How Hackers Hack, and How To Stop Them

Поделиться
HTML-код
  • Опубликовано: 28 дек 2024

Комментарии • 1,9 тыс.

  • @Vera-Alejandro
    @Vera-Alejandro 7 лет назад +33

    This is one of the best How to Hack videos. I'm a Cyber Security Major and this is pretty much what I've learned so far, but very simplified.

    • @lizsager9577
      @lizsager9577 3 года назад

      I was told to stop serious hacking by Norton is to find someone that is as bad on the good side to stop this person. Is that you ale vera

    • @bencorcoran7563
      @bencorcoran7563 2 года назад

      @@lizsager9577 i guess not Liz Sager

  • @FBI-ov7lb
    @FBI-ov7lb 8 лет назад +458

    How to stop a hacker? Easy
    You: Hacker no hacking! Hacker no hacking!
    Hacker! Aw man!

    • @letsgetit5679
      @letsgetit5679 7 лет назад +7

      Hassan DM ha I get it nice joke

    • @letsgetit5679
      @letsgetit5679 7 лет назад +11

      Hassan DM Hacker Hacker Hacker the Explorer

    • @kshitijkabeer9890
      @kshitijkabeer9890 7 лет назад +5

      Would work if you are Dora the Explorer

    • @agauster3619
      @agauster3619 7 лет назад

      Lol

    • @donnapotter8170
      @donnapotter8170 6 лет назад +2

      You're a idiot I was actually asking for help not a idiot with slow witted joking if that's you think your doing... Grow up....

  • @zpinn8242
    @zpinn8242 8 лет назад +206

    Everything can be hacked. And everyone.

    • @yuqiyuan8411
      @yuqiyuan8411 7 лет назад +4

      apagando las luces

    • @gingergaming6310
      @gingergaming6310 7 лет назад +8

      Sombra Online.

    • @KashNoK
      @KashNoK 7 лет назад +39

      True, I got my toaster hacked. Can't make toast anymore :(

    • @saigesheen
      @saigesheen 7 лет назад +10

      Shrek The V did you try putting a toaster in your toaster?

    • @KashNoK
      @KashNoK 7 лет назад +10

      Visiondragon I did, but then the other toaster got hacked. But don't worry, I just throw my bread into a fire. Tastes kinda same.

  • @Aftermost3590
    @Aftermost3590 7 лет назад +1

    Actually a super accurate in depth description of hacking.

  • @gamophyte
    @gamophyte 8 лет назад +1780

    Why do people still depict hackers like a guy in a black hoodie and gloves like a person breaking into a window

    • @Lwilight
      @Lwilight 8 лет назад +171

      Caithlin yeah pretty weird, usually it an overweight individual with Cheeto stained fingers and mountain dew on their breath.

    • @maxmusterman3371
      @maxmusterman3371 8 лет назад +109

      it symbolises their morality

    • @schadenfreudebuddha
      @schadenfreudebuddha 8 лет назад +220

      it's a more romantic image than some russian in a tracksuit.

    • @eli9252
      @eli9252 8 лет назад +110

      because you can't hack unless you're comfy

    • @Lwilight
      @Lwilight 8 лет назад +8

      Elias Perez you get it

  • @davidblass9808
    @davidblass9808 2 года назад +1

    Been a victim of this type of network infringment

  • @Master_Therion
    @Master_Therion 8 лет назад +1456

    How do I stop a hacking attack? Cough syrup.

    • @Rr-ji4vj
      @Rr-ji4vj 8 лет назад +3

      Master Therion 3 minutes, still underrated.

    • @alexluna6238
      @alexluna6238 8 лет назад

      Master Therion tru

    • @alexluna6238
      @alexluna6238 8 лет назад +2

      Master Therion hack*

    • @schadenfreudebuddha
      @schadenfreudebuddha 8 лет назад +22

      I tried to get into computers, but I just couldn't hack it. I didn't have the drive. now i'm being monitored. and various other puns.

