{"id":22236,"date":"2021-07-19T19:01:27","date_gmt":"2021-07-19T11:01:27","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=22236"},"modified":"2021-07-19T18:15:39","modified_gmt":"2021-07-19T10:15:39","slug":"hacking-in-movies","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/","title":{"rendered":"10 Examples Where Movies Got Hacking Wrong"},"content":{"rendered":"<p>Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that <strong>the Rule of Cool must always overwrite reality<\/strong>.<\/p>\n<p>Because by a Hollywood executive\u2019s reasoning, if it doesn\u2019t look cool on screen, then it won\u2019t sell tickets. So even if it is technically wrong, it must look like it\u2019s printing money. Just ask Disney about that <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/White_Wilderness_(film)\">lemming incident<\/a>.<\/p>\n<p>When it comes to computers, one gets the impression that Hollywood writers don\u2019t know what they are talking about. <strong>Every time a character even approaches a computer or anything tech-related, chances are they\u2019ll get something about it wrong<\/strong>.<\/p>\n<p>This is even more evident in the computer crime that is hacking. Hollywood just doesn\u2019t seem to get it. Here are <strong>10 of the more comical examples where they got hacking very wrong<\/strong>.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/most-famous-hackers\/\" class=\"ref-block__link\" title=\"Read More: 10 Most Notorious Hackers Of All Time\" rel=\"bookmark\"><span class=\"screen-reader-text\">10 Most Notorious Hackers Of All Time<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/most-famous-hackers.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-21754 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/most-famous-hackers.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">10 Most Notorious Hackers Of All Time<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tWhen people hear the word 'hacker', they usually think of those who are considered black hat hackers. As...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>1. NCIS: Two Hands Too Many<\/h2>\n<p>You don\u2019t have to be that computer literate to know why this scene is full of fail. Even those who are only accustomed to writing on typewriters will know that<strong> 2 people operating on the same keyboard<\/strong> doesn\u2019t make a lick of sense. Not to mention the number of pop-ups that keep appearing on screen. It\u2019s a wonder they can concentrate at all staring at that screen while flaying on that keyboard.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Na1emN3SyXk?start=93\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>2. Unthinkable: Excel-lent Disposal Skills<\/h2>\n<p>So a bomb is about to explode at any moment. And a computer hacker is needed to disarm the bomb. So what does the hacker use to do the trick? Why typing random characters into Microsoft Excel of course! So in addition to Excel being the tool of an accountant, it is now<strong> a bomb disposal device<\/strong>. See kids? This is why you should install portable Excel on your thumb drive.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/UGMVFpYveQY\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>3. Hackers: It\u2019s Not How Any Of This Works<\/h2>\n<p>Remember during the \u201990s when computer technology was starting to break into the mainstream? <strong>Computers were seen as this mythical contraption<\/strong> that can do anything and hackers were mysterious, anti-social techno wizards that can bring down the power grid with a few keystrokes.<\/p>\n<p>The movie aptly called Hackers played those tropes in full force and even <strong>tops it off with 3D graphics that make hacking look like a video game<\/strong>. Heck, not even with the hacking, the entire file system is in 3D. Imagine how inefficient their entire organization is just trying to find a word document in that thing.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Bmz67ErIRa4\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>4. Jurassic Park: Because Clicking Takes Skill<\/h2>\n<p>Saying \u201cIt\u2019s Unix!\u201d is like saying \u201cIt\u2019s Windows!\u201d or \u201cIt\u2019s a Mac!\u201d. And saying that you can use it is like saying you can use a normal, average computer. Case in point, OS X is actually Unix-based. As a side note, some people say that <strong>the 3D UI is incredibly unrealistic<\/strong> and a case of Hollywood not knowing computers (as usual).<\/p>\n<p>However, it actually is <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Fsn\">a real, experimental file system<\/a>, similar to the idea shown in Hackers. Obviously, it didn\u2019t catch on but it\u2019s a nice touch at attempted realism for those in the know.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/dFUlAQZB9Ng\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>5. Masterminds: Hacking Is A Game Now<\/h2>\n<p>Another movie that portrayed hacking as some sort of video game. It\u2019s even worse than Hackers because it actually is a video game.<strong> The entire GUI is some sort of \u2018Dungeon and Dragons\u2019 video game<\/strong>, telling us the audience that the target corporation spent way too much of their budget for this. They then give the hacker 2 minutes to \u2018hack\u2019 them instead of just kicking them out.<\/p>\n<p>They even tell him that he\u2019s being tracked instead of, you know, not telling him. And when he does get in, he gets to download all the files willy nilly. The cheesy rock music doesn\u2019t help either.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/WbqshTREcpA\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>6. Firewall: Too Distant To Connect<\/h2>\n<p>This is a case where they got it so close to being right but failed in the nitty-gritty details. The \u201c10,000 songs, 10,000 account codes\u201d bit is correct as the iPod is simply a storage device but the way he handled it is completely wrong.<\/p>\n<p>For one thing, <strong>you can\u2019t just plug a fax scanner head to an iPod and expect it to recognize it<\/strong>. It\u2019s like plugging your iPod into a 20-year-old telephone and expecting it to record phone calls. It just doesn\u2019t work like that. If this were to really work, he had to connect the head to something that can interpret the data and then load it to the iPod.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"600\" height=\"338\" src=\"https:\/\/www.youtube.com\/embed\/J13jKfVH01o\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<h2>7. Numb3rs: Giving IRC Far Too Much Credit<\/h2>\n<p>Where do you think hackers would go if they don\u2019t want to be caught? Why IRC of course! Ugh. For those who don\u2019t know, IRC stands for Internet Chat Relay and is mostly <strong>a really simple chat protocol.<\/strong> Let\u2019s break this down.