FacebookTwitter
Hatrack River Forum   
my profile login | search | faq | forum home

  next oldest topic   next newest topic
» Hatrack River Forum » Active Forums » Books, Films, Food and Culture » short story - computer cyber hacking

   
Author Topic: short story - computer cyber hacking
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
Fahim is being a weenie. He has a question about a short story he started a long time ago and is now thinking of finishing. You know, for fame, fortune, that sort of thing.

He's got 1200 words written - all from late 1990s - and the opening scene is a hacker getting past cyber security. There's a virtual creature he has to get past and, well, I say it's been done to death, he says where, I say I don't remember story names and such, and he says that I remember it because I've read this story before and that's where I'm remembering it from and therefore it doesn't exist outside of his imagination. Whew!

So. Has it? Been done to death, that is? If so, could you quote the name of the piece, the author, and a little bit about it? Pretty please with a cherry on top?

Thanks!

Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
Oh, and Fahim being a weenie - that was because he wouldn't post this question himself. He's too lazy. So he got me to do it for him. [Roll Eyes] So, yeah, he'll be reading this thread, so please, feel free to call him a weenie, too. [Razz]
Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
Tante Shvester
Member
Member # 8202

 - posted      Profile for Tante Shvester   Email Tante Shvester         Edit/Delete Post 
[Wave] Hi Fahim! Go smack quid with a weenie for us.

Even if a story has been "done to death" (and the hacker thing does seem familiar) readers don't always care as long as it is done well. Waifs still triumph over adversity, boys still meet girls, and the spy still saves the world through, uh, competent spying. Tell your story so that we care about it, and it is still a good story.

Good luck!

Posts: 10397 | Registered: Jun 2005  |  IP: Logged | Report this post to a Moderator
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
Well, in all fairness, I did tell him that, too. Although I probably used the words, "It better be done well enough to make us care." Or something like that. [Razz]
Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
Lyrhawn
Member
Member # 7039

 - posted      Profile for Lyrhawn   Email Lyrhawn         Edit/Delete Post 
If he does it with a different take on it then it doesn't matter how many times it has been done.

But what you're describing reminds me a LOT of the Shadowrun books. The only one that I remember reading was "Wolf and Raven" by Michael A. Stackpole (he also wrote the X-Wing books for Star Wars).

It's a series of stories about a group of runners and one of them is a matrix hacker. Much of the hacking referred to in the stories is done on another plane where they hackers have to battle against simulated creatures or what not in order to get past ICE (some sort of computer programs) to access the data they want. I'd consider looking there if he's trying to specifically avoid sounding generic or copycat.

At the very least, it's a good read!

Posts: 21898 | Registered: Nov 2004  |  IP: Logged | Report this post to a Moderator
TomDavidson
Member
Member # 124

 - posted      Profile for TomDavidson   Email TomDavidson         Edit/Delete Post 
quote:
He's got 1200 words written - all from late 1990s - and the opening scene is a hacker getting past cyber security. There's a virtual creature he has to get past and, well, I say it's been done to death, he says where, I say I don't remember story names and such, and he says that I remember it because I've read this story before and that's where I'm remembering it from and therefore it doesn't exist outside of his imagination. Whew!
Yeah, it was done to death back in the '90s. "Beat this virtual piece of ICE" was a major trope in rip-off cyberpunk novels.
Posts: 37449 | Registered: May 1999  |  IP: Logged | Report this post to a Moderator
Primal Curve
Member
Member # 3587

 - posted      Profile for Primal Curve           Edit/Delete Post 
I really, really hate computer hacker stories. They always try to make something that's not very exciting seem super-neato and thrilling. They are also riddled with really stupid made-up computer terminology from the future.

On a serious note, why in God's green earth would people waste system resources on developing graphically-intensive (and seemingly difficult to use) user interfaces and have their programs appear as giant cybernetic spiders or something when those resources would, in the real world, be spent on porn?

Posts: 4753 | Registered: May 2002  |  IP: Logged | Report this post to a Moderator
Lyrhawn
Member
Member # 7039

 - posted      Profile for Lyrhawn   Email Lyrhawn         Edit/Delete Post 
lol.