    • @irok1
      @irok1 8 лет назад +1

      XD

  • @Gotostep2
    @Gotostep2 8 лет назад

    A firewall is also known as a layer 4 device.
    A hacker could also create a time-bomb virus to open a back door into a company's database.
    There are also kiddie scripts
    - Kiddie script hackers are less skilled and rely on the scripts that the pros write or abuse legitimate programs that are meant to provide useful troubleshooting (e.g. WireShark)
    - Hackers, for example, can write their own programs and scripts to break into systems (e.g. creating a virus that can exploit an opening in a system's code to create a buffer overflow).
    However, despite all of the knowledge that I had to gain and terms to memorize to become Security+ certified, (As well as a Network+, RHCSA and a BAAS in Information Technology), I still learned something new from SciShow.
    Thanks Hank,
    Goto

  • @Raattis
    @Raattis 8 лет назад +12

    Nice explanation, but I have couple clarifications:
    1) Probing "ports" and keeping them closed is oversimplifying things a bit. Keeping ports closed doesn't require any real effort from the defender - it's just a setting in the router. And having a port open only means that there could be some software (web service, admin controls, etc.) listening for connections directed to that port. To mount an attack the attacker must know or find a vulnerability in that software to exploit. A port is more like an extension of the IP address, it doesn't represent anything concrete.
    2) Saying "sending code" is technically correct, but it gives the wrong idea that sending is the hard part. You can send any piece of code you want via google search box. Getting *your* code *executed* on the target machine is what an attack is about.

  • @Atratzu
    @Atratzu 8 лет назад +1

    If people can keep up with the information being given here; this was one of the better summaries of how hacking and counter-hacking works. Great job as always SciShow!

  • @KingsleyIII
    @KingsleyIII 8 лет назад +160

    What the hack did I just watch?

  • @johncenareactions5926
    @johncenareactions5926 5 лет назад +10

    I have avenger endgame spoilers on my computer so no hackers try to hack me

  • @silhouhat3403
    @silhouhat3403 8 лет назад +536

    At this rate, you might as well make a TechShow

    • @jaeger1123
      @jaeger1123 8 лет назад +8

      Silhouhat heck yeah, that'd be awesome

    • @TimoSluis
      @TimoSluis 8 лет назад +14

      Peter McQuill hack* sorry

    • @jaeger1123
      @jaeger1123 8 лет назад +2

      Timo Sluis we've got ourselves a pun master :D

    • @bencutler1066
      @bencutler1066 8 лет назад +36

      Hank recently mentioned that "crash course computer science" is currently being filmed

    • @silhouhat3403
      @silhouhat3403 8 лет назад +4

      gnomer cutler oh shit! that's amazing! thanks for letting me know, definitely going to be on the lookout for that.

  • @jenoluvbot1003
    @jenoluvbot1003 7 лет назад

    I depict a hacker as a guy wearing a troll mask, in a black hoodie, and have fast typing.

  • @Koop784
    @Koop784 8 лет назад +9

    Good afternoon! My name is Robert Hackerman, and I'm the county password inspector! I just need a few minutes of your time to make sure your passwords are strong enough to pass state security standards and protocols.

    • @maggieinfinity8743
      @maggieinfinity8743 7 лет назад

      Koopsy I'm not sure if my password is secure...
      It's: starrynight554yaht888

    • @Koop784
      @Koop784 7 лет назад +6

      That's one of the best passwords I've ever seen! Don't change a thing!

    • @binetts
      @binetts 7 лет назад

      Koopsy mine is GayBoi69

    • @lazydonkey3617
      @lazydonkey3617 7 лет назад

      Dude don't ask for passwords

    • @binetts
      @binetts 7 лет назад

      Koopsy ool

  • @TheSYLOH
    @TheSYLOH 8 лет назад +1

    You forgot the most popular and effective attack:
    Typing in a username, then trying "123456","password" ot "12345678" as the password.
    This sounds like a joke, but it is startlingly effective at getting into an account.
    Also, literally the oldest trick in the book, calling up tech support and trying to convince the person to give you access.

  • @josuelservin2409
    @josuelservin2409 8 лет назад +133

    Social engineering... Usually the weakest link in a chain are the persons using the system, you don't need a PC to get access to important information, it's surprisingly easy how much you can get asking the rigth questions. And usually this area is overlook just like in this video...

    • @Sentinal098765
      @Sentinal098765 8 лет назад +8

      Bravo! I was scrolling through the comments specifically looking to see if anyone else besides me caught that.
      I can just imagine Kevin Mitnick sitting back, giggling to himself, "after all this time, people still don't have a clue how it's really done."

