He created the series before the modern concept of the internet and cyberspace even existed. Even Shirow Masamune acknowledges in the original Ghost in the Shell manga that cyberspace wouldn't have a visual appearance, and he only did so for the sake of entertainment. The creators have noted that the cyberspace doesn't really look like that at all, but it's an entertaining visual representation for the audience's benefit. In one episode, such a software hack was used to distract the target from the Major breaking in and physically connecting to the local network. But when the characters hack into them, they do it by connecting an intrusion program (which looks sort of like a welding torch) and waiting a while (though it takes only a few seconds of screen time). Firewalls are represented by spheres with shiny, meaningless glyphs on them.Ghost in the Shell: Stand Alone Complex:.As silly as it is, everything in this sequence is symbolically representative of real hacking: Lordgenome first breaks through the firewalls, then searches for the file, attempts to open it with a password, fails, and uses a brute force decryption, succeeds and downloads the file.Nobody cared about how unrealistic it was in this case because a) it's Tengen Toppa Gurren Lagann and b) it was hilarious. Tengen Toppa Gurren Lagann has, in Lagann-hen, Lordgenome 's head HAACKIIIING into the Cathedral Terra by having a virtual recreation of his body run down a virtual hallway connecting the ships, then running around virtual corridors to find a box, smashing it open with his head and eating the red sphere inside it.In this case, though, it's because a) they're not using the internet at all, but rather Augmented Reality technology and b) the Augmented Reality subculture in the series is dominated mostly by preteen children, the exact sort of people who would try to make hacking as flashy as possible. In Den-noh Coil, even the least eye-catching examples of hacking look suspiciously like Hermetic Magic and Instant Runes (the more visual ones? They involved rockets).It loses credit for abuse of Extreme Graphical Representation and gains a bit of it back when Yusaku's use of older versions of duel disks and physical cards is an actual hacker technique.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |