No. The movie "Takedown" (http://www.imdb.com/title/tt0159784/,) a fictionalized version of the story of real-life hacker Kevin Mitnick, has been erroneously called "Hackers 2" in bootleg labels and filenames, but the two films are completely unrelated. To further confuse people the film "Antitrust" (http://www.imdb.com/title/tt0218817/) has been sighted in bootlegs labelled "Hackers 3," despite having nothing to do with "Hackers" OR "Takedown." (Who's labelling these things, anyway?)People also get confused because three soundtrack albums were released for "Hackers," and these albums were labelled "Hackers," "Hackers 2," and "Hackers 3." There were no movies called "Hackers 2" or "Hackers 3," just the three volumes of the "Hackers" soundtrack.
No. This rumor usually refers to certain footage from the trailer that was not in the completed film, but alternate takes and other unused material is commonly used in the creation of trailers.
What song is playing during the opening scene? -- "Halcyon + On + On" by OrbitalWhat song is playing during the OTV duel between Crash Override and Acid Burn? -- "Voodoo People" by ProdigyWhat song is playing when Dade first rollerblades to his new high school? -- "Open Up" by LeftfieldWhat song is playing while Dade beats Kate's "Wipeout" score in Cyberdelia? -- "Cowgirl" by UnderworldWhat song is playing when Dade and the gang first arrive at Kate's party? -- "Connected" by Stereo MC'sWhat song is playing when Kate is standing alone on the balcony? -- "Protection" by Massive AttackWhat song is playing while Dade and Kate have their duel to hassle Agent Gill? -- "One Love" by ProdigyWhat song is playing when Kate is dreaming about Dade in red pleather (the "yeah, baby" song?) -- "Original Bedroom Rockers" by Kruder & DorfmeisterWhat song is playing while Dade waits to hand the disk over to The Plague? -- "Diskette," part of the film score by Simon BoswellWhat song is playing when the hackers are trying to figure out what's on the disk? -- "Worm," part of the film score by Guy PrattWhat song is playing when Dade and Kate go dumpster diving? -- "Launch Da Vinci," part of the film score by Simon BoswellWhat song is playing when Dade and Kate first arrive at the club to find Razor and Blade? -- "Inspection (Check One)" by LeftfieldWhat song is the live band playing while Dade and Kate are looking for Razor and Blade, which Dade ends up crowd-surfing to? -- "Good Grief" by Urban Dance SquadWhat song is playing while the hackers are rollerblading to Grand Central Station? -- "Voodoo People" by ProdigyWhat song is playing when the hackers are trying to take down the Gibson (the spinning phone booth scene?) -- "Grand Central Station," part of the film score by Guy PrattWhat song is playing when Dade and Kate go for a swim on the roof (the "I love you, I love you todaaay" song?) -- An unreleased alternate version of "Heaven Knows" by Squeeze. It is not the version found on the film's soundtrack, nor has it appeared on any Squeeze releases. No commercial audio release of this mix of the song is known to exist.What song is playing after "Heaven Knows," during the rest of the end credits? -- "Grand Central Station," part of the film score by Guy Pratt.What's the rock song with female vocals which appears in some versions of the film's trailer? -- "Connection" by Elastica.(As posted and reposted to the message board threads, originally by IMDb user snuggle, and added to and corrected by many others.)
In the 1990s it was fairly common for film soundtrack albums to include songs not in the film, often labeling them as "inspired by" the film instead. This film was no exception, particularly since at the time interest in the techno/electronica scene was just beginning to take hold in the mainstream, and releasing as much of it as they could under the banner of a popular film was easy money for the record labels."Phoebus Apollo" by Carl Cox is the only track on the first "Hackers" soundtrack which does not appear in the film. The other two volumes of the soundtrack have many more "inspired by" tracks than film tracks; nothing on "Hackers 2" apart from "Inspection (Check One)" by Leftfield appeared in the film, nor did anything on "Hackers 3" apart from the two Simon Boswell tracks.
Kate's laptop is an Apple Powerbook Duo 2300c.Dade's laptop is an Apple Powerbook 540c.Cereal's laptop (which Joey uses in the phone booth) is a Compaq LTE 4/75Lord Nikon's laptop is a Toshiba Satellite Pro. (Which model?)Joey's computer "Lucy" is an Apple IIGS. (Yes, really; take a close look when Agent Bob is carrying it out of Joey's house.)The Plague and Hal's computer at Ellingson was an entirely fictional creation of the film's art department.The Plague's home computer and the school computers were generic PC desktops.Dade's "luggable" computer from the OTV scene/Richard Gill harassment scenes is a custom prop. The track ball is from an Apple PowerBook 1xx model computer, so if it is functional it might be made from the internals of a PowerBook 1xx series computer stuffed into a luggable type case.Still unknown:The transparent Apple PowerBook Duo Dade gets from the Plague. Theories include it being a prototype loaned from Apple, or a custom prop.Please note that the displays shown on the computers' screens were generally pre-rendered graphics and animation made by the film's art and FX crew, and not representative of what those computers were typically capable of generating or displaying in reality.
During a scene in the Cyberdella Cereal (Matthew Lillard) brought some books to give to Phreak (Renoly Santiago). Dade (Jonny Lee Miller) identifies each book as Cereal produces them from his bag.1 (Green) International UNIX EnvironmentsThere is not enough information to adequately identify the book but its probably part of the IEEE 1003.1 POSIX (Portable Operating Systems Interface uniX) initially created in 1988. Another possibility could be The X/Open Guide created by a company of the same name (initially published in 1989) which expands on the POSIX. A picture of an early edition of the X/Open Guide can be seen here: http://books.google.com/books?id=u9QmAAAAMAAJ2 (Orange) Computer Security criteria DOD StandardsTrusted Computer System Evaluation CriteriaPart of the Rainbow Series books published by the US DoD in the late 80s early 90s.
Can be seen here: http://en.wikipedia.org/wiki/File:Orange-book-small.PNG3 (Pink) Guide to IBM PC`sThe Peter Norton Programmer's Guide to the IBM PC by Peter Norton.Dade explains that the book is named after the author wearing a pink shirt on the pink cover of the book. A picture of the book can be seen here: http://en.wikipedia.org/wiki/File:Norton_Guide_to_PC_VGA.jpg4 Devil book Unix BibleThe Design and Implementation of the 4.3BSD Unix Operating System by Samuel J. Leffler, Marshall Kirk McKusick, Michael J. Karels and John S. Quarterman.Known as the Devil book because of the small devil seen on the cover of the original edition published in 1989.5 Dragon Book Compiler DesignCompilers: Principles, Techniques, and Tools by Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. UllmanSimply named Dragon Book by early computer programmers because of the Dragon depicted on the cover of the earliest edition of the book.6 (Red) NSA Trusted Networks a.k.a ugly red bookTrusted Network Interpretation of the Trusted Computer System Evaluation CriteriaPart of the Rainbow Series books published by the US DoD in the late 80s early 90s. Earliest Edition was made in 1987 and featured a red cover.
| Site Index
| In Theaters
| Coming Soon
| Top Movies
| Top 250
| Message Boards
| Press Room
| Contact Us
| Box Office Mojo
| Mobile site
| Windows Phone 7
| IMDb Social:
Copyright © 1990-2013