
1.0
 Persona 5 (Video Game)
hasFeature
Hollywood Hacking / int_5921531c
 Hollywood Hacking / int_5afbc0cb
type
Hollywood Hacking
 Hollywood Hacking / int_5afbc0cb
comment
Dr. Alphys does this in Undertale when you traverse the Core, calling you periodically when you reach obstacles (or encounter Mettaton) so she can hack into it and make it possible for you to pass (or survive). It's all a set-up. The Core's traps and puzzles had long been deactivated; she turned them on again so she'd have an excuse to participate in the Player Character's journey. Mettaton, who's fed up with pretending to be a human-killing machine, decides to mess around with the systems himself and let the wind out of her heroic sails.
 Hollywood Hacking / int_5afbc0cb
featureApplicability
1.0
 Hollywood Hacking / int_5afbc0cb
featureConfidence
1.0
 Undertale (Video Game)
hasFeature
Hollywood Hacking / int_5afbc0cb
 Hollywood Hacking / int_5c07d6ab
type
Hollywood Hacking
 Hollywood Hacking / int_5c07d6ab
comment
Saints Row: The Third: In one level, the Saints hack into a rival gang's usernet. This involves you running around a Tron-like environment shooting their avatars, while the Big Bad tries to stop you by reversing your controls, giving you lag and making you play a command prompt game which unfairly victimizes unicorns.
 Hollywood Hacking / int_5c07d6ab
featureApplicability
1.0
 Hollywood Hacking / int_5c07d6ab
featureConfidence
1.0
 Saints Row: The Third (Video Game)
hasFeature
Hollywood Hacking / int_5c07d6ab
 Hollywood Hacking / int_5c897f4a
type
Hollywood Hacking
 Hollywood Hacking / int_5c897f4a
comment
In Schlock Mercenary, hacking is usually done by A.I.s with high amounts of processing power or via physical access. When they give specifics, it's usually brute force using quantum computers or "rubber hose" cryptography.
 Hollywood Hacking / int_5c897f4a
featureApplicability
1.0
 Hollywood Hacking / int_5c897f4a
featureConfidence
1.0
 Schlock Mercenary (Webcomic)
hasFeature
Hollywood Hacking / int_5c897f4a
 Hollywood Hacking / int_5e1bea92
type
Hollywood Hacking
 Hollywood Hacking / int_5e1bea92
comment
Spybot: The Nightfall Incident depicts hacking as a turn-based strategy game, with different programs representing both your own units and enemy units. No longer hosted on the Lego site, but can be found here among other places.
 Hollywood Hacking / int_5e1bea92
featureApplicability
1.0
 Hollywood Hacking / int_5e1bea92
featureConfidence
1.0
 Spybot: The Nightfall Incident (Video Game)
hasFeature
Hollywood Hacking / int_5e1bea92
 Hollywood Hacking / int_61028f2
type
Hollywood Hacking
 Hollywood Hacking / int_61028f2
comment
Johnny Mnemonic, unsurprisingly written by William Gibson (both the short story and the screenplay), has a scene in which Johnny uses a VR headset and gloves for hacking, entering codes on a virtual keypad and in some places rearranging some blocks in a pyramid-shaped 3D puzzle, and another time hacking into his own brain with an avatar that dodged attacks from a security program and pulled an image out of his implant. The original short story just has Jones reading the imprint of the access code on his implant with a SQUID.
 Hollywood Hacking / int_61028f2
featureApplicability
1.0
 Hollywood Hacking / int_61028f2
featureConfidence
1.0
 Johnny Mnemonic
hasFeature
Hollywood Hacking / int_61028f2
 Hollywood Hacking / int_62148c49
type
Hollywood Hacking
 Hollywood Hacking / int_62148c49
comment
Lie of Caelum: Aya can hack certain terminals to activate machines or unlock doors, and this hacking takes the form of a bullet hell obstacle course. Some puzzles can be either solved normally or solved through hacking.
 Hollywood Hacking / int_62148c49
featureApplicability
1.0
 Hollywood Hacking / int_62148c49
featureConfidence
1.0
 Lie Of Caelum (Video Game)
hasFeature
Hollywood Hacking / int_62148c49
 Hollywood Hacking / int_66f7ccb9
type
Hollywood Hacking
 Hollywood Hacking / int_66f7ccb9
comment
In Welcome to the Game II, you are the hacker, but your methods are ridiculous from the get-go (though grounded in reality, at least). WEP-encrypted Wi-Fi networks can apparently be cracked by identifying a vulnerable port and then running a password cracker program to find the password. WPA and WPA2-encrypted Wi-Fi networks require injecting a vulnerability into the router, which can be stopped if the router detects that the vulnerability is being injected (by trying to do too much too quickly), which then makes a port vulnerable to the password cracker. About the only actually real aspect is that unprotected Wi-Fi networks (that is, unencrypted networks with no passwords) are a security hellhole: hacks are more likely, speed is terrible, and if the police are looking for you, they'll be able to trace your IP much faster than on a protected network.
 Hollywood Hacking / int_66f7ccb9
featureApplicability
1.0
 Hollywood Hacking / int_66f7ccb9
featureConfidence
1.0
 Welcome to the Game II / Videogame
hasFeature
Hollywood Hacking / int_66f7ccb9
 Hollywood Hacking / int_6787d27b
type
Hollywood Hacking
 Hollywood Hacking / int_6787d27b
comment
Similarly, in Batman: Arkham Origins, Batman needs access to the National Criminal Database in order to find out crucial information on The Joker. But the servers are offline, so Batman has to physically infiltrate the GCPD, plug a device into the servers, then perform air gap bridging in order to gain remote access to the server.
 Hollywood Hacking / int_6787d27b
featureApplicability
1.0
 Hollywood Hacking / int_6787d27b
featureConfidence
1.0
 Batman: Arkham Origins (Video Game)
hasFeature
Hollywood Hacking / int_6787d27b
 Hollywood Hacking / int_67a60c5f
type
Hollywood Hacking
 Hollywood Hacking / int_67a60c5f
comment
In Batman: Arkham Knight, Batman can't hack the Arkham Knight's drones until he obtains a part from a special drone, but even then, all he can do is turn off their targeting sensors temporarily. During Predator encounters, Batman cannot take control of drones unless he downloads the control codes directly from the drone controllers. He can also obtain a drone virus special weapon to use during Batmobile Tank encounters, but all the virus does is to overwrite the drones' IFF systems.
 Hollywood Hacking / int_67a60c5f
featureApplicability
1.0
 Hollywood Hacking / int_67a60c5f
featureConfidence
1.0
 Batman: Arkham Knight (Video Game)
hasFeature
Hollywood Hacking / int_67a60c5f
 Hollywood Hacking / int_67cc40be
type
Hollywood Hacking
 Hollywood Hacking / int_67cc40be
comment
Mr. Robot:
The show explicitly sets out to avert this trope. In the words of the veteran cyber-crime expert, they hired as a consultant for the show: "We want that code to be accurate so that even the most sophisticated hacker or technical person out there will not roll their eyes at a scene." They went to considerable extent to ensure this, too: in a scene where a hacker plants a snooping tool inside a cell phone they actually used an honest-to-goodness real-life spyware. They hid its name, but it's trivial for anyone with decent Google skills to find it out.
This trope is even discussed in a certain episode of the first season, which Romero (one of the hackers) complains about a film portraying hacking in an unrealistic way.
All the hacks depicted are painstakingly researched, and in many cases, actually performed by the consultants for the show. Whenever actual code, or other hacking tools, are shown being used on-screen, they will have actually been written and used, then recorded and played back for the camera. The most common Artistic License taken in the show is the time that the various hacks would take — actions that would take hours or even days to complete will be compressed down into far shorter timespans. One such "sped-up" example is Elliot hacking his neighbor's Wi-Fi. While the software used is accurate, the process happens in minutes opposed to the hours that it would take at best.
 Hollywood Hacking / int_67cc40be
featureApplicability
1.0
 Hollywood Hacking / int_67cc40be
featureConfidence
1.0
 Mr. Robot
hasFeature
Hollywood Hacking / int_67cc40be
 Hollywood Hacking / int_68f45eab
type
Hollywood Hacking
 Hollywood Hacking / int_68f45eab
comment
How do you hack in Idlewild IRV? Physically grab a program's avatar and wear it like Tricked-Out Gloves. Naturally, it's impossible to access any program that isn't visible at the time and place.
 Hollywood Hacking / int_68f45eab
featureApplicability
1.0
 Hollywood Hacking / int_68f45eab
featureConfidence
1.0
 Idlewild
hasFeature
Hollywood Hacking / int_68f45eab
 Hollywood Hacking / int_699dbb95
type
Hollywood Hacking
 Hollywood Hacking / int_699dbb95
comment
Similarly spoofed by Door Monster in "Hacker Fight", as each side employs more and more of this trope to gain the upper hand. Specific tactics used are: weird sunglasses, black trench coats, rad code names ("Enigma"), multiple monitors and keyboards, vague hacking metaphors, computer puns ("Byte me"), outdated leet speech ("This NOOB's about to get PWNED"), unreasonably convoluted user interfaces and skull gifs, finished off by pressing the enter button as hard as possible.
 Hollywood Hacking / int_699dbb95
featureApplicability
1.0
 Hollywood Hacking / int_699dbb95
featureConfidence
1.0
 Door Monster (Web Video)
hasFeature
Hollywood Hacking / int_699dbb95
 Hollywood Hacking / int_69daf29
type
Hollywood Hacking
 Hollywood Hacking / int_69daf29
comment
Grrl Power not only has the resident tech geek mock Hollywood Hacking ("are you asking if I routed it through the traffic light system and bounced it off a dozen satellites?"), but his main jobs thus far have been getting the social media sites in a tizzy over a specific event and breaking into a bank's security system (that he notes was poorly designed) so that he can upload their video footage onto YouTube.
 Hollywood Hacking / int_69daf29
featureApplicability
1.0
 Hollywood Hacking / int_69daf29
featureConfidence
1.0
 Grrl Power (Webcomic)
hasFeature
Hollywood Hacking / int_69daf29
 Hollywood Hacking / int_6a307d4
type
Hollywood Hacking
 Hollywood Hacking / int_6a307d4
comment
Titanfall: Pilots can hack stationary turrets and Spectres to automatically attack the enemy. This is accomplished by stabbing them with a "data knife".
 Hollywood Hacking / int_6a307d4
featureApplicability
1.0
 Hollywood Hacking / int_6a307d4
featureConfidence
1.0
 Titanfall (Video Game)
hasFeature
Hollywood Hacking / int_6a307d4
 Hollywood Hacking / int_6b526751
type
Hollywood Hacking
 Hollywood Hacking / int_6b526751
comment
In Weird Science, Wyatt uses a computer program, "Crypto Smasher v3.10", that provides a very detailed (for that time) graphical representation of the hacking he is doing to break into a military computer system. The connections are all rendered as tunnels, with the mainframe itself appearing as a vast space with CGI versions of images from the opening sequence of The Twilight Zone (1959).
 Hollywood Hacking / int_6b526751
featureApplicability
1.0
 Hollywood Hacking / int_6b526751
featureConfidence
1.0
 Weird Science
hasFeature
Hollywood Hacking / int_6b526751
 Hollywood Hacking / int_6bbde1c8
type
Hollywood Hacking
 Hollywood Hacking / int_6bbde1c8
comment
Sombra from Overwatch revels in this trope. She's The Cracker for resident terrorist organization Talon, and her preferred method of hacking into computer systems, emails, company websites, operation lifts, and even inactive mecha is by using her glove device and a Holographic Terminal. In-game, her hacking ability is essentially a form of a "silence" effect, preventing enemies from using their main active abilities, ultimates included (which range from activating rocket boosters, traveling back in time, throwing a bear trap, using a grappling hook, and sprinting).
 Hollywood Hacking / int_6bbde1c8
featureApplicability
1.0
 Hollywood Hacking / int_6bbde1c8
featureConfidence
1.0
 Overwatch (Video Game)
hasFeature
Hollywood Hacking / int_6bbde1c8
 Hollywood Hacking / int_6c1d09b3
type
Hollywood Hacking
 Hollywood Hacking / int_6c1d09b3
comment
In Fallout 3, hacking computers is done by opening up a key-log of recent entries and picking out complete words. The game then responds with the number of correct letters in that word- you get five guesses, hopefully getting closer each time, then the computer locks you out and usually sets off an alarm. In other words, it's a game of Mastermind. This style of hacking returns in Fallout 4, but with one change: failing to hack into the computer will only temporarily lock the computer down, so you can try again after a few moments.
 Hollywood Hacking / int_6c1d09b3
featureApplicability
1.0
 Hollywood Hacking / int_6c1d09b3
featureConfidence
1.0
 Fallout 3 (Video Game)
hasFeature
Hollywood Hacking / int_6c1d09b3
 Hollywood Hacking / int_6c9193a1
type
Hollywood Hacking
 Hollywood Hacking / int_6c9193a1
comment
In the seventh season of The Venture Bros., Billy and Pete attempt to hack the Venture building's computer to find its flaws, quickly lampshading how hacking isn't as cool as it appears in films.
 Hollywood Hacking / int_6c9193a1
featureApplicability
1.0
 Hollywood Hacking / int_6c9193a1
featureConfidence
1.0
 TheVentureBrothers
hasFeature
Hollywood Hacking / int_6c9193a1
 Hollywood Hacking / int_6cd6c4e8
type
Hollywood Hacking
 Hollywood Hacking / int_6cd6c4e8
comment
One episode of iZombie has Liv hacking into a database and her narration states that she's using SQL injection. That is a method of getting into a database, but it's well-known and a programmer can protect their application from it by taking some very simple steps.
 Hollywood Hacking / int_6cd6c4e8
featureApplicability
1.0
 Hollywood Hacking / int_6cd6c4e8
featureConfidence
1.0
 iZombie
hasFeature
Hollywood Hacking / int_6cd6c4e8
 Hollywood Hacking / int_6f734712
type
Hollywood Hacking
 Hollywood Hacking / int_6f734712
comment
Chloe Sullivan from Smallville is absolutely the queen of this trope. In the first season, she's merely an above-average hacker as a high school freshman. The next year she moves up the ability level scale by managing to hack the records of the charity that managed Clark's adoption. By Seasons 3 and 4, however, she's a complete master at hacking and can hack emergency services, electric grids, medical records, and as of the later seasons, even government agencies. In one episode of Season 8, she is given a piece of alien technology...and successfully hacks into it within a relatively short span of time.
 Hollywood Hacking / int_6f734712
featureApplicability
1.0
 Hollywood Hacking / int_6f734712
featureConfidence
1.0
 Smallville
hasFeature
Hollywood Hacking / int_6f734712
 Hollywood Hacking / int_71777d5d
type
Hollywood Hacking
 Hollywood Hacking / int_71777d5d
comment
White Rabbit Project: The Carbanak Gang legend in the "Heists" episode makes gratuitous use of the old scrolling garbage text on the monitor effect, although one part that shows the effect on an ATM looks suspiciously like the Linux SysV init bootscript.
 Hollywood Hacking / int_71777d5d
featureApplicability
1.0
 Hollywood Hacking / int_71777d5d
featureConfidence
1.0
 White Rabbit Project
hasFeature
Hollywood Hacking / int_71777d5d
 Hollywood Hacking / int_71e997c1
type
Hollywood Hacking
 Hollywood Hacking / int_71e997c1
comment
Shale Hill Secrets: The MC discovers a mysterious program called RECENTLY that lets him hack into computers and phones connected to the university's internet network and access the last five minutes of the users' activities.
 Hollywood Hacking / int_71e997c1
featureApplicability
1.0
 Hollywood Hacking / int_71e997c1
featureConfidence
1.0
 Shale Hill Secrets (Visual Novel)
hasFeature
Hollywood Hacking / int_71e997c1
 Hollywood Hacking / int_7291539d
type
Hollywood Hacking
 Hollywood Hacking / int_7291539d
comment
In Batman: Arkham City, Batman downloads the access codes to Gotham's public buildings after Penguin tries to trap him in the abandoned GCPD Forensics Lab building, but the stronger-encrypted TYGER consoles are off limits to him until he downloads a copy of the TYGER main control program during Protocol 10.