From what little I've read, it was the user that created the interface to make the hacking easier, rather than the people trying to guard their information.

Posts: 21898 | Registered: Nov 2004  |  IP: Logged | Report this post to a Moderator
Primal Curve
Member
Member # 3587

 - posted      Profile for Primal Curve           Edit/Delete Post 
I just think most hacking stories show a total lack of understanding of the computer industry and consumers in general. People do NOT like change and could you really see your parents putting on a VR headset or having a neural port installed in their brain stem? Yeah, it's not going to happen. There may be a small minority of people who'd like it, but the lack of demand would make it too expensive for people to bother with.

I'm not saying that SF should be realistic, I just think it should be plausable.

Posts: 4753 | Registered: May 2002  |  IP: Logged | Report this post to a Moderator
Fahim
Member
Member # 5482

 - posted      Profile for Fahim   Email Fahim         Edit/Delete Post 
quote:
Originally posted by Tante Shvester:
[Wave] Hi Fahim! Go smack quid with a weenie for us.

Hi Tante Shvester [Smile] Sure thing, will smack her around good with a weenie [Razz]
Posts: 136 | Registered: Aug 2003  |  IP: Logged | Report this post to a Moderator
Fahim
Member
Member # 5482

 - posted      Profile for Fahim   Email Fahim         Edit/Delete Post 
quote:
Originally posted by Primal Curve:
I just think most hacking stories show a total lack of understanding of the computer industry and consumers in general. People do NOT like change and could you really see your parents putting on a VR headset or having a neural port installed in their brain stem?

Primal Curve, but isn't this what our great grand parents or their parents would have said about air-travel or space tourism? There are many factors which go into making an idea plausible [Smile]
Posts: 136 | Registered: Aug 2003  |  IP: Logged | Report this post to a Moderator
Primal Curve
Member
Member # 3587

 - posted      Profile for Primal Curve           Edit/Delete Post 
But none of those involved either looking rediculous or going under the knife.

Maybe VR helmets, but not a VR environment to navigate the internet. Why would you WANT to take time to move through an environment when you could easily go there instantaneously?

Posts: 4753 | Registered: May 2002  |  IP: Logged | Report this post to a Moderator
Historian
Member
Member # 8858

 - posted      Profile for Historian   Email Historian         Edit/Delete Post 
In True Names by Vernor Vinge, there is a Bot, that blocks people from the castle of "hackers".. It asks questions to determine if the user is who they appear to be.


Google the book. It's out there in the ether, and it's an amazing look in to the future of cyberspace. Even more amazing because it was written so long ago.

Posts: 80 | Registered: Nov 2005  |  IP: Logged | Report this post to a Moderator
Fahim
Member
Member # 5482

 - posted      Profile for Fahim   Email Fahim         Edit/Delete Post 
quote:
Originally posted by Primal Curve:
But none of those involved either looking rediculous or going under the knife.

Maybe VR helmets, but not a VR environment to navigate the internet. Why would you WANT to take time to move through an environment when you could easily go there instantaneously?

Umm ... not sure where the "going under the knife" bit came from - unless you're thinkinf of jacking in a la Johnny Mnemonic. But that isn't what I'm talking about. Which makes me think that we aren't envisioning the same thing [Smile]

I'm basically talking about a virtual interface. Everybody talks about how clunky the computer interfaces today are. People have tried different interfaces at times. For instance, I think I remember something called Magic Cap (if I recall correctly) which tried to introduce a street metaphor - you have a post office where you send your mail etc. But then again, that's what Microsoft tried to do with the infamous Bob as well. I'm talking about a similar 3D virtual interface. You don't have minutes or hours of travel time to get anywhere in the interface - you point, you click (or make a gesture) and you're there. But you do have to interact with the elements of the interface - just as you do on a normal computer [Smile]

Posts: 136 | Registered: Aug 2003  |  IP: Logged | Report this post to a Moderator
Friday
Member
Member # 8998

 - posted      Profile for Friday   Email Friday         Edit/Delete Post 
In William Gibson's Neuromancer there is, among other things, a hacking program that embodies itself as a giant VR shark. Not exactly the same, but pretty similar.

