Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,500 --> 00:00:05,200
in this lesson we'll be talking about
2
00:00:02,560 --> 00:00:05,200
3
00:00:02,570 --> 00:00:07,670
why you may want to learn to hack
4
00:00:05,190 --> 00:00:07,670
5
00:00:05,200 --> 00:00:11,480
sometimes you may want to hack just for
6
00:00:07,660 --> 00:00:11,480
7
00:00:07,670 --> 00:00:13,400
fun as discussed previously hacking is a
8
00:00:11,470 --> 00:00:13,400
9
00:00:11,480 --> 00:00:17,869
tradition that goes back several decades
10
00:00:13,390 --> 00:00:17,869
11
00:00:13,400 --> 00:00:21,410
at MIT even preceding the computer
12
00:00:17,859 --> 00:00:21,410
13
00:00:17,869 --> 00:00:24,039
related definition of hacking MIT has a
14
00:00:21,400 --> 00:00:24,039
15
00:00:21,410 --> 00:00:26,510
long and storied history of hacking
16
00:00:24,029 --> 00:00:26,510
17
00:00:24,039 --> 00:00:28,609
sometimes of a computer related nature
18
00:00:26,500 --> 00:00:28,609
19
00:00:26,510 --> 00:00:31,160
which in this case happens to be true
20
00:00:28,599 --> 00:00:31,160
21
00:00:28,609 --> 00:00:34,460
sometimes of a non computer related
22
00:00:31,150 --> 00:00:34,460
23
00:00:31,160 --> 00:00:37,489
instance here mi t's home page has been
24
00:00:34,450 --> 00:00:37,489
25
00:00:34,460 --> 00:00:40,579
hacked or you might say defaced to
26
00:00:37,479 --> 00:00:40,579
27
00:00:37,489 --> 00:00:43,550
indicate that disney is buying MIT this
28
00:00:40,569 --> 00:00:43,550
29
00:00:40,579 --> 00:00:45,590
was an April Fool's Day prank in 1998
30
00:00:43,540 --> 00:00:45,590
31
00:00:43,550 --> 00:00:48,649
and again this is just kind of for the
32
00:00:45,580 --> 00:00:48,649
33
00:00:45,590 --> 00:00:51,440
fun of it sometimes you want to make a
34
00:00:48,639 --> 00:00:51,440
35
00:00:48,649 --> 00:00:54,770
social or political point in this case
36
00:00:51,430 --> 00:00:54,770
37
00:00:51,440 --> 00:00:58,010
again MIT Bill Gates donated some money
38
00:00:54,760 --> 00:00:58,010
39
00:00:54,770 --> 00:01:02,149
that allowed MIT to have a new building
40
00:00:58,000 --> 00:01:02,149
41
00:00:58,010 --> 00:01:04,970
he was coming to MIT to visit and to
42
00:01:02,139 --> 00:01:04,970
43
00:01:02,149 --> 00:01:09,290
speak and the Microsoft Windows systems
44
00:01:04,960 --> 00:01:09,290
45
00:01:04,970 --> 00:01:12,530
that were installed in the entryway at
46
00:01:09,280 --> 00:01:12,530
47
00:01:09,290 --> 00:01:15,500
the building were hacked to be running
48
00:01:12,520 --> 00:01:15,500
49
00:01:12,530 --> 00:01:17,360
Linux instead and you can see here tux
50
00:01:15,490 --> 00:01:17,360
51
00:01:15,500 --> 00:01:19,640
the penguin is saying welcome to the
52
00:01:17,350 --> 00:01:19,640
53
00:01:17,360 --> 00:01:21,890
william h gates building again that's
54
00:01:19,630 --> 00:01:21,890
55
00:01:19,640 --> 00:01:25,430
some students who decided they wanted to
56
00:01:21,880 --> 00:01:25,430
57
00:01:21,890 --> 00:01:29,689
make a point about linux and microsoft
58
00:01:25,420 --> 00:01:29,689
59
00:01:25,430 --> 00:01:31,970
and windows to Bill Gates sometimes you
60
00:01:29,679 --> 00:01:31,970
61
00:01:29,689 --> 00:01:35,090
hack just for the challenge here's an
62
00:01:31,960 --> 00:01:35,090
63
00:01:31,970 --> 00:01:38,450