 Hollywood Hacking / int_7291539d
featureApplicability
1.0
 Hollywood Hacking / int_7291539d
featureConfidence
1.0
 Batman: Arkham City (Video Game)
hasFeature
Hollywood Hacking / int_7291539d
 Hollywood Hacking / int_73dac3e4
type
Hollywood Hacking
 Hollywood Hacking / int_73dac3e4
comment
In StarCrawlers, the Hacker's "viruses" are actually Nanomachines being programmed and deployed to attack enemies and support allies. In order to hack enemy systems, the Hacker needs physical access to terminals and security ports, and those only let them disable local security. Partway through the story missions, you will have an opportunity to repair a malfunctioning A.I., and in order to do so, you have to identify errors in the code using real-world knowledge of basic programming languages.
 Hollywood Hacking / int_73dac3e4
featureApplicability
1.0
 Hollywood Hacking / int_73dac3e4
featureConfidence
1.0
 StarCrawlers (Video Game)
hasFeature
Hollywood Hacking / int_73dac3e4
 Hollywood Hacking / int_7443be26
type
Hollywood Hacking
 Hollywood Hacking / int_7443be26
comment
The hacker from Streets of Rogue does this as his standard shtick; with a bit of typing on his keyboard, he can (remotely) make turrets target their owners, unlock safes, changes prices, and even flood buildings with poison gas. Other classes can get in on this to an extent, but without a hacking tool they have to access a building's server in person, and they have fewer options when they do.
 Hollywood Hacking / int_7443be26
featureApplicability
1.0
 Hollywood Hacking / int_7443be26
featureConfidence
1.0
 Streets of Rogue (Video Game)
hasFeature
Hollywood Hacking / int_7443be26
 Hollywood Hacking / int_74f1eb4c
type
Hollywood Hacking
 Hollywood Hacking / int_74f1eb4c
comment
Sneakers accurately depicts a lot of the social engineering aspects and overall straight-up footwork required to get the basic information on what you need to get into and how you get into it, while the stuff you see actually on the computer screens is utterly Hollywood.
 Hollywood Hacking / int_74f1eb4c
featureApplicability
1.0
 Hollywood Hacking / int_74f1eb4c
featureConfidence
1.0
 Sneakers
hasFeature
Hollywood Hacking / int_74f1eb4c
 Hollywood Hacking / int_755fadab
type
Hollywood Hacking
 Hollywood Hacking / int_755fadab
comment
Averted with Nagato Yuki's hacking skills in the anime of Haruhi Suzumiya when she hacks the backdoor which the computer society uses to cheat the Day of Sagittarius with real code — lots of it. Although we don't see the original lines of code she used to hack their backdoor, we do get glimpses of the code she uses to rewrite the game.
 Hollywood Hacking / int_755fadab
featureApplicability
-1.0
 Hollywood Hacking / int_755fadab
featureConfidence
1.0
 Haruhi Suzumiya
hasFeature
Hollywood Hacking / int_755fadab
 Hollywood Hacking / int_7668653a
type
Hollywood Hacking
 Hollywood Hacking / int_7668653a
comment
Mass Effect 2 has two different Hacking Minigames. The one where you connect pins on a circuit board to open doors is relatively plausible, whereas the one where you look for matching pieces of (unreadable) text in a scrolling grid to hack people's bank accounts is just as absurd as the first game's flashing lights.
 Hollywood Hacking / int_7668653a
featureApplicability
1.0
 Hollywood Hacking / int_7668653a
featureConfidence
1.0
 Mass Effect 2 (Video Game)
hasFeature
Hollywood Hacking / int_7668653a
 Hollywood Hacking / int_7668653b
type
Hollywood Hacking
 Hollywood Hacking / int_7668653b
comment
Mass Effect 3 does away with the hacking, you put your omnitool against the door and a few seconds later a VI works out the access codes for you.
 Hollywood Hacking / int_7668653b
featureApplicability
1.0
 Hollywood Hacking / int_7668653b
featureConfidence
1.0
 Mass Effect 3 (Video Game)
hasFeature
Hollywood Hacking / int_7668653b
 Hollywood Hacking / int_7785278d
type
Hollywood Hacking
 Hollywood Hacking / int_7785278d
comment
BioShock:
BioShock: Do you want to hack into a robot, a computer or even a vending machine? Play "Pipe Dream"! This is actually an artifact of an old plot idea where all of Rapture's tech was bio-mechanical and run by tiny men inside the machine. The pipes were increasing the ADAM flow to the man inside which would make him grateful to you.
BioShock 2 replaces this with a "hack tool" that presumably works like an electronic lock pick that requires split-second input a few times.
BioShock Infinite gets rid of the hacking altogether by employing a Vigor called Possession, which turns machines and enemies into allies for the most part by shooting a "ghost" into them. The vending machines might reduce their prices for items, but every time they're "possessed" they spew a pile of coins. It doesn't work in every machine or enemy, however.
 Hollywood Hacking / int_7785278d
featureApplicability
1.0
 Hollywood Hacking / int_7785278d
featureConfidence
1.0
 BioShock (Video Game)
hasFeature
Hollywood Hacking / int_7785278d
 Hollywood Hacking / int_791fca44
type
Hollywood Hacking
 Hollywood Hacking / int_791fca44
comment
BioShock: Do you want to hack into a robot, a computer or even a vending machine? Play "Pipe Dream"! This is actually an artifact of an old plot idea where all of Rapture's tech was bio-mechanical and run by tiny men inside the machine. The pipes were increasing the ADAM flow to the man inside which would make him grateful to you.
 Hollywood Hacking / int_791fca44
featureApplicability
1.0
 Hollywood Hacking / int_791fca44
featureConfidence
1.0
 BioShock (Video Game)
hasFeature
Hollywood Hacking / int_791fca44
 Hollywood Hacking / int_791fca45
type
Hollywood Hacking
 Hollywood Hacking / int_791fca45
comment
BioShock 2 replaces this with a "hack tool" that presumably works like an electronic lock pick that requires split-second input a few times.
 Hollywood Hacking / int_791fca45
featureApplicability
1.0
 Hollywood Hacking / int_791fca45
featureConfidence
1.0
 BioShock 2 (Video Game)
hasFeature
Hollywood Hacking / int_791fca45
 Hollywood Hacking / int_79620aaa
type
Hollywood Hacking
 Hollywood Hacking / int_79620aaa
comment
Sandra and Woo: The Devil tasks Karl with hacking into heaven's future prediction system. However, the procedure drags on with pretty much nothing happening, and the Devil complains that "readers are getting impatient".
 Hollywood Hacking / int_79620aaa
featureApplicability
1.0
 Hollywood Hacking / int_79620aaa
featureConfidence
1.0
 Sandra and Woo (Webcomic)
hasFeature
Hollywood Hacking / int_79620aaa
 Hollywood Hacking / int_7981ca33
type
Hollywood Hacking
 Hollywood Hacking / int_7981ca33
comment
WarGames invented the whole tapping-a-few-keys-and-saying-"We're-in" shtick, and set the general form of how every movie hacker is portrayed. At the time, the techniques presented in the film were very realistic, from phone phreaking, wardialing, to social engineering. Some aspects of which are still in use successfully today, especially the social engineering aspect. (Just look at the trope image.) It's just that Hollywood never got past the 1980s in terms of graphical representation. And in the real world, Technology Marches On and most of it got much, much more boring and automated since then. The most dramatic "hacking" scene, though, is very much straight out of Hollywood: WOPR attempts to crack the nuclear launch codes, and the characters in the password "lock in" one character at a time like some sort of bizarre slot machine. Real systems will never (intentionally) give you any information about an incorrect password other than the fact that it's wrong. Have you ever entered an incorrect password into a computer and been told which characters were incorrect?
 Hollywood Hacking / int_7981ca33
featureApplicability
1.0
 Hollywood Hacking / int_7981ca33
featureConfidence
1.0
 WarGames
hasFeature
Hollywood Hacking / int_7981ca33
 Hollywood Hacking / int_7988cb68
type
Hollywood Hacking
 Hollywood Hacking / int_7988cb68
comment
Mass Effect:
Just see this Penny Arcade strip for a description of Mass Effect's hacking. The PC version, for the record, has a slightly better version which at least mimics the interface of the player's "omni-tool". It still falls under this trope.
Mass Effect 2 has two different Hacking Minigames. The one where you connect pins on a circuit board to open doors is relatively plausible, whereas the one where you look for matching pieces of (unreadable) text in a scrolling grid to hack people's bank accounts is just as absurd as the first game's flashing lights.
Mass Effect 3 does away with the hacking, you put your omnitool against the door and a few seconds later a VI works out the access codes for you.
 Hollywood Hacking / int_7988cb68
featureApplicability
1.0
 Hollywood Hacking / int_7988cb68
featureConfidence
1.0
 Mass Effect (Franchise)
hasFeature
Hollywood Hacking / int_7988cb68
 Hollywood Hacking / int_7aaf9e41
type
Hollywood Hacking
 Hollywood Hacking / int_7aaf9e41
comment
Batman:
Batgirl Barbara Gordon, her villain counterpart the Calculator, and his daughter/her protege Proxy, all dabble into this.
Barbara is so good at it, she allows many to mistake her for a super-advanced AI of some kind, which helps protect her identity.
In Birds of Prey #126, The Calculator adds an eighth layer to the TCP/IP protocol to set up and access the hidden Internet, the Unternet.
As both Red Robin and Robin, Tim Drake displays a remarkable hacking aptitude, occasionally working under Barbara's tutelage. He's also the first Batfamily member to incorporate a functioning connection to the Batcomputer in his suit as Robin, and works on infiltrating and taking down the Unternet as Red Robin.
 Hollywood Hacking / int_7aaf9e41
featureApplicability
1.0
 Hollywood Hacking / int_7aaf9e41
featureConfidence
1.0
 Batman (Comic Book)
hasFeature
Hollywood Hacking / int_7aaf9e41
 Hollywood Hacking / int_7cf5a07
type
Hollywood Hacking
 Hollywood Hacking / int_7cf5a07
comment
The Flash (2014):
In "All-Star Team Up", resident super-genius Cisco estimates that he can hack into the city's municipal network in about half an hour. Felicity Smoak, guest-starring from Arrow sits down at a computer that happens to be sitting nearby and proceeds to do exactly that by typing for a few seconds. She later pulls a Dueling Hackers thing with the Villain of the Week over remote control of a swarm of robotic bees.
Another episode has Barry get past a combination lock by entering every possible combination at Super-Speed until he hits on the right one. A bit of Artistic License here, as most (but not all) systems that require you to enter a code for access have an anti-hacking feature where if the wrong code is entered more than a set number of times, the system disables and won't let anyone in for either a certain length of time or until a lengthy identity verification and password reset sequence is accomplished.
 Hollywood Hacking / int_7cf5a07
featureApplicability
1.0
 Hollywood Hacking / int_7cf5a07
featureConfidence
1.0
 The Flash (2014)
hasFeature
Hollywood Hacking / int_7cf5a07
 Hollywood Hacking / int_7f624b67
type
Hollywood Hacking
 Hollywood Hacking / int_7f624b67
comment
Sly Cooper does this whenever Bentley is hacking a system. This is probably one of the more reasonable stunts in the game. Of course, the games are pretty Troperrific already...
 Hollywood Hacking / int_7f624b67
featureApplicability
1.0
 Hollywood Hacking / int_7f624b67
featureConfidence
1.0
 SlyCooper
hasFeature
Hollywood Hacking / int_7f624b67
 Hollywood Hacking / int_80b01c30
type
Hollywood Hacking
 Hollywood Hacking / int_80b01c30
comment
Hanaukyō Maid Team has the maid staff trying to prevent a hacker from accessing their system by playing what appears to be a game of Centipede against a spider that's stealing information by walking across the screen and grabbing boxes from a warehouse. When Grace wakes up, she defeats the hackers with some quick keystrokes by summoning a giant Pac-Man.
 Hollywood Hacking / int_80b01c30
featureApplicability
1.0
 Hollywood Hacking / int_80b01c30
featureConfidence
1.0
 Hanaukyō Maid Team (Manga)
hasFeature
Hollywood Hacking / int_80b01c30
 Hollywood Hacking / int_8213eb6e
type
Hollywood Hacking
 Hollywood Hacking / int_8213eb6e
comment
In Soul Drinker, a mechanized tech adept connects via a mechanical implant to an ancient relic... and uses it to hack the sentient circuitry inside at the speed of thought, as the technology was so advanced that they couldn't keep up otherwise. According to the description, the relic is so amazed at having the first of four gene-encoders broken through (and therefore light up on the grip) that the second one falls soon after.
 Hollywood Hacking / int_8213eb6e
featureApplicability
1.0
 Hollywood Hacking / int_8213eb6e
featureConfidence
1.0
 Soul Drinkers
hasFeature
Hollywood Hacking / int_8213eb6e
 Hollywood Hacking / int_8434a7aa
type
Hollywood Hacking
 Hollywood Hacking / int_8434a7aa
comment
The Net (1995) focuses on a mysterious secret program that is used to erase Angela's identity from every computer in the world. The film culminates with the deletion of the program, which reverses the erasure: this is comparable to deleting your personal copy of OpenOffice and thus undoing every edit you've made to every OpenOffice file, even those you've moved to other computers.
 Hollywood Hacking / int_8434a7aa
featureApplicability
1.0
 Hollywood Hacking / int_8434a7aa
featureConfidence
1.0
 The Net (1995)
hasFeature
Hollywood Hacking / int_8434a7aa
 Hollywood Hacking / int_84377fd8
type
Hollywood Hacking
 Hollywood Hacking / int_84377fd8
comment
In G.I. Joe: The Rise of Cobra, Breaker manages to hack a dead man's brain.
 Hollywood Hacking / int_84377fd8
featureApplicability
1.0
 Hollywood Hacking / int_84377fd8
featureConfidence
1.0
 G.I. Joe: The Rise of Cobra
hasFeature
Hollywood Hacking / int_84377fd8
 Hollywood Hacking / int_85a5a3b9
type
Hollywood Hacking
 Hollywood Hacking / int_85a5a3b9
comment
Raf from Transformers: Prime hacks into the federal network of the USA to find out where one of their microchipped agents is. He's 12 (and a quarter!). He does this later on to find out a train's exact coordinates. This also bites him in the ass, when one of MECH's mooks realizes what Raf's doing and with a flick of a switch makes a "bomb" go off in Raf's laptop, even making the hardware sizzle. Hollywood Counter-Hacking everybody.
 Hollywood Hacking / int_85a5a3b9
featureApplicability
1.0
 Hollywood Hacking / int_85a5a3b9
featureConfidence
1.0
 Transformers: Prime
hasFeature
Hollywood Hacking / int_85a5a3b9
 Hollywood Hacking / int_85a9b36f
type
Hollywood Hacking
 Hollywood Hacking / int_85a9b36f
comment
In The Emoji Movie, the character Jailbreak is shown using a form of smartwatch to hack several things. It also displays a firewall as a literal being. Jailbreak is shown "hacking" this by guessing the password at least fifty times.
 Hollywood Hacking / int_85a9b36f
featureApplicability
1.0
 Hollywood Hacking / int_85a9b36f
featureConfidence
1.0
 The Emoji Movie
hasFeature
Hollywood Hacking / int_85a9b36f
 Hollywood Hacking / int_876cd173
type
Hollywood Hacking
 Hollywood Hacking / int_876cd173
comment
Watch_Dogs and its successors are basically this trope in game form. Hacking a train, some traffic lights, a door, anything and everything connected online by pressing only a single button? Hellz yeah.note As it turns out, such hacking is actually plausible IRL, if not anywhere near as conveniently in-game. Admittedly, though, a number of the tricks are only possible because the protagonists use exploits and backdoors that were built into the system. Also partially averted that, befitting the nature of the open world game, you have to go through and look for access points instead of hacking everything at the comfort of your characters' home.
 Hollywood Hacking / int_876cd173
featureApplicability
-1.0
 Hollywood Hacking / int_876cd173
featureConfidence
1.0
 Watch_Dogs (Video Game)
hasFeature
Hollywood Hacking / int_876cd173
 Hollywood Hacking / int_8c264362
type
Hollywood Hacking
 Hollywood Hacking / int_8c264362
comment
In Skyfall, Q has a hacking display resembling a wire model, whilst hacking can be used to achieve practically anything, from leaving "breadcrumbs", to causing gas explosions. It isn't, by any means, the first James Bond movie to feature hacking, but it is perhaps the straightest example of this trope. More intriguingly, Q claims that only roughly six people are competent enough in the world to design honeypot files which are designed to wipe system memory when the files are accessed, and then claims that he was the person who invented this. Having now established himself as a security expert, he then networks the Big Bad's laptop directly into the MI6 main server...
