All language subtitles for 0103 Why Do We Hack

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian Download
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,500 --> 00:00:05,200 in this lesson we'll be talking about 2 00:00:02,560 --> 00:00:05,200 3 00:00:02,570 --> 00:00:07,670 why you may want to learn to hack 4 00:00:05,190 --> 00:00:07,670 5 00:00:05,200 --> 00:00:11,480 sometimes you may want to hack just for 6 00:00:07,660 --> 00:00:11,480 7 00:00:07,670 --> 00:00:13,400 fun as discussed previously hacking is a 8 00:00:11,470 --> 00:00:13,400 9 00:00:11,480 --> 00:00:17,869 tradition that goes back several decades 10 00:00:13,390 --> 00:00:17,869 11 00:00:13,400 --> 00:00:21,410 at MIT even preceding the computer 12 00:00:17,859 --> 00:00:21,410 13 00:00:17,869 --> 00:00:24,039 related definition of hacking MIT has a 14 00:00:21,400 --> 00:00:24,039 15 00:00:21,410 --> 00:00:26,510 long and storied history of hacking 16 00:00:24,029 --> 00:00:26,510 17 00:00:24,039 --> 00:00:28,609 sometimes of a computer related nature 18 00:00:26,500 --> 00:00:28,609 19 00:00:26,510 --> 00:00:31,160 which in this case happens to be true 20 00:00:28,599 --> 00:00:31,160 21 00:00:28,609 --> 00:00:34,460 sometimes of a non computer related 22 00:00:31,150 --> 00:00:34,460 23 00:00:31,160 --> 00:00:37,489 instance here mi t's home page has been 24 00:00:34,450 --> 00:00:37,489 25 00:00:34,460 --> 00:00:40,579 hacked or you might say defaced to 26 00:00:37,479 --> 00:00:40,579 27 00:00:37,489 --> 00:00:43,550 indicate that disney is buying MIT this 28 00:00:40,569 --> 00:00:43,550 29 00:00:40,579 --> 00:00:45,590 was an April Fool's Day prank in 1998 30 00:00:43,540 --> 00:00:45,590 31 00:00:43,550 --> 00:00:48,649 and again this is just kind of for the 32 00:00:45,580 --> 00:00:48,649 33 00:00:45,590 --> 00:00:51,440 fun of it sometimes you want to make a 34 00:00:48,639 --> 00:00:51,440 35 00:00:48,649 --> 00:00:54,770 social or political point in this case 36 00:00:51,430 --> 00:00:54,770 37 00:00:51,440 --> 00:00:58,010 again MIT Bill Gates donated some money 38 00:00:54,760 --> 00:00:58,010 39 00:00:54,770 --> 00:01:02,149 that allowed MIT to have a new building 40 00:00:58,000 --> 00:01:02,149 41 00:00:58,010 --> 00:01:04,970 he was coming to MIT to visit and to 42 00:01:02,139 --> 00:01:04,970 43 00:01:02,149 --> 00:01:09,290 speak and the Microsoft Windows systems 44 00:01:04,960 --> 00:01:09,290 45 00:01:04,970 --> 00:01:12,530 that were installed in the entryway at 46 00:01:09,280 --> 00:01:12,530 47 00:01:09,290 --> 00:01:15,500 the building were hacked to be running 48 00:01:12,520 --> 00:01:15,500 49 00:01:12,530 --> 00:01:17,360 Linux instead and you can see here tux 50 00:01:15,490 --> 00:01:17,360 51 00:01:15,500 --> 00:01:19,640 the penguin is saying welcome to the 52 00:01:17,350 --> 00:01:19,640 53 00:01:17,360 --> 00:01:21,890 william h gates building again that's 54 00:01:19,630 --> 00:01:21,890 55 00:01:19,640 --> 00:01:25,430 some students who decided they wanted to 56 00:01:21,880 --> 00:01:25,430 57 00:01:21,890 --> 00:01:29,689 make a point about linux and microsoft 58 00:01:25,420 --> 00:01:29,689 59 00:01:25,430 --> 00:01:31,970 and windows to Bill Gates sometimes you 60 00:01:29,679 --> 00:01:31,970 61 00:01:29,689 --> 00:01:35,090 hack just for the