Hackers & Cyber Attacks: Crash Course Computer Science #32

Поделиться
HTML-код
  • Опубликовано: 19 окт 2024

Комментарии • 376

  • @Mallory-Malkovich
    @Mallory-Malkovich 7 лет назад +852

    I'm disappointed you didn't cover the most basic hacker tactic - typing really fast while listening to electronica music. The faster a hacker types, the more l33t they are, and the more hacks they hack.

    • @craighalpin9521
      @craighalpin9521 7 лет назад +124

      Osiris Malkovich this channel is to give people basic technical knowledge of computers, that hacking technique is way too advanced for this video.

    • @the80386
      @the80386 6 лет назад +78

      being in a dimly lit room gives you moar performance, so does wearing a leather jacket

    • @ill6ixx538
      @ill6ixx538 5 лет назад +2

      Lulz

    • @xxx_hamsandwich123_xxx8
      @xxx_hamsandwich123_xxx8 5 лет назад +1

      can you hack

    • @alexwang982
      @alexwang982 5 лет назад +8

      xXx_HamSandwich123_xXx
      r/woooosh

  • @DrewLytle
    @DrewLytle 7 лет назад +97

    Great episode! I'm in a class called Defense Against the Dark Arts this semester where we're studying cyber attacks and this episode was a great overview! Keep it up!

  • @tofuterror5193
    @tofuterror5193 7 лет назад +475

    Aww man. I really thought that I was friends with a Nigerian prince.

    • @mapelaanjakoodaansuomeksi3432
      @mapelaanjakoodaansuomeksi3432 5 лет назад +2

      IKR

    • @ZA-fo2rn
      @ZA-fo2rn 5 лет назад +2

      all foreigner are not rich

    • @youtubeaccount0x073
      @youtubeaccount0x073 5 лет назад +1

      TofuTerror I don’t get it???

    • @mohdhafifibinnasir4233
      @mohdhafifibinnasir4233 5 лет назад +4

      @@youtubeaccount0x073 there are spam out there claim to be the Nigerian prince.. He need you to transfer some amount of money to collect royal fortune.. The email is quite funny actually

    • @anamagherusan853
      @anamagherusan853 4 года назад +1

      NEVER BE A HACKER THAT IS BAD

  • @thomasdamours7325
    @thomasdamours7325 6 лет назад +288

    "cyberwarfare" is great, but tbh, it's a missed opportunity to call it "world war web"

  • @theinquisitor18
    @theinquisitor18 7 лет назад +190

    Computer science student here. I have to say y'all really do take accuracy seriously. I really appreciate that.

  • @wrainexc1
    @wrainexc1 7 лет назад +246

    1:43 fake phishing mail. No spelling errors.

    • @KingsleyIII
      @KingsleyIII 7 лет назад +12

      @wrainexc1 "We have _recieved_ notice . . . " (should be "received").

    • @the80386
      @the80386 6 лет назад +5

      hi Im a nigerian prence

    • @justluc8556
      @justluc8556 6 лет назад +2

      Received is spelt wrong lol and not ALL phishing mails have spelling errors aha it really depends who sends it

    • @alexwang982
      @alexwang982 5 лет назад +1

      Also discrepency

    • @paololuckyluke2854
      @paololuckyluke2854 4 года назад

      KingsleyIII 🧐👏👏👏

  • @rebeccaadamson5972
    @rebeccaadamson5972 7 лет назад +303

    "Like John Green in College" he's going to need medical attention for that burn

    • @Kuroukaze
      @Kuroukaze 7 лет назад +7

      Someone should let Healthcare Triage know.

  • @mikelakner5622
    @mikelakner5622 7 лет назад +42

    I am really enjoying this series and I'm old enough to have punched cards and paper tape. Thank you for your time.