    • @sundhaug92
      @sundhaug92 8 лет назад +1

      To be fair, Mitnick also knew a whole lot of technical shit

    • @frankschneider6156
      @frankschneider6156 8 лет назад +9

      +Josuel Servin
      Depends on the target.
      Most individuals in private and corporate administration in companies: agree.
      Corporate data centers of major companies: not that easy
      Military or Intelligence high security areas: forget it.
      So effectiveness of SE simply boils down to the average user security awareness at the target, thus how much and how good you trained your staff/users and made them aware of potential attacks and methods. the more /better and the less successful SE will be.

    • @loranddeka
      @loranddeka 8 лет назад +5

      Social engineering I would consider a technique one could use for the recon part of the hack. You're right in that its very difficult to fight against since it revolves around the "human factor".

    • @maythesciencebewithyou
      @maythesciencebewithyou 7 лет назад

      Josuel Servin Buy a used computer. It's unbelievable what people leave on it. If you are lucky you might get some Bank Account Informationen

  • @Qojkjnm
    @Qojkjnm 10 месяцев назад

    The world is a better place with you.

  • @rollerzleader2812
    @rollerzleader2812 8 лет назад +8

    *Black hats*: People that enjoy exposing other bad guys. *White Hats*:Goodie two shoes looking to make a buck legally. *Grey Hats*: Those few with strict morals. *Brown Hats*: Regular average folk that enjoy working with their hands, I.E breaking and reassembling things. No shit, these guys are your go to sellsmen for devices. from jailbroken phones to cellular jamming devices. Brown Hats can be found on 4chan if you dare. They primarily supply all sorts of hackers for money or favours.

    • @texivani
      @texivani 8 лет назад +8

      Rollerz leader "If you dare" What are you, 14? Do people really still think 4chan is this forbidden dark gathering place?

    • @CarrotConsumer
      @CarrotConsumer 8 лет назад +6

      I went on 4chan and was arrested by the FBI. Never go there unless you are a 1337 hax0r

  • @mandyrooney4978
    @mandyrooney4978 4 года назад +2

    I have been hacked.... and of course have no idea how to stop it

    • @mattjacob5234
      @mattjacob5234 4 года назад

      Do not allow this guy to make fools out of you, this is clearly fake. Contact @Freakyhacks on Instagram or +1(408)469-4926 on whatsapp for all your hacking jobs, he's fast, reliable, effective and charges way less

  • @Anamnesia
    @Anamnesia 8 лет назад +177

    Is it Hacking if the Security is flawed?
    Is it Hacking when the NSA/FBI/CIA does it???

    • @jonaselharrab265
      @jonaselharrab265 8 лет назад +36

      Anamnesia Hacking is hacking, it doesn't matter who does it.

    • @Andrew-od4vg
      @Andrew-od4vg 8 лет назад +36

      As far as I know, it's considered hacking if you:
      1) don't own the system
      2)don't have permission from the system's owner
      and
      3)don't have a warrant to access the system without permission from the owner.

    • @schadenfreudebuddha
      @schadenfreudebuddha 8 лет назад +13

      if the security wasn't flawed, it couldn't be hacked.

    • @Anamnesia
      @Anamnesia 8 лет назад +1

      +schadenfreudebuddha There's a great video called, "Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker"

    • @MrDoverfield
      @MrDoverfield 8 лет назад +17

      Anamnesia it's only hacking when Russia does it.

  • @TheRealFobican
    @TheRealFobican 5 лет назад +1

    I got a tricky one for you, how do you detect hacking that goes on below the operating system and attacks the hardware itself?

  • @samanthalopez27
    @samanthalopez27 8 лет назад +50

    The whole time I was hoping he would reference Mr. Robot.

  • @21guitarworld
    @21guitarworld 7 лет назад

    Also, Hank Green for president!

  • @dedpup4948
    @dedpup4948 8 лет назад +12

    How do I hack my school's wifi so I can watch restricted SciShow videos and the full Hamilton soundtrack at lunch?

    • @CarrotConsumer
      @CarrotConsumer 8 лет назад +4

      Use a VPN or proxy.

    • @DanMan1990
      @DanMan1990 8 лет назад

      either of these will work^^^^

    • @frankschneider6156
      @frankschneider6156 8 лет назад +1

      Not if the school proxy filters using a white list.
      In that case both won't work.