example again at MIT where some students
64
00:01:35,080 --> 00:01:38,450
65
00:01:35,090 --> 00:01:42,170
turned the facade of a building into a
66
00:01:38,440 --> 00:01:42,170
67
00:01:38,450 --> 00:01:44,869
Tetris game board this was a reasonably
68
00:01:42,160 --> 00:01:44,869
69
00:01:42,170 --> 00:01:46,430
difficult hack and the students went
70
00:01:44,859 --> 00:01:46,430
71
00:01:44,869 --> 00:01:48,110
after it just for the challenge of
72
00:01:46,420 --> 00:01:48,110
73
00:01:46,430 --> 00:01:50,030
completing it just so they could have
74
00:01:48,100 --> 00:01:50,030
75
00:01:48,110 --> 00:01:52,520
some pride of ownership and to be able
76
00:01:50,020 --> 00:01:52,520
77
00:01:50,030 --> 00:01:55,490
to say that they were able to pull this
78
00:01:52,510 --> 00:01:55,490
79
00:01:52,520 --> 00:01:58,549
off in spite of its difficulties and its
80
00:01:55,480 --> 00:01:58,549
81
00:01:55,490 --> 00:02:01,280
challenges and all of the obstacles and
82
00:01:58,539 --> 00:02:01,280
83
00:01:58,549 --> 00:02:03,229
planning that had to go into it and they
84
00:02:01,270 --> 00:02:03,229
85
00:02:01,280 --> 00:02:05,540
were able to pull it off and they have
86
00:02:03,219 --> 00:02:05,540
87
00:02:03,229 --> 00:02:07,219
those bragging rights now so that was
88
00:02:05,530 --> 00:02:07,219
89
00:02:05,540 --> 00:02:08,929
one that was just for the challenge of
90
00:02:07,209 --> 00:02:08,929
91
00:02:07,219 --> 00:02:10,879
doing it
92
00:02:08,919 --> 00:02:10,879
93
00:02:08,929 --> 00:02:13,159
sometimes you want a hack to prevent
94
00:02:10,869 --> 00:02:13,159
95
00:02:10,879 --> 00:02:15,469
theft and this is where we get more
96
00:02:13,149 --> 00:02:15,469
97
00:02:13,159 --> 00:02:18,079
specifically into computer related
98
00:02:15,459 --> 00:02:18,079
99
00:02:15,469 --> 00:02:20,120
hacking you'll see a lot of articles and
100
00:02:18,069 --> 00:02:20,120
101
00:02:18,079 --> 00:02:23,540
stories in the news over the last few
102
00:02:20,110 --> 00:02:23,540
103
00:02:20,120 --> 00:02:25,609
years about cybercrime and here's an
104
00:02:23,530 --> 00:02:25,609
105
00:02:23,540 --> 00:02:27,950
example data theft compromised fewer
106
00:02:25,599 --> 00:02:27,950
107
00:02:25,609 --> 00:02:30,049
than one and a half million cards for
108
00:02:27,940 --> 00:02:30,049
109
00:02:27,950 --> 00:02:32,750
global payments so there are some
110
00:02:30,039 --> 00:02:32,750
111
00:02:30,049 --> 00:02:34,489
attackers who got into this company
112
00:02:32,740 --> 00:02:34,489
113
00:02:32,750 --> 00:02:36,799
global payments and they were able to
114
00:02:34,479 --> 00:02:36,799
115
00:02:34,489 --> 00:02:39,799
pull about a million and a half credit
116
00:02:36,789 --> 00:02:39,799
117
00:02:36,799 --> 00:02:41,959
card numbers during an intrusion there
118
00:02:39,789 --> 00:02:41,959
119
00:02:39,799 --> 00:02:44,120
so what you may want to do is you may
120
00:02:41,949 --> 00:02:44,120
121
00:02:41,959 --> 00:02:46,639
want to learn how to hack in order to
122
00:02:44,110 --> 00:02:46,639
123
00:02:44,120 --> 00:02:49,700
find holes in your own systems or
124
00:02:46,629 --> 00:02:49,700
125
00:02:46,639 --> 00:02:52,609
applications or your employer systems or
126
00:02:49,690 --> 00:02:52,609
127