 Hollywood Hacking / int_8c264362
featureApplicability
1.0
 Hollywood Hacking / int_8c264362
featureConfidence
1.0
 Skyfall
hasFeature
Hollywood Hacking / int_8c264362
 Hollywood Hacking / int_8d81bb26
type
Hollywood Hacking
 Hollywood Hacking / int_8d81bb26
comment
NCIS:
The episode "Driven" has a sabotaged car-driving AI, and the team hacks into the SUV through sensor feed transmissions. Yes, there is a manual-adjustment feed, for slight adjustments of a specific system, but they use it to hack into root control within seconds. Then they have a fancy GUI menu on their own system to interface with it.
The episode "Kill Screen" has a semi-plausible cyberattack scheme in which a hacker inserts a sophisticated subroutine into an online video game that he's lead programmer on. He can then use this to hijack the player's computers to use as a distributed network that acts as an encryption-breaking supercomputer. However, the computing power he gets from this is massively exaggerated, and the setup is seemingly able to crack the Pentagon's network within half an hour (with convenient timer and graphical progress representation). Once discovered, such an attack should be easy to stop, but the NCIS team instead has to Race Against the Clock to shut down the main server.
One episode even has two characters fighting a hacker by, no joke, typing simultaneously on the same keyboard. Somehow the keyboard is able to take more than one input at the same time, and those characters are somehow filing two separate commands rather than creating mixed lines of gibberish (unless they're somehow psychic and know exactly what their partner is about to type). Another character foils the hacker... by unplugging the computer, and looking at his two panicking subordinates like they were being idiots (which they were). If he just unplugged the monitor, the action would be worse than useless because the hacking would still be occurring; they'd just be unable to see it. If he unplugged the entire computer stack, the attempt would still be useless because this wouldn't cut power to the server, which is presumably elsewhere in the building. This scene is mocked mercilessly in the Cracked article "8 Scenes That Prove Hollywood Doesn't Get Technology".
An episode had the team recover a micro SD card and, fearing it had a virus on it but still needing to see its contents, decide to open it using a laptop that's been "isolated" - by being put in a glass box. Then the virus still spreads through the power cable.
 Hollywood Hacking / int_8d81bb26
featureApplicability
1.0
 Hollywood Hacking / int_8d81bb26
featureConfidence
1.0
 NCIS
hasFeature
Hollywood Hacking / int_8d81bb26
 Hollywood Hacking / int_8df5521b
type
Hollywood Hacking
 Hollywood Hacking / int_8df5521b
comment
In the lead-up to the Superman storyline The Fall of Metropolis, Lex Luthor is able to intercept a story Lois Lane wrote concerning the truth about his clone body using a special computer chip he made for all of his Lexcorp-brand computers and a simple modem, alter the story to make her a laughingstock and blame her for embezzlement of the Daily Planet's funds.
 Hollywood Hacking / int_8df5521b
featureApplicability
1.0
 Hollywood Hacking / int_8df5521b
featureConfidence
1.0
 Superman (Comic Book)
hasFeature
Hollywood Hacking / int_8df5521b
 Hollywood Hacking / int_8ffa8e6
type
Hollywood Hacking
 Hollywood Hacking / int_8ffa8e6
comment
In Science Girls!, Jennifer tries to get Missy to hack into the alien's wormhole device. Missy makes it very clear she can't hack into something that may not even be a computer, much less one she has no clue what the security is or even how it works. She even lampshades it by quipping "Hacking isn't magic, you know."
 Hollywood Hacking / int_8ffa8e6
featureApplicability
1.0
 Hollywood Hacking / int_8ffa8e6
featureConfidence
1.0
 Science Girls! (Video Game)
hasFeature
Hollywood Hacking / int_8ffa8e6
 Hollywood Hacking / int_9068877a
type
Hollywood Hacking
 Hollywood Hacking / int_9068877a
comment
Referenced in Red vs. Blue season 6. Simmons is trying to get into a high-security system; Grif offers such helpful advice as "try hacking the mainframe" (or cracking it) or "try uploading a virus to the mainframe" featuring a laughing skull. Protip: it's not a mainframe, and a virus is definitely not going to help you spoof a randomly-generated 2056-bit encryption key.
 Hollywood Hacking / int_9068877a
featureApplicability
1.0
 Hollywood Hacking / int_9068877a
featureConfidence
1.0
 Red vs. Blue (Web Animation)
hasFeature
Hollywood Hacking / int_9068877a
 Hollywood Hacking / int_90a3a7f4
type
Hollywood Hacking
 Hollywood Hacking / int_90a3a7f4
comment
In Kim Possible, Wade can do this, mostly in regard to hacking speed. Most of it is explained away as him being a super-genius capable of inventing things like a holodeck and a love-ray. A typical moment for him is describing how tight security is before casually announcing that yeah, he's past it by now.
 Hollywood Hacking / int_90a3a7f4
featureApplicability
1.0
 Hollywood Hacking / int_90a3a7f4
featureConfidence
1.0
 Kim Possible
hasFeature
Hollywood Hacking / int_90a3a7f4
 Hollywood Hacking / int_90c73dda
type
Hollywood Hacking
 Hollywood Hacking / int_90c73dda
comment
Frequently occurs in Animorphs, usually by Ax, as a result of his advanced alien knowledge. Human computers are extremely primitive to him.
 Hollywood Hacking / int_90c73dda
featureApplicability
1.0
 Hollywood Hacking / int_90c73dda
featureConfidence
1.0
 Animorphs
hasFeature
Hollywood Hacking / int_90c73dda
 Hollywood Hacking / int_94478e2d
type
Hollywood Hacking
 Hollywood Hacking / int_94478e2d
comment
It's a blink-and-you'll-miss-it subtle touch, but Ivan breaks into the Hammer Industries computer terminal by using a default or commonly used administrator username and password combination, a very simple thing that highlights one of Hammer's weaknesses. He says that their "software is shit", but what he might have meant was that their security is lacking... or was just saying it as one of his many Stealth Insults that all end up soaring over Hammer's bone head.
 Hollywood Hacking / int_94478e2d
featureApplicability
1.0
 Hollywood Hacking / int_94478e2d
featureConfidence
1.0
 Stealth Insult
hasFeature
Hollywood Hacking / int_94478e2d
 Hollywood Hacking / int_9a9b24fa
type
Hollywood Hacking
 Hollywood Hacking / int_9a9b24fa
comment
Jurassic Park (1993) has an infamous scene in which the kid hero exclaims "It's a UNIX system. I know this." over a screen of what appears to be zooming polygon nonsense. This program actually existed: it's a legitimate UNIX OS derivative from SGI called IRIX that was running a 3D file system navigator, but it never caught on due to being very slow and overly flashy. Then again, "overly flashy" describes half the equipment in the park, so that at least makes some sense why Hammond would insist on using such a system. This scene has become so iconic of all that's wrong about Hollywood depictions of technology that Reddit has a whole "subreddit" (forum) dedicated to "every over-the-top, embarrassing, and downright flat-out incorrect usage of technology found in movies, TV shows, and video games"note (except for wrong IP addresses; those are so frequent that they're not accepted anymore) called, you guessed it, r/ItsAUnixSystem.
 Hollywood Hacking / int_9a9b24fa
featureApplicability
1.0
 Hollywood Hacking / int_9a9b24fa
featureConfidence
1.0
 Jurassic Park (1993)
hasFeature
Hollywood Hacking / int_9a9b24fa
 Hollywood Hacking / int_9cab62ed
type
Hollywood Hacking
 Hollywood Hacking / int_9cab62ed
comment
The novella "True Names" did it three years before Neuromancer. It actually goes further by making the case in-universe that in the age of VR, effective hacking is by definition Hollywood Hacking; governmental security is portrayed as less effective because of their agents' insistence on straightforward analogues of programming code and terminology to sensory representation, while the underground adopts and uses magical idioms and intuitive rather than logical interfaces.
 Hollywood Hacking / int_9cab62ed
featureApplicability
1.0
 Hollywood Hacking / int_9cab62ed
featureConfidence
1.0
 True Names
hasFeature
Hollywood Hacking / int_9cab62ed
 Hollywood Hacking / int_a3748187
type
Hollywood Hacking
 Hollywood Hacking / int_a3748187
comment
In JoJo's Bizarre Adventure: Golden Wind, a mysterious assistant (who turns out to be Jean-Pierre Polnareff) apparently put a tracker in the police's computer database, letting him access the computers of anyone who looks through criminal records. When the heroes do this in an attempt to find the Boss' identity, he dramatically takes over the laptop they were using, causing the windows to dramatically fly off the and images to pop up while his voice comes out through the speakers; this also lets him hear what the heroes are saying.
 Hollywood Hacking / int_a3748187
featureApplicability
1.0
 Hollywood Hacking / int_a3748187
featureConfidence
1.0
 JoJo's Bizarre Adventure: Golden Wind (Manga)
hasFeature
Hollywood Hacking / int_a3748187
 Hollywood Hacking / int_a40b1126
type
Hollywood Hacking
 Hollywood Hacking / int_a40b1126
comment
Independence Day, with extra bonus points for hacking into an alien computer, and figuring out its display well enough to send a laughing skull and crossbones to the invaders. The novelization and deleted scenes imply that Apple computers (among other things) were derived from alien technology.
 Hollywood Hacking / int_a40b1126
featureApplicability
1.0
 Hollywood Hacking / int_a40b1126
featureConfidence
1.0
 Independence Day
hasFeature
Hollywood Hacking / int_a40b1126
 Hollywood Hacking / int_a4144a09
type
Hollywood Hacking
 Hollywood Hacking / int_a4144a09
comment
In MySims Agents, you can hack certain devices to get information. How? Simple, you use the remote to guide an icon through a scrolling maze under a time limit. Deviate from the light path, and your time runs out faster. Also, if you run into an icon at an intersection, it changes the route the path takes, which may be a longer way.
 Hollywood Hacking / int_a4144a09
featureApplicability
1.0
 Hollywood Hacking / int_a4144a09
featureConfidence
1.0
 MySims Agents (Video Game)
hasFeature
Hollywood Hacking / int_a4144a09
 Hollywood Hacking / int_a4514a75
type
Hollywood Hacking
 Hollywood Hacking / int_a4514a75
comment
Cracking a nanofield in Iji is accomplished by maneuvering a little square on a grid of flashing squares to reach the opposite corner. Maybe the nanobots are just giving Iji an Extreme Graphical Representation or something.
 Hollywood Hacking / int_a4514a75
featureApplicability
1.0
 Hollywood Hacking / int_a4514a75
featureConfidence
1.0
 Iji (Video Game)
hasFeature
Hollywood Hacking / int_a4514a75
 Hollywood Hacking / int_a7a0b48b
type
Hollywood Hacking
 Hollywood Hacking / int_a7a0b48b
comment
In NieR: Automata, hacking is often portrayed as controlling a tiny Asteroids-style spaceship and shooting at defense systems in a manner akin to old-school twin-stick shooters (a la Robotron 2040) until the core is exposed, then destroying the core. Most of the time, this results in the hacked machine lifeform self-destructing, although the player can occasionally either reprogram them to fight on their side or take remote control of the machine. Conversely, failing a hack — either by having your ship destroyed or running out of time — causes feedback that will cause damage to your character. The process is depicted as nigh instantaneous, as the fighting in the game is paused during the hacking process. At the end of the game, if the player chooses to fight A2 as 9S, the final hack performed on A2 will depict the player hacking into A2's pause menu, essentially attacking her operating system directly. Succeeding in this hack will instantly defeat her.
 Hollywood Hacking / int_a7a0b48b
featureApplicability
1.0
 Hollywood Hacking / int_a7a0b48b
featureConfidence
1.0
 NieR: Automata / Videogame
hasFeature
Hollywood Hacking / int_a7a0b48b
 Hollywood Hacking / int_a895e9d3
type
Hollywood Hacking
 Hollywood Hacking / int_a895e9d3
comment
Portal 2:
Hilariously sent up in this scene. Wheatley tries to hack a password by trying each password in alphabetical order... slowly. He still manages to screw the order up. Later on in the game, he tries this tactic again, and again screws up the order. Surprisingly enough, by missing a letter, he actually gets the password right!
About halfway through the game, he tries to hack into the neurotoxin control centre, which mostly involves putting on an accent and pretending to be a neurotoxin inspector. Performing a "manual override" on a wall or "hacking" a door, meanwhile, is much more violent than the name suggests.
 Hollywood Hacking / int_a895e9d3
featureApplicability
1.0
 Hollywood Hacking / int_a895e9d3
featureConfidence
1.0
 Portal 2 (Video Game)
hasFeature
Hollywood Hacking / int_a895e9d3
 Hollywood Hacking / int_a949e666
type
Hollywood Hacking
 Hollywood Hacking / int_a949e666
comment
Elysium shows console text and computer code, the need for physical access, and the ease with which Elysium is rebooted and its citizen registry altered is due to the use of code stolen from an insider who wrote it explicitly to mount a coup. Of course, this still leaves the gaping plot hole of why downloading the code from his head into the core would kill him when they're clearly downloading and displaying it from his head onto the monitors in the smugglers' base.
 Hollywood Hacking / int_a949e666
featureApplicability
1.0
 Hollywood Hacking / int_a949e666
featureConfidence
1.0
 Elysium
hasFeature
Hollywood Hacking / int_a949e666
 Hollywood Hacking / int_a96a7ada
type
Hollywood Hacking
 Hollywood Hacking / int_a96a7ada
comment
Yu-Gi-Oh!:
In Yu-Gi-Oh! ZEXAL, Yuma's sister Akari attempts to track down and destroy a virus, complete with an RPG-style dungeon and a boss battle.
Yu-Gi-Oh! 5Ds has a different version; rather than passwords, information is hidden behind duel puzzles (a duel-in-progress is presented and you have limited chances to figure out how to win in one turn). It's an... interesting way of shoehorning duels into episodes that otherwise wouldn't have them. At one point the access to an important database is hidden inside a duel puzzle arcade machine — the person who thought it up claims that nobody would look for a database there, plus he can slack off at the arcade and claim it's for work.
Yu-Gi-Oh! VRAINS gets credit for showing the viewers that the camera is skipping the long, boring hours spent staring at pages of programming language, and appropriately uses Technobabble to show that the writers have probably skimmed a programming book. It loses credit for abuse of Extreme Graphical Representation and gains a bit of it back when Yusaku's use of older versions of duel disks and physical cards is an actual hacker technique.
 Hollywood Hacking / int_a96a7ada
featureApplicability
1.0
 Hollywood Hacking / int_a96a7ada
featureConfidence
1.0
 Yu-Gi-Oh! (Franchise)
hasFeature
Hollywood Hacking / int_a96a7ada
 Hollywood Hacking / int_ac484a35
type
Hollywood Hacking
 Hollywood Hacking / int_ac484a35
comment
In Den-noh Coil, even the least eye-catching examples of hacking look suspiciously like Hermetic Magic and Instant Runes (the more visual ones involve rockets). In this case, though, it's because a) they're not using the internet at all, but rather Augmented Reality technology, and b) the Augmented Reality subculture in the series is dominated mostly by preteen children, the exact sort of people who would try to make hacking as flashy as possible.
 Hollywood Hacking / int_ac484a35
featureApplicability
1.0
 Hollywood Hacking / int_ac484a35
featureConfidence
1.0
 Den-noh Coil
hasFeature
Hollywood Hacking / int_ac484a35
 Hollywood Hacking / int_ad20e006
type
Hollywood Hacking
 Hollywood Hacking / int_ad20e006
comment
Wonder Woman (1975): In "IRAC is Missing", Bernard Havitol steals IRAC by connecting a briefcase to the machine. Once complete, IRAC is in the briefcase and no longer in the massive tape machines, terminal, et al, and there is no way to retrieve IRAC from backups or piece it back together. That Havitol has IRAC completely and utterly is the main plot of the episode.
 Hollywood Hacking / int_ad20e006
featureApplicability
1.0
 Hollywood Hacking / int_ad20e006
featureConfidence
1.0
 Wonder Woman (1975)
hasFeature
Hollywood Hacking / int_ad20e006
 Hollywood Hacking / int_ae09831c
type
Hollywood Hacking
 Hollywood Hacking / int_ae09831c
comment
Dopamine was basically written for the express purpose of subverting this trope. There are over a dozen instances of some form of hacking or another, and they're depicted with exact concordance with reality.
