본문 바로가기
일상Lifestyle

헐리우드 영화의 법칙

by Retireconomist 2004. 9. 8.
? You never have to use the space-bar when typing long sentences.

? Movie character never make typing mistakes.

? High-tech computers, such as those used by NASA, the CIA, or some such governmental institution, will have easy to understand graphical interfaces.

? Corollary: you can gain access to any information you want by simply typing "ACCESS ALL OF THE SECRET FILES" on any keyboard.

? Likewise, you can infect a computer with a destructive virus by simply typing "UPLOAD VIRUS"

? All computers are connected. You can access the information on the villain's desktop computer, even if it's turned off.

? Powerful computers beep whenever you press a key or whenever the screen changes. The *really* advanced ones also emulate the sound of a dot-matrix printer.

? A hacker can get into the most sensitive computer in the world eating hamburger or sandwich and surely guess the secret password in three tries after two wrong guesses.

? Any PERMISSION DENIED has an OVERRIDE function

? Most computers, no matter how small, have reality-defying three-dimensional, active animation, photo-realistic graphics capability.

? Laptops, for some strange reason, always seem to have amazing real- time video phone capabilities and the performance of a CRAY Supercomputer.

When a good guy is looking at an image on the computer, he/she immediately spots an unobvious obscure character and says, Wait! Who's that? Zoom in on him. Then a a box is drawn around the bad guy's head, and that little square magically turns from low quality into extremely high quality. After that, the good guy exclaims, That's ____! He works for ____!, and the group quickly leaves.

A mouse is never used and never seen. The hero can get into any program by frantically typing on the keyboard. The hero must know all the shortcuts programmed into a computer he/she has never used before.

computer transfering a file too slowly? simply repeat the words 'come on, come on' in an anxious voice, & the giant blue doanloading bar will finish.
.
Any satellite or other surveillance photo equiptment will be able to mysteriously add pixels until a given image is sharpened enough to discover the identity of the villian(ess). Usually this is done by a glasses-wearing technician by a single keystroke after being asked Can you sharpen this up a little bit? by the hero. The hero will never ask why didn't you show me the
sharpened version of the image first instead of making me ask for it? It only took one keystroke, for god's sake.

every little boy can hack any top secret database he wants without turning on the computer or conecting into the net

If you are a computer whiz, than you type while saying the words at the exact same time you're typing it while online, like I - am - fine, how - are - you - today? - Let's - play - a - game I don't know whether they need a speach class or a typing class.

Destroying a monitor either by throwing it, or discharging fire arms into the tube, will destroy all of the data on the computer thus ridding the evidence.

Passwords are always simple words which are related on the file. For example hacker wants to open file which contains info about chemical weapon and the password is poison.

Any large amounts of data or complete contents of a laptop, can be saved on an ordinary 3 1/2 inch floppy disk

and howcome laptop computers are always on for several hours, with a user constantly typing on it and the battery never runs empty?

teenage hackers always keep their hair long, & ride a skateborad/rollerblades. sometimes these super cool kids keep a walkie-talkie connection with their best friends.

Any website visited has NO adverts flashing away.

Windows works ! Wot, no Blue Screen of Death ?

If a supercomputer is made too powerful, it will eventually become self- conscious and want to destroy all life in the universe.

E-mails are addressed to the character's name, not to any speciifc e-mail address..and yet they somehow miraculously get there!

Hackers can get into any system, no matter how difficult it's supposed to be. Usually they look at the screen and smirk, then type a few keys, then mutter some insulting comment (Better luck next time, slugheads!). They never get caught unless betrayed by a friend.

The monitor acts as a projector, so you can see in a person's face, what he's doing on the computer, literaly.

The hero ALWAYS finds the relevant information on the internet right away, and NEVER has to use a search engine.

Government's biggest secrets are behind a simple password.

Genius kids can break unbreakable code in their head.

hacking usually means guessing a password

everything can be found on the internet, from newspapers that date back 50 years to blueprints of any building in town to anybody's personal records

If the hero listens to his answering machine and one important message is unexpected then he usually has two very short messages on the tape before, one spoken by a man, one by a women. "Here'a John! I see you tomorrow at eight.".... beep ... "This is Sallieeeeee! I'll call again later." ... beep .... and then finally "Ahhhh! The killer is .....". If however the message is expected be sure that it will be the first one on the tape.

댓글