亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rivera.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
    Transcript of _Now_It_Can_Be_Told_:  "Mad Hackers' Key Party"              Hosted by Geraldo Rivera  (Sept. 30, 1991)Geraldo:  I'm Geraldo rivera.  And now, It can be told.<Flashy intro featuring various bleeps and sounds and what is supposedto look like a computer screen>Geraldo:  You're watching life imitate art.<home video of hackers hacking.  Room is in disarray, with a fewcomputers scattered around among various wires and cables andtelephones, and other equipment.>Geraldo:  Exclusive video of teenagers playing a dangerous andmind-boggling version of War Games.<video focuses on what appears to be 3 teenagers typing on computerkeyboards.><video focuses on one of the screens.>Geraldo:  If you think it's kid stuff, just watch this.<screen shows:|     quit| 221 Goodbye.| rugrcx>|        telnet tracer.army.mil| Trying 192.33.5.135....| Connected to tracer.army.mil| Escape character is '^]'.|||| Xenix K3-4 (tracer.army.mil)|||| login:|       dquayle| Password:_><screams of joy from kids><screen shows: Warning (banner)...This terminal is not secure...Do notprocess classified information...Protect user IDs, passwords...Controlaccess to your system....Destroy classified and sensitivematerial....>Geraldo:  Straight into the US Army computer.  In the name of the vicepresident!!  Straight out with America-s counter-terrorist strategiesin the Persian Gulf war. <video of bombings during Gulf War.)Cliff Stoll:  These guys in the army, they didn't do their homework.They screwed up.  <shows Cliff Stoll sitting in chair, terminal onbehind him.>Geraldo:  You bet they did.  And they're not the only ones.<more video of hackers hacking, Emmanuel Goldstein talking on atelephone>Geraldo:  Try the Pentagon, NASA, the White House.<video showing guy next to payphone, Japanese Kanji characters fillthe screen>Geraldo:  ...the IRS, the Department of Justice, and the stockexchange.<Japanese video now shows hacker typing on laptop in front of payphone - It is dark out.>Phiber Optik (guy next to pay phone, typing on laptop):  I find itvery thrilling.  It's quite interesting.Some guy in a suit speaking in a microphone:  Tomorrow's terroristsmay be able to more damage with a keyboard, than with a bomb.<more video of a hacker hacking>Geraldo:  Now it can be told.  A terrifying expose on Malice InWonderland.  The Mad Hacker's Key Party.<screen displays that title over hacker typing on keyboard><Intro to the show>Geraldo:  Welcome everybody.  Up front today, a new kind of warfare.This kind of combat won't be fought with bombs and bullets, but withbits and bytes, RAMs, and ROMs.  I'm talking about computer terrorism.Imagine this nightmare:  Saddam Hussein breaking into our Pentagoncomputers.  Well, as your about to see, we have discovered that thisis frightningly possible, given a combination of floppy disks andsloppy security.  Before you meet a mad hacker, live, right here inour studio, watch as our correspondant Krista Bradford discovers justhow vulnerable our national defense system really is.<screen switches to Krista Bradford in corner office, in front of terminal>Krista:  Thanks Geraldo.  Computers:  they are absolutely essential toour national defense.  Our military depends on them to win wars and tosave lives.  So you'd think they'd do everything possible to protectthese computers, but, think again.  This exclusive video provesotherwise.  <she hits play button on VCR, hacker home video pops upagain>Krista:  This video looks like a home video, but its implications areastounding.<video passes over computer (IBM compat.) - notable is an issue of2600 propped up against the keyboard>Krista:  These kids are in Amsterdam; they are not the enemy, they arenot spies.  