When Danny's team cracks Tungsten's WEP key in Act I, the text describes the exact tool used — "Cain and Abel" — and the exact method Danny employs to use it.
In Act III, when Danny breaks into Rock Box Security Co, we're given the exact console command required to open a reverse shell on Mac OS X.
The author has literally Shown Their Work on this one. The book's official website has an entire section detailing the exact technical details of every hacking technique used in the book, along with an intro about the STRIDE computer security model. The website's documentation can be used as a layman's primer on computer hacking in and of itself.
In the commentary on Chapter 14, the author describes trying out the cellphone hack himself several times with real equipment. This is evidently the case for all of the hacks depicted in the novel, but the cellphone one was noteworthy because of the fluidity of the cellphone market; the most appropriate burner phone available for sale kept changing as he was writing the manuscript, requiring him to repeatedly update the scene with revisions to the hacking technique.
 Hollywood Hacking / int_ae09831c
featureApplicability
1.0
 Hollywood Hacking / int_ae09831c
featureConfidence
1.0
 Dopamine
hasFeature
Hollywood Hacking / int_ae09831c
 Hollywood Hacking / int_b0544c4a
type
Hollywood Hacking
 Hollywood Hacking / int_b0544c4a
comment
In Stage 13 of Super Robot Wars W, some members of the team, including Kazuma, try to earn some extra cash by helping Aqua Crimson debug a video game that her company is developing. They do this by piloting simulated versions of their robots against simulated versions of Aestivalis and the Nadesico, which are apparently the representation of bugs according to Aqua. It later turns out that she's lying: the Aestivalis represent the Nadesico's defense programs, and the Nadesico is the representation of Omoikane, the Nadesico's AI. The entire job is a scheme to destroy the Nadesico's computer system.
 Hollywood Hacking / int_b0544c4a
featureApplicability
1.0
 Hollywood Hacking / int_b0544c4a
featureConfidence
1.0
 Super Robot Wars W (Video Game)
hasFeature
Hollywood Hacking / int_b0544c4a
 Hollywood Hacking / int_b128983d
type
Hollywood Hacking
 Hollywood Hacking / int_b128983d
comment
Floating Point takes place Inside a Computer System, but generally subverts this trope with extensive explanations for why two digital lifeforms need to stab each other with knives. (The knives are actually malware apps that require a physics exploit to lock onto their targets and identify security weaknesses.)
 Hollywood Hacking / int_b128983d
featureApplicability
1.0
 Hollywood Hacking / int_b128983d
featureConfidence
1.0
 Floating Point
hasFeature
Hollywood Hacking / int_b128983d
 Hollywood Hacking / int_b12ee45b
type
Hollywood Hacking
 Hollywood Hacking / int_b12ee45b
comment
In Net Force, people use VR to demolish code or bypass filters, such as killing viruses by turning them in nasty rats in a city or passing firewalls by shooting them in a Wild West duel. It's a lot more fun than sitting at a command prompt and getting carpal tunnel, according to the personnel.
 Hollywood Hacking / int_b12ee45b
featureApplicability
1.0
 Hollywood Hacking / int_b12ee45b
featureConfidence
1.0
 Net Force
hasFeature
Hollywood Hacking / int_b12ee45b
 Hollywood Hacking / int_b1fed9dd
type
Hollywood Hacking
 Hollywood Hacking / int_b1fed9dd
comment
Contest of Champions (2015): Spoofed when Night Thrasher tries to hack the Maestro's security systems keeping the heroes and villains imprisoned. Bullseye incredulously points out that you can't just declare you're going to hack something like that, as the scene shifts to Night Thrasher "inside" the system like it's a 1980s video game. Before she's even done complaining, he has in fact hacked the system.
 Hollywood Hacking / int_b1fed9dd
featureApplicability
1.0
 Hollywood Hacking / int_b1fed9dd
featureConfidence
1.0
 Contest of Champions (2015) (Comic Book)
hasFeature
Hollywood Hacking / int_b1fed9dd
 Hollywood Hacking / int_b31b332f
type
Hollywood Hacking
 Hollywood Hacking / int_b31b332f
comment
The Transformers Film Series, believe it or not. The Decepticons' hacking essentially boils down to them going up to the big computer hard-lines, plugging themselves in, and copying the information. There is some techno talk about them having a special frequency to identify them, but the actual hacking averts many clichés. The human hacker, meanwhile, has to have a copy of the intrusion (basically the web history stating what file names were copied, without anything else shown) onto a memory stick, taken to him manually, and unlock some encrypted/embedded information. Still fairly Hollywoodish, but the way it works is entirely possible. Considering the many other liberties taken (the spider bug virus being notable, and all systems being shut down by said virus), they're handwaved by the fact that it's aliens interacting with technology based on a reverse-engineered Megatron.
 Hollywood Hacking / int_b31b332f
featureApplicability
1.0
 Hollywood Hacking / int_b31b332f
featureConfidence
1.0
 Transformers Film Series
hasFeature
Hollywood Hacking / int_b31b332f
 Hollywood Hacking / int_b3708737
type
Hollywood Hacking
 Hollywood Hacking / int_b3708737
comment
TRON is a bit of legitimate and much Hollywood intrusion. The ideas of physically accessing the internal network to log in with a backdoor, and injecting high CPU-use problems into the system to keep the MCP busy are reasonably legitimate, the fact that your security programs are represented as Anthropomorphic Personifications inside the Grid, well... not so much.
 Hollywood Hacking / int_b3708737
featureApplicability
1.0
 Hollywood Hacking / int_b3708737
featureConfidence
1.0
 TRON
hasFeature
Hollywood Hacking / int_b3708737
 Hollywood Hacking / int_b4149c27
type
Hollywood Hacking
 Hollywood Hacking / int_b4149c27
comment
The Last Angel: Red One and Echo are both able to punch through software-based defenses like they weren't there on account of being military seed A.I.s, but simple hardware countermeasures like system isolation and keeping ships far enough away to impose light-lag issues stop both cold. Assuming, of course, that they haven't rigged the game by putting a time-delayed virus into your system ahead of time or acquired backdoors, which is not a safe assumption.
 Hollywood Hacking / int_b4149c27
featureApplicability
1.0
 Hollywood Hacking / int_b4149c27
featureConfidence
1.0
 The Last Angel
hasFeature
Hollywood Hacking / int_b4149c27
 Hollywood Hacking / int_b63ff53e
type
Hollywood Hacking
 Hollywood Hacking / int_b63ff53e
comment
Deep Rock Galactic:
Hacking disabled Patrol Bots is as simple as taking out your special hacking pad that the company gave you and solving a reaction puzzle.
Exaggerated and parodied with the Hacking Pods deployed during the Rival Incursion event. Rather than anything ultra-sophisticated, they're basically regular computers with too many monitors and a keyboard, with a hacking robot grafted into it (complete with white hat and RGB fans) that needs to physically use the keyboard, and does it so obnoxiously loudly it attracts every bug in the caverns.
 Hollywood Hacking / int_b63ff53e
featureApplicability
1.0
 Hollywood Hacking / int_b63ff53e
featureConfidence
1.0
 Deep Rock Galactic (Video Game)
hasFeature
Hollywood Hacking / int_b63ff53e
 Hollywood Hacking / int_b712435c
type
Hollywood Hacking
 Hollywood Hacking / int_b712435c
comment
Leverage:
Hardison is able to basically hack anything electronic, oftentimes from a cell phone. It is also notable that the difficulty of a hack is inversely proportional to its importance to the plot. He is able to hack into London's camera system effortlessly, but he often requires physical access for the target company's computer. While physical access is often necessary in reality, it would logically be necessary for police-controlled surveillance cameras as well.
At least a bit of this was explained early in the first season: Hardison spends considerable amounts of money and spare time getting back doors into any system he might someday feel the need to hack - he isn't often really breaking in on the fly, and his cell phone is usually giving commands to a much more powerful "home system". It's still unrealistic, but a surprising number of systems become much more hackable once somebody has the resources to do things such as produce shrink-wrapped software and substitute it for a company's order.
 Hollywood Hacking / int_b712435c
featureApplicability
1.0
 Hollywood Hacking / int_b712435c
featureConfidence
1.0
 Leverage
hasFeature
Hollywood Hacking / int_b712435c
 Hollywood Hacking / int_b7776ed1
type
Hollywood Hacking
 Hollywood Hacking / int_b7776ed1
comment
Handled realistically in Daniel Suarez's Daemon and its sequel, which shouldn't be surprising, since Suarez is One of Us and worked in computer security before becoming a novelist.
 Hollywood Hacking / int_b7776ed1
featureApplicability
1.0
 Hollywood Hacking / int_b7776ed1
featureConfidence
1.0
 Daemon
hasFeature
Hollywood Hacking / int_b7776ed1
 Hollywood Hacking / int_b7d3b813
type
Hollywood Hacking
 Hollywood Hacking / int_b7d3b813
comment
Parodied (like everything else) in Kung Fury with Hackerman, who specializes in this. "With the right computer algorithms, I can hack you back in time, just like a time machine." Hacking can also heal bullet wounds, revive the dead, and turn Hackerman into a robot with a laser gun. In this video, Hackerman shows us how to hack time.
 Hollywood Hacking / int_b7d3b813
featureApplicability
1.0
 Hollywood Hacking / int_b7d3b813
featureConfidence
1.0
 Kung Fury
hasFeature
Hollywood Hacking / int_b7d3b813
 Hollywood Hacking / int_b8c3cc30
type
Hollywood Hacking
 Hollywood Hacking / int_b8c3cc30
comment
In Young Justice (2010), Robin plays up his hacking abilities, since he's more of a smart guy here, especially in the first season. He uses a wrist-mounted holographic computer which allows him to hack into any secret computer database, usually with the help of a USB cable or typing a few commands. At one point, he's even able to bypass some locked doors with a little smiley face of Robin on his computer screen appearing over each one.
 Hollywood Hacking / int_b8c3cc30
featureApplicability
1.0
 Hollywood Hacking / int_b8c3cc30
featureConfidence
1.0
 Young Justice (2010)
hasFeature
Hollywood Hacking / int_b8c3cc30
 Hollywood Hacking / int_b9cdc91d
type
Hollywood Hacking
 Hollywood Hacking / int_b9cdc91d
comment
Mostly averted in Dredd. Taking control of Peachtrees's computer systems involves a combination of breaking into the server room to alter the hardware and a number of social-engineering phone calls rather than screens full of code (although when we do see Clan Techie's computer screen, he appears to be working in Bash rather than the usual eye candy).
 Hollywood Hacking / int_b9cdc91d
featureApplicability
-1.0
 Hollywood Hacking / int_b9cdc91d
featureConfidence
1.0
 Dredd
hasFeature
Hollywood Hacking / int_b9cdc91d
 Hollywood Hacking / int_bac46af6
type
Hollywood Hacking
 Hollywood Hacking / int_bac46af6
comment
The Core has one of the characters reroute power from the US to a single location and find secret weapons files seemingly from the Internet.
 Hollywood Hacking / int_bac46af6
featureApplicability
1.0
 Hollywood Hacking / int_bac46af6
featureConfidence
1.0
 The Core
hasFeature
Hollywood Hacking / int_bac46af6
 Hollywood Hacking / int_bcb32dc6
type
Hollywood Hacking
 Hollywood Hacking / int_bcb32dc6
comment
Shadowrun has been fairly open about using this trope from the beginning, in order for the team hacker not having to be an NPC or GMPC:
Behind the pretty G.U.I., hacking works more or less like plausible hacking with radically advanced computer technology and nigh-unlimited computer resources. The "normal" hackers are using semi-magical abilities which let them bypass all that and hack things instinctively, with some significant downsides. They'd be the real Hollywood Hackers, since if they claim to be "Spoofing the Firewall to Brute-Force the TCP/IP Kernel," it would actually work!
Also, Shadowrun (depending on version you're using) actually based things on real life — you actually are using hacking tools. Often times you're just using a program to repeatedly issue various commands to basically break the program you're interacting with. The security programs in Shadowrun are coded to recognize when they're under attack and retort with basically the same thing. The difference being that buffer overflows in living creatures tend to have more serious consequences.
 Hollywood Hacking / int_bcb32dc6
featureApplicability
1.0
 Hollywood Hacking / int_bcb32dc6
featureConfidence
1.0
 Shadowrun (Tabletop Game)
hasFeature
Hollywood Hacking / int_bcb32dc6
 Hollywood Hacking / int_be041abe
type
Hollywood Hacking
 Hollywood Hacking / int_be041abe
comment
Apocalypse: Each time Derren sends fake news about the meteor shower to the hijacked iDevice, they roll a CGI scene of the signal being sent out to a satellite and bounced back to earth. Ultimately, this is just for Rule of Cool. No iDevice in the market has a satellite-capable phone radio; the signal will still come through cell towers just like other phones. Subverted, however, when they were hacking Steven's phone; it can be clearly seen that they are actually jailbreaking it and then installing a VNC server among other things.
 Hollywood Hacking / int_be041abe
featureApplicability
-0.3
 Hollywood Hacking / int_be041abe
featureConfidence
1.0
 Apocalypse
hasFeature
Hollywood Hacking / int_be041abe
 Hollywood Hacking / int_c22905b5
type
Hollywood Hacking
 Hollywood Hacking / int_c22905b5
comment
As both Red Robin and Robin, Tim Drake displays a remarkable hacking aptitude, occasionally working under Barbara's tutelage. He's also the first Batfamily member to incorporate a functioning connection to the Batcomputer in his suit as Robin, and works on infiltrating and taking down the Unternet as Red Robin.
 Hollywood Hacking / int_c22905b5
featureApplicability
1.0
 Hollywood Hacking / int_c22905b5
featureConfidence
1.0
 Red Robin (Comic Book)
hasFeature
Hollywood Hacking / int_c22905b5
 Hollywood Hacking / int_c342be9
type
Hollywood Hacking
 Hollywood Hacking / int_c342be9
comment
Paradroid has you hack via a minigame.
 Hollywood Hacking / int_c342be9
featureApplicability
1.0
 Hollywood Hacking / int_c342be9
featureConfidence
1.0
 Paradroid (Video Game)
hasFeature
Hollywood Hacking / int_c342be9
 Hollywood Hacking / int_c43df4d8
type
Hollywood Hacking
 Hollywood Hacking / int_c43df4d8
comment
Doctor Who:
In "World War Three", Mickey launches a missile into 10 Downing Street by using a password (buffalo) provided by the Doctor to hack into first UNIT and then the Royal Navy. Obviously, there's no way that a military organization would use a single common word as the one thing stopping civilians launching missiles. However, he is using a backdoor the Doctor installed that almost nobody else knows about.
In "The Age of Steel", this is how the new Cybermen are first defeated; once Mickey finishes typing the same five characters over and over, the password to their internal systems appears on-screen one letter at a time.
Subverted in "Asylum of the Daleks". Oswin Oswald apparently uses a standard keyboard to rapidly type her way into the computers of a Dalek asylum. Daleks, being the mutant alien cyborgs they are, don't exactly use technology readily compatible with human keyboards, and the Doctor himself isn't terribly convinced when Oswin tells him that Dalek technology is "easy to hack". The whole keyboard hacking thing turns out to be one of many illusions Oswin has unknowingly put in her mind to keep herself from grasping the Awful Truth: she currently is a Dalek, and she was chosen to maintain the asylum planet's network due to her genius intellect from when she was still human.
Used straight a few episodes later in "The Bells of Saint John". The Doctor, Clara, and the villains all use copious amounts of Rapid-Fire Typing to hack and counter-hack each other.
 Hollywood Hacking / int_c43df4d8
featureApplicability
-0.3
 Hollywood Hacking / int_c43df4d8
featureConfidence
1.0
 Doctor Who
hasFeature
Hollywood Hacking / int_c43df4d8
 Hollywood Hacking / int_c4a22754
type
Hollywood Hacking
 Hollywood Hacking / int_c4a22754
comment
Made fun of in Yu-Gi-Oh! The Abridged Series when Kaiba's computer claims to be so advanced that it makes hacking look like a boring video game. Said computer also points out how Kaiba seems to be pressing the same keys over and over prompting the latter to claim he learned how to hack by watching old episodes of Star Trek.