00:02:49,700 --> 00:02:55,459
applications so that you can fix those
128
00:02:52,599 --> 00:02:55,459
129
00:02:52,609 --> 00:02:57,769
holes and prevent these compromises from
130
00:02:55,449 --> 00:02:57,769
131
00:02:55,459 --> 00:02:59,959
happening because of the reputation will
132
00:02:57,759 --> 00:02:59,959
133
00:02:57,769 --> 00:03:02,930
hit that your company would have to take
134
00:02:59,949 --> 00:03:02,930
135
00:02:59,959 --> 00:03:05,299
or because of the loss of customers or
136
00:03:02,920 --> 00:03:05,299
137
00:03:02,930 --> 00:03:07,040
because that loss of customers may
138
00:03:05,289 --> 00:03:07,040
139
00:03:05,299 --> 00:03:08,480
eventually lead to the company going out
140
00:03:07,030 --> 00:03:08,480
141
00:03:07,040 --> 00:03:11,000
of business which means you lose your
142
00:03:08,470 --> 00:03:11,000
143
00:03:08,480 --> 00:03:12,590
job so here's a good reason to hack you
144
00:03:10,990 --> 00:03:12,590
145
00:03:11,000 --> 00:03:14,720
may want to find all of the problems
146
00:03:12,580 --> 00:03:14,720
147
00:03:12,590 --> 00:03:17,720
that exist in your systems before
148
00:03:14,710 --> 00:03:17,720
149
00:03:14,720 --> 00:03:20,060
putting them out and deploying them so
150
00:03:17,710 --> 00:03:20,060
151
00:03:17,720 --> 00:03:22,729
that you can keep these attackers from
152
00:03:20,050 --> 00:03:22,729
153
00:03:20,060 --> 00:03:25,760
getting in and stealing critical or
154
00:03:22,719 --> 00:03:25,760
155
00:03:22,729 --> 00:03:27,260
sensitive information sometimes you may
156
00:03:25,750 --> 00:03:27,260
157
00:03:25,760 --> 00:03:29,689
want to hack to get there before the bad
158
00:03:27,250 --> 00:03:29,689
159
00:03:27,260 --> 00:03:31,639
guys same sort of ideas the last one we
160
00:03:29,679 --> 00:03:31,639
161
00:03:29,689 --> 00:03:33,079
were just talking about here's some
162
00:03:31,629 --> 00:03:33,079
163
00:03:31,639 --> 00:03:35,840
attack code that was published for
164
00:03:33,069 --> 00:03:35,840
165
00:03:33,079 --> 00:03:38,389
critical Internet Explorer flaw there
166
00:03:35,830 --> 00:03:38,389
167
00:03:35,840 --> 00:03:41,299
are a number of people in the world who
168
00:03:38,379 --> 00:03:41,299
169
00:03:38,389 --> 00:03:43,699
go out looking for these flaws they call
170
00:03:41,289 --> 00:03:43,699
171
00:03:41,299 --> 00:03:45,530
themselves security researchers they get
172
00:03:43,689 --> 00:03:45,530
173
00:03:43,699 --> 00:03:48,049
in touch with vendors after they found a
174
00:03:45,520 --> 00:03:48,049
175
00:03:45,530 --> 00:03:51,079
flaw or a bug and work with the vendor
176
00:03:48,039 --> 00:03:51,079
177
00:03:48,049 --> 00:03:53,810
to get it fixed what they end up with is
178
00:03:51,069 --> 00:03:53,810
179
00:03:51,079 --> 00:03:56,449
a bit of a reputation they get a name
180
00:03:53,800 --> 00:03:56,449
181
00:03:53,810 --> 00:03:59,780
for themselves that name recognition may
182
00:03:56,439 --> 00:03:59,780
183
00:03:56,449 --> 00:04:02,689
end up getting them a job or some
184
00:03:59,770 --> 00:04:02,689
185
00:03:59,780 --> 00:04:06,019
speaking engagements or a book deal any
186
00:04:02,679 --> 00:04:06,019
187
00:04:02,689 --> 00:04:08,930
number of ways that you could cash in on
188
00:04:06,009 --> 00:04:08,930
189
