Question 1: Why might the makers of the movie hackers pretend their site was hacked?  What evidence do they provide to show this is not true?

Because they want to promote the movie first, but the evidence they show us “We thought you might be interested in reading the letters that were received a few days ago from the real hackers. After reading these letters, form your own conclusion.” That shows their website may really got hack by REAL HACKERS.

 

 Question 2: What are three changes the hacker made compared to the original?

They ruin the pictures, they added paragraph on the pages. They also post the pics of hackers.

 

Question 3: Did the hacker like the movie “Hackers”? Why or why not?

No, because the movie is so fake about hacker’s life.

 

 Question 4: What is DefCon?

Defcon is the world’s biggest hacker website.

 

Question 5: Look at the handout “Part One, The Basics, name three rules of “ethical hackers” he violated.

I.    Do not intentionally damage *any* system.
 
II.   Do not alter any system files other than ones needed to ensure your
      Escape from detection and your future access (Trojan Horses, Altering
      Logs, and the like are all necessary to your survival for as long as
      Possible.)
 
III. Do not leave your (or anyone else's) real name, real handle, or real
      phone number on any system that you access illegally.  They *can* and
      will track you down from your handle!

 

 

 

Question 6: What are two reasons the hacker gives for hacking the site?  Can you think of another possibility?

They think they movie was sucks. And those character was fake for hackers.

 

 

Question 7: The hacker apologizes for the hack.  What does he say were his true reasons for the hack?

He was just play and curious for the hack.

 

Question 8: Did he have help or work alone?

Alone.

 

Question 9: How does he try to make up for his hack?

He’d like to stress that none of the sites or groups listed in my remake of the page had anything to do with the hack, either by technical assistance or moral support.

 

 

Question 10: Is the tone of the letter what one would expect from a hacker?  How does it compare to the other language he uses?

 

Question 11: What does he say real hackers are?

 

Question 12: How does he show he is the real hacker?

“But I can tell you where the files were; which is something only someone who has been inside your machine should know. [security details deleted]”

 

Question 13: What does he fear might happen to him as a result of his hack?

He afraid that he will go to prison for that.

 

Question 14: According to this link what is a Hacker?

“The hacker on the other hand is an individual who yearns for knowledge. The hackers are very knowledgeable individuals. They often times know several programming languages, work extensively with the inwards and outwards of UNIX, have a firm understanding of all the TCP/IP implementations and protocols.”

 

Question 15: What is a Cracker?  How is this different than a Hacker?

“The definition of a cracker is one who attempts to break into a system via cracking/guessing user passwords” Hacker don’t need to use any password to break into the system. But cracker is the one to break/guessing other’s passwords to get into their computers.

 

Question 16: According to this page, what sort of person is a typical Cracker?

The person who like to break into system via guessing/break users passwords.

 

Question 17: What is a hacker, according to this page?

 

 

Question 18: What sorts of things can a hacker do to a site?

 

Question 19: What sorts of things are against “Hacker Ethics”?

 

Question 20: Why do they do it, according to this page.

 Breaking into a system for a hacker is a thrill, it is a challenge that they take on.

Question 21: Who is the author?  Is he a “Gray hat” or “Black Hat” hacker?

 Black hat

Question 22: The links to “Other Hacker Sites” such as Phrack Magazine, and 2600 are blocked.  Why are the blocked?

Because they consider as hacker’s website.

 

Question 23: Are any of the hacking activities described on this page legal?

 

Question 24: What potential harm can be caused to a company by a hacker altering their web page?

 

Question 25: Should “Gray Hat” hacking be illegal?

 

Question 26:  Was the site really hacked, in your opinion, or is it a publicity stunt by MGM?