  • @masteringmui
    @masteringmui 7 лет назад +101

    As someone who self-taught programming and hacking, this video really surprised me in how plainly and coherently it expressed relatively advanced concepts like SQL injection. This course should be required in schools lol

    • @bobbob6252
      @bobbob6252 6 лет назад +10

      sql injection is advanced?

    • @Michael_Chandler_Keaton
      @Michael_Chandler_Keaton 5 лет назад +13

      Bob Bob Well considering the video is a tutorial, meaning most likely directed at those with little knowledge, then for the target audience, yes.

  • @eddokter
    @eddokter 7 лет назад +19

    I'm not certain if this was pointed out already or not, I just wanted to add a clarification. Zero Day Exploits are generally only errors that exist in a system "as shipped" in that a system will be vulnerable at Day Zero of run time. The difference being that patches and updates can include additional errors and exploits down the road. It's a small difference and doesn't detract from what's being said. I just felt the need to add in.

  • @skylervanderpool3522
    @skylervanderpool3522 7 лет назад +64

    "we're not going to teach you how to hack" this is the most clear explanation of hacking ive seen.

    • @worsethanjoerogan8061
      @worsethanjoerogan8061 7 лет назад +13

      skyler vanderpool I never understood that kind of thinking. "We'll teach you about comp sci but we won't fully explain hacking because you might become a hacker'.
      The knowledge itself isn't evil, like they ironically pointed out by mentioning white hats

    • @musashi939
      @musashi939 7 лет назад +2

      Dean Cutler well this was enough to show people how to think like an attacker. Not to mention most of the times those attacks don't work anymore. Buffer overflows, heap overflows and so on were much more prevalent 10 years ago. Now you usually have to chain exploits together to get anywhere. A very fascinating technique to get around DEP / W^X is return oriented programming / return-to-libc. But I digress.

    • @Mostlyharmless1985
      @Mostlyharmless1985 7 лет назад +4

      If you think any thing you saw in this will lead to a successful breach I’d love to know.
      Everything short of social engineering is pretty much the most crude example so you get the idea.
      It really is true that most hacking is done by calling up random in the company and saying “Hello, this is the password inspector, your account has come under audit. I need you to do some things for me...”

    • @srenkoch6127
      @srenkoch6127 7 лет назад +3

      Yea, or the more often call (in bad broken english with Indian or Pakistani accent and with traffic noise in the background as if the call is being made form a corner internet cafe):
      'This is XXXX from Microsoft support. We have detected that you have a problem with your computer... '
      (Most hilarious when you have not had a windows PC for more than 5 years).
      Has happened for me at least 3 times and I live in Denmark, so the bad English is often a dead giveaway.

    • @zephyfoxy
      @zephyfoxy 7 лет назад +6

      I think they usually say that mostly because you don't just teach hacking in a single, 12 minute video lol. I studied for the CEH for about a year before I could pass that test and I still can't hack anything that isn't deliberately weakened to be vulnerable.

  • @Pamgin
    @Pamgin 7 лет назад +59

    I loved the XKCD reference to johnny droptables

    • @ianrbuck
      @ianrbuck 7 лет назад +9

      Pamgin Little Bobby Tables!

  • @radagastwiz
    @radagastwiz 7 лет назад +48

    Surprise voice cameo by Emily Graslie! Nicely done.

  • @FrancoisBothaZA
    @FrancoisBothaZA 7 лет назад +11

    Thanks for mentioning social engineering. I get so frustrated when people don't protect their credentials and then say they've been hacked, as if to no fault of their own.

  • @stachowi
    @stachowi 6 лет назад +2

    Anyone else notice "Ghost in the Wires" on the shelf? The attention to detail in this series is tremendous... well done.

  • @microbuilder
    @microbuilder 7 лет назад +100

    Wait....are you saying the movie Hackers wasnt realistic?!

    • @musashi939
      @musashi939 7 лет назад +3

      microbuilder well. In hackers they showed a few things that were real (like phreaking). So it was more realistic than others, to be fair.

