A firewall is also known as a layer 4 device. A hacker could also create a time-bomb virus to open a back door into a company's database. There are also kiddie scripts - Kiddie script hackers are less skilled and rely on the scripts that the pros write or abuse legitimate programs that are meant to provide useful troubleshooting (e.g. WireShark) - Hackers, for example, can write their own programs and scripts to break into systems (e.g. creating a virus that can exploit an opening in a system's code to create a buffer overflow). However, despite all of the knowledge that I had to gain and terms to memorize to become Security+ certified, (As well as a Network+, RHCSA and a BAAS in Information Technology), I still learned something new from SciShow. Thanks Hank, Goto
Nice explanation, but I have couple clarifications: 1) Probing "ports" and keeping them closed is oversimplifying things a bit. Keeping ports closed doesn't require any real effort from the defender - it's just a setting in the router. And having a port open only means that there could be some software (web service, admin controls, etc.) listening for connections directed to that port. To mount an attack the attacker must know or find a vulnerability in that software to exploit. A port is more like an extension of the IP address, it doesn't represent anything concrete. 2) Saying "sending code" is technically correct, but it gives the wrong idea that sending is the hard part. You can send any piece of code you want via google search box. Getting *your* code *executed* on the target machine is what an attack is about.
If people can keep up with the information being given here; this was one of the better summaries of how hacking and counter-hacking works. Great job as always SciShow!
Good afternoon! My name is Robert Hackerman, and I'm the county password inspector! I just need a few minutes of your time to make sure your passwords are strong enough to pass state security standards and protocols.
You forgot the most popular and effective attack: Typing in a username, then trying "123456","password" ot "12345678" as the password. This sounds like a joke, but it is startlingly effective at getting into an account. Also, literally the oldest trick in the book, calling up tech support and trying to convince the person to give you access.
Social engineering... Usually the weakest link in a chain are the persons using the system, you don't need a PC to get access to important information, it's surprisingly easy how much you can get asking the rigth questions. And usually this area is overlook just like in this video...
Bravo! I was scrolling through the comments specifically looking to see if anyone else besides me caught that. I can just imagine Kevin Mitnick sitting back, giggling to himself, "after all this time, people still don't have a clue how it's really done."
+Josuel Servin Depends on the target. Most individuals in private and corporate administration in companies: agree. Corporate data centers of major companies: not that easy Military or Intelligence high security areas: forget it. So effectiveness of SE simply boils down to the average user security awareness at the target, thus how much and how good you trained your staff/users and made them aware of potential attacks and methods. the more /better and the less successful SE will be.
Social engineering I would consider a technique one could use for the recon part of the hack. You're right in that its very difficult to fight against since it revolves around the "human factor".
*Black hats*: People that enjoy exposing other bad guys. *White Hats*:Goodie two shoes looking to make a buck legally. *Grey Hats*: Those few with strict morals. *Brown Hats*: Regular average folk that enjoy working with their hands, I.E breaking and reassembling things. No shit, these guys are your go to sellsmen for devices. from jailbroken phones to cellular jamming devices. Brown Hats can be found on 4chan if you dare. They primarily supply all sorts of hackers for money or favours.
Do not allow this guy to make fools out of you, this is clearly fake. Contact @Freakyhacks on Instagram or +1(408)469-4926 on whatsapp for all your hacking jobs, he's fast, reliable, effective and charges way less
As far as I know, it's considered hacking if you: 1) don't own the system 2)don't have permission from the system's owner and 3)don't have a warrant to access the system without permission from the owner.
I don't post my credit card numbers online, nor my bank card numbers. I put nothing on the internet that could be found. That's the safest route to go.
I love the tech videos. Keep making them! I also wanted to give a suggestion; could you summarize the main points at the end of longer videos? It would make it easier to learn and remember :)
Gray hats are usually kids and adults with time on their hands that want to practice on small small time home and school networks. Maybe upgrade to an administrator wifi in a library or something. Once they find themselves in there they might poke around just to see what they can find, like financial information. However, they will never do anything with that information other than feel good about themselves that they got in, in other words they do it for the lolz..... I say this because I am guilty, LOL. White hats are usually paid heavily and are professional pen testers. Black hats are your legitimate big scale bad guys. We are talking about the guys that hacked Sony, Home Depot, etc.
