Тёмный

How Hackers Hack, and How To Stop Them 

SciShow
Подписаться 8 млн
Просмотров 951 тыс.
50% 1

Hacking is tough, but stopping hackers can be even tougher.
Hosted by: Hank Green
----------
Support SciShow by becoming a patron on Patreon: / scishow
----------
Dooblydoo thanks go to the following Patreon supporters-we couldn't make SciShow without them! Shout out to Jeremy Peng, Kevin Bealer, Mark Terrio-Cameron, KatieMarie Magnone, Patrick Merrithew, Charles Southerland, Fatima Iqbal, Benny, Kyle Anderson, Tim Curwick, Scott Satovsky Jr, Will and Sonja Marple, Philippe von Bergen, Bella Nash, Bryce Daifuku, Chris Peters, Saul, Patrick D. Ashmore, Charles George, Bader AlGhamdi
----------
Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: dftba.com/scishow
----------
Looking for SciShow elsewhere on the internet?
Facebook: / scishow
Twitter: / scishow
Tumblr: / scishow
Instagram: / thescishow
----------
Sources:
www.sans.org/r...
www.sans.org/r...
pen-testing.san...
www.owasp.org/...
books.google.c...
www.pentest-sta...
www.pentest-sta...

Опубликовано:

 

11 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 1,9 тыс.   
@gamophyte
@gamophyte 7 лет назад
Why do people still depict hackers like a guy in a black hoodie and gloves like a person breaking into a window
@Lwilight
@Lwilight 7 лет назад
Caithlin yeah pretty weird, usually it an overweight individual with Cheeto stained fingers and mountain dew on their breath.
@maxmusterman3371
@maxmusterman3371 7 лет назад
it symbolises their morality
@schadenfreudebuddha
@schadenfreudebuddha 7 лет назад
it's a more romantic image than some russian in a tracksuit.
@eli9252
@eli9252 7 лет назад
because you can't hack unless you're comfy
@Lwilight
@Lwilight 7 лет назад
Elias Perez you get it
@Vera-Alejandro
@Vera-Alejandro 6 лет назад
This is one of the best How to Hack videos. I'm a Cyber Security Major and this is pretty much what I've learned so far, but very simplified.
@lizsager9577
@lizsager9577 3 года назад
I was told to stop serious hacking by Norton is to find someone that is as bad on the good side to stop this person. Is that you ale vera
@bencorcoran7563
@bencorcoran7563 2 года назад
@@lizsager9577 i guess not Liz Sager
@Master_Therion
@Master_Therion 7 лет назад
How do I stop a hacking attack? Cough syrup.
@Rr-ji4vj
@Rr-ji4vj 7 лет назад
Master Therion 3 minutes, still underrated.
@alexluna6238
@alexluna6238 7 лет назад
Master Therion tru
@alexluna6238
@alexluna6238 7 лет назад
Master Therion hack*
@schadenfreudebuddha
@schadenfreudebuddha 7 лет назад
I tried to get into computers, but I just couldn't hack it. I didn't have the drive. now i'm being monitored. and various other puns.
@irok1
@irok1 7 лет назад
XD
@FBI-ov7lb
@FBI-ov7lb 7 лет назад
How to stop a hacker? Easy You: Hacker no hacking! Hacker no hacking! Hacker! Aw man!
@letsgetit5679
@letsgetit5679 7 лет назад
Hassan DM ha I get it nice joke
@letsgetit5679
@letsgetit5679 7 лет назад
Hassan DM Hacker Hacker Hacker the Explorer
@kshitijkabeer9890
@kshitijkabeer9890 6 лет назад
Would work if you are Dora the Explorer
@agauster3619
@agauster3619 6 лет назад
Lol
@donnapotter8170
@donnapotter8170 5 лет назад
You're a idiot I was actually asking for help not a idiot with slow witted joking if that's you think your doing... Grow up....
@KingsleyIII
@KingsleyIII 7 лет назад
What the hack did I just watch?
@lourdesmontes9701
@lourdesmontes9701 7 лет назад
+
@grey3247
@grey3247 7 лет назад
++
@wengeance8962
@wengeance8962 7 лет назад
Something you're clearly too dumb to understand
@KingsleyIII
@KingsleyIII 7 лет назад
My joke Your head
@wengeance8962
@wengeance8962 7 лет назад
Fair
@snowman9555
@snowman9555 7 лет назад
Does having your internet provider change your IP address help to stop someone who is actively seeking to hack your system?
@zpinn8242
@zpinn8242 7 лет назад
Everything can be hacked. And everyone.
@yuqiyuan8411
@yuqiyuan8411 6 лет назад
apagando las luces
@gingergaming6310
@gingergaming6310 6 лет назад
Sombra Online.
