The Official Hollywood Guide to Hacking.
Hackers use GUIs.
Its not just enough that hackers have read tens of thousands of lines of text in their lifetimes, they hate text, or at least hate to code without fancy 3d models. Hackers must have a GUI progress indicator so they know when they are done hacking, cracking, copying, decrypting, or etc.
Macintosh OS tends to be the favorite of most Internet hackers, despite a complete lack of hacking tools available for the OS. It doesn't really matter anyway though, because most hackers use the hidden parts of the OS when they hack. The best hackers can make message boxes appear on other computer user's machines.
Text must scroll. Text must appear technical.
If text must be shown, it has to be shown quickly, scrolling down the screen in such a fashion that only a hacker would be able to read it.
The more technical the text appears, the better the hacker that can read it. Terms like "dev", "root" and "null" appear on geek/hacking sites, so these are the words that must appear on the screens of hackers, in addition to bikini babe screensavers.
Hackers are never script kiddies.
A hacker always knows exactly what they are doing when they do it. They never use code written by anyone else since they always know what to do to get past a particular logon. They always use cryptic commands and never run one script to access those commands.
More importantly, hackers never hack because of a superiority complex. (exception: Goldeneye) Usually they are coerced into cracking an encryption scheme in order to save their life or the life of someone they love. Hackers fight for a cause that the general public sympathizes with.
Hackers can type 300 wpm with 99.9% accuracy.
Elite hackers have the ability to type furiously, rarely needing to hit the "enter" or "backspace" keys. They never make spelling errors, or at least use an operating system that spellchecks as they type, so they don't have to worry about it.
On rare occasions, hackers have been known to type so quickly that they cause the GUI interface to respond in such a way that a "normal" computer user would have to use the mouse to mimic. Because of this, only newbie hackers have to use a mouse.
Hackers have love life problems.
No matter how good of a hacker, they always have problems with finding a soulmate. Some have been married, but -all- hackers are single. Some may have children, but -none- currently have custody of those children.
All hackers are under the age of 50, most are under the age of 30. Hackers are always older than their love interest.
Hacker terminology is not defined.
Viruses are items that only old-school hackers use. The new terms are "retrovirus", "trojan horse", and "logic bomb". All hacking terms are interchangeable with each other, so even if a hacker means "keystroke recorder" he can use "logic bomb" and not get flamed for being an incompetent.
New hacking terms are made up daily, so creating cool names for worms like "hydra" are perfectly acceptable and will serve to impress the technical folks that think they already know a lot. (Remember, we're Hollywood, if we want it that way, then that is the way it is.)
Hackers dance and sing when they accomplish something.
Rare cases of this have been spotted amongst the hacking community after a clean compile or a successful breach into unknown territory. Raising of the hands above the head tends to mark a significant achievement.
Hackers also may sing a little phrase of a song or mutter something witty at that point. This is not to be confused with the regular conversations they hold with their computers, however.