Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
1
00:00:00,980 --> 00:00:02,520
Now, as I promised you,
2
2
00:00:02,520 --> 00:00:05,370
this course is going to be highly practical.
3
3
00:00:05,370 --> 00:00:08,763
But I also promised that I will not neglect the theory.
4
4
00:00:09,900 --> 00:00:11,610
Now, what we mean by hacking
5
5
00:00:11,610 --> 00:00:15,280
is being able to gain access to a system
6
6
00:00:15,280 --> 00:00:18,170
that you're not supposed to have access to.
7
7
00:00:18,170 --> 00:00:21,240
So for example, logging into an email account
8
8
00:00:21,240 --> 00:00:23,700
that you're not supposed to have access to
9
9
00:00:23,700 --> 00:00:26,003
is considered hacking that account.
10
10
00:00:26,890 --> 00:00:29,350
Gaining access to a remote computer
11
11
00:00:29,350 --> 00:00:31,530
that you're not supposed to have access to
12
12
00:00:31,530 --> 00:00:33,480
is hacking that computer.
13
13
00:00:33,480 --> 00:00:36,030
Reading information that you're not supposed
14
14
00:00:36,030 --> 00:00:39,363
to be able to read, again, is considered hacking.
15
15
00:00:40,340 --> 00:00:43,610
So you can see that there is a large number of ways
16
16
00:00:43,610 --> 00:00:46,090
to hack into a system, and the word hacking
17
17
00:00:46,090 --> 00:00:48,240
can refer to a number of things,
18
18
00:00:48,240 --> 00:00:50,880
but the main concept is the same,
19
19
00:00:50,880 --> 00:00:53,770
gaining access or being able to do things
20
20
00:00:53,770 --> 00:00:56,400
that you're not supposed to be able to do
21
21
00:00:56,400 --> 00:00:58,570
is considered hacking.
22
22
00:00:58,570 --> 00:01:01,110
Now, there are three main types of hackers.
23
23
00:01:01,110 --> 00:01:02,840
We have the black-hat hackers,
24
24
00:01:02,840 --> 00:01:06,540
these are the bad people that hack systems illegally
25
25
00:01:06,540 --> 00:01:08,190
in order to steal money,
26
26
00:01:08,190 --> 00:01:11,183
or to achieve their own illegal goals.
27
27
00:01:12,050 --> 00:01:15,370
The second part of hackers are the white-hat hackers.
28
28
00:01:15,370 --> 00:01:19,340
So this is us, these people use the same techniques
29
29
00:01:19,340 --> 00:01:21,400
used by the black-hat hackers,
30
30
00:01:21,400 --> 00:01:23,790
and they also hack into systems.
31
31
00:01:23,790 --> 00:01:26,300
But they only hack into systems
32
32
00:01:26,300 --> 00:01:28,630
that they have permission to hack
33
33
00:01:28,630 --> 00:01:31,963
in order to test the security of the systems.
34
34
00:01:32,910 --> 00:01:36,370
And finally, we have the gray-hat hackers.
35
35
00:01:36,370 --> 00:01:38,610
These are a mixture of the two,
36
36
00:01:38,610 --> 00:01:40,480
so they'll hack into any system,
37
37
00:01:40,480 --> 00:01:42,310
even if they don't have permission
38
38
00:01:42,310 --> 00:01:44,890
to test the security of the system.
39
39
00:01:44,890 --> 00:01:48,480
But they will never steal money or damage that system,
40
40
00:01:48,480 --> 00:01:50,480
and in most cases, they'll go ahead
41
41
00:01:50,480 --> 00:01:53,710
and tell the administrator of that system.
42
42
00:01:53,710 --> 00:01:56,100
But what they do is still illegal
43
43
00:01:56,100 --> 00:01:59,170
because they test the security of systems
44
44
00:01:59,170 --> 00:02:02,853
that they do not own, or do not have permission to test.
45
45
00:02:03,840 --> 00:02:07,630
Now, one big question that people always ask is why hacking?
46
46
00:02:07,630 --> 00:02:09,700
Why teach or learn hacking?
47
47
00:02:09,700 --> 00:02:12,110
Well, hacking is an existing industry,
48
48
00:02:12,110 --> 00:02:15,270
there are lots of job opportunities for ethical hackers,
49
49
00:02:15,270 --> 00:02:17,450
for people like us, who would go ahead
50
50
00:02:17,450 --> 00:02:19,420
and test the security of systems
51
51
00:02:19,420 --> 00:02:21,910
to make sure that these systems are secure
52
52
00:02:21,910 --> 00:02:24,980
and not vulnerable to black-hat hackers.
53
53
00:02:24,980 --> 00:02:26,530
There is actually a huge demand
54
54
00:02:26,530 --> 00:02:28,320
for ethical hackers these days
55
55
00:02:28,320 --> 00:02:32,130
because of the increased amount of hacking attacks.
56
56
00:02:32,130 --> 00:02:34,720
So we hear on the daily big systems
57
57
00:02:34,720 --> 00:02:37,230
and big companies are getting hacked.
58
58
00:02:37,230 --> 00:02:39,310
Not so long ago, Uber got hacked,
59
59
00:02:39,310 --> 00:02:44,310
and information of more than 56 million users were exposed.
60
60
00:02:44,410 --> 00:02:47,420
So companies like Uber, Facebook, and Google,
61
61
00:02:47,420 --> 00:02:49,930
they hire hackers in order to try
62
62
00:02:49,930 --> 00:02:51,550
and hack into their systems,
63
63
00:02:51,550 --> 00:02:53,720
and tell them where the weaknesses are
64
64
00:02:53,720 --> 00:02:55,550
so that they can fix it.
65
65
00:02:55,550 --> 00:02:57,640
They also have bug bounty programs
66
66
00:02:57,640 --> 00:03:00,660
where they literally ask all the hackers around the world
67
67
00:03:00,660 --> 00:03:02,960
to go ahead and try to hack into their websites
68
68
00:03:02,960 --> 00:03:05,490
and with their web applications, and if they could,
69
69
00:03:05,490 --> 00:03:08,313
they will pay them a bounty for the bugs that they find.
5964
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.