@KashNoK
@KashNoK 6 лет назад
True, I got my toaster hacked. Can't make toast anymore :(
@saigesheen
@saigesheen 6 лет назад
Shrek The V did you try putting a toaster in your toaster?
@KashNoK
@KashNoK 6 лет назад
Visiondragon I did, but then the other toaster got hacked. But don't worry, I just throw my bread into a fire. Tastes kinda same.
@QuantumPhyZ
@QuantumPhyZ 7 лет назад
White hats = Good guys Black hats = Bad guys Grey hats = Heroes
@ObamaSexGaming2007
@ObamaSexGaming2007 5 лет назад
Such racism
@mirsadajdari1945
@mirsadajdari1945 5 лет назад
What the-
@frozenpuppys4708
@frozenpuppys4708 4 года назад
No the withe hats are the bad guys and the black hats are the good guy
@chickencurry1033
@chickencurry1033 4 года назад
Frozen Puppys watch the video?
@capitain9996
@capitain9996 4 года назад
@@frozenpuppys4708 Lmao you sure you didn't hit yourself with a rock or something else ?
@Anamnesia
@Anamnesia 7 лет назад
Is it Hacking if the Security is flawed? Is it Hacking when the NSA/FBI/CIA does it???
@jonaselharrab265
@jonaselharrab265 7 лет назад
Anamnesia Hacking is hacking, it doesn't matter who does it.
@Andrew-od4vg
@Andrew-od4vg 7 лет назад
As far as I know, it's considered hacking if you: 1) don't own the system 2)don't have permission from the system's owner and 3)don't have a warrant to access the system without permission from the owner.
@schadenfreudebuddha
@schadenfreudebuddha 7 лет назад
if the security wasn't flawed, it couldn't be hacked.
@Anamnesia
@Anamnesia 7 лет назад
+schadenfreudebuddha There's a great video called, "Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker"
@MrDoverfield
@MrDoverfield 7 лет назад
Anamnesia it's only hacking when Russia does it.
@rogerdatt8861
@rogerdatt8861 7 лет назад
How to hack: step 1) put on balaclava step 2) google "how to hack" step 3) purchase Guy Fawkes mask step 4) you are now a certified hacker
@spiritofozark
@spiritofozark 3 года назад
Wtf 😂
@Raattis
@Raattis 7 лет назад
Nice explanation, but I have couple clarifications: 1) Probing "ports" and keeping them closed is oversimplifying things a bit. Keeping ports closed doesn't require any real effort from the defender - it's just a setting in the router. And having a port open only means that there could be some software (web service, admin controls, etc.) listening for connections directed to that port. To mount an attack the attacker must know or find a vulnerability in that software to exploit. A port is more like an extension of the IP address, it doesn't represent anything concrete. 2) Saying "sending code" is technically correct, but it gives the wrong idea that sending is the hard part. You can send any piece of code you want via google search box. Getting *your* code *executed* on the target machine is what an attack is about.
@Raj-yv7xt
@Raj-yv7xt 9 месяцев назад
Bro r u a hacker...
@MeVsTheWorld01
@MeVsTheWorld01 5 лет назад
LiveJournal has loads of hackers and so does Tumblr and RU-vid----and not just the people who make random comments.
@josuelservin2409
@josuelservin2409 7 лет назад
Social engineering... Usually the weakest link in a chain are the persons using the system, you don't need a PC to get access to important information, it's surprisingly easy how much you can get asking the rigth questions. And usually this area is overlook just like in this video...
@Sentinal098765
@Sentinal098765 7 лет назад
Bravo! I was scrolling through the comments specifically looking to see if anyone else besides me caught that. I can just imagine Kevin Mitnick sitting back, giggling to himself, "after all this time, people still don't have a clue how it's really done."
@sundhaug92
@sundhaug92 7 лет назад
To be fair, Mitnick also knew a whole lot of technical shit
@frankschneider6156
@frankschneider6156 7 лет назад
+Josuel Servin Depends on the target. Most individuals in private and corporate administration in companies: agree. Corporate data centers of major companies: not that easy Military or Intelligence high security areas: forget it. So effectiveness of SE simply boils down to the average user security awareness at the target, thus how much and how good you trained your staff/users and made them aware of potential attacks and methods. the more /better and the less successful SE will be.
@loranddeka
@loranddeka 7 лет назад
Social engineering I would consider a technique one could use for the recon part of the hack. You're right in that its very difficult to fight against since it revolves around the "human factor".