They are computer hackers and they are about to break intoa US Army computer.Emmanuel:  This is about as blatant a violation as you can possiblyget.<screen shows Emmanuel Goldstein>Krista:  Emmanuel Goldstein is the editor of 2600, The Hacker Quarterly.<screen switches to Emmanuel typing at keyboard, focuses on pile of 2600'sstacked nearby><screen switches back to hacker home video, Emmanuel on the phone>Krista:  He was with the hackers as thy gained unauthorized access tothe Army computer.<list of *.MIL sites scrolls across a computer screen>Krista:  Although it wasn't classified, what the hackers found wasalarming.<long e-mail message scrolls across a screen>Krista:  A sensitive memo which details a counter-terrorist plan.<screen shows bomb going off>  The date:  January 15th - SaddamHussein's deadline to withdraw his forces from Kuwait.  <more footagefrom the Gulf War><screen switches to Emmanuel being interviewed again>Emmanuel:  It was incredible how easy it was.  Because, literally theypicked a machine at random out of a thousand machines that they had alisting of.  And used various means just to get in.<screen switches to the screen I typed above, except the first loginis guest [Login incorrect]..Second login, sync, password promptappears?Krista:  In order to get into a computer, you need to be an authorizeduser, and have a password.  So the hackers had to create one.  Using awell-known bug in the system, they managed to copy the password fileand do just that.<list of /etc/passwd floats by>Emmanuel:  <sitting at terminal>  The idea was to create a user namedDan Quayle, and give him superuser privileges, as well he deserves.Krista:  Now here's the trick:  because they didn't know anylegitimate passwords, they left the space for Dan Quayle's passwordblank.<screen focuses on dquayle record of /etc/passwd, highlights thecolons after 'dquayle'>Emmanuel:  Everything between those two colon's is the encryptedpassword, but there's nothing between those two colons, so there's nopassword.Krista:  Next, the hacker's call back as Dan Quayle, and now theydon't need a password to get in.<screen shows login as dquayle, null password...Hackers cheer asWARNING banner and logon screen (summarized above) appears.>Krista:  At this point, all of about 5 minutes have passed.  A fewseconds later, and they have gained complete control.Emmanuel:  That means they have access to the entire system, theycontrol the entire system.  They can take it down, they can changeevery file.  They can read anybody's mail.Krista:  <walking along outside>  So just how serious was thisviolation?  Well, the Army, the Justice Department, and the FBIwouldn't tell us.  They all refused to comment.  But this we do know:the US Army computer that was accessed was designed for "AuthorizedUse By Official Personnel Only".  You wouldn't want just anybody usingthis computer, especially during a time of war.<screen shows jet taking off...screen switches to guy ( Winn Schwartau[Information Security Consultant])  sitting in front of terminal setup with some other electronic devices attached.Winn:  The military knows better.  They should be protective of theircomputers a lot better than they are.<helicopter shown...screen switches to Emmanuel>Emmanuel:  Obviously, there's a problem.  Obviously people can getinto anything and see anything.<screen switches to Cliff Stoll>Cliff:  These guys in the Army, they didn't do their homework.  Theyscrewed up.<switches back to video of hackers>Krista:  They sure did.  This isn't the first time Dutch hackers haveinfiltrated government computers.<video of space shuttle taking off>Krista:  Just this April, another group made its way into thecomputers at NASA, the Pentagon, and other sensitive locations.<screen shows newspaper headline of said event>.