Theres actually a lot of contention in the industry on exactly what defines a 'black hat' or a 'grey hat' etc. One interpretation I and number of others prefer is in terms of permission. So black hats gain unauthorized access, white hats gain authorized access, and grey hats aren't given permission nor are they getting unauthorized access. So a grey hat might be the guy reversing some dll for compatibility reasons, cracking that new game to pirate to his friends, or developing an exploit for a piece of software without permission(but not using that exploit to gain access to systems). This helps cover cases where an individual might fit the bill for different hats for different situation. Such as the white hat being paid by day to find and fix networks but moonlighting as a carder to make some extra cash as a blackhat.
It's still super illegal though. Even if you don't do anything malicious and tell the company you could still be sued for breaking into their system without permission.
This was just put into my recommended for some reason and i can tell u when it comes to it your either getting hacked or ur not, if u have the knowledge u can slow a hack down but once its happening thats it set in stone and u aint stopping it... dont waste ur time watching this
Tuchulu They usually require control of a botnet though, which requires an individual to basically hack many computers. Whether or not ddos attacks are "hacks" is a matter or semantics, but they still pose issues similar to other cybersecurity issues. In a way you "trick" the target computer because it has no way of verifying if the connection is a legitamate user.
Hacking is way more convuluted than I think most people realize. I have been reading a book on web application hacking and even with a good understanding of web application technologies there is a lot of info to process. Theres acess control exploits, script injection exploits, command injection exploits, database injection exploits, brute force credential cracking, authentication and session management flaws, and many more topics in web application hacking alone.
Well, this only explaining the surface of hacking, but it's explaining it pretty good. I would have loved to see some of the core principles of hacking, for example dissasembly of code and the abuse of Bufferoverflows. Although these should not exist anymore in current Languages, in the end those are the really interesting and "basic" procedures when it comes to hacking. For everyone who thinks he could hack anything: You need to know how to program something before you can hack it. Otherwise you're nothing more then a so called "script kiddie" and you actually can't do anything to be honest. Oh, also, I would have loved to see the usual laughing about DDoS attacks, as those are the usual reason why websites are down, are often compared to hacking, but are actually completely different as they are easier. Well done video anyway :)
As a programmer I have to say you did a great job explaining it all, better and more in depth than I expected. Thanks! However, at the end you implied that it is only the white hats that protect sites. The programmers that write the original code are the first line of defense as we have to make sure they don't write systems in a way that can be hacked. But going too far into that would probably been out of scope of the video XD
So you want them to teach you everything about secure programming in an eight-minute video? They explained everything they could without going into complete tech jargon. Or did you miss the part about how stopping hackers requires hacking skills, which was kind of the main point of the video?
Samir it basically all "how to stop them" his point was you try to fo EXACTLY what someone who would do it maliciously would do, record the holes you found and change/update whatever you used to get access.
Who said anything about secure programming? Most security issues occur from misconfiguration anyway. All they mentioned was "pentesting", and there's a LOT more that you can mention in an 8 minute video. Don't play dumb.
Your best defense is usually just common sense. Keeping everything updated and not running shit from dodgy websites and e-mails will go a long way. Firewalls are useful if set on training/custom rules mode so you explicitly allow/block requests on a per-application basis. Anti-virus software is for all practical purposes useless, don't bother. Obviously way simplified, but that's it in a nutshell.
i think someone have hacked into my windows, is that even possible, and should i be worryed about other devises connected to the wifi??? need answer asap
I can’t wait til I get my skills down in Cybersecurity! Tryna become a pen tester and analyst + w/ some programming skills in software development/engineering.
+Adam Stone, "Who the eff is Hank?" is an inside joke from Hank's other RUclips channel, vlogbrothers. The challenge is to reply to the question with a silly definition. For example, Hank is a reptile endemic to New Zealand whose predators include the Polynesian Rat.
+Ganaram Inukshuk *Hank* is a sugar-based confection that, in its modern form, typically consists of sugar, water and gelatin which is whipped to a spongy consistency, molded into small cylindrical pieces, and coated with corn starch. Some *Hank* recipes call for eggs.