@maythesciencebewithyou
@maythesciencebewithyou 7 лет назад
Josuel Servin Buy a used computer. It's unbelievable what people leave on it. If you are lucky you might get some Bank Account Informationen
@Gotostep2
@Gotostep2 7 лет назад
A firewall is also known as a layer 4 device. A hacker could also create a time-bomb virus to open a back door into a company's database. There are also kiddie scripts - Kiddie script hackers are less skilled and rely on the scripts that the pros write or abuse legitimate programs that are meant to provide useful troubleshooting (e.g. WireShark) - Hackers, for example, can write their own programs and scripts to break into systems (e.g. creating a virus that can exploit an opening in a system's code to create a buffer overflow). However, despite all of the knowledge that I had to gain and terms to memorize to become Security+ certified, (As well as a Network+, RHCSA and a BAAS in Information Technology), I still learned something new from SciShow. Thanks Hank, Goto
@silhouhat3403
@silhouhat3403 7 лет назад
At this rate, you might as well make a TechShow
@jaeger1123
@jaeger1123 7 лет назад
Silhouhat heck yeah, that'd be awesome
@TimoSluis
@TimoSluis 7 лет назад
Peter McQuill hack* sorry
@jaeger1123
@jaeger1123 7 лет назад
Timo Sluis we've got ourselves a pun master :D
@bencutler1066
@bencutler1066 7 лет назад
Hank recently mentioned that "crash course computer science" is currently being filmed
@silhouhat3403
@silhouhat3403 7 лет назад
gnomer cutler oh shit! that's amazing! thanks for letting me know, definitely going to be on the lookout for that.
@TheRealFobican
@TheRealFobican 4 года назад
I got a tricky one for you, how do you detect hacking that goes on below the operating system and attacks the hardware itself?
@samguy7654
@samguy7654 7 лет назад
Grey Hats seem like baddass anti-heroes
@samguy7654
@samguy7654 7 лет назад
Probably most hackers are grey hats
@finalfant111
@finalfant111 7 лет назад
Gray hats are usually kids and adults with time on their hands that want to practice on small small time home and school networks. Maybe upgrade to an administrator wifi in a library or something. Once they find themselves in there they might poke around just to see what they can find, like financial information. However, they will never do anything with that information other than feel good about themselves that they got in, in other words they do it for the lolz..... I say this because I am guilty, LOL. White hats are usually paid heavily and are professional pen testers. Black hats are your legitimate big scale bad guys. We are talking about the guys that hacked Sony, Home Depot, etc.
@themadichib0d
@themadichib0d 7 лет назад
Theres actually a lot of contention in the industry on exactly what defines a 'black hat' or a 'grey hat' etc. One interpretation I and number of others prefer is in terms of permission. So black hats gain unauthorized access, white hats gain authorized access, and grey hats aren't given permission nor are they getting unauthorized access. So a grey hat might be the guy reversing some dll for compatibility reasons, cracking that new game to pirate to his friends, or developing an exploit for a piece of software without permission(but not using that exploit to gain access to systems). This helps cover cases where an individual might fit the bill for different hats for different situation. Such as the white hat being paid by day to find and fix networks but moonlighting as a carder to make some extra cash as a blackhat.
@RedRogue
@RedRogue 7 лет назад
It's still super illegal though. Even if you don't do anything malicious and tell the company you could still be sued for breaking into their system without permission.
@manguy01
@manguy01 7 лет назад
That's definitely how they see themselves.
@Aftermost3590
@Aftermost3590 7 лет назад
Actually a super accurate in depth description of hacking.
@DudeWhoSaysDeez
@DudeWhoSaysDeez 7 лет назад
Hackers are annoying
@getalifetoday1
@getalifetoday1 7 лет назад
No this is Patrick Same opinion^^^
@itz_yeastic
@itz_yeastic 3 года назад
IDK why whenever somebody talks about hackers they have a guy in a hoodie with a weird looking mask and is on the keyboard half bent :-/
@thirdyplays5618
@thirdyplays5618 3 года назад
Omg u r really every codm vids and now ur here
@Tuchulu
@Tuchulu 7 лет назад
also, DDoS attacks are not hacks. Someone please tell CNN
@nosuchthing8
@nosuchthing8 7 лет назад
Tuchulu hackers use them, so...
@kdwh1
@kdwh1 7 лет назад
nosuchthing8 they also use email. DDoS is not hacking.
@skate2late
@skate2late 7 лет назад
Tuchulu They usually require control of a botnet though, which requires an individual to basically hack many computers. Whether or not ddos attacks are "hacks" is a matter or semantics, but they still pose issues similar to other cybersecurity issues. In a way you "trick" the target computer because it has no way of verifying if the connection is a legitamate user.
@kdwh1
@kdwh1 7 лет назад
That is correct and well said. Creating a botnet is very much hacking. Using it is not.
@leslieelms3287
@leslieelms3287 7 лет назад
ApplePi they do what research they can, but not everyone can understand everything
@johncenareactions5926
@johncenareactions5926 5 лет назад
I have avenger endgame spoilers on my computer so no hackers try to hack me
@Skooberee
@Skooberee 4 года назад
Genius!!!
