Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

Film Glance Forum

  1. Home
  2. The Cinema
  3. doit kill all files

doit kill all files

Scheduled Pinned Locked Moved The Cinema
22 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F Offline
    F Offline
    fgadmin
    wrote last edited by
    #2

    schoollydee11 — 17 years ago(December 30, 2008 10:37 AM)

    yes indeed. that was horrible.
    ******* So if your computer is executing some operation slower than you would like, all you have to do it send the "doit" command to whip it into shape.********
    "c'mon cpu, let's look alive heredo it, kill ALL filesNOW, dammit!!!"
    lol

    1 Reply Last reply
    0
    • F Offline
      F Offline
      fgadmin
      wrote last edited by
      #3

      electrictroy — 15 years ago(July 31, 2010 06:05 PM)

      Well Linux has the "sudo" command.
      That's basically the equivalent of the movie's "doit" command since "sudo kill -all" (if that command existed) would ignore all protections and erase all files. That's something a standard "kill -all" would not perform.

      1 Reply Last reply
      0
      • F Offline
        F Offline
        fgadmin
        wrote last edited by
        #4

        Heidi_Smiles — 17 years ago(January 02, 2009 03:02 PM)

        If you notice, there was actually a "Warning" line on the computer something like the standard "your files will not be recovered," etc. To which she responded "doit." It sort of made sense. But yeah, it would never be used as an actual command line.

        1 Reply Last reply
        0
        • F Offline
          F Offline
          fgadmin
          wrote last edited by
          #5

          IMDb User

          This message has been deleted.

          1 Reply Last reply
          0
          • F Offline
            F Offline
            fgadmin
            wrote last edited by
            #6

            IMDb User

            This message has been deleted.

            1 Reply Last reply
            0
            • F Offline
              F Offline
              fgadmin
              wrote last edited by
              #7

              tvce — 17 years ago(March 29, 2009 03:06 AM)

              How many times have you wished for a "Do It Anyway" button when the software says it cannot execute some command, for whatever reason? The developer that perfects that feature will be wealthier than Bill Gates!

              1 Reply Last reply
              0
              • F Offline
                F Offline
                fgadmin
                wrote last edited by
                #8

                Disclosuredude — 15 years ago(February 05, 2011 01:01 PM)

                OK, we know that "do it" is not a UNIX/IRIX command, so Electrictroy's reply is the most logical (the "sudo" command)! However, there is another explanation for "do it" or "doit". What Meredith typed could have also been a "macros" or "name" within a command, or even a command under the old RTL/2 language. I had to investigate this, because most of the technology displayed in the movie stayed true to reality, even the command-lines shown on the screen up to this point.
                Keep in mind when Meredith was deleting files, she deleted the document files first, then the e-mails, then the DVL (digital-video-link) files. It was while deleting the DVL files that the "WARNING, CANNOT BE UNDONE" appeared on the screen, followed by Meredith typing "do it" on the command line. It is possible that the DVL files resided on a different computer system other than the normal file server, or that typing "perm." was a way of requesting a permanent deletion which may have also deleted any backup files the system may have created/saved. Either way, it resulted in displaying a warning message and requiring a confirmation. "do it" could have been a proprietary command-line macros or name defined by DigiCom programmers to be used (by users) as a confirmation to the warning.
                I asked a good friend of mine who is a longtime professional UNIX programmer about it. His reply:
                "It's possible.. SGI (computers used in the movie) was Sys-V, so it would have been in /etc, if it was anywhere (binaries lived in /etc/ that modified the state of the machine)
                I don't remember it, because /etc/ would have never been in my path, rather /usr/ucb, which would have made it more BSD-like..
                That being said, it's Unix.. I can write a command like so:
                #!/bin/bash
                return echo 'y'|rm -rf /home/someonesdirectory/secretfiles
                and then name that "doit", which would do the same thing.."
                In researching the web, I also found that "DoIT" is also the name for an older client/server "remote-execution" daemon, allowing users to send command-line instructions to a Unix based computer/server from another Unix or Windows computer (such as from Meridith's office computer to the Digicom servers).
                That's my best realistic guess! My fantasy guess is that "do it" was a special "secret" DOS command invented by Microsoft programmers, specially invented to allow them to run "Windows" faster than all the rest of us!
                Watch your back, trust no one, stay one step ahead, always have a backup!

                1 Reply Last reply
                0
                • F Offline
                  F Offline
                  fgadmin
                  wrote last edited by
                  #9

                  sq1972 — 14 years ago(June 22, 2011 12:30 PM)

                  Holy crapmy hats off to you for going to such lengths to get to the bottom of that. At any rate, given that Meredith was with the company for all of a few weeks and appeared to lateral over as an exec with little background in the technology, I doubt she had the hacking chops to put together or know of a "doit" macro.

                  1 Reply Last reply
                  0
                  • F Offline
                    F Offline
                    fgadmin
                    wrote last edited by
                    #10

                    Josef_Schweik — 15 years ago(January 12, 2011 09:42 PM)

                    That's called "technobabble for your average IT-illiterate movie-watcher" 🙂 The Unix (Irix) command would have been something like:
                    rm -r myfiles
                    or
                    find / -name *myfiles -exec rm {} ;
                    How many people watching the movie would get what she is actually doing? 🙂

                    1 Reply Last reply
                    0
                    • F Offline
                      F Offline
                      fgadmin
                      wrote last edited by
                      #11

                      IMDb User

                      This message has been deleted.

