Question 1: Why might the makers of
the movie hackers pretend their site was hacked? What evidence do they
provide to show this is not true?
Because they want to promote the
movie first, but the evidence they show us “We thought you might be interested
in reading the letters that were received a few days ago from the real hackers.
After reading these letters, form your own conclusion.” That shows their
website may really got hack by REAL HACKERS.
Question 2: What are three
changes the hacker made compared to the original?
They ruin the pictures, they added
paragraph on the pages. They also post the pics of
hackers.
Question 3: Did the hacker like the
movie “Hackers”? Why or why not?
No, because the movie is so fake
about hacker’s life.
Question 4: What is DefCon?
Defcon is the world’s biggest hacker
website.
Question 5: Look at the handout “Part One, The Basics, name three rules of
“ethical hackers” he violated.
I. Do not intentionally damage *any* system.
II. Do not alter any system files other than ones needed to ensure your
Escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
Possible.)
III. Do not leave your (or anyone else's) real name, real handle, or real
phone number on any system that you access illegally. They *can* and
will track you down from your handle!
Question
6: What are two reasons the hacker gives for hacking the site? Can you
think of another possibility?
They
think they movie was sucks. And those character was
fake for hackers.
Question
7: The hacker apologizes for the hack. What does he say were his true
reasons for the hack?
He was
just play and curious for the hack.
Question 8: Did he have help or
work alone?
Alone.
Question 9: How does he try to make
up for his hack?
He’d like to stress that none of
the sites or groups listed in my remake of the page had anything to do with the
hack, either by technical assistance or moral support.
Question 10: Is the tone of the
letter what one would expect from a hacker? How does it compare to the
other language he uses?
Question 11: What does he say real
hackers are?
Question 12: How does he show he is
the real hacker?
“But I can tell you where the files
were; which is something only someone who has been inside your machine should
know. [security details deleted]”
Question 13: What does he fear
might happen to him as a result of his hack?
He afraid that he
will go to prison for that.
Question
16: According to this page, what sort of person is a typical Cracker?
The person who like to break into system via guessing/break
users passwords.
Question 17: What is a hacker,
according to this page?
Question 18: What sorts of things
can a hacker do to a site?
Question 19: What sorts of things
are against “Hacker Ethics”?
Question 20: Why do they do it,
according to this page.
Breaking into a system for a
hacker is a thrill, it is a challenge that they take on.
Question 21: Who is the
author? Is he a “Gray hat” or “Black Hat” hacker?
Black hat
Question 22: The links to “Other
Hacker Sites” such as Phrack
Magazine, and 2600 are blocked. Why are the blocked?
Because they
consider as hacker’s website.
Question 23: Are any of the hacking
activities described on this page legal?
Question 24: What potential harm
can be caused to a company by a hacker altering their web page?
Question 25: Should “Gray Hat”
hacking be illegal?
Question 26: Was the site
really hacked, in your opinion, or is it a publicity stunt by MGM?