@samanthalopez27
@samanthalopez27 7 лет назад
The whole time I was hoping he would reference Mr. Robot.
@cai6972
@cai6972 7 лет назад
Samantha Lopez #ImmaculateDishes
@samanthalopez27
@samanthalopez27 7 лет назад
Kaileidoscope ?
@skate2late
@skate2late 7 лет назад
Hacking is way more convuluted than I think most people realize. I have been reading a book on web application hacking and even with a good understanding of web application technologies there is a lot of info to process. Theres acess control exploits, script injection exploits, command injection exploits, database injection exploits, brute force credential cracking, authentication and session management flaws, and many more topics in web application hacking alone.
@rollerzleader2812
@rollerzleader2812 7 лет назад
*Black hats*: People that enjoy exposing other bad guys. *White Hats*:Goodie two shoes looking to make a buck legally. *Grey Hats*: Those few with strict morals. *Brown Hats*: Regular average folk that enjoy working with their hands, I.E breaking and reassembling things. No shit, these guys are your go to sellsmen for devices. from jailbroken phones to cellular jamming devices. Brown Hats can be found on 4chan if you dare. They primarily supply all sorts of hackers for money or favours.
@texivani
@texivani 7 лет назад
Rollerz leader "If you dare" What are you, 14? Do people really still think 4chan is this forbidden dark gathering place?
@CarrotConsumer
@CarrotConsumer 7 лет назад
I went on 4chan and was arrested by the FBI. Never go there unless you are a 1337 hax0r
@TheSYLOH
@TheSYLOH 7 лет назад
You forgot the most popular and effective attack: Typing in a username, then trying "123456","password" ot "12345678" as the password. This sounds like a joke, but it is startlingly effective at getting into an account. Also, literally the oldest trick in the book, calling up tech support and trying to convince the person to give you access.
@samirm
@samirm 7 лет назад
very lacking in the "how to stop them" section
@woodfur00
@woodfur00 7 лет назад
So you want them to teach you everything about secure programming in an eight-minute video? They explained everything they could without going into complete tech jargon. Or did you miss the part about how stopping hackers requires hacking skills, which was kind of the main point of the video?
@randoml97
@randoml97 7 лет назад
Samir it basically all "how to stop them" his point was you try to fo EXACTLY what someone who would do it maliciously would do, record the holes you found and change/update whatever you used to get access.
@samirm
@samirm 7 лет назад
Who said anything about secure programming? Most security issues occur from misconfiguration anyway. All they mentioned was "pentesting", and there's a LOT more that you can mention in an 8 minute video. Don't play dumb.
@otacon1024
@otacon1024 7 лет назад
Your best defense is usually just common sense. Keeping everything updated and not running shit from dodgy websites and e-mails will go a long way. Firewalls are useful if set on training/custom rules mode so you explicitly allow/block requests on a per-application basis. Anti-virus software is for all practical purposes useless, don't bother. Obviously way simplified, but that's it in a nutshell.
@danielvidal7163
@danielvidal7163 7 лет назад
Don't use computers. If you don't use computers then you can't be hacked.
@aliciaschannel2722
@aliciaschannel2722 6 лет назад
*HELP* Does it count as hacking if I was watching a youtube video and it suddenly pauses without me doing anything? Or google suddenly openning by itself without me doing anything? Please if you know anything please tell me.
@cast5230
@cast5230 4 года назад
Bro its not a hack it might be a glitch or you been hacked
@SA1992
@SA1992 7 лет назад
I love the tech videos. Keep making them! I also wanted to give a suggestion; could you summarize the main points at the end of longer videos? It would make it easier to learn and remember :)
@blistersonmyfingers9321
@blistersonmyfingers9321 7 лет назад
Hank straight roasted Yahoo with that comment at 8:18. LMAO
@Koop784
@Koop784 7 лет назад
Good afternoon! My name is Robert Hackerman, and I'm the county password inspector! I just need a few minutes of your time to make sure your passwords are strong enough to pass state security standards and protocols.
@maggieinfinity8743
@maggieinfinity8743 7 лет назад
Koopsy I'm not sure if my password is secure... It's: starrynight554yaht888
@Koop784
@Koop784 7 лет назад
That's one of the best passwords I've ever seen! Don't change a thing!
@binetts
@binetts 7 лет назад
Koopsy mine is GayBoi69
@lazydonkey3617
@lazydonkey3617 7 лет назад
Dude don't ask for passwords
@binetts
@binetts 7 лет назад
Koopsy ool
@Graghma
@Graghma 7 лет назад
As a programmer I have to say you did a great job explaining it all, better and more in depth than I expected. Thanks! However, at the end you implied that it is only the white hats that protect sites. The programmers that write the original code are the first line of defense as we have to make sure they don't write systems in a way that can be hacked. But going too far into that would probably been out of scope of the video XD
@dedpup4948
@dedpup4948 7 лет назад
How do I hack my school's wifi so I can watch restricted SciShow videos and the full Hamilton soundtrack at lunch?