    • @SaberusTerras
      @SaberusTerras 7 лет назад +1

      Sneakers was much closer to reality.

    • @Mostlyharmless1985
      @Mostlyharmless1985 7 лет назад +2

      The Matrix Reloaded had more realistic hacking than that movie. I’m not even being hyperbolic.

    • @microbuilder
      @microbuilder 7 лет назад

      Hackers was a fun movie, I had completely forgotten about Sneakers...

    • @musashi939
      @musashi939 7 лет назад +1

      Saberus Terras sneakers was awesome, except the crypto stuff was completely wrong, but that is my hindsight after I attended a cryptography lecture a few years ago

  • @avnishchate3070
    @avnishchate3070 4 года назад +15

    Me : Clicks on the hacking video from cc to hack
    Carie : "We are not gonna teach u that"

  • @MuhammadAhmed-wh5kv
    @MuhammadAhmed-wh5kv 5 лет назад +2

    Watching this again after one year, and it's still the best for me!

  • @Julibeansreads
    @Julibeansreads 7 лет назад +118

    The man in Black from Westworld in the thumbnail 👍

  • @rareroe305
    @rareroe305 7 лет назад +9

    Yay, new Crash Course episode!
    Oh wait, hang on, I've got an email from the Prince of Nigeria.

  • @rogerbruce2896
    @rogerbruce2896 9 месяцев назад +1

    oh wow, that old Mac in the background lol. great episode, even though it was 6 years ago helps with understanding the basics.

  • @ianrbuck
    @ianrbuck 7 лет назад +9

    That XKCD reference made me laugh so hard!

  • @kohnenjk
    @kohnenjk 7 лет назад +2

    I'm assuming the SQL injection script is wrong intentionally. Well done CrashCourse. Programmers, pro tip, always use parameter based query statements for your dynamic queries, not string concatenation.

  • @AlexKCheung
    @AlexKCheung 5 лет назад +10

    9:44 Microsoft seems to be doing a good job with its 24/7 updates.

  • @coffeeabernethy2823
    @coffeeabernethy2823 7 лет назад +3

    Love the XKCD reference.

  • @shayanshamsi7540
    @shayanshamsi7540 7 лет назад +5

    I have an IT test on Thursday. Completed this series in a week. Much confident now ! Thanks !

  • @itzedric
    @itzedric 4 года назад +18

    Me Before watching this video: Meh The update can wait and my antivirus will just automatically notify me if there is a malware or trojan or virus
    Me After Watching this video: *Checks if there is an update every 1 hour* and *constantly does full scans on my antivirus software*

  • @ScottKorin
    @ScottKorin 7 лет назад +1

    The example SQL injection will cause a syntax error because of the remaining single quote. The text being injected should have included a comment symbol at the end (--) to comment out any SQL that would have come after the injected text.

  • @boglenight1551
    @boglenight1551 Год назад +1

    Honestly comparing the internet to the Wild West seems to make sense more the more I learn about cyber security

  • @GeektoStudios
    @GeektoStudios 7 лет назад +1

    Recognizing the animations in these videos is always fun.
    I'm not going to risk a spoiler and will withhold where the white hat and black hat cowboys come from. But it says alot about the perception and self perception of white and black hat hackers

  • @brod2man
    @brod2man 7 лет назад +2

    Wow, randomly clicked on this video with no background whatsover. So interesting
    Thanks

  • @Hex-Scholar
    @Hex-Scholar Год назад

    The username / login part where a query gets entered to exploit data, but limit on the number of characters allowed in the username field cannot prevent that ?
    A query to look up (with a condition) usually has:
    SELECT (6)
    FROM (4)
    WHERE (5)
    This becomes 15, considering each column name is just 2 letter even then it becomes 2*3 = 6.
    15+6 = 21 Characters.
    If only A-Za-z1-9, with a max length of 15 we could say we have 122,131,734,269,895 unique combinations if I am not wrong!

