Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 
robjg63
4161 posts

Uber Geek
+1 received by user: 1427

Subscriber

  #575951 1-Feb-2012 15:57
Send private message

stevenz: 

In "Castle" they made a point of sending an image away to be "enhanced" and it came back as a zoomed-in blurry mess which I thought was a nice touch.

 

Ahhhhh reality.... 

By the way:
"You are" = "You're" - Not "Your".    "They are" = "They're" - Not "Their" or "There".   You probably mean "lose" not "loose".

I like them - Here is one of my pet hates:
advice/advise - I advise you to go and get advice. 

:-) 




Nothing is impossible for the man who doesn't have to do it himself - A. H. Weiler




Kyanar
4089 posts

Uber Geek
+1 received by user: 1684

ID Verified
Trusted

  #575976 1-Feb-2012 16:44
Send private message

stevenz: Anything that Hawaii Five-O does related to computers is apparently made-up on the spot, although they have a lot of product-placement for Microsoft's cloud storage system.

In "Castle" they made a point of sending an image away to be "enhanced" and it came back as a zoomed-in blurry mess which I thought was a nice touch.

There's also the presence of "Microsoft" branded monitors in virtually every cop show on TV that isn't sponsored by Apple, despite the fact they don't make such things.

I did think the malware encoded into the bones was a clever idea, infeasible obviously, but certainly novel.
Ah yes. Like NCIS LA - "I can't find the file, she must have hidden it". "I found it, she uploaded it to her personal SkyDrive, I can't get access!"

freitasm

BDFL - Memuneh
80652 posts

Uber Geek
+1 received by user: 41045

Administrator
ID Verified
Trusted
Geekzone
Lifetime subscriber

  #575980 1-Feb-2012 16:52
Send private message

Microsoft Photosynth...






Referral links: Quic Broadband (free setup code: R587125ERQ6VE) | Samsung | AliExpress | Wise | Sharesies 

 

Support Geekzone by subscribing (browse ads-free), or making a one-off or recurring donation through PressPatron.

 




Skolink
1081 posts

Uber Geek
+1 received by user: 32


  #576062 1-Feb-2012 20:47
Send private message

freitasm: Microsoft Photosynth...

Classic! He even typed away at the keyboard when asked to zoom in, instead of pressing the zoom button on his controler thingy. Unfortunately I don't think they used the word 'enhance' though.

Behodar
11099 posts

Uber Geek
+1 received by user: 6082

Trusted
Lifetime subscriber

  #576082 1-Feb-2012 21:34
Send private message

Argh! They're enhancing the incriminating image! Better hack into the system and alter the source file so that it looks like someone else, all without introducing Photoshop artefacts!

Phexx
420 posts

Ultimate Geek
+1 received by user: 6


  #576103 1-Feb-2012 22:13
Send private message

Ahh this thread is awesome! Great find!

 
 
 
 

Shop now on Samsung phones, tablets, TVs and more (affiliate link).
Zeon
3926 posts

Uber Geek
+1 received by user: 759

Trusted

  #576104 1-Feb-2012 22:14
Send private message

Haha 24 wasn't that bad.

Lol no kidding but I actually got the Cisco phones just so I could have that ring tone. Marketing works! 




Speedtest 2019-10-14


Kris89
28 posts

Geek
+1 received by user: 8


  #576598 2-Feb-2012 23:59
Send private message

With HDTV, it's easy to pause shows where they are showing "hacking" and the like, and inspect just what it is they are doing on the screen. Often there will be code scrolling past, and a quick google normally shows that it is completely unrelated to the task at hand.

Episode 5 from Strike Back - context is hacking/intercepting a video transmission:

The text shown is from an old version of Wordpress (2.7 it seems), although the "Weapon Locked" is a bit out of place...

Charlies Angels (the cancelled 2011 tv series) - "cracking" a "biometric" floor safe:

Turns out the code is for a Sudoku generator/solver written in (obfuscated) C (from the 2005 contest).

and lastly, one from Chuck, which is probably the most plausible "hacking" I have seen:

The code displayed is sample C# encryption code from Microsoft.

Kris89
28 posts

Geek
+1 received by user: 8


  #576603 3-Feb-2012 00:22
Send private message

And also, while blatant product placement can be distracting (like the aforementioned Hawaii Five-0), there are also the cases where logos and the like are purposefully removed, covered up, or obfuscated.
Macbooks with the glowing apple logo on the lid covered up often make an appearance, but you also get things like custom Windows/application themes and inverted colours used to disguise the fact that yes, the characters are just using off the shelf software....

1 | 2 
View this topic in a long page with up to 500 replies per page Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.