@CarrotConsumer
@CarrotConsumer 7 лет назад
Use a VPN or proxy.
@DanMan1990
@DanMan1990 7 лет назад
either of these will work^^^^
@frankschneider6156
@frankschneider6156 7 лет назад
Not if the school proxy filters using a white list. In that case both won't work.
@DanMan1990
@DanMan1990 7 лет назад
@ frank true, trying it should tell you if that is the case though.
@Selfs633
@Selfs633 7 лет назад
Just add an S at the end of http in the url... all it takes
@EntrepreneurKurly
@EntrepreneurKurly 4 года назад
This was just put into my recommended for some reason and i can tell u when it comes to it your either getting hacked or ur not, if u have the knowledge u can slow a hack down but once its happening thats it set in stone and u aint stopping it... dont waste ur time watching this
@tralx5268
@tralx5268 7 лет назад
I just recently watched Mr.Robot....feeling like a mad hacker genius
@JonshIsMe
@JonshIsMe 3 года назад
Is this the same for ip hackers? If so put down a reply it really helps.
@Frostwyrmer
@Frostwyrmer 7 лет назад
Well, this only explaining the surface of hacking, but it's explaining it pretty good. I would have loved to see some of the core principles of hacking, for example dissasembly of code and the abuse of Bufferoverflows. Although these should not exist anymore in current Languages, in the end those are the really interesting and "basic" procedures when it comes to hacking. For everyone who thinks he could hack anything: You need to know how to program something before you can hack it. Otherwise you're nothing more then a so called "script kiddie" and you actually can't do anything to be honest. Oh, also, I would have loved to see the usual laughing about DDoS attacks, as those are the usual reason why websites are down, are often compared to hacking, but are actually completely different as they are easier. Well done video anyway :)
@soyboy1410
@soyboy1410 7 лет назад
All these great hackers and I can't even write a For loop correctly.
@harleynorgate6883
@harleynorgate6883 7 лет назад
Joliee I feel u there bro
@mryup6100
@mryup6100 5 лет назад
@Blaze Plays C++ I'm learning it right now
@crimzonrayz3274
@crimzonrayz3274 4 года назад
Soy Boy i can’t even write a script or code
@khuong1994
@khuong1994 4 года назад
How many hackers are there 😐?
@jksbottommole8463
@jksbottommole8463 4 года назад
Oh my gosh sameeee
@salsie5449
@salsie5449 7 лет назад
Shrek is very green
@DrunkenAussie76
@DrunkenAussie76 7 лет назад
Salsie Shrek was only to prepare spawnlings for the oncoming of pepe
@youforiktv1691
@youforiktv1691 7 лет назад
DeadLink 404 allahu Akbar
@KashNoK
@KashNoK 6 лет назад
Thanks
@callekun
@callekun 6 лет назад
Just like his weiner :))))))
@SotraEngine4
@SotraEngine4 7 лет назад
If everybody knew more about what is dangerous to do on the web, we would come a long way
@dernbu2879
@dernbu2879 7 лет назад
1:22 Python 2.7? Line 5 has to be indented.
@tk_littleprincess4260
@tk_littleprincess4260 4 года назад
I am so mad because someone hack me in a game and I had a lot of things.
@MuzikBike
@MuzikBike 7 лет назад
Eh I was playing a game where you play as a lumberjack, but I found it too boring and hard. So I decided to hack it.
@Master_Therion
@Master_Therion 7 лет назад
May I axe what the game is called?
@DarkShadows713
@DarkShadows713 7 лет назад
Trees
@alanliang9538
@alanliang9538 7 лет назад
Master Therion clash royale
@jessylopez9751
@jessylopez9751 7 лет назад
Muzik Bike I got hacked on GD so I quitted and my stomach keeps hurting ;3;
@YT-ox6mc
@YT-ox6mc 5 месяцев назад
I can’t wait til I get my skills down in Cybersecurity! Tryna become a pen tester and analyst + w/ some programming skills in software development/engineering.
@brians.103
@brians.103 7 лет назад
Pen pineapple apple pen test
@davidblass9808
@davidblass9808 Год назад
Been a victim of this type of network infringment
@davidblass9808
@davidblass9808 Год назад
repeatedly truth
@davidblass9808
@davidblass9808 Год назад
constant infringement
@SilverMiraii
@SilverMiraii 7 лет назад
Ok bro you know html, calm down, you're not a hacker
@hendrik2765
@hendrik2765 7 лет назад
int Main () { Std::cout
@SilverMiraii
@SilverMiraii 7 лет назад
alert('C++ > js, "cries in a corner"');
@johnn2122a
@johnn2122a 7 лет назад
Silver Mirai braaaa you just xss the shit out of youtube braaaaa
@SilverMiraii
@SilverMiraii 7 лет назад
braaa don't tell em the secret cia is gonna get me
@johnn2122a
@johnn2122a 7 лет назад
Silver Mirai $("#Silver_Mirai").hide(); // got you braaa don't worry
@21guitarworld
@21guitarworld 7 лет назад
Also, Hank Green for president!