  • @electroninja8768
    @electroninja8768 7 лет назад +11

    That single quote at the beginning of your SQL injection shouldn't be there. The way you wrote it, it would be parsed as (''whatever'; DROP TABLE users;') and would surely give a syntax error without causing any damage. The user name should be whatever'; DROP TABLE users;' . Notice the lack of the initial quote

    • @zephyfoxy
      @zephyfoxy 7 лет назад +2

      And that's why I need to study more SQL XD I didn't even catch that error.

    • @electroninja8768
      @electroninja8768 7 лет назад +3

      The rest of the video was awesome though. I was quite impressed.

  • @yowo6105
    @yowo6105 7 лет назад +2

    I've experienced a hacking attempt (through malware) one time, and it's so scary. Suddenly all kinds of pictures were being downloaded on my laptop while I wasn't doing anything. I turned off my laptop so fast... After that I started deleting all the suspicious looking files and I've run a malware hunter for about 8 times so I was sure nothing was left. I don't know if I did it right, but I never experienced anything like that again.

    • @SuperMerlin100
      @SuperMerlin100 7 лет назад +1

      Turning off the connection is also a good idea.

  • @Hamheadon
    @Hamheadon 2 года назад

    And now I shall look at the "remind me tomorrow" option of mac updates in a different light

  • @ericoschmitt
    @ericoschmitt 2 года назад

    She spoke about upcoming cyber warfare, and in 2022 here it is!

  • @mebibyte9347
    @mebibyte9347 7 лет назад +1

    Was that an XKCD reference with the stick person because you're talking about sanitizing your input fields?

  • @typograf62
    @typograf62 7 лет назад

    "Sanitizing input" will not work if you forget it just once. And not allowing special characters sound pretty "fake line of defence".

  • @atenakitabi3769
    @atenakitabi3769 6 лет назад +4

    I just turned my anti virus on after watching this video. Thanks for awareness on cyber security, and great video as well!

  • @marcopolo2418
    @marcopolo2418 Год назад

    2:34 Oh no! You should take that call and check your settings. Lol

  • @thomvangestel1906
    @thomvangestel1906 6 лет назад +1

    leuke video lil pump ga zo door schat.

  • @noahhounshel104
    @noahhounshel104 7 лет назад +7

    7:50 is actually technically incorrect. The username would **not** start with a '.
    Just a small quibble :)

  • @shakilalam6126
    @shakilalam6126 6 лет назад

    You should give link of previous or when available next video link in description

  • @TheJulioToboso
    @TheJulioToboso 6 лет назад +1

    Drop Tables. We call him Bobby Tables
    XKCD is lovely

  • @kasakai7215
    @kasakai7215 7 лет назад +1

    This is amazing! Thank you

  • @andreyrumming6842
    @andreyrumming6842 6 лет назад

    "The stereotypical view of a hacker is some unpopular kid sitting in a dark room full of discarded pizza boxes". Umm, that describes me perfectly, and I code and program for fun...

  • @prodri20pr
    @prodri20pr Год назад

    Love the Westworld reference

  • @sjwimmel
    @sjwimmel 7 лет назад

    NIce video! Your SQL injection won't work though, there's a single quote at the start of the username. It'll stop listening after that.

  • @FredoCorleone
    @FredoCorleone 6 лет назад +1

    What a beautiful Carrie Anne in this episode :)

  • @RafaelRojas1181
    @RafaelRojas1181 7 лет назад +10

    Bobby tables strikes again!

    • @Robs_fan
      @Robs_fan 7 лет назад

      Oh wow such an obscure reference, no one has ever read an xkcd comic ever, so edgy!

  • @Aeleas
    @Aeleas 7 лет назад

    I'm a little surprised there was no mention of Defcon.

    • @feryth
      @feryth 7 лет назад

      ... they did last episode.

  • @mrsaidulhasan
    @mrsaidulhasan 4 года назад

    I'm a big fan of your. Love yoyr teaching methodology and love you.