Still, even if a certain detail has been "done to death", it can easily be made up for if the rest of the story is solid.

[ January 28, 2006, 12:02 AM: Message edited by: Friday ]

Posts: 148 | Registered: Jan 2006  |  IP: Logged | Report this post to a Moderator
human_2.0
Member
Member # 6006

 - posted      Profile for human_2.0   Email human_2.0         Edit/Delete Post 
For heaven sakes people, it is "cracking", not "hacking"! Hackers are people who "hack" code, ala programmers. Crackers are things you eat! I mean... They are people who crack into places they shouldn't be... yeah, that.
Posts: 1209 | Registered: Dec 2003  |  IP: Logged | Report this post to a Moderator
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
Um, evidently, it's not supposed to be a hacker in the story, but a cracker, so that's my bad, but that's been changed to something entirely different, as sometimes happens with writers. [Smile]

Thanks, y'all, for all your comments and suggestions. [Smile]

And human, are you sure it's not a biscuit? They taste better...

Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
human_2.0
Member
Member # 6006

 - posted      Profile for human_2.0   Email human_2.0         Edit/Delete Post 
A Mango Biscuit?
Posts: 1209 | Registered: Dec 2003  |  IP: Logged | Report this post to a Moderator
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
That was so cute! [Big Grin]
Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
Lyrhawn
Member
Member # 7039

 - posted      Profile for Lyrhawn   Email Lyrhawn         Edit/Delete Post 
Dear god that was....I don't even think words can describe it.

But I enjoyed it in an odd way.

Posts: 21898 | Registered: Nov 2004  |  IP: Logged | Report this post to a Moderator
Fahim
Member
Member # 5482

 - posted      Profile for Fahim   Email Fahim         Edit/Delete Post 
I don't want to comment on it ... it was too sick for words, and I only caught it peripherally [Razz]
Posts: 136 | Registered: Aug 2003  |  IP: Logged | Report this post to a Moderator
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
[Roll Eyes]
Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
*thwaps Fahim*

Okay, now I feel better. [Smile]

Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
Fahim
Member
Member # 5482

 - posted      Profile for Fahim   Email Fahim         Edit/Delete Post 
All this abuse ... I think I need a change of scenery ... or change of wife [Razz]
Posts: 136 | Registered: Aug 2003  |  IP: Logged | Report this post to a Moderator
quidscribis
Member
Member # 5124

 - posted      Profile for quidscribis   Email quidscribis         Edit/Delete Post 
[Cry]
Posts: 8355 | Registered: Apr 2003  |  IP: Logged | Report this post to a Moderator
Blayne Bradley
unregistered


 - posted            Edit/Delete Post 
quote:
wack her with a weenie
*giggles*
IP: Logged | Report this post to a Moderator
CaySedai
Member
Member # 6459

 - posted      Profile for CaySedai   Email CaySedai         Edit/Delete Post 
I guess my mind's in the same sewer as Blayne's. [Wink]
Posts: 2034 | Registered: Apr 2004  |  IP: Logged | Report this post to a Moderator
Scott R
Member
Member # 567

 - posted      Profile for Scott R   Email Scott R         Edit/Delete Post 
quote:
why in God's green earth would people waste system resources on developing graphically-intensive (and seemingly difficult to use) user interfaces
In all seriousness, this is done in the real world.

Checkpoint, PIX, Netscreen, and SonicWall firewall systems all have such GUIs.

Of course, none of them feature a giant spider... [Smile]

Posts: 14554 | Registered: Dec 1999  |  IP: Logged | Report this post to a Moderator
   

   Close Topic   Feature Topic   Move Topic   Delete Topic next oldest topic   next newest topic
 - Printer-friendly view of this topic
Hop To:


Contact Us | Hatrack River Home Page

Copyright © 2008 Hatrack River Enterprises Inc. All rights reserved.
Reproduction in whole or in part without permission is prohibited.


Powered by Infopop Corporation
UBB.classic™ 6.7.2