    • @DanMan1990
      @DanMan1990 8 лет назад

      @ frank
      true, trying it should tell you if that is the case though.

    • @Selfs633
      @Selfs633 7 лет назад

      Just add an S at the end of http in the url... all it takes

  • @hauntedasylum8194
    @hauntedasylum8194 2 года назад +1

    I don't post my credit card numbers online, nor my bank card numbers. I put nothing on the internet that could be found. That's the safest route to go.

  • @SA1992
    @SA1992 8 лет назад +8

    I love the tech videos. Keep making them!
    I also wanted to give a suggestion; could you summarize the main points at the end of longer videos? It would make it easier to learn and remember :)

  • @mr.nameless4484
    @mr.nameless4484 8 лет назад

    There is no way you can stop a hacker but there are ways to make it harder for your electronics to be hacked

  • @DudeWhoSaysDeez
    @DudeWhoSaysDeez 8 лет назад +5

    Hackers are annoying

  • @igwematthias8546
    @igwematthias8546 3 года назад +2

    Thank you thank you very much davecracks😊😊😊😊

  • @samguy7654
    @samguy7654 8 лет назад +472

    Grey Hats seem like baddass anti-heroes

    • @samguy7654
      @samguy7654 8 лет назад +14

      Probably most hackers are grey hats

    • @finalfant111
      @finalfant111 8 лет назад +46

      Gray hats are usually kids and adults with time on their hands that want to practice on small small time home and school networks. Maybe upgrade to an administrator wifi in a library or something. Once they find themselves in there they might poke around just to see what they can find, like financial information. However, they will never do anything with that information other than feel good about themselves that they got in, in other words they do it for the lolz..... I say this because I am guilty, LOL. White hats are usually paid heavily and are professional pen testers. Black hats are your legitimate big scale bad guys. We are talking about the guys that hacked Sony, Home Depot, etc.

    • @themadichib0d
      @themadichib0d 8 лет назад +13

      Theres actually a lot of contention in the industry on exactly what defines a 'black hat' or a 'grey hat' etc. One interpretation I and number of others prefer is in terms of permission. So black hats gain unauthorized access, white hats gain authorized access, and grey hats aren't given permission nor are they getting unauthorized access. So a grey hat might be the guy reversing some dll for compatibility reasons, cracking that new game to pirate to his friends, or developing an exploit for a piece of software without permission(but not using that exploit to gain access to systems).
      This helps cover cases where an individual might fit the bill for different hats for different situation. Such as the white hat being paid by day to find and fix networks but moonlighting as a carder to make some extra cash as a blackhat.

    • @RedRogue
      @RedRogue 8 лет назад +15

      It's still super illegal though. Even if you don't do anything malicious and tell the company you could still be sued for breaking into their system without permission.

    • @manguy01
      @manguy01 8 лет назад +9

      That's definitely how they see themselves.

  • @EntrepreneurKurly
    @EntrepreneurKurly 4 года назад

    This was just put into my recommended for some reason and i can tell u when it comes to it your either getting hacked or ur not, if u have the knowledge u can slow a hack down but once its happening thats it set in stone and u aint stopping it... dont waste ur time watching this

  • @Tuchulu
    @Tuchulu 8 лет назад +366

    also, DDoS attacks are not hacks. Someone please tell CNN

    • @nosuchthing8
      @nosuchthing8 8 лет назад +3

      Tuchulu hackers use them, so...

    • @kdwh1
      @kdwh1 8 лет назад +53

      nosuchthing8 they also use email. DDoS is not hacking.

    • @skate2late
      @skate2late 8 лет назад +15

      Tuchulu They usually require control of a botnet though, which requires an individual to basically hack many computers. Whether or not ddos attacks are "hacks" is a matter or semantics, but they still pose issues similar to other cybersecurity issues. In a way you "trick" the target computer because it has no way of verifying if the connection is a legitamate user.

    • @kdwh1
      @kdwh1 8 лет назад +9

      That is correct and well said. Creating a botnet is very much hacking. Using it is not.