challenge here's an 62 00:01:31,960 --> 00:01:35,090 63 00:01:31,970 --> 00:01:38,450 example again at MIT where some students 64 00:01:35,080 --> 00:01:38,450 65 00:01:35,090 --> 00:01:42,170 turned the facade of a building into a 66 00:01:38,440 --> 00:01:42,170 67 00:01:38,450 --> 00:01:44,869 Tetris game board this was a reasonably 68 00:01:42,160 --> 00:01:44,869 69 00:01:42,170 --> 00:01:46,430 difficult hack and the students went 70 00:01:44,859 --> 00:01:46,430 71 00:01:44,869 --> 00:01:48,110 after it just for the challenge of 72 00:01:46,420 --> 00:01:48,110 73 00:01:46,430 --> 00:01:50,030 completing it just so they could have 74 00:01:48,100 --> 00:01:50,030 75 00:01:48,110 --> 00:01:52,520 some pride of ownership and to be able 76 00:01:50,020 --> 00:01:52,520 77 00:01:50,030 --> 00:01:55,490 to say that they were able to pull this 78 00:01:52,510 --> 00:01:55,490 79 00:01:52,520 --> 00:01:58,549 off in spite of its difficulties and its 80 00:01:55,480 --> 00:01:58,549 81 00:01:55,490 --> 00:02:01,280 challenges and all of the obstacles and 82 00:01:58,539 --> 00:02:01,280 83 00:01:58,549 --> 00:02:03,229 planning that had to go into it and they 84 00:02:01,270 --> 00:02:03,229 85 00:02:01,280 --> 00:02:05,540 were able to pull it off and they have 86 00:02:03,219 --> 00:02:05,540 87 00:02:03,229 --> 00:02:07,219 those bragging rights now so that was 88 00:02:05,530 --> 00:02:07,219 89 00:02:05,540 --> 00:02:08,929 one that was just for the challenge of 90 00:02:07,209 --> 00:02:08,929 91 00:02:07,219 --> 00:02:10,879 doing it 92 00:02:08,919 --> 00:02:10,879 93 00:02:08,929 --> 00:02:13,159 sometimes you want a hack to prevent 94 00:02:10,869 --> 00:02:13,159 95 00:02:10,879 --> 00:02:15,469 theft and this is where we get more 96 00:02:13,149 --> 00:02:15,469 97 00:02:13,159 --> 00:02:18,079 specifically into computer related 98 00:02:15,459 --> 00:02:18,079 99 00:02:15,469 --> 00:02:20,120 hacking you'll see a lot of articles and 100 00:02:18,069 --> 00:02:20,120 101 00:02:18,079 --> 00:02:23,540 stories in the news over the last few 102 00:02:20,110 --> 00:02:23,540 103 00:02:20,120 --> 00:02:25,609 years about cybercrime and here's an 104 00:02:23,530 --> 00:02:25,609 105 00:02:23,540 --> 00:02:27,950 example data theft compromised fewer 106 00:02:25,599 --> 00:02:27,950 107 00:02:25,609 --> 00:02:30,049 than one and a half million cards for 108 00:02:27,940 --> 00:02:30,049 109 00:02:27,950 --> 00:02:32,750 global payments so there are some 110 00:02:30,039 --> 00:02:32,750 111 00:02:30,049 --> 00:02:34,489 attackers who got into this company 112 00:02:32,740 --> 00:02:34,489 113 00:02:32,750 --> 00:02:36,799 global payments and they were able to 114 00:02:34,479 --> 00:02:36,799 115 00:02:34,489 --> 00:02:39,799 pull about a million and a half credit 116 00:02:36,789 --> 00:02:39,799 117 00:02:36,799 --> 00:02:41,959 card numbers during an intrusion there 118 00:02:39,789 --> 00:02:41,959 119 00:02:39,799 --> 00:02:44,120 so what you may want to do is you may 120 00:02:41,949 --> 00:02:44,120 121 00:02:41,959 --> 00:02:46,639 want to learn how to hack in order to 122 00:02:44,110 --> 00:02:46,639 123 00:02:44,120 --> 00:02:49,700 find holes in your own systems or 124 00:02:46,629 --> 00:02:49,700 125 00:02:46,639 --> 00:02:52,609 applications or your employer