doit kill all files
-
sq1972 — 14 years ago(June 22, 2011 12:30 PM)
Holy crapmy hats off to you for going to such lengths to get to the bottom of that. At any rate, given that Meredith was with the company for all of a few weeks and appeared to lateral over as an exec with little background in the technology, I doubt she had the hacking chops to put together or know of a "doit" macro.
-
Josef_Schweik — 15 years ago(January 12, 2011 09:42 PM)
That's called "technobabble for your average IT-illiterate movie-watcher"
The Unix (Irix) command would have been something like:
rm -r myfiles
or
find / -name *myfiles -exec rm {} ;
How many people watching the movie would get what she is actually doing?
-
eastcoastguyz — 14 years ago(November 05, 2011 03:54 AM)
"How many people watching the movie would get what she is actually doing?
"
You are right, a Linux command like:
rm -rf *
Would have went over most people's heads. This was a fantasy operating system along with perfect voice speech recognition when Tom is talking to the computer angel.
What was very strange is why Tom had to go to the hotel to delete files back at the office, while she was able to do this from her desk at work. Just as strange is off-site access for a VR demo allowed access to files back at the office. -
Disclosuredude — 14 years ago(December 12, 2011 11:39 PM)
Tom rights as a "sysop level 5" (system administrator) had been completely revoked, because Digicom didn't want him to have access to any files or info he might find about the changes to the Malaysian plant or Meredith's involvement in it. At sysop level 0, Tom was basically "locked-out" of the company's computer network.
but like you said, it is VERY strange (and highly unrealistic) that a company would have a computer system or terminal anywhere allowing "unrestricted access" to their corporate file system, including their "financials", and in the hands of the company that is going to buy them out. Any "negative" info discovered by Connely-White would have been enough of a hazard to kill the merger. Don Cherry was talented enough to develop VR, but stupid enough NOT to put standard password protection on all or parts of Digicom's corporate database as well as every computer on their network? I don't buy it. Fatal flaw? Maybe so, but then, you wouldn't have a "storyline" and a way for Tom to "beat the system".
Watch your back, trust no one, stay one step ahead, always have a backup! -
oocpaka — 10 years ago(April 10, 2015 04:58 AM)
I use computers and there is nothing wrong with that
Maybe that was the name of her script or a batch file, we don't know. This is a made up syntax for the movie, there are tons of weird/funny real commands out there. Just check out programming language called brainf____ -
Dr Ali Tomar — 1 year ago(November 12, 2024 05:35 AM)
In the early 90s, I programmed in Xenix and later IBM's AIX, and I understood everything OK, hana
Buna, I belief this is not possible. AIX is the operate system and maybe u were programmed in Informix 4GL.
When I set up my first sugary in New Dacca, I didnt want my peoples to have PC to shopping and surfed the internet or watch porn so I put IBM AIX and workstation. Also I develop patient records and other data base system
these days i am spend less then 80,000 INR for everythings, hana -
Tunko Abdul Raju — 4 weeks ago(March 03, 2026 04:21 PM)
When I set up my first sugary in New Dacca, I didnt want my peoples to have PC to shopping and surfed the internet or watch porn so I put IBM AIX and workstation. Also I develop patient records and other data base system
Buna, honesty I belief u can fine internet porn on the IBM workstation, hana