00:04:06,019 --> 00:04:12,379
name recognition from finding these
190
00:04:08,920 --> 00:04:12,379
191
00:04:08,930 --> 00:04:13,609
sorts of bugs and getting them fixed if
192
00:04:12,369 --> 00:04:13,609
193
00:04:12,379 --> 00:04:15,470
you want to get there before the bad
194
00:04:13,599 --> 00:04:15,470
195
00:04:13,609 --> 00:04:18,200
guys you may think you're helping out a
196
00:04:15,460 --> 00:04:18,200
197
00:04:15,470 --> 00:04:20,870
vendor you may want to just make a name
198
00:04:18,190 --> 00:04:20,870
199
00:04:18,200 --> 00:04:22,470
for yourself and you want to find these
200
00:04:20,860 --> 00:04:22,470
201
00:04:20,870 --> 00:04:24,090
sorts of bugs before the bad guy
202
00:04:22,460 --> 00:04:24,090
203
00:04:22,470 --> 00:04:26,490
do because the thing about the bad guys
204
00:04:24,080 --> 00:04:26,490
205
00:04:24,090 --> 00:04:29,460
finding them is they don't announce them
206
00:04:26,480 --> 00:04:29,460
207
00:04:26,490 --> 00:04:33,330
they don't get them fixed and that makes
208
00:04:29,450 --> 00:04:33,330
209
00:04:29,460 --> 00:04:35,490
everybody a little less secure finally
210
00:04:33,320 --> 00:04:35,490
211
00:04:33,330 --> 00:04:37,650
may want to protect yourself hacked
212
00:04:35,480 --> 00:04:37,650
213
00:04:35,490 --> 00:04:42,210
companies fight cyber criminals this is
214
00:04:37,640 --> 00:04:42,210
215
00:04:37,650 --> 00:04:43,920
a news headline from jun 18 2012 we're
216
00:04:42,200 --> 00:04:43,920
217
00:04:42,210 --> 00:04:45,690
starting to see these sorts of news
218
00:04:43,910 --> 00:04:45,690
219
00:04:43,920 --> 00:04:47,460
headlines show up as companies are
220
00:04:45,680 --> 00:04:47,460
221
00:04:45,690 --> 00:04:50,070
starting to retaliate against attackers
222
00:04:47,450 --> 00:04:50,070
223
00:04:47,460 --> 00:04:52,350
in order to retaliate against attackers
224
00:04:50,060 --> 00:04:52,350
225
00:04:50,070 --> 00:04:55,010
you need to be able to have the same
226
00:04:52,340 --> 00:04:55,010
227
00:04:52,350 --> 00:04:57,210
sorts of skills and techniques and
228
00:04:55,000 --> 00:04:57,210
229
00:04:55,010 --> 00:04:59,790
knowledge and experience that those
230
00:04:57,200 --> 00:04:59,790
231
00:04:57,210 --> 00:05:01,770
attackers have where your company may
232
00:04:59,780 --> 00:05:01,770
233
00:04:59,790 --> 00:05:03,780
want you to learn to hack or the company
234
00:05:01,760 --> 00:05:03,780
235
00:05:01,770 --> 00:05:06,330
may want to bring in people who are
236
00:05:03,770 --> 00:05:06,330
237
00:05:03,780 --> 00:05:09,560
skilled at these sorts of activities so
238
00:05:06,320 --> 00:05:09,560
239
00:05:06,330 --> 00:05:13,320
that they can attack the attackers and
240
00:05:09,550 --> 00:05:13,320
241
00:05:09,560 --> 00:05:16,230
hopefully you end up with a more steely
242
00:05:13,310 --> 00:05:16,230
243
00:05:13,320 --> 00:05:19,500
exterior and you get a reputation for
244
00:05:16,220 --> 00:05:19,500
245
00:05:16,230 --> 00:05:22,050
not being a company that people want to
246
00:05:19,490 --> 00:05:22,050
247
00:05:19,500 --> 00:05:25,700
go after and those are several reasons
248
00:05:22,040 --> 00:05:25,700
249
00:05:22,050 --> 00:05:25,700
why you may want to hack
13626
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.