  • @greenghost2008
    @greenghost2008 7 лет назад +16

    2:30 those damn canadian hackers.

  • @brendaspielvogel6348
    @brendaspielvogel6348 4 года назад +2

    Everybody gangsta till the Indian man downloads a rat on your windows 69

  • @frencheneesz
    @frencheneesz 7 лет назад +2

    5:29 "Arbitarily" - british slang I don't know about? Great info tho! Especially appreciate the emphasis on social engineering and the indfo about NAND mirroring!

  • @PatrickCrosman
    @PatrickCrosman 7 лет назад +164

    "Oh yes, Little Bobby Tables, we call him." (Thumbs up if you know the reference)

    • @Robs_fan
      @Robs_fan 7 лет назад +1

      I know the reference, xkcd is an overrated piece of poo. And I didn't thumb up your comment, quite the opposite. Kid.

    • @ipheclekennedy
      @ipheclekennedy 7 лет назад +27

      totalnastoka you must be fun at parties

    • @Robs_fan
      @Robs_fan 7 лет назад +2

      Ye.

    • @LeoMRogers
      @LeoMRogers 7 лет назад +7

      You know the thumbs down button does nothing, right?

    • @angeldude101
      @angeldude101 7 лет назад +10

      Mrs Roberts visible at 7:40

  • @johnatwood1007
    @johnatwood1007 7 лет назад +2

    Love this series.

  • @artstechnology7809
    @artstechnology7809 Год назад

    Respect for you sister genius. 😊😊😊😊☺

  • @varunahlawat9013
    @varunahlawat9013 2 года назад

    Ohh, my computer's CPU usage is always 100%, not even 99% but just 100%. When I build it, the CPU usage used to be around 5%! I have fairly powerful CPU ryzen5 3600X, and I feel that it is Botnet attack. I didn't know that before watching this vide, thanks!

  • @trickythomy
    @trickythomy 7 лет назад +1

    Awesome job on this video! :)

  • @zephyfoxy
    @zephyfoxy 7 лет назад

    Hmm, using a username and password field for the buffer overflow example could be a little confusing and misleading. Of course a real buffer overflow is more complicated to explain, but one could misconstrue that example and take it literally and think that hackers can break into a system just by typing long passwords. At least it is simple and understandable as an example.

  • @CassyFilms
    @CassyFilms 7 лет назад +1

    Been waiting for this!!!

  • @Nasxtye
    @Nasxtye 7 лет назад +4

    This is really helpful for me, was about to make user login that is vulnerable to code injection 😂

    • @madkinggaming3744
      @madkinggaming3744 5 лет назад

      Nasx always sanitize your inputs. XSS is still one of the most common vulnerabilities.

  • @eyreland
    @eyreland 7 лет назад

    As of the time of posting, the PBS KODI PBS Application does not have this episode.

  • @bernardonobrega-pizzaia8000
    @bernardonobrega-pizzaia8000 4 года назад

    White hat is the name of an item in rocket league only given to people who are good and let the people of the company know of hacks and glitches that people can do. This is the rarest item in rocket league and the price to get one from one of the people that got it is over 100 dollars. The owners of the game quickly patch glitches and hacks up and give the people that advised them a white hat. To this day there are only about 10 hats given to people and it is a legendary honor to ever equip one of those hats on your car.

    • @bernardonobrega-pizzaia8000
      @bernardonobrega-pizzaia8000 4 года назад

      I hope one day rocket league adds a black hat item into the game- an item that only the malicious and bad people can get. Then the item would be permanently equipped to their car and rocket league would find all the accounts this single person has and equip black hats to them. I think that would be very cool.

  • @antivanti
    @antivanti 7 лет назад

    There are two kinds of organizations. Those who know that they're security has been compromised... and those who don't know.

