Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,500 --> 00:00:06,410
what is hacking the internet Engineering
2
00:00:04,179 --> 00:00:06,410
3
00:00:04,189 --> 00:00:08,440
Task Force is responsible for
4
00:00:06,400 --> 00:00:08,440
5
00:00:06,410 --> 00:00:12,080
maintaining documentation about
6
00:00:08,430 --> 00:00:12,080
7
00:00:08,440 --> 00:00:14,030
protocols and various specifications and
8
00:00:12,070 --> 00:00:14,030
9
00:00:12,080 --> 00:00:16,640
processes and procedures regarding
10
00:00:14,020 --> 00:00:16,640
11
00:00:14,030 --> 00:00:18,740
anything on the internet they have a
12
00:00:16,630 --> 00:00:18,740
13
00:00:16,640 --> 00:00:24,050
series of documents called requests for
14
00:00:18,730 --> 00:00:24,050
15
00:00:18,740 --> 00:00:26,269
comments or rfcs RFC 1389 says a hacker
16
00:00:24,040 --> 00:00:26,269
17
00:00:24,050 --> 00:00:28,369
is a person who delights in having an
18
00:00:26,259 --> 00:00:28,369
19
00:00:26,269 --> 00:00:30,529
intimate understanding of the internal
20
00:00:28,359 --> 00:00:30,529
21
00:00:28,369 --> 00:00:33,320
workings of a system computers and
22
00:00:30,519 --> 00:00:33,320
23
00:00:30,529 --> 00:00:35,420
computer networks in particular while
24
00:00:33,310 --> 00:00:35,420
25
00:00:33,320 --> 00:00:38,510
the expression hackers may go back a
26
00:00:35,410 --> 00:00:38,510
27
00:00:35,420 --> 00:00:41,300
long time and have many different
28
00:00:38,500 --> 00:00:41,300
29
00:00:38,510 --> 00:00:43,070
connotations or definitions as far as
30
00:00:41,290 --> 00:00:43,070
31
00:00:41,300 --> 00:00:46,129
computers go some of the earliest
32
00:00:43,060 --> 00:00:46,129
33
00:00:43,070 --> 00:00:49,460
hackers were members of the tech Model
34
00:00:46,119 --> 00:00:49,460
35
00:00:46,129 --> 00:00:52,070
Railroad Club at MIT and those people
36
00:00:49,450 --> 00:00:52,070
37
00:00:49,460 --> 00:00:54,379
and the various things that they did and
38
00:00:52,060 --> 00:00:54,379
39
00:00:52,070 --> 00:00:57,289
were involved in or detailed and Stephen
40
00:00:54,369 --> 00:00:57,289
41
00:00:54,379 --> 00:00:59,600
Levy's book hackers for our purposes
42
00:00:57,279 --> 00:00:59,600
43
00:00:57,289 --> 00:01:02,629
will be talking about other types of
44
00:00:59,590 --> 00:01:02,629
45
00:00:59,600 --> 00:01:06,260
hackers although the spirit of what we
46
00:01:02,619 --> 00:01:06,260
47
00:01:02,629 --> 00:01:09,130
do goes back to those early days the
48
00:01:06,250 --> 00:01:09,130
49
00:01:06,260 --> 00:01:13,520
definition of hacking or hackers changed
50
00:01:09,120 --> 00:01:13,520
51
00:01:09,130 --> 00:01:16,790
particularly in the 1980s and in part as
52
00:01:13,510 --> 00:01:16,790
53
00:01:13,520 --> 00:01:19,400
a result of a couple of people Robert T
54
00:01:16,780 --> 00:01:19,400
55
00:01:16,790 --> 00:01:22,580
Morris was a Cornell graduate student
56
00:01:19,390 --> 00:01:22,580
57
00:01:19,400 --> 00:01:26,060
who unleashed a piece of software that
58
00:01:22,570 --> 00:01:26,060
59
00:01:22,580 --> 00:01:29,600
was called a worm on what was an early
60
00:01:26,050 --> 00:01:29,600
61
00:01:26,060 --> 00:01:33,049
version of the internet that worm went
62
00:01:29,590 --> 00:01:33,049
63
00:01:29,600 --> 00:01:35,930
on to cause a lot of damage and create a
64
00:01:33,039 --> 00:01:35,930
65
00:01:33,049 --> 00:01:38,840
lot of downtime on systems across the
66
00:01:35,920 --> 00:01:38,840
67
00:01:35,930 --> 00:01:41,540
country and across the world the morris
68
00:01:38,830 --> 00:01:41,540
69
00:01:38,840 --> 00:01:43,670
worm did end up resulting in something
70
00:01:41,530 --> 00:01:43,670
71
00:01:41,540 --> 00:01:46,759
good however the computer emergency