@adamstone897
@adamstone897 7 лет назад
Hank em! Fock Hacking. It's all about the Hanking
@ganaraminukshuk0
@ganaraminukshuk0 7 лет назад
Wait, who the eff is Hank?
@adamstone897
@adamstone897 7 лет назад
Ganaram Inukshuk Hank Green, the guy who hosted this episode. Or Do You Not Know Of All Of The Cast Members?
@Asummersdaydreamer14
@Asummersdaydreamer14 7 лет назад
+Adam Stone, "Who the eff is Hank?" is an inside joke from Hank's other RU-vid channel, vlogbrothers. The challenge is to reply to the question with a silly definition. For example, Hank is a reptile endemic to New Zealand whose predators include the Polynesian Rat.
@Master_Therion
@Master_Therion 7 лет назад
+Ganaram Inukshuk *Hank* is a sugar-based confection that, in its modern form, typically consists of sugar, water and gelatin which is whipped to a spongy consistency, molded into small cylindrical pieces, and coated with corn starch. Some *Hank* recipes call for eggs.
@cupcakewithouttheicing
@cupcakewithouttheicing 7 лет назад
Asummersdaydreamer14 I got that reference
@reilithion
@reilithion 7 лет назад
There are also efforts to build systems that are completely immune to entire classes of attacks. Some are a long way off, but there are already demonstrations of systems that, for example, provably have no buffer overflow vulnerabilities. No system is unhackable, but we may get to the point where hackers would have to /invent new ways/ of attacking in order to make any progress.
@thebarely-roblox5855
@thebarely-roblox5855 6 лет назад
I got my other email account hacked, I can't access into it.
@thedarkdawnmezz3365
@thedarkdawnmezz3365 4 года назад
Mine too
@onegerard1
@onegerard1 4 года назад
@@thedarkdawnmezz3365 i just forgot my name and password and can't get in too
@scottp9247
@scottp9247 7 лет назад
this guy kind of reminds me from one of the guys from the crash course series only because we watch it school most every day
@ciao_shibe1517
@ciao_shibe1517 7 лет назад
0:20 can we get an april fools episode where the whole episode has multiple hanks?
@mandyrooney4978
@mandyrooney4978 4 года назад
I have been hacked.... and of course have no idea how to stop it
@mattjacob5234
@mattjacob5234 4 года назад
Do not allow this guy to make fools out of you, this is clearly fake. Contact @Freakyhacks on Instagram or +1(408)469-4926 on whatsapp for all your hacking jobs, he's fast, reliable, effective and charges way less
@cyb3rtooth199
@cyb3rtooth199 7 лет назад
"Hacking" is simply using technology in an unconventional way. Steve Wozniak was a hacker. What black hats and cyber criminals do is not called "hacking", it's called Cracking.
@Qojkjnm
@Qojkjnm 7 месяцев назад
The world is a better place with you.
@redwizard2471
@redwizard2471 7 лет назад
Why is black always referred to bad and white is referred as good
@abneryumac
@abneryumac 7 лет назад
Because the light gives us comfort, while being in the dark, or darkness makes us unwary or feel fear.
@arbresnow401
@arbresnow401 7 лет назад
Racism at it's finest.
@DevotedPastafarian
@DevotedPastafarian 7 лет назад
people used to praise the sun on the regular, ill let you figure it out from there
@sundhaug92
@sundhaug92 7 лет назад
It derives from cowboy-movies
@okie9025
@okie9025 7 лет назад
Because whites are better than blacks
@Nerobyrne
@Nerobyrne 7 лет назад
white hat in training here. Hope to one day be able to stop some evil hacker. would be an awesome feeling. Until then, I guess I am coding applications and checking email firewalls vigilantly :)
@abirbhavgoswami
@abirbhavgoswami 7 лет назад
1:22 would just raise an IndentationError :/
@johndae8175
@johndae8175 7 лет назад
Abirbhav Goswami this man knows whats up
@muntzerism-diggerism9695
@muntzerism-diggerism9695 7 лет назад
as the great poet phi life cypher once said: the computers i be hackening
@cpypcy
@cpypcy 7 лет назад
God damn it 27 seconds and already 3rd post?
