I'm most often bugged by hacking-as-trope in movies and on TV (hey, script writers are authors, too). In the 2001- 2006 spy series Alias and the current caper series Leverage the good guys break into any system all but instantly. Once there, they never have any problem finding whatever information they want. I'm sure you can think of other examples.
Unless your opponents are really, really careless, breaking into a secured system or network takes time. Once you break in, the files may be encrypted. (I'll give 24 credit here -- the files Jack Bauer obtains sometimes are encrypted, and CTU struggles, for a little while, anyway, to decrypt things.) On most real-world computers, finding the data you want -- amid the obsolete versions and the gigabytes of uninteresting stuff -- also takes time. And the file you want isn't conveniently named "Evil Overlord's plan to ..."
In the real world, the stuff worth protecting is ... protected. There are firewalls. Security gateways. Authentication checks. Operating systems and applications are patched from time to time. Security software keeps users from setting easy-to-guess passwords. Virus software is kept reasonably up to date. Intrusion detection software runs regularly, and it will notice unauthorized accesses and changes.
What else? Some hackers post vulnerabilities online to force vendors to plug the security holes. Open-source software communities steadily improve their offerings -- and hence Firefox is a more secure and reliable browser than Internet Exploder (and FF is quickly repaired when a problem is found).
Back to the recent Google hack. Breaking into selected Google systems took persistent effort (with, apparently, a hacker school involved). Tthe attack was detected. And Google is only a semi-evil overlord.
When hacking becomes integral to a storyline, and the hacking is effortless and near-instant, then the author is:
- woefully ignorant.
- choosing to ignore real-world tech.
- relying on the people running the targeted computer system being absurdly lazy or careless.
Has my fiction ever used hacking. Sure. When I do, I like to think I do so realistically -- typically not as a trope.
Hacking-not-as-trope takes time. It takes effort. It takes research about the specific situation. It reflects what's happening in the story; it's not a quick fix to move the story along.
In one minor aspect of Small Miracles, one set of characters want to spy on another set. Rather than "Bad Guys hack Good Guys" -- end of explanation -- the bad guys recruit a deputy system administrator, and she is in the position to declare a router patch buggy. Only after the security patch has been backed out is she able to distribute keylogging software undetected to monitor the good guys.
Okay, that's a long enough rant for one day.