                      1 Reply Last reply
                      0
                      • F Offline
                        F Offline
                        fgadmin
                        wrote last edited by
                        #12

                        eastcoastguyz — 14 years ago(November 05, 2011 03:54 AM)

                        "How many people watching the movie would get what she is actually doing? 🙂 "
                        You are right, a Linux command like:
                        rm -rf *
                        Would have went over most people's heads. This was a fantasy operating system along with perfect voice speech recognition when Tom is talking to the computer angel.
                        What was very strange is why Tom had to go to the hotel to delete files back at the office, while she was able to do this from her desk at work. Just as strange is off-site access for a VR demo allowed access to files back at the office.

                        1 Reply Last reply
                        0
                        • F Offline
                          F Offline
                          fgadmin
                          wrote last edited by
                          #13

                          Disclosuredude — 14 years ago(December 12, 2011 11:39 PM)

                          Tom rights as a "sysop level 5" (system administrator) had been completely revoked, because Digicom didn't want him to have access to any files or info he might find about the changes to the Malaysian plant or Meredith's involvement in it. At sysop level 0, Tom was basically "locked-out" of the company's computer network.
                          but like you said, it is VERY strange (and highly unrealistic) that a company would have a computer system or terminal anywhere allowing "unrestricted access" to their corporate file system, including their "financials", and in the hands of the company that is going to buy them out. Any "negative" info discovered by Connely-White would have been enough of a hazard to kill the merger. Don Cherry was talented enough to develop VR, but stupid enough NOT to put standard password protection on all or parts of Digicom's corporate database as well as every computer on their network? I don't buy it. Fatal flaw? Maybe so, but then, you wouldn't have a "storyline" and a way for Tom to "beat the system".
                          Watch your back, trust no one, stay one step ahead, always have a backup!

                          1 Reply Last reply
                          0
                          • F Offline
                            F Offline
                            fgadmin
                            wrote last edited by
                            #14

                            oocpaka — 10 years ago(April 10, 2015 04:58 AM)

                            I use computers and there is nothing wrong with that
                            Maybe that was the name of her script or a batch file, we don't know. This is a made up syntax for the movie, there are tons of weird/funny real commands out there. Just check out programming language called brainf____

                            1 Reply Last reply
                            0
                            • F Offline
                              F Offline
                              fgadmin
                              wrote last edited by
                              #15

                              Novtej_Dil — 9 years ago(August 12, 2016 11:49 PM)

                              In the early 90s, I programmed in Xenix and later IBM's AIX, and I understood everything OK, hana

                              1 Reply Last reply
                              0
                              • F Offline
                                F Offline
                                fgadmin
                                wrote last edited by
                                #16

                                Uncle Mulan — 6 years ago(January 20, 2020 07:42 PM)

                                I understood this also, buna

                                1 Reply Last reply
                                0
                                • F Offline
                                  F Offline
                                  fgadmin
                                  wrote last edited by
                                  #17

                                  Dr Ali Tomar — 1 year ago(November 12, 2024 05:35 AM)

                                  In the early 90s, I programmed in Xenix and later IBM's AIX, and I understood everything OK, hana
                                  Buna, I belief this is not possible. AIX is the operate system and maybe u were programmed in Informix 4GL.
                                  When I set up my first sugary in New Dacca, I didnt want my peoples to have PC to shopping and surfed the internet or watch porn so I put IBM AIX and workstation. Also I develop patient records and other data base system
                                  these days i am spend less then 80,000 INR for everythings, hana

                                  1 Reply Last reply
                                  0
                                  • F Offline
                                    F Offline
                                    fgadmin
                                    wrote last edited by
                                    #18

                                    Premmie — 1 year ago(November 12, 2024 05:39 AM)

                                    When I set up my first sugary in New Dacca
                                    Faker doctor

                                    1 Reply Last reply
                                    0
                                    • F Offline
                                      F Offline
                                      fgadmin
                                      wrote last edited by
                                      #19

                                      Tunko Abdul Raju — 4 weeks ago(March 03, 2026 04:21 PM)

                                      When I set up my first sugary in New Dacca, I didnt want my peoples to have PC to shopping and surfed the internet or watch porn so I put IBM AIX and workstation. Also I develop patient records and other data base system
                                      Buna, honesty I belief u can fine internet porn on the IBM workstation, hana

                                      1 Reply Last reply
                                      0
                                      • F Offline
                                        F Offline
                                        fgadmin
                                        wrote last edited by
                                        #20

                                        Dr Ali Tomar — 4 weeks ago(March 03, 2026 04:24 PM)

                                        Buna, u cannot do this on the console and if u try on workstation / slave terminals u need root password, access to a router on the LAN and window hemulation software, hana

                                        1 Reply Last reply
                                        0
                                        • F Offline
                                          F Offline
                                          fgadmin
                                          wrote last edited by
                                          #21

                                          Tunko Abdul Raju — 4 weeks ago(March 03, 2026 04:26 PM)

                                          Token rings, buna?

                                          1 Reply Last reply
                                          0

                                          • Login

                                          • Don't have an account? Register

                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • Users
                                          • Groups