Jump to content

19 posts in this topic

Posted

So I found this interesting and quite cool, it is screenshots of code used in movies! Have a look! :)

 

http://moviecode.tumblr.com/

2 people like this

Share this post


Link to post
Share on other sites

Posted

Hello,

 

Not too many things....I thought most movies made up code but now, in the 1080p era, people would notice :P

Share this post


Link to post
Share on other sites

Posted

Oh god, why...

 

tumblr_myvcxdJwEp1tognpro1_1280.png

2 people like this

Share this post


Link to post
Share on other sites

Posted

on the other hand it doesn't matter if the screen shows real code, it's not the point. it doesn't add anything to the movie if you show a real hacked. heck considering the work and tediousness it would just make the movie boring, no one ever "hacked" anything with a single command on a commandline. 

Share this post


Link to post
Share on other sites

Posted

Oh god, why...

 

tumblr_myvcxdJwEp1tognpro1_1280.png

Care to explain for us layman folk?

Share this post


Link to post
Share on other sites

Posted

Care to explain for us layman folk?

There is nothing to explain. It's senseless random code.

1 person likes this

Share this post


Link to post
Share on other sites

Posted

I'm so forking that code! :o

Share this post


Link to post
Share on other sites

Posted

Care to explain for us layman folk?

 

unless bar has magically become a type of number format (which I guess they could do a declaration)... that's not real.  Also.. apparently the msg1 array is = a number? ptr is equal to a string (so it appears) though the second quote is never finished.  Basically yea.. the only valid things I see are.. using things like == to verify a comparison (but it's still used wrong..) and using the || as an OR.. all in all though.. it's pretty much just gibberish.

Share this post


Link to post
Share on other sites

Posted

There is nothing to explain. It's senseless random code.

 

unless bar has magically become a type of number format (which I guess they could do a declaration)... that's not real.  Also.. apparently the msg1 array is = a number? ptr is equal to a string (so it appears) though the second quote is never finished.  Basically yea.. the only valid things I see are.. using things like == to verify a comparison (but it's still used wrong..) and using the || as an OR.. all in all though.. it's pretty much just gibberish.

 

Haha fair enough, thanks for the explanation! Im clueless when it comes to code, i thought there may have been some hidden joke involved but evidently not :D

Share this post


Link to post
Share on other sites

Posted

Those codes are written by Republican :)

Share this post


Link to post
Share on other sites

Posted

Those codes are written by Republican :)

... because they knew Democrats would spend the rest of their lives trying to rationalize senseless idiocy.

:rofl:  :shiftyninja:

1 person likes this

Share this post


Link to post
Share on other sites

Posted

The code shown during the opening credits of Antitrust is the source code of imdb.

Share this post


Link to post
Share on other sites

Posted

I'd interpret the gibberish code as follows:

msg1 [] = ... //assign a new address of msg1.
msg2 [] = ... //assign a new address of msg2.

static unsigned bar code
ptr = "/c @ 65299 YXS "//copy something from address 65299 to YXS and also assign to pointer. Note: I just added an additional " to fix the syntax highlighting in the post.

exe filenm "yxs" @ 34990/y // execute yxs at address 43990/y.
(x= ...; X<...; [] = ...) // loop continuously while assigning new addresses to x each iteration until it is less than some value.
if @x=="..."; [] = ... // if address x is blah, then switch the address of x.
if @y=="...."; [] = ... // if address y is blah, then switch the address of y.

if @x==... || @x==... endif @x==... // if address x is blah or address x is blah2 then check if address x is blah3.

Note the following holds true under this interpretation:

  • @ is the addressof operator (as in pascal)
  • [] = is an address assignment operator (I'd say this could be borrowed from assemblies that use [foo] syntax to say store in the memory location at foo).
  • = is an assignment operator.
  • == is the equal comparison operator.
  • You don't need to restate the variable name in the context of a statement. For example, if you were comparing to x, you can assign to it without ever naming it again in an if statement or loop. This is seen whenever they use the address assignment operator in loops and if statements.
  • Not case sensitive. For example: yxs is equivalent to YXS.
  • either endif or ; can be used to end the boolean condition part of an if statement. I.e. if @x=="..."; [] = is the same as if @x=="..." endif [] = ...

I don't think I missed anything so it should all make semantic sense from a compiler perspective under that interpretation. Although, of course still meaningless.

1 person likes this

Share this post


Link to post
Share on other sites

Posted

Well showing a real hacker at work would not be fun to watch. You would just see a bunch of people phone freaking or attaching wifi adaptors to back of machines, sniffing internet traffic for hours, running brute force programs. Or even using live linux destro CD/USB loaded with security tools. 

It would add allot of "waiting" to a movie not fun at all much better to show some made up junk for a few seconds and say "hey its done" or what happens most the time these days some hot chick just looks at her phone and press's like 2 things and boom instant hack.

Share this post


Link to post
Share on other sites

Posted

mGqZ9yw.jpg




Matrix hack.

Share this post


Link to post
Share on other sites

Posted

^ That was actually quite realistic. Nmap exists and is commonly used to find available ports. "SSHNuke" doesn't exist, but it is shown here exploiting a real flaw in OpenSSH discovered in 2001

2 people like this

Share this post


Link to post
Share on other sites

Posted

It's funny how the Matrix, of all movies, is the one with the realistic hacking.

Share this post


Link to post
Share on other sites

Posted

I'll just leave this here.
Fucking Miguel de Icaza and hacked sattelites.

Share this post


Link to post
Share on other sites

Posted

I'll just leave this here.
****ing Miguel de Icaza and hacked sattelites.

 

I'm as sexy as all of them when I'm programming. When I'm hacking I look like Brad Pitt's better looking 20-something son. And then reality comes back....

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.