 Hollywood Hacking / int_c4a22754
featureApplicability
1.0
 Hollywood Hacking / int_c4a22754
featureConfidence
1.0
 Yu-Gi-Oh! The Abridged Series (Web Video)
hasFeature
Hollywood Hacking / int_c4a22754
 Hollywood Hacking / int_c7fe972d
type
Hollywood Hacking
 Hollywood Hacking / int_c7fe972d
comment
TRON 2.0 features a level where the protagonist must reconfigure a firewall... from the inside of the computer. It Makes Sense in Context: the player is a human that has been digitized into a computer, and already has access to the computer that he's configuring. He's trying to reconfigure the firewall to allow access to a normally restricted port so that another digitized human can move from another computer to his computer and join him. The firewall is also explicitly stated to be a software firewall, so it makes sense that it can be reconfigured by what amounts to a super-program.
 Hollywood Hacking / int_c7fe972d
featureApplicability
1.0
 Hollywood Hacking / int_c7fe972d
featureConfidence
1.0
 TRON 2.0 (Video Game)
hasFeature
Hollywood Hacking / int_c7fe972d
 Hollywood Hacking / int_c83af7b5
type
Hollywood Hacking
 Hollywood Hacking / int_c83af7b5
comment
Discussed and averted in The Sunjackers. According to Candy Chip, she does very little actual manual hacking. Instead, she uses a program called GUMBaLL to keep the security A.I. occupied while she does whatever she needs to do.
 Hollywood Hacking / int_c83af7b5
featureApplicability
-1.0
 Hollywood Hacking / int_c83af7b5
featureConfidence
1.0
 The Sunjackers (Webcomic)
hasFeature
Hollywood Hacking / int_c83af7b5
 Hollywood Hacking / int_c83fb69b
type
Hollywood Hacking
 Hollywood Hacking / int_c83fb69b
comment
In Jonny Quest vs. the Cyber Insects, Dr. Zin's Mooks instantly upload a vague kind of virus into the Quest family's Robot Buddy just by pressing some random button, which instantaneously totally rewrites his programming and brings him under Zin's remote control. Jonny also hacks Zin's own computer with the same virus later on.
 Hollywood Hacking / int_c83fb69b
featureApplicability
1.0
 Hollywood Hacking / int_c83fb69b
featureConfidence
1.0
 Jonny Quest vs. the Cyber Insects
hasFeature
Hollywood Hacking / int_c83fb69b
 Hollywood Hacking / int_c8f3f81b
type
Hollywood Hacking
 Hollywood Hacking / int_c8f3f81b
comment
In Splinter Cell: Blacklist, when the Engineers hack into the Paladin, they do so by injecting a Stuxnet-like worm into the plane's systems by letting Sam get his hands on an infected tablet which Charlie has to connect to the Paladin's systems to access. This is absolutely how most people's computers get infected by viruses in real life, via connecting to malicious sites, servers, or downloads. In order to fight it, Charlie does a factory reset to purge the virus. Again, this is a real (if desperate) means of getting rid of a virus from an infected machine. Bonus points in that the infected tablet probably wouldn't have been a threat had Charlie not bypassed some of their security protocols to speed up the data transfer, which again is pretty accurate to what makes some machines in real-life vulnerable to viruses.
 Hollywood Hacking / int_c8f3f81b
featureApplicability
1.0
 Hollywood Hacking / int_c8f3f81b
featureConfidence
1.0
 Splinter Cell: Blacklist (Video Game)
hasFeature
Hollywood Hacking / int_c8f3f81b
 Hollywood Hacking / int_cac20f89
type
Hollywood Hacking
 Hollywood Hacking / int_cac20f89
comment
JAG: Meg's failed attempts to seize control of Grover's computer, in "Shadow", lead to various responses, ranging from an animation of Grover giving a raspberry, to other concealed bombs being armed.
 Hollywood Hacking / int_cac20f89
featureApplicability
1.0
 Hollywood Hacking / int_cac20f89
featureConfidence
1.0
 JAG
hasFeature
Hollywood Hacking / int_cac20f89
 Hollywood Hacking / int_d07b9a7b
type
Hollywood Hacking
 Hollywood Hacking / int_d07b9a7b
comment
The live-action adaptation of Bloody Monday features a teen hacker using real UNIX applications, GNOME Desktop components, and lot of Python, while the fancy 3D graphs are limited to the government agents' computers.
 Hollywood Hacking / int_d07b9a7b
featureApplicability
1.0
 Hollywood Hacking / int_d07b9a7b
featureConfidence
1.0
 Bloody Monday (Manga)
hasFeature
Hollywood Hacking / int_d07b9a7b
 Hollywood Hacking / int_d448d760
type
Hollywood Hacking
 Hollywood Hacking / int_d448d760
comment
The Nameless Mod: While most hacking is just like the original Deus Ex, which is a "hack" button that appears on terminals whose usefulness depends on how developed the player's hacking skills are, there is one section where the player needs to gain access to an admin account that cannot be brute forced. Luckily, a user account on the same computer which the player does have access to has left the admin credentials for all to see in their email.
 Hollywood Hacking / int_d448d760
featureApplicability
1.0
 Hollywood Hacking / int_d448d760
featureConfidence
1.0
 The Nameless Mod (Video Game)
hasFeature
Hollywood Hacking / int_d448d760
 Hollywood Hacking / int_d6c9c0a4
type
Hollywood Hacking
 Hollywood Hacking / int_d6c9c0a4
comment
Ghost in the Shell: Stand Alone Complex:
Firewalls are represented by spheres with shiny, meaningless glyphs on them. When the characters hack into them, they do it by connecting an intrusion program (which looks sort of like a welding torch) and waiting a while (though it takes only a few seconds of screen time). In one episode, such a software hack is used to distract the target from the Major breaking in and physically connecting to the local network. The creators have noted that the cyberspace doesn't really look like that at all, but it's an entertaining visual representation for the audience's benefit. Even Shirow Masamune acknowledges in the original Ghost in the Shell manga that cyberspace wouldn't have a visual appearance, and he only did so for the sake of entertainment. He created the series before the modern concept of the internet and cyberspace even existed.
There are also Defense Barriers, which are firewalls for people's cyberbrains — a firewall designed to protect your very soul (which, having a cyberbrain, means it is now digital data and therefore tangible). Each level of the barrier rotates at varying speeds and opposite directions from each other, and you can pass through them by advancing through a specific hole that shows up when they are properly aligned.
 Hollywood Hacking / int_d6c9c0a4
featureApplicability
1.0
 Hollywood Hacking / int_d6c9c0a4
featureConfidence
1.0
 Ghost in the Shell: Stand Alone Complex
hasFeature
Hollywood Hacking / int_d6c9c0a4
 Hollywood Hacking / int_d6fa84c7
type
Hollywood Hacking
 Hollywood Hacking / int_d6fa84c7
comment
Silicon Valley:
In season 2, resident cyber-security expert Gilfoyle manages to log into Endframe's server because the CEO left a post-it note with his login credentials in plain view. This is surprisingly common, and often how people get hacked.
This comes up again in the episode "White Hat/Black Hat", in which Endframe fires the head of their IT department, Seth, because of Gilfoyle's actions. When Richard goes to Seth to apologize, he only ends up making things worse, leading to Seth threatening to "skullfuck" their system. Later, it appears that Seth has hacked their network and started deleting all of their clients' files at a fast rate that none of the protagonists can stop. However, it turns out that Seth never hacked their network, and the files were being deleted because Russ accidentally placed a bottle of tequila over the "delete" key.
 Hollywood Hacking / int_d6fa84c7
featureApplicability
1.0
 Hollywood Hacking / int_d6fa84c7
featureConfidence
1.0
 Silicon Valley
hasFeature
Hollywood Hacking / int_d6fa84c7
 Hollywood Hacking / int_d78af2ac
type
Hollywood Hacking
 Hollywood Hacking / int_d78af2ac
comment
Kingsman: The Secret Service: It takes Merlin only a few seconds of frantic key-tapping to remote-activate all of Valentine's explosive loyalty-chip implants worldwide. A little odd, considering that Valentine's other mass-murdering doom-machine uses its own private satellite network biologically keyed to Valentine's hand, which prompts Merlin to say that he can't hack something that complicated. Justified to a certain extent, as we're explicitly shown the biometric system's installation a long time after we're made aware that every member of the conspiracy is already implanted and those are (currently) on a separate, older system, and that it requires a gruesome constant connection to Valentine's hand. As well, while Merlin only taps a few keys, the computer shows lines upon lines of code streaming past, showing that Merlin isn't manually hacking the system, he merely triggered a program to do it.
 Hollywood Hacking / int_d78af2ac
featureApplicability
1.0
 Hollywood Hacking / int_d78af2ac
featureConfidence
1.0
 Kingsman: The Secret Service
hasFeature
Hollywood Hacking / int_d78af2ac
 Hollywood Hacking / int_d7c9f170
type
Hollywood Hacking
 Hollywood Hacking / int_d7c9f170
comment
Averted in The Matrix Reloaded when Trinity uses a genuine hacking program called "nmap" to identify a viable target from a command line (with plenty of Rapid-Fire Typing, but in short bursts), and then uses a (fictional) "SSHnuke" program to attack a secure connection. This is actually pretty well done, and while the program she uses to make the actual attack does not exist, it's a similar idea to a "real" attack on a remote computer, and highly skilled hackers often have a personal library of programs/exploits they've written themselves. Not only that but in the timeframe of the simulated reality (the turn of the century earth) SSHv1 really had an exploitable remote vulnerability. Of course, the less said about the rest of the Matrix's relation to real computers, the better, but at least their hacking of simulated computers inside a giant simulation is a realistic simulation.
 Hollywood Hacking / int_d7c9f170
featureApplicability
-1.0
 Hollywood Hacking / int_d7c9f170
featureConfidence
1.0
 The Matrix Reloaded
hasFeature
Hollywood Hacking / int_d7c9f170
 Hollywood Hacking / int_d8520b74
type
Hollywood Hacking
 Hollywood Hacking / int_d8520b74
comment
Sam & Max: Freelance Police: Sam and Max, to get past a firewall in "Reality 2.0", change the color of their DeSoto. Seriously. After they're past it, they engage in some mild hacking as a means of laundering money into Bosco's bank account to pay for that episode's uber-expensive item.
 Hollywood Hacking / int_d8520b74
featureApplicability
1.0
 Hollywood Hacking / int_d8520b74
featureConfidence
1.0
 Sam & Max: Freelance Police (Video Game)
hasFeature
Hollywood Hacking / int_d8520b74
 Hollywood Hacking / int_d966b18e
type
Hollywood Hacking
 Hollywood Hacking / int_d966b18e
comment
Hacking in Otherland tends to be vaguely described, but at one point a character seems to be trying to get into her boss' files by a brute force attack — that is, by having a program try every conceivable combination of characters. That approach is so basic, and so childishly simple to guard against, that any self-respecting system should be immune to it, but it still gets her at least halfway in.
 Hollywood Hacking / int_d966b18e
featureApplicability
1.0
 Hollywood Hacking / int_d966b18e
featureConfidence
1.0
 Otherland
hasFeature
Hollywood Hacking / int_d966b18e
 Hollywood Hacking / int_daff6a21
type
Hollywood Hacking
 Hollywood Hacking / int_daff6a21
comment
Yu-Gi-Oh! 5Ds has a different version; rather than passwords, information is hidden behind duel puzzles (a duel-in-progress is presented and you have limited chances to figure out how to win in one turn). It's an... interesting way of shoehorning duels into episodes that otherwise wouldn't have them. At one point the access to an important database is hidden inside a duel puzzle arcade machine — the person who thought it up claims that nobody would look for a database there, plus he can slack off at the arcade and claim it's for work.
 Hollywood Hacking / int_daff6a21
featureApplicability
1.0
 Hollywood Hacking / int_daff6a21
featureConfidence
1.0
 Yu-Gi-Oh! 5Ds
hasFeature
Hollywood Hacking / int_daff6a21
 Hollywood Hacking / int_db418e95
type
Hollywood Hacking
 Hollywood Hacking / int_db418e95
comment
Batgirl Barbara Gordon, her villain counterpart the Calculator, and his daughter/her protege Proxy, all dabble into this.
 Hollywood Hacking / int_db418e95
featureApplicability
1.0
 Hollywood Hacking / int_db418e95
featureConfidence
1.0
 Batgirl (Comic Book)
hasFeature
Hollywood Hacking / int_db418e95
 Hollywood Hacking / int_dc58e164
type
Hollywood Hacking
 Hollywood Hacking / int_dc58e164
comment
Ratchet & Clank have come up with an entertaining variety of combinations for hacking into things - usually involving a mini-game, a handheld gadget, and little glowy dots.
 Hollywood Hacking / int_dc58e164
featureApplicability
1.0
 Hollywood Hacking / int_dc58e164
featureConfidence
1.0
 Ratchet & Clank (Video Game)
hasFeature
Hollywood Hacking / int_dc58e164
 Hollywood Hacking / int_dc58e87b
type
Hollywood Hacking
 Hollywood Hacking / int_dc58e87b
comment
Discussed in What Tomorrow Brings. Tom muses that real hacking is much slower than movies would have you believe.
 Hollywood Hacking / int_dc58e87b
featureApplicability
1.0
 Hollywood Hacking / int_dc58e87b
featureConfidence
1.0
 What Tomorrow Brings (Fanfic)
hasFeature
Hollywood Hacking / int_dc58e87b
 Hollywood Hacking / int_dd43fa39
type
Hollywood Hacking
 Hollywood Hacking / int_dd43fa39
comment
Whenever Vivian hacks a system in Asian School Girls, the audience never sees what is happening on the computer screen. There's just a shot of the back of the computer, the sound of Vivian's Rapid-Fire Typing, and then her announcing that she is in.
 Hollywood Hacking / int_dd43fa39
featureApplicability
1.0
 Hollywood Hacking / int_dd43fa39
featureConfidence
1.0
 Asian School Girls
hasFeature
Hollywood Hacking / int_dd43fa39
 Hollywood Hacking / int_de89c047
type
Hollywood Hacking
 Hollywood Hacking / int_de89c047
comment
Parodied in Casey and Andy when Casey downloads the "operating system shown in movies" that lets the user hack into any device or program via a ridiculously easy password.
 Hollywood Hacking / int_de89c047
featureApplicability
1.0
 Hollywood Hacking / int_de89c047
featureConfidence
1.0
 Casey and Andy (Webcomic)
hasFeature
Hollywood Hacking / int_de89c047
 Hollywood Hacking / int_df07d96e
type
Hollywood Hacking
 Hollywood Hacking / int_df07d96e
comment
Lois & Clark:
This happens more than once, but the most infamous example is in "The Ides of Metropolis", which gives us two malicious hackers spewing jargon the writers clearly didn't understand at each other while Superman stops their supervirus with a 3.5" floppy disk:
In another episode, Clark uses brute-force on a keyboard, so fast the keys start smoking. Apparently, no one heard the extremely loud clacking sounds.
 Hollywood Hacking / int_df07d96e
featureApplicability
1.0
 Hollywood Hacking / int_df07d96e
featureConfidence
1.0
 LoisAndClark
hasFeature
Hollywood Hacking / int_df07d96e
 Hollywood Hacking / int_e293455a
type
Hollywood Hacking
 Hollywood Hacking / int_e293455a
comment
Prior to becoming a witch, Willow Rosenberg from Buffy the Vampire Slayer often uses her skill in computers to help out the team, including hacking into school records, secret government files, and even city power grids. Much later in the series, she can even amplify her hacking skills using her magic somehow, turning her into a more literal Techno Wizard.
 Hollywood Hacking / int_e293455a
featureApplicability
1.0
 Hollywood Hacking / int_e293455a
featureConfidence
1.0
 Buffy the Vampire Slayer
hasFeature
Hollywood Hacking / int_e293455a
 Hollywood Hacking / int_e29789ac
type
Hollywood Hacking
 Hollywood Hacking / int_e29789ac
comment
The Casual Vacancy has scandalous posts written anonymously on a town message board by means of SQL injection, which is an entirely plausible method in real life (especially since the culprit behind an SQL injection can be nigh impossible to trace if done correctly).
 Hollywood Hacking / int_e29789ac
featureApplicability
1.0
 Hollywood Hacking / int_e29789ac
featureConfidence
1.0
 The Casual Vacancy
hasFeature
Hollywood Hacking / int_e29789ac
 Hollywood Hacking / int_e31a4abd
type
Hollywood Hacking
 Hollywood Hacking / int_e31a4abd
comment
Megatokyo: Hackers use Magical Girl representations of themselves to hack into a nebulously defined security network. This may or may not be a reference to the Negima! Magister Negi Magi example above or something it was parodying. It's also unclear if this was actually happening, or just representational.