    • @leslieelms3287
      @leslieelms3287 8 лет назад

      ApplePi they do what research they can, but not everyone can understand everything

  • @scottp9247
    @scottp9247 7 лет назад

    this guy kind of reminds me from one of the guys from the crash course series only because we watch it school most every day

  • @rogerdatt8861
    @rogerdatt8861 8 лет назад +28

    How to hack:
    step 1) put on balaclava
    step 2) google "how to hack"
    step 3) purchase Guy Fawkes mask
    step 4) you are now a certified hacker

  • @skate2late
    @skate2late 8 лет назад

    Hacking is way more convuluted than I think most people realize. I have been reading a book on web application hacking and even with a good understanding of web application technologies there is a lot of info to process. Theres acess control exploits, script injection exploits, command injection exploits, database injection exploits, brute force credential cracking, authentication and session management flaws, and many more topics in web application hacking alone.

  • @QuantumPhyZ
    @QuantumPhyZ 8 лет назад +138

    White hats = Good guys
    Black hats = Bad guys
    Grey hats = Heroes

    • @ObamaSexGaming2007
      @ObamaSexGaming2007 5 лет назад +10

      Such racism

    • @mirsadajdari1945
      @mirsadajdari1945 5 лет назад +1

      What the-

    • @frozenpuppys4708
      @frozenpuppys4708 4 года назад +2

      No the withe hats are the bad guys and the black hats are the good guy

    • @chickencurry1033
      @chickencurry1033 4 года назад +4

      Frozen Puppys watch the video?

    • @capitain9996
      @capitain9996 4 года назад +2

      @@frozenpuppys4708 Lmao you sure you didn't hit yourself with a rock or something else ?

  • @JonshIsMe
    @JonshIsMe 3 года назад +1

    Is this the same for ip hackers? If so put down a reply it really helps.

  • @tralx5268
    @tralx5268 8 лет назад +7

    I just recently watched Mr.Robot....feeling like a mad hacker genius

  • @SotraEngine4
    @SotraEngine4 7 лет назад +1

    If everybody knew more about what is dangerous to do on the web, we would come a long way

  • @Frostwyrmer
    @Frostwyrmer 8 лет назад +8

    Well, this only explaining the surface of hacking, but it's explaining it pretty good.
    I would have loved to see some of the core principles of hacking, for example dissasembly of code and the abuse of Bufferoverflows. Although these should not exist anymore in current Languages, in the end those are the really interesting and "basic" procedures when it comes to hacking.
    For everyone who thinks he could hack anything: You need to know how to program something before you can hack it. Otherwise you're nothing more then a so called "script kiddie" and you actually can't do anything to be honest.
    Oh, also, I would have loved to see the usual laughing about DDoS attacks, as those are the usual reason why websites are down, are often compared to hacking, but are actually completely different as they are easier.
    Well done video anyway :)

  • @blistersonmyfingers9321
    @blistersonmyfingers9321 8 лет назад +1

    Hank straight roasted Yahoo with that comment at 8:18. LMAO

  • @Graghma
    @Graghma 7 лет назад +6

    As a programmer I have to say you did a great job explaining it all, better and more in depth than I expected. Thanks!
    However, at the end you implied that it is only the white hats that protect sites. The programmers that write the original code are the first line of defense as we have to make sure they don't write systems in a way that can be hacked. But going too far into that would probably been out of scope of the video XD

  • @nomoreclickbaiters1089
    @nomoreclickbaiters1089 4 года назад

    I'm new to the channel and I just subscribed

  • @samirm
    @samirm 8 лет назад +436

    very lacking in the "how to stop them" section

    • @woodfur00
      @woodfur00 8 лет назад +44

      So you want them to teach you everything about secure programming in an eight-minute video? They explained everything they could without going into complete tech jargon. Or did you miss the part about how stopping hackers requires hacking skills, which was kind of the main point of the video?

    • @randoml97
      @randoml97 8 лет назад +7

      Samir it basically all "how to stop them" his point was you try to fo EXACTLY what someone who would do it maliciously would do, record the holes you found and change/update whatever you used to get access.

    • @samirm
      @samirm 8 лет назад +13

      Who said anything about secure programming? Most security issues occur from misconfiguration anyway. All they mentioned was "pentesting", and there's a LOT more that you can mention in an 8 minute video. Don't play dumb.

    • @otacon1024
      @otacon1024 8 лет назад +12

      Your best defense is usually just common sense. Keeping everything updated and not running shit from dodgy websites and e-mails will go a long way. Firewalls are useful if set on training/custom rules mode so you explicitly allow/block requests on a per-application basis. Anti-virus software is for all practical purposes useless, don't bother.
      Obviously way simplified, but that's it in a nutshell.