systems or 126 00:02:49,690 --> 00:02:52,609 127 00:02:49,700 --> 00:02:55,459 applications so that you can fix those 128 00:02:52,599 --> 00:02:55,459 129 00:02:52,609 --> 00:02:57,769 holes and prevent these compromises from 130 00:02:55,449 --> 00:02:57,769 131 00:02:55,459 --> 00:02:59,959 happening because of the reputation will 132 00:02:57,759 --> 00:02:59,959 133 00:02:57,769 --> 00:03:02,930 hit that your company would have to take 134 00:02:59,949 --> 00:03:02,930 135 00:02:59,959 --> 00:03:05,299 or because of the loss of customers or 136 00:03:02,920 --> 00:03:05,299 137 00:03:02,930 --> 00:03:07,040 because that loss of customers may 138 00:03:05,289 --> 00:03:07,040 139 00:03:05,299 --> 00:03:08,480 eventually lead to the company going out 140 00:03:07,030 --> 00:03:08,480 141 00:03:07,040 --> 00:03:11,000 of business which means you lose your 142 00:03:08,470 --> 00:03:11,000 143 00:03:08,480 --> 00:03:12,590 job so here's a good reason to hack you 144 00:03:10,990 --> 00:03:12,590 145 00:03:11,000 --> 00:03:14,720 may want to find all of the problems 146 00:03:12,580 --> 00:03:14,720 147 00:03:12,590 --> 00:03:17,720 that exist in your systems before 148 00:03:14,710 --> 00:03:17,720 149 00:03:14,720 --> 00:03:20,060 putting them out and deploying them so 150 00:03:17,710 --> 00:03:20,060 151 00:03:17,720 --> 00:03:22,729 that you can keep these attackers from 152 00:03:20,050 --> 00:03:22,729 153 00:03:20,060 --> 00:03:25,760 getting in and stealing critical or 154 00:03:22,719 --> 00:03:25,760 155 00:03:22,729 --> 00:03:27,260 sensitive information sometimes you may 156 00:03:25,750 --> 00:03:27,260 157 00:03:25,760 --> 00:03:29,689 want to hack to get there before the bad 158 00:03:27,250 --> 00:03:29,689 159 00:03:27,260 --> 00:03:31,639 guys same sort of ideas the last one we 160 00:03:29,679 --> 00:03:31,639 161 00:03:29,689 --> 00:03:33,079 were just talking about here's some 162 00:03:31,629 --> 00:03:33,079 163 00:03:31,639 --> 00:03:35,840 attack code that was published for 164 00:03:33,069 --> 00:03:35,840 165 00:03:33,079 --> 00:03:38,389 critical Internet Explorer flaw there 166 00:03:35,830 --> 00:03:38,389 167 00:03:35,840 --> 00:03:41,299 are a number of people in the world who 168 00:03:38,379 --> 00:03:41,299 169 00:03:38,389 --> 00:03:43,699 go out looking for these flaws they call 170 00:03:41,289 --> 00:03:43,699 171 00:03:41,299 --> 00:03:45,530 themselves security researchers they get 172 00:03:43,689 --> 00:03:45,530 173 00:03:43,699 --> 00:03:48,049 in touch with vendors after they found a 174 00:03:45,520 --> 00:03:48,049 175 00:03:45,530 --> 00:03:51,079 flaw or a bug and work with the vendor 176 00:03:48,039 --> 00:03:51,079 177 00:03:48,049 --> 00:03:53,810 to get it fixed what they end up with is 178 00:03:51,069 --> 00:03:53,810 179 00:03:51,079 --> 00:03:56,449 a bit of a reputation they get a name 180 00:03:53,800 --> 00:03:56,449 181 00:03:53,810 --> 00:03:59,780 for themselves that name recognition may 182 00:03:56,439 --> 00:03:59,780 183 00:03:56,449 --> 00:04:02,689 end up getting them a job or some 184 00:03:59,770 --> 00:04:02,689 185 00:03:59,780 --> 00:04:06,019 speaking engagements or a book deal any 186 00:04:02,679 --> 00:04:06,019 187 00:04:02,689 --> 00:04:08,930 number of ways that you could cash in on 188 