  • @dr.abubakrahmed4618
    @dr.abubakrahmed4618 6 лет назад

    thank you it's great video, well done

  • @AthAthanasius
    @AthAthanasius 7 лет назад +2

    I could understand not correctly terminating the SQL injection text with "--", which denotes the rest of the text being an SQL comment and gets around the issue of that dangling '; on the end...
    ... but the real way to protect against SQL injection isn't to restrict the characters that a user can enter, or to attempt to sanitise the input (are you sure you're always doing it? Always using the same method? Are you covering all the possible gotchas ? If translating to a different format is the reverse operation always used on output as needed?). No, it's to use a prepared statement so that you're not naively building a string for the command, but instead denoting where there will be input and then passing that input separately.
    $query_password = $db->prepare('SELECT password FROM users WHERE user = ?'
    $password = $query_password->execute($input_user)
    This will result in the query effectively being:
    SELECT password FROM users WHERE user ="'whatever'; DROP TABLE users;"
    and, assuming there's no user called ""'whatever'; DROP TABLE users;", it will simply result in "no user found". Note that, no, you can't just put double-quotes (which I only used to make the above line clear) in the user field to get around this as it works by telling the database that the thing to match against for "user = ?" is literally "what's in this buffer", no quote-delimiting going on.

    • @AthAthanasius
      @AthAthanasius 7 лет назад

      That is not to say that input sanitisation shouldn't be performed. You'd want to at least do some sanity check on the length of the input from the form fields, for example. But denying "special characters" in passwords is just narrowing the possible selection of passwords.

  • @Hofftari
    @Hofftari 7 лет назад

    0:34 Westworld reference! :D

  • @mirosawpiskorz9820
    @mirosawpiskorz9820 5 лет назад

    good video. thanks

  • @firenationfiles2063
    @firenationfiles2063 6 лет назад +1

    But updates take so long or fill up storage...

  • @lightbenderga2017
    @lightbenderga2017 7 лет назад

    But What If You Get A Fake Update For Fake Security? How Do You Tackle That?

  • @mohamedraafat7479
    @mohamedraafat7479 5 лет назад

    very helpful thank you

  • @amreladawy3784
    @amreladawy3784 7 лет назад

    Why did you mention bitcoin mining as a usage for a botnet? It’s ridicules as the current hash rate needed is way much bigger than botnets.

  • @Barnardrab
    @Barnardrab 7 лет назад +14

    Who's idea was it to connect vital infrastructure through the Internet anyways? It seems like common sense to not do that.

    • @Vandrithable
      @Vandrithable 7 лет назад +4

      Makes things a lot easier to administer and you can aggregate data about distributed systems easier. Connecting vital infrastructure over the Internet isn't necessarily bad... the problem arises when systems that were NEVER intended for these environments are now being used in them.

    • @chiblast100x
      @chiblast100x 7 лет назад +2

      +Vandrithable To be fair, in places like the US a lot of those infrastructural systems were never designed with such vulnerabilities in mind and the costs in terms of manhours and money to upgrade them are far from insignificant leading to very slow progress on doing so leaving such potential vulnerabilities in place in the mean time.

    • @chiblast100x
      @chiblast100x 7 лет назад +3

      +Mike Meyer When TCP/IP was being first designed back in the '70s, Cerf and Kahn apparently wanted to include encryption at the packet level, but on top of significant technical issues (computing speed during the era and the need to keep it from interfering with other computing tasks among them) there were concerns from DARPA and the NSA, among other government interests, about deploying such tech on a public or commercial network which even then seemed like it'd be part of the future uses of such tech. Such concerns, while understandable in the geopolitical climate of that era, are a major reason security got pushed to the end user (both server and client side) rather than where it belongs embedded in the protocols themselves.
      That aside there was plenty of thought toward security from the '60s through '80s, but it was from a more military focused mindset and concerns about someone with legit access to and working knowledge of these networks committing malicious acts didn't even really come up until the late '80s when Morris made his worm.