@beauuby
@beauuby 5 лет назад
I need this because there’s a person on ROBLOX hacking me, they know my name, and every time I come in ROBLOX, it shows MY text messages as something creepy, but i didn’t send it, I come in and see my own messages in chat. But I didn’t type that. The hacker knows my name and everything.
@dramaticproductions6155
@dramaticproductions6155 7 лет назад
Who else is early?
@DrunkenAussie76
@DrunkenAussie76 7 лет назад
PEPE was early
@rider6982
@rider6982 7 лет назад
when you split into 2 people i lose my fucking shit! i fucking love scishow
@nathantron
@nathantron 7 лет назад
I love watching videos like these, and seeing how they explain what we do to common people. XD It's so funny... "Its like defense against the dark arts" hahahahaaaaa
@CarrotConsumer
@CarrotConsumer 7 лет назад
And what is it you do?
@frankschneider6156
@frankschneider6156 7 лет назад
+Nathan Trone Actually there is even a relatively well known book on the topic called: "Defense against the black arts"
@amazingstudiosanimates3497
@amazingstudiosanimates3497 7 лет назад
What if a person has a white hat and a black hat hacker? LET THE DUEL BEGIN!!! **gives the black hat and white hat hackers swords**
@yuinurahilyon5711
@yuinurahilyon5711 4 года назад
This guy is definitely a hacker in disguise.
@igwematthias8546
@igwematthias8546 3 года назад
Thank you thank you very much davecracks😊😊😊😊
@JohnSmith-td7hd
@JohnSmith-td7hd 7 лет назад
Trump's new cybersecurity policy: Close all the ports and build a firewall!
@pyhooma3308
@pyhooma3308 5 лет назад
Not enaugh he got a server then he get a browser and with that I hack him
@ranikheir5272
@ranikheir5272 7 лет назад
I am a computing student with a concentration in security, and I am not disappointed! Great job SciShow! You guys did very good research and gave a perfect summary.
@Fragdemented
@Fragdemented 7 лет назад
"Two Hackers using the same keyboard at once" SOMEBODY is an NCIS fan! :)
@brooklynchristopher7261
@brooklynchristopher7261 2 года назад
I will continue singing praises to *Minslegend* NO BODY IS BETTER..
@dunjanjanja237
@dunjanjanja237 7 лет назад
fuck I love this show but Hank talks so fast, I can't follow haha
@pingu624
@pingu624 5 лет назад
How to stop a hacker: **Plays Baby by Justin Bieber**
@sou_theslytherin5203
@sou_theslytherin5203 3 года назад
😂😂😂
@edi9892
@edi9892 7 лет назад
It's amazing how hacking can be trivial or complex. On one side, you do not need to be an IT expert or programmer to: bypass windows passwords (Windows 2000 was so pathetic that I was ROFL; later versions just follow simple online instructions) do google hacks (find passwords on sites that are not encrypted and have a poor policy against crawler) bypass the firewall surf for free (when your idiot neighbours surf without password) use the USB port to ruin a computer just to mention a few examples On the other side some attacks required insiders or dozens of highly skilled hackers working for a year.
@cookiecan10
@cookiecan10 7 лет назад
In the end you make Yahoo sound bad for not having good enough protection, but as a company you have to defend yourselve against every possible attack, while it only takes one blackhat hacker one smal place to get into the system.
@DoubleXmagnum
@DoubleXmagnum 7 лет назад
6:30, wearing a hoodie makes hacking a lot more effective.
@steve_seguin
@steve_seguin 7 лет назад
Steve T. Hacker. Damn. Why are all hackers named Steve? It's a pretty decent review of the basic hacking techniques; good job guys. Trojans are a great way to hack people too; often you can install one via social-engineering tactics on systems that are otherwise pretty secure.
@chosenone2363
@chosenone2363 2 года назад
Hacking is PURE EVIL !!
@jenoluvbot1003
@jenoluvbot1003 6 лет назад
I depict a hacker as a guy wearing a troll mask, in a black hoodie, and have fast typing.
@TsavosAlliance
@TsavosAlliance 6 лет назад
This video is very educational 😎
@magdavakt9090
@magdavakt9090 3 года назад
i think someone have hacked into my windows, is that even possible, and should i be worryed about other devises connected to the wifi??? need answer asap
@jisungsshinyforehead3246
@jisungsshinyforehead3246 3 года назад
I have no idea but if u think about it, u wouldn’t know thru ur phone who else is connected to the WiFi I think
@lol-xd7jp
@lol-xd7jp 3 года назад
hey, hoping some one has a answer for me. CAN PEOPLE HAVE ACCESS TO YOUR DELETED VIDEOS?
@michaelmatthew2818
@michaelmatthew2818 5 лет назад
soon please I`m sick they take from me every thing
@BunnyFett
@BunnyFett 7 лет назад
Well done! ;D
@MaoRuiqi
@MaoRuiqi 7 лет назад
Consider one fact: with BitSpray network, hackers can break in but find nothing but white noise. This video is looking at hacking from the perspective of a rearview mirror.