"Hacking" is simply using technology in an unconventional way. Steve Wozniak was a hacker. What black hats and cyber criminals do is not called "hacking", it's called Cracking.
There are also efforts to build systems that are completely immune to entire classes of attacks. Some are a long way off, but there are already demonstrations of systems that, for example, provably have no buffer overflow vulnerabilities. No system is unhackable, but we may get to the point where hackers would have to /invent new ways/ of attacking in order to make any progress.
I love watching videos like these, and seeing how they explain what we do to common people. XD It's so funny... "Its like defense against the dark arts" hahahahaaaaa
*HELP* Does it count as hacking if I was watching a youtube video and it suddenly pauses without me doing anything? Or google suddenly openning by itself without me doing anything? Please if you know anything please tell me.
Indeed hackers from China and Russia keep trying to get into my computer but it kicks them out it kicked them out a bunch of times but they don't learn edit:ps it kicked them out cause my computer is protected
Consider one fact: with BitSpray network, hackers can break in but find nothing but white noise. This video is looking at hacking from the perspective of a rearview mirror.
white hat in training here. Hope to one day be able to stop some evil hacker. would be an awesome feeling. Until then, I guess I am coding applications and checking email firewalls vigilantly :)
This is one of the best How to Hack videos. I'm a Cyber Security Major and this is pretty much what I've learned so far, but very simplified.
I was told to stop serious hacking by Norton is to find someone that is as bad on the good side to stop this person. Is that you ale vera
@@lizsager9577 i guess not Liz Sager
How to stop a hacker? Easy
You: Hacker no hacking! Hacker no hacking!
Hacker! Aw man!
Hassan DM ha I get it nice joke
Hassan DM Hacker Hacker Hacker the Explorer
Would work if you are Dora the Explorer
Lol
You're a idiot I was actually asking for help not a idiot with slow witted joking if that's you think your doing... Grow up....
Everything can be hacked. And everyone.
apagando las luces
Sombra Online.
True, I got my toaster hacked. Can't make toast anymore :(
Shrek The V did you try putting a toaster in your toaster?
Visiondragon I did, but then the other toaster got hacked. But don't worry, I just throw my bread into a fire. Tastes kinda same.
Actually a super accurate in depth description of hacking.
Why do people still depict hackers like a guy in a black hoodie and gloves like a person breaking into a window
Caithlin yeah pretty weird, usually it an overweight individual with Cheeto stained fingers and mountain dew on their breath.
it symbolises their morality
it's a more romantic image than some russian in a tracksuit.
because you can't hack unless you're comfy
Elias Perez you get it
Been a victim of this type of network infringment
repeatedly truth
constant infringement
How do I stop a hacking attack? Cough syrup.
Master Therion 3 minutes, still underrated.
Master Therion tru
Master Therion hack*
I tried to get into computers, but I just couldn't hack it. I didn't have the drive. now i'm being monitored. and various other puns.
XD
A firewall is also known as a layer 4 device.
A hacker could also create a time-bomb virus to open a back door into a company's database.
There are also kiddie scripts
- Kiddie script hackers are less skilled and rely on the scripts that the pros write or abuse legitimate programs that are meant to provide useful troubleshooting (e.g. WireShark)
- Hackers, for example, can write their own programs and scripts to break into systems (e.g. creating a virus that can exploit an opening in a system's code to create a buffer overflow).
However, despite all of the knowledge that I had to gain and terms to memorize to become Security+ certified, (As well as a Network+, RHCSA and a BAAS in Information Technology), I still learned something new from SciShow.
Thanks Hank,
Goto
Nice explanation, but I have couple clarifications:
1) Probing "ports" and keeping them closed is oversimplifying things a bit. Keeping ports closed doesn't require any real effort from the defender - it's just a setting in the router. And having a port open only means that there could be some software (web service, admin controls, etc.) listening for connections directed to that port. To mount an attack the attacker must know or find a vulnerability in that software to exploit. A port is more like an extension of the IP address, it doesn't represent anything concrete.
2) Saying "sending code" is technically correct, but it gives the wrong idea that sending is the hard part. You can send any piece of code you want via google search box. Getting *your* code *executed* on the target machine is what an attack is about.