 Hollywood Hacking / int_e31a4abd
featureApplicability
1.0
 Hollywood Hacking / int_e31a4abd
featureConfidence
1.0
 MegaTokyo (Webcomic)
hasFeature
Hollywood Hacking / int_e31a4abd
 Hollywood Hacking / int_e424b5fc
type
Hollywood Hacking
 Hollywood Hacking / int_e424b5fc
comment
In Antitrust, the Big Bad's most dangerous weapon is his access to medical databases, and the protagonist is able to easily hack into the computer system because no one bothered with securing a terminal in a children's play area.
 Hollywood Hacking / int_e424b5fc
featureApplicability
1.0
 Hollywood Hacking / int_e424b5fc
featureConfidence
1.0
 Antitrust
hasFeature
Hollywood Hacking / int_e424b5fc
 Hollywood Hacking / int_e4b94ee8
type
Hollywood Hacking
 Hollywood Hacking / int_e4b94ee8
comment
Uplink is intentionally designed to play like Hollywood Hacking. You have programs that can figure out a password for you and disable firewalls and so on automatically, though later on you can wipe mainframes and other computers by going to the Unix-like command prompt after hacking in and have to use realistic commands to delete everything (and not just by typing in "delete everything"). Several freeware clones, like Dark Signs, have been cropping up slowly yet steadily. Quality and spot on the Hollywood to Realist scale varies somewhat among them, but a greater emphasis seems to be put on command-line interfaces.
 Hollywood Hacking / int_e4b94ee8
featureApplicability
1.0
 Hollywood Hacking / int_e4b94ee8
featureConfidence
1.0
 Uplink / Videogame
hasFeature
Hollywood Hacking / int_e4b94ee8
 Hollywood Hacking / int_e4ee75a9
type
Hollywood Hacking
 Hollywood Hacking / int_e4ee75a9
comment
The Demon Headmaster: The only thing preventing access to the Prime Minister's computer is a weak password, and to hack it, you just need to tell the computer "knock, knock" jokes. Apparently, it takes the combined power of the brightest minds in the country to figure this out.
 Hollywood Hacking / int_e4ee75a9
featureApplicability
1.0
 Hollywood Hacking / int_e4ee75a9
featureConfidence
1.0
 The Demon Headmaster
hasFeature
Hollywood Hacking / int_e4ee75a9
 Hollywood Hacking / int_e5c5bc22
type
Hollywood Hacking
 Hollywood Hacking / int_e5c5bc22
comment
Steve Jackson Games will probably never stop referring to GURPS Cyberpunk as "the book seized by the US Secret Service". The book does have rules for "realistic" (if almost 20 years out of date) hacking, but most of that chapter is devoted to Neuromancer-style cyberspace hacking. The core 4e books contain a skill called "Computer Hacking", precisely for Hollywood Hacking. However, the rules note that the skill should only exist in the more "cinematic" games — in a realistic game, the would-be hacker will have to instead learn a bunch of various skills like computer programming, psychology, etc.
 Hollywood Hacking / int_e5c5bc22
featureApplicability
1.0
 Hollywood Hacking / int_e5c5bc22
featureConfidence
1.0
 GURPS (Tabletop Game)
hasFeature
Hollywood Hacking / int_e5c5bc22
 Hollywood Hacking / int_e67a7d6c
type
Hollywood Hacking
 Hollywood Hacking / int_e67a7d6c
comment
Negima! Magister Negi Magi has Chachamaru attempt to hack into the school's computer system, which are represented by pixelated sharks. A student uses an artifact to transport herself into cyberspace and fight them, Magical Girl-style. It's almost certainly a parody of this trope, as she uses legitimate hacking techniques (SYN Flood, a Denial-of-Service attack, etc.) that are simply visualized in ridiculous ways (the DOS attack is a tuna, for example), and the "spells" that she's chanting are Unix shell commands with accurate iptables syntax.
 Hollywood Hacking / int_e67a7d6c
featureApplicability
1.0
 Hollywood Hacking / int_e67a7d6c
featureConfidence
1.0
 Negima! Magister Negi Magi (Manga)
hasFeature
Hollywood Hacking / int_e67a7d6c
 Hollywood Hacking / int_e7e37776
type
Hollywood Hacking
 Hollywood Hacking / int_e7e37776
comment
In the Firefly episode "Trash", how do the tech-savvy crew hack the garbage disposal drones? They literally fly up underneath it, yank out the low-end computer slotted into the side of the garbage container, and upload a new destination. Since it's a) on the underside of a floating city miles from shore and b)... well, garbage, the security on the computer is nonexistent anyway.
 Hollywood Hacking / int_e7e37776
featureApplicability
1.0
 Hollywood Hacking / int_e7e37776
featureConfidence
1.0
 Firefly
hasFeature
Hollywood Hacking / int_e7e37776
 Hollywood Hacking / int_e863cc41
type
Hollywood Hacking
 Hollywood Hacking / int_e863cc41
comment
Mega Man Battle Network:
Interestingly, one point that the games show correctly is that once in a while, Lan will encounter some kind of blockade or security gate that cannot be opened or bypassed by his side of the Internet, which will require him to jack out/log off and find an entry point that is situated behind the blockade. He also often has to directly connect to embedded systems that are not connected directly to the Internet by finding a way to get to a direct access port in the real world. The few times Lan connects wirelessly, he has access to either a wireless adapter kit made for his Navi or is in a room with a working wireless connection.
One simple little detail stands out: in every game, Lan needs to acquire updated security passes to (re)gain access to his friends' protected home networks, as they probably change their passwords regularly and need to keep him updated.
Recurring villain Mr. Match utilizes a lot of common real tricks to launch his malware attacks, such as social engineering and purpose-built malware meant to attack specific hardware.
 Hollywood Hacking / int_e863cc41
featureApplicability
1.0
 Hollywood Hacking / int_e863cc41
featureConfidence
1.0
 Mega Man Battle Network (Video Game)
hasFeature
Hollywood Hacking / int_e863cc41
 Hollywood Hacking / int_e8981561
type
Hollywood Hacking
 Hollywood Hacking / int_e8981561
comment
Parodied in the Adventure Time comic. Whenever Idiot Heroes Finn and Jake try hacking,◊ they just shout random technobabble while flailing away at the keyboard; they admit to having learned this from movies. Marceline, on the other hand, seems to know actual hacking techniques.
 Hollywood Hacking / int_e8981561
featureApplicability
1.0
 Hollywood Hacking / int_e8981561
featureConfidence
1.0
 Adventure Time (Comic Book)
hasFeature
Hollywood Hacking / int_e8981561
 Hollywood Hacking / int_e8a8ef69
type
Hollywood Hacking
 Hollywood Hacking / int_e8a8ef69
comment
Hacknet, if the name didn't give it away. While the developer has done his research and the methods used to open individual vulnerabilities in certain protocols are actually based on sound theory, there's still a Password Slot Machine variation to get past firewalls, and PortHack to finally exploit all the openings you've created. The game's central premise is actually playing with this trope to hell and back. Specifically, it's averted. The game is a borderline-ARG set in the present day, and the tools you use aren't just there for effect, they're really that powerful. The last act of the game is ultimately a mission to destroy the Hacknet software before it leaks and everyone can break into everything so easily.
 Hollywood Hacking / int_e8a8ef69
featureApplicability
-1.0
 Hollywood Hacking / int_e8a8ef69
featureConfidence
1.0
 Hacknet (Video Game)
hasFeature
Hollywood Hacking / int_e8a8ef69
 Hollywood Hacking / int_e9383571
type
Hollywood Hacking
 Hollywood Hacking / int_e9383571
comment
The Many Lives of Stephen Leeds: Stephen performs some hacking by lying to a few people over the phone and using a simple phone app. It's explicitly noted that this is what real hacking tends to look like.
 Hollywood Hacking / int_e9383571
featureApplicability
1.0
 Hollywood Hacking / int_e9383571
featureConfidence
1.0
 The Many Lives of Stephen Leeds
hasFeature
Hollywood Hacking / int_e9383571
 Hollywood Hacking / int_ea377bc0
type
Hollywood Hacking
 Hollywood Hacking / int_ea377bc0
comment
In System Shock, hacking is performed by flying around a neon Cyberspace shooting down countermeasures. Somewhat justified by the fact that it's an Extreme Graphical Representation brought on by the use of the Hacker's military-grade neural interface: the beginning and ending of the game show more reasonable hacking methods.
 Hollywood Hacking / int_ea377bc0
featureApplicability
1.0
 Hollywood Hacking / int_ea377bc0
featureConfidence
1.0
 System Shock (Video Game)
hasFeature
Hollywood Hacking / int_ea377bc0
 Hollywood Hacking / int_ecc36299
type
Hollywood Hacking
 Hollywood Hacking / int_ecc36299
comment
The Internet and network levels in Shadow the Hedgehog. Firewalls are represented as actual fiery walls.
 Hollywood Hacking / int_ecc36299
featureApplicability
1.0
 Hollywood Hacking / int_ecc36299
featureConfidence
1.0
 Shadow the Hedgehog (Video Game)
hasFeature
Hollywood Hacking / int_ecc36299
 Hollywood Hacking / int_ed3aa1ba
type
Hollywood Hacking
 Hollywood Hacking / int_ed3aa1ba
comment
In Mission: Yozakura Family, Shion's preferred method of hacking computers converts the entire OS into a video game for her to play and beat based on what she wants it to do.
 Hollywood Hacking / int_ed3aa1ba
featureApplicability
1.0
 Hollywood Hacking / int_ed3aa1ba
featureConfidence
1.0
 Mission: Yozakura Family (Manga)
hasFeature
Hollywood Hacking / int_ed3aa1ba
 Hollywood Hacking / int_eef77dd5
type
Hollywood Hacking
 Hollywood Hacking / int_eef77dd5
comment
Broken Saints averts this by way of having a real hacker on-board as tech advisor.
 Hollywood Hacking / int_eef77dd5
featureApplicability
1.0
 Hollywood Hacking / int_eef77dd5
featureConfidence
1.0
 Broken Saints (Web Animation)
hasFeature
Hollywood Hacking / int_eef77dd5
 Hollywood Hacking / int_ef076a36
type
Hollywood Hacking
 Hollywood Hacking / int_ef076a36
comment
In the Star Trek: Voyager episode "Future's End", the ship is transported back to the 1990s, and the villain manages to hack Voyager, the 24th-century Organic Technology spaceship and the Doctor, a sentient, evolving AI hologram so advanced that even in Voyager's present they still don't fully understand him, by typing really fast on his computer. And for a follow-up, someone will hack an iPhone by vigorously waving around semaphore flags. He's using technology from the 29th Century to assist him, retrieved from a crashed timeship, but that's a strike against him; 29th century technology should have scrambled his brain.
 Hollywood Hacking / int_ef076a36
featureApplicability
1.0
 Hollywood Hacking / int_ef076a36
featureConfidence
1.0
 Star Trek: Voyager
hasFeature
Hollywood Hacking / int_ef076a36
 Hollywood Hacking / int_f0995ac8
type
Hollywood Hacking
 Hollywood Hacking / int_f0995ac8
comment
The protagonist of the Evil Genius Trilogy, Cadel Piggott, is a Sociopathic Hero Teen Genius, but his hacking always takes a good deal of thought and planning, at least a couple of days to weeks to break into the system, and there's tons of mentions of Trojan Horse programs, backpacking on other programs, and a couple of backdoors.
 Hollywood Hacking / int_f0995ac8
featureApplicability
1.0
 Hollywood Hacking / int_f0995ac8
featureConfidence
1.0
 Evil Genius Trilogy
hasFeature
Hollywood Hacking / int_f0995ac8
 Hollywood Hacking / int_f15f622e
type
Hollywood Hacking
 Hollywood Hacking / int_f15f622e
comment
MacGyver (1985): In "Ugly Duckling", Kate somehow hacks a building's systems and makes elevators go to the wrong floor, alarms go off, printers start printing out things people haven't sent to the printer, photocopiers shoot paper out all over the place, etc. Then she turns the lights off and escapes.
 Hollywood Hacking / int_f15f622e
featureApplicability
1.0
 Hollywood Hacking / int_f15f622e
featureConfidence
1.0
 MacGyver (1985)
hasFeature
Hollywood Hacking / int_f15f622e
 Hollywood Hacking / int_f1d5efea
type
Hollywood Hacking
 Hollywood Hacking / int_f1d5efea
comment
I Don't Feel at Home in This World Anymore: Parodied. Tony needs to find the owner of a van using its license plate number, so he initiates an epic hacking sequence on his home computer. Typing rapidly as the soundtrack thumps, Tony makes dated analogies about the internet (comparing it to a web full of spiders) as if he's spouting hacker wisdom. When we actually see his screen, he's just googling "how to look up license plate" and then borrowing a credit card to purchase the info from a website.
 Hollywood Hacking / int_f1d5efea
featureApplicability
1.0
 Hollywood Hacking / int_f1d5efea
featureConfidence
1.0
 I Don't Feel at Home in This World Anymore
hasFeature
Hollywood Hacking / int_f1d5efea
 Hollywood Hacking / int_f4b71edf
type
Hollywood Hacking
 Hollywood Hacking / int_f4b71edf
comment
Parodied by SMBC Theater in "Hackers!" The hackers are all spouting technical-sounding gibberish, but it turns out they are actually all agents from different agencies (FBI, CIA, DHS, and NSA) who have no clue how hacking works and are trying to run conflicting sting operations.
 Hollywood Hacking / int_f4b71edf
featureApplicability
1.0
 Hollywood Hacking / int_f4b71edf
featureConfidence
1.0
 SMBC Theater (Web Video)
hasFeature
Hollywood Hacking / int_f4b71edf
 Hollywood Hacking / int_f597528d
type
Hollywood Hacking
 Hollywood Hacking / int_f597528d
comment
The episode of Limitless in which Brian learns to hack has him mention that he doesn't really know what "hacking" even is yet, just the montages he's seen in the movies. When he actually starts researching and studying it during a Training Montage, he tells the audience that Hollywood tends to use montages for hacking because real hacking is boring, and instead shows the viewers vines of explosions and stuff.
 Hollywood Hacking / int_f597528d
featureApplicability
1.0
 Hollywood Hacking / int_f597528d
featureConfidence
1.0
 Limitless
hasFeature
Hollywood Hacking / int_f597528d
 Hollywood Hacking / int_f6b79960
type
Hollywood Hacking
 Hollywood Hacking / int_f6b79960
comment
Nine Hours, Nine Persons, Nine Doors averts this and It's Up to You at the same time in one scene. Lotus creates a program to brute-force a password, while Junpei watches. If the right choices are made up to that point, he could go looking for a hint, but Lotus still manages to finish her program and find the password first.
 Hollywood Hacking / int_f6b79960
featureApplicability
1.0
 Hollywood Hacking / int_f6b79960
featureConfidence
1.0
 Nine Hours, Nine Persons, Nine Doors (Visual Novel)
hasFeature
Hollywood Hacking / int_f6b79960
 Hollywood Hacking / int_f80c5f1a
type
Hollywood Hacking
 Hollywood Hacking / int_f80c5f1a
comment
Hacker Evolution looks like it takes a more realistic route since all hacking is done through command prompt... except passwords are broken by typing "crack [server] [port]", there is no need to hide oneself after breaking in, files can be uploaded and downloaded freely and player can hide from authorities by paying 500$ for new IP...
 Hollywood Hacking / int_f80c5f1a
featureApplicability
1.0
 Hollywood Hacking / int_f80c5f1a
featureConfidence
1.0
 Hacker Evolution (Video Game)
hasFeature
Hollywood Hacking / int_f80c5f1a
 Hollywood Hacking / int_fa283efc
type
Hollywood Hacking
 Hollywood Hacking / int_fa283efc
comment
In The Amazing Spider-Man 2, Spider-Man tries to hack Kingpin's computer. Kingpin openly denounces this "Hollywood film" trope with a This Is Reality speech, only to panic when he sees that the trope is actually working.