<\/p>\n<p>First, the drug boat analogy is completely meaningless. Just some 3D graphics and pointless babble to make it sound harder than it really is. Second, IRC is used by millions of average people worldwide. Not exactly a secret hacker den, is it? Next, creating an alert to find a particular username?<\/p>\n<p>Better hope I don\u2019t change it or that a thousand other people are using it. Finally, \u201cI speak L33T\u201d. S0 d0 1, 1t\u20195 n0t th4t h4rd.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/O2rGTXHvPCQ\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>8. CSI:NY: Virtual Chase Gone South<\/h2>\n<p>Spoiler alert: I am going to shamelessly rip apart CSI: NY for how they portray computers on the show. The first one is <strong>the infamous \u2018Second Life\u2019 chase scene<\/strong>.<\/p>\n<p>If the suspect had any amount of sense, he would have just logged out instead of pointlessly running around. And running to catch the guy who is made up of 1\u2019s and 0\u2019s. Ridiculous. And pinging only tells you that the person is online.<\/p>\n<h2>9. CSI:NY : Hack Via Layout Codes<\/h2>\n<p>Using a hack to gain an advantage in a video game is nothing new. I\u2019m sure most gamers have used cheat devices at one time or another. They usually involve cheat codes, cheat programs or cheat devices (GameShark4Life). But it takes a special kind of idiot\/genius to <strong> to use HTML layout codes to hack a multiplayer session of \u2018Gears Of War<\/strong>\u2018.<\/p>\n<p>If this was a browser-based game, it would be somewhat understandable but this is like telling a French guy to give up all his money by showing him a contract in English.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/SZQz9tkEHIg?start=498\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>10. CSI:NY: Visual Basic To Track IP<\/h2>\n<p>There was a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.reddit.com\/r\/gaming\/comments\/f2i7t\/ive_written_for_tv_shows_like_csi_and_numbers\/\">Reddit post<\/a> from someone that claimed to be a writer for TV shows such as CSI and Numb3rs. He says that they<strong> intentionally put this kind of technobabble<\/strong> as a sort of in-joke among TV show writers, to see who can get the worst line on TV.<\/p>\n<p>And after watching this scene, I\u2019m inclined to believe him. Why bother creating a \u201cGraphical User Interface\u201d, on Visual Basic no less, just to get an IP address? Just open up a command prompt. Even Uncle Google can do that if you ask him.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/hkDD03yeLnU\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>","protected":false},"excerpt":{"rendered":"<p>Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that the Rule of Cool must always overwrite reality. Because by a Hollywood executive\u2019s reasoning, if it doesn\u2019t look cool on screen, then it won\u2019t sell tickets.&hellip;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3401],"tags":[],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 Examples Where Movies Got Hacking Wrong - Hongkiat<\/title>\n<meta name=\"description\" content=\"Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Examples Where Movies Got Hacking Wrong\" \/>\n<meta property=\"og:description\" content=\"Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-19T11:01:27+00:00\" \/>\n<meta name=\"author\" content=\"Hongkiat.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hongkiat.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/\"},\"author\":{\"name\":\"Hongkiat.com\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/7cc686597d92f9086729e4bcc1577ba3\"},\"headline\":\"10 Examples Where Movies Got Hacking Wrong\",\"datePublished\":\"2021-07-19T11:01:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/\"},\"wordCount\":1156,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Culture\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/\",\"name\":\"10 Examples Where Movies Got Hacking Wrong - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"datePublished\":\"2021-07-19T11:01:27+00:00\",\"description\":\"Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/hacking-in-movies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Examples Where Movies Got Hacking Wrong\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/7cc686597d92f9086729e4bcc1577ba3\",\"name\":\"Hongkiat.com\",\"description\":\"This post is published by an HKDC (hongkiat.com) staff. (I.e., intern, staff writer, or editor).\",\"sameAs\":[\"https:\\\/\\\/www.hongkiat.com\"],\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Examples Where Movies Got Hacking Wrong - Hongkiat","description":"Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/","og_locale":"en_US","og_type":"article","og_title":"10 Examples Where Movies Got Hacking Wrong","og_description":"Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that","og_url":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2021-07-19T11:01:27+00:00","author":"Hongkiat.com","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Hongkiat.com","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/"},"author":{"name":"Hongkiat.com","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/7cc686597d92f9086729e4bcc1577ba3"},"headline":"10 Examples Where Movies Got Hacking Wrong","datePublished":"2021-07-19T11:01:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/"},"wordCount":1156,"commentCount":3,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"articleSection":["Culture"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/","url":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/","name":"10 Examples Where Movies Got Hacking Wrong - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"datePublished":"2021-07-19T11:01:27+00:00","description":"Nowadays, TV shows or movies insist on being hip and cool by throwing in a few tech plot points into the mix. However, the thing about Hollywood is that","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/hacking-in-movies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"10 Examples Where Movies Got Hacking Wrong"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/7cc686597d92f9086729e4bcc1577ba3","name":"Hongkiat.com","description":"This post is published by an HKDC (hongkiat.com) staff. (I.e., intern, staff writer, or editor).","sameAs":["https:\/\/www.hongkiat.com"],"url":"https:\/\/www.hongkiat.com\/blog\/author\/com\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-5ME","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=22236"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22236\/revisions"}],"predecessor-version":[{"id":56119,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22236\/revisions\/56119"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=22236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=22236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=22236"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=22236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}