Webspace Sponsored by:
This page (like others in the Useless Trivia space) exist to provide analysis and review of computer security in films. Reviews of usernames and passwords used in these films will be mentioned as they can be found and identified.
No passwords, passphrases or codes for computers found.
The film has one scene where keycards are required for entry past a checkpoint. Five Cards are found and used by a subversive group looking to gather information about government experimentation on humans. At the cardkey unit appears to be a handprint scanners and possibly other biometric scanners. They mention the keycards are only valid for one week, and likely stole or purchased them from other utility service employees illegally. When the group uses the cards, the gate controller notes that they are not expecting a cable replacement until next week. (It is possible that a conversation took place before the part we see, but there is risk the gatekeeper elicited information for the person trying to gain access to use against the gatekeeper.) The imposter attempting to gain access to the restricted area uses some social engineering to convince the gatekeeper that cable has come in early and he (the person trying to gain access) has vacation time coming up. 'If the cable is delayed beyond "today", then it will need to wait until later and will cost them more money because the other employees will be on overtime.' Not wanting to deal with risks of saying, "no," to this group and costing his department money, and potentially getting himself in trouble, the gatekeeper allows them to pass with the stolen key cards. (We expect the gatekeeper did nor know they were stolen.)
(C) 2006, 2005, 2004, 2003, 2002, 2001 Passwall.com. Copyright Information: Any of the above content that was created by me may be copied so long as each copy includes this copyright and links back to this site with reference to source and the content not be used for financial gain.
(C) 2006, 2005, 2004, 2003, 2002, 2001 of information included above with explicit credit to people other than me who have submitted documentation, additions, corrections. You will need to get their permission to use their included content.
I do not provide screenshots from movies, or downloadable movies for any films to avoid issues with Copyright infringement. It is my intention to legally provide news, information, trivia, and discussion about films and ensure content is not illegally reproduced. If you control Copyright to any of these movies and will extend to me permission is writing to capture screenshot images to be used on the web, please let me know!
If you have suggestions on additions, feel free to e-mail them to me. Please use valid e-mail addresses so I can reply to you. I like to offer credit to people for their submissions. When you provide your submission, please specify what name should be credited with the information provided and if you would like to have an e-mail link to your address or a URL to your home page.
Useless Trivia: Movie reviews with respect to computer security.