OT: Anonymous proxys (for film)
James Knott
james.knott-bJEeYj9oJeDQT0dZR+AlfA at public.gmane.org
Fri Apr 15 00:56:36 UTC 2005
Madison Kelly wrote:
> Ilya Palagin wrote:
>
>> Quoting Madison Kelly <linux-5ZoueyuiTZhBDgjK7y7TUQ at public.gmane.org>:
>>
>>> Hi all,
>>>
>>> I know this sounds dubious and it is off topic but I was hoping
>>> someone here might confirm something for me. A client of mine is in
>>> the film industry and just gave me a call about a made-for-tv movie
>>> he is working on about addiction, including internet/porn addiction.
>>>
>>> He has a scene where he wants to show a person at a public library
>>> bypassing their filters. The first thing I thought of would be an
>>> anonymous proxy but I've not done this before so I didn't want to
>>> tell him that for certain.
>>>
>>> So my question is just what he asked me: How would someone bypass
>>> filters at a library? It can't be an uber-l33t thing, it should be a
>>> relatively accessible thing. This is a normal person supposedly.
>>
>>
>>
>> See "Firewall piercing HOWTO".
>> Actually, in movies hackers usually open binary files in editors with
>> lots of
>> icons, maybe this is what the film maker needs? :-)
>
>
> Gah! Not if I have any influence (which I don't, really). Every time I
> see a movie on hacking I go bonkers at the interfaces used. It would be
> so nice to see a somewhat accurate portrayal someday. In this case
> though the person is supposed to be "Joe Ordinary" so l33t stuff
> wouldn't fit anyway.
Why is it computer displays in movies and TV shows often make machine
noises? And why is the text much larger than anyone is likely to use? ;-)
--
The Toronto Linux Users Group. Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml
More information about the Legacy
mailing list