@mariad.6540
@mariad.6540 5 лет назад
My sister's Facebook account got hacked because her friend's account also got hacked and the hacker asked for her email and password from her friend's account. She fell for it but she got her account back. It was like a battle! She cried so hard!😕
@candyproductions6140
@candyproductions6140 6 лет назад
I NEED DESPERATE HELP
@jackhazlett832
@jackhazlett832 4 года назад
How do I prevent my mobile phone from being hacked I've been harassed for about 10 years since I moved to this area and my phones are constantly braking and my Internet cuts connection letters from words in sentences are disappearing as I try to read the text please help me.
@gasdetectortv9425
@gasdetectortv9425 4 года назад
How about hacking a roblox account cause someone scammed me
@AeizzatToha
@AeizzatToha 4 года назад
It also happens in my DeviantArt profile with password back in April 2020. The hacker is unidentifiable for posting strange comments.
@the-real-soihau
@the-real-soihau 4 года назад
Thank you, I thought someone was hacking my ipad, but in the end I did not need this video that much, but I think this would help others, who are way smarter than me, and way more resistant than me , cause im DuMb.
@Drawfill
@Drawfill 7 лет назад
Hacking is a term so wide, I sure hope they don't speak about cyber criminals..... oh wait.
@notcryo
@notcryo 3 года назад
KIds, hackers aren't just a man in black typing green words on a black screen really quickly.
@soyhacker-stop1076
@soyhacker-stop1076 3 года назад
I only share information about bins since many create accounts without assuming the risks😒 so I created my series and it is being successful
@queendaisy4528
@queendaisy4528 7 лет назад
One of the ways to protect yourself from two of the most common types of hacking (brute force and social engineering) is to have a password which is pretty much impossible to find with these methods. If I recall correctly, one of the presenters of Computerphile recommended appending four words together. For example: "DinosaurPaperclipThatcherMjolnir" would be extremely difficult to guess or brute force. Of course, if the hacker knows you're appending four random words together, it becomes much more easy to brute force. Personally, I have built an algorithm which takes the name of a website and outputs a 900 character password which is unique to that site. All I have to do if someone were to somehow crack my algorithm or hack that site is to change a single line of code, and I can generate an entirely new password of identical length.
@mimikal7548
@mimikal7548 7 лет назад
How do you know that someone has figured out your algorithm though?
@queendaisy4528
@queendaisy4528 7 лет назад
If someone figured out my algorithm (and I'd be very impressed if they did; even I couldn't re-write it as one of the things I used was randomly generated data), then I'd know because presumably they'd use it to get my passwords and I'd see some kind of change in the activity on my accounts. That said, all I have to do is generate more random data to plug into the algorithm and I have a whole new one again.
@MyComputerBoy
@MyComputerBoy 7 лет назад
Well... technically hacking something is to use a device or program it is not intended to be used for ( yes, gaining access to some database without permission is still hacking but you could also hack a cellphone )
@oldaccount9190
@oldaccount9190 7 лет назад
I have a solution: 1. don't let your stupid child click on ,unsafe, spam, scammers link 2. stop downloading porn from unsafe source
@stephenstruble5064
@stephenstruble5064 7 лет назад
I'm the random guy named Steve. If you use Microsoft Windows you can watch my video on a few proper security practices in Microsoft Windows. I'll make more that extend beyond the scope of just an average user and maybe ones for Unix, Unix-like clients, domain controllers and other network administration. If you prefer something more interactive like CTF then you can check out Vulnhub and Exploitdatabase. It's important to exercise proper security practices because people are an easy vector of attack.
@notaseagull
@notaseagull 7 лет назад
What happened to the fake ports idea? I remember hearing about proposals that instead of closing ports, you should attach them to fake machines so hackers get bad intel and waste time on red herrings.
Далее
The 5 Worst Computer Viruses in History
9:37
Просмотров 8 млн
How To Become a Hacker - EPIC HOW TO
6:55
Просмотров 9 млн
Growing fruit art
00:33
Просмотров 2,9 млн
15 Clear Signs Your Phone Was Hacked
11:38
Просмотров 23 млн
12 Signs Your Computer Has Been Hacked
9:32
Просмотров 4,3 млн
Is Co-Sleeping REALLY Dangerous?
9:12
Просмотров 257 тыс.
10 Steps To Avoid Getting Hacked On Your Smartphone
12:20
We Solved The Mystery Of The Pyramids
6:00
Просмотров 139 тыс.
6 Construction Failures, and What We Learned From Them
11:16
6 of the World’s Weirdest Trees
12:52
Просмотров 343 тыс.