Bro r u a hacker...
If people can keep up with the information being given here; this was one of the better summaries of how hacking and counter-hacking works. Great job as always SciShow!
What the hack did I just watch?
+
++
Something you're clearly too dumb to understand
My joke
Your head
Fair
I have avenger endgame spoilers on my computer so no hackers try to hack me
Genius!!!
At this rate, you might as well make a TechShow
Silhouhat heck yeah, that'd be awesome
Peter McQuill hack* sorry
Timo Sluis we've got ourselves a pun master :D
Hank recently mentioned that "crash course computer science" is currently being filmed
gnomer cutler oh shit! that's amazing! thanks for letting me know, definitely going to be on the lookout for that.
I depict a hacker as a guy wearing a troll mask, in a black hoodie, and have fast typing.
Good afternoon! My name is Robert Hackerman, and I'm the county password inspector! I just need a few minutes of your time to make sure your passwords are strong enough to pass state security standards and protocols.
Koopsy I'm not sure if my password is secure...
It's: starrynight554yaht888
That's one of the best passwords I've ever seen! Don't change a thing!
Koopsy mine is GayBoi69
Dude don't ask for passwords
Koopsy ool
You forgot the most popular and effective attack:
Typing in a username, then trying "123456","password" ot "12345678" as the password.
This sounds like a joke, but it is startlingly effective at getting into an account.
Also, literally the oldest trick in the book, calling up tech support and trying to convince the person to give you access.
Social engineering... Usually the weakest link in a chain are the persons using the system, you don't need a PC to get access to important information, it's surprisingly easy how much you can get asking the rigth questions. And usually this area is overlook just like in this video...
Bravo! I was scrolling through the comments specifically looking to see if anyone else besides me caught that.
I can just imagine Kevin Mitnick sitting back, giggling to himself, "after all this time, people still don't have a clue how it's really done."
To be fair, Mitnick also knew a whole lot of technical shit
+Josuel Servin
Depends on the target.
Most individuals in private and corporate administration in companies: agree.
Corporate data centers of major companies: not that easy
Military or Intelligence high security areas: forget it.
So effectiveness of SE simply boils down to the average user security awareness at the target, thus how much and how good you trained your staff/users and made them aware of potential attacks and methods. the more /better and the less successful SE will be.
Social engineering I would consider a technique one could use for the recon part of the hack. You're right in that its very difficult to fight against since it revolves around the "human factor".
Josuel Servin Buy a used computer. It's unbelievable what people leave on it. If you are lucky you might get some Bank Account Informationen
The world is a better place with you.
*Black hats*: People that enjoy exposing other bad guys. *White Hats*:Goodie two shoes looking to make a buck legally. *Grey Hats*: Those few with strict morals. *Brown Hats*: Regular average folk that enjoy working with their hands, I.E breaking and reassembling things. No shit, these guys are your go to sellsmen for devices. from jailbroken phones to cellular jamming devices. Brown Hats can be found on 4chan if you dare. They primarily supply all sorts of hackers for money or favours.
Rollerz leader "If you dare" What are you, 14? Do people really still think 4chan is this forbidden dark gathering place?
I went on 4chan and was arrested by the FBI. Never go there unless you are a 1337 hax0r
I have been hacked.... and of course have no idea how to stop it
Do not allow this guy to make fools out of you, this is clearly fake. Contact @Freakyhacks on Instagram or +1(408)469-4926 on whatsapp for all your hacking jobs, he's fast, reliable, effective and charges way less
Is it Hacking if the Security is flawed?
Is it Hacking when the NSA/FBI/CIA does it???
Anamnesia Hacking is hacking, it doesn't matter who does it.
As far as I know, it's considered hacking if you:
1) don't own the system
2)don't have permission from the system's owner
and
3)don't have a warrant to access the system without permission from the owner.
if the security wasn't flawed, it couldn't be hacked.
+schadenfreudebuddha There's a great video called, "Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker"
Anamnesia it's only hacking when Russia does it.
I got a tricky one for you, how do you detect hacking that goes on below the operating system and attacks the hardware itself?
The whole time I was hoping he would reference Mr. Robot.
Samantha Lopez #ImmaculateDishes
Kaileidoscope ?