72
00:01:43,660 --> 00:01:46,759
73
00:01:43,670 --> 00:01:49,640
response team at carnegie mellon was
74
00:01:46,749 --> 00:01:49,640
75
00:01:46,759 --> 00:01:52,460
created primarily in response to the
76
00:01:49,630 --> 00:01:52,460
77
00:01:49,640 --> 00:01:55,310
morris worm kevin Mitnick is another
78
00:01:52,450 --> 00:01:55,310
79
00:01:52,460 --> 00:01:58,100
well-known hacker who was responsible
80
00:01:55,300 --> 00:01:58,100
81
00:01:55,310 --> 00:01:59,810
for various acts of computer crime over
82
00:01:58,090 --> 00:01:59,810
83
00:01:58,100 --> 00:02:03,590
a couple of decades he was first
84
00:01:59,800 --> 00:02:03,590
85
00:01:59,810 --> 00:02:07,040
convicted in 1988 so the definition of
86
00:02:03,580 --> 00:02:07,040
87
00:02:03,590 --> 00:02:10,660
hacker or hacking moved from something
88
00:02:07,030 --> 00:02:10,660
89
00:02:07,040 --> 00:02:14,060
benign to something far more sinister in
90
00:02:10,650 --> 00:02:14,060
91
00:02:10,660 --> 00:02:17,599
popular culture we see hacking or
92
00:02:14,050 --> 00:02:17,599
93
00:02:14,060 --> 00:02:20,270
occurs in the movies wargames the movie
94
00:02:17,589 --> 00:02:20,270
95
00:02:17,599 --> 00:02:23,030
hackers of course the matrix movies
96
00:02:20,260 --> 00:02:23,030
97
00:02:20,270 --> 00:02:25,400
where you can see if you look really
98
00:02:23,020 --> 00:02:25,400
99
00:02:23,030 --> 00:02:28,280
closely they use a tool called n map
100
00:02:25,390 --> 00:02:28,280
101
00:02:25,400 --> 00:02:31,310
which we will go into the use of in
102
00:02:28,270 --> 00:02:31,310
103
00:02:28,280 --> 00:02:34,280
great detail later on also the movie
104
00:02:31,300 --> 00:02:34,280
105
00:02:31,310 --> 00:02:37,160
sneakers the movie swordfish and on
106
00:02:34,270 --> 00:02:37,160
107
00:02:34,280 --> 00:02:42,110
television in addition to other places
108
00:02:37,150 --> 00:02:42,110
109
00:02:37,160 --> 00:02:44,470
you can see the agents at NCIS regularly
110
00:02:42,100 --> 00:02:44,470
111
00:02:42,110 --> 00:02:47,450
doing things like cracking complex
112
00:02:44,460 --> 00:02:47,450
113
00:02:44,470 --> 00:02:51,040
cryptography in just a matter of seconds
114
00:02:47,440 --> 00:02:51,040
115
00:02:47,450 --> 00:02:54,350
or minutes so what is hacking really
116
00:02:51,030 --> 00:02:54,350
117
00:02:51,040 --> 00:02:56,840
hacking is about a deep understanding of
118
00:02:54,340 --> 00:02:56,840
119
00:02:54,350 --> 00:03:00,040
something particularly with relation to
120
00:02:56,830 --> 00:03:00,040
121
00:02:56,840 --> 00:03:03,380
computers and computing it's also about
122
00:03:00,030 --> 00:03:03,380
123
00:03:00,040 --> 00:03:06,080
exploring and the joy of learning new
124
00:03:03,370 --> 00:03:06,080
125
00:03:03,380 --> 00:03:08,180
things and understanding them very
126
00:03:06,070 --> 00:03:08,180
127
00:03:06,080 --> 00:03:10,730
clearly and being able to manipulate
128
00:03:08,170 --> 00:03:10,730
129
00:03:08,180 --> 00:03:13,370
those things in ways that maybe other
130
00:03:10,720 --> 00:03:13,370
131
00:03:10,730 --> 00:03:15,680
people haven't before it's also about
132
00:03:13,360 --> 00:03:15,680
133
00:03:13,370 --> 00:03:19,390
digging into problems to find solutions
134
00:03:15,670 --> 00:03:19,390
135
00:03:15,680 --> 00:03:21,799
in creative and interesting ways and
136
00:03:19,380 --> 00:03:21,799
137
00:03:19,390 --> 00:03:24,980
sometimes finding problems where there
138
00:03:21,789 --> 00:03:24,980
139
00:03:21,799 --> 00:03:28,930
weren't problems previously that's a
140
00:03:24,970 --> 00:03:28,930
141
00:03:24,980 --> 00:03:28,930
little bit about what is hacking
7656
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.