 Hollywood Hacking / int_fa283efc
featureApplicability
1.0
 Hollywood Hacking / int_fa283efc
featureConfidence
1.0
 The Amazing Spider-Man 2 (Video Game)
hasFeature
Hollywood Hacking / int_fa283efc
 Hollywood Hacking / int_fad5e3d9
type
Hollywood Hacking
 Hollywood Hacking / int_fad5e3d9
comment
Fortress (1992): The genius D-Day sits down at the keyboard of Zed-10, the mad Master Computer. He types the password (which is "Crime does not pay", the motto Zed-10 repeats every now and then) and then he types... "INSTALL D-DAY'S REVENGE VIRUS".
 Hollywood Hacking / int_fad5e3d9
featureApplicability
1.0
 Hollywood Hacking / int_fad5e3d9
featureConfidence
1.0
 Fortress (1992)
hasFeature
Hollywood Hacking / int_fad5e3d9
 Hollywood Hacking / int_faf84cd
type
Hollywood Hacking
 Hollywood Hacking / int_faf84cd
comment
Even though Vampire: The Masquerade - Bloodlines has unrealistic hacking for gameplay simplicity, there is a sidequest in which you help the Nosferatu hacker Mitnick expand his surveillance network, which he can't do just by typing into his personal computer. Each time, you have to sneak into a location and upload a program and discreetly connect a camera to the system of his target. Then you have to access the admin's computer terminal, bypass their security, and activate the program. Mitnick takes the rest from there, though he notes that if you're seen going in or out, the mission becomes moot.
 Hollywood Hacking / int_faf84cd
featureApplicability
1.0
 Hollywood Hacking / int_faf84cd
featureConfidence
1.0
 Vampire: The Masquerade - Bloodlines (Video Game)
hasFeature
Hollywood Hacking / int_faf84cd
 Hollywood Hacking / int_fbae8aac
type
Hollywood Hacking
 Hollywood Hacking / int_fbae8aac
comment
Crash Zone: The episode "The Shadow" features Hollywood-style hacker tracking — a program which, in a Viewer-Friendly Interface, slowly homes in on (and loudly announces) the hacker's home city, street address, and finally (somehow) their name. There is a race against time as the hackers try to log out of the system before the program finishes spelling out the computer owner's name.
 Hollywood Hacking / int_fbae8aac
featureApplicability
1.0
 Hollywood Hacking / int_fbae8aac
featureConfidence
1.0
 Crash Zone
hasFeature
Hollywood Hacking / int_fbae8aac
 Hollywood Hacking / int_fcf0b6c3
type
Hollywood Hacking
 Hollywood Hacking / int_fcf0b6c3
comment
All over the map in Adventures of the Galaxy Rangers. Computer interfaces are primarily A.I. units with their own personalities and quirks; overpower or trick the AI, and you get full access. The team's Playful Hacker is as much a Con Man as he is a programmer.
 Hollywood Hacking / int_fcf0b6c3
featureApplicability
1.0
 Hollywood Hacking / int_fcf0b6c3
featureConfidence
1.0
 Adventures of the Galaxy Rangers
hasFeature
Hollywood Hacking / int_fcf0b6c3
 Hollywood Hacking / int_fd904930
type
Hollywood Hacking
 Hollywood Hacking / int_fd904930
comment
The Fate of the Furious: In the New York sequence, Cipher first hacks into every security camera on Manhattan... then remote-controls several hundred cars, including an early 2000s Prius hilariously shown with a fancy, high-fidelity "autopilot engaged" message on its low-def navigation. She does all of this from her cushy flying bad guy lair, which apparently has so much computing power that it can alter reality.
 Hollywood Hacking / int_fd904930
featureApplicability
1.0
 Hollywood Hacking / int_fd904930
featureConfidence
1.0
 The Fate of the Furious
hasFeature
Hollywood Hacking / int_fd904930
 Hollywood Hacking / int_fdd4739b
type
Hollywood Hacking
 Hollywood Hacking / int_fdd4739b
comment
This is seen in Swordfish to a degree when Stanley creates a worm to hack into a bank and steal the money for Gabriel's organization. The film features large amounts of Rapid-Fire Typing and Viewer-Friendly Interface. Also, as he is first hired, Stanley is able to break into a government network in only 60 seconds through extreme Rapid-Fire Typing while receiving oral sex and with a gun pointed at his head. Stanley is the best at what he does. At another point in the movie, the dialogue indicates that the writers of the movie thought that a computer with multiple monitors is inherently more powerful than one that has just one.
 Hollywood Hacking / int_fdd4739b
featureApplicability
1.0
 Hollywood Hacking / int_fdd4739b
featureConfidence
1.0
 Swordfish
hasFeature
Hollywood Hacking / int_fdd4739b
 Hollywood Hacking / int_ff536b75
type
Hollywood Hacking
 Hollywood Hacking / int_ff536b75
comment
Old Man's War: Averted and lampshaded. A programmer trapped in a digital prison finds a way to make the prison glitch for a second, giving him access to the code. He describes how hacking in entertainment always looks good, with lots of flashing lights and whatnot, but what he actually did was just type a few things over the course of weeks. He assures readers that it was actually very impressive, but unless you're a programmer yourself, you won't understand or care.
 Hollywood Hacking / int_ff536b75
featureApplicability
-1.0
 Hollywood Hacking / int_ff536b75
featureConfidence
1.0
 Old Man's War
hasFeature
Hollywood Hacking / int_ff536b75

The following is a list of statements referring to the current page from other pages.

 Hollywood Hacking
processingCategory2
Acceptable Breaks from Reality
 Hollywood Hacking
processingCategory2
Cyberpunk Tropes
 Hollywood Hacking
processingCategory2
Hollywood Style
 Hollywood Hacking
processingCategory2
Magical Computer
 Hollywood Hacking
processingCategory2
Stock Visual Metaphors
 Hollywood Hacking
processingCategory2
Undead Horse Trope
 Lu's Time (Animation) / int_2be271c7
type
Hollywood Hacking
 Battle Programmer Shirase / int_2be271c7
type
Hollywood Hacking
 Blood-C: The Last Dark / int_2be271c7
type
Hollywood Hacking
 Cowboy Bebop / int_2be271c7
type
Hollywood Hacking
 Den-noh Coil / int_2be271c7
type
Hollywood Hacking
 Devil Survivor 2: The Animation / int_2be271c7
type
Hollywood Hacking
 Ghost in the Shell: Stand Alone Complex / int_2be271c7
type
Hollywood Hacking
 Key the Metal Idol / int_2be271c7
type
Hollywood Hacking
 Macross Delta / int_2be271c7
type
Hollywood Hacking
 Psycho-Pass / int_2be271c7
type
Hollywood Hacking
 The Orbital Children / int_2be271c7
type
Hollywood Hacking
 Tousouchuu: The Great Mission / int_2be271c7
type
Hollywood Hacking
 Yu-Gi-Oh! SEVENS / int_2be271c7
type
Hollywood Hacking
 Yu-Gi-Oh! VRAINS / int_2be271c7
type
Hollywood Hacking
 Yu-Gi-Oh! ZEXAL / int_2be271c7
type
Hollywood Hacking
 Adventure Time (Comic Book) / int_2be271c7
type
Hollywood Hacking
 All-Star Superman (Comic Book) / int_2be271c7
type
Hollywood Hacking
 Birds of Prey (Comic Book) / int_2be271c7
type
Hollywood Hacking
 Captain Atom: Armageddon (Comic Book) / int_2be271c7
type
Hollywood Hacking
 Civil War (2006) (Comic Book) / int_2be271c7
type
Hollywood Hacking
 Detective Comics (Rebirth) (Comic Book) / int_2be271c7
type
Hollywood Hacking
 Harlem Heroes (Comic Book) / int_2be271c7
type
Hollywood Hacking
 Ultimate Galactus Trilogy (Comic Book) / int_2be271c7
type
Hollywood Hacking
 Dogs of C-Kennel (Comic Strip) / int_2be271c7
type
Hollywood Hacking
 Civil War / Comicbook / int_2be271c7
type
Hollywood Hacking
 Foolkiller / Comicbook / int_2be271c7
type
Hollywood Hacking
 ORPHANIMO!! / Comicbook / int_2be271c7
type
Hollywood Hacking
 Wreck-It Ralph / Disney / int_2be271c7
type
Hollywood Hacking
 KiraIsJustice
seeAlso
Hollywood Hacking
 Ultimate Danganronpa 3 / Fan Fic / int_2be271c7
type
Hollywood Hacking
 Vigil (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Zero vs Kira / Fan Fic / int_2be271c7
type
Hollywood Hacking
 Cheat Code: Support Strategist (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Chosen One's Adventure with Legendaries (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Coreline Operation Endgame (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Coreline The PROGENY Research Arc (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Equestria Girls: Sonic the Hedgehog (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Fear the Superhero (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Fever Dreams (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Green Tea Rescue (Fanfic) / int_2be271c7
type
Hollywood Hacking
 It's a bird! It's a plane! It's Luz! (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Karma's a Bitch (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Legacy of the Enginseers (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Lelouch of the Wings of Rebellion (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Life's Great Lie (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Mass Effect: Human Revolution (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Not the intended use (Zantetsuken Reverse) (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Rolling Out (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Second American Civil War (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Skittering Campione (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Super Network Wars (Fanfic) / int_2be271c7
type
Hollywood Hacking
 TRINITY (Fanfic) / int_2be271c7
type
Hollywood Hacking
 The Grimm With A Soul (Fanfic) / int_2be271c7
type
Hollywood Hacking
 The Lucidity of the Descent (Fanfic) / int_2be271c7
type
Hollywood Hacking
 The M3GAN Files (Fanfic) / int_2be271c7
type
Hollywood Hacking
 The New Adventures of Invader Zim (Fanfic) / int_2be271c7
type
Hollywood Hacking
 To Aruverse Rewrite Project (Fanfic) / int_2be271c7
type
Hollywood Hacking
 Vigil (Peptuck) (Fanfic) / int_2be271c7
type
Hollywood Hacking
 What Tomorrow Brings (Fanfic) / int_2be271c7
type
Hollywood Hacking
 A Christmas Prince / int_2be271c7
type
Hollywood Hacking
 Apocalypse / int_2be271c7
type
Hollywood Hacking
 Blackhat / int_2be271c7
type
Hollywood Hacking
 Bloodshot (2020) / int_2be271c7
type
Hollywood Hacking
 Bury Me High / int_2be271c7
type
Hollywood Hacking
 Cats & Dogs / int_2be271c7
type
Hollywood Hacking
 Clear and Present Danger / int_2be271c7
type
Hollywood Hacking
 Deep Rising / int_2be271c7
type
Hollywood Hacking
 Die Hard 2 / int_2be271c7
type
Hollywood Hacking
 Dredd / int_2be271c7
type
Hollywood Hacking
 Elysium / int_2be271c7
type
Hollywood Hacking
 Fortress (1992) / int_2be271c7
type
Hollywood Hacking
 Free Guy / int_2be271c7
type
Hollywood Hacking
 Furious 7 / int_2be271c7
type
Hollywood Hacking
 Hackers / int_2be271c7
type
Hollywood Hacking
 Hardwired / int_2be271c7
type
Hollywood Hacking
 Hobbs & Shaw / int_2be271c7
type
Hollywood Hacking
 I Don't Feel at Home in This World Anymore / int_2be271c7
type
Hollywood Hacking
 I, Robot / int_2be271c7
type
Hollywood Hacking
 Independence Day / int_2be271c7
type
Hollywood Hacking
 Iron Eagle / int_2be271c7
type
Hollywood Hacking
 Iron Man 2 / int_2be271c7
type
Hollywood Hacking
 Judge Dredd / int_2be271c7
type
Hollywood Hacking
 Jurassic Park (1993) / int_2be271c7
type
Hollywood Hacking
 Kingsman: The Secret Service / int_2be271c7
type
Hollywood Hacking
 Kung Fury / int_2be271c7
type
Hollywood Hacking
 Law Abiding Citizen / int_2be271c7
type
Hollywood Hacking
 Les Spécialistes / int_2be271c7
type
Hollywood Hacking
 Lucky Bastard / int_2be271c7
type
Hollywood Hacking
 Mission: Impossible (1996) / int_2be271c7
type
Hollywood Hacking
 Mission: Impossible – Rogue Nation / int_2be271c7
type
Hollywood Hacking
 Office Space / int_2be271c7
type
Hollywood Hacking
 Olympus Has Fallen / int_2be271c7
type
Hollywood Hacking
 One Missed Call / int_2be271c7
type
Hollywood Hacking
 Panic In The Skies / int_2be271c7
type
Hollywood Hacking
 Pokémon Detective Pikachu / int_2be271c7
type
Hollywood Hacking
 San Andreas / int_2be271c7
type
Hollywood Hacking
 Skyfall / int_2be271c7
type
Hollywood Hacking
 Skyscraper / int_2be271c7
type
Hollywood Hacking
 Sneakers / int_2be271c7
type
Hollywood Hacking
 So Close / int_2be271c7
type
Hollywood Hacking
 Spider-Man: Homecoming / int_2be271c7
type
Hollywood Hacking
 Spy Kids: Armageddon / int_2be271c7
type
Hollywood Hacking
 Star Trek II: The Wrath of Khan / int_2be271c7
type
Hollywood Hacking
 Superman III / int_2be271c7
type
Hollywood Hacking
 Susie Q / int_2be271c7
type
Hollywood Hacking
 Swiped / int_2be271c7
type
Hollywood Hacking
 Swordfish / int_2be271c7
type
Hollywood Hacking
 Terminator 2: Judgment Day / int_2be271c7
type
Hollywood Hacking
 The Core / int_2be271c7
type
Hollywood Hacking
 The Departed / int_2be271c7
type
Hollywood Hacking
 The Score / int_2be271c7
type
Hollywood Hacking
 The Social Network / int_2be271c7
type
Hollywood Hacking
 The Thinning / int_2be271c7
type
Hollywood Hacking
 The Web (2013) / int_2be271c7
type
Hollywood Hacking
 Top Kids / int_2be271c7
type
Hollywood Hacking
 Transformers / int_2be271c7
type
Hollywood Hacking
 Transformers (2007) / int_2be271c7
type
Hollywood Hacking
 TRON / int_2be271c7
type
Hollywood Hacking
 TRON: Legacy / int_2be271c7
type
Hollywood Hacking
 Unfriended: Dark Web / int_2be271c7
type
Hollywood Hacking
 WarGames / int_2be271c7
type
Hollywood Hacking
 Warriors of Terra / int_2be271c7
type
Hollywood Hacking
 Weird Science / int_2be271c7
type
Hollywood Hacking
 White House Down / int_2be271c7
type
Hollywood Hacking
 Sly Cooper (Franchise) / int_2be271c7
type
Hollywood Hacking
 Watch_Dogs (Franchise) / int_2be271c7
type
Hollywood Hacking
 Accel World / int_2be271c7
type
Hollywood Hacking
 Shangri-La / int_2be271c7
type
Hollywood Hacking
 Zaregoto / int_2be271c7
type
Hollywood Hacking
 A Fox Tail / int_2be271c7
type
Hollywood Hacking
 Accel World / int_2be271c7
type
Hollywood Hacking
 And You Thought There Is Never a Girl Online? / int_2be271c7
type
Hollywood Hacking
 Artemis / int_2be271c7
type
Hollywood Hacking
 Battle Royale / int_2be271c7
type
Hollywood Hacking
 Blindsight / int_2be271c7
type
Hollywood Hacking
 Castle Perilous / int_2be271c7