00:04:06,009 --> 00:04:08,930 189 00:04:06,019 --> 00:04:12,379 name recognition from finding these 190 00:04:08,920 --> 00:04:12,379 191 00:04:08,930 --> 00:04:13,609 sorts of bugs and getting them fixed if 192 00:04:12,369 --> 00:04:13,609 193 00:04:12,379 --> 00:04:15,470 you want to get there before the bad 194 00:04:13,599 --> 00:04:15,470 195 00:04:13,609 --> 00:04:18,200 guys you may think you're helping out a 196 00:04:15,460 --> 00:04:18,200 197 00:04:15,470 --> 00:04:20,870 vendor you may want to just make a name 198 00:04:18,190 --> 00:04:20,870 199 00:04:18,200 --> 00:04:22,470 for yourself and you want to find these 200 00:04:20,860 --> 00:04:22,470 201 00:04:20,870 --> 00:04:24,090 sorts of bugs before the bad guy 202 00:04:22,460 --> 00:04:24,090 203 00:04:22,470 --> 00:04:26,490 do because the thing about the bad guys 204 00:04:24,080 --> 00:04:26,490 205 00:04:24,090 --> 00:04:29,460 finding them is they don't announce them 206 00:04:26,480 --> 00:04:29,460 207 00:04:26,490 --> 00:04:33,330 they don't get them fixed and that makes 208 00:04:29,450 --> 00:04:33,330 209 00:04:29,460 --> 00:04:35,490 everybody a little less secure finally 210 00:04:33,320 --> 00:04:35,490 211 00:04:33,330 --> 00:04:37,650 may want to protect yourself hacked 212 00:04:35,480 --> 00:04:37,650 213 00:04:35,490 --> 00:04:42,210 companies fight cyber criminals this is 214 00:04:37,640 --> 00:04:42,210 215 00:04:37,650 --> 00:04:43,920 a news headline from jun 18 2012 we're 216 00:04:42,200 --> 00:04:43,920 217 00:04:42,210 --> 00:04:45,690 starting to see these sorts of news 218 00:04:43,910 --> 00:04:45,690 219 00:04:43,920 --> 00:04:47,460 headlines show up as companies are 220 00:04:45,680 --> 00:04:47,460 221 00:04:45,690 --> 00:04:50,070 starting to retaliate against attackers 222 00:04:47,450 --> 00:04:50,070 223 00:04:47,460 --> 00:04:52,350 in order to retaliate against attackers 224 00:04:50,060 --> 00:04:52,350 225 00:04:50,070 --> 00:04:55,010 you need to be able to have the same 226 00:04:52,340 --> 00:04:55,010 227 00:04:52,350 --> 00:04:57,210 sorts of skills and techniques and 228 00:04:55,000 --> 00:04:57,210 229 00:04:55,010 --> 00:04:59,790 knowledge and experience that those 230 00:04:57,200 --> 00:04:59,790 231 00:04:57,210 --> 00:05:01,770 attackers have where your company may 232 00:04:59,780 --> 00:05:01,770 233 00:04:59,790 --> 00:05:03,780 want you to learn to hack or the company 234 00:05:01,760 --> 00:05:03,780 235 00:05:01,770 --> 00:05:06,330 may want to bring in people who are 236 00:05:03,770 --> 00:05:06,330 237 00:05:03,780 --> 00:05:09,560 skilled at these sorts of activities so 238 00:05:06,320 --> 00:05:09,560 239 00:05:06,330 --> 00:05:13,320 that they can attack the attackers and 240 00:05:09,550 --> 00:05:13,320 241 00:05:09,560 --> 00:05:16,230 hopefully you end up with a more steely 242 00:05:13,310 --> 00:05:16,230 243 00:05:13,320 --> 00:05:19,500 exterior and you get a reputation for 244 00:05:16,220 --> 00:05:19,500 245 00:05:16,230 --> 00:05:22,050 not being a company that people want to 246 00:05:19,490 --> 00:05:22,050 247 00:05:19,500 --> 00:05:25,700 go after and those are several reasons 248 00:05:22,040 --> 00:05:25,700 249 00:05:22,050 --> 00:05:25,700 why you may want to hack 13626

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.