    • @danielvidal7163
      @danielvidal7163 8 лет назад +6

      Don't use computers. If you don't use computers then you can't be hacked.

  • @TsavosAlliance
    @TsavosAlliance 6 лет назад +1

    This video is very educational 😎

  • @itz_yeastic
    @itz_yeastic 3 года назад +10

    IDK why
    whenever somebody talks about hackers they have a guy in a hoodie with a weird looking mask and is on the keyboard half bent :-/

    • @thirdyplays5618
      @thirdyplays5618 3 года назад

      Omg u r really every codm vids and now ur here

  • @MeVsTheWorld01
    @MeVsTheWorld01 6 лет назад +1

    LiveJournal has loads of hackers and so does Tumblr and RUclips----and not just the people who make random comments.

  • @dernbu2879
    @dernbu2879 8 лет назад +7

    1:22 Python 2.7? Line 5 has to be indented.

  • @snowman9555
    @snowman9555 7 лет назад +2

    Does having your internet provider change your IP address help to stop someone who is actively seeking to hack your system?

  • @salsie5449
    @salsie5449 8 лет назад +52

    Shrek is very green

    • @DrunkenAussie76
      @DrunkenAussie76 8 лет назад +4

      Salsie
      Shrek was only to prepare spawnlings for the oncoming of pepe

    • @youforiktv1691
      @youforiktv1691 8 лет назад

      DeadLink 404 allahu Akbar

    • @KashNoK
      @KashNoK 7 лет назад

      Thanks

    • @callekun
      @callekun 7 лет назад

      Just like his weiner :))))))

  • @chosenone2363
    @chosenone2363 3 года назад

    Hacking is PURE EVIL !!

  • @ciao_shibe1517
    @ciao_shibe1517 8 лет назад +5

    0:20 can we get an april fools episode where the whole episode has multiple hanks?

  • @johloalmadrones6707
    @johloalmadrones6707 4 года назад

    Thank you for saying how to stop hackers

  • @brians.103
    @brians.103 8 лет назад +4

    Pen pineapple apple pen test

  • @magdavakt9090
    @magdavakt9090 3 года назад +1

    i think someone have hacked into my windows, is that even possible, and should i be worryed about other devises connected to the wifi???
    need answer asap

    • @jisungsshinyforehead3246
      @jisungsshinyforehead3246 3 года назад

      I have no idea but if u think about it, u wouldn’t know thru ur phone who else is connected to the WiFi I think

  • @soyboy1410
    @soyboy1410 8 лет назад +43

    All these great hackers and I can't even write a For loop correctly.

  • @YT-ox6mc
    @YT-ox6mc 9 месяцев назад

    I can’t wait til I get my skills down in Cybersecurity! Tryna become a pen tester and analyst + w/ some programming skills in software development/engineering.

  • @thebarely-roblox5855
    @thebarely-roblox5855 7 лет назад +5

    I got my other email account hacked, I can't access into it.

    • @thedarkdawnmezz3365
      @thedarkdawnmezz3365 4 года назад

      Mine too

    • @kerstgerard
      @kerstgerard 4 года назад

      @@thedarkdawnmezz3365 i just forgot my name and password
      and can't get in too

  • @amazingstudiosanimates3497
    @amazingstudiosanimates3497 7 лет назад

    What if a person has a white hat and a black hat hacker?
    LET THE DUEL BEGIN!!!
    **gives the black hat and white hat hackers swords**

  • @SilverMiraii
    @SilverMiraii 8 лет назад +6

    Ok bro you know html, calm down, you're not a hacker

    • @hendrik2765
      @hendrik2765 7 лет назад

      int Main () {
      Std::cout

    • @SilverMiraii
      @SilverMiraii 7 лет назад

      alert('C++ > js, "cries in a corner"');

    • @johnn2122a
      @johnn2122a 7 лет назад

      Silver Mirai braaaa you just xss the shit out of youtube braaaaa

    • @SilverMiraii
      @SilverMiraii 7 лет назад

      braaa don't tell em the secret cia is gonna get me

    • @johnn2122a
      @johnn2122a 7 лет назад

      Silver Mirai $("#Silver_Mirai").hide();
      // got you braaa don't worry

  • @BunnyFett
    @BunnyFett 7 лет назад +2

    Well done! ;D

  • @adamstone897
    @adamstone897 8 лет назад +6

    Hank em! Fock Hacking. It's all about the Hanking

    • @ganaraminukshuk0
      @ganaraminukshuk0 8 лет назад +2

      Wait, who the eff is Hank?

