• 0

Movie Code - Screenshots of code from movies!


Question

18 answers to this question

Recommended Posts

  • 0

on the other hand it doesn't matter if the screen shows real code, it's not the point. it doesn't add anything to the movie if you show a real hacked. heck considering the work and tediousness it would just make the movie boring, no one ever "hacked" anything with a single command on a commandline. 

Link to comment
Share on other sites

  • 0

Care to explain for us layman folk?

 

unless bar has magically become a type of number format (which I guess they could do a declaration)... that's not real.  Also.. apparently the msg1 array is = a number? ptr is equal to a string (so it appears) though the second quote is never finished.  Basically yea.. the only valid things I see are.. using things like == to verify a comparison (but it's still used wrong..) and using the || as an OR.. all in all though.. it's pretty much just gibberish.

Link to comment
Share on other sites

  • 0

There is nothing to explain. It's senseless random code.

 

unless bar has magically become a type of number format (which I guess they could do a declaration)... that's not real.  Also.. apparently the msg1 array is = a number? ptr is equal to a string (so it appears) though the second quote is never finished.  Basically yea.. the only valid things I see are.. using things like == to verify a comparison (but it's still used wrong..) and using the || as an OR.. all in all though.. it's pretty much just gibberish.

 

Haha fair enough, thanks for the explanation! Im clueless when it comes to code, i thought there may have been some hidden joke involved but evidently not :D

Link to comment
Share on other sites

  • 0

Those codes are written by Republican :)

... because they knew Democrats would spend the rest of their lives trying to rationalize senseless idiocy.

:rofl:  :shiftyninja:

Link to comment
Share on other sites

  • 0

I'd interpret the gibberish code as follows:

msg1 [] = ... //assign a new address of msg1.
msg2 [] = ... //assign a new address of msg2.

static unsigned bar code
ptr = "/c @ 65299 YXS "//copy something from address 65299 to YXS and also assign to pointer. Note: I just added an additional " to fix the syntax highlighting in the post.

exe filenm "yxs" @ 34990/y // execute yxs at address 43990/y.
(x= ...; X<...; [] = ...) // loop continuously while assigning new addresses to x each iteration until it is less than some value.
if @x=="..."; [] = ... // if address x is blah, then switch the address of x.
if @y=="...."; [] = ... // if address y is blah, then switch the address of y.

if @x==... || @x==... endif @x==... // if address x is blah or address x is blah2 then check if address x is blah3.

Note the following holds true under this interpretation:

  • @ is the addressof operator (as in pascal)
  • [] = is an address assignment operator (I'd say this could be borrowed from assemblies that use [foo] syntax to say store in the memory location at foo).
  • = is an assignment operator.
  • == is the equal comparison operator.
  • You don't need to restate the variable name in the context of a statement. For example, if you were comparing to x, you can assign to it without ever naming it again in an if statement or loop. This is seen whenever they use the address assignment operator in loops and if statements.
  • Not case sensitive. For example: yxs is equivalent to YXS.
  • either endif or ; can be used to end the boolean condition part of an if statement. I.e. if @x=="..."; [] = is the same as if @x=="..." endif [] = ...

I don't think I missed anything so it should all make semantic sense from a compiler perspective under that interpretation. Although, of course still meaningless.

Link to comment
Share on other sites

  • 0

Well showing a real hacker at work would not be fun to watch. You would just see a bunch of people phone freaking or attaching wifi adaptors to back of machines, sniffing internet traffic for hours, running brute force programs. Or even using live linux destro CD/USB loaded with security tools. 

It would add allot of "waiting" to a movie not fun at all much better to show some made up junk for a few seconds and say "hey its done" or what happens most the time these days some hot chick just looks at her phone and press's like 2 things and boom instant hack.

Link to comment
Share on other sites

  • 0

I'll just leave this here.

****ing Miguel de Icaza and hacked sattelites.

 

I'm as sexy as all of them when I'm programming. When I'm hacking I look like Brad Pitt's better looking 20-something son. And then reality comes back....

Link to comment
Share on other sites

This topic is now closed to further replies.