Also, Hank Green for president!
How do I hack my school's wifi so I can watch restricted SciShow videos and the full Hamilton soundtrack at lunch?
Use a VPN or proxy.
either of these will work^^^^
Not if the school proxy filters using a white list.
In that case both won't work.
@ frank
true, trying it should tell you if that is the case though.
Just add an S at the end of http in the url... all it takes
I don't post my credit card numbers online, nor my bank card numbers. I put nothing on the internet that could be found. That's the safest route to go.
I love the tech videos. Keep making them!
I also wanted to give a suggestion; could you summarize the main points at the end of longer videos? It would make it easier to learn and remember :)
There is no way you can stop a hacker but there are ways to make it harder for your electronics to be hacked
Hackers are annoying
No this is Patrick Same opinion^^^
Thank you thank you very much davecracks😊😊😊😊
Grey Hats seem like baddass anti-heroes
Probably most hackers are grey hats
Gray hats are usually kids and adults with time on their hands that want to practice on small small time home and school networks. Maybe upgrade to an administrator wifi in a library or something. Once they find themselves in there they might poke around just to see what they can find, like financial information. However, they will never do anything with that information other than feel good about themselves that they got in, in other words they do it for the lolz..... I say this because I am guilty, LOL. White hats are usually paid heavily and are professional pen testers. Black hats are your legitimate big scale bad guys. We are talking about the guys that hacked Sony, Home Depot, etc.
Theres actually a lot of contention in the industry on exactly what defines a 'black hat' or a 'grey hat' etc. One interpretation I and number of others prefer is in terms of permission. So black hats gain unauthorized access, white hats gain authorized access, and grey hats aren't given permission nor are they getting unauthorized access. So a grey hat might be the guy reversing some dll for compatibility reasons, cracking that new game to pirate to his friends, or developing an exploit for a piece of software without permission(but not using that exploit to gain access to systems).
This helps cover cases where an individual might fit the bill for different hats for different situation. Such as the white hat being paid by day to find and fix networks but moonlighting as a carder to make some extra cash as a blackhat.
It's still super illegal though. Even if you don't do anything malicious and tell the company you could still be sued for breaking into their system without permission.
That's definitely how they see themselves.
This was just put into my recommended for some reason and i can tell u when it comes to it your either getting hacked or ur not, if u have the knowledge u can slow a hack down but once its happening thats it set in stone and u aint stopping it... dont waste ur time watching this
also, DDoS attacks are not hacks. Someone please tell CNN
Tuchulu hackers use them, so...
nosuchthing8 they also use email. DDoS is not hacking.
Tuchulu They usually require control of a botnet though, which requires an individual to basically hack many computers. Whether or not ddos attacks are "hacks" is a matter or semantics, but they still pose issues similar to other cybersecurity issues. In a way you "trick" the target computer because it has no way of verifying if the connection is a legitamate user.
That is correct and well said. Creating a botnet is very much hacking. Using it is not.
ApplePi they do what research they can, but not everyone can understand everything
this guy kind of reminds me from one of the guys from the crash course series only because we watch it school most every day
How to hack:
step 1) put on balaclava
step 2) google "how to hack"
step 3) purchase Guy Fawkes mask
step 4) you are now a certified hacker
Wtf 😂
Hacking is way more convuluted than I think most people realize. I have been reading a book on web application hacking and even with a good understanding of web application technologies there is a lot of info to process. Theres acess control exploits, script injection exploits, command injection exploits, database injection exploits, brute force credential cracking, authentication and session management flaws, and many more topics in web application hacking alone.
White hats = Good guys
Black hats = Bad guys
Grey hats = Heroes
Such racism
What the-
No the withe hats are the bad guys and the black hats are the good guy
Frozen Puppys watch the video?
@@frozenpuppys4708 Lmao you sure you didn't hit yourself with a rock or something else ?
Is this the same for ip hackers? If so put down a reply it really helps.
I just recently watched Mr.Robot....feeling like a mad hacker genius
If everybody knew more about what is dangerous to do on the web, we would come a long way
Well, this only explaining the surface of hacking, but it's explaining it pretty good.
