And don't forget these important rules:
A. All copying is finished in an instant, except where the copied file is needed immediately.
Corollary: If under an extremely stressful situation, the copying of the file will always be finished at the last possible moment.
B. CD media can hold an infinate amount of data.
C. All computers, no matter their operating system or speed, will operate exactly the same.
Corollary: As such, a character of the show/movie will be able to operate all computers fluently.
D. Computers that look like crap often use fancy GUI menus. Computers that look like CRAYs or are just major graphical design wonders will use simplistic hacker-style command boxes and archaic commands.
E. All computers have a system of "auto-aiming", thus, when a user misclicks, the correct window is opened anyway.
F. All websites load top to bottom, not in parts.
G. Universal rule: If its a stressful situation, all commands will have a progress bar, and all goals will finish only seconds before deadline.
H. An open computer terminal will never have opened windows, and the user will be able to find exactly what he is looking for in 3 clicks or less.
I. Modems never get busy signals.
J. Search engines will always find exactly what the user wants in the first result.
K. Searching takes seconds, unless it's not important, then it'll never complete.
L. Computers have a bootup time of approximately 5 seconds or less.
M. Computer hard drives have the approximate read time of 0.01ms, and can read an infinate amount of data a second.
Exception: If the data needs to be processed by a program, like a website, it will load top to bottom, and will take abnormally long to complete.
N. Hacking is possible even when not connected to any network
O. When hacking another computer, that computer will always respond, even if it must turn itself on to do so.
Corollary: If the PC must turn itself on, the monitor will also turn itself on, and display everything the hacker is doing.
P. Encrypted files can always be cracked within the alloted time.
Q. Speakers are not required for a PC to speak, play, or make noise.
R. Once started, a command cannot be stopped.
Corollary: If a program does happen to have a cancel button, it will either malfunction, take an eternity to cancel (see also: Rule G), or a hacker will disable the functionality of it.
S. Printers are never out of ink or paper.
T. Incredibly important secure data will be accessible from any open terminal in the building.
U. There is no such thing as a private "intranet". All hacking can be done from outside a building.
Corollary: Hacking will always be done from a dark room, except where infiltrating a building would provide more action or suspense.
V. All media including hard drives have infinate storage space, except where running out of free space would add drama or suspense to the situation.
Corollary: If a media will run out of free space, it will always do so at 99% complete, and there will never be a prompt that there is not enough free space before copying.
W. Interesting wallpapers do not exist.
X. Burning a CD or DVD can be done without any software at all, often with just a quick keyboard shortcut.
Y. Turning off a monitor is the equivalent of powering off the PC. In addition, none of the programs running at the time will be there when the computer is next used.
Z. Hackers always know the username, but not the password.
.hack//SIGN - The World - Just Believe
(Yes, This is Cool Matty)