<screen shows the Pentagon>Emmanuel:  If our own military doesn't know enough to look for thesebugs and make it hard for people to get into their systems, what canwe say about non-classified computers or computers run by schools andvarious other institutions?<screen zooms in on hardback copy of _The_Cuckoo's_Egg>Krista:  Cliff Stoll, author of The CUckoo's Egg:  How he tracked downa hacker selling secrets to the KGB.  Stoll opposes hacking, likeningit to breaking into someone's house.<screen shows cliff sitting in front of a Mac LC showing familiar'Flying Toasters'....Cliff appears more sedate than as seen before onother programs>Cliff:  Is there good that can come from someone breaking into myhouse?  If someone sneaks in through my window over there, comes inand starts looking at things, is there any good that can come fromthat?<screen switches back to Emmanuel>Emmanuel <with hand raised, looking mad at Cliff's comment>:  I don'tlike that analogy.  Hackers are not interested in personal files ofindividual people.  They're interested in huge databases and computersystems.<screen switches to Japanese TV, Kanji characters spread allover...It's night...Guy is standing in front of lighted-up pay phone>Phiber:  My handle's Phiber Optik.  I'm a computer hacker from theeast coast.<screen shows Phiber taking acoustic coupler from a bag...[This scene looksextremely modern-day Cyberpunk-ish]>Krista:  The Dutch aren't the only ones breaking into US computers.Phiber:  I find it actually very, very thrilling.  It's quiteinteresting.<screen shows laptop set on some cement stool....Screen moves to showother people milling around...Gee, is that Mr. Goldstein?!?  And ag-man looking type in sunglasses [Krista:  It is nighttime in the meat packing district of New YorkCity.  A Japanese camera crew is documenting the work of one ofAmerica's most notorious hackers.<Phiber connects the coupler to the pay phone>Phiber:  I enjoy this...Just know as much as you can about technologyand about, uh, computer networking.  <he's busy getting the pay phoneset up>Krista:  They watch him hook up his computer to a payphone, so thecall can't be traced to his home.Phiber:  <typing on the laptop>  Hacker's goal is basically to becomeone with the machine.  [in a Socratic-dialogue tone ofvoice]Krista:  Unlike Holland, hacking in the US is a crime, so this hackerprefers to remain anonymous.<screen switches to dark bookstore where A. Hacker [Phiber] sitsacross from Krista>Krista:  So what gives you the right to access other people'scomputers?A. Hacker:  To tell you the truth, I really don't care hat someonekeeps on their computers.  Me, myself personally, and my close friendsare mainly interested in programming the machines.Krista:  But if the machines are owned by somebody else, they're notyour machines!A. Hacker:  Well, sure, but we'd just be coexisting with the peoplethat normally use the machine.Krista:  Have you ever gotten into the White House computers?A. Hacker:  Well, I can't personally say whether I have or not.  Iknow it's certainly possible, there's nothing stopping anyone from it.<shot of White House>Krista:  Did you ever see anything interesting when you were there?A. Hacker:  Well, I'm not gonna say I was ever there...bu...uhh...Nocomment...<screen switches back to the studio>Geraldo:  Joining me now is Craig Neidorf. Craig is one of thecountry's most notorious hackers.  He has the dubious distinction ofbeing one of the first people prosecuted under the Computer Abuse andFraud Act.  Although the charges against him were eventually dropped.Geraldo:  Do you think it's fun what the Dutch kids did?  Get anykicks out of it?Craig [KL]:  I'm sure they probably thought it was fun.  I was a bitdisturbed by it  when I heard about it.Geraldo:  Yeah.  And you'll see why, after this.