    • @adamstone897
      @adamstone897 8 лет назад

      Ganaram Inukshuk Hank Green, the guy who hosted this episode. Or Do You Not Know Of All Of The Cast Members?

    • @Asummersdaydreamer14
      @Asummersdaydreamer14 8 лет назад +4

      +Adam Stone, "Who the eff is Hank?" is an inside joke from Hank's other RUclips channel, vlogbrothers. The challenge is to reply to the question with a silly definition. For example, Hank is a reptile endemic to New Zealand whose predators include the Polynesian Rat.

    • @Master_Therion
      @Master_Therion 8 лет назад +3

      +Ganaram Inukshuk *Hank* is a sugar-based confection that, in its modern form, typically consists of sugar, water and gelatin which is whipped to a spongy consistency, molded into small cylindrical pieces, and coated with corn starch. Some *Hank* recipes call for eggs.

    • @cupcakewithouttheicing
      @cupcakewithouttheicing 8 лет назад

      Asummersdaydreamer14 I got that reference

  • @robertglazer9057
    @robertglazer9057 7 лет назад

    Very good, thank you

  • @abirbhavgoswami
    @abirbhavgoswami 7 лет назад +5

    1:22 would just raise an IndentationError :/

    • @johndae8175
      @johndae8175 7 лет назад

      Abirbhav Goswami this man knows whats up

  • @janglestick
    @janglestick 7 лет назад

    the important thing here is that hackers are named Steve.

  • @cyb3rtooth199
    @cyb3rtooth199 7 лет назад +4

    "Hacking" is simply using technology in an unconventional way. Steve Wozniak was a hacker. What black hats and cyber criminals do is not called "hacking", it's called Cracking.

  • @MuzikBike
    @MuzikBike 8 лет назад +13

    Eh I was playing a game where you play as a lumberjack, but I found it too boring and hard.
    So I decided to hack it.

  • @reilithion
    @reilithion 8 лет назад

    There are also efforts to build systems that are completely immune to entire classes of attacks. Some are a long way off, but there are already demonstrations of systems that, for example, provably have no buffer overflow vulnerabilities. No system is unhackable, but we may get to the point where hackers would have to /invent new ways/ of attacking in order to make any progress.

  • @redwizard2471
    @redwizard2471 8 лет назад +5

    Why is black always referred to bad and white is referred as good

    • @abneryumac
      @abneryumac 8 лет назад +19

      Because the light gives us comfort, while being in the dark, or darkness makes us unwary or feel fear.

    • @arbresnow401
      @arbresnow401 8 лет назад +1

      Racism at it's finest.

    • @DevotedPastafarian
      @DevotedPastafarian 8 лет назад +4

      people used to praise the sun on the regular, ill let you figure it out from there

    • @sundhaug92
      @sundhaug92 8 лет назад +1

      It derives from cowboy-movies

    • @okie9025
      @okie9025 8 лет назад +1

      Because whites are better than blacks

  • @360glue8
    @360glue8 4 года назад

    Thanks for sharing

  • @nathantron
    @nathantron 8 лет назад +4

    I love watching videos like these, and seeing how they explain what we do to common people. XD It's so funny... "Its like defense against the dark arts" hahahahaaaaa

    • @CarrotConsumer
      @CarrotConsumer 8 лет назад +4

      And what is it you do?

    • @frankschneider6156
      @frankschneider6156 8 лет назад +1

      +Nathan Trone
      Actually there is even a relatively well known book on the topic called:
      "Defense against the black arts"

  • @muntzerism-diggerism9695
    @muntzerism-diggerism9695 8 лет назад +1

    as the great poet phi life cypher once said: the computers i be hackening

  • @Fragdemented
    @Fragdemented 8 лет назад +2

    "Two Hackers using the same keyboard at once" SOMEBODY is an NCIS fan! :)

  • @brooklynchristopher7261
    @brooklynchristopher7261 2 года назад +1

    I will continue singing praises to *Minslegend* NO BODY IS BETTER..