    • @KuriusOranj
      @KuriusOranj 7 лет назад +1

      He never claimed to have invented the Internet.
      www.snopes.com/quotes/internet.asp

    • @greenredblue
      @greenredblue 7 лет назад

      Barnard Rabenold "Who thought it would be a good idea to hook up vital systems to the internet?"
      Lol, DARPA.
      To be fair, they never planned to use the internet for NON-vital systems, so...

  • @learnwithharry8971
    @learnwithharry8971 6 лет назад

    Hi I just embed this video and the previous one. thanks

  • @shahzadkhoja2228
    @shahzadkhoja2228 7 лет назад

    can we a have an episode on bitcoins?

  • @TheJamesRedwood
    @TheJamesRedwood 7 лет назад

    DO NOT LOAD THE CURRENT IPHONE OS UPDATE! None of my apps connect to their severs now.

  • @pranaymarella2260
    @pranaymarella2260 6 лет назад

    Great teacher!

  • @Sachin-tx6qe
    @Sachin-tx6qe Год назад +2

    the majority of hacks are socially engineered . . .

  • @KokahZ777
    @KokahZ777 5 лет назад

    So you are telling me that for all this time I could have put billions of '1's in the password field to gain adming access to a website

  • @tomscisci7331
    @tomscisci7331 6 лет назад

    Hey, is there a web which tracks cyberattacks in real time?

  • @blackholesun4942
    @blackholesun4942 Год назад

    Understood most 😁

  • @Wheezr
    @Wheezr 7 лет назад +2

    "Describe John Green in college." HAHAHAHAHAHA

  • @MegaGangsta4life
    @MegaGangsta4life 6 лет назад +1

    0:55 Damn, came at his life xD

  • @agatacymerman7083
    @agatacymerman7083 4 года назад

    Hi, i learnt something from your videos, but the speed you talk is too fast especially for someone who is very new to all cyber security

  • @RibbittIII
    @RibbittIII 6 лет назад

    So that email with only one word was bad?

  • @harrytyarrah
    @harrytyarrah 5 лет назад

    When she said "John Green "!!😀😄😍

  • @artemedutech
    @artemedutech 7 лет назад

    so glad they didn't mention russian hackers

  • @marcopolo2418
    @marcopolo2418 Год назад

    4:34 Where I started to get lost lol

  • @alisawari0
    @alisawari0 4 года назад

    8:53 No need honey, we already know how to

  • @PedroSantos-fw6gk
    @PedroSantos-fw6gk 7 лет назад

    Imagine a Call of Duty Cyber Warfare, how would the gameplay be?

  • @meanmikebojak1087
    @meanmikebojak1087 6 лет назад

    Not trying to gain access or anything. Just saying you look nice in that top.

  • @anardart115
    @anardart115 4 года назад

    Whoa is that a creeper figurine? *like*

  • @kirbymarchbarcena
    @kirbymarchbarcena 7 лет назад +4

    Hacking is hard to counter, but some hackers were employed by companies to determine their system's vulnerabilities.

  • @UnbelievablyGauche
    @UnbelievablyGauche 7 лет назад

    Thankfully a crash course video where the presenter doesn’t speak at a hundred miles an hour and stops to take the occasional breath.

  • @ihartevil
    @ihartevil 6 лет назад

    then there are the state reps that can just hack in whenever they want to because they can
    i am not to pissed off at the state rep for doing that just more annoyed especially since he knows the NSA is interested in me
    thx for this awesomely ha bisky vid i love this series

  • @controlequebrado4455
    @controlequebrado4455 6 лет назад

    if you want to be hackers there is a book that touch dome of the basics of being a jacker called "Hacking the art of exploitation"

  • @yashguptta
    @yashguptta 6 лет назад

    Hey can you please send me the link of your thumbnail of this video.
    Thank you!

  • @techhackzone5966
    @techhackzone5966 6 лет назад

    aap kis aap se edit krte ho