<cut away to commercial, but first a message from Winn Schwartau andGeraldo...>Winn:  We do, potentially face an electronic Pearl Harbor.<shot of Pearl Harbor>Geraldo:  Is the United States vulnerable to a computer invasion bythe enemy?  We'll be back in a moment with some of the scenarios forterror, as we continue our report on the Mad Hacker's Key Party.<Commercial>Geraldo:  We'll be hearing more from our hacker friend here in amoment, as well as from somebody who prosecutes guys just like Craig.Geraldo:  In their own defense Craig and the other hackers say theydemonstrate graphically just how vulnerable are to sabotage.  Anotherword for sabotage in the high-tech 90's is terrorism.  Here's KristaBradford with the second part of her alarming report.Krista:  Thanks Geraldo.  For years the US government has known aboutthe threat of computer terrorism, but it has done little to protectitself.  Computer security is routinely cut from the budget.  So nowwe are in the precarious position of life possibly imitating art.That according to a recent Congressional subcommitee, when thesubcomittee roled a clip from the movie Die Hard.<actually it's Die Hard II...Clip shows scene where head hancho atDullus Airport realizes someone else has control of their computersystem><scene switches to that Winn guy...An Information Security Consultant>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品久久久久一区二区三区| 欧美一级免费大片| 国产精品毛片高清在线完整版| 久久精品久久综合| www激情久久| 国产资源精品在线观看| 久久久91精品国产一区二区三区| 国内久久婷婷综合| 国产精品麻豆视频| 色综合天天综合| 亚洲理论在线观看| 欧美年轻男男videosbes| 免费人成网站在线观看欧美高清| 精品国产电影一区二区| 国内精品不卡在线| 国产精品激情偷乱一区二区∴| 99这里都是精品| 一区二区三区欧美久久| 欧美放荡的少妇| 狠狠狠色丁香婷婷综合激情| 中文欧美字幕免费| 91网站视频在线观看| 亚洲电影你懂得| 日韩欧美一区在线观看| 国产+成+人+亚洲欧洲自线| 亚洲女爱视频在线| 日韩欧美国产一区二区三区| 成人理论电影网| 亚洲成人精品影院| 26uuu精品一区二区三区四区在线| 成人动漫视频在线| 午夜精品成人在线视频| 国产日韩综合av| 色老汉一区二区三区| 日韩福利视频网| 中文字幕的久久| 欧美另类久久久品| 成人黄色软件下载| 丝袜a∨在线一区二区三区不卡| 精品国内片67194| 99re热这里只有精品免费视频| 亚洲福中文字幕伊人影院| 日韩欧美第一区| 91在线无精精品入口| 日韩av网站免费在线| 中文字幕中文字幕一区| 日韩免费高清电影| 91成人免费网站| 国产精品18久久久久久久久久久久| 亚洲欧美日韩在线| 国产校园另类小说区| 精品视频在线免费看| 高潮精品一区videoshd| 日日夜夜精品视频免费| 日韩理论片一区二区| 欧美xxxxxxxxx| 欧美色大人视频| 99久久精品一区| 国产在线不卡一区| 秋霞影院一区二区| 亚洲自拍偷拍欧美| 日韩你懂的在线观看| 91国产福利在线| 99视频精品全部免费在线| 国产一区二区三区av电影| 日本不卡视频一二三区| 亚洲国产你懂的| 日韩理论片在线| 国产精品沙发午睡系列990531| 久久影院视频免费| 精品国产污网站| 欧美一区中文字幕| 欧美酷刑日本凌虐凌虐| 欧美色精品在线视频| 91成人看片片| 欧美亚洲日本国产| 在线一区二区视频| 91丝袜高跟美女视频| 99久久久久久| 成人app在线观看| 成人av在线一区二区| 国产福利不卡视频| 国产成人免费视| 国产精品亚洲人在线观看| 国产麻豆成人传媒免费观看| 激情欧美一区二区三区在线观看| 日本大胆欧美人术艺术动态| 午夜精品爽啪视频| 日韩在线一区二区| 日本网站在线观看一区二区三区| 丝袜a∨在线一区二区三区不卡| 亚洲国产精品尤物yw在线观看| 亚洲一区二区三区视频在线| 亚洲国产视频a| 日本中文字幕不卡| 精品一区二区三区免费观看| 激情偷乱视频一区二区三区| 国产精品888| 成人综合在线网站| 色综合久久中文字幕综合网| 91久久一区二区| 欧美日韩国产首页| 精品日韩一区二区三区免费视频| 久久综合九色综合97婷婷女人| 亚洲国产精品精华液ab| 亚洲乱码国产乱码精品精98午夜| 一区二区国产视频| 97久久精品人人做人人爽| 色88888久久久久久影院按摩| 91久久精品网| 日韩限制级电影在线观看| 久久久久久久综合| 亚洲精品久久7777| 欧美a级一区二区| 丰满放荡岳乱妇91ww| 在线视频国内一区二区| 日韩三级av在线播放| 国产精品丝袜一区| 日日骚欧美日韩| 粉嫩av亚洲一区二区图片| 在线视频综合导航| 亚洲精品一线二线三线| 亚洲视频在线一区| 久久国产人妖系列| 91视频免费观看| 日韩欧美国产一区在线观看| 136国产福利精品导航| 日本sm残虐另类| 99vv1com这只有精品| 日韩视频免费观看高清完整版在线观看| 中文字幕第一页久久| 天天综合网 天天综合色| 国产成人啪午夜精品网站男同| 欧美色爱综合网| 国产精品美女久久久久久久| 免费看精品久久片| 色婷婷精品久久二区二区蜜臂av | kk眼镜猥琐国模调教系列一区二区| 色哟哟精品一区| 久久久99精品久久| 日韩二区三区在线观看| av不卡在线观看| 久久久精品一品道一区| 日本中文字幕不卡| 色天天综合久久久久综合片| 久久久激情视频| 免费在线观看视频一区| 在线观看亚洲a| 国产精品免费视频观看| 开心九九激情九九欧美日韩精美视频电影| 91日韩精品一区| 久久网这里都是精品| 美女看a上一区| 欧美日韩电影一区| 亚洲欧美二区三区| av在线不卡免费看| 久久久91精品国产一区二区三区| 蜜桃av一区二区在线观看| 欧美午夜电影在线播放| 中文字幕日韩欧美一区二区三区| 国产麻豆精品在线| 久久亚洲影视婷婷| 久久精品国产一区二区三区免费看| 欧美日韩一区中文字幕| 亚洲综合一区二区精品导航| 一本色道久久综合狠狠躁的推荐| 国产精品欧美经典| 不卡在线视频中文字幕| 欧美国产精品中文字幕| 国产高清精品网站| 国产亚洲女人久久久久毛片| 韩国毛片一区二区三区| 精品99久久久久久| 精品一二线国产| 精品国产乱子伦一区| 久久疯狂做爰流白浆xx| 日韩精品一区二区三区中文不卡 | 欧美精品黑人性xxxx| 亚洲成人在线观看视频| 欧美日韩国产影片| 日韩av电影一区| 欧美大片拔萝卜| 国产在线视频一区二区| 久久久噜噜噜久久中文字幕色伊伊 | 日韩影院免费视频| 日韩亚洲欧美在线| 国产一区二区三区在线观看免费| 久久久午夜精品理论片中文字幕| 国产精品一区二区久久精品爱涩| 欧美国产视频在线| 91免费看片在线观看| 一区二区三区精密机械公司| 欧美精品v日韩精品v韩国精品v| 日日夜夜精品视频天天综合网| 精品少妇一区二区三区日产乱码| 国产成人午夜片在线观看高清观看| 国产精品免费视频网站| 欧美视频一区在线| 美国精品在线观看| 中文字幕国产一区二区|