I would have loved to see some of the core principles of hacking, for example dissasembly of code and the abuse of Bufferoverflows. Although these should not exist anymore in current Languages, in the end those are the really interesting and "basic" procedures when it comes to hacking.
For everyone who thinks he could hack anything: You need to know how to program something before you can hack it. Otherwise you're nothing more then a so called "script kiddie" and you actually can't do anything to be honest.
Oh, also, I would have loved to see the usual laughing about DDoS attacks, as those are the usual reason why websites are down, are often compared to hacking, but are actually completely different as they are easier.
Well done video anyway :)
Hank straight roasted Yahoo with that comment at 8:18. LMAO
As a programmer I have to say you did a great job explaining it all, better and more in depth than I expected. Thanks!
However, at the end you implied that it is only the white hats that protect sites. The programmers that write the original code are the first line of defense as we have to make sure they don't write systems in a way that can be hacked. But going too far into that would probably been out of scope of the video XD
I'm new to the channel and I just subscribed
very lacking in the "how to stop them" section
So you want them to teach you everything about secure programming in an eight-minute video? They explained everything they could without going into complete tech jargon. Or did you miss the part about how stopping hackers requires hacking skills, which was kind of the main point of the video?
Samir it basically all "how to stop them" his point was you try to fo EXACTLY what someone who would do it maliciously would do, record the holes you found and change/update whatever you used to get access.
Who said anything about secure programming? Most security issues occur from misconfiguration anyway. All they mentioned was "pentesting", and there's a LOT more that you can mention in an 8 minute video. Don't play dumb.
Your best defense is usually just common sense. Keeping everything updated and not running shit from dodgy websites and e-mails will go a long way. Firewalls are useful if set on training/custom rules mode so you explicitly allow/block requests on a per-application basis. Anti-virus software is for all practical purposes useless, don't bother.
Obviously way simplified, but that's it in a nutshell.
Don't use computers. If you don't use computers then you can't be hacked.
This video is very educational 😎
IDK why
whenever somebody talks about hackers they have a guy in a hoodie with a weird looking mask and is on the keyboard half bent :-/
Omg u r really every codm vids and now ur here
LiveJournal has loads of hackers and so does Tumblr and RUclips----and not just the people who make random comments.
1:22 Python 2.7? Line 5 has to be indented.
Does having your internet provider change your IP address help to stop someone who is actively seeking to hack your system?
Shrek is very green
Salsie
Shrek was only to prepare spawnlings for the oncoming of pepe
DeadLink 404 allahu Akbar
Thanks
Just like his weiner :))))))
Hacking is PURE EVIL !!
0:20 can we get an april fools episode where the whole episode has multiple hanks?
Thank you for saying how to stop hackers
Pen pineapple apple pen test
i think someone have hacked into my windows, is that even possible, and should i be worryed about other devises connected to the wifi???
need answer asap
I have no idea but if u think about it, u wouldn’t know thru ur phone who else is connected to the WiFi I think
All these great hackers and I can't even write a For loop correctly.
Joliee I feel u there bro
@Blaze Plays C++ I'm learning it right now
Soy Boy i can’t even write a script or code
How many hackers are there 😐?
Oh my gosh sameeee
I can’t wait til I get my skills down in Cybersecurity! Tryna become a pen tester and analyst + w/ some programming skills in software development/engineering.
I got my other email account hacked, I can't access into it.
Mine too
@@thedarkdawnmezz3365 i just forgot my name and password
and can't get in too
What if a person has a white hat and a black hat hacker?
LET THE DUEL BEGIN!!!
**gives the black hat and white hat hackers swords**
Ok bro you know html, calm down, you're not a hacker
int Main () {
Std::cout
alert('C++ > js, "cries in a corner"');
Silver Mirai braaaa you just xss the shit out of youtube braaaaa
braaa don't tell em the secret cia is gonna get me
Silver Mirai $("#Silver_Mirai").hide();
// got you braaa don't worry
Well done! ;D
Hank em! Fock Hacking. It's all about the Hanking
Wait, who the eff is Hank?
Ganaram Inukshuk Hank Green, the guy who hosted this episode. Or Do You Not Know Of All Of The Cast Members?