type
Hollywood Hacking
 Chaos Timeline / int_2be271c7
type
Hollywood Hacking
 Confederation of Valor / int_2be271c7
type
Hollywood Hacking
 Cryptonomicon / int_2be271c7
type
Hollywood Hacking
 Digital Fortress / int_2be271c7
type
Hollywood Hacking
 Dopamine / int_2be271c7
type
Hollywood Hacking
 Dungeon Robotics / int_2be271c7
type
Hollywood Hacking
 Geronimo Stilton / int_2be271c7
type
Hollywood Hacking
 Jurassic Park / int_2be271c7
type
Hollywood Hacking
 Jurassic Park (1990) / int_2be271c7
type
Hollywood Hacking
 Millennium Series / int_2be271c7
type
Hollywood Hacking
 Neuromancer / int_2be271c7
type
Hollywood Hacking
 R-15 / int_2be271c7
type
Hollywood Hacking
 RCN / int_2be271c7
type
Hollywood Hacking
 REAMDE / int_2be271c7
type
Hollywood Hacking
 Shangri-La / int_2be271c7
type
Hollywood Hacking
 Splinter Cell / int_2be271c7
type
Hollywood Hacking
 Sprawl Trilogy / int_2be271c7
type
Hollywood Hacking
 Spy School / int_2be271c7
type
Hollywood Hacking
 The Machineries of Empire / int_2be271c7
type
Hollywood Hacking
 The Mountain in the Sea / int_2be271c7
type
Hollywood Hacking
 The Talon Saga / int_2be271c7
type
Hollywood Hacking
 This Book Is Full of Spiders: Seriously, Dude, Don't Touch It / int_2be271c7
type
Hollywood Hacking
 2015: Second American Civil War / int_2be271c7
type
Hollywood Hacking
 AtlasShorts
seeAlso
Hollywood Hacking
 PandoraA-G
seeAlso
Hollywood Hacking
 SchrodingersDuck
seeAlso
Hollywood Hacking
 A Certain Scientific Railgun (Manga) / int_2be271c7
type
Hollywood Hacking
 A.I. Love You (Manga) / int_2be271c7
type
Hollywood Hacking
 Blattodea (Manga) / int_2be271c7
type
Hollywood Hacking
 EDENS ZERO (Manga) / int_2be271c7
type
Hollywood Hacking
 JoJo's Bizarre Adventure: Golden Wind (Manga) / int_2be271c7
type
Hollywood Hacking
 Maria no Danzai (Manga) / int_2be271c7
type
Hollywood Hacking
 World Embryo (Manga) / int_2be271c7
type
Hollywood Hacking
 aespa (Music) / int_2be271c7
type
Hollywood Hacking
 Battle Beast (Music) / int_2be271c7
type
Hollywood Hacking
 The Mechanisms (Music) / int_2be271c7
type
Hollywood Hacking
 Big Data (Podcast) / int_2be271c7
type
Hollywood Hacking
 Pretend Friends (Podcast) / int_2be271c7
type
Hollywood Hacking
 The Once and Future Nerd (Podcast) / int_2be271c7
type
Hollywood Hacking
 Alex Rider / int_2be271c7
type
Hollywood Hacking
 Alex Rider (2020) / int_2be271c7
type
Hollywood Hacking
 Arrested Development / int_2be271c7
type
Hollywood Hacking
 Awake (2012) / int_2be271c7
type
Hollywood Hacking
 Breakout Kings / int_2be271c7
type
Hollywood Hacking
 Constantine / int_2be271c7
type
Hollywood Hacking
 Constantine (2014) / int_2be271c7
type
Hollywood Hacking
 Dear White People / int_2be271c7
type
Hollywood Hacking
 Diagnosis: Murder / int_2be271c7
type
Hollywood Hacking
 General Hospital / int_2be271c7
type
Hollywood Hacking
 Ghostwriter / int_2be271c7
type
Hollywood Hacking
 Halt and Catch Fire / int_2be271c7
type
Hollywood Hacking
 Hanzawa Naoki / int_2be271c7
type
Hollywood Hacking
 Homeland / int_2be271c7
type
Hollywood Hacking
 Honey, I Shrunk the Kids / int_2be271c7
type
Hollywood Hacking
 How to Be Indie / int_2be271c7
type
Hollywood Hacking
 JAG / int_2be271c7
type
Hollywood Hacking
 K9 / int_2be271c7
type
Hollywood Hacking
 Kiss Me First / int_2be271c7
type
Hollywood Hacking
 La Femme Nikita / int_2be271c7
type
Hollywood Hacking
 Lewis / int_2be271c7
type
Hollywood Hacking
 Limitless / int_2be271c7
type
Hollywood Hacking
 Lupin (2021) / int_2be271c7
type
Hollywood Hacking
 MacGyver (1985) / int_2be271c7
type
Hollywood Hacking
 Mission Top Secret / int_2be271c7
type
Hollywood Hacking
 Mr. Robot / int_2be271c7
type
Hollywood Hacking
 Orphan Black / int_2be271c7
type
Hollywood Hacking
 Pandora / int_2be271c7
type
Hollywood Hacking
 Porridge / int_2be271c7
type
Hollywood Hacking
 Profit / int_2be271c7
type
Hollywood Hacking
 Scandal / int_2be271c7
type
Hollywood Hacking
 Scandal (2012) / int_2be271c7
type
Hollywood Hacking
 Scorpion / int_2be271c7
type
Hollywood Hacking
 The Firm / int_2be271c7
type
Hollywood Hacking
 The Flash (1990) / int_2be271c7
type
Hollywood Hacking
 The Flash (2014) / int_2be271c7
type
Hollywood Hacking
 The Goldbergs / int_2be271c7
type
Hollywood Hacking
 The IT Crowd / int_2be271c7
type
Hollywood Hacking
 The Shield / int_2be271c7
type
Hollywood Hacking
 2057 / int_2be271c7
type
Hollywood Hacking
 Vincenzo / int_2be271c7
type
Hollywood Hacking
 VR.5 / int_2be271c7
type
Hollywood Hacking
 Waterloo Road / int_2be271c7
type
Hollywood Hacking
 White Rabbit Project / int_2be271c7
type
Hollywood Hacking
 Wonder Woman (1975) / int_2be271c7
type
Hollywood Hacking
 You, Me and the Apocalypse / int_2be271c7
type
Hollywood Hacking
 GURPS (Tabletop Game) / int_2be271c7
type
Hollywood Hacking
 Burgle Bros. (Tabletop Game) / int_2be271c7
type
Hollywood Hacking
 Hc Svnt Dracones (Tabletop Game) / int_2be271c7
type
Hollywood Hacking
 Mage: The Ascension (Tabletop Game) / int_2be271c7
type
Hollywood Hacking
 Netrunner (Tabletop Game) / int_2be271c7
type
Hollywood Hacking
 Shadowrun (Tabletop Game) / int_2be271c7
type
Hollywood Hacking
 Star Wars: Roleplaying Game (Tabletop Game) / int_2be271c7
type
Hollywood Hacking
 Dear Evan Hansen (Theatre) / int_2be271c7
type
Hollywood Hacking
 Batman: Arkham Origins (Video Game) / int_2be271c7
type
Hollywood Hacking
 BattleTech (Video Game) / int_2be271c7
type
Hollywood Hacking
 BattleTech (2018) (Video Game) / int_2be271c7
type
Hollywood Hacking
 Binary Domain (Video Game) / int_2be271c7
type
Hollywood Hacking
 Bionic Commando (Video Game) / int_2be271c7
type
Hollywood Hacking
 Bionic Commando (1988) (Video Game) / int_2be271c7
type
Hollywood Hacking
 Blue Archive (Video Game) / int_2be271c7
type
Hollywood Hacking
 Call of Duty: Black Ops II (Video Game) / int_2be271c7
type
Hollywood Hacking
 COGEN: Sword of Rewind (Video Game) / int_2be271c7
type
Hollywood Hacking
 Crash Fever (Video Game) / int_2be271c7
type
Hollywood Hacking
 CrossCode (Video Game) / int_2be271c7
type
Hollywood Hacking
 Cyberdimension Neptunia: 4 Goddesses Online (Video Game) / int_2be271c7
type
Hollywood Hacking
 Cyberia 2 (Video Game) / int_2be271c7
type
Hollywood Hacking
 Cyberpunk 2077: Phantom Liberty (Video Game) / int_2be271c7
type
Hollywood Hacking
 Deep Rock Galactic (Video Game) / int_2be271c7
type
Hollywood Hacking
 Deus Ex: Human Revolution (Video Game) / int_2be271c7
type
Hollywood Hacking
 Devastation (Video Game) / int_2be271c7
type
Hollywood Hacking
 Digimon Story: Cyber Sleuth (Video Game) / int_2be271c7
type
Hollywood Hacking
 007 Legends (Video Game) / int_2be271c7
type
Hollywood Hacking
 Dreamfall Chapters (Video Game) / int_2be271c7
type
Hollywood Hacking
 Dreamfall: The Longest Journey (Video Game) / int_2be271c7
type
Hollywood Hacking
 Emergency! (Video Game) / int_2be271c7
type
Hollywood Hacking
 Far Cry 3: Blood Dragon (Video Game) / int_2be271c7
type
Hollywood Hacking
 Firefall (Video Game) / int_2be271c7
type
Hollywood Hacking
 Gender Wars (Video Game) / int_2be271c7
type
Hollywood Hacking
 Ghost Hacker (Video Game) / int_2be271c7
type
Hollywood Hacking
 Girls' Frontline (Video Game) / int_2be271c7
type
Hollywood Hacking
 Going Under (Video Game) / int_2be271c7
type
Hollywood Hacking
 GoldenEye (1997) (Video Game) / int_2be271c7
type
Hollywood Hacking
 GoldenEye (2010) (Video Game) / int_2be271c7
type
Hollywood Hacking
 GoldenEye Wii (Video Game) / int_2be271c7
type
Hollywood Hacking
 Hitman 2: Silent Assassin (Video Game) / int_2be271c7
type
Hollywood Hacking
 House Party (2017) (Video Game) / int_2be271c7
type
Hollywood Hacking
 Mega Man Battle Network (Video Game) / int_2be271c7
type
Hollywood Hacking
 Mega Man Battle Network 5: Team Colonel and Team ProtoMan (Video Game) / int_2be271c7
type
Hollywood Hacking
 Mega Man Xtreme (Video Game) / int_2be271c7
type
Hollywood Hacking
 Monaco: What's Yours Is Mine (Video Game) / int_2be271c7
type
Hollywood Hacking
 NEO: The World Ends with You (Video Game) / int_2be271c7
type
Hollywood Hacking
 Nancy Drew (Video Game) / int_2be271c7
type
Hollywood Hacking
 Offworld Trading Company (Video Game) / int_2be271c7
type
Hollywood Hacking
 Overwatch (Video Game) / int_2be271c7
type
Hollywood Hacking
 Paradigm (Video Game) / int_2be271c7
type
Hollywood Hacking
 Paradroid (Video Game) / int_2be271c7
type
Hollywood Hacking
 Perfect Dark (Video Game) / int_2be271c7
type
Hollywood Hacking
 PlanetSide (Video Game) / int_2be271c7
type
Hollywood Hacking
 Remember Me (Video Game) / int_2be271c7
type
Hollywood Hacking
 Resident Evil 3 (Remake) (Video Game) / int_2be271c7
type
Hollywood Hacking
 Road 96 (Video Game) / int_2be271c7
type
Hollywood Hacking
 Roombo: First Blood (Video Game) / int_2be271c7
type
Hollywood Hacking
 Saints Row: The Third (Video Game) / int_2be271c7
type
Hollywood Hacking
 Science Girls! (Video Game) / int_2be271c7
type
Hollywood Hacking
 Scrutinized (Video Game) / int_2be271c7
type
Hollywood Hacking
 7th Dragon (Video Game) / int_2be271c7
type
Hollywood Hacking
 StarCrawlers (Video Game) / int_2be271c7
type
Hollywood Hacking
 Stray (2022) (Video Game) / int_2be271c7
type
Hollywood Hacking
 Streets of Rogue (Video Game) / int_2be271c7
type
Hollywood Hacking
 Super Robot Wars W (Video Game) / int_2be271c7
type
Hollywood Hacking
 Technobabylon (Video Game) / int_2be271c7
type
Hollywood Hacking
 Teenage Mutant Ninja Turtles (2014) (Video Game) / int_2be271c7
type
Hollywood Hacking
 The Ascent (Video Game) / int_2be271c7
type
Hollywood Hacking
 The Cave (Video Game) / int_2be271c7
type
Hollywood Hacking
 Titanfall (Video Game) / int_2be271c7
type
Hollywood Hacking
 WWE Video Games (Video Game) / int_2be271c7
type
Hollywood Hacking
 WarGames Defcon 1 (Video Game) / int_2be271c7
type
Hollywood Hacking
 Watch_Dogs (Video Game) / int_2be271c7
type
Hollywood Hacking
 Welcome to the Game (Video Game) / int_2be271c7
type
Hollywood Hacking
 Double Homework (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 428: Shibuya Scramble (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Majikoi! Love Me Seriously! (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Riddle Joker (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Seinarukana (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Shale Hill Secrets (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Steins;Gate (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Sunrider (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 The Heist: Monaco (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 VA-11 HALL-A (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Vee Is Calling (Visual Novel) / int_2be271c7
type
Hollywood Hacking
 Red vs. Blue: The Recollection (Web Animation) / int_2be271c7
type
Hollywood Hacking
 STBlackST (Web Animation) / int_2be271c7
type
Hollywood Hacking
 The Adventures of Kim Jong Un (Web Animation) / int_2be271c7
type
Hollywood Hacking
 Ashens and the Quest for the Game Child (Web Video) / int_2be271c7
type
Hollywood Hacking
 Atomic Shrimp (Web Video) / int_2be271c7
type
Hollywood Hacking
 BAMF Girls' Club (Web Video) / int_2be271c7
type
Hollywood Hacking
 Caddicarus (Web Video) / int_2be271c7
type
Hollywood Hacking
 Cimoooooooo (Web Video) / int_2be271c7
type
Hollywood Hacking
 Decker Shado (Web Video) / int_2be271c7
type
Hollywood Hacking
 Door Monster (Web Video) / int_2be271c7
type
Hollywood Hacking
 Kitboga (Web Video) / int_2be271c7
type
Hollywood Hacking
 Lasagna Cat (Web Video) / int_2be271c7
type
Hollywood Hacking
 Little White Lie (Web Video) / int_2be271c7
type
Hollywood Hacking
 lonelygirl15 (Web Video) / int_2be271c7
type
Hollywood Hacking
 Promos (Web Video) / int_2be271c7
type
Hollywood Hacking
 Skypocalypse (Web Video) / int_2be271c7
type
Hollywood Hacking
 Stuff You Like (Web Video) / int_2be271c7
type
Hollywood Hacking
 Super Academy (Web Video) / int_2be271c7
type
Hollywood Hacking
 The Gamers: Humans & Households (Web Video) / int_2be271c7
type
Hollywood Hacking
 Crimson Dark (Webcomic) / int_2be271c7
type
Hollywood Hacking
 Emmy the Robot (Webcomic) / int_2be271c7
type
Hollywood Hacking
 Fisheye Placebo (Webcomic) / int_2be271c7
type
Hollywood Hacking
 Hero In Training (Webcomic) / int_2be271c7
type
Hollywood Hacking
 Noblesse (Webcomic) / int_2be271c7
type
Hollywood Hacking
 The Last Days of FOXHOUND (Webcomic) / int_2be271c7
type
Hollywood Hacking
 Lifehacker
seeAlso
Hollywood Hacking
 Neo-Duelist League (Website) / int_2be271c7
type
Hollywood Hacking
 Overused Sci-Fi Silly Science (Website) / int_2be271c7
type
Hollywood Hacking
 Springhole (Website) / int_2be271c7
type
Hollywood Hacking
 The Onion (Website) / int_2be271c7
type
Hollywood Hacking
 Carmen Sandiego / int_2be271c7
type
Hollywood Hacking
 Class of the Titans / int_2be271c7
type
Hollywood Hacking
 Dino Squad / int_2be271c7
type
Hollywood Hacking
 Fangbone! / int_2be271c7
type
Hollywood Hacking
 Gargoyles / int_2be271c7
type
Hollywood Hacking
 Mega Man (Ruby-Spears) / int_2be271c7
type
Hollywood Hacking
 Sally Bollywood / int_2be271c7
type
Hollywood Hacking
 Spider-Man: The Animated Series / int_2be271c7
type
Hollywood Hacking
 The Penguins of Madagascar / int_2be271c7
type
Hollywood Hacking
 Ultimate Avengers / int_2be271c7
type
Hollywood Hacking
 Undergrads / int_2be271c7
type
Hollywood Hacking
 Unikitty! / int_2be271c7
type
Hollywood Hacking
 Wreck-It Ralph / int_2be271c7
type
Hollywood Hacking
 Xiaolin Showdown / int_2be271c7
type
Hollywood Hacking
 Young Justice - Original Series / int_2be271c7
type
Hollywood Hacking
 Summer Wars / int_2be271c7
type
Hollywood Hacking
 Other Halves / int_2be271c7
type
Hollywood Hacking
 The Pendragon Adventure / int_2be271c7
type
Hollywood Hacking
 hollywoodhacking
sameAs
Hollywood Hacking
 Max Headroom / int_2be271c7
type
Hollywood Hacking
 Nikita / int_2be271c7
type
Hollywood Hacking
 The 7th Guest (Video Game) / int_2be271c7
type
Hollywood Hacking