  • @cpypcy
    @cpypcy 8 лет назад +5

    God damn it 27 seconds and already 3rd post?

  • @ptholyninja
    @ptholyninja 7 лет назад

    pretty much my whole sec+ and ethical hacker class in a nutshell.

  • @dramaticproductions6155
    @dramaticproductions6155 8 лет назад +4

    Who else is early?

  • @3PointWizzard
    @3PointWizzard 7 лет назад +1

    I thought the thumbnail was something else for a second

  • @yuinurahilyon5711
    @yuinurahilyon5711 4 года назад +2

    This guy is definitely a hacker in disguise.

  • @aliciaschannel2722
    @aliciaschannel2722 7 лет назад +2

    *HELP* Does it count as hacking if I was watching a youtube video and it suddenly pauses without me doing anything? Or google suddenly openning by itself without me doing anything? Please if you know anything please tell me.

    • @cast5230
      @cast5230 5 лет назад

      Bro its not a hack it might be a glitch or you been hacked

  • @pingu624
    @pingu624 5 лет назад +5

    How to stop a hacker: **Plays Baby by Justin Bieber**

  • @tk_littleprincess4260
    @tk_littleprincess4260 4 года назад +1

    I am so mad because someone hack me in a game and I had a lot of things.

  • @JohnSmith-td7hd
    @JohnSmith-td7hd 8 лет назад +12

    Trump's new cybersecurity policy: Close all the ports and build a firewall!

    • @pyhooma3308
      @pyhooma3308 6 лет назад

      Not enaugh he got a server then he get a browser and with that I hack him

  • @kylebrown2903
    @kylebrown2903 8 лет назад

    You forgot the biggest thing about hacking: SANITIZING YOUR INPUTS

  • @dunjanjanja237
    @dunjanjanja237 8 лет назад +4

    fuck I love this show but Hank talks so fast, I can't follow haha

  • @lkwdknucklehead4401
    @lkwdknucklehead4401 8 лет назад +1

    The 98 people who disliked this video was Steve T. Hacker's botnet

  • @Andreazor
    @Andreazor 6 лет назад

    I wish Hollywood would watch this video.

  • @jordinsfruitfulministries2910
    @jordinsfruitfulministries2910 2 года назад

    Thanks for this. After doing my research, I can find out who's doing it.

    • @teddydollente2768
      @teddydollente2768 2 года назад

      Sir need your help how to find out the person who hacked my fb acct

  • @Drawfill
    @Drawfill 8 лет назад +1

    Hacking is a term so wide, I sure hope they don't speak about cyber criminals..... oh wait.

  • @silvxrvix2367
    @silvxrvix2367 7 лет назад +1

    You made a green glob named SciShow
    (if you don't get it watch the intro)

  • @DoubleXmagnum
    @DoubleXmagnum 8 лет назад

    6:30, wearing a hoodie makes hacking a lot more effective.

  • @StardustScribe
    @StardustScribe 8 лет назад +1

    This was super informative. I really enjoyed it.

  • @kevinlee2443
    @kevinlee2443 5 лет назад +1

    Hackers are a bunch of cowards

    • @nikobellic8312
      @nikobellic8312 5 лет назад

      Indeed hackers from China and Russia keep trying to get into my computer but it kicks them out it kicked them out a bunch of times but they don't learn edit:ps it kicked them out cause my computer is protected

  • @marcusli7841
    @marcusli7841 7 лет назад

    i feel rage after looking at this video

  • @nuggets0717
    @nuggets0717 7 лет назад +1

    i'm loving the ITM and comp sci videos that you guys have been posting recently! thank you

  • @tvraotvrao7421
    @tvraotvrao7421 4 года назад

    Thanks for helping on how to remove hackers from my iPhone

  • @MaoRuiqi
    @MaoRuiqi 7 лет назад

    Consider one fact: with BitSpray network, hackers can break in but find nothing but white noise. This video is looking at hacking from the perspective of a rearview mirror.

  • @Nerobyrne
    @Nerobyrne 7 лет назад

    white hat in training here.
    Hope to one day be able to stop some evil hacker.
    would be an awesome feeling.
    Until then, I guess I am coding applications and checking email firewalls vigilantly :)

  • @JoelHernandez-rt1kt
    @JoelHernandez-rt1kt 6 лет назад

    I AM SOROUNDED BY GREY HAT'S.