GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
A lot of my friend strongly recommend we to watch Die Hard4 and they told me inside the hacker do a lot of hacking via command, however I can't see any of them using command but alot of custom make program(What a disapointed because of I can't see something real).
And, I can't believe hacking is doing in that way and so many services is open inside a hacker's machine?
1 more thing I feel confuse is what distro the hacker use? Never see the logo before.
What your opinion Mr. Hacker?
Indeed, Die Hard 4 makes "hacking" (black-hat) seem trivialy easy to the audience.
Often commments such as:
"Now, I'll just hack in..."
are used. WTF? *just* hack in??? Lol, it gives people the impression he is using a virtual machete to hack/chop away at the system defenses.
Other stupid things appear on computer screens, such as "Uploading virus..."
Again, WTF? How does the computer know what you are uploading?
Lastly, they seem to use very futuristic graphical interfaces on the computers, no command line stuff....
Sure, but it spawns an extremely wrong idea of what "hacking" is and just furthers the already wrong deffenition of hacking.
And many people gobble up all the stuff they see in movies as fact, rather than picking up a book or even visiting wikipedia to get the FACTS right...
And ... did you see the movie "Hackers"? Hmmm ... so far off the mark as to what hackers do in real life. But the point in movies is not to make it look real, but to make it fun to watch! And that Anjelina Jolie ...
There is some funny thing this like they use nokia phone to connect satellite. I told my wife this is impossible, but my wife said i don't have imagination (Come on, everything can be done, but not in this way).
Well, there is a real hacking inside the movie, which is social engineering (when they steal the car).
die hard makes 'hacking' even easier than using metasploit
Agree, they can open each other web cam//cctv easily, some more increase the resolution.
And, what happend to their internet bandwith, unbelievable fast.
Finally, seems like they know all kind of program world wide, they know where to open the map, stop the electricity, find a necessary cctv, find a traffic light, find a F35 flight and etc.
There a real hacker.
However, I like their GUI, hopefully 1 day my command prompt look like that, lets start customize all command prompt program look thats
Nowadays hacking is (I think mostly, I don't know) done with social engineering.
Why all this hassle of brute forcing remotely a server to gain access, risking being found if you don't delete the traces on time when you just have to call the user tell him that you are at a remote site (out of company) a new it technician and if you don't do a job that requires the password the boss will kill you.
This only requires 3 things, the user's name, his phone number and the boss' name! Not even routing the attack 3 times around the globe.
I read Kevin Mitnick's book about social engineer, 2 years ago and the stuff that's written inside are trully amazing and achievable, with nowadays lack of security training from personel.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.