+Adam Stone, "Who the eff is Hank?" is an inside joke from Hank's other RUclips channel, vlogbrothers. The challenge is to reply to the question with a silly definition. For example, Hank is a reptile endemic to New Zealand whose predators include the Polynesian Rat.
+Ganaram Inukshuk *Hank* is a sugar-based confection that, in its modern form, typically consists of sugar, water and gelatin which is whipped to a spongy consistency, molded into small cylindrical pieces, and coated with corn starch. Some *Hank* recipes call for eggs.
Asummersdaydreamer14 I got that reference
Very good, thank you
1:22 would just raise an IndentationError :/
Abirbhav Goswami this man knows whats up
the important thing here is that hackers are named Steve.
"Hacking" is simply using technology in an unconventional way. Steve Wozniak was a hacker. What black hats and cyber criminals do is not called "hacking", it's called Cracking.
Eh I was playing a game where you play as a lumberjack, but I found it too boring and hard.
So I decided to hack it.
May I axe what the game is called?
Trees
Master Therion clash royale
Muzik Bike I got hacked on GD so I quitted and my stomach keeps hurting ;3;
There are also efforts to build systems that are completely immune to entire classes of attacks. Some are a long way off, but there are already demonstrations of systems that, for example, provably have no buffer overflow vulnerabilities. No system is unhackable, but we may get to the point where hackers would have to /invent new ways/ of attacking in order to make any progress.
Why is black always referred to bad and white is referred as good
Because the light gives us comfort, while being in the dark, or darkness makes us unwary or feel fear.
Racism at it's finest.
people used to praise the sun on the regular, ill let you figure it out from there
It derives from cowboy-movies
Because whites are better than blacks
Thanks for sharing
I love watching videos like these, and seeing how they explain what we do to common people. XD It's so funny... "Its like defense against the dark arts" hahahahaaaaa
And what is it you do?
+Nathan Trone
Actually there is even a relatively well known book on the topic called:
"Defense against the black arts"
as the great poet phi life cypher once said: the computers i be hackening
"Two Hackers using the same keyboard at once" SOMEBODY is an NCIS fan! :)
I will continue singing praises to *Minslegend* NO BODY IS BETTER..
God damn it 27 seconds and already 3rd post?
pretty much my whole sec+ and ethical hacker class in a nutshell.
Who else is early?
PEPE was early
I thought the thumbnail was something else for a second
This guy is definitely a hacker in disguise.
*HELP* Does it count as hacking if I was watching a youtube video and it suddenly pauses without me doing anything? Or google suddenly openning by itself without me doing anything? Please if you know anything please tell me.
Bro its not a hack it might be a glitch or you been hacked
How to stop a hacker: **Plays Baby by Justin Bieber**
😂😂😂
I am so mad because someone hack me in a game and I had a lot of things.
Trump's new cybersecurity policy: Close all the ports and build a firewall!
Not enaugh he got a server then he get a browser and with that I hack him
You forgot the biggest thing about hacking: SANITIZING YOUR INPUTS
fuck I love this show but Hank talks so fast, I can't follow haha
The 98 people who disliked this video was Steve T. Hacker's botnet
I wish Hollywood would watch this video.
Thanks for this. After doing my research, I can find out who's doing it.
Sir need your help how to find out the person who hacked my fb acct
Hacking is a term so wide, I sure hope they don't speak about cyber criminals..... oh wait.
You made a green glob named SciShow
(if you don't get it watch the intro)
6:30, wearing a hoodie makes hacking a lot more effective.
This was super informative. I really enjoyed it.
Hackers are a bunch of cowards
Indeed hackers from China and Russia keep trying to get into my computer but it kicks them out it kicked them out a bunch of times but they don't learn edit:ps it kicked them out cause my computer is protected
i feel rage after looking at this video
i'm loving the ITM and comp sci videos that you guys have been posting recently! thank you
Thanks for helping on how to remove hackers from my iPhone
Consider one fact: with BitSpray network, hackers can break in but find nothing but white noise. This video is looking at hacking from the perspective of a rearview mirror.
white hat in training here.
Hope to one day be able to stop some evil hacker.
would be an awesome feeling.
Until then, I guess I am coding applications and checking email firewalls vigilantly :